462 lines
27 KiB
Plaintext
462 lines
27 KiB
Plaintext
|
|
|||
|
|
|||
|
|
|||
|
101 STAT. 1724 PUBLIC LAW 100-235--JAN. 8, 1988
|
|||
|
|
|||
|
Public Law 100-235
|
|||
|
100th Congress
|
|||
|
|
|||
|
AN ACT
|
|||
|
|
|||
|
To provide for a computer standards program within the National
|
|||
|
Bureau of Standards, to provide for Government-wide computer
|
|||
|
security, and to provide for the training in security mat-
|
|||
|
ters of persons who are involved in the management, opera-
|
|||
|
tion, and use of Federal computer systems, and for other
|
|||
|
purposes.
|
|||
|
|
|||
|
Be it enacted by the Senate and House of Representatives of
|
|||
|
the United States of America in Congress assembled,
|
|||
|
|
|||
|
SECTION 1. SHORT TITLE.
|
|||
|
This Act may be cited as the "Computer Security Act of
|
|||
|
1987".
|
|||
|
|
|||
|
SEC. 2. PURPOSE.
|
|||
|
|
|||
|
(a) In General.--The Congress declares that improving the
|
|||
|
security and privacy of sensitive information in Federal computer
|
|||
|
systems is in the public interest, and hereby creates a means for
|
|||
|
establishing minimum acceptable security practices for such sys-
|
|||
|
tems, without limiting the scope of security measures already
|
|||
|
planned or in use.
|
|||
|
(b) Specific Purposes.--The purposes of this Act are--
|
|||
|
(1) by amending the Act of March 3, 1901, to
|
|||
|
assign to the National Bureau of Standards responsibil-
|
|||
|
ity for developing standards and guidelines for Federal
|
|||
|
computer systems, including responsibility for develop-
|
|||
|
ing standards and guidelines needed to assure the cost-
|
|||
|
effective security and privacy of sensitive information
|
|||
|
in Federal computer systems, drawing on the technical
|
|||
|
advice and assistance (including work products) of the
|
|||
|
National Security Agency, where appropriate;
|
|||
|
(2) to provide for promulgation of such standards
|
|||
|
and guidelines by amending section 111(d) of the Feder-
|
|||
|
al Property and Administrative Services Act of 1949;
|
|||
|
(3) to require establishment of security plans by
|
|||
|
all operators of Federal computer systems that contain
|
|||
|
sensitive information; and
|
|||
|
(4) to require mandatory periodic training for all
|
|||
|
persons involved in management, use, or operation of
|
|||
|
Federal computer systems that contain sensitive infor-
|
|||
|
mation.
|
|||
|
|
|||
|
SEC. 3. ESTABLISHMENT OF COMPUTER STANDARDS PROGRAM.
|
|||
|
|
|||
|
The Act of March 3, 1901 (15 U.S.C. 271-278h), is amended--
|
|||
|
(1) in section 2(f), by striking out "and" at the
|
|||
|
end of paragraph (18), by striking out the period at
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
the end of paragraph (19) and inserting in lieu thereof:
|
|||
|
"; and", and by inserting after such paragraph the
|
|||
|
following:
|
|||
|
"(20) the study of computer systems (as that term
|
|||
|
is defined in section 20(d) of this Act) and their use
|
|||
|
to control machinery and processes.";
|
|||
|
(2) by redesignating section 20 as section 22, and
|
|||
|
by inserting after section 19 the following new sec-
|
|||
|
tions:
|
|||
|
"Sec. 20. (a) The National Bureau of Standards shall--
|
|||
|
"(1) have the mission of developing standards,
|
|||
|
guidelines, and associated methods and techniques for
|
|||
|
computer systems;
|
|||
|
"(2) except as described in paragraph (3) of this
|
|||
|
subsection (relating to security standards), develop
|
|||
|
uniform standards and guidelines for Federal computer
|
|||
|
systems, except those systems excluded by section 2315
|
|||
|
of title 10, United States Code, or section 3502(2) of
|
|||
|
title 44, United States Code;
|
|||
|
"(3) have responsibility within the Federal Gov-
|
|||
|
ernment for developing technical, management, physical,
|
|||
|
and administrative standards and guidelines for the
|
|||
|
cost-effective security and privacy of sensitive infor-
|
|||
|
mation in Federal computer systems except--
|
|||
|
"(A) those systems excluded by section
|
|||
|
