Sample records for information security programs

  1. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the Security...

  2. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National... Information Security Oversight Office no later than Friday, March 16, 2012. The Information Security Oversight... FURTHER INFORMATION CONTACT: David O. Best, Senior Program Analyst, The Information Security Oversight...

  3. 14 CFR 1203.201 - Information security objectives.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...

  4. 14 CFR 1203.201 - Information security objectives.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...

  5. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    ERIC Educational Resources Information Center

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  6. 12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Establishing Information Security Standards Table of Contents I. Introduction A. Scope B. Preservation of... Security Program B. Objectives III. Development and Implementation of Customer Information Security Program.... Introduction The Interagency Guidelines Establishing Information Security Standards (Guidelines) set forth...

  7. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...

  8. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...

  9. 14 CFR 1203.202 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.202 Responsibilities. (a) The Chairperson, NASA Information Security...) Ensuring effective compliance with and implementation of “the Order” and the Information Security Oversight...

  10. 14 CFR 1203.202 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.202 Responsibilities. (a) The Chairperson, NASA Information Security...) Ensuring effective compliance with and implementation of “the Order” and the Information Security Oversight...

  11. 5 CFR 1312.12 - Security Program Review Committee.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Security Program Review Committee. 1312...

  12. 5 CFR 1312.12 - Security Program Review Committee.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security Program Review Committee. 1312...

  13. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...

  14. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...

  15. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... must be submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 11...

  16. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...

  17. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-09

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...

  18. 14 CFR 1203.409 - Exceptional cases.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....409 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM... Information Security Program Committee, Security Division, Washington, DC 20546 for a classification..., to the Director, Information Security Oversight Office, GSA, for a determination. ...

  19. 12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Part 364—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...

  20. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  1. 32 CFR Appendix A to Part 806 - References

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...

  2. 32 CFR Appendix A to Part 806 - References

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...

  3. 32 CFR Appendix A to Part 806 - References

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...

  4. 14 CFR 1203.901 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.901 Responsibilities. (a) The Chairperson reports to the Administrator concerning the management and direction of the NASA Information Security Program as provided for...

  5. 14 CFR 1203.603 - Systematic review for declassification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION SECURITY PROGRAM Declassification and Downgrading § 1203.603 Systematic review for... review guidelines. The Chairperson, NASA Information Security Program Committee, shall develop, in... custodian and referred to the Chairperson, NASA Information Security Program Committee. This listing shall...

  6. 14 CFR 1203.901 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.901 Responsibilities. (a) The Chairperson reports to the Administrator concerning the management and direction of the NASA Information Security Program as provided for...

  7. 76 FR 9041 - Intent To Request Approval From OMB of One New Public Collection of Information: Security Program...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-16

    ... measure their effectiveness. Through its voluntary Corporate Security Review (CSR) Program, TSA's Highway... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request Approval From OMB of One New Public Collection of Information: Security Program for Hazardous Materials Motor...

  8. 14 CFR 1203.604 - Mandatory review for declassification.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... requestor may submit the request to: (i) The Chairperson, NASA Information Security Program Committee; or... determination to the Chairperson, NASA Information Security Program Committee, National Aeronautics and Space... Chairperson, NASA Information Security Program Committee, for final resolution and appropriate response. (f...

  9. 14 CFR 1203.604 - Mandatory review for declassification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... requestor may submit the request to: (i) The Chairperson, NASA Information Security Program Committee; or... determination to the Chairperson, NASA Information Security Program Committee, National Aeronautics and Space... Chairperson, NASA Information Security Program Committee, for final resolution and appropriate response. (f...

  10. 78 FR 43230 - Agency Information Collection Activities: Submission to OMB for Reinstatement, Without Change, of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-19

    ... Insured Credit Unions to maintain an information security program and an incident response plan that... Federally Insured Credit Unions to maintain an information security program and an incident response plan... credit unions to develop a written security program to safeguard sensitive member information. This...

  11. 46 CFR 503.53 - Oversight Committee.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security... provisions of Executive Order 13526 and directives of the Information Security Oversight Office. The program... and complaints concerning the Commission's information security program; (d) Recommend appropriate...

  12. 46 CFR 503.53 - Oversight Committee.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security... provisions of Executive Order 12958 and directives of the Information Security Oversight Office. The program... and complaints concerning the Commission's information security program; (d) Recommend appropriate...

  13. Report: EPA’s Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes

    EPA Pesticide Factsheets

    Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.

  14. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  15. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  16. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  17. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  18. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  19. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  20. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  1. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  2. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  3. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  4. Department of Veterans Affairs' Implementation of Information Security Education Assistance Program. GAO-10-170R

    ERIC Educational Resources Information Center

    Wilshusen, Gregory C.; Melvin, Valerie C.

    2009-01-01

    The Veterans Benefits, Health Care, and Information Technology Act of 2006 authorizes the Secretary of Veterans Affairs to establish an educational assistance program for information security. The Information Security Education Assistance Program is envisioned as a means for the Department of Veterans Affairs (VA) to attract and retain individuals…

  5. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official... Senior FEMA official responsible for the information security program. The Director of the Security Division, has been designated as the senior official to direct and administer the FEMA information security...

  6. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  7. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  8. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  9. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  10. 19 CFR 201.43 - Program.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... who is responsible for implementation and oversight of information security programs and procedures... complaints regarding all elements of the information security program shall be directed to the Director of... UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION National Security...

  11. Implementing an Information Security Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to covermore » information security best practices, planning for an information security management system, and implementing security controls for information security.« less

  12. 14 CFR 1203.603 - Systematic review for declassification.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... National Security Agency. (3) Systematic review for declassification of classified information pertaining... coordinated through the Central Intelligence Agency. (4) The Chairperson, NASA Information Security Program... guidelines. The Chairperson, NASA Information Security Program Committee, shall develop, in coordination with...

  13. 75 FR 18872 - Ginnie Mae Multiclass Securities Program Documents

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... Securities Program Documents AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice. SUMMARY... with the Multiclass Securities Program. The intent of the Multiclass Securities program is to increase... Securities Program Documents. OMB Approval Number: 2503-0030. Form Numbers: None. Description of the Need for...

  14. 14 CFR 1203.200 - Background and discussion.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 1203.200 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.200 Background and discussion. (a) In establishing a... public inspection of that information that is classified to protect the national security. (b) In...

  15. 14 CFR 1203.900 - Establishment.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.900 Establishment. Pursuant to Executive Order 12958, “National Security Information,” and the National Aeronautics and Space Act of 1958, as amended, there is established...

  16. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    EPA Pesticide Factsheets

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  17. 14 CFR 1203.200 - Background and discussion.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 1203.200 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.200 Background and discussion. (a) In establishing a... public inspection of that information that is classified to protect the national security. (b) In...

