Cryptome DVDs. Donate $25 for two DVDs of the Cryptome collection of 47,000 files from June 1996 to January 2009 (~6.9 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. The collection includes all files of cryptome.org, cryptome.info, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org, and 23,100 (updated) pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985.The DVDs will be sent anywhere worldwide without extra cost.


19 April 2000


Source: http://www.access.gpo.gov/su_docs/aces/aaces002.html
-----------------------------------------------------------------------


[DOCID: f:sr259.106]
From the Senate Reports Online via GPO Access
[wais.access.gpo.gov]


                                                       Calendar No. 489
106th Congress                                                   Report
                                 SENATE
 2d Session                                                     106-259
_______________________________________________________________________


                  GOVERNMENT INFORMATION SECURITY ACT


                                OF 1999


                               __________


                              R E P O R T


                                 of the


                   COMMITTEE ON GOVERNMENTAL AFFAIRS


                          UNITED STATES SENATE


                              to accompany


                                S. 1993


TO REFORM GOVERNMENT INFORMATION SECURITY BY STRENGTHENING INFORMATION
          SECURITY PRACTICES THROUGHOUT THE FEDERAL GOVERNMENT


<GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT>


                 April 10, 2000.--Ordered to be printed


                               __________


                    U.S. GOVERNMENT PRINTING OFFICE
79-010                     WASHINGTON : 2000


                   COMMITTEE ON GOVERNMENTAL AFFAIRS


                   FRED THOMPSON, Tennessee, Chairman
WILLIAM V. ROTH, Jr., Delaware       JOSEPH I. LIEBERMAN, Connecticut
TED STEVENS, Alaska                  CARL LEVIN, Michigan
SUSAN M. COLLINS, Maine              DANIEL K. AKAKA, Hawaii
GEORGE VOINOVICH, Ohio               RICHARD J. DURBIN, Illinois
PETE V. DOMENICI, New Mexico         ROBERT G. TORRICELLI, New Jersey
THAD COCHRAN, Mississippi            MAX CLELAND, Georgia
ARLEN SPECTER, Pennsylvania          JOHN EDWARDS, North Carolina
JUDD GREGG, New Hampshire
             Hannah S. Sistare, Staff Director and Counsel
                     Ellen B. Brown, Senior Counsel
              Susan G. Marshall, Professional Staff Member
      Joyce A. Rechtschaffen, Minority Staff Director and Counsel
                Deborah Cohen Lehrich, Minority Counsel
                 Darla D. Cassell, Administrative Clerk
                                                       Calendar No. 489
106th Congress                                                   Report
                                 SENATE
 2d Session                                                     106-259


======================================================================




              GOVERNMENT INFORMATION SECURITY ACT OF 1999


                                _______




                 April 10, 2000.--Ordered to be printed


                                _______




Mr. Thompson, from the Committee on Governmental Affairs, submitted the
                               following


                              R E P O R T


                         [To accompany S. 1993]


    The Committee on Governmental Affairs, to which was
referred the bill (S. 1993) to reform Government information
security by strengthening information security practices
throughout the Federal Government, having considered the same,
reports favorably thereon with an amendment in the nature of a
substitute and recommends by voice vote that the bill as
amended do pass.


                            C O N T E N T S


                                                                   Page
  I. Purpose and Summary..............................................1
 II. Background and Need for Legislation..............................3
III. Legislative History..............................................6
 IV. Section-by-Section Analysis.....................................10
  V. Regulatory Impact Statement.....................................15
 VI. CBO Cost Estimate...............................................15
VII. Changes to Existing Law.........................................17


                         I. Purpose and Summary


    The Government Information Security Act would provide a
comprehensive framework for establishing and ensuring the
effectiveness of controls over information resources that
support Federal operations and assets. It is modeled on the
``best practices'' of leading organizations in the area of
informationsecurity. It does this by strengthening
responsibilities and procedures and coordinating information policy to
ensure better control and oversight of systems. It also recognizes the
highly networked nature of the current Federal computing environment
and provides for governmentwide management and oversight of the related
information security risks including coordination of security efforts
between civilian, national security and law enforcement communities.
    S. 1993 would amend the Paperwork Reduction Act by
inserting a new Subchapter II.
    Agency Responsibilities: Agency heads would be responsible
for developing and implementing security policies. This
responsibility would be delegable to the agency's Chief
Information Officer or comparable official. Each agency would
be responsible for developing and implementing an agency-wide
security program which must include risk assessment considering
internal and external threats, risk-based policies, security
awareness training for personnel, periodic reviews of the
effectiveness of security policies including remedies to
address deficiencies, and procedures for detecting, reporting
and responding to security incidents. Further, each agency
would be required to identify specific actions--including
budget, staffing, and training resources--necessary to
implement the security program and include this as part of its
Government Performance and Results Act performance plan.
    Director of OMB Responsibilities: The agency plans must be
affirmatively approved by the Director of OMB who also would be
responsible for establishing government-wide policies for the
management of programs that support the cost-effective security
of Federal information systems by promoting security as an
integral part of each agency's business operations. Other
responsibilities of the Director would include overseeing and
coordinating agency implementation of security policies, and
coordinating with the National Institute for Standards and
Technology on the development of standards and guidelines for
security controls for Federal systems. Such standards would be
voluntary and consensus-based and developed in consultation
with industry. To enforce agency accountability, the Director
would be authorized to take budgetary action with respect to an
agency's information resources management allocations. The OMB
Director may delegate these responsibilities only down to the
Deputy Director for Management.
    Annual Audit: Based on the General Accounting Office's
audit findings, S. 1993 adds a new requirement that each agency
must annually undergo an independent evaluation of its
information security program and practices to be conducted
either by the agency's Inspector General, the General
Accounting Office or an independent external auditor. GAO then
will review these evaluations and report annually to Congress
regarding the adequacy of agency information programs and
practices.
    National Security Systems: S. 1993 would require that the
same management framework be applied to all systems including
national security systems. However, in order to ensure that
national security concerns are adequately addressed and that
the appropriate individuals have oversight over national
security and other classified information, the substitute
amendment would vest responsibility for approving the security
plan for these systems in the Secretary of Defense and the
Director of Central Intelligence, rather than the Director of
OMB. Additionally, for these systems, the Secretary of Defense
or the Director of Central Intelligence shall designate who
conducts the evaluation of these systems with the IG conducting
an audit of the evaluation. Finally, the bill also allows the
defense and intelligence agencies to develop their own
procedures for detecting, reporting and responding to security
incidents.
    Specific Agency Responsibilities:
    The Department of Commerce would continue to be responsible
for developing, issuing, reviewing and updating standards and
guidance for the security of information in Federal computer
systems.
    The Department of Justice would be responsible for
reviewing and updating guidance to agencies on legal remedies
regarding security incidents and coordination with law
enforcement agencies concerning such incidents.
    The General Services Administration would be responsible
for reviewing and updating guidance on addressing security
considerations relating to the acquisition of information
technology.
    The Office of Personnel Management would be responsible for
reviewing and updating regulations concerning computer security
training for Federal civilian employees and for providing,
along with the National Science Foundation, for personnel and
training initiatives such as a Federal Cyber Service.


                II. Background and Need for Legislation


    Recent news accounts have described attacks on a handful of
popular commercial Internet web sites. Less publicized, though
potentially more damaging, is the fact that government computer
systems also are vulnerable to the kinds of attacks these
businesses have been suffering. Like the rest of the nation,
government is increasingly dependent upon computers to store
important information and perform vital tasks. That dependence,
however, has not been accompanied by an equivalent growth in
the security of those computer systems, leaving the
governmentsusceptible to potentially devastating disruptions in
critical services, potentially exposing our citizens' most personal
information and opening our national security apparatus to attack from
terrorists or enemy states.
    The Committee on Governmental Affairs has spent
considerable time examining the security of the government's
information technology systems. During the past several years,
Committee hearings and Committee-requested reports from the
General Accounting Office (GAO) have uncovered and publicly
highlighted the security failures affecting our vulnerability
to domestic and international cyberterrorism. On October 6,
1999, in testimony before the Senate Judiciary Committee, GAO
noted that significant information security weaknesses exist in
22 Federal agencies it analyzed. In fact, GAO believes the
problems in the government's information technology systems to
be so severe that it has put governmentwide information
security on its list of ``high-risk'' government programs.


