Promoting Private Sector Cybersecurity Information Sharing, 9347-9353 [2015-03714]

Download as PDF Vol. 80 Friday, No. 34 February 20, 2015 Part III The President TKELLEY on DSK3SPTVN1PROD with E0 Executive Order 13691—Promoting Private Sector Cybersecurity Information Sharing Memorandum of February 15, 2015—Promoting Economic Competitiveness While Safeguarding Privacy, Civil Rights, and Civil Liberties in Domestic Use of Unmanned Aircraft Systems VerDate Sep<11>2014 20:12 Feb 19, 2015 Jkt 235001 PO 00000 Frm 00001 Fmt 4717 Sfmt 4717 E:\FR\FM\20FEE0.SGM 20FEE0 TKELLEY on DSK3SPTVN1PROD with E0 VerDate Sep<11>2014 20:12 Feb 19, 2015 Jkt 235001 PO 00000 Frm 00002 Fmt 4717 Sfmt 4717 E:\FR\FM\20FEE0.SGM 20FEE0 9349 Presidential Documents Federal Register Vol. 80, No. 34 Friday, February 20, 2015 Title 3— Executive Order 13691 of February 13, 2015 The President Promoting Private Sector Cybersecurity Information Sharing By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows: Section 1. Policy. In order to address cyber threats to public health and safety, national security, and economic security of the United States, private companies, nonprofit organizations, executive departments and agencies (agencies), and other entities must be able to share information related to cybersecurity risks and incidents and collaborate to respond in as close to real time as possible. Organizations engaged in the sharing of information related to cybersecurity risks and incidents play an invaluable role in the collective cybersecurity of the United States. The purpose of this order is to encourage the voluntary formation of such organizations, to establish mechanisms to continually improve the capabilities and functions of these organizations, and to better allow these organizations to partner with the Federal Government on a voluntary basis. Such information sharing must be conducted in a manner that protects the privacy and civil liberties of individuals, that preserves business confidentiality, that safeguards the information being shared, and that protects the ability of the Government to detect, investigate, prevent, and respond to cyber threats to the public health and safety, national security, and economic security of the United States. This order builds upon the foundation established by Executive Order 13636 of February 12, 2013 (Improving Critical Infrastructure Cybersecurity), and Presidential Policy Directive–21 (PPD–21) of February 12, 2013 (Critical Infrastructure Security and Resilience). Policy coordination, guidance, dispute resolution, and periodic in-progress reviews for the functions and programs described and assigned herein shall be provided through the interagency process established in Presidential Policy Directive–l (PPD–l) of February 13, 2009 (Organization of the National Security Council System), or any successor. TKELLEY on DSK3SPTVN1PROD with E0 Sec. 2. Information Sharing and Analysis Organizations. (a) The Secretary of Homeland Security (Secretary) shall strongly encourage the development and formation of Information Sharing and Analysis Organizations (ISAOs). (b) ISAOs may be organized on the basis of sector, sub-sector, region, or any other affinity, including in response to particular emerging threats or vulnerabilities. ISAO membership may be drawn from the public or private sectors, or consist of a combination of public and private sector organizations. ISAOs may be formed as for-profit or nonprofit entities. (c) The National Cybersecurity and Communications Integration Center (NCCIC), established under section 226(b) of the Homeland Security Act of 2002 (the ‘‘Act’’), shall engage in continuous, collaborative, and inclusive coordination with ISAOs on the sharing of information related to cybersecurity risks and incidents, addressing such risks and incidents, and strengthening information security systems consistent with sections 212 and 226 of the Act. (d) In promoting the formation of ISAOs, the Secretary shall consult with other Federal entities responsible for conducting cybersecurity activities, VerDate Sep<11>2014 20:12 Feb 19, 2015 Jkt 235001 PO 00000 Frm 00003 Fmt 4705 Sfmt 4790 E:\FR\FM\20FEE0.SGM 20FEE0 9350 Federal Register / Vol. 80, No. 34 / Friday, February 20, 2015 / Presidential Documents including Sector-Specific