2315 of title 10, United States Code, or section
|
|||
|
3502(2) of title 44, United States Code; and
|
|||
|
"(B) those systems which are protected
|
|||
|
at all times by procedures established for infor-
|
|||
|
mation which has been specifically authorized
|
|||
|
under criteria established by an Executive order
|
|||
|
or an Act of Congress to be kept secret in the
|
|||
|
interest of national defense or foreign policy,
|
|||
|
the primary purpose of which standards and guidelines
|
|||
|
shall be to control loss and unauthorized modification
|
|||
|
or disclosure of sensitive information in such systems
|
|||
|
and to prevent computer-related fraud and misuse;
|
|||
|
"(4) submit standards and guidelines developed
|
|||
|
pursuant to paragraphs (2) and (3) of this subsection,
|
|||
|
along with recommendations as to the extent to which
|
|||
|
these should be made compulsory and binding, to the
|
|||
|
Secretary of Commerce for promulgation under section
|
|||
|
111(d) of the Federal Property and Administrative
|
|||
|
Services Act of 1949;
|
|||
|
"(5) develop guidelines for use by operators of
|
|||
|
Federal computer systems that contain sensitive infor-
|
|||
|
mation in training their employees in security aware-
|
|||
|
ness and accepted security practice, as required by
|
|||
|
section 5 of the Computer Security Act of 1987; and
|
|||
|
"(6) develop validation procedures for, and evalu-
|
|||
|
ate the effectiveness of, standards and guidelines
|
|||
|
developed pursuant to paragraphs (1), (2), and (3) of
|
|||
|
this subsection through research and liaison with other
|
|||
|
government and private agencies.
|
|||
|
"(b) In fulfilling subsection (a) of this section, the Na-
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
tional Bureau of Standards is authorized--
|
|||
|
"(1) to assist the private sector, upon request,
|
|||
|
in using and applying the results of the programs and
|
|||
|
activities under this section;
|
|||
|
"(2) to make recommendations, as appropriate, to
|
|||
|
the Administrator of General Services on policies and
|
|||
|
regulations proposed pursuant to section 111(d) of the
|
|||
|
Federal Property and Administrative Services Act of
|
|||
|
1949;
|
|||
|
"(3) as requested, to provide to operators of
|
|||
|
Federal computer systems technical assistance in imple-
|
|||
|
menting the standards and guidelines promulgated pursu-
|
|||
|
ant to section 111(d) of the Federal Property and
|
|||
|
Administrative Services Act of 1949;
|
|||
|
"(4) to assist, as appropriate, the Office of
|
|||
|
Personnel Management in developing regulations pertain-
|
|||
|
ing to training, as required by section 5 of the Com-
|
|||
|
puter Security Act of 1987;
|
|||
|
"(5) to perform research and to conduct studies,
|
|||
|
as needed, to determine the nature and extent of the
|
|||
|
vulnerabilities of, and to devise techniques for the
|
|||
|
cost effective security and privacy of sensitive infor-
|
|||
|
mation in Federal computer systems; and
|
|||
|
"(6) to coordinate closely with other agencies and
|
|||
|
offices (including, but not limited to, the Departments
|
|||
|
of Defense and Energy, the National Security Agency,
|
|||
|
the General Accounting Office, the Office of Technology
|
|||
|
Assessment, and the Office of Management and Budget)--
|
|||
|
"(A) to assure maximum use of all existing
|
|||
|
and planned programs, materials, studies, and
|
|||
|
reports relating to computer systems security and
|
|||
|
privacy, in order to avoid unnecessary and costly
|
|||
|
duplication of effort; and
|
|||
|
"(B) to assure, to the maximum extent feasi-
|
|||
|
ble, that standards developed pursuant to subsec-
|
|||
|
tion (a) (3) and (5) are consistent and compatible
|
|||
|
with standards and procedures developed for the
|
|||
|
protection of information in Federal computer
|
|||
|
systems which is authorized under criteria estab-
|
|||
|
lished by Executive order or an Act of Congress to
|
|||
|
be kept secret in the interest of national defense
|
|||
|
or foreign policy.
