BILLS-107hr3844ih.pdf
House Resolutions
0 pages
Page
of 0
Loading OCR text...
No OCR text available for this page.
Failed to load OCR text.
DATE (32)
1996
title 44
annually
annual
1987
40 U.S.C. 1401
2007
2006
1990
no later than 12 months
15 U.S.C. 278g–3(a
5
years 2003, 2004, 2005
each of fiscal years
March 1
MARCH 5, 2002
each of fiscal years 2003 through 2007
10
5131
FISCAL YEAR
no later than 36 months
no later than 18 months
23
Year 2001
23
1996
1978
30 days
2002
42 U.S.C. 2011
March 1, 2003
no later than 6 months
2011
10
2003, 2004, 2005
1954
EVENT (2)
the ‘‘Federal Information Security
SESSION
H. R. 3844
GPE (3)
United States
the United States of America
Virginia
LOC (1)
appro-
20
ORG (50)
the National Institute of Standards
SEC
U.S.C.
Congress
Management and Budget
the Office of Management and Budget
the National Security Agency
Institute
Commerce
United
Defense
Office
the Federal Financial Management Improve-
the Institute of responsibility
INFORMATION SECURITY ADVISORY BOARD
THE HOUSE OF REPRESENTATIVES
D. Spence National Defense Authorization Act
Federal Government
Federal
Central Intelligence
the Office of
8
Management and Budget
National Foreign
Board
Clinger-
Standards and Technology Act
the Federal Financial
Budget
National Institute of Standards and Technology
the Institute an Office
NATIONAL INSTITUTE OF STANDARDS AND TECH-
tion Security Advisory Board
House of Representa-
tem
the General Accounting Office
Executive
the Committee on Science
the National Institute of Standards and Technology
the Information Security Advisory Board
the Office of Man-
the Committee on Government Reform
Information Security Programs
Restricted Data
The Office for Information Security Programs
the Office of Information Security
Privacy Advisory Board
the Inspector General
the National Institute of Standards and Technology Act
Defense and Energy
Offices of Inspector General
PERSON (6)
Clinger-Cohen Act
FLOYD
Floyd
22
Cohen Act
TOM DAVIS
HORN
Topic Classifications
congressional legislation
98.5%
government oversight
87.9%
national security
72.8%
Extracted Keywords
information security
involves
information systems
information
security
disruption
unauthorized
guidelines
agency
national security
behalf
contractor
destruction
standards
intelligence
Forensic Analysis
PDF Metadata
- ModDate
- D:20230115145523Z
- Producer
- Acrobat Distiller 4.0 for Windows; modified using iText® Core 7.2.3 (production version) ©2000-2022 iText Group NV, Government Publishing Office
- CreationDate
- D:20020312010150Z
Sentiment
Polarity
Neutral
0.074
Subjectivity
46%
Objective