Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books
" Federal computer system identified by that agency pursuant to subsection (a) that is commensurate with the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of the information contained in such system. "
Summary of Activities of the Committee on Science and Technology, U.S. House ... - Page 162
by United States. Congress. House. Committee on Science and Technology - 1988
Full view - About this book

Compilation of the Social Security Laws: Including the Social Security Act ...

United States - Social security - 2004
...standards, guidelines, policies, and regulations prescribed pursuant to section 111(d) of the Federal Property and Administrative Services Act of 1949,...be transmitted to the National Bureau of Standards "2 and the National Security Agency for advice and comment. A summary of such plan shall be included...
Full view - About this book

Compilation of the Social Security Laws: Including the Social Security Act ...

United States - Social security - 1996 - 732 pages
...'PL 100-418, §511ťaX2), renamed this Act the "National Institute of Standards and Technology Act". Services Act of 1949, establish a plan for the security...plan shall be transmitted to the National Bureau of Standards2 and the National Security Agency for advice and comment. A summary of such plan shall be...
Full view - About this book

A Five-year Plan, Meeting the Automatic Data Processing and ...

Administrative agencies - 1990 - 208 pages
...out in the Computer Security Act (PL 100-235, 40 USC 759 note). That is, the measures taken should be "commensurate with the risk and magnitude of the harm...unauthorized access to or modification of the information." High value transactions, transmissions of highly sensitive information, and transactions that directly...
Full view - About this book

Information Systems: Agencies Overlook Security Controls During Development ...

United States. General Accounting Office - Computer crimes - 1988 - 58 pages
...required by the act to establish by January 1989, a plan for the security and privacy of each such system that is commensurate with the risk and magnitude of...modification of the information contained in such systems. In addition, the central management agencies have provided information security requirements...
Full view - About this book

Summary of Activities of the Committee on Science, Space, and Technology ...

United States. Congress. House. Committee on Science, Space, and Technology - Legislation - 1989 - 388 pages
...standards, guidelines, policies, and regulations prescribed pursuant to section 111(d) of the Federal Property and Administrative Services Act of 1949,...be transmitted to the National Bureau of Standards Mi SEAT. ■BTJ ■> BBS BBB B— Bt BBBBBB Bi OK ajB-7 I - "*-^BT 102 STAT. 18 PUBLIC LAW 100-252—...
Full view - About this book

Implementation of the Computer Security Act: Hearing Before the ..., Volume 4

United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials - Administrative agencies - 1989 - 166 pages
...information. The plans should be commensurate with the risk and magnitude of harm that would result from the loss, misuse, or unauthorized access to or modification of the information contained in the system. Chart 2 (attached) shows the responses of 85 agencies on the submission of computer security...
Full view - About this book

Congressional Serial Set

United States - 1990 - 1662 pages
...standards, guidelines, policies, and regulations prescribed pursuant to section lll(d) of the Federal Property and Administrative Services Act of 1949,...be transmitted to the National Bureau of Standards (a) IDENTIFICATION OF SYSTEMS THAT CONTAIN SENSITIVE INFORMATION.—Within 6 months after the date...
Full view - About this book

Implementation of the Computer Security Act (Public Law 100-235 ..., Volume 4

United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials - Administrative agencies - 1990 - 202 pages
...plans for the security of each system that processes "sensitive" information. Such plans are to be "commensurate with the risk and magnitude of the harm...to or modification of the information contained in the system." The Act thus defines the policy for the appropriate level of security to be provided in...
Full view - About this book

Computer Security: Hearing Before the Subcommittee on Technology ..., Volume 4

United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Technology and Competitiveness - Computer networks - 1991 - 176 pages
...information. Part of the wisdom of the Computer Security Act, is its recognition of the need for security commensurate with the risk and magnitude of the harm...resulting from the loss, misuse, or unauthorized access to the information contained in computer systems. Defining broad categories of information to be afforded...
Full view - About this book

National Fine Center: Expectations High, But Development Behind Schedule ...

United States. General Accounting Office - Fines (Penalties) - 1993 - 36 pages
...agency to establish a plan for security and privacy that is commensurate with the risk and magnitude of harm resulting from the loss, misuse, or unauthorized...modification of the information contained in such a system. To carry out these requirements effectively, agencies need to perform risk analyses and develop...
Full view - About this book




  1. My library
  2. Help
  3. Advanced Book Search
  4. Download EPUB
  5. Download PDF