|
|||
|
"(c) For the purposes of--
|
|||
|
"(1) developing standards and guidelines for the
|
|||
|
protection of sensitive information in Federal computer
|
|||
|
systems under subsections (a)(1) and (a)(3), and
|
|||
|
"(2) performing research and conducting studies
|
|||
|
under subsection (b)(5),
|
|||
|
the National Bureau of Standards shall draw upon computer system
|
|||
|
technical security guidelines developed by the National Security
|
|||
|
Agency to the extent that the National Bureau of Standards deter-
|
|||
|
mines that such guidelines are consistent with the requirements
|
|||
|
for protecting sensitive information in Federal computer systems.
|
|||
|
"(d) As used in this section--
|
|||
|
"(1) the term 'computer system'--
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
"(A) means any equipment or interconnected
|
|||
|
system or subsystems of equipment that is used in
|
|||
|
the automatic acquisition, storage, manipulation,
|
|||
|
management, movement, control, display, switching,
|
|||
|
interchange, transmission, or reception, of data
|
|||
|
or information; and
|
|||
|
"(B) includes--
|
|||
|
"(i) computers;
|
|||
|
"(ii) ancillary equipment;
|
|||
|
"(iii) software, firmware, and similar
|
|||
|
procedures;
|
|||
|
"(iv) services, including support serv-
|
|||
|
ices; and
|
|||
|
"(v) related resources as defined by
|
|||
|
regulations issued by the Administrator for
|
|||
|
General Services pursuant to section 111 of
|
|||
|
the Federal Property and Administrative
|
|||
|
Services Act of 1949;
|
|||
|
"(2) the term 'Federal computer system'--
|
|||
|
"(A) means a computer system operated by a
|
|||
|
Federal agency or by a contractor of a Federal
|
|||
|
agency or other organization that processes infor-
|
|||
|
mation (using a computer system) on behalf of the
|
|||
|
Federal Government to accomplish a Federal func-
|
|||
|
tion; and
|
|||
|
"(B) includes automatic data processing
|
|||
|
equipment as that term is defined in section
|
|||
|
111(a)(2) of the Federal Property and Administra-
|
|||
|
tive Services Act of 1949;
|
|||
|
"(3) the term 'operator of a Federal computer
|
|||
|
system' means a Federal agency, contractor of a Federal
|
|||
|
agency, or other organization that processes informa-
|
|||
|
tion using a computer system on behalf of the Federal
|
|||
|
Government to accomplish a Federal function;
|
|||
|
"(4) the term 'sensitive information' means any
|
|||
|
information, the loss, misuse, or unauthorized access
|
|||
|
to or modification of which could adversely affect the
|
|||
|
national interest or the conduct of Federal programs,
|
|||
|
or the privacy to which individuals are entitled under
|
|||
|
section 552a of title 5, United States Code (the Priva-
|
|||
|
cy Act), but which has not been specifically authorized
|
|||
|
under criteria established by an Executive order or an
|
|||
|
Act of Congress to be kept secret in the interest of
|
|||
|
national defense or foreign policy; and
|
|||
|
"(5) the term 'Federal agency' has the meaning
|
|||
|
given such term by section 3(b) of the Federal Property
|
|||
|
and Administrative Services Act of 1949.