  18. 14 CFR 1203.900 - Establishment.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.900 Establishment. Pursuant to Executive Order 12958, “National Security Information,” and the National Aeronautics and Space Act of 1958, as amended, there is established...

  19. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  20. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  1. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  2. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  3. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  4. 75 FR 52768 - National Protection and Programs Directorate; Agency Information Collection Activities: Office of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0071] National Protection and Programs Directorate; Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security.... SUMMARY: The Department of Homeland Security, National Protection and Programs Directorate, Office of...

  5. 12 CFR Appendix D-2 to Part 208 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Relationships Risk Management Principles,” Nov. 1, 2001; FDIC FIL 68-99, Risk Assessment Tools and Practices for.... Definitions II. Standards for Safeguarding Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of...

  6. 12 CFR Appendix F to Part 225 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Relationships Risk Management Principles,” Nov. 1, 2001; FDIC FIL 68-99, Risk Assessment Tools and Practices for.... Standards for Safeguarding Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B...

  7. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 8, 2013. ISOO...

  8. 75 FR 68370 - Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-05

    ... DEPARTMENT OF HOMELAND SECURITY National Protection and Programs Directorate [Docket No. DHS-2010-0071] Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office...

  9. 22 CFR 9.3 - Senior agency official.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.3 Senior agency official. The... senior agency official to direct and administer its information security program. The Department's senior... carrying out the provisions of the Executive Order and the Department's information security program by the...

  10. 78 FR 48697 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-09

    ... INFORMATION: FEMA's Homeland Security Grant Program (HSGP) is an important part of the Administration's larger... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0034... concerning the collection of information to administer the Homeland Security Grant Program (HSGP). DATES...

  11. 45 CFR 303.30 - Securing medical support information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 2 2013-10-01 2012-10-01 true Securing medical support information. 303.30... (CHILD SUPPORT ENFORCEMENT PROGRAM), ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES STANDARDS FOR PROGRAM OPERATIONS § 303.30 Securing medical support information. (a) If...

  12. 45 CFR 303.30 - Securing medical support information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 2 2011-10-01 2011-10-01 false Securing medical support information. 303.30... (CHILD SUPPORT ENFORCEMENT PROGRAM), ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES STANDARDS FOR PROGRAM OPERATIONS § 303.30 Securing medical support information. (a) If...

  13. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, July 12, 2013. ISOO will...

  14. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  15. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  16. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  17. 12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Relationships Risk Management Principles,” Nov. 1, 2001; FDIC FIL 68-99, Risk Assessment Tools and Practices for... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...

  18. An Innovative Community College Program and Partnership in Information Security.

    ERIC Educational Resources Information Center

    Howard, Barbara C; Morneau, Keith A.

    This report describes an innovative network security program initiated by Northern Virginia Community College and funded with a grant from the Northern Virginia Regional Partnership. The program educates and trains students in the instillation, configuration, and troubleshooting of the hardware and software infrastructure of information security.…

  19. 12 CFR 605.501 - Information Security Officer.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by the...

  20. 12 CFR 605.501 - Information Security Officer.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by the...

  1. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...

  2. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...

  3. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...

  4. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...

  5. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...

  6. 14 CFR 1203.703 - Declassification.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Foreign Government Information § 1203.703 Declassification. (a) Information classified in accordance with § 1203.400.... The Chairperson, NASA Information Security Program Committee, will initiate administrative functions...

  7. 14 CFR 1203.703 - Declassification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Foreign Government Information § 1203.703 Declassification. (a) Information classified in accordance with § 1203.400.... The Chairperson, NASA Information Security Program Committee, will initiate administrative functions...

  8. 76 FR 72433 - Revision of Agency Information Collection Activity Under OMB Review: Secure Flight Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ...] Revision of Agency Information Collection Activity Under OMB Review: Secure Flight Program AGENCY... operators and foreign air carriers submit to Secure Flight for the purposes of watch list matching... screening checkpoint which airport operators will submit to Secure Flight, and a survey of certain general...

  9. 6 CFR 29.5 - Requirements for protection.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL... PCII Program Manager or the PCII Program Manager's designee; (2) The information is submitted for... information initially provided received by the PCII Program Manager or the PCII Program Manager's designee...

  10. 6 CFR 29.5 - Requirements for protection.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL... PCII Program Manager or the PCII Program Manager's designee; (2) The information is submitted for... information initially provided received by the PCII Program Manager or the PCII Program Manager's designee...

  11. Safe teleradiology: information assurance as project planning methodology.

    PubMed

    Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David

    2005-01-01

    The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.

  12. 46 CFR 503.52 - Senior agency official.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 9 2011-10-01 2011-10-01 false Senior agency official. 503.52 Section 503.52 Shipping FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security...'s information security program, which includes oversight (self-inspection) and security information...

  13. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  14. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  15. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Information regarding security risk for a chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information...

  16. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...

  17. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...

  18. 5 CFR 2500.11 - Implementation and review.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... INFORMATION SECURITY REGULATION § 2500.11 Implementation and review. The Information Security Oversight... information security program. The chairperson shall also be responsible for conducting an active oversight...

  19. 5 CFR 2500.11 - Implementation and review.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION SECURITY REGULATION § 2500.11 Implementation and review. The Information Security Oversight... information security program. The chairperson shall also be responsible for conducting an active oversight...

  20. 78 FR 26057 - Extension of Agency Information Collection Activity Under OMB Review: Pipeline Corporate Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-03

    ... Information Collection Activity Under OMB Review: Pipeline Corporate Security Review AGENCY: Transportation.... Information Collection Requirement Title: Pipeline Corporate Security Review (PCSR). Type of Request... current industry security practices through its Pipeline Corporate Security Review (PCSR) program. The...

  1. 19 CFR 201.43 - Program.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION National Security Information § 201.43 Program. The Director of Administration is designated as the official of the Commission who is responsible for implementation and oversight of information security programs and procedures...

  2. 46 CFR 503.59 - Safeguarding classified information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Information Security Program § 503.59 Safeguarding classified information. (a) All classified information... security; (2) Takes appropriate steps to protect classified information from unauthorized disclosure or... security check; (2) To protect the classified information in accordance with the provisions of Executive...

  3. 32 CFR 154.42 - Evaluation of personnel security information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  4. 32 CFR 154.42 - Evaluation of personnel security information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  5. 76 FR 31971 - New Agency Information Collection Activity Under OMB Review: Security Program for Hazardous...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-02

    ... INFORMATION CONTACT: Joanna Johnson, TSA PRA Officer, Office of Information Technology (OIT), TSA-11... other forms of information technology. Information Collection Requirement Title: Security Program for... surveyor tool that is managed at TSA. Participants who attend the classroom training sessions will also be...

  6. 48 CFR 339.7101 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and... information contained in those systems. Each system's level of security shall protect the integrity...