                              GAO Reports


    As a result of its work, GAO identified many specific
weaknesses in agency controls and concluded that an underlying
cause was inadequate security program planning and management.
In particular, agencies were addressing identified weaknesses
on a piecemeal basis rather than proactively addressing
systemic causes that diminished security effectiveness
throughout the agency.
    Over the years, the following GAO reports provided the
Committee with substantial evidence of Federal agency
vulnerabilities in the area of information security and became
the basis for S. 1993:
    Department of Energy Procedures Lacking to Protect
Computerized Data (GAO/AIMD-95-118, June 1995): Allegations
were made that the Idaho National Engineering Laboratory sold
surplus computer equipment that contained sensitive data to an
Idaho businessman. GAO concluded that some of the computers
sold may have contained sensitive data, but did not determine
how many. GAO added that, like all Federal agencies, the
Department of Energy is required to establish computer security
safeguards, yet it had not.
    Information Security: Computer Attacks at Department of
Defense Pose Increasing Risks (GAO/AIMD-96-84, May 1996):
Unknown and unauthorized individuals were increasingly
attacking and gaining access to highly sensitive unclassified
information at the DoD. These attacks ranged from being
nuisances to being a serious threat to national security.
According to GAO, DoD needed to make better use of technology
and, more importantly, needed to develop better policies and
employ better trained personnel.
    Information Security: Opportunities for Improved OMB
Oversight of Agency Practices (GAO/AIMD-96-110, September
1996): GAO provided OMB with a number of recommendations on how
to better manage governmentwide information technology system
security. The recommendations included directing the Office of
Information and Regulatory Affairs, Office of Federal Financial
Management and others to review Chief Financial Officer audits
for any information security weaknesses, proactively monitoring
agency information security effectiveness through reviews, and
encouraging the development of improved information resources
to better evaluate agency information security effectiveness.
    Resolving Serious Information Security Weaknesses (GAO/HR-
97-1, February 1997): GAO identified information security as a
governmentwide high-risk area because of growing evidence
indicating that controls over computer operations were not
effective. GAO recommended that agencies proactively manage
risk and that strong, governmentwide leadership be provided on
the issue by OMB in order to ensure that executives understand
their risks, monitor agency performance, and resolve issues
affecting multiple agencies.
    IRS Systems: Tax Processing Operations and Data Still at
Risk Due to Serious Weaknesses (GAO/AIMD-97-76, April 1997):
The GAO reported that ``weaknesses in IRS computer security
controls continue to place IRS's automated systems and taxpayer
data at serious risk to both internal and external attack.''
The report stated that more needs to be done at IRS to combat
the unauthorized access or browsing of taxpayer records by
agency employees. For example, the GAO found that IRS's ability
to detect and monitor employee browsing of taxpayer data
remains limited. In addition, unauthorized employees were given
access to sensitive computer areas while employees whose jobs
did not require it were given the ability to change, alter, or
delete taxpayer data. Additionally, the GAO reported that the
IRS could not account for a total of 397 missing computer tapes
(some of which contained sensitive taxpayer data or privacy
information) and found that tapes and disks containing taxpayer
data were not erased prior to reuse (thus potentially allowing
unauthorized access to sensitive data).
    Computer Security: Pervasive, Serious Weaknesses Jeopardize
State Department Operations (GAO/AIMD-98-145, May 1998):
Todetermine the extent to which the State Department's systems are
vulnerable to unauthorized attack, the GAO directed and supervised
penetration testing of State Department systems. GAO's reviews and
testing revealed the susceptibility of the State Department's systems
to unauthorized access and that unauthorized retrieval of sensitive
information from such systems was possible. Specifically, testers were
able to download, delete, and modify data, add new data, shut down
servers, and monitor network traffic. Moreover, this activity went
largely undetected, further underscoring the State Department's serious
vulnerability to attack.
    Air Traffic Control: Weak Computer Security Practices
Jeopardize Flight Safety (GAO/AIMD-98-155, May 1998): Malicious
attacks on computer systems could cause nationwide disruption
of air traffic or even the loss of life due to collisions. Such
attacks are an increasing threat to the Federal Aviation
Administration's (FAA) systems and, consequently, those who
fly. Auditors at GAO found that, in all critical areas of
review, FAA was ineffective in implementing sound computer
security practices. In fact, FAA was found not only to be
ineffectively managing current systems, but it did not provide
accurate security specifications in new modernization efforts.
    Information Security: Many NASA Mission-Critical Systems
Face Serious Risks (GAO/AIMD-99-47, May 1999): GAO conducted an
evaluation of the National Aeronautics and Space
Administration's (NASA) information technology security program
to determine (1) whether NASA's mission critical systems are
vulnerable to unauthorized access; (2) whether NASA is
effectively managing its information systems security; and (3)
what NASA is doing to address the risk of unauthorized access
to mission critical systems. GAO determined that NASA's
information security program did not include key elements of a
comprehensive information technology security management
program because it did not assess risks, effectively implement
controls, provide training, monitor policy compliance, or
provide incident response capabilities.
    Information Security: Serious Weaknesses Place Critical
Federal Operations and Assets at Risk (GAO/AIMD-98-92,
September 1998): GAO conducted a review of 24 of the largest
Federal agencies and found serious weaknesses in the
government's ability to adequately protect: (1) federal assets
from fraud and misuse; (2) sensitive information from
inappropriate disclosure; and (3) critical operations,
including some affecting safety, from disruption. According to
the report's conclusions, these weaknesses place critical
government operations, such as national defense, tax
collection, law enforcement and benefit distribution, at risk.
    Further, the Committee asked GAO to study organizations
with superior information security programs to identify
management practices that could benefit Federal agencies. This
report detailed the ``best practices'' used by these
organizations and became the basis for the management framework
of S. 1993:
    Information Security Management: Learning from Leading
Organizations (GAO/AIMD-98-68, May 1998): At the Committee's
request, GAO studied the management practices of eight
organizations known for their superior security programs and
found that these organizations managed information security
through continuous management activities which incorporated
specific practices to support their information security
principles. These practices included providing senior
management support and involvement, defining procedures,
integrating business and technical experts, holding business
units responsible, documenting and maintaining results,
identifying threats, ranking critical assets, estimating
potential damage, identifying cost-effective mitigating
controls, and documenting assessment findings.


                        III. Legislative History


    The oversight of Federal government information management
is within the jurisdiction of the Committee on Governmental
Affairs. Over the years, the Committee spent considerable time
on this issue. During the 105th Congress, Committee hearings
focused on information security and cyberterrorism. The
Committee uncovered and identified failures of information
security affecting our international security and revealing our
vulnerability to domestic and international terrorism. These
hearings highlighted our nation's vulnerability to computer
attacks--from international and domestic terrorists to crime
rings to everyday hackers--and led to the development of S.
1993.


                                Hearings


    On May 18, 1998, the Committee held a hearing--``Weak
Computer Security in the Government: Is the Public at Risk?''--
on how Federal agencies are providing computer security. The
hearing provided many new insights into how the government has
not kept pace with the advances in technology and its
multipleapplications. In fact, the hearing revealed that, not only has
technology advanced, it has become less complex for users and its
availability is not limited and instead is widely distributed around
the world.
    Witnesses at this hearing addressed systemic problems which
make government computer and communication systems vulnerable
to both deliberate and inadvertent attacks. Dr. Peter Neumann,
Principal Scientist, Computer Science Laboratory, SRI
International, testified that our nation's underlying
information infrastructure (for example, power generation,
transmission and distribution, air traffic control, and
telecommunications) remains at risk. Even though the risk is
widely known, Dr. Neumann stated that until high-visibility
disasters occur, few people are willing to admit that something
drastic needs to be done. He testified that it may take a
Chernobyl-scale event to raise awareness levels adequately.
Also, seven members of L0pht, a ``hacker'' think tank, provided
testimony to the Committee. L0pht said that, in a matter of
thirty minutes, they could unlock the security systems within
the Internet and make the entire system unusable for a couple
of days.
    On June 24, 1998, the Committee held another hearing--
``Cyber Attack: Is the Nation at Risk?'' This hearing addressed
threats and vulnerabilities to the U.S. national security due
to weak computer security.
    The Director of Central Intelligence, Mr. George Tenet,
testified that information warfare has the potential to deal a
crippling blow to our national security if strong measures are
not taken to counter it. Director Tenet noted that the U.S. is
highly dependent on information systems and therefore is the
most likely target for an information-based attack. He
testified that potential threats range from national
intelligence and military organizations to terrorists,
criminals, industrial competitors, hackers, and disgruntled or
disloyal insiders. Director Tenet stated that several
countries, including, Russia and China, have government-
sponsored information warfare programs with both offensive and
defensive applications. These countries see information warfare
as a way of leveling the playing field against a stronger
military power, such as the U.S. The more difficult threat to
assess is that from non-State actors, such as terrorists and
criminals. Cyber attacks offer these groups greater security
and operational flexibility. They can launch an assault from
almost anywhere in the world without directly exposing
themselves to physical harm.
    The Director of the National Security Agency (NSA),
Lieutenant General Kenneth Minihan, USAF, testified on the
findings from the DoD's exercise ``Eligible Receiver.'' This
exercise demonstrated that our nation's information
infrastructure is riddled with vulnerabilities and that severe
deficiencies exist in our ability to respond to a coordinated
attack on our national infrastructure and information systems.
During the exercise, a team of hackers from NSA, using tools
easily obtained from the Internet, proved that they could deny
our military the ability to deploy forces and conduct
operations.
    On September 23, 1998, the Committee held a hearing on
computer security in Federal government agencies which examined
whether private information held by the Federal government--
information relating to one's identification, finances and
health--is susceptible to unauthorized access and manipulation
by computer hackers. The hearing focused on the results of
penetration testing performed under GAO's direction and
supervision at two federal agencies--the Department of Veterans
Affairs (VA) and the Social Security Administration (SSA).
    The Committee heard testimony from agents of the SSA Office
of Inspector General who described a variety of computer crimes
committed by SSA employees. The agents discussed in detail a
series of prosecutions, known as ``Operation Pinch,'' in which
14 SSA employees were convicted for their part in a widespread
credit card fraud ring centered in New York. The agents
determined that SSA employees sold identity information on
20,000 people whose credit cards then were fraudulently
activated by a West African crime ring, resulting in bank
losses of at least $70 million. ``Operation Pinch''
demonstrated the danger of the ``inside threat'' to agencies
that do not adequately monitor and limit access to computer
information by their own employees.
    Witnesses from GAO described the results of penetration
testing at the VA and SSA. GAO would have been able, during its
VA testing, to alter, disclose or delete sensitive information,
such as financial data and personal information on veterans'
medical records and benefit payments. GAO's penetration went
undetected because the VA did not have a monitoring system.
GAO's penetration testing of the SSA exposed vulnerabilities in
the SSA computer system to both external and internal
intrusions. These types of weakness place at risk private
information held by SSA, including Social Security numbers,
earnings, and benefits.


