index.html 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260
  1. <!DOCTYPE html>
  2. <html>
  3. <head>
  4. <meta name="google-site-verification" content="xXEGpPeG9CfACp-aeM0kS8pSS9Vk7Z8OS0QB_EehREs" />
  5. <meta http-equiv="X-UA-Compatible" content="IE=edge">
  6. <meta charset="utf-8">
  7. <meta content="width=device-width, initial-scale=1.0" name="viewport">
  8. <link rel="stylesheet" href="/assets/css/normalize.css">
  9. <link href="/assets/css/google-fonts.css" rel="stylesheet" type="text/css">
  10. <link rel="stylesheet" href="/assets/css/styles.css?201509271090037">
  11. <link rel="stylesheet" href="/assets/css/syntax.css">
  12. <script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js"></script>
  13. <script src="/assets/js/jquery.navgoco.min.js"></script>
  14. <!--[if lt IE 9]>
  15. <script src="/assets/js/html5.js"></script>
  16. <script src="/assets/js/respond.min.js"></script>
  17. <![endif]-->
  18. <link rel="shortcut icon" type="image/ico" href="/assets/favicon.ico" />
  19. <link rel="canonical" href="https://ombegov.github.io/a130//" />
  20. <title>OMB Circular A-130 Managing Information as a Strategic Resource</title>
  21. <meta property="og:title" content="OMB Circular A-130 Managing Information as a Strategic Resource" />
  22. <meta name="description" content=".">
  23. <meta property="og:description" content="." />
  24. </head>
  25. <body>
  26. <div class="container">
  27. <header role="banner">
  28. <h1>
  29. <a href="/">OMB Circular A-130</a>
  30. </h1>
  31. </header>
  32. <div class="wrap content">
  33. <aside>
  34. <a class="skip-link visuallyhidden focusable" href="#main">Skip to Main Content</a>
  35. <nav class="sidebar-nav" role="navigation">
  36. <ul>
  37. <li class="sidebar-nav-active">
  38. <a href="/">Home</a>
  39. </li>
  40. <li class="">
  41. <a href="/introduction/">Introduction</a>
  42. </li>
  43. <li class="">
  44. <a href="/purpose/">Purpose</a>
  45. </li>
  46. <li class="">
  47. <a href="/applicability/">Applicability</a>
  48. </li>
  49. <li class="">
  50. <a href="/basic_consideration/">Basic Considerations</a>
  51. </li>
  52. <li class="">
  53. <a href="/policy/">Policy</a>
  54. </li>
  55. <li class="">
  56. <a href="/gov-wide-responsbilities/">Government-Wide Responsbilities</a>
  57. </li>
  58. <li class="">
  59. <a href="/effectiveness/">Effectiveness</a>
  60. </li>
  61. <li class="">
  62. <a href="/oversight/">Oversight</a>
  63. </li>
  64. <li class="">
  65. <a href="/autorities/">Authorities</a>
  66. </li>
  67. <li class="">
  68. <a href="/definitions/">Definitions</a>
  69. </li>
  70. <li class="">
  71. <a href="/inquiries/">Inquiries</a>
  72. </li>
  73. <li class="">
  74. <a href="/appendix1/">Appendix I</a>
  75. </li>
  76. <li class="">
  77. <a href="/appendix2/">Appendix II</a>
  78. </li>
  79. <li class="">
  80. <a href="/appendix3/">Appendix III</a>
  81. </li>
  82. </ul>
  83. </nav>
  84. <p>
  85. <a href="https://github.com/OMBEGOV/a130/edit/gh-pages/pages/index.md">Edit this page</a>
  86. </p>
  87. </aside>
  88. <article id="main" class="main-content" role="main">
  89. <h1>OMB Circular A-130 Managing Information as a Strategic Resource</h1>
  90. <p>The Office of Management and Budget (OMB) is proposing to revise Circular No. A-130, <em>Managing Information as a Strategic Resource</em>, (hereinafter, Circular A-130, or the Circular) to incorporate new statutory requirements and enhanced technological capabilities, as well as address current and evolving technical and personnel security threats.</p>
  91. <p>Historically, it has been the policy of the United States Government to support the development and use of efficient and effective information technology and information policy approaches that, when adopted by Federal agencies, can address important administrative, regulatory, procurement, and policy objectives. Today, more than ever, individuals, groups, and organizations rely on information technology to carry out a wide range of missions and business functions. This reliance on information technology means that information systems developed and deployed to support Federal applications and operations must be dependable despite a growing number of threats including cybersecurity attacks, natural disasters, structural failures, and errors of omission and commission. To ensure that Federal agencies can successfully carry out their assigned missions and business operations in an environment of sophisticated and complex threats (including advanced persistent threats), they must deploy systems that are both trustworthy and resilient.</p>