  7. A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions

    ERIC Educational Resources Information Center

    Waddell, Stanie Adolphus

    2013-01-01

    Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…

  8. 14 CFR 1203.602 - Authorization.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Declassification and Downgrading § 1203.602 Authorization. Information shall be declassified or downgraded by the... writing by the Administrator or the Chairperson, NASA Information Security Program Committee. [48 FR 5891...

  9. Report: EPA Improved Its National Security Information Program, but Some Improvements Still Needed

    EPA Pesticide Factsheets

    Report #16-P-0196, June 2, 2016. The EPA will continue to improve its national security information program by completing information classification guides that can be used uniformly and consistently throughout the agency.

  10. 14 CFR 1203.602 - Authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Declassification and Downgrading § 1203.602 Authorization. Information shall be declassified or downgraded by the... writing by the Administrator or the Chairperson, NASA Information Security Program Committee. [48 FR 5891...

  11. 49 CFR 1549.109 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... SCREENING PROGRAM Operations § 1549.109 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify certified cargo screening facilities of security concerns. (b) When TSA...

  12. 12 CFR Appendix A to Part 748 - Guidelines for Safeguarding Member Information

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Implementation of Member Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board.... Development and Implementation of Member Information Security Program A. Involve the Board of Directors. The...

  13. 12 CFR Appendix A to Part 748 - Guidelines for Safeguarding Member Information

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Implementation of Member Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board.... Development and Implementation of Member Information Security Program A. Involve the Board of Directors. The...

  14. 12 CFR Appendix A to Part 748 - Guidelines for Safeguarding Member Information

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Implementation of Member Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board.... Development and Implementation of Member Information Security Program A. Involve the Board of Directors. The...

  15. 12 CFR Appendix A to Part 748 - Guidelines for Safeguarding Member Information

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Implementation of Member Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board.... Development and Implementation of Member Information Security Program A. Involve the Board of Directors. The...

  16. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part...: Information Security Oversight Office, NARA. ACTION: Proposed rule; correction. SUMMARY: This document... Management System (FDMS) number to the proposed rule for Information Security Oversight Office (ISOO...

  17. 12 CFR Appendix B to Part 170 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Security Standards B Appendix B to Part 170 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF... Part 170—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of...

  18. 12 CFR Appendix B to Part 170 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Security Standards B Appendix B to Part 170 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF... Part 170—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of...

  19. 50 CFR 540.2 - Program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Fisheries MARINE MAMMAL COMMISSION INFORMATION SECURITY § 540.2 Program. The Executive Director is designated as the Commission's official responsible for implementation and oversight of information security... requests submitted under the Freedom of Information Act are handled in accordance with that Act and that...

  20. 50 CFR 540.2 - Program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Fisheries MARINE MAMMAL COMMISSION INFORMATION SECURITY § 540.2 Program. The Executive Director is designated as the Commission's official responsible for implementation and oversight of information security... requests submitted under the Freedom of Information Act are handled in accordance with that Act and that...

  1. 77 FR 11146 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Certified...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-24

    ...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), OMB control number 1652-0053, abstracted below that we will submit to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. The collections include: (1) Applications from entities that wish to become Certified Cargo Screening Facilities (CCSF); (2) personal information to allow TSA to conduct security threat assessments on key individuals employed by the CCSFs; (3) acceptance of a standard security program or submission of a proposed modified security program; (4) information on the amount of cargo screened; and (5) recordkeeping requirements for CCSFs. TSA is seeking the renewal of the ICR for the continuation of the program in order to secure passenger aircraft carrying cargo.

  2. 46 CFR 503.58 - Appeals of denials of mandatory declassification review requests.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PUBLIC INFORMATION Information Security Program § 503.58 Appeals of denials of mandatory declassification... Security Classification Appeals Panel. The appeal should be addressed to, Executive Secretary, Interagency Security Classification Appeals Panel, Attn: Classification Challenge Appeals, c/o Information Security...

  3. 76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-21

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR... Protection and Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the following Information...

  4. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI)

    DTIC Science & Technology

    2016-04-21

    collateral, special access program, SCI, and controlled unclassified information ( CUI ) within an overarching DoD Information Security Program...classified, safeguarded, and declassified in accordance with References (c), (d), and DoD Manual 5200.01 (Reference (i)). CUI will be identified...Information will not be classified, continue to be maintained as classified, or fail to be declassified, or be designated CUI under any circumstances in

  5. 77 FR 76062 - Agency Information Collection Activities: E-Verify Program Data Collections. New Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services [OMB Control Number 1615-NEW] Agency Information Collection Activities: E-Verify Program Data Collections. New Information Collection; Comment Request. ACTION: 60-Day notice. * * * * * The Department of Homeland Security (DHS), U.S. Citizenship and Immigration Services ...

  6. 12 CFR Appendix C to Part 1720 - Policy Guidance; Safety and Soundness Standards for Information

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Information Security Program 1. Involve the Board of Directors. 2. Assess Risk. 3. Manage and Control Risk. 4. Oversee Service Provider Arrangements. 5. Adjust the Program. 6. Report to the Board. 7. Implementation. A...—Development and Implementation of Information Security Program 1. Involve the Board of Directors. The board of...

  7. 78 FR 30319 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-22

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2002-11602] Intent to Request Renewal From OMB of One Current Public Collection of Information: Security Programs for..., Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6011. FOR FURTHER INFORMATION...

  8. 78 FR 31966 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: [FEMA-2013-0019... Security Initiative (UASI) Nonprofit Security Grant Program (NSGP). DATES: Comments must be submitted on or... Urban Areas Security Initiative (UASI) Nonprofit Security Grant Program (NSGP) provides funding support...

  9. 77 FR 37055 - Agency Information Collection Activities; Submission for Office of Management and Budget Review...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-20

    ... Request; Secure Supply Chain Pilot Program AGENCY: Food and Drug Administration, HHS. ACTION: Notice... identified with the title Secure Supply Chain Pilot Program. Also include the FDA docket number found in... following proposed collection of information to OMB for review and clearance: ``Secure Supply Chain Pilot...

  10. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and... safeguarding of national security information received by the Commission from other agencies, to chair a... suggestions and complaints with respect to the Commission administration of its information security program...

  11. 76 FR 23971 - Proposed Information Collection; Comment Request; Competitive Enhancement Needs Assessment Survey...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-29

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Competitive Enhancement Needs Assessment Survey Program AGENCY: Bureau of Industry and Security... their abilities to meet defense program needs. The information collected from voluntary surveys will be...

  12. 75 FR 21012 - Extension of Agency Information Collection Activity Under OMB Review: Highway Corporate Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-22

    ... Information Collection Activity Under OMB Review: Highway Corporate Security Review (CSR) AGENCY... in the highway and motor carrier industry by way of its Highway Corporate Security Review Program... comments. Information Collection Requirement Title: Corporate Security Review (CSR). Type of Request...