Agencies, independent regulatory agencies at their discretion, and national security and law enforcement agencies. Sec. 3. ISAO Standards Organization. (a) The Secretary, in consultation with other Federal entities responsible for conducting cybersecurity and related activities, shall, through an open and competitive process, enter into an agreement with a nongovernmental organization to serve as the ISAO Standards Organization (SO), which shall identify a common set of voluntary standards or guidelines for the creation and functioning of ISAOs under this order. The standards shall further the goal of creating robust information sharing related to cybersecurity risks and incidents with ISAOs and among ISAOs to create deeper and broader networks of information sharing nationally, and to foster the development and adoption of automated mechanisms for the sharing of information. The standards will address the baseline capabilities that ISAOs under this order should possess and be able to demonstrate. These standards shall address, but not be limited to, contractual agreements, business processes, operating procedures, technical means, and privacy protections, such as minimization, for ISAO operation and ISAO member participation. (b) To be selected, the SO must demonstrate the ability to engage and work across the broad community of organizations engaged in sharing information related to cybersecurity risks and incidents, including ISAOs, and associations and private companies engaged in information sharing in support of their customers. (c) The agreement referenced in section 3(a) shall require that the SO engage in an open public review and comment process for the development of the standards referenced above, soliciting the viewpoints of existing entities engaged in sharing information related to cybersecurity risks and incidents, owners and operators of critical infrastructure, relevant agencies, and other public and private sector stakeholders. TKELLEY on DSK3SPTVN1PROD with E0 (d) The Secretary shall support the development of these standards and, in carrying out the requirements set forth in this section, shall consult with the Office of Management and Budget, the National Institute of Standards and Technology in the Department of Commerce, Department of Justice, the Information Security Oversight Office in the National Archives and Records Administration, the Office of the Director of National Intelligence, Sector-Specific Agencies, and other interested Federal entities. All standards shall be consistent with voluntary international standards when such international standards will advance the objectives of this order, and shall meet the requirements of the National Technology Transfer and Advancement Act of 1995 (Public Law 104–113), and OMB Circular A–119, as revised. Sec. 4. Critical Infrastructure Protection Program. (a) Pursuant to sections 213 and 214(h) of the Critical Infrastructure Information Act of 2002, I hereby designate the NCCIC as a critical infrastructure protection program and delegate to it authority to enter into voluntary agreements with ISAOs in order to promote critical infrastructure security with respect to cybersecurity. (b) Other Federal entities responsible for conducting cybersecurity and related activities to address threats to the public health and safety, national security, and economic security, consistent with the objectives of this order, may participate in activities under these agreements. (c) The Secretary will determine the eligibility of ISAOs and their members for any necessary facility or personnel security clearances associated with voluntary agreements in accordance with Executive Order 13549 of August 18, 2010 (Classified National Security Information Programs for State, Local, Tribal, and Private Sector Entities), and Executive Order 12829 of January 6, 1993 (National Industrial Security Program), as amended, including as amended by this order. Sec. 5. Privacy and Civil Liberties Protections. (a) Agencies shall coordinate their activities under this order with their senior agency officials for privacy and civil liberties and ensure that appropriate protections for privacy and VerDate Sep<11>2014 20:12 Feb 19, 2015 Jkt 235001 PO 00000 Frm 00004 Fmt 4705 Sfmt 4790 E:\FR\FM\20FEE0.SGM 20FEE0 Federal