                              Legislation


    S. 1993, the Government Information Security Act, was
introduced on November 19, 1999, by Senator Thompson (for
himself and Senator Lieberman). Senators Abraham, Voinovich,
Akaka, Cleland, Collins, and Stevens became additional co-
sponsors.
    On March 2, 2000, the Committee held a legislative hearing
on S. 1993. The Committee sought general comments on S. 1993
and additional testimony on the security of Federal information
systems including computer system vulnerabilities, how people
exploit those weaknesses and what Federal agencies should be
doing to strengthen the management of information systems.
Thefollowing witnesses presented testimony on S. 1993: Mr. Kevin
Mitnick, a self-described reformed hacker; Mr. Jack Brock, Director,
Governmentwide and Defense Information Systems, General Accounting
Office; Ms. Roberta Gross, Inspector General, National Aeronautics and
Space Administration; Mr. James Adams, Chief Executive Officer,
iDefense; and Mr. Ken Watson, Manager, Critical Infrastructure, Cisco
Systems.
    Mr. Mitnick provided testimony which outlined four
components of information security: physical security, network
security, computer systems security, and personnel security.
After detailing the first three elements, Mr. Mitnick
highlighted the most complex element of information security--
personnel security--noting that weaknesses in personnel
security negate the effort and cost of the other three types of
security efforts. He said, ``The human side of computer
security is easily exploited and constantly overlooked.
Companies spend millions of dollars on firewalls, encryption,
and secure access devices and it is money wasted because none
of these measures address the link in the security chain, the
people who use, administer, operate and account for computer
systems that contain protected information.''
    Mr. Mitnick's testimony provided the Committee with
examples of how all of the elements of information security can
be compromised. He explained to the Committee how he
successfully tricked the employees of a multi-national company
into giving him pass codes to the company's security access
devices. Mr. Mitnick characterized S. 1993 as a good first step
toward the goal of increasing information security for
government systems and recommended increased oversight,
education and training.
    Mr. James Adams provided testimony supporting S. 1993. He
said, ``By stepping up to the plate and tackling computer
security with an innovative, bold approach the Thompson-
Lieberman bill significantly boosts the chances of reversing
the current bureaucratic approach to a dynamic problem.'' His
testimony focused on current threats and vulnerabilities within
the nation's critical infrastructure and his belief that total
cultural reform is needed. One of Mr. Adams's proposals for
reform included the establishment of a Business Assurance
Office to better manage governmentwide information security.
This Office would draw on the skills of individuals such as
Chief Information Officers, Chief Financial Officers, and Chief
Security Officers, in order for policies to be devised which
take into account the whole environment of a public sector
organization.
    Mr. Watson's testimony focused on ``best practices'' and
the management approach applied within Cisco Systems. For
example, Mr. Watson highlighted the need for a continuous
management approach which includes assessing information,
determining the level of risk of exposure of that data, and
applying the appropriate solutions. Mr. Watson emphasized that
each Federal agency and department should execute its own
programs based on tailored mission and risk analyses because no
two departments will have the same requirements at the same
time. And those requirements and solutions will change over
time.
    During the hearing Senator Thompson said, ``Hopefully the
recent breaches of security at the various dot.com companies is
the wake up call needed to focus attention on the security of
government computer systems. We know that federal agencies
continue to use a band-aid approach to computer security rather
than addressing the systemic problems which make government
systems vulnerable to repeated computer attacks.'' Senator
Lieberman said, ``The security of our digital information is
something that affects every one of us on a daily basis and
should be taken as seriously as the security of our property,
of our neighborhoods, of our communities, of our Nation, and in
the worst case, as seriously as the security of our lives * * *
the intention of the bill is to raise up computer security as a
priority consideration for Federal agencies and individual
Federal employees who have responsibility.''


                            committee action


    The Committee considered a substitute amendment to S. 1993
offered by Chairman Thompson, on behalf of himself and Senator
Lieberman, at a business meeting on March 23, 2000. The
Thompson/Lieberman substitute included changes made based on
comments received from the witnesses at the hearing held on
March 2, 2000, and working with the Office of Management and
Budget, the agency Inspectors General, the Department of
Defense and others in the intelligence community, and industry.
    The substitute amendment requires that the same management
framework be applied to all systems including national security
systems. However, in order to ensure that national security
concerns were adequately addressed and that the appropriate
individuals have oversight over national security information,
the substitute amendment vests responsibility for approving the
security plan for these systems in the Secretary of Defense and
the Director of Central Intelligence, rather than the Director
of OMB. Additionally, for these systems, the Secretary of
Defense or the Director of Central Intelligence shall designate
who conducts the evaluation of these systems, with the IG
conducting an audit of the evaluation. Finally, the amendment
also allows defense and intelligence agencies to develop their
own procedures for detecting, reporting and responding to
security incidents. And, it gives the Director of the Office of
Management and Budget and agency heads the discretion to apply
more stringent policies and procedures where appropriate for
systems critical to the missions of Federal agencies.
    In addition, the amendment includes language which the
Committee intends to lay the foundation for the education and
training of a Federal Cyber Service. As envisioned under the
President's National Plan for Information Systems Protection,
the Committee intends that the program will, at a minimum,
provide for a ROTC-like scholarships-for-service program to get
educated information security professionals straight from their
university training into government service.
    Finally, by unanimous consent, the Committee added language
on behalf of Senator Akaka to require agencies to identify
specific actions necessary to implement the security program
and include this as part of the agency's Government Performance
and Results Act performance plan. These actions include budget,
staffing and training requirements and could include specific
funding necessary to perform the independent evaluation.
    The Committee passed the Thompson/Lieberman substitute
amendment by voice vote and voted to report it to the full
Senate. Senators present were: Thompson, Collins, Stevens,
Domenici, Cochran, Voinovich, Lieberman, Akaka, and Cleland.


                         IV. Section-by-Section


                         Section 1. Short Title


    This section states the short title of the bill.


         Section 2. Coordination of Federal Information Policy


    This section would add a new subchapter II to chapter 35 of
title 44, United States Code, which currently contains the
information resources management requirements of the Paperwork
Reduction Act. The new subchapter II, entitled ``Information
Security,'' would establish comprehensive and coordinated
information security requirements for Federal agencies to be
implemented under the guidance of the Office of Management and
Budget (OMB), the Secretary of Defense and the Director of
Central Intelligence. It also would coordinate information
security provisions under the new subchapter II with other
information resources management requirements in title 44 and
other laws.
    The new subchapter II would add sections 3531 through 3535
to title 44, as follows:


Section 3531. Purposes


    This section would establish as the purposes of subchapter
II:
          (1) providing a comprehensive framework for managing
        the security of information resources that support
        Federal operations and assets;
          (2) assuring that implementation of improved security
        management measures does not adversely affect
        opportunities for interoperability in the Federal
        computing environment, and providing effective
        governmentwide management and oversight of information
        security risks and coordination of information security
        efforts;
          (3) establishing minimum controls to protect Federal
        information and information systems; and
          (4) improving oversight of Federal agency information
        security programs.


