44 USC 3542: Difference between revisions
Jump to navigation
Jump to search
(Created page with '==Definitions== '''(a)''' In General.— Except as provided under subsection (b), the definitions under section 3502 shall apply to this sub-chapter.<br> <br> '''(b)''' Additiona…') |
No edit summary |
||
Line 20: | Line 20: | ||
::::'''(V)''' subject to subparagraph (B), is critical to the direct fulfillment of military or intelligence missions; or | ::::'''(V)''' subject to subparagraph (B), is critical to the direct fulfillment of military or intelligence missions; or | ||
:::'''(ii)''' is protected at all times by procedures established for information that have been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept classified in the interest of national defense or foreign policy. | :::'''(ii)''' is protected at all times by procedures established for information that have been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept classified in the interest of national defense or foreign policy. | ||
::'''(B)''' Subparagraph (A)(i)(V) | ::'''(B)''' Subparagraph (A)(i)(V) does not include a system that is to be used for routine administrative and business applications (including payroll, finance, logistics, and personnel management applications).<br> | ||
<br> | <br> | ||
:'''(3)''' The term “information technology” has the meaning given that term in section 11101 of title 40. | :'''(3)''' The term “information technology” has the meaning given that term in section 11101 of title 40. |
Revision as of 00:57, 1 June 2010
Definitions
(a) In General.— Except as provided under subsection (b), the definitions under section 3502 shall apply to this sub-chapter.
(b) Additional Definitions.— As used in this sub-chapter:
- (1) The term “information security” means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide—
- (A) integrity, which means guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity;
- (B) confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and
- (C) availability, which means ensuring timely and reliable access to and use of information.
- (2)
- (A) The term “national security system” means any information system (including any telecommunications system) used or operated by an agency or by a contractor of an agency, or other organization on behalf of an agency—
- (i) the function, operation, or use of which—
- (I) involves intelligence activities;
- (II) involves cryptologic activities related to national security;
- (III) involves command and control of military forces;
- (IV) involves equipment that is an integral part of a weapon or weapons system; or
- (V) subject to subparagraph (B), is critical to the direct fulfillment of military or intelligence missions; or
- (ii) is protected at all times by procedures established for information that have been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept classified in the interest of national defense or foreign policy.
- (i) the function, operation, or use of which—
- (B) Subparagraph (A)(i)(V) does not include a system that is to be used for routine administrative and business applications (including payroll, finance, logistics, and personnel management applications).
- (A) The term “national security system” means any information system (including any telecommunications system) used or operated by an agency or by a contractor of an agency, or other organization on behalf of an agency—
- (3) The term “information technology” has the meaning given that term in section 11101 of title 40.