(2)
Attributes
The President shall, through the structures described in subparagraphs (B) and (C) of paragraph (1), ensure that the ISE provides and facilitates the means for sharing terrorism information among all appropriate Federal, State, local, and tribal entities, and the private sector through the use of policy guidelines and technologies. The President shall, to the greatest extent practicable, ensure that the ISE provides the functional equivalent of, or otherwise supports, a decentralized, distributed, and coordinated environment that—
(A)
connects existing systems, where appropriate, provides no single points of failure, and allows users to share information among agencies, between levels of government, and, as appropriate, with the private sector;
(B)
ensures direct and continuous online electronic access to information;
(C)
facilitates the availability of information in a form and manner that facilitates its use in analysis, investigations and operations;
(D)
builds upon existing systems capabilities currently in use across the Government;
(E)
employs an information access management approach that controls access to data rather than just systems and networks, without sacrificing security;
(F)
facilitates the sharing of information at and across all levels of security;
(G)
provides directory services, or the functional equivalent, for locating people and information;
(H)
incorporates protections for individuals’ privacy and civil liberties;
(I)
incorporates strong mechanisms to enhance accountability and facilitate oversight, including audits, authentication, and access controls;
(J)
integrates the information within the scope of the information sharing environment, including any such information in legacy technologies;
(K)
integrates technologies, including all legacy technologies, through Internet-based services, consistent with appropriate security protocols and safeguards, to enable connectivity among required users at the Federal, State, and local levels;
(L)
allows the full range of analytic and operational activities without the need to centralize information within the scope of the information sharing environment;
(M)
permits analysts to collaborate both independently and in a group (commonly known as “collective and noncollective collaboration”), and across multiple levels of national security information and controlled unclassified information;
(N)
provides a resolution process that enables changes by authorized officials regarding rules and policies for the access, use, and retention of information within the scope of the information sharing environment; and
(O)
incorporates continuous, real-time, and immutable audit capabilities, to the maximum extent practicable.