  13. 12 CFR Appendix B to Part 170 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .... You shall: 1. Design your information security program to control the identified risks, commensurate... Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board G... information does not include: (A) Aggregate information, such as the mean credit score, derived from a group...

  14. How Secure Is Education in Information Technology? A Method for Evaluating Security Education in IT

    ERIC Educational Resources Information Center

    Grover, Mark; Reinicke, Bryan; Cummings, Jeff

    2016-01-01

    As the popularity of Information Technology programs has expanded at many universities, there are a number of questions to be answered from a curriculum standpoint. As many of these programs are either interdisciplinary, or at least exist outside of the usual Computer Science and Information Systems programs, questions of what is appropriate for…

  15. 77 FR 74685 - Chemical Facility Anti-Terrorism Standards (CFATS) Chemical-Terrorism Vulnerability Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-17

    ... Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Infrastructure Security Compliance... questions about this Information Collection Request should be forwarded to DHS/NPPD/IP/ISCD CFATS Program... to the DHS/NPPD/IP/ISCD CFATS Program Manager at the Department of Homeland Security, 245 Murray Lane...

  16. TealLock 5.20 security software program for handheld devices.

    PubMed

    Tahil, Fatimah A

    2004-07-01

    The TealLock has a simple graphic interface, and the program is user-friendly with well thought out options to customize security settings. The program is inexpensive and works seamlessly with the Palm OS platform's built-in basic Security application. The developer offers a 30-day free trial version and there is no downside to trying it to see if it meets your needs. It seems to be an effective security software program for psychiatrists who keep confidential and sensitive patient information on their PDAs. In keeping with HIPAA regulations, the TealLock bolsters security for protected health information stored on PDAs or other handheld devices by providing safeguards that address authentication, access control, encryption, and selected aspects of transmission.

  17. Two Stage Sibling Cycle Compressor/Expander.

    DTIC Science & Technology

    1994-02-01

    documents, follow the procedures in DoD 5200.22-M, Industrial Security Manual, Section 11-19 or DoD 5200.1 -R, Information Security Program Regulation...procedures in DoD 5200.22-M, Industrial Security Manual, Section 11-19 or DoD 5200.1-R, Information Security Program Regulation, Chapter IX. For...Spae Piston rotation periodically connects channels from expansion/ compresion ces to ports P1Port B2 Heat Exchangers B Piston moves Ports Process Al

  18. 32 CFR 321.3 - Information and procedures for requesting notification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2014-07-01 2014-07-01 false Information and procedures for requesting...

  19. 32 CFR 321.3 - Information and procedures for requesting notification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2013-07-01 2013-07-01 false Information and procedures for requesting...

  20. 32 CFR 321.3 - Information and procedures for requesting notification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2011-07-01 2011-07-01 false Information and procedures for requesting...

  1. 32 CFR 321.3 - Information and procedures for requesting notification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2012-07-01 2012-07-01 false Information and procedures for requesting...

  2. 32 CFR 321.3 - Information and procedures for requesting notification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2010-07-01 2010-07-01 false Information and procedures for requesting...

  3. 32 CFR 725.8 - Considerations in determining to grant or deny a request.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... reveal information properly classified under the DOD Information Security Program under DOD 5200.1-R 7... Naval Aviation Safety Program information (OPNAVINST 3750.6Q (NOTAL)) 8 , or other matters exempt from... as loyalty or security records, are involved. Disclosure of records relating to compensation benefits...

  4. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  5. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  6. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  7. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  8. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  9. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  10. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  11. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  12. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  13. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  14. Measuring the Effectiveness of Information Security Training: A Comparative Analysis of Computer-Based Training and Instructor-Based Training

    ERIC Educational Resources Information Center

    Kim, Philip

    2010-01-01

    Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…

  15. 78 FR 57445 - Charging Standard Administrative Fees for Nonprogram-Related Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-18

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0026] Charging Standard Administrative Fees for Nonprogram-Related Information AGENCY: Social Security Administration. ACTION: Notice of standard... administration of a program under the Social Security Act (Act). SUPPLEMENTARY INFORMATION: Section 1106 of the...

  16. 46 CFR 503.58 - Appeals of denials of mandatory declassification review requests.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... PUBLIC INFORMATION Information Security Program § 503.58 Appeals of denials of mandatory declassification... Interagency Security Classification Appeals Panel. The appeal should be addressed to, Executive Secretary, Interagency Security Classification Appeals Panel, Attn: Classification Challenge Appeals, c/o Information...

  17. 77 FR 71430 - New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline Assessment for Security Enhancement... voluntary site visits with security and operating officials of public transportation systems. This program...

  18. Report: EPA’s National Security Information Program Could Be Improved

    EPA Pesticide Factsheets

    Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.

  19. 77 FR 25187 - Extension of Agency Information Collection Activity Under OMB Review: Certified Cargo Screening...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-27

    ...This notice announces that the Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), Office of Management and Budget (OMB) control number 1652-0053, abstracted below to OMB for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of the following collection of information on February 24, 2012, 77 FR 11146, and TSA received no comments. The collections include: (1) Applications from entities that wish to become Certified Cargo Screening Facilities (CCSFs); (2) personal information to allow TSA to conduct security threat assessments on key individuals employed by the CCSFs; (3) implementation of a standard security program or submission of a proposed modified security program; (4) information on the amount of cargo screened; (5) recordkeeping requirements for CCSFs, and any other requests for information relating to cargo screening required to meet the Implementing Recommendations of the 9/11 Commission Act of 2007 (9/ 11 Act) and the Aviation and Transportation Security Act (ATSA) mandates. TSA is seeking the renewal of the ICR for the continuation of the program in order to secure passenger aircraft transporting cargo as required in the 9/11 Act.

  20. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  1. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  2. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  3. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  4. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  5. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  6. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  7. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  8. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  9. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  10. 78 FR 18619 - Extension of Agency Information Collection Activity Under OMB Review: National Explosives...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-27

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: National Explosives Detection Canine Team Program (NEDCTP... Explosives Detection Canine Team Program (NEDCTP) canine handlers. Abstract: The FAMS/CTES Explosives...

  11. Supplemental Nutrition Assistance Program participation is associated with an increase in household food security in a national evaluation.