|
|||
|
"Sec. 21. (a) There is hereby established a Computer System
|
|||
|
Security and Privacy Advisory Board within the Department of
|
|||
|
Commerce. The Secretary of Commerce shall appoint the chairman of
|
|||
|
the Board. The Board shall be composed of twelve additional
|
|||
|
members appointed by the Secretary of Commerce as follows:
|
|||
|
"(1) four members from outside the Federal Government
|
|||
|
who are eminent in the computer or telecommunications indus-
|
|||
|
try, at least one of whom is representative of small or
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
medium sized companies in such industries;
|
|||
|
"(2) four members from outside the Federal Government
|
|||
|
who are eminent in the fields of computer or telecommunica-
|
|||
|
tions technology, or related disciplines, but who are not
|
|||
|
employed by or representative of a producer of computer or
|
|||
|
telecommunications equipment; and
|
|||
|
"(3) four members from the Federal Government who have
|
|||
|
computer systems management experience, including experience
|
|||
|
in computer systems security and privacy, at least one of
|
|||
|
whom shall be from the National Security Agency.
|
|||
|
"(b) The duties of the Board shall be--
|
|||
|
"(1) to identify emerging managerial, technical, admin-
|
|||
|
istrative, and physical safeguard issues relative to comput-
|
|||
|
er systems security and privacy;
|
|||
|
"(2) to advise the Bureau of Standards and the Secre-
|
|||
|
tary of Commerce on security and privacy issues pertaining
|
|||
|
to Federal computer systems; and
|
|||
|
"(3) to report its findings to the Secretary of Com-
|
|||
|
merce, the Director of the Office of Management and Budget,
|
|||
|
the Director of the National Security Agency, and the appro-
|
|||
|
priate Committees of the Congress.
|
|||
|
"(c) The term of office of each member of the Board shall be four
|
|||
|
years, except that--
|
|||
|
"(1) of the initial members, three shall be appointed
|
|||
|
for terms of one year, three shall be appointed for terms of
|
|||
|
two years, three shall be appointed for terms of three
|
|||
|
years, and three shall be appointed for terms of four years;
|
|||
|
and
|
|||
|
"(2) any member appointed to fill a vacancy in the
|
|||
|
Board shall serve for the remainder of the term for which
|
|||
|
his predecessor was appointed.
|
|||
|
"(d) The Board shall not act in the absence of a quorum, which
|
|||
|
shall consist of seven members.
|
|||
|
"(e) Members of the Board, other than full-time employees of the
|
|||
|
Federal Government, while attending meetings of such committees
|
|||
|
or while otherwise performing duties at the request of the Board
|
|||
|
Chairman while away from their homes or a regular place of busi-
|
|||
|
ness, may be allowed travel expenses in accordance with subchap-
|
|||
|
ter I of chapter 57 of title 5, United States Code.
|
|||
|
"(f) To provide the staff services necessary to assist the Board
|
|||
|
in carrying out its functions, the Board may utilize personnel
|
|||
|
from the National Bureau of Standards or any other agency of the
|
|||
|
Federal Government with the consent of the head of the agency.
|
|||
|
"(g) As used in this section, the terms 'computer system' and
|
|||
|
'Federal computer system' have the meanings given in section
|
|||
|
20(d) of this Act."; and
|
|||
|
(3) by adding at the end thereof the following new section:
|
|||
|
"Sec. 23. This Act may be cited as the National Bureau of
|
|||
|
Standards Act.".
|
|||
|
|
|||
|
SEC. 4. AMENDMENT TO BROOKS ACT.
