organization,
or a recipient's need to know such information;
(C) be configured to allow the efficient
and effective sharing of information; and
(D) be accessible to appropriate State and
local personnel.
(3) The procedures prescribed under paragraph (1)
shall establish conditions on the use of information
shared under paragraph (1)--
(A) to limit the redissemination of such
information to ensure that such information is
not used for an unauthorized purpose;
(B) to ensure the security and
confidentiality of such information;
(C) to protect the constitutional and
statutory rights of any individuals who are
subjects of such information; and
(D) to provide data integrity through the
timely removal and destruction of obsolete or
erroneous names and information.
(4) The procedures prescribed under paragraph (1)
shall ensure, to the greatest extent practicable, that
the information sharing system through which
information is shared under such paragraph include
existing information sharing systems, including, but
not limited to, the National Law Enforcement
Telecommunications System, the Regional Information
Sharing System, and the Terrorist Threat Warning System
of the Federal Bureau of Investigation.
(5) Each appropriate Federal agency, as determined
by the President, shall have access to each information
sharing system through which information is shared
under paragraph (1), and shall therefore have access to
all information, as appropriate, shared under such
paragraph.
(6) The procedures prescribed under paragraph (1)
shall ensure that appropriate State and local personnel
are authorized to use such information sharing
systems--
(A) to access information shared with such
personnel; and
(B) to share, with others who have access
to such information sharing systems, the
homeland security information of their own
jurisdictions, which shall be marked
|