FREE BOOKS

Author's List




PREV.   NEXT  
|<   246   247   248   249   250   251   252   253   254   255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270  
271   272   273   274   275   276   277   278   279   280   281   282   283   284   285   286   287   288   289   290   291   292   293   294   295   >>   >|  
organization, or a recipient's need to know such information; (C) be configured to allow the efficient and effective sharing of information; and (D) be accessible to appropriate State and local personnel. (3) The procedures prescribed under paragraph (1) shall establish conditions on the use of information shared under paragraph (1)-- (A) to limit the redissemination of such information to ensure that such information is not used for an unauthorized purpose; (B) to ensure the security and confidentiality of such information; (C) to protect the constitutional and statutory rights of any individuals who are subjects of such information; and (D) to provide data integrity through the timely removal and destruction of obsolete or erroneous names and information. (4) The procedures prescribed under paragraph (1) shall ensure, to the greatest extent practicable, that the information sharing system through which information is shared under such paragraph include existing information sharing systems, including, but not limited to, the National Law Enforcement Telecommunications System, the Regional Information Sharing System, and the Terrorist Threat Warning System of the Federal Bureau of Investigation. (5) Each appropriate Federal agency, as determined by the President, shall have access to each information sharing system through which information is shared under paragraph (1), and shall therefore have access to all information, as appropriate, shared under such paragraph. (6) The procedures prescribed under paragraph (1) shall ensure that appropriate State and local personnel are authorized to use such information sharing systems-- (A) to access information shared with such personnel; and (B) to share, with others who have access to such information sharing systems, the homeland security information of their own jurisdictions, which shall be marked
PREV.   NEXT  
|<   246   247   248   249   250   251   252   253   254   255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270  
271   272   273   274   275   276   277   278   279   280   281   282   283   284   285   286   287   288   289   290   291   292   293   294   295   >>   >|  



Top keywords:

information

 

paragraph

 

sharing

 
shared
 

access

 
ensure
 

personnel

 

procedures

 

prescribed

 

System


systems

 

security

 

system

 

Federal

 

Telecommunications

 
marked
 

Regional

 

homeland

 
jurisdictions
 

Information


including

 

existing

 

limited

 

Sharing

 

include

 

National

 

Enforcement

 
Warning
 

authorized

 

determined


President
 

agency

 
Threat
 

Bureau

 

Investigation

 

Terrorist

 
individuals
 

conditions

 

establish

 

redissemination


accessible

 

effective

 

recipient

 

organization

 
efficient
 

configured

 

unauthorized

 
purpose
 

obsolete

 

destruction