Section 3532. Definitions


    (a) This section would apply to subchapter II the
definitions now contained in the Paperwork Reduction Act,
except that--
    (b)(1) the term ``information technology'' would be defined
by section 5002 of the Clinger-Cohen Act (40 U.S.C. 1401); and
    (2) the term ``mission critical system'' would be defined
as (A) a national security system pursuant to section 5142 of
the Clinger-Cohen Act; (B) a system that is protected as secret
at all times by procedures established by an Executive Order or
an Act of Congress in the interest of national defense or
foreign policy; or (C) a system which processes information,
the loss, misuse, disclosure, unauthorized access to or
modification of which would have a debilitating impact on an
agency's mission.


Section 3533. Authority and functions of the Director


    This section would prescribe the authority and functions of
the Director of OMB with respect to information security.
    Subsection 3533(a) would require the Director to establish
governmentwide policies for the management of programs that
support the cost-effective security of government information
systems by promoting security as an integral part of agency
business operations, including information technology
architectures. The policies would require a continuing cycle of
risk management to include risk assessments, implementation of
controls to address risks, promotion of continuing awareness of
risks, and continual monitoring and evaluation of information
security policies and practices.
    Subsection 3533(b) would include within the Director's
authority under subsection (a)--
          (1) overseeing and developing policies to implement
        agency responsibilities under applicable law to ensure
        the privacy, confidentiality, and security of Federal
        information;
          (2) requiring agencies to develop information
        security protections that are commensurate with the
        risk and magnitude of harm resulting from unauthorized
        disclosure, disruption, modification, or destruction of
        information and consistent with specified provisions of
        law;
          (3) directing agency heads to (A) identify, use, and
        share best security practices; (B) develop an agency-
        wide information security plan; (C) incorporate
        information security principles and practices
        throughout the agency's information systems' life
        cycles; and (D) ensure that the agency's information
        security plan is practiced throughout all agency
        information systems' life cycles;
          (4) overseeing the development and implementation of
        standards relating to Federal computer system security
        controls by the Commerce Department's National
        Institute of Standards and Technology (NIST);
          (5) overseeing and coordinating compliance with this
        section in a manner consistent with the Freedom of
        Information Act, the Privacy Act, and other information
        management laws; and
          (6) taking any authorized action under 40 U.S.C.
        section 1413(b)(5) which the Director considers
        appropriate, including budget or appropriations-related
        actions, to enforce the accountability of agency heads
        for information resources management, including the
        requirements of this subchapter and information
        technology investments.
    Subsection 3533(c) would limit delegation of the Director's
authority under this section to the Director of Central
Intelligence and the Secretary of Defense for systems
identified under (A) and (B) of section 3532(b)(2) and to the
OMB Deputy Director for Management for all other systems.


Section 3534. Federal agency responsibilities


    Subsection (a)(1) of this section would assign agency heads
responsibility for: (A) ensuring the integrity,
confidentiality, authenticity, availability, and non-
repudiation of the information in their systems; (B) adopting
information security policies, procedures, and control
techniques commensurate with the risk and magnitude of harm
resulting from unauthorized disclosure, disruption,
modification, or destruction of information; and (C) ensuring
that the agency's information security plan is practiced
throughout each system's life cycle.
    Subsection (a)(2) would ensure that the appropriate senior
agency officials are responsible for: (A) assessing information
security risks associated with the operations and assets for
programs and systems over which such officials have control;
(B) determining appropriate levels of information security for
the operations and assets; and (C) periodically testing and
evaluating information security controls and techniques.
    Subsection (a)(3) would require agency heads to delegate
administration of all functions under subchapter II to the
agency's Chief Information Officer (CIO), or a comparable
official if the agency does not have a CIO. These functions
include (A) designating a senior agency information security
official who would report back to the CIO or comparable
official; (B) developing and maintaining an agencywide
information security program; (C) ensuring that the agency
effectively implements and maintains information security
policies, procedures and control techniques; (D) training and
overseeing personnel with information security
responsibilities; and (E) assisting senior agency officials
with their responsibilities under paragraph (2).
    Subsection (a)(4) would require agency heads to ensure that
the agency has sufficiently trained personnel to assist in
complying with subchapter II and related administrative
requirements.
    Subsection (a)(5) would require agency heads to ensure that
the CIO, in coordination with senior agency officials,
periodically evaluates the effectiveness of the agency's
information security program, including testing control
techniques; implements appropriate remedial actions based on
those evaluations; and reports to the agency head on the
results of tests and evaluations and the progress of remedial
actions.
    Subsection 3534(b) would require each agency to develop and
implement an agencywide information security program. The
program would include: (A) periodic risk assessments; (B)
policies and procedures that cost-effectively reduce risks to
an acceptable level and ensure compliance with subchapter II
and related requirements; (C) security awareness training; (D)
periodic management testing and evaluation of the effectiveness
of security policies and procedures and a process for remedying
significant deficiencies; and (E) procedures for detecting,
reporting, and responding to security incidents for all systems
including a separate process for systems identified under (A)
and (B) of section 3532(b)(2). Each information security
program would be subject to the approval of the OMB Director,
or the Secretary of Defense or Director, Central Intelligence
(in the case of systems identified under (A) and (B) of section
3532(b)(2)) and would be reviewed at least annually by agency
program officials in consultation with the CIO.
    Subsection 3534(c) would require agencies to examine the
adequacy and effectiveness of information security policies,
procedures, and practices in their plans and reports relating
to their annual budget, information resources management under
the Paperwork Reduction Act, the Clinger-Cohen Act, the
Government Performance and Results Act, and financial
management laws. Any significant deficiency would be reported
as a material weakness under the applicable reporting
requirement.


Section 3535. Annual independent evaluation


    This section would require each agency to obtain annually
an independent evaluation of its information security program
and practices.The evaluation would include an assessment of
compliance with subchapter II and related requirements as well as tests
of the effectiveness of information security control techniques. The
evaluator conducting the evaluation may use the results of other audits
or evaluations relating to agency programs or practices.
    The annual evaluation would be performed by the agency
Inspector General or by an independent evaluator determined by
the Inspector General. An agency that does not have an
Inspector General would contract with an independent evaluator
for the annual evaluation. A General Accounting Office (GAO)
evaluation may be used in lieu of the evaluation under this
section.
    In the case of systems described in paragraphs (A) and (B)
of section 3532(b)(2), the evaluation required under the
section, shall be performed only by an entity designated by the
Secretary of Defense or the Director of Central Intelligence,
as appropriate and, an audit of the evaluation shall be
performed by the Inspector General.
    The results of the annual evaluation or audit (in the case
of systems identified under (A) or (B) of section 3532(b)(2))
would be submitted to OMB within one year of enactment of this
Act and on that date every year thereafter.
    The GAO would annually review the evaluations required
under this section or an audit of the evaluation in the case of
systems described in paragraphs (A) and (B) of section
3532(b)(2) and other information security evaluation results,
and report to Congress on the adequacy of agency information
programs and practices.
    Consistent with applicable law and commensurate with risk,
agencies and evaluators would protect information from
disclosure if such disclosure would adversely affect
information security.


            section 3. responsibilities of certain agencies


    This section would assign responsibilities to specified
Federal agencies as follows:


Department of Commerce


    Subsection (a) provides that the National Institute of
Standards and Technology, with requested or required technical
assistance from the National Security Agency shall (except as
provided in subsection (b))--
          (1) establish standards and guidance for the security
        of information in Federal computer systems, including
        methods and techniques for security systems and
        validation programs;
          (2) establish guidelines for training in computer
        security awareness and practices, with assistance from
        the Office of Personnel Management (OPM);
          (3) provide guidance to agencies on security
        planning;
          (4) provide guidance and assistance to agencies on
        cost-effective controls when interconnecting with other
        systems; and
          (5) evaluate information technologies to assess and
        alert agencies to security vulnerabilities as soon as
        possible.


Department of Defense and the Intelligence Community


    Subsection (b) provides that the Secretary of Defense and
the Director of Central Intelligence shall (notwithstanding
section 2 of this Act), consistent with their respective
authorities--
          (1) develop and issue information security policies,
        standards and guidelines for systems described in
        paragraphs (A) and (B) of subsection 3532(b)(2) that
        provide more stringent protection than policies,
        principles, standards, and guidelines required under
        section 2 of this Act, as amended; and
          (2) ensure the implementation of information security
        policies, principles, standards, and guidelines as
        prescribed by subsection (1).


Department of Justice


    Subsection (c) would require the Justice Department to
review and update guidance to agencies on: (1) legal remedies
regarding security incidents and ways to work with law
enforcement agencies concerning such incidents; and (2) lawful
uses of security techniques and technologies.


General Services Administration


    Subsection (d) would require the General Services
Administration to: (1) assist agencies in fulfilling their
responsibilities under section 3534(b)(2)(E) and in acquiring
cost-effective security products, services, and incident
response capabilities.