Register / Vol. 80, No. 34 / Friday, February 20, 2015 / Presidential Documents 9351 civil liberties are incorporated into such activities. Such protections shall be based upon the Fair Information Practice Principles and other privacy and civil liberties policies, principles, and frameworks as they apply to each agency’s activities. (b) Senior privacy and civil liberties officials for agencies engaged in activities under this order shall conduct assessments of their agency’s activities and provide those assessments to the Department of Homeland Security (DHS) Chief Privacy Officer and the DHS Office for Civil Rights and Civil Liberties for consideration and inclusion in the Privacy and Civil Liberties Assessment report required under Executive Order 13636. Sec. 6. National Industrial Security Program. Executive Order 12829, as amended, is hereby further amended as follows: (a) the second paragraph is amended by inserting ‘‘the Intelligence Reform and Terrorism Prevention Act of 2004,’’ after ‘‘the National Security Act of 1947, as amended,’’; (b) Sec. 101(b) is amended to read as follows: ‘‘The National Industrial Security Program shall provide for the protection of information classified pursuant to Executive Order 13526 of December 29, 2009, or any predecessor or successor order, and the Atomic Energy Act of 1954, as amended (42 U.S.C. 2011 et seq.).’’; (c) Sec. 102(b) is amended by replacing the first paragraph with: ‘‘In consultation with the National Security Advisor, the Director of the Information Security Oversight Office, in accordance with Executive Order 13526 of December 29, 2009, shall be responsible for implementing and monitoring the National Industrial Security Program and shall:’’; (d) Sec. 102(c) is amended to read as follows: ‘‘Nothing in this order shall be construed to supersede the authority of the Secretary of Energy or the Nuclear Regulatory Commission under the Atomic Energy Act of 1954, as amended (42 U.S.C. 2011 et seq.), or the authority of the Director of National Intelligence (or any Intelligence Community element) under the Intelligence Reform and Terrorism Prevention Act of 2004, the National Security Act of 1947, as amended, or Executive Order 12333 of December 8, 1981, as amended, or the authority of the Secretary of Homeland Security, as the Executive Agent for the Classified National Security Information Program established under Executive Order 13549 of August 18, 2010 (Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities).’’; (e) Sec. 201(a) is amended to read as follows: ‘‘The Secretary of Defense, in consultation with all affected agencies and with the concurrence of the Secretary of Energy, the Nuclear Regulatory Commission, the Director of National Intelligence, and the Secretary of Homeland Security, shall issue and maintain a National Industrial Security Program Operating Manual (Manual). The Secretary of Energy and the Nuclear Regulatory Commission shall prescribe and issue that portion of the Manual that pertains to information classified under the Atomic Energy Act of 1954, as amended (42 U.S.C. 2011 et seq.). The Director of National Intelligence shall prescribe and issue that portion of the Manual that pertains to intelligence sources and methods, including Sensitive Compartmented Information. The Secretary of Homeland Security shall prescribe and issue that portion of the Manual that pertains to classified information shared under a designated critical infrastructure protection program.’’; TKELLEY on DSK3SPTVN1PROD with E0 (f) Sec. 201(f) is deleted in its entirety; (g) Sec. 201(e) is redesignated Sec. 201(f) and revised by substituting ‘‘Executive Order 13526 of December 29, 2009, or any successor order,’’ for ‘‘Executive Order No. 12356 of April 2, 1982.’’; (h) Sec. 201(d) is redesignated Sec. 201(e) and revised by substituting ‘‘the Director of National Intelligence, and the Secretary of Homeland Security’’ for ‘‘and the Director of Central Intelligence.’’; VerDate Sep<11>2014 20:12 Feb 19, 2015 Jkt 235001 PO 00000 Frm 00005 Fmt 4705 Sfmt 4790 E:\FR\FM\20FEE0.SGM 20FEE0 9352 Federal Register / Vol. 80, No. 34 / Friday, February 20, 2015 / Presidential Documents (i) a new Sec. 201(d) is inserted after Sec. 201(c) to read as follows: ‘‘The Manual shall also prescribe arrangements necessary to