§ 3534. Federal agency responsibilities
(a)
The head of each agency shall—
(1)
be responsible for—
(A)
providing information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosure, disruption, modification, or destruction of—
(2)
ensure that senior agency officials provide information security for the information and information systems that support the operations and assets under their control, including through—
(A)
assessing the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of such information or information systems;
(B)
determining the levels of information security appropriate to protect such information and information systems in accordance with standards promulgated under section
11331 of title
40 for information security classifications and related requirements;
(3)
delegate to the agency Chief Information Officer established under section
3506 (or comparable official in an agency not covered by such section) the authority to ensure compliance with the requirements imposed on the agency under this subchapter, including—
(A)
designating a senior agency information security officer who shall—
(B)
developing and maintaining an agencywide information security program as required by subsection (b);
(C)
developing and maintaining information security policies, procedures, and control techniques to address all applicable requirements, including those issued under section
3533 of this title, and section
11331 of title
40;
(b)
Each agency shall develop, document, and implement an agencywide information security program, approved by the Director under section
3533
(a)(5), to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source, that includes—
(1)
periodic assessments of the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the agency;
(2)
policies and procedures that—
(C)
ensure that information security is addressed throughout the life cycle of each agency information system; and
(3)
subordinate plans for providing adequate information security for networks, facilities, and systems or groups of information systems, as appropriate;
(4)
security awareness training to inform personnel, including contractors and other users of information systems that support the operations and assets of the agency, of—
(5)
periodic testing and evaluation of the effectiveness of information security policies, procedures, and practices, to be performed with a frequency depending on risk, but no less than annually, of which such testing—
(6)
a process for planning, implementing, evaluating, and documenting remedial action to address any deficiencies in the information security policies, procedures, and practices of the agency;
(c)
Each agency shall—
(1)
report annually to the Director, the Committees on Government Reform and Science of the House of Representatives, the Committees on Governmental Affairs and Commerce, Science, and Transportation of the Senate, the appropriate authorization and appropriations committees of Congress, and the Comptroller General on the adequacy and effectiveness of information security policies, procedures, and practices, and compliance with the requirements of this subchapter, including compliance with each requirement of subsection (b);
(2)
address the adequacy and effectiveness of information security policies, procedures, and practices in plans and reports relating to—
(D)
program performance under sections
1105 and
1115 through
1119 of title
31, and sections
2801 and
2805 of title
39;
(E)
financial management under chapter
9 of title
31, and the Chief Financial Officers Act of 1990 (31 U.S.C. 501 note ; Public Law 101–576) (and the amendments made by that Act);
(d)
(e)
Each agency shall provide the public with timely notice and opportunities for comment on proposed information security policies and procedures to the extent that such policies and procedures affect communication with the public.
[1] So in original. Probably should be “an”.
[2] So in original. Probably should be “I”.
[3] So in original. The comma probably should not appear.