Page:Executive Order 14144.pdf/15
|
(b) The term ‘‘artifact’’ means a record or data that is generated manually or by automated means and may be used to demonstrate compliance with defined practices, including for secure software development. (c) The term ‘‘artificial intelligence’’ or ‘‘AI’’ has the meaning set forth in 15 U.S.C. 9401(3). (d) The term ‘‘AI system’’ means any data system, software, hardware, application, tool, or utility that operates in whole or in part using AI. (e) The term ‘‘authentication’’ means the process of determining the validity of one or more authenticators, such as a password, used to claim a digital identity. (f) The term ‘‘Border Gateway Protocol’’ or ‘‘BGP’’ means the control protocol used to distribute and compute paths between the tens of thousands of autonomous networks that constitute the internet. (g) The term ‘‘consumer internet-of-Things products’’ means internet-of-Things products intended primarily for consumer use, rather than enterprise or industrial use. Consumer internet-of-Things products do not include medical devices regulated by the United States Food and Drug Administration or motor vehicles and motor vehicle equipment regulated by the National Highway Traffic Safety Administration. (h) The term ‘‘cyber incident’’ has the meaning given to the term ‘‘incident’’ under 44 U.S.C. 3552(b)(2). (i) The term ‘‘debilitating impact systems’’ means systems as described by 44 U.S.C. 3553(e)(2) and 3553(e)(3) for Department of Defense and Intelligence Community purposes, respectively. (j) The term ‘‘digital identity document’’ means an electronic, reusable, cryptographically verifiable identity credential issued by a Government source, such as a State-issued mobile driver’s license or an electronic passport. (k) The term ‘‘digital identity verification’’ means identity verification that a user performs online. (l) The term ‘‘endpoint’’ means any device that can be connected to a computer network creating an entry or exit point for data communications. Examples of endpoints include desktop and laptop computers, smartphones, tablets, servers, workstations, virtual machines, and consumer internet-of-Things products. (m) The term ‘‘endpoint detection and response’’ means cybersecurity tools and capabilities that combine real-time continuous monitoring and collection of endpoint data (for example, networked computing device such as workstations, mobile phones, servers) with rules-based automated response and analysis capabilities. (n) The term ‘‘Federal Civilian Executive Branch agencies’’ or ‘‘FCEB agencies’’ includes all agencies except for the agencies and other components in the Department of Defense and agencies in the Intelligence Community. (o) The term ‘‘Federal information system’’ means an information system used or operated by an agency, a contractor of an agency, or another organization on behalf of an agency. (p) The term ‘‘Government-operated identity verification system’’ means a system owned and operated by a Federal, State, local, Tribal, or territorial Government entity that performs identity verification, including single-agency systems and shared services that provide service to multiple agencies. (q) The term ‘‘hardware root of trust’’ means an inherently trusted combination of hardware and firmware that helps to maintain the integrity of information. |