Office of Personnel Management


    Subsection (e) would require the Office of Personnel
Management to: (1) review and update its regulations on
computer security training and (2) assist the Commerce
Department in updating and maintaining guidelines for training
in computer security awareness and best practices and (3) work
with the National Science Foundation in providing agencies with
the appropriate personnel and training initiatives, including
scholarships and fellowships to ensure that the Federal
government has adequate sources of information security
training and education and qualified personnel.
    Subsection (f) would require that, notwithstanding any
provision in this Act, the Secretary of Defense and the
Director of Central Intelligence shall develop policies,
principles, procedures and guidelines for mission critical
systems subject to their control, and these policies may be
adopted by the Director of OMB, or by an agency head, as
appropriate, to the mission critical systems of all agencies or
of that agency if consistent with other OMB and Commerce
Department guidance. Further, agencies may use the more
stringent policies, principles, procedures and guidelines for
any information system if consistent with other OMB and
Commerce Department guidance.


             Section 4. Technical and Conforming Amendments


    This section would make technical and conforming changes to
chapter 35 of title 44, United States Code.


                       Section 5. Effective Date


    This section would provide for the bill to become effective
30 days after the date of its enactment into law.


                     V. Regulatory Impact Statement


    Paragraph 11(b)(1) of the Standing Rules of the Senate
requires that each report accompanying a bill evaluate ``the
regulatory impact which would be incurred in carrying out this
bill.''
    The enactment of this legislation will not have significant
regulatory impact. S. 1993 contains no intergovernmental or
private-sector mandates as defined in the Unfunded Mandates
Reform Act and would have no impact on state, local or tribal
governments.


                         VI. CBO Cost Estimate


                                     U.S. Congress,
                               Congressional Budget Office,
                                    Washington, DC, March 29, 2000.
Hon. Fred Thompson,
Chairman, Committee on Governmental Affairs,
U.S. Senate, Washington, DC.
    Dear Mr. Chairman: The Congressional Budget Office has
prepared the enclosed cost estimate for S. 1993, the Government
Information Security Act.
    If you wish further details on this estimate, we will be
pleased to provide them. The CBO staff contact is John R.
Righter.
            Sincerely,
                                          Barry B. Anderson
                                    (For Dan L. Crippen, Director).
    Enclosure.


S. 1993--Government Information Security Act


    S. 1993 would require federal agencies to perform certain
tasks to improve the security of their computer systems.
Subject to the availability of appropriated funds, CBO
estimates that implementing S. 1993 would cost federal agencies
between $10 million and $15 million annually to audit their
security programs and practices. While this work should both
increase the cost-effectiveness of federal security systems and
reduce the likelihood of costly service disruptions, CBO has no
basis for estimating the amount of potential savings from such
improvements.
    The bill would not affect direct spending or receipts, so
pay-as-you-go procedures would not apply. S. 1993 contains no
intergovernmental or private-sector mandates as defined in the
Unfunded Mandates Reform Act and would not affect the budgets
of state, local, or tribal governments.
    S. 1993 would require federal agencies to develop a risk-
based program for ensuring the security of their information
systems, including designating a senior official to oversee the
program, periodically assessing and testing their systems, and
providing training to personnel. In addition, the bill would
require that either an inspector general or independent
evaluator annually audit an agency's security programs and
practices. S. 1993 also would specify the responsibilities of
particular agencies in securing the government's information
systems, including the National Institute of Standards and
Technology, the Department of Justice, and the General Services
Administration. Finally, the bill would require the Office of
Management and Budget (OMB) to establish policies for
implementing its provisions.
    Most of S. 1993 would codify and centralize current
practice, including directions provided in the Government
Security Act, OMB Circular No. A-130 (Management of Federal
Information Resources), and Presidential Decision Directive 63,
concerning the protection of critical infrastructure. While
some agencies already evaluate portions of their information
systems through the financial audits required by the Chief
Financial Officers (CFO) Act and the security reviews required
by OMB Circular No. A-130, the bill would call for agencies to
audit their systems more extensively and regularly.
    Based on information from the General Accounting Office,
which has reviewed the security practices of federal agencies,
and OMB, CBO estimates that requiring the annual audits would
increase agency costs by between $10 million and $15 million
annually, subject to the availability of appropriated funds.
That estimate assumes that the 25 largest federal departments
and agencies those with appointed CFOs) would regularly test
the general and management controls of critical, nonfinancial
operations. We estimate that the evaluation of between 55 and
75 computer systems operated by these agencies would cost
around $150,000 each, or a total of around $10 million
annually. Although much uncertainty exists as to the number and
complexity of computer operations that smaller agencies would
need to evaluate, as well as the extent that such evaluations
already take place, CBO expects that applying the audit
requirement to them would increase the provision's cost by as
much as 50 percent.
    In addition, the audits should both improve the cost-
effectiveness of federal security systems and decrease the
likelihood of costly service disruptions. CBO, however, cannot
estimate the amount of potential savings from such
improvements.
    The CBO staff contact is John R. Righter. This estimate was
approved by Peter H. Fontaine, Deputy Assistant Director for
Budget Analysis.


                      VII. Changes to Existing Law


    In compliance with paragraph 12 of rule XXVI of the
Standing Rules of the Senate, changes in existing law made by
the bill, as reported, are shown as follows, (existing law
proposed to be omitted is enclosed in black brackets, new
material is printed in italic, existing law in which no change
is proposed is shown in roman).


                           UNITED STATES CODE


                TITLE 44--PUBLIC PRINTING AND DOCUMENTS


           *       *       *       *       *       *       *


         CHAPTER 35--COORDINATION OF FEDERAL INFORMATION POLICY


                 Subchapter I_Federal Information Policy


Sec.
3501. Purposes.
3502. Definitions.
3503. Office of Information and Regulatory Affairs.
3504. Authority and functions of Director.
3505. Assignment of tasks and deadlines.
3506. Federal agency responsibilities.
3507. Public information collection activities; submission to Director;
          approval and delegation.
3508. Determination of necessity for information; hearing.
3509. Designation of central collection agency.
3510. Cooperation of agencies in making information available.
3511. Establishment and operation of Government Information Locator
          Service.
3512. Public protection.
3513. Director review of agency activities; reporting; agency response.
3514. Responsiveness to Congress.
3515. Administrative powers.
3516. Rules and regulations.
3517. Consultation with other agencies and the public.
3518. Effect on existing laws and regulations.
3519. Access to information.
3520. Authorization of appropriations.


                   Subchapter II--Information Security


3531. Purposes.
3532. Definitions.
3533. Authority and functions of the Director.
3534. Federal agency responsibilities.
3535. Annual independent evaluation.


                Subchapter I_Federal Information Policy


Sec. 3501. Purposes


    The purposes of this [chapter] subchapter are to--


           *       *       *       *       *       *       *


          (11) improve the responsibility and accountability of
        the Office of Management and Budget and all other
        Federal agencies to Congress and to the public for
        implementing the information collection review process,
        information resources management, and related policies
        and guidelines established under this [chapter]
        subchapter.


Sec. 3502. Definitions


    As used in this [chapter] subchapter-


           *       *       *       *       *       *       *


Sec. 3503. Office of Information and Regulatory Affairs


           *       *       *       *       *       *       *


    (b) There shall be at the head of the Office an
Administrator who shall be appointed by the President, by and
with the advice and consent of the Senate. The Director shall
delegate to the Administrator the authority to administer all
functions under this [chapter] subchapter, except that any such
delegation shall not relieve the Director of responsibility for
the administration of such functions. The Administrator shall
serve as principal adviser to the Director on Federal
information resources management policy.


Sec. 3504. Authority and functions of Director


    (a)(1) The Director shall oversee the use of information
resources to improve the efficiency and effectiveness of
governmental operations to serve agency missions, including
burden reduction and service delivery to the public. In
performing such oversight, the Director shall--
          (A) develop, coordinate and oversee the
        implementation of Federal information resources
        management policies, principles, standards, and
        guidelines; and
          (B) provide direction and oversee--
                  (i) the review and approval of the collection
                of information and the reduction of the
                information collection burden;
                  (ii) agency dissemination of and public
                access to information;
                  (iii) statistical activities;
                  (iv) records management activities;
                  (v) privacy, confidentiality, security,
                disclosure, and sharing of information; and
                  (vi) the acquisition and use of information
                technology.
    (2) The authority of the Director under this [chapter]
subchapter shall be exercised consistent with applicable law.


           *       *       *       *       *       *       *


    (d) With respect to information dissemination, the Director
shall develop and oversee the implementation of policies,
principles, standards, and guidelines to--
          (1) apply to Federal agency dissemination of public
        information, regardless of the form or format in which
        such information is disseminated; and
          (2) promote public access to public information and
        fulfill the purposes of this [chapter] subchapter,
        including through the effective use of information
        technology.