  92. <p>Trustworthy and resilient systems can help significantly reduce the susceptibility to threats and ensure mission/business continuity and survivability. While it is impossible to know all potential threats and to stop all anticipated threats, the architecture and design of information systems and use of commercial technologies can significantly increase the &ldquo;built-in&rdquo; protection capability of those systems and make them inherently less vulnerable. Moreover, the effects of many system attacks can be reduced by the application of the principles, concepts, and best practices that are proposed in this revised policy.</p>
  93. <p>OMB is revising Circular A-130 to provide guidance to support agency missions and operations in a dynamic and increasingly interconnected, information-resources environment that must increasingly contend with IT vulnerabilities and information security and other threats that could put the confidentiality, integrity and availability of Federal information systems at risk. Agencies shall incorporate this guidance into their policies, understanding that the subject nature of this document will demand agencies continually reassess, reexamine, and reevaluate their information resources management policies and strategies.</p>
  94. <p>This Circular establishes general policy for the acquisition and management of information technology equipment, funds, personnel, and other resources. In the appendices to the document, it also includes a discussion of agency responsibilities for managing personally identifiable information, provides guidance on the use of electronic transactions and related electronic documentation statutes, and provides guidance on the protection of Federal information resources. Although this Circular touches on many specific issues such as privacy, confidentiality, information quality, dissemination, and statistical policy, those topics are covered more fully in other OMB policies, which are available on the OMB website at <a href="https://www.whitehouse.gov/omb/">https://www.whitehouse.gov/omb</a>.</p>
  95. <p>In this notice, OMB is seeking comment on proposed revisions to Circular A-130. These revisions reflect the experience gained by OMB and agencies in implementing the Circular since 2000. The revisions were undertaken by examining the Circular in its current form, and attempting to highlight any areas where guidance was no longer needed due to changing requirements, or the guidance failed to adequately address a specific issue that had developed since its previous publication. The Circular was examined concurrently with its appendices to ensure the broader direction of the Circular was complemented by the specificity of the appendices. The proposed revision is designed to maintain an enduring characteristic, and avoid immediately becoming outdated.</p>
  96. <p>In the main body of the Circular, OMB has replaced the Background section of the main body with an Introduction section (Section 1) that discusses the importance of ensuring trustworthiness and resilience of information systems. OMB also proposes additional language on the purpose of the Circular (Section 2) and amends the Authorities section (now Section 9) to more fully cover existing statutes and Executive Orders.</p>
  97. <p>In the Applicability section (Section 3) of the main body, OMB has simplified the reference to national security systems by removing &ldquo;Information classified for national security purposes should also be handled in accordance with the appropriate national security directives. National security emergency preparedness activities should be conducted in accordance with Executive Order No. 12472&rdquo; and replacing it with &ldquo;For national security systems, agencies should follow applicable laws, Executive Orders, and directives.&rdquo;</p>
  98. <p>Section 4, Basic Considerations and Section 5, Policy have been revised to incorporate both policy and statute changes since the Circular was last revised.</p>
  99. <p>Specific changes to the Policy section (Section 5) include the replacement of outdated requirements with new requirements covering planning and budgeting, governance, leadership and workforce, IT investment management, privacy and information security, next generation Internet, records management, and information management and access.</p>
