Page:United States Statutes at Large Volume 122.djvu/3679

This page needs to be proofread.

12 2 STA T .365 6 PUBLIC LA W 11 0– 32 9— S E PT. 30 , 200 8deliv e ryofsp e c ific c a pa b ili t ies , services, perfor m a n ce levels, mission benefits and o u tcomes, and pro g ram management capabilities

(4)

an identification of staffing, including full - time e q uiva- lents, contractors, and detailees, by program office; ( 5 ) a description of h o w the plan addresses security needs at the N orthern border and ports of entry, including infrastruc- ture, technology, design and operations requirements, specific locations where funding would be used, and priorities for Northern border activities; ( 6 ) a report on budget, obligations and e x penditures, the activities completed, and the progress made by the program in terms of obtaining operational control of the entire border of the U nited S tates; ( 7 ) a listing of all open G overnment A ccountability O ffice and the Office of I nspector General recommendations related to the program and the status of D epartment of H omeland Security actions to address the recommendations, including milestones to fully address such recommendations; ( 8 ) a certification by the C hief P rocurement Officer of the Department that the program

(a) has been reviewed and approved in accordance with the investment management process of the Department, and that the process fulfills all capital planning and investment control requirements and reviews established by the Office of M anagement and B udget, including as provided in Circular A –1 1, part 7; (b) that the plans for the program comply with the F ederal acquisition rules, requirements, guidelines, and practices, and a description of the actions being ta k en to address areas of non-compliance, the risks associated with such actions, together with any plans for addressing these risks, and the status of the implementation of such actions; (c) that procedures to prevent conflicts of interest between the prime integrator and ma j or subcontractors are established and that the Secure Border Initiative Program Office has adequate staff and resources to effectively manage the Secure Border Initiative program, all contracts, including the exercise of technical oversight; and (d) the certifications required under this paragraph should be accompanied by all documents or memoranda, as well as documentation and a description of the investment review processes used to obtain such certifications; ( 9 ) a certification by the Chief Information Officer of the Department that: (a) the system architecture of the program is sufficiently aligned with the information systems enterprise architecture of the Department to minimi z e future rework, including a description of all aspects of the architectures that were or were not assessed in making the alignment determina- tion, the date of the alignment determination, and any known areas of misalignment together with the associated risks and corrective actions to address any such areas; (b) the program has a risk management process that regularly and proactively identifies, evaluates, mitigates, and monitors risks throughout the system life cycle and communicates high-risk conditions toU . S. Customs and Border Protection and Department of Homeland Security investment decision-makers, as well as a listing of all the program ’ s high risks and the status of efforts to address such risks; (c) an independent verification and