    PubMed

    Mabli, James; Ohls, Jim

    2015-02-01

    The Supplemental Nutrition Assistance Program (SNAP) provides nutrition assistance benefits to low-income families in an effort to reduce hunger and improve health and well-being. Because 1 in 7 Americans participate in the program each month, policymakers need to know whether the program is meeting these objectives effectively. The objective of this study was to estimate the association between SNAP participation and household food security using recent data from the largest national survey of the food security of SNAP participants to date. The analysis used a survey of nearly 6500 households and a quasi-experimental research design that consisted of 2 sets of comparisons. Using a cross-sectional sample, we compared information collected from SNAP households within days of program entry with information collected from a contemporaneous sample of SNAP households that had participated for ∼6 mo. Next, using a longitudinal sample, we compared baseline information collected from new-entrant SNAP households with information from those same households 6 mo later. Multivariate logistic regression analysis was used to estimate associations between SNAP and household food security. SNAP participation decreased the percentage of SNAP households that were food insecure in both samples by 6-17%. SNAP participation also decreased the percentage of households experiencing severe food insecurity--designated very low food security--by 12-19%. Findings were qualitatively robust to different empirical specifications. SNAP serves a vital role in improving the health and well-being of households by increasing food security. Given recent legislation to reduce program size and limit program eligibility, this study underscores SNAP's continued importance in affecting households' well-being. Future research is needed to determine whether specific groups of households experience differential improvements in food security. © 2015 American Society for Nutrition.

  12. Report: Fiscal Year 2006 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    EPA Pesticide Factsheets

    Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.

  13. 75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-10

    ... Education Program; 1101 Wilson Blvd., Suite 1210; Rosslyn, VA 22219. FOR FURTHER INFORMATION CONTACT: Dr. Kevin Gormley, Program Officer, National Security Education Program, 1101 Wilson Boulevard, Suite 1210...

  14. Information security management system planning for CBRN facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  15. 20 CFR 410.120 - Disclosure of program information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Section 410.120 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT... any information obtained at any time by the Social Security Administration, or any officer or employee... connection with the administration of the old-age, survivors, disability, or health insurance programs...

  16. 14 CFR 1203.904 - Meetings.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Meetings. 1203.904 Section 1203.904 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.904 Meetings. (a) Meetings will be held at the call of the...

  17. 14 CFR 1203.904 - Meetings.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Meetings. 1203.904 Section 1203.904 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.904 Meetings. (a) Meetings will be held at the call of the...

  18. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized...

  19. 78 FR 26649 - Agency Information Collection Activities: Trusted Traveler Programs

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-07

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Trusted Traveler Programs AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security. ACTION: 60-Day Notice and request for comments; Extension of an existing collection of...

  20. 45 CFR 303.30 - Securing medical support information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 2 2014-10-01 2012-10-01 true Securing medical support information. 303.30 Section 303.30 Public Welfare Regulations Relating to Public Welfare OFFICE OF CHILD SUPPORT ENFORCEMENT... HUMAN SERVICES STANDARDS FOR PROGRAM OPERATIONS § 303.30 Securing medical support information. (a) If...

  1. 75 FR 63191 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Certified...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-14

    ...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), OMB control number 1652-0053, abstracted below that we will submit to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. The collections include: (1) Applications from entities that wish to become Certified Cargo Screening Facilities (CCSF) or operate as a TSA- approved validation firm; (2) personal information to allow TSA to conduct security threat assessments on key individuals employed by the CCSFs and validation firms; (3) implementation of a standard security program or submission of a proposed modified security program; (4) information on the amount of cargo screened; (5) recordkeeping requirements for CCSFs and validation firms; and (6) submission of validation reports to TSA. TSA is seeking the renewal of the ICR for the continuation of the program in order to secure passenger aircraft carrying cargo by the deadlines set out in the Implementing Recommendations of the 9/11 Commission Act of 2007.

  2. 10 CFR 25.5 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... establish an industrial security program for the purpose of safeguarding classified information under the... Agent for the National Industrial Security Program. Commission means the Nuclear Regulatory Commission... designated by the Executive Director for Operations, is eligible for a security clearance for access to...

  3. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized to...

  4. 76 FR 71958 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-21

    ... Security Education Program, DoD. ACTION: Notice. SUMMARY: In compliance with Section 3506(c)(2)(A) of the.../National Security Education Program announces the proposed extension of a public information collection and... burden of the proposed information collection; (c) ways to enhance the quality, utility, and clarity of...

  5. 76 FR 39887 - Extension of Agency Information Collection Activity Under OMB Review: Highway Corporate Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-07

    ... Information Collection Activity Under OMB Review: Highway Corporate Security Review AGENCY: Transportation... industry by way of its Highway Corporate Security Review (CSR) Program, which encompasses site visits and... Title: Highway Corporate Security Review. Type of Request: Extension of a currently approved collection...

  6. 78 FR 13075 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Pipeline...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-26

    ... From OMB of One Current Public Collection of Information: Pipeline Corporate Security Review Program... current security practices in the pipeline industry by way of TSA's Pipeline Corporate Security Review... Collection Requirement The TSA Pipeline Security Branch is responsible for conducting Pipeline Corporate...

  7. National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook

    NASA Technical Reports Server (NTRS)

    Roback, E.

    1991-01-01

    The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.

  8. 75 FR 9919 - Extension of Agency Information Collection Activity Under OMB Review: Air Cargo Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-04

    ...This notice announces that the Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), OMB control number 1652-0040, abstracted below to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of the following collection of information on November 16, 2009, 74 FR 58969. TSA has not received any comments. The collections of information that make up this ICR involve five broad categories affecting airports, passenger aircraft operators, foreign air carriers, indirect air carriers operating under a security program, and all-cargo carriers. These five categories are: security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), cargo screening reporting, and evidence of compliance recordkeeping.

  9. 76 FR 4362 - Extension of Agency Information Collection Activity Under OMB Review: Air Cargo Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-25

    ...This notice announces that the Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), OMB control number 1652-0040, abstracted below, to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of this collection of information on October 14, 2010, 75 FR 63192. TSA has not received any comments. The collections of information that make up this ICR involve five broad categories affecting airports, passenger aircraft operators, foreign air carriers, indirect air carriers operating under a security program, and all-cargo carriers. These five categories are: Security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), cargo screening reporting, and evidence of compliance recordkeeping.

  10. 14 CFR 1203.701 - Classification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Foreign Government Information § 1203.701 Classification. (a) Foreign government information that is classified by a... security. Therefore, such foreign government information shall be classified at least Confidential. However...

  11. 48 CFR 339.7101 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 339.7101 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and...

  12. 48 CFR 339.7101 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 339.7101 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and...

  13. 48 CFR 339.7101 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 339.7101 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and...

  14. 48 CFR 339.7101 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 339.7101 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and...

  15. An Undergraduate Information Security Program: More than a Curriculum

    ERIC Educational Resources Information Center

    Woodward, Belle; Imboden, Thomas; Martin, Nancy L.

    2013-01-01

    This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…

  16. Integrating Programming Language and Operating System Information Security Mechanisms

    DTIC Science & Technology

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  17. 46 CFR 295.23 - Reporting requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...

  18. 46 CFR 295.23 - Reporting requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...

  19. 46 CFR 295.23 - Reporting requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...

  20. 46 CFR 295.23 - Reporting requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...

  1. 46 CFR 295.23 - Reporting requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...

  2. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...

  3. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...