permit and enable secure sharing of classified information under a designated critical infrastructure protection program to such authorized individuals and organizations as determined by the Secretary of Homeland Security.’’; (j) Sec. 202(b) is amended to read as follows: ‘‘The Director of National Intelligence retains authority over access to intelligence sources and methods, including Sensitive Compartmented Information. The Director of National Intelligence may inspect and monitor contractor, licensee, and grantee programs and facilities that involve access to such information or may enter into written agreements with the Secretary of Defense, as Executive Agent, or with the Director of the Central Intelligence Agency to inspect and monitor these programs or facilities, in whole or in part, on the Director’s behalf.’’; (k) Sec. 202(d) is redesignated as Sec. 202(e); and (l) in Sec. 202 a new subsection (d) is inserted after subsection (c) to read as follows: ‘‘The Secretary of Homeland Security may determine the eligibility for access to Classified National Security Information of contractors, licensees, and grantees and their respective employees under a designated critical infrastructure protection program, including parties to agreements with such program; the Secretary of Homeland Security may inspect and monitor contractor, licensee, and grantee programs and facilities or may enter into written agreements with the Secretary of Defense, as Executive Agent, or with the Director of the Central Intelligence Agency, to inspect and monitor these programs or facilities in whole or in part, on behalf of the Secretary of Homeland Security.’’ Sec. 7. Definitions. (a) ‘‘Critical infrastructure information’’ has the meaning given the term in section 212(3) of the Critical Infrastructure Information Act of 2002. (b) ‘‘Critical infrastructure protection program’’ has the meaning given the term in section 212(4) of the Critical Infrastructure Information Act of 2002. (c) ‘‘Cybersecurity risk’’ has the meaning given the term in section 226(a)(1) of the Homeland Security Act of 2002 (as amended by the National Cybersecurity Protection Act of 2014). (d) ‘‘Fair Information Practice Principles’’ means the eight principles set forth in Appendix A of the National Strategy for Trusted Identities in Cyberspace. (e) ‘‘Incident’’ has the meaning given the term in section 226(a)(2) of the Homeland Security Act of 2002 (as amended by the National Cybersecurity Protection Act of 2014). (f) ‘‘Information Sharing and Analysis Organization’’ has the meaning given the term in section 212(5) of the Critical Infrastrucure Information Act of 2002. TKELLEY on DSK3SPTVN1PROD with E0 (g) ‘‘Sector-Specific Agency’’ has the meaning given the term in PPD– 21, or any successor. Sec. 8. General Provisions. (a) Nothing in this order shall be construed to impair or otherwise affect: (i) the authority granted by law or Executive Order to an agency, or the head thereof; or (ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals. (b) This order shall be implemented consistent with applicable law and subject to the availability of appropriations. Nothing in this order shall be construed to alter or limit any authority or responsibility of an agency under existing law including those activities conducted with the private sector relating to criminal and national security threats. Nothing in this order shall be construed to provide an agency with authority for regulating VerDate Sep<11>2014 20:12 Feb 19, 2015 Jkt 235001 PO 00000 Frm 00006 Fmt 4705 Sfmt 4790 E:\FR\FM\20FEE0.SGM 20FEE0 Federal Register / Vol. 80, No. 34 / Friday, February 20, 2015 / Presidential Documents 9353 the security of critical infrastructure in addition to or to a greater extent than the authority the agency has under existing law. (c) All actions taken pursuant to this order shall be consistent with requirements and authorities to protect intelligence and law enforcement sources and methods. (d) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person. THE WHITE HOUSE, February 13, 2015. [FR Doc. 2015–03714 Filed 2–19–15; 2:00 pm] VerDate Sep<11>2014 20:12 Feb 19, 2015 Jkt 235001 PO 00000 Frm 00007 Fmt 4705 Sfmt 4790 E:\FR\FM\20FEE0.SGM 20FEE0 OB#1.EPS</GPH> TKELLEY on DSK3SPTVN1PROD with E0 Billing code 3295–F5

