Skip to main content
search
 

44 USC § 3542 - Definitions

This preliminary release may be subject to further revision before it is released again as a final version. As with other online versions of the Code, the U.S. Code Classification Tables should be consulted for the latest laws affecting the Code. Those using the USCPrelim should verify the text against the printed slip laws available from GPO (Government Printing Office), the laws as shown on THOMAS (a legislative service of the Library of Congress), and the final version of the Code when it becomes available.

Current through Pub. L. 112-131. (See Public Laws for the current Congress.)

(a) In General.— Except as provided under subsection (b), the definitions under section 3502 shall apply to this subchapter.
(b) Additional Definitions.— As used in this subchapter:
(1) The term “information security” means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide—
(A) integrity, which means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity;
(B) confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and
(C) availability, which means ensuring timely and reliable access to and use of information.
(2)
(A) The term “national security system” means any information system (including any telecommunications system) used or operated by an agency or by a contractor of an agency, or other organization on behalf of an agency—
(i) the function, operation, or use of which—
(I) involves intelligence activities;
(II) involves cryptologic activities related to national security;
(III) involves command and control of military forces;
(IV) involves equipment that is an integral part of a weapon or weapons system; or
(V) subject to subparagraph (B), is critical to the direct fulfillment of military or intelligence missions; or
(ii) is protected at all times by procedures established for information that have been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept classified in the interest of national defense or foreign policy.
(B) Subparagraph (A)(i)(V) does not include a system that is to be used for routine administrative and business applications (including payroll, finance, logistics, and personnel management applications).
(3) The term “information technology” has the meaning given that term in section 11101 of title 40.

(a) In General.— Except as provided under subsection (b), the definitions under section 3502 shall apply to this subchapter.
(b) Additional Definitions.— As used in this subchapter:
(1) The term “information security” means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide—
(A) integrity, which means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity;
(B) confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and
(C) availability, which means ensuring timely and reliable access to and use of information.
(2)
(A) The term “national security system” means any information system (including any telecommunications system) used or operated by an agency or by a contractor of an agency, or other organization on behalf of an agency—
(i) the function, operation, or use of which—
(I) involves intelligence activities;
(II) involves cryptologic activities related to national security;
(III) involves command and control of military forces;
(IV) involves equipment that is an integral part of a weapon or weapons system; or
(V) subject to subparagraph (B), is critical to the direct fulfillment of military or intelligence missions; or
(ii) is protected at all times by procedures established for information that have been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept classified in the interest of national defense or foreign policy.
(B) Subparagraph (A)(i)(V) does not include a system that is to be used for routine administrative and business applications (including payroll, finance, logistics, and personnel management applications).
(3) The term “information technology” has the meaning given that term in section 11101 of title 40.

Source

(Added Pub. L. 107–347, title III, § 301(b)(1),Dec. 17, 2002, 116 Stat. 2947.)

The table below lists the classification updates, since Jan. 3, 2012, for this section. Updates to a broader range of sections may be found at the update page for containing chapter, title, etc.

The most recent Classification Table update that we have noticed was Friday, August 31, 2012

An empty table indicates that we see no relevant changes listed in the classification tables. If you suspect that our system may be missing something, please double-check with the Office of the Law Revision Counsel.

44 USCDescription of ChangeSession YearPublic LawStatutes at Large