Page:United States Statutes at Large Volume 116 Part 4.djvu/518

 116 STAT. 2946 PUBLIC LAW 107-347—DEC. 17, 2002 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable geographic information systems technologies that shall— (A) allow widespread, low-cost use and sharing of geographic data by Federal agencies, State, local, and tribal governments, aind the public; and (B) enable the enhancement of services using geographic data. (f) AUTHORIZATION OF APPROPRIATIONS. —T here are authorized to be appropriated such sums as are necessary to carry out this section, for each of the fiscal years 2003 through 2007. Federal Information Security Management Act of 2002. 44 USC 101 note. TITLE III—INFORMATION SECURITY SEC. 301. INFORMATION SECURITY. (a) SHORT TITLE.—Th is title may be cited as the "Federal Information Security Management Act of 2002". (b) INFORMATION SECURITY.— (1) IN GENERAL.—Chapter 35 of title 44, United States Code, is amended by adding at the end the following new subchapter: " SUBCHAPTER III—INFORMATION SECURITY "§ 3541. Purposes "The purposes of this subchapter are to— "(1) provide a comprehensive framework for ensuring the effectiveness of information secinity controls over information resources that support Federal operations and assets; "(2) recognize the highly networked nature of the current Federal computing environment and provide effective governmentwide management and oversight of the related information security risks, including coordination of information security efforts throughout the civilian, national security, and law enforcement communities; "(3) provide for development and maintenance of minimum controls required to protect Federal information and information systems; "(4) provide a mechanism for improved oversight of Federal agency information security programs; "(5) acknowledge that commercially developed information security products offer advanced, d)aiamic, robust, and effective information security solutions, reflecting market solutions for to the national defense and economic security of the nation that are designed, built, and operated by the private sector; and "(6) recognize that the selection of specific technical hardware and software information security solutions should be left to individual agencies from among commercially developed products.
 * the protection of critical information infrastructures important