Agencies

[Federal Register Volume 80, Number 34 (Friday, February 20, 2015)]
[Presidential Documents]
[Pages 9347-9353]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2015-03714]



[[Page 9347]]

Vol. 80

Friday,

No. 34

February 20, 2015

Part III





The President





-----------------------------------------------------------------------



Executive Order 13691--Promoting Private Sector Cybersecurity 
Information Sharing



Memorandum of February 15, 2015--Promoting Economic Competitiveness 
While Safeguarding Privacy, Civil Rights, and Civil Liberties in 
Domestic Use of Unmanned Aircraft Systems


                        Presidential Documents 



Federal Register / Vol. 80 , No. 34 / Friday, February 20, 2015 / 
Presidential Documents

___________________________________________________________________

Title 3--
The President

[[Page 9349]]

                Executive Order 13691 of February 13, 2015

                
Promoting Private Sector Cybersecurity 
                Information Sharing

                By the authority vested in me as President by the 
                Constitution and the laws of the United States of 
                America, it is hereby ordered as follows:

                Section 1. Policy. In order to address cyber threats to 
                public health and safety, national security, and 
                economic security of the United States, private 
                companies, nonprofit organizations, executive 
                departments and agencies (agencies), and other entities 
                must be able to share information related to 
                cybersecurity risks and incidents and collaborate to 
                respond in as close to real time as possible.

                Organizations engaged in the sharing of information 
                related to cybersecurity risks and incidents play an 
                invaluable role in the collective cybersecurity of the 
                United States. The purpose of this order is to 
                encourage the voluntary formation of such 
                organizations, to establish mechanisms to continually 
                improve the capabilities and functions of these 
                organizations, and to better allow these organizations 
                to partner with the Federal Government on a voluntary 
                basis.

                Such information sharing must be conducted in a manner 
                that protects the privacy and civil liberties of 
                individuals, that preserves business confidentiality, 
                that safeguards the information being shared, and that 
                protects the ability of the Government to detect, 
                investigate, prevent, and respond to cyber threats to 
                the public health and safety, national security, and 
                economic security of the United States.

                This order builds upon the foundation established by 
                Executive Order 13636 of February 12, 2013 (Improving 
                Critical Infrastructure Cybersecurity), and 
                Presidential Policy Directive-21 (PPD-21) of February 
                12, 2013 (Critical Infrastructure Security and 
                Resilience).

                Policy coordination, guidance, dispute resolution, and 
                periodic in-progress reviews for the functions and 
                programs described and assigned herein shall be 
                provided through the interagency process established in 
                Presidential Policy Directive-l (PPD-l) of February 13, 
                2009 (Organization of the National Security Council 
                System), or any successor.

                Sec. 2. Information Sharing and Analysis Organizations. 
                (a) The Secretary of Homeland Security (Secretary) 
                shall strongly encourage the development and formation 
                of Information Sharing and Analysis Organizations 
                (ISAOs).

                    (b) ISAOs may be organized on the basis of sector, 
                sub-sector, region, or any other affinity, including in 
                response to particular emerging threats or 
                vulnerabilities. ISAO membership may be drawn from the 
                public or private sectors, or consist of a combination 
                of public and private sector organizations. ISAOs may 
                be formed as for-profit or nonprofit entities.
                    (c) The National Cybersecurity and Communications 
                Integration Center (NCCIC), established under section 
                226(b) of the Homeland Security Act of 2002 (the 
                ``Act''), shall engage in continuous, collaborative, 
                and inclusive coordination with ISAOs on the sharing of 
                information related to cybersecurity risks and 
                incidents, addressing such risks and incidents, and 
                strengthening information security systems consistent 
                with sections 212 and 226 of the Act.
                    (d) In promoting the formation of ISAOs, the 
                Secretary shall consult with other Federal entities 
                responsible for conducting cybersecurity activities,

[[Page 9350]]

                including Sector-Specific Agencies, independent 
                regulatory agencies at their discretion, and national 
                security and law enforcement agencies.

