Page:United States Statutes at Large Volume 116 Part 3.djvu/667

This page needs to be proofread.

PUBLIC LAW 107-296—NOV. 25, 2002 116 STAT. 2259 (2) The Vice President. (3) The Secretary of Homeland Security. (4) The Attorney General. (5) The Secretary of Defense. (6) Such other individuals as may be designated by the President. SEC. 904. OTHER FUNCTIONS AND ACTIVITIES. 6 USC 494. For the purpose of more effectively coordinating the policies and functions of the United States Government relating to homeland security, the Council shall— (1) assess the objectives, commitments, and risks of the United States in the interest of homeland security and to make resulting recommendations to the President; (2) oversee and review homeland security policies of the Federal Government and to make resulting recommendations to the President; and (3) perform such other functions as the President may direct. SEC. 905. STAFF COMPOSITION. The Council shall have a staff, the head of which shall be a civilian Executive Secretary, who shall be appointed by the President. The President is authorized to fix the pay of the Executive Secretary at a rate not to exceed the rate of pay payable to the Executive Secretary of the National Security Council. SEC. 906. RELATION TO THE NATIONAL SECURITY COUNCIL. 6 USC 496. The President may convene joint meetings of the Homeland Security Council and the National Security Council with participation by members of either Council or as the President may otherwise direct. President. 6 USC 495. TITLE X—INFORMATION SECURITY SEC. 1001. INFORMATION SECURITY. (a) SHORT TITLE. —T his title may be cited as the "Federal Information Security Management Act of 2002". (b) INFORMATION SECURITY. — (1) IN GENERAL.— Subchapter II of chapter 35 of title 44, United States Code, is amended to read as follows: Federal Information Security Management Act of 2002. 6 USC 101 note. "SUBCHAPTER II—INFORMATION SECURITY "§3531. Purposes "The purposes of this subchapter are to— "(1) provide a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support Federal operations and assets; "(2) recognize the highly networked nature of the current Federal computing environment and provide effective governmentwide management and oversight of the related information security risks, including coordination of information security efforts throughout the civilian, national security, and law enforcement communities;