Cover Image

Not for Sale



View/Hide Left Panel
Click for next page ( 3


The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement



Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole.
Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.

OCR for page 2
CONTENTS (cont'd) CONTENTS List of Acronyms, 3 Likely Questions Concerning Management of Security Information, 4 I. Introduction, 5 A. Statement of the Problem, 5 B. Background of Threats to Public Transit Systems, 6 C. Background of Public Records Requirements, 7 II. Federal Legal Issues, 12 A. FOIA, 12 B. Critical Infrastructure Information/Sensitive Security Information, 18 C. Procurement and Contract Management Issues, 31 III. State Law Summary, 31 A. Public Records Laws--Disclosure Requirements, 32 B. Public Records Laws--Security Exemptions, 38 C. Public Records Laws--Other Exemptions That May Protect SSI and Other Security Information, 40 D. Records Management Laws, 43 IV. Transit Agency Practices, 44 A. Transit Agency A, 44 B. Los Angeles County Metropolitan Transportation Authority, 45 C. Agency C, 45 D. Transit Agency D, 47 E. Agency E, 47 F. Virginia Department of Transportation, 47 V. Applying Security and Contract Management Requirements to the Competitive Procurement Process, 48 A. Minimizing Need to Balance Security and Transparency, 48 B. Deciding Whether Information Should Be Disclosed, 49 C. Procedures for Maintaining Contract Records Containing CII/SSI/Restricted Security Information, 50 D. Issues to Consider in Establishing/ Reviewing Security Protocol for Procurement Process, 53 VI. Conclusions, 54 Appendix A: Federal Statutory and Regulatory Provisions, 57 Appendix B: State Public Records/Freedom of Information Laws, 60 Appendix C: Security Exemptions to State Public Records/Freedom of Information Laws, 64 Appendix D: State Records Management Laws, 70 Appendix E: Sample Nondisclosure Agreements, 74 Appendix F: Examples of SSI and Non-SSI, 75 Appendix G: Checklist for Assessing Adequacy of Management of Security Information, 76