                Sec. 3. ISAO Standards Organization. (a) The Secretary, 
                in consultation with other Federal entities responsible 
                for conducting cybersecurity and related activities, 
                shall, through an open and competitive process, enter 
                into an agreement with a nongovernmental organization 
                to serve as the ISAO Standards Organization (SO), which 
                shall identify a common set of voluntary standards or 
                guidelines for the creation and functioning of ISAOs 
                under this order. The standards shall further the goal 
                of creating robust information sharing related to 
                cybersecurity risks and incidents with ISAOs and among 
                ISAOs to create deeper and broader networks of 
                information sharing nationally, and to foster the 
                development and adoption of automated mechanisms for 
                the sharing of information. The standards will address 
                the baseline capabilities that ISAOs under this order 
                should possess and be able to demonstrate. These 
                standards shall address, but not be limited to, 
                contractual agreements, business processes, operating 
                procedures, technical means, and privacy protections, 
                such as minimization, for ISAO operation and ISAO 
                member participation.

                    (b) To be selected, the SO must demonstrate the 
                ability to engage and work across the broad community 
                of organizations engaged in sharing information related 
                to cybersecurity risks and incidents, including ISAOs, 
                and associations and private companies engaged in 
                information sharing in support of their customers.
                    (c) The agreement referenced in section 3(a) shall 
                require that the SO engage in an open public review and 
                comment process for the development of the standards 
                referenced above, soliciting the viewpoints of existing 
                entities engaged in sharing information related to 
                cybersecurity risks and incidents, owners and operators 
                of critical infrastructure, relevant agencies, and 
                other public and private sector stakeholders.
                    (d) The Secretary shall support the development of 
                these standards and, in carrying out the requirements 
                set forth in this section, shall consult with the 
                Office of Management and Budget, the National Institute 
                of Standards and Technology in the Department of 
                Commerce, Department of Justice, the Information 
                Security Oversight Office in the National Archives and 
                Records Administration, the Office of the Director of 
                National Intelligence, Sector-Specific Agencies, and 
                other interested Federal entities. All standards shall 
                be consistent with voluntary international standards 
                when such international standards will advance the 
                objectives of this order, and shall meet the 
                requirements of the National Technology Transfer and 
                Advancement Act of 1995 (Public Law 104-113), and OMB 
                Circular A-119, as revised.

                Sec. 4. Critical Infrastructure Protection Program. (a) 
                Pursuant to sections 213 and 214(h) of the Critical 
                Infrastructure Information Act of 2002, I hereby 
                designate the NCCIC as a critical infrastructure 
                protection program and delegate to it authority to 
                enter into voluntary agreements with ISAOs in order to 
                promote critical infrastructure security with respect 
                to cybersecurity.

                    (b) Other Federal entities responsible for 
                conducting cybersecurity and related activities to 
                address threats to the public health and safety, 
                national security, and economic security, consistent 
                with the objectives of this order, may participate in 
                activities under these agreements.
                    (c) The Secretary will determine the eligibility of 
                ISAOs and their members for any necessary facility or 
                personnel security clearances associated with voluntary 
                agreements in accordance with Executive Order 13549 of 
                August 18, 2010 (Classified National Security 
                Information Programs for State, Local, Tribal, and 
                Private Sector Entities), and Executive Order 12829 of 
                January 6, 1993 (National Industrial Security Program), 
                as amended, including as amended by this order.

                Sec. 5. Privacy and Civil Liberties Protections. (a) 
                Agencies shall coordinate their activities under this 
                order with their senior agency officials for privacy 
                and civil liberties and ensure that appropriate 
                protections for privacy and

[[Page 9351]]

                civil liberties are incorporated into such activities. 
                Such protections shall be based upon the Fair 
                Information Practice Principles and other privacy and 
                civil liberties policies, principles, and frameworks as 
                they apply to each agency's activities.

                    (b) Senior privacy and civil liberties officials 
                for agencies engaged in activities under this order 
                shall conduct assessments of their agency's activities 
                and provide those assessments to the Department of 
                Homeland Security (DHS) Chief Privacy Officer and the 
                DHS Office for Civil Rights and Civil Liberties for 
                consideration and inclusion in the Privacy and Civil 
                Liberties Assessment report required under Executive 
                Order 13636.