  4. 77 FR 66880 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-07

    ... the database that stores information for the Lost and Stolen Securities Program. We estimate that 26... Lost and Stolen Securities Program database will be kept confidential. The Commission may not conduct... SECURITIES AND EXCHANGE COMMISSION Submission for OMB Review; Comment Request Upon Written Request...

  5. 6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... a high level of security risk.â 27.205 Section 27.205 Domestic Security DEPARTMENT OF HOMELAND... Program § 27.205 Determination that a chemical facility “presents a high level of security risk.” (a... a high level of security risk based on any information available (including any information...

  6. Information Systems Security and Computer Crime in the IS Curriculum: A Detailed Examination

    ERIC Educational Resources Information Center

    Foltz, C. Bryan; Renwick, Janet S.

    2011-01-01

    The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…

  7. Expanding Protection Motivation Theory: The Role of Individual Experience in Information Security Policy Compliance

    ERIC Educational Resources Information Center

    Mutchler, Leigh Ann

    2012-01-01

    The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…

  8. 32 CFR 299.6 - Fees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... requested. There are no fees associated with a Privacy Act request, except as stated in NSA/CSS Regulation...

  9. 32 CFR 299.6 - Fees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... requested. There are no fees associated with a Privacy Act request, except as stated in NSA/CSS Regulation...

  10. 32 CFR 299.6 - Fees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... requested. There are no fees associated with a Privacy Act request, except as stated in NSA/CSS Regulation...

  11. 14 CFR § 1203.101 - Other applicable NASA regulations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Other applicable NASA regulations. § 1203... INFORMATION SECURITY PROGRAM Scope § 1203.101 Other applicable NASA regulations. (a) Subpart H of this part... this part, “NASA Information Security Program Committee.” (c) NASA Procedural Requirements (NPR) 1600.2...

  12. 32 CFR 299.1 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... 22161. 2 See footnote 1 to this section. (b) This part applies to all NSA/CSS elements, field activities...

  13. 32 CFR 299.1 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... 22161. 2 See footnote 1 to this section. (b) This part applies to all NSA/CSS elements, field activities...

  14. 32 CFR 299.1 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... 22161. 2 See footnote 1 to this section. (b) This part applies to all NSA/CSS elements, field activities...

  15. 32 CFR 299.1 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... 22161. 2 See footnote 1 to this section. (b) This part applies to all NSA/CSS elements, field activities...

  16. 14 CFR 1203.600 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Declassification and Downgrading § 1203.600 Policy. Information shall be declassified or downgraded as soon as national security considerations permit. NASA reviews of classified information shall be coordinated with...

  17. 12 CFR 792.50 - Program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION Security Procedures for Classified...

  18. 12 CFR 792.50 - Program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION Security Procedures for Classified...

  19. 12 CFR 792.50 - Program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION Security Procedures for Classified...

  20. 12 CFR 792.50 - Program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION Security Procedures for Classified...

  1. 12 CFR 792.50 - Program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION Security Procedures for Classified...

  2. 14 CFR 1203.600 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Declassification and Downgrading § 1203.600 Policy. Information shall be declassified or downgraded as soon as national security considerations permit. NASA reviews of classified information shall be coordinated with...

  3. 32 CFR 2800.4 - General information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... STATES SECURITY PROCEDURES § 2800.4 General information. (a) Staff Security Officer/Top Secret Control... Staff Security Officer will serve as Top Secret Control Officer and Assistant Top Secret Control Officer... responsible for the overall supervision of the Top Secret Control program. They will maintain positive control...

  4. 77 FR 11145 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Air Cargo...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-24

    ...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), OMB control number 1652-0040, abstracted below that we will submit to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. This ICR involves five broad categories of affected populations: airports, passenger aircraft operators, foreign air carriers, indirect air carriers operating under a security program, and all-cargo carriers. The collections of information that make up this ICR are security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), Air Cargo Data Management System (ACDMS), Cargo Reporting Tool for cargo screening reporting, and evidence of compliance recordkeeping. TSA seeks continued OMB approval in order to secure passenger aircraft carrying cargo as authorized in the Aviation and Transportation Security Act.

  5. 76 FR 6596 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    .... The Food Security Act of 1985 permits the states to establish ``central filing systems.'' These... in section 1324 of the Food Security Act of 1985. The information received from the State is... responsibility for the Clear Title Program (Section 1324 of the Food Security Act of 1985. Clear Title Program...

  6. 77 FR 71431 - New Agency Information Collection Activity Under OMB Review: Highway Baseline Assessment for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Collection Activity Under OMB Review: Highway Baseline Assessment for Security Enhancement (BASE) Program... Assessment for Security Enhancement (BASE) Program. Type of Request: New collection. OMB Control Number: Not yet assigned. Form(s): Highway Baseline Assessment for Security Enhancement (BASE). Affected Public...

  7. How Attitude toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention

    ERIC Educational Resources Information Center

    Johnson, David P.

    2017-01-01

    The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human…

  8. 20 CFR 401.60 - Access to or notification of program records about more than one individual.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... is in one record filed under your social security number, you may receive the information about you... security number, if that information affects your entitlement to social security benefits or the amount of... about more than one individual. 401.60 Section 401.60 Employees' Benefits SOCIAL SECURITY ADMINISTRATION...

  9. Federal funding for health security in FY2015.

    PubMed

    Boddie, Crystal; Sell, Tara Kirk; Watson, Matthew

    2014-01-01

    Previous articles in this series have provided funding information for federal civilian biodefense programs and programs focused on radiological and nuclear preparedness and consequence management. This year the authors have expanded the focus of the analysis to US federal funding for health security. This article provides proposed funding amounts for FY2015, estimated amounts for FY2014, and actual amounts for FY2010 through FY2013 in 5 domains critical to health security: biodefense programs, radiological and nuclear programs, chemical programs, pandemic influenza and emerging infectious disease programs, and multiple-hazard and preparedness programs.

  10. Leveraging Trade Agreements to Meet U.S. Security Aims

    DTIC Science & Technology

    2016-04-08

    TO MEET U.S. SECURITY AIMS 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sd. PROJECT NUMBER LTC Allysa A. Kropp (USARNG) Se. TASK NUMBER 5f...Sanctions Programs and Country Information,” under “Resource Center, Financial Sanctions, Programs ,” https’.//wwiv.treasurv.gov/resource center/sanctions... Program , and economic integration of former adversaries through U.S. trade policy.7 In the National Security Strategy, President Obama underscored the

  11. 75 FR 9915 - Extension of Agency Information Collection Activity Under OMB Review: Certified Cargo Screening...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-04

    ...This notice announces that the Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), OMB control number 1652-0053, abstracted below to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of the following collection of information on November 16, 2009, 74 FR 58967. TSA has received no comments. The collections include: (1) Applications from entities that wish to become Certified Cargo Screening Facilities (CCSF) or operate as a TSA-approved validation firm; (2) personal information to allow TSA to conduct security threat assessments on key individuals employed by the CCSFs and validation firms; (3) implementation of a standard security program or submission of a proposed modified security program; (4) information on the amount of cargo screened; (5) recordkeeping requirements for CCSFs and validation firms; and (6) submission of validation reports to TSA. TSA is seeking the renewal of the ICR for the continuation of the program in order to secure passenger aircraft carrying cargo by the deadlines set out in the Implementing Recommendations of the 9/11 Commission Act of 2007.

