Laserfiche WebLink
4. Technology Requirements. <br />4.1 - National Information Exchange Model (NIEM). FEMA requires all <br />grantees to use the latest NIEM specifications and guidelines regarding the use <br />of Extensible Markup Language (XML) for all grant awards. Further information <br />about the required use of NIEM specifications and guidelines is available at <br />http://www. niem. gov. <br />4.2 - Geospatial Guidance. Geospatial technologies capture, store, analyze, <br />transmit, and/or display location-based information (i.e., information that can be <br />linked to a latitude and longitude). FEMA encourages grantees to align any <br />geospatial activities with the guidance available on the FEMA website at <br />http://www. fema. gov/grants. <br />4.3 - 28 CFR Part 23 Guidance. FEMA requires that any information <br />technology system funded or supported by these funds comply with 28 CFR Part <br />23, Criminal Intelligence Systems Operating Policies, if this regulation is <br />determined to be applicable. <br />5. Administrative Requirements. <br />5.1 - Freedom of Information Act (FOIA). FEMA recognizes that much of the <br />information submitted in the course of applying for funding under this program or <br />provided in the course of its grant management activities may be considered law <br />enforcement sensitive or otherwise important to national security interests. While <br />this information under Federal control is subject to requests made pursuant to the <br />Freedom of Information Act (FOIA), 5 U.S.C. §552, all determinations concerning <br />the release of information of this nature are made on a case-by-case basis by the <br />FEMA FOIA Office, and may likely fall within one or more of the available <br />exemptions under the Act. The applicant is encouraged to consult its own State <br />and local laws and regulations regarding the release of information, which should <br />be considered when reporting sensitive matters in the grant application, needs <br />assessment, and strategic planning process. The grantee should be familiar with <br />the regulations governing Sensitive Security Information (49 CFR Part 1520), as <br />it may provide additional protection to certain classes of homeland security <br />information. <br />5.2 - Protected Critical Infrastructure Information (PCII). The PCII Program, <br />established pursuant to the Critical Infrastructure Act of 2002 (Public Law 107- <br />296) (CII Act), created a framework which enables members of the private <br />sector, States, local jurisdictions, and tribal nations to voluntarily submit sensitive <br />information regarding critical infrastructure to DHS. The Act provides statutory <br />protection from public disclosure and civil litigation for CII that is validated as <br />PCII. When validated as PCII, the information can only be shared with <br />28 <br />55A-34