                Sec. 6. National Industrial Security Program. Executive 
                Order 12829, as amended, is hereby further amended as 
                follows:

                    (a) the second paragraph is amended by inserting 
                ``the Intelligence Reform and Terrorism Prevention Act 
                of 2004,'' after ``the National Security Act of 1947, 
                as amended,'';
                    (b) Sec. 101(b) is amended to read as follows: 
                ``The National Industrial Security Program shall 
                provide for the protection of information classified 
                pursuant to Executive Order 13526 of December 29, 2009, 
                or any predecessor or successor order, and the Atomic 
                Energy Act of 1954, as amended (42 U.S.C. 2011 et 
                seq.).'';
                    (c) Sec. 102(b) is amended by replacing the first 
                paragraph with: ``In consultation with the National 
                Security Advisor, the Director of the Information 
                Security Oversight Office, in accordance with Executive 
                Order 13526 of December 29, 2009, shall be responsible 
                for implementing and monitoring the National Industrial 
                Security Program and shall:'';
                    (d) Sec. 102(c) is amended to read as follows: 
                ``Nothing in this order shall be construed to supersede 
                the authority of the Secretary of Energy or the Nuclear 
                Regulatory Commission under the Atomic Energy Act of 
                1954, as amended (42 U.S.C. 2011 et seq.), or the 
                authority of the Director of National Intelligence (or 
                any Intelligence Community element) under the 
                Intelligence Reform and Terrorism Prevention Act of 
                2004, the National Security Act of 1947, as amended, or 
                Executive Order 12333 of December 8, 1981, as amended, 
                or the authority of the Secretary of Homeland Security, 
                as the Executive Agent for the Classified National 
                Security Information Program established under 
                Executive Order 13549 of August 18, 2010 (Classified 
                National Security Information Program for State, Local, 
                Tribal, and Private Sector Entities).'';
                    (e) Sec. 201(a) is amended to read as follows: 
                ``The Secretary of Defense, in consultation with all 
                affected agencies and with the concurrence of the 
                Secretary of Energy, the Nuclear Regulatory Commission, 
                the Director of National Intelligence, and the 
                Secretary of Homeland Security, shall issue and 
                maintain a National Industrial Security Program 
                Operating Manual (Manual). The Secretary of Energy and 
                the Nuclear Regulatory Commission shall prescribe and 
                issue that portion of the Manual that pertains to 
                information classified under the Atomic Energy Act of 
                1954, as amended (42 U.S.C. 2011 et seq.). The Director 
                of National Intelligence shall prescribe and issue that 
                portion of the Manual that pertains to intelligence 
                sources and methods, including Sensitive Compartmented 
                Information. The Secretary of Homeland Security shall 
                prescribe and issue that portion of the Manual that 
                pertains to classified information shared under a 
                designated critical infrastructure protection 
                program.'';
                    (f) Sec. 201(f) is deleted in its entirety;
                    (g) Sec. 201(e) is redesignated Sec. 201(f) and 
                revised by substituting ``Executive Order 13526 of 
                December 29, 2009, or any successor order,'' for 
                ``Executive Order No. 12356 of April 2, 1982.'';
                    (h) Sec. 201(d) is redesignated Sec. 201(e) and 
                revised by substituting ``the Director of National 
                Intelligence, and the Secretary of Homeland Security'' 
                for ``and the Director of Central Intelligence.'';

[[Page 9352]]