  12. 77 FR 24506 - Extension of Agency Information Collection Activity Under OMB Review: Air Cargo Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-24

    ...This notice announces that the Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), Office of Management and Budget (OMB) control number 1652-0040, abstracted below to OMB for review and approval of an extension of the currently approved collection under the Paperwork Reduction Act (PRA). The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of the following collection of information on February 24, 2012, 77 FR 11145. TSA has not received any comments. The collection of information that make up this ICR involve five broad categories affecting airports, passenger aircraft operators, foreign air carriers, indirect air carriers and all-cargo carriers operating under a TSA-approved security program. These five categories are: Security programs, security threat assessments (STAs), known shipper data via the Known Shipper Management System (KSMS), cargo screening reporting, and evidence of compliance recordkeeping.

  13. 39 CFR 267.3 - Responsibility.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.3... custodians are responsible for insuring that information security standards and procedures are followed and that all relevant employees participate in the information security awareness programs. [40 FR 45726...

  14. 39 CFR 267.3 - Responsibility.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.3... custodians are responsible for insuring that information security standards and procedures are followed and that all relevant employees participate in the information security awareness programs. [40 FR 45726...

  15. 17 CFR 200.13 - Executive Director.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Section 200.13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General Organization... and Information Services, the Office of Freedom of Information and Privacy Act Operations, and the...

  16. 39 CFR 267.3 - Responsibility.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.3... custodians are responsible for insuring that information security standards and procedures are followed and that all relevant employees participate in the information security awareness programs. [40 FR 45726...

  17. 39 CFR 267.3 - Responsibility.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.3... custodians are responsible for insuring that information security standards and procedures are followed and that all relevant employees participate in the information security awareness programs. [40 FR 45726...

  18. 39 CFR 267.3 - Responsibility.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.3... custodians are responsible for insuring that information security standards and procedures are followed and that all relevant employees participate in the information security awareness programs. [40 FR 45726...

  19. 14 CFR 1203.411 - Restrictions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for... President through the National Security Council, classified information originating in one agency may not be...) Classified information shall not be disseminated outside the Executive Branch except under conditions that...

  20. 14 CFR 1203.411 - Restrictions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for... President through the National Security Council, classified information originating in one agency may not be...) Classified information shall not be disseminated outside the Executive Branch except under conditions that...

  1. The Graduate MIS Security Course: Objectives and Challenges

    ERIC Educational Resources Information Center

    Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew

    2009-01-01

    Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…

  2. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    EPA Pesticide Factsheets

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  3. 78 FR 15731 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-12

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0011] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy Act of 1974; Computer Matching Program...

  4. 78 FR 15732 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-12

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0007] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy Act of 1974; Computer Matching Program...

  5. 14 CFR 1203.408 - Assistance by installation security classification officers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.408 Assistance by installation security classification officers. Installation Security Classification Officers, as the... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Assistance by installation security...

  6. 14 CFR 1203.408 - Assistance by installation security classification officers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.408 Assistance by installation security classification officers. Installation Security Classification Officers, as the... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Assistance by installation security...

  7. 2011 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP)

    DTIC Science & Technology

    2011-08-25

    Office of the Program Manager, Information Sharing Environment u Mr. Vince Jarvie , Vice President, Corporate Security, L-3 Communications...National Defense University IRM College and in 2008 he obtained the Certified Information System Security Professional certificate. MR. VINCE JARVIE ...Vice President, Corporate Security, L-3 Communciations Corporation Mr. Vincent (Vince) Jarvie is the Vice President, Corporate Security for L-3

  8. MCPS School Safety & Security at a Glance 2011-2012

    ERIC Educational Resources Information Center

    Montgomery County Public Schools, 2012

    2012-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…

  9. MCPS School Safety & Security at a Glance 2013-2014

    ERIC Educational Resources Information Center

    Montgomery County Public Schools, 2014

    2014-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…

  10. MCPS School Safety & Security at a Glance 2012-2013

    ERIC Educational Resources Information Center

    Montgomery County Public Schools, 2013

    2013-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…

  11. MCPS School Safety and Security at a Glance 2007-2008

    ERIC Educational Resources Information Center

    Montgomery County Public Schools, 2008

    2008-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, including school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for…

  12. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    PubMed

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  13. 76 FR 51048 - Notice of Submission of Proposed Information Collection to OMB Ginnie Mae Mortgage-Backed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-17

    ...-Backed Securities programs and to monitor performance and compliance with established rules and... issuers/customers in its Mortgage-Backed Securities programs and to monitor performance and compliance...

  14. 14 CFR 1203.410 - Limitations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for... requires protection in the interest of national security; and (2) the information may reasonably be... agency; or to restrain competition. (b) Basic scientific research information not clearly related to the...

  15. 75 FR 1446 - Rate of Payment for Medical Records Received Through Health Information Technology (IT) Necessary...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-11

    ... Received Through Health Information Technology (IT) Necessary To Make Disability Determinations AGENCY... Federal Register. FOR FURTHER INFORMATION CONTACT: Cheryl Elksnis, Office of Disability Programs, Social Security Administration, 6401 Security Boulevard, Baltimore, MD 21235-6401, 410-966-0497, for information...

  16. Independent Review of Aviation Technology and Research Information Analysis System (ATRIAS) Database

    DTIC Science & Technology

    1994-02-01

    capability to support the Federal Aviation Administration (FAA)/ Aviation Security Research and Development Service’s (ACA) Explosive Detection...Systems (EDS) programs and Aviation Security Human Factors Program (ASHFP). This review was conducted by an independent consultant selected by the FAA...sections 2 and 3 of the report. Overall, ATRIAS was found to address many technology application areas relevant to the FAA’s aviation security programs

  17. Cyber security evaluation of II&C technologies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thomas, Ken

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.« less

  18. Federal Funding for Health Security in FY2015

    PubMed Central

    Sell, Tara Kirk; Watson, Matthew

    2014-01-01

    Previous articles in this series have provided funding information for federal civilian biodefense programs and programs focused on radiological and nuclear preparedness and consequence management. This year the authors have expanded the focus of the analysis to US federal funding for health security. This article provides proposed funding amounts for FY2015, estimated amounts for FY2014, and actual amounts for FY2010 through FY2013 in 5 domains critical to health security: biodefense programs, radiological and nuclear programs, chemical programs, pandemic influenza and emerging infectious disease programs, and multiple-hazard and preparedness programs. PMID:24988432

  19. Speeding decisions. Social security's information exchange program.

    PubMed

    Winter, Kitt; Hastings, Bob

    2011-05-01

    The Social Security Administration has plenty of reasons to streamline its records request process-more than 15 million reasons each year, in fact. That's why it has been pioneering information exchange projects with the private sector, including use of the Nationwide Health Information Network.