|
|||
|
Section 111(d) of the Federal Property and Administrative
|
|||
|
Services Act of 1949 (40 U.S.C. 759(d)) is amended to read as
|
|||
|
follows:
|
|||
|
"(d)(1) The Secretary of Commerce shall, on the basis of
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
standards and guidelines developed by the National Bureau of
|
|||
|
Standards pursuant to section 20(a) (2) and (3) of the National
|
|||
|
Bureau of Standards Act, promulgate standards and guidelines
|
|||
|
pertaining to Federal computer systems, making such standards
|
|||
|
compulsory and binding to the extent to which the Secretary
|
|||
|
determines necessary to improve the efficiency of operation or
|
|||
|
security and privacy of Federal computer systems. The President
|
|||
|
may disapprove or modify such standards and guidelines if he
|
|||
|
determines such action to be in the public interest. The Presi-
|
|||
|
dent's authority to disapprove or modify such standards and
|
|||
|
guidelines may not be delegated. Notice of such disapproval or
|
|||
|
modification shall be submitted promptly to the Committee on
|
|||
|
Government Operations of the House of Representatives and the
|
|||
|
Committee on Governmental Affairs of the Senate and shall be
|
|||
|
published promptly in the Federal Register. Upon receiving notice
|
|||
|
of such disapproval or modification, the Secretary of Commerce
|
|||
|
shall immediately rescind or modify such standards or guidelines
|
|||
|
as directed by the President.
|
|||
|
"(2) The head of a Federal agency may employ standards for
|
|||
|
the cost effective security and privacy of sensitive information
|
|||
|
in a Federal computer system within or under the supervision of
|
|||
|
that agency that are more stringent than the standards promulgat-
|
|||
|
ed by the Secretary of Commerce, if such standards contain, at a
|
|||
|
minimum, the provisions of those applicable standards made com-
|
|||
|
pulsory and binding by the Secretary of Commerce.
|
|||
|
"(3) The standards determined to be compulsory and binding
|
|||
|
may be waived by the Secretary of Commerce in writing upon a
|
|||
|
determination that compliance would adversely affect the accom-
|
|||
|
plishment of the mission of an operator of a Federal computer
|
|||
|
system, or cause a major adverse financial impact on the operator
|
|||
|
which is not offset by government-wide savings. The Secretary may
|
|||
|
delegate to the head of one or more Federal agencies authority to
|
|||
|
waive such standards to the extent to which the Secretary deter-
|
|||
|
mines such action to be necessary and desirable to allow for
|
|||
|
timely and effective implementation of Federal computer systems
|
|||
|
standards. The head of such agency may redelegate such authority
|
|||
|
only to a senior official designated pursuant to section 3506(b)
|
|||
|
of title 44, United States Code. Notice of each such waiver and
|
|||
|
delegation shall be transmitted promptly to the Committee on
|
|||
|
Government Operations of the House of Representatives and the
|
|||
|
Committee on Governmental Affairs of the Senate and shall be
|
|||
|
published promptly in the Federal Register.
|
|||
|
"(4) The Administrator shall revise the Federal information
|
|||
|
resources management regulations (41 CFR ch. 201) to be consist-
|
|||
|
ent with the standards and guidelines promulgated by the Secre-
|
|||
|
tary of Commerce under this subsection.
|
|||
|
"(5) As used in this subsection, the terms 'Federal computer
|
|||
|
system' and 'operator of a Federal computer system' have the
|
|||
|
meanings given in section 20(d) of the National Bureau of Stand-
|
|||
|
ards Act.".
|
|||
|
|
|||
|
SEC. 5. FEDERAL COMPUTER SYSTEM SECURITY TRAINING.
|
|||
|
|
|||
|
(a) In General.--Each Federal agency shall provide for the
|
|||
|
mandatory periodic training in computer security awareness and
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
accepted computer security practice of all employees who are
|
|||
|
involved with the management, use, or operation of each Federal
|
|||
|
computer system within or under the supervision of that agency.
|
|||
|
Such training shall be--
|
|||
|
(1) provided in accordance with the guidelines de-
|
|||
|
veloped pursuant to section 20(a)(5) of the National Bureau
|
|||
|
of Standards Act (as added by section 3 of this Act), and in
|
|||
|
accordance with the regulations issued under subsection (c)
|
|||
|
of this section for Federal civilian employees; or
|
|||
|
(2) provided by an alternative training program ap-
|
|||
|
proved by the head of that agency on the basis of a determi-
|
|||
|
nation that the alternative training program is at least as
|
|||
|
effective in accomplishing the objectives of such guidelines
|
|||
|
and regulations.