  100. <p>Section 6 of the Circular designates government-wide responsibilities for specific agencies. The section incorporates additional statutory requirements enacted since the last revision of the Circular in 2000.</p>
  101. <p>Appendix I, previously titled <em>Federal Agency Responsibilities for Maintaining Records About Individuals</em>, is being revised to provide guidance to Federal agencies on their responsibilities for managing information resources that involve personally identifiable information (PII). The previous version of Appendix I described agency responsibilities for implementing the reporting and publication requirements of the Privacy Act of 1974, as amended (5 U.S.C. § 552a). This information is being revised and reconstituted as OMB Circular No. A-108, Federal Agency Responsibilities for Review, Reporting, and Publication under the Privacy Act. The revised Appendix I, titled Responsibilities for Management of Personally Identifiable Information, provides guidance on Federal agencies&#39; responsibilities for protecting personally identifiable information (PII) – including PII collected for statistical purposes under a pledge of confidentiality – and describes a set of fair information practice principles (FIPPs) that Federal agencies should incorporate when managing information resources that involve PII. It also discusses requirements for designating a Senior Agency Official for Privacy,(SAOP) and conducting Privacy Impact Assessments. Finally, Appendix I requires Federal agencies to implement the privacy controls in National Institute of Standards and Technology (NIST) Special Publication 800-53, Security and Privacy Controls for Federal Information Systems and Organizations. Additional guidance on implementing the NIST SP 800-53 privacy controls is provided in Appendix III, Responsibilities for Protecting Federal Information Resources.</p>
  102. <p>Appendix II, previously titled <em>Implementation of the Government Paperwork Elimination Act</em>, is being revised to reference requirements of the Electronic Signatures in Global and National Commerce Act (E-Sign Act). The Government Paperwork Elimination Act (GPEA) and E-Sign Act are both important tools to improve customer service and governmental efficiency through the use of information technology. In addition to highlighting the E-Sign Act and more recent guidance, such as the &ldquo;Federal Chief Information Officers&#39; Council <em>Use of Electronic Signatures in Federal Organization Transactions</em>&rdquo; (dated January 2013), this appendix has been significantly pared down. For example, the OMB M-00-10 attachment entitled &ldquo;<em>OMB Procedures and Guidance on Implementing the Government Paperwork Elimination Act</em>&rdquo; has been removed and included as a reference. The Background section has been revised to make the information more current and remove historical information not relevant to the current update. For example, summaries of public comments received on OMB&rsquo;s draft GPEA guidance of 2000 have been removed, as well as outdated references to GAO and NIST publications.</p>
  103. <p>Appendix III, previously titled <em>Security of Federal Automated Information Resources</em>, is being revised to establish new requirements for information security and privacy management, to incorporate new mandates in the Federal Information Security Modernization Act of 2014, and to ensure consistency with OMB policies and NIST Federal Information Processing Standards and 800-series publications. In short, the revised Appendix III provides guidance on how agencies should take a coordinated approach to information security and privacy when protecting Federal information resources. As a result, the title of the Appendix has been changed to <em>Responsibilities for Protecting Federal Information Resources</em>. The proposed revisions provide guidance on agency information security and privacy management, including the transition from the current periodic point-in-time authorization process to a more dynamic continuous monitoring and ongoing authorization process for information systems and common controls. Examples of additional requirements included in the revised Appendix III focus on incident response, encryption, inclusion of security requirements in contracts, oversight of contractors, protecting against insider threats, protecting against supply chain risks, prohibiting unsupported software and system components, and holding personnel accountable. A number of new definitions, consistent with definitions in NIST standards and guidelines, have also been included.</p>