  20. 78 FR 7820 - Notice of Intelligent Mail Indicia Performance Criteria

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... FURTHER INFORMATION CONTACT: Marlo Kay Ivey, Business Programs Specialist, Payment Technology, U.S. Postal... Performance Criteria and Security Architecture for Open Information Based Indicia (IBI) Postage Evidencing Systems and the Performance Criteria and Security Architecture for Closed Information Based Indicia (IBI...

  1. 78 FR 53166 - Agency Information Collection Activities: Submission to OMB for Reinstatement, Without Change, of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-28

    ... an information security program and an incident response plan that complies with Title V of the Gramm... credit union's procedures comply with the information security and incident response requirements. There... NATIONAL CREDIT UNION ADMINISTRATION Agency Information Collection Activities: Submission to OMB...

  2. Evaluating the Generality and Limits of Blind Return-Oriented Programming Attacks

    DTIC Science & Technology

    2015-12-01

    consider a recently proposed information disclosure vulnerability called blind return-oriented programming (BROP). Under certain conditions, this...implementation disclosure attacks 15. NUMBER OF PAGES 75 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF...Science iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT We consider a recently proposed information disclosure vulnerability called blind return

  3. Legal Guide for Senior Citizens: Laws and Programs Affecting Kansas Senior Citizens.

    ERIC Educational Resources Information Center

    Hollinger, Judith A., Ed.

    This booklet is intended to inform (not advise) older Kansans about eligibility requirements and benefits provided by state and federal programs. Financial assistance programs discussed are Social Security, railroad retirements, veterans' benefits, unrestricted general assistance, Employee Retirement Income Security Act, food stamps, Low Income…

  4. 78 FR 3474 - Privacy Act of 1974; Computer Matching Program Between the Office Of Personnel Management and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-16

    ... Security benefit information to OPM via direct computer link for the administration of certain programs by... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office Of Personnel Management and Social Security Administration AGENCY: Office of Personnel Management...

  5. Report: Improvements Needed in Key EPA Information System Security Practices

    EPA Pesticide Factsheets

    Report #10-P-0146, June 15, 2010. Williams Adley found that EPA program offices lacked evidence that they planned and executed tests of information system security controls as required by federal requirements.

  6. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  7. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  8. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  9. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  10. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Solis, John Hector

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a securemore » program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.« less

  12. MCPS School Safety and Security at a Glance 2008-2009

    ERIC Educational Resources Information Center

    Montgomery County Public Schools, 2009

    2009-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for each school.…

  13. MCPS School Safety and Security at a Glance 2010-2011

    ERIC Educational Resources Information Center

    Montgomery County Public Schools, 2011

    2011-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for each school.…

  14. MCPS School Safety and Security at a Glance 2009-2010

    ERIC Educational Resources Information Center

    Montgomery County Public Schools, 2010

    2010-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) public schools. The information is presented for each school.…

  15. 46 CFR 501.5 - Functions of the organizational components of the Federal Maritime Commission.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... administering IT contracts. The Office is also responsible for managing the computer security program. The... relevant EEOC Directives and Bulletins. (2) The Information Security Officer is a senior agency official designated under § 503.52 of this chapter to direct and administer the Commission's information security...

  16. 46 CFR 501.5 - Functions of the organizational components of the Federal Maritime Commission.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... administering IT contracts. The Office is also responsible for managing the computer security program. The... relevant EEOC Directives and Bulletins. (2) The Information Security Officer is a senior agency official designated under § 503.52 of this chapter to direct and administer the Commission's information security...

  17. A Hands-On Approach for Teaching Denial of Service Attacks: A Case Study

    ERIC Educational Resources Information Center

    Trabelsi, Zouheir; Ibrahim, Walid

    2013-01-01

    Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…

  18. 75 FR 33631 - Science and Technology (S&T) Directorate; Agency Information Collection Activities: Submission...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-14

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0040] Science and Technology (S&T) Directorate; Agency Information Collection Activities: Submission for Review; Information Collection Request for the Department of Homeland Security (DHS) Science and Technology TechSolutions Program AGENCY...

  19. 75 FR 53706 - Science and Technology (S&T) Directorate: Agency Information Collection Activities: Submission...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-01

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0072] Science and Technology (S&T) Directorate: Agency Information Collection Activities: Submission for Review; Information Collection Request for the Department of Homeland Security (DHS) Science and Technology TechSolutions Program AGENCY...

  20. 46 CFR 503.56 - General declassification and downgrading policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... INFORMATION Information Security Program § 503.56 General declassification and downgrading policy. (a) The... Order 12958, only over that information originally classified by the Commission under previous Executive... Commission Security Officer, and such others as the Chairman may designate. Commission personnel may not...

  1. Developing a computer security training program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1990-01-01

    We all know that training can empower the computer protection program. However, pushing computer security information outside the computer security organization into the rest of the company is often labeled as an easy project or a dungeon full of dragons. Used in part or whole, the strategy offered in this paper may help the developer of a computer security training program ward off dragons and create products and services. The strategy includes GOALS (what the result of training will be), POINTERS (tips to ensure survival), and STEPS (products and services as a means to accomplish the goals).

  2. 49 CFR 1544.239 - Known shipper program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... a TSA security program approved for transfer of cargo to an aircraft operator with a full program or...) Corrections and updates of this information upon learning of a change to the information specified in...

  3. 49 CFR 1544.239 - Known shipper program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... a TSA security program approved for transfer of cargo to an aircraft operator with a full program or...) Corrections and updates of this information upon learning of a change to the information specified in...

  4. 49 CFR 1544.239 - Known shipper program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... a TSA security program approved for transfer of cargo to an aircraft operator with a full program or...) Corrections and updates of this information upon learning of a change to the information specified in...

  5. 49 CFR 1544.239 - Known shipper program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... a TSA security program approved for transfer of cargo to an aircraft operator with a full program or...) Corrections and updates of this information upon learning of a change to the information specified in...

  6. 49 CFR 1544.239 - Known shipper program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... a TSA security program approved for transfer of cargo to an aircraft operator with a full program or...) Corrections and updates of this information upon learning of a change to the information specified in...

  7. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abbott, Shannon

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, andmore » proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.« less

  8. 32 CFR 2001.70 - General.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Security Education and Training § 2001.70 General. (a) Purpose. This subpart sets standards