           *       *       *       *       *       *       *


    (f) With respect to records management, the Director
shall--
          (1) provide advice and assistance to the Archivist of
        the United States and the Administrator of General
        Services to promote coordination in the administration
        of chapters 29, 31, and 33 of this title with the
        information resources management policies, principles,
        standards, and guidelines established under this
        [chapter] subchapter;


           *       *       *       *       *       *       *


Sec. 3505. Assignment of tasks and deadlines


    (a) In carrying out the functions under this [chapter]
subchapter, the Director shall--
          (1) in consultation with agency heads, set an annual
        Governmentwide goal for the reduction of information
        collection burdens by at least 10 percent during each
        of fiscal years 1996 and 1997 and 5 percent during each
        of fiscal years 1998, 1999, 2000, and 2001, and set
        annual agency goals to--
                  (A) reduce information collection burdens
                imposed on the public that--
                          (i) represent the maximum practicable
                        opportunity in each agency; and
                          (ii) are consistent with improving
                        agency management of the process for
                        the review of collections of
                        information established under section
                        3506(c); and
                  (B) improve information resources management
                in ways that increase the productivity,
                efficiency and effectiveness of Federal
                programs, including service delivery to the
                public;
          (2) with selected agencies and non-Federal entities
        on a voluntary basis, conduct pilot projects to test
        alternative policies, practices, regulations, and
        procedures to fulfill the purposes of this [chapter]
        subchapter, particularly with regard to minimizing the
        Federal information collection burden; and


           *       *       *       *       *       *       *


Sec. 3506. Federal agency responsibilities


    (a)(1) The head of each agency shall be responsible for--
          (A) carrying out the agency's information resources
        management activities to improve agency productivity,
        efficiency, and effectiveness; and
          (B) complying with the requirements of this [chapter]
        subchapter and related policies established by the
        Director. (2)(A) Except as provided under subparagraph
        (B), the head of each agency shall designate a senior
        official who shall report directly to such agency head
        to carry out the responsibilities of the agency under
        this [chapter] subchapter.
    (B) The Secretary of the Department of Defense and the
Secretary of each military department may each designate senior
officials who shall report directly to such Secretary to carry
out the responsibilities of the department under this [chapter]
subchapter. If more than one official is designated, the
respective duties of the officials shall be clearly delineated.
    (3) The senior official designated under paragraph (2)
shall head an office responsible for ensuring agency compliance
with and prompt, efficient, and effective implementation of the
information policies and information resources management
responsibilities established under this [chapter] subchapter,
including the reduction of information collection burdens on
the public. The senior official and employees of such office
shall be selected with special attention to the professional
qualifications required to administer the functions described
under this [chapter] subchapter.


           *       *       *       *       *       *       *


          (4) in consultation with the Director, the
        Administrator of General Services, and the Archivist of
        the United States, maintain a current and complete
        inventory of the agency's information resources,
        including directories necessary to fulfill the
        requirements of section 3511 of this [chapter]
        subchapter; and
          (5) in consultation with the Director and the
        Director of the Office of Personnel Management, conduct
        formal training programs to educate agency program and
        management officials about information resources
        management.
    (c) With respect to the collection of information and the
control of paperwork, each agency shall--
          (1) establish a process within the office headed by
        the official designated under subsection (a), that is
        sufficiently independent of program responsibility to
        evaluate fairly whether proposed collections of
        information should be approved under this [chapter]
        subchapter, to--
          (A) review each collection of information before
        submission to the Director for review under this
        [chapter] subchapter, including--


           *       *       *       *       *       *       *


Sec. 3507. Public information collection activities; submission to
                    Director; approval and delegation


           *       *       *       *       *       *       *


    (e)(1) Any decision by the Director under subsection (c),
(d), (h), or (j) to disapprove a collection of information, or
to instruct the agency to make substantive or material change
to a collection of information, shall be publicly available and
include an explanation of the reasons for such decision.
    (2) Any written communication between the Administrator of
the Office of Information and Regulatory Affairs, or any
employee of the Office of Information and Regulatory Affairs,
and an agency or person not employed by the Federal Government
concerning a proposed collection of information shall be made
available to the public.
    (3) This subsection shall not require the disclosure of--
          (A) any information which is protected at all times
        by procedures established for information which has
        been specifically authorized under criteria established
        by an Executive order or an Act of Congress to be kept
        secret in the interest of national defense or foreign
        policy; or
          (B) any communication relating to a collection of
        information which is not approved under this [chapter]
        subchapter, the disclosure of which could lead to
        retaliation or discrimination against the communicator.


           *       *       *       *       *       *       *


    (h)(1) If an agency decides to seek extension of the
Directors approval granted for a currently approved collection
of information, the agency shall--
          (A) conduct the review established under section
        3506(c), including the seeking of comment from the
        public on the continued need for, and burden imposed by
        the collection of information; and
          (B) after having made a reasonable effort to seek
        public comment, but no later than 60 days before the
        expiration date of the control number assigned by the
        Director for the currently approved collection of
        information, submit the collection of information for
        review and approval under this section, which shall
        include an explanation of how the agency has used the
        information that it has collected.
    (2) If under the provisions of this section, the Director
disapproves a collection of information contained in an
existing rule, or recommends or instructs the agency to make a
substantive or material change to a collection of information
contained in an existing rule, the Director shall--
          (A) publish an explanation thereof in the Federal
        Register; and
          (B) instruct the agency to undertake a rulemaking
        within a reasonable time limited to consideration of
        changes to the collection of information contained in
        the rule and thereafter to submit the collection of
        information for approval or disapproval under this
        [chapter] subchapter.
    (3) An agency may not make a substantive or material
modification of a collection of information after such
collection has been approved by the Director, unless the
modification has been submitted to the Director for review and
approval under this [chapter] subchapter.


           *       *       *       *       *       *       *


    (j)(1) The agency head may request the Director to
authorize a collection of information, if an agency head
determines that--
          (A) a collection of information--
                  (i) is needed prior to the expiration of time
                periods established under this [chapter]
                subchapter; and
                  (ii) is essential to the mission of the
                agency; and
          (B) the agency cannot reasonably comply with the
        provisions of this [chapter] subchapter because--
                  (i) public harm is reasonably likely to
                result if normal clearance procedures are
                followed;
                  (ii) an unanticipated event has occurred; or
                  (iii) the use of normal clearance procedures
                is reasonably likely to prevent or disrupt the
                collection of information or is reasonably
                likely to cause a statutory or court ordered
                deadline to be missed.
    (2) The Director shall approve or disapprove any such
authorization request within the time requested by the agency
head and, if approved, shall assign the collection of
information a control number. Any collection of information
conducted under this subsection may be conducted without
compliance with the provisions of this [chapter] subchapter for
a maximum of 90 days after the date on which the Director
received the request to authorize such collection.


           *       *       *       *       *       *       *


Sec. 3509. Designation of central collection agency


    The Director may designate a central collection agency to
obtain information for two or more agencies if the Director
determines that the needs of such agencies for information will
be adequately served by a single collection agency, and such
sharing of data is not inconsistent with applicable law. In
such cases the Director shall prescribe (with reference to the
collection of information) the duties and functions of the
collection agency so designated and of the agencies for which
it is to act as agent (including reimbursement for costs).
While the designation is in effect, an agency covered by the
designation may not obtain for itself information for the
agency which is the duty of the collection agency to obtain.
The Director may modify the designation from time to time as
circumstances require. The authority to designate under this
section is subject to the provisions of section 3507(f) of this
[chapter] subchapter.


           *       *       *       *       *       *       *


Sec. 3512. Public protection


    (a) Notwithstanding any other provision of law, no person
shall be subject to any penalty for failing to comply with a
collection of information that is subject to this [chapter]
subchapter if--
          (1) the collection of information does not display a
        valid control number assigned by the Director in
        accordance with this [chapter] subchapter;


           *       *       *       *       *       *       *


Sec. 3514. Responsiveness to Congress


    (a)(1) The Director shall--
          (A) keep the Congress and congressional committees
        fully and currently informed of the major activities
        under this [chapter] subchapter; and
          (B) submit a report on such activities to the
        President of the Senate and the Speaker of the House of
        Representatives annually and at such other times as the
        Director determines necessary.
    (2) The Director shall include in any such report a
description of the extent to which agencies have--
          (A) reduced information collection burdens on the
        public, including--
                  (i) a summary of accomplishments and planned
                initiatives to reduce collection of information
                burdens;
                  (ii) a list of all violations of this
                [chapter] subchapter and of any rules,
                guidelines, policies, and procedures issued
                pursuant to this [chapter] subchapter;


           *       *       *       *       *       *       *


Sec. 3515. Administrative powers


    Upon the request of the Director, each agency (other than
an independent regulatory agency) shall, to the extent
practicable, make its services, personnel, and facilities
available to the Director for the performance of functions
under this [chapter] subsection.