|
|||
|
(b) Training Objectives.--Training under this section shall
|
|||
|
be started within 60 days after the issuance of the regulations
|
|||
|
described in subsection (c). Such training shall be designed--
|
|||
|
(1) to enhance employees' awareness of the threats to
|
|||
|
and vulnerability of computer systems; and
|
|||
|
(2) to encourage the use of improved computer security
|
|||
|
practices.
|
|||
|
(c) Regulations.--Within six months after the date of the
|
|||
|
enactment of this Act, the Director of the Office of Personnel
|
|||
|
Management shall issue regulations prescribing the procedures and
|
|||
|
scope of the training to be provided Federal civilian employees
|
|||
|
under subsection (a) and the manner in which such training is to
|
|||
|
be carried out.
|
|||
|
|
|||
|
SEC. 6. ADDITIONAL RESPONSIBILITIES FOR COMPUTER SYSTEMS SECURITY
|
|||
|
AND PRIVACY.
|
|||
|
|
|||
|
(a) Identification of Systems That Contain Sensitive Infor-
|
|||
|
mation.--Within 6 months after the date of enactment of this Act,
|
|||
|
each Federal agency shall identify each Federal computer system,
|
|||
|
and system under development, which is within or under the super-
|
|||
|
vision of that agency and which contains sensitive information.
|
|||
|
(b) Security Plan.--Within one year after the date of enact-
|
|||
|
ment of this Act, each such agency shall, consistent with the
|
|||
|
standards, guidelines, policies, and regulations prescribed
|
|||
|
pursuant to section 111(d) of the Federal Property and Adminis-
|
|||
|
trative Services Act of 1949, establish a plan for the security
|
|||
|
and privacy of each Federal computer system identified by that
|
|||
|
agency pursuant to subsection (a) that is commensurate with the
|
|||
|
risk and magnitude of the harm resulting from the loss, misuse,
|
|||
|
or unauthorized access to or modification of the information
|
|||
|
contained in such system. Copies of each such plan shall be
|
|||
|
transmitted to the National Bureau of Standards and the National
|
|||
|
Security Agency for advice and comment. A summary of such plan
|
|||
|
shall be included in the agency's five-year plan required by
|
|||
|
section 3505 of title 44, United States Code. Such plan shall be
|
|||
|
subject to disapproval by the Director of the Office of Manage-
|
|||
|
ment and Budget. Such plan shall be revised annually as neces-
|
|||
|
sary.
|
|||
|
|
|||
|
SEC. 7. DEFINITIONS.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
As used in this Act, the terms "computer system", "Federal
|
|||
|
computer system", "operator of a Federal computer system", and
|
|||
|
"sensitive information", and "Federal agency" have the meanings
|
|||
|
given in section 20(d) of the National Bureau of Standards Act
|
|||
|
(as added by section 3 of this Act).
|
|||
|
|
|||
|
SEC. 8. RULES OF CONSTRUCTION OF ACT.
|
|||
|
|
|||
|
Nothing in this Act, or in any amendment made by this Act,
|
|||
|
shall be construed--
|
|||
|
(1) to constitute authority to withhold information
|
|||
|
sought pursuant to section 552 of title 5, United States
|
|||
|
Code; or
|
|||
|
(2) to authorize any Federal agency to limit, restrict,
|
|||
|
regulate, or control the collection, maintenance, disclo-
|
|||
|
sure, use, transfer, or sale of any information (regardless
|
|||
|
of the medium in which the information may be maintained)
|
|||
|
that is--
|
|||
|
(A) privately-owned information;
|
|||
|
(B) disclosable under section 552 of title 5,
|
|||
|
United States Code, or other law requiring or authoriz-
|
|||
|
ing the public disclosure of information; or
|
|||
|
(C) public domain information.
|
|||
|
|
|||
|
Approved January 8, 1988
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|