Ad
related to: section 831 information technology requirements act
Search results
Results From The WOW.Com Content Network
This summary is based largely on the summary provided by the Congressional Research Service, a public domain source. [1]The Federal Information Technology Acquisition Reform Act would modify the current framework governing the management of information technology (IT) within the federal government to: (1) require presidential appointment or designation of the chief information officer (CIO) in ...
The Clinger–Cohen Act of 1996 encompasses two laws that were together passed as part of the National Defense Authorization Act for Fiscal Year 1996 (NDA) (S. 1124; Pub. L. 104–106 (text)): [1] The Federal Acquisition Reform Act of 1996 was Division D of the NDA; The Information Technology Management Reform Act of 1996 was Division E of the NDA
The "Information Technology Management Reform Act" of 1996 was later renamed "Clinger-Cohen Act" for its co-sponsors, Rep. William Clinger, R-PA., and Senator William Cohen, R-ME. [ 8 ] To provide agencies with guidance on implementing the Clinger–Cohen Act, the Office of Management and Budget (OMB) in April 2000 distributed an " OMB Circular ...
The new rules implement U.S. Access Board's revisions by strengthening FAR requirements for accessibility in Information and Communication Technology (ICT). Section 508 requires that federal agencies “develop, procure, maintain, or use” ICT. This adoption in FAR will help the public and Federal employees have comparable access whether they ...
In passing this Act, Congress found that "the privacy of an individual is directly affected by the collection, maintenance, use, and dissemination of personal information by Federal agencies" and that "the increasing use of computers and sophisticated information technology, while essential to the efficient operations of the Government, has ...
The United States Senate's Special Subcommittee to Investigate the Administration of the Internal Security Act and Other Internal Security Laws, 1951–77, known more commonly as the Senate Internal Security Subcommittee (SISS) and sometimes the McCarran Committee, was authorized by S. 366, approved December 21, 1950, to study and investigate (1) the administration, operation, and enforcement ...
Federal agencies can be in legal compliance and still not meet the technical standards. Section 508 §1194.3 General exceptions describe exceptions for national security (e.g., most of the primary systems used by the National Security Agency (NSA)), incidental items not procured as work products, individual requests for non-public access, fundamental alteration of a product's key requirements ...
Information technology controls have been given increased prominence in corporations listed in the United States by the Sarbanes-Oxley Act. The COBIT Framework (Control Objectives for Information Technology) is a widely used framework promulgated by the IT Governance Institute, which defines a variety of ITGC and application control objectives ...