Sec. 3516. Rules and regulations


    The Director shall promulgate rules, regulations, or
procedures necessary to exercise the authority provided by this
[chapter] subchapter.


Sec. 3517. Consultation with other agencies and the public


    (a) In developing information resources management
policies, plans, rules, regulations, procedures, and guidelines
and in reviewing collections of information, the Director shall
provide interested agencies and persons early and meaningful
opportunity to comment.
    (b) Any person may request the Director to review any
collection of information conducted by or for an agency to
determine, if, under this [chapter] subchapter, a person shall
maintain, provide, or disclose the information to or for the
agency. Unless the request is frivolous, the Director shall, in
coordination with the agency responsible for the collection of
information--
          (1) respond to the request within 60 days after
        receiving the request, unless such period is extended
        by the Director to a specified date and the person
        making the request is given notice of such extension;
        and
          (2) take appropriate remedial action, if necessary.


Sec. 3518. Effect on existing laws and regulations


    (a) Except as otherwise provided in this [chapter]
subchapter, the authority of an agency under any other law to
prescribe policies, rules, regulations, and procedures for
Federal information resources management activities is subject
to the authority of the Director under this [chapter]
subchapter.
    (b) Nothing in this [chapter] subchapter shall be deemed to
affect or reduce the authority of the Secretary of Commerce or
the Director of the Office of Management and Budget pursuant to
Reorganization Plan No. 1 of 1977 (as amended) and Executive
order, relating to telecommunications and information policy,
procurement and management of telecommunications and
information systems, spectrum use, and related matters.
    (c)(1) Except as provided in paragraph (2), this [chapter]
subchapter shall not apply to the collection of information--
          (A) during the conduct of a Federal criminal
        investigation or prosecution, or during the disposition
        of a particular criminal matter;
          (B) during the conduct of--
                  (i) a civil action to which the United States
                or any official or agency thereof is a party;
                or
                  (ii) an administrative action or
                investigation involving an agency against
                specific individuals or entities;
          (C) by compulsory process pursuant to the Antitrust
        Civil Process Act and section 13 of the Federal Trade
        Commission Improvements Act of 1980; or
          (D) during the conduct of intelligence activities as
        defined in section 3.4(e) of Executive Order No. 12333,
        issued December 4, 1981, or successor orders, or during
        the conduct of cryptologic activities that are
        communications security activities.
    (2) This [chapter] subchapter applies to the collection of
information during the conduct of general investigations (other
than information collected in an antitrust investigation to the
extent provided in subparagraph (C) of paragraph (1))
undertaken with reference to a category of individuals or
entities such as a class of licensees or an entire industry.
    (d) Nothing in this [chapter] subchapter shall be
interpreted as increasing or decreasing the authority conferred
by Public Law 89-306 on the Administrator of the General
Services Administration, the Secretary of Commerce, or the
Director of the Office of Management and Budget.
    (e) Nothing in this [chapter] subchapter shall be
interpreted as increasing or decreasing the authority of the
President, the Office of Management and Budget or the Director
thereof, under the laws of the United States, with respect to
the substantive policies and programs of departments, agencies
and offices, including the substantive authority of any Federal
agency to enforce the civil rights laws.


           *       *       *       *       *       *       *


Sec. 3520. Authorization of appropriations


    There are authorized to be appropriated to the Office of
Information and Regulatory Affairs to carry out the provisions
ofthis [chapter] subchapter, and for no other purpose,
$8,000,000 for each of the fiscal years 1996, 1997, 1998, 1999, 2000,
and 2001.


                  Subchapter II--Information Security


Sec. 3531. Purposes


    The purposes of this subchapter are to--
          (1) provide a comprehensive framework for
        establishing and ensuring the effectiveness of controls
        over information resources that support Federal
        operations and assets;
          (2)(A) recognize the highly networked nature of the
        Federal computing environment including the need for
        Federal Government interoperability and, in the
        implementation of improved security management
        measures, assure that opportunities for
        interoperability are not adversely affected; and
          (B) provide effective governmentwide management and
        oversight of the related information security risks,
        including coordination of information security efforts
        throughout the civilian, national security, and law
        enforcement communities;
          (3) provide for development and maintenance of
        minimum controls required to protect Federal
        information and information systems; and
          (4) provide a mechanism for improved oversight of
        Federal agency information security programs.


Sec. 3532. Definitions


    (a) Except as provided under subsection (b), the
definitions under section 3502 shall apply to this subchapter.
    (b) As used in this subchapter the term--
          (1) ``information technology'' has the meaning given
        that term in section 5002 of the Clinger-Cohen Act of
        1996 (40 U.S.C. 1401); and
          (2) ``mission critical system'' means any
        telecommunications or information system used or
        operated by an agency or by a contractor of an agency,
        or other organization on behalf of an agency, that--
                  (A) is defined as a national security system
                under section 5142 of the Clinger-Cohen Act of
                1996 (40 U.S.C. 1452);
                  (B) is protected at all times by procedures
                established for information which has been
                specifically authorized under criteria
                established by an Executive order or an Act of
                Congress to be kept secret in the interest of
                national defense or foreign policy; or
                  (C) processes any information, the loss,
                misuse, disclosure, or unauthorized access to
                or modification of, would have a debilitating
                impact on the mission of an agency.


Sec. 3533. Authority and functions of the Director


    (a)(1) The Director shall establish governmentwide policies
for the management of programs that--
          (A) support the cost-effective security of Federal
        information systems by promoting security as an
        integral component of each agency's business
        operations; and
          (B) include information technology architectures as
        defined under section 5125 of the Clinger-Cohen Act of
        1996 (40 U.S.C. 1425).
    (2) Policies under this subsection shall--
          (A) be founded on a continuing risk management cycle
        that recognizes the need to--
                  (i) identify, assess, and understand risk;
                and
                  (ii) determine security needs commensurate
                with the level of risk;
          (B) implement controls that adequately address the
        risk;
          (C) promote continuing awareness of information
        security risk; and
          (D) continually monitor and evaluate policy and
        control effectiveness of information security
        practices.
    (b) The authority under subsection (a) includes the
authority to--
          (1) oversee and develop policies, principles,
        standards, and guidelines for the handling of Federal
        information and information resources to improve the
        efficiency and effectiveness of governmental
        operations, including principles, policies, and
        guidelines for the implementation of agency
        responsibilities under applicable law for ensuring the
        privacy, confidentiality, and security of Federal
        information;
          (2) consistent with the standards and guidelines
        promulgated under section 5131 of the Clinger-Cohen Act
        of 1996 (40 U.S.C. 1441) and sections 5 and 6 of the
        Computer Security Act of 1987 (40 U.S.C. 1441 note;
        Public Law 100-235; 101 Stat. 1729), require Federal
        agencies to identify and afford security protections
        commensurate with the risk and magnitude of the harm
        resulting from the loss, misuse, or unauthorized access
        to or modification of information collected or
        maintained by or on behalf of an agency;
          (3) direct the heads of agencies to
                  (A) identify, use, and share best security
                practices;
                  (B) develop an agency-wide information
                security plan;
                  (C) incorporate information security
                principles and practices throughout the life
                cycles of the agency's information systems; and
                  (D) ensure that the agency's information
                security plan is practiced throughout all life
                cycles of the agency's information systems;
          (4) oversee the development and implementation of
        standards and guidelines relating to security controls
        for Federal computer systems by the Secretary of
        Commerce through the National Institute of Standards
        and Technology under section 5131 of the Clinger-Cohen
        Act of 1996 (40 U.S.C. 1441) and section 20 of the
        National Institute of Standards and Technology Act (15
        U.S.C. 278g-3);
          (5) oversee and coordinate compliance with this
        section in a manner consistent with--
                  (A) sections 552 and 552a of title 5;
                  (B) sections 20 and 21 of the National
                Institute of Standards and Technology Act (15
                U.S.C. 278g-3 and 278g-4);
                  (C) section 5131 of the Clinger-Cohen Act of
                1996 (40 U.S.C. 1441);
                  (D) sections 5 and 6 of the Computer Security
                Act of 1987 (40 U.S.C. 1441 note; Public Law
                100-235; 101 Stat. 1729); and
                  (E) related information management laws; and
          (6) take any authorized action under section
        5113(b)(5) of the Clinger-Cohen Act of 1996 (40 U.S.C.
        1413(b)(5)) that the Director considers appropriate,
        including any action involving the budgetary process or
        appropriations management process, to enforce
        accountability of the head of an agency for information
        resources management, including the requirements of
        this subchapter, and for the investments made by the
        agency in information technology, including--
                  (A) recommending a reduction or an increase
                in any amount for information resources that
                the head of the agency proposes for the budget
                submitted to Congress under section 1105(a) of
                title 31;
                  (B) reducing or otherwise adjusting
                apportionments and reapportionments of
                appropriations for information resources; and
                  (C) using other authorized administrative
                controls over appropriations to restrict the
                availability of funds for information
                resources.
    (c) The authorities of the Director under this section may
be delegated--
          (1) to the Secretary of Defense and the Director of
        Central Intelligence in the case of systems described
        under subparagraphs (A) and (B) of section 3532(b)(2);
        and
          (2) in the case of all other Federal information
        systems, only to the Deputy Director for Management of
        the Office of Management and Budget.