                    (i) a new Sec. 201(d) is inserted after Sec. 201(c) 
                to read as follows: ``The Manual shall also prescribe 
                arrangements necessary to permit and enable secure 
                sharing of classified information under a designated 
                critical infrastructure protection program to such 
                authorized individuals and organizations as determined 
                by the Secretary of Homeland Security.'';
                    (j) Sec. 202(b) is amended to read as follows: 
                ``The Director of National Intelligence retains 
                authority over access to intelligence sources and 
                methods, including Sensitive Compartmented Information. 
                The Director of National Intelligence may inspect and 
                monitor contractor, licensee, and grantee programs and 
                facilities that involve access to such information or 
                may enter into written agreements with the Secretary of 
                Defense, as Executive Agent, or with the Director of 
                the Central Intelligence Agency to inspect and monitor 
                these programs or facilities, in whole or in part, on 
                the Director's behalf.'';
                    (k) Sec. 202(d) is redesignated as Sec. 202(e); and
                    (l) in Sec. 202 a new subsection (d) is inserted 
                after subsection (c) to read as follows: ``The 
                Secretary of Homeland Security may determine the 
                eligibility for access to Classified National Security 
                Information of contractors, licensees, and grantees and 
                their respective employees under a designated critical 
                infrastructure protection program, including parties to 
                agreements with such program; the Secretary of Homeland 
                Security may inspect and monitor contractor, licensee, 
                and grantee programs and facilities or may enter into 
                written agreements with the Secretary of Defense, as 
                Executive Agent, or with the Director of the Central 
                Intelligence Agency, to inspect and monitor these 
                programs or facilities in whole or in part, on behalf 
                of the Secretary of Homeland Security.''

                Sec. 7. Definitions. (a) ``Critical infrastructure 
                information'' has the meaning given the term in section 
                212(3) of the Critical Infrastructure Information Act 
                of 2002.

                    (b) ``Critical infrastructure protection program'' 
                has the meaning given the term in section 212(4) of the 
                Critical Infrastructure Information Act of 2002.
                    (c) ``Cybersecurity risk'' has the meaning given 
                the term in section 226(a)(1) of the Homeland Security 
                Act of 2002 (as amended by the National Cybersecurity 
                Protection Act of 2014).
                    (d) ``Fair Information Practice Principles'' means 
                the eight principles set forth in Appendix A of the 
                National Strategy for Trusted Identities in Cyberspace.
                    (e) ``Incident'' has the meaning given the term in 
                section 226(a)(2) of the Homeland Security Act of 2002 
                (as amended by the National Cybersecurity Protection 
                Act of 2014).
                    (f) ``Information Sharing and Analysis 
                Organization'' has the meaning given the term in 
                section 212(5) of the Critical Infrastrucure 
                Information Act of 2002.
                    (g) ``Sector-Specific Agency'' has the meaning 
                given the term in PPD-21, or any successor.

                Sec. 8. General Provisions. (a) Nothing in this order 
                shall be construed to impair or otherwise affect:

(i) the authority granted by law or Executive Order to an agency, or the 
head thereof; or

(ii) the functions of the Director of the Office of Management and Budget 
relating to budgetary, administrative, or legislative proposals.

                    (b) This order shall be implemented consistent with 
                applicable law and subject to the availability of 
                appropriations. Nothing in this order shall be 
                construed to alter or limit any authority or 
                responsibility of an agency under existing law 
                including those activities conducted with the private 
                sector relating to criminal and national security 
                threats. Nothing in this order shall be construed to 
                provide an agency with authority for regulating

[[Page 9353]]

                the security of critical infrastructure in addition to 
                or to a greater extent than the authority the agency 
                has under existing law.
                    (c) All actions taken pursuant to this order shall 
                be consistent with requirements and authorities to 
                protect intelligence and law enforcement sources and 
                methods.
                    (d) This order is not intended to, and does not, 
                create any right or benefit, substantive or procedural, 
                enforceable at law or in equity by any party against 
                the United States, its departments, agencies, or 
                entities, its officers, employees, or agents, or any 
                other person.
                
                
                    (Presidential Sig.)

                THE WHITE HOUSE,

                    February 13, 2015.

[FR Doc. 2015-03714
Filed 2-19-15; 2:00 pm]
Billing code 3295-F5
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.