§ 3534. Federal agency responsibilities
(a)
The head of each agency shall—
(1)
be responsible for—
(A)
providing information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosure, disruption, modification, or destruction of—
(2)
ensure that senior agency officials provide information security for the information and information systems that support the operations and assets under their control, including through—
(A)
assessing the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of such information or information systems;
(B)
determining the levels of information security appropriate to protect such information and information systems in accordance with standards promulgated under section 
11331 of title 
40 for information security classifications and related requirements;
(3)
delegate to the agency Chief Information Officer established under section 
3506 (or comparable official in an agency not covered by such section) the authority to ensure compliance with the requirements imposed on the agency under this subchapter, including—
(A)
designating a senior agency information security officer who shall—
(B)
developing and maintaining an agencywide information security program as required by subsection (b);
(C)
developing and maintaining information security policies, procedures, and control techniques to address all applicable requirements, including those issued under section 
3533 of this title, and section 
11331 of title 
40;
(b)
Each agency shall develop, document, and implement an agencywide information security program, approved by the Director under section 
3533
(a)(5), to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source, that includes—
(1)
periodic assessments of the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the agency;
(2)
policies and procedures that—
(C)
ensure that information security is addressed throughout the life cycle of each agency information system; and
(3)
subordinate plans for providing adequate information security for networks, facilities, and systems or groups of information systems, as appropriate;
(4)
security awareness training to inform personnel, including contractors and other users of information systems that support the operations and assets of the agency, of—
(5)
periodic testing and evaluation of the effectiveness of information security policies, procedures, and practices, to be performed with a frequency depending on risk, but no less than annually, of which such testing—
(6)
a process for planning, implementing, evaluating, and documenting remedial action to address any deficiencies in the information security policies, procedures, and practices of the agency;
(c)
Each agency shall—
(1)
report annually to the Director, the Committees on Government Reform and Science of the House of Representatives, the Committees on Governmental Affairs and Commerce, Science, and Transportation of the Senate, the appropriate authorization and appropriations committees of Congress, and the Comptroller General on the adequacy and effectiveness of information security policies, procedures, and practices, and compliance with the requirements of this subchapter, including compliance with each requirement of subsection (b);
(2)
address the adequacy and effectiveness of information security policies, procedures, and practices in plans and reports relating to—
(D)
program performance under sections 
1105 and 
1115 through 
1119 of title 
31, and sections 
2801 and 
2805 of title 
39;
(E)
financial management under chapter 
9 of title 
31, and the Chief Financial Officers Act of 1990 (31 U.S.C. 501 note ; Public Law 101–576) (and the amendments made by that Act);
(d)
(e)
Each agency shall provide the public with timely notice and opportunities for comment on proposed information security policies and procedures to the extent that such policies and procedures affect communication with the public.
[1] So in original. Probably should be “an”.
[2] So in original. Probably should be “I”.
[3] So in original. The comma probably should not appear.