Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.
ConTenTs (contâd) CONTENTS List of Acronyms, 3 Likely Questions Concerning Management of Security Information, 4 I. Introduction, 5 A. Statement of the Problem, 5 B. Background of Threats to Public Transit Systems, 6 C. Background of Public Records Requirements, 7 II. Federal Legal Issues, 12 A. FOIA, 12 B. Critical Infrastructure Information / Sensitive Security Information, 18 C. Procurement and Contract Management Issues, 31 III. State Law Summary, 31 A. Public Records LawsâDisclosure Requirements, 32 B. Public Records LawsâSecurity Exemptions, 38 C. Public Records LawsâOther Exemptions That May Protect SSI and Other Security Information, 40 D. Records Management Laws, 43 IV. Transit Agency Practices, 44 A. Transit Agency A, 44 B. Los Angeles County Metropolitan Transportation Authority, 45 C. Agency C, 45 D. Transit Agency D, 47 E. Agency E, 47 F. Virginia Department of Transportation, 47 V. Applying Security and Contract Management Requirements to the Competitive Procurement Process, 48 A. Minimizing Need to Balance Security and Transparency, 48 B. Deciding Whether Information Should Be Disclosed, 49 C. Procedures for Maintaining Contract Records Containing CII/SSI/Restricted Security Information, 50 D. Issues to Consider in Establishing/ Reviewing Security Protocol for Procurement Process, 53 VI. Conclusions, 54 Appendix A: Federal Statutory and Regulatory Provisions, 57 Appendix B: State Public Records/Freedom of Information Laws, 60 Appendix C: Security Exemptions to State Public Records/Freedom of Information Laws, 64 Appendix D: State Records Management Laws, 70 Appendix E: Sample Nondisclosure Agreements, 74 Appendix F: Examples of SSI and Non-SSI, 75 Appendix G: Checklist for Assessing Adequacy of Management of Security Information, 76