Sec. 3534. Federal agency responsibilities


    (a) The head of each agency shall--
          (1) be responsible for--
                  (A) adequately ensuring the integrity,
                confidentiality, authenticity, availability,
                and nonrepudiation of information and
                information systems supporting agency
                operations and assets;
                  (B) developing and implementing information
                security policies, procedures, and control
                techniques sufficient to afford security
                protections commensurate with the risk and
                magnitude of the harm resulting from
                unauthorized disclosure, disruption,
                modification, or destruction of information
                collected or maintained by or for the agency;
                and
                  (C) ensuring that the agency's information
                security plan is practiced throughout the life
                cycle of each agency system;
          (2) ensure that appropriate senior agency officials
        are responsible for--
                  (A) assessing the information security risks
                associated with the operations and assets for
                programs and systems over which such officials
                have control;
                  (B) determining the levels of information
                security appropriate to protect such operations
                and assets; and
                  (C) periodically testing and evaluating
                information security controls and techniques;
          (3) delegate to the agency Chief Information Officer
        established under section 3506, or a comparable
        official in an agency not covered by such section, the
        authority to administer all functions under this
        subchapter including--
                  (A) designating a senior agency information
                security official who shall report to the Chief
                Information Officer or a comparable official;
                  (B) developing and maintaining an agencywide
                information security program as required under
                subsection (b);
                  (C) ensuring that the agency effectively
                implements and maintains information security
                policies, procedures, and control techniques;
                  (D) training and overseeing personnel with
                significant responsibilities for information
                security with respect to such responsibilities;
                and
                  (E) assisting senior agency officials
                concerning responsibilities under paragraph
                (2);
          (4) ensure that the agency has trained personnel
        sufficient to assist the agency in complying with the
        requirements of this subchapter and related policies,
        procedures, standards, and guidelines; and
          (5) ensure that the agency Chief Information Officer,
        in coordination with senior agency officials,
        periodically--
                  (A)(i) evaluates the effectiveness of the
                agency information security program, including
                testing control techniques; and
                  (ii) implements appropriate remedial actions
                based on that evaluation; and
                  (B) reports to the agency head on--
                          (i) the results of such tests and
                        evaluations; and
                          (ii) the progress of remedial
                        actions.
    (b)(1) Each agency shall develop and implement an
agencywide information security program to provide information
security for the operations and assets of the agency, including
operations and assets provided or managed by another agency.
    (2) Each program under this subsection shall include--
          (A) periodic risk assessments that consider internal
        and external threats to--
                  (i) the integrity, confidentiality, and
                availability of systems; and
                  (ii) data supporting critical operations and
                assets;
          (B) policies and procedures that--
                  (i) are based on the risk assessments
                required under subparagraph (A) that cost-
                effectively reduce information security risks
                to an acceptable level; and
                  (ii) ensure compliance with--
                          (I) the requirements of this
                        subchapter;
                          (II) policies and procedures as may
                        be prescribed by the Director; and
                          (III) any other applicable
                        requirements;
          (C) security awareness training to inform personnel
        of--
                  (i) information security risks associated
                with the activities of personnel; and
                  (ii) responsibilities of personnel in
                complying with agency policies and procedures
                designed to reduce such risks;
          (D)(i) periodic management testing and evaluation of
        the effectiveness of information security policies and
        procedures; and
          (ii) a process for ensuring remedial action to
        address any significant deficiencies; and
          (E) procedures for detecting, reporting, and
        responding to security incidents, including--
                  (i) mitigating risks associated with such
                incidents before substantial damage occurs;
                  (ii) notifying and consulting with law
                enforcement officials and other offices and
                authorities;
                  (iii) notifying and consulting with an office
                designated by the Administrator of General
                Services within the General Services
                Administration; and
                  (iv) notifying and consulting with an office
                designated by the Secretary of Defense and the
                Director of Central Intelligence for incidents
                involving systems described under subparagraphs
                (A) and (B) of section 3532(b)(2).
    (3) Each program under this subsection is subject to the
approval of the Director and is required to be reviewed at
least annually by agency program officials in consultation with
the Chief Information Officer. In the case of systems described
under subparagraphs (A) and (B) of section 3532(b)(2), the
Director shall delegate approval authority under this paragraph
to the Secretary of Defense and the Director of Central
Intelligence.
    (c)(1) Each agency shall examine the adequacy and
effectiveness of information security policies, procedures, and
practices in plans and reports relating to--
          (A) annual agency budgets;
          (B) information resources management under the
        Paperwork Reduction Act of 1995 (44 U.S.C. 101 note);
          (C) performance and results based management under
        the Clinger-Cohen Act of 1996 (40 U.S.C. 1401 et seq.);
          (D) program performance under sections 1105 and 1115
        through 1119 of title 31, and sections 2801 through
        2805 of title 39; and
          (E) financial management under--
                  (i) chapter 9 of title 31, United States
                Code, and the Chief Financial Officers Act of
                1990 (31 U.S.C. 501 note; Public Law 101-576)
                (and the amendments made by that Act);
                  (ii) the Federal Financial Management
                Improvement Act of 1996 (31 U.S.C. 3512 note)
                (and the amendments made by that Act); and
                  (iii) the internal controls conducted under
                section 3512 of title 31.
    (2) Any significant deficiency in a policy, procedure,
or practice identified under paragraph (1) shall be reported as a
material weakness in reporting required under the applicable provision
of law under paragraph (1).
    (d)(1) In addition to the requirements of subsection (c),
each agency, in consultation with the Chief Information
Officer, shall include as part of the performance plan required
under section 1115 of title 31 a description of--
          (A) the time periods; and
          (B) the resources, including budget, staffing, and
        training,
which are necessary to implement the program required under
subsection (b)(1).
    (2) The description under paragraph (1) shall be based on
the risk assessment required under subsection (b)(2)(A).


Sec. 3535. Annual independent evaluation


    (a)(1) Each year each agency shall have performed an
independent evaluation of the information security program and
practices of that agency.
    (2) Each evaluation under this section shall include--
          (A) an assessment of compliance with--
                  (i) the requirements of this subchapter; and
                  (ii) related information security policies,
                procedures, standards, and guidelines; and
          (B) tests of the effectiveness of information
        security control techniques.
    (3) The Inspector General or the independent evaluator
performing an evaluation under this section including the
Comptroller General may use any audit, evaluation, or report
relating to programs or practices of the applicable agency.
    (b)(1)(A) Subject to subparagraph (B), for agencies with
Inspectors General appointed under the Inspector General Act of
1978 (5 U.S.C. App.) or any other law, the annual evaluation
required under this section or, in the case of systems
described under subparagraphs (A) and (B) of section
3532(b)(2), an audit of the annual evaluation required under
this section, shall be performed by the Inspector General or by
an independent evaluator, as determined by the Inspector
General of the agency.
    (B) For systems described under subparagraphs (A) and (B)
of section 3532(b)(2), the evaluation required under this
section shall be performed only by an entity designated by the
Secretary of Defense of the Director of Central Intelligence as
appropriate.
    (2) For any agency to which paragraph (1) does not apply,
the head of the agency shall contract with an independent
evaluator to perform the evaluation.
    (3) An evaluation of agency information security programs
and practices performed by the Comptroller General may be in
lieu of the evaluation required under this section.
    (c) Not later than 1 year after the date of enactment of
this subchapter, and on that date every year thereafter, the
applicable agency head shall submit to the Director--
          (1) the results of each evaluation required under
        this section, other than an evaluation of a system
        described under subparagraph (A) or (B) of section
        3532(b)(2); and
          (2) the results of each audit of an evaluation
        required under this section of a system described under
        subparagraph (A) or (B) of section 3532(b)(2).
    (d) Each year the Comptroller General shall--
          (1) review the evaluations required under this
        section and other information security evaluation
        results; and
          (2) report to Congress regarding the adequacy of
        agency information programs and practices.
    (e) Agencies and evaluators shall take appropriate actions
to ensure the protection of information, the disclosure of
which may adversely affect information security. Such
protections shall be commensurate with the risk and comply with
all applicable laws.


                                  <all>