  104. <p>In addition, the revised Appendix III clarifies the role of the SAOP in the NIST Risk Management Framework. In accordance with existing OMB policies, the Appendix explains that the SAOP has overall responsibility and accountability for implementing privacy protections and ensuring that all privacy requirements are met. Accordingly, the SAOP is responsible for developing and implementing a privacy continuous monitoring strategy, reviewing and approving the categorization of information systems, designating privacy controls, reviewing and approving the privacy plan, conducting privacy control assessments, and reviewing authorization packages for information systems.</p>
  105. <p>In the Definitions Section, OMB has proposed several changes.</p>
  106. <p>OMB is proposing to delete the following definitions – &ldquo;audiovisual production,&rdquo; &ldquo;full costs,&rdquo; &ldquo;Information Technology Resources Board,&rdquo; &ldquo;information processing services organization,&rdquo; and &ldquo;service recipient,&rdquo; as they are no longer needed for the purposes of this Circular.</p>
  107. <p>The term &ldquo;government information&rdquo; has been removed because it is not used in this Circular. The term &ldquo;Federal information&rdquo; has been added to the Definitions section because it is a commonly used term in statute and is used throughout this Circular.</p>
  108. <p>Several new definitions are proposed for inclusion in the main body of the Circular including – &ldquo;digital services,&rdquo; &ldquo;enterprise architecture,&rdquo; &ldquo;Federal information system,&rdquo; &ldquo;information security,&rdquo; &ldquo;information technology resources,&rdquo; &ldquo;interagency agreement,&rdquo; &ldquo;major information technology investment,&rdquo; &ldquo;open data,&rdquo; &ldquo;personally identifiable information,&rdquo; &ldquo;senior agency official for privacy,&rdquo; and &ldquo;senior agency official for records.&rdquo;</p>
  109. <p>The Circular also proposes to modify the definitions for &ldquo;agency,&rdquo; &ldquo;capital planning and investment control process,&rdquo; &ldquo;information resources,&rdquo; &ldquo;information resources management,&rdquo; &ldquo;information system,&rdquo; &ldquo;information system life cycle,&rdquo; &ldquo;information technology,&rdquo; &ldquo;the CIO Council,&rdquo; &ldquo;dissemination,&rdquo; and &ldquo;major information system&rdquo; to be consistent with current guidance and statute.</p>
  110. <h1 id="circular-no.-a-130"><strong>CIRCULAR NO. A-130</strong></h1>
  111. <p><strong>Proposed</strong></p>
  112. <p><strong>TO THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES</strong></p>
  113. <p><strong>SUBJECT:</strong> Managing Information as a Strategic Resource</p>
  114. <ol>
  115. <li>Introduction</li>
  116. <li>Purpose</li>
  117. <li>Applicability</li>
  118. <li>Basic Considerations</li>
  119. <li>Policy
  120. a. Planning and Budgeting
  121. b. Governance
  122. c. Leadership and Workforce
  123. d. IT Investment Management
  124. e. Privacy and Information Security
  125. f. Next Generation Internet
  126. g. Records Management
  127. h. Information Management and Access</li>
  128. <li>Government-wide Responsibilities</li>
  129. <li>Effectiveness</li>
  130. <li>Oversight</li>
  131. <li>Authorities</li>
  132. <li>Definitions</li>
  133. <li>Inquiries</li>
  134. </ol>
  135. <ul>
  136. <li>Appendix I: Responsibilities for Management of Personally Identifiable Information</li>
  137. <li>Appendix II: Guidance on Electronic Transactions</li>
  138. <li>Appendix III: Responsibilities for Protecting Federal Information Resources</li>
  139. </ul>
  140. </article>
  141. </div>
  142. </div>
  143. <!-- <script>
  144. (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
  145. (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
  146. m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
  147. })(window,document,'script','https://www.google-analytics.com/analytics.js','ga');
  148. ga('create', 'UA-48605964-20', 'auto');
  149. // anonymize user IPs (chops off the last IP triplet)
  150. ga('set', 'anonymizeIp', true);
  151. // forces SSL even if the page were somehow loaded over http://
  152. ga('set', 'forceSSL', true);
  153. ga('send', 'pageview');
  154. </script>
  155. <!-- Digital Analytics Program roll-up, see https://analytics.usa.gov for data
  156. <script async id="_fed_an_ua_tag" src="/assets/js/Universal-Federated-Analytics-Min.js?agency=GSA"></script> --> -->
  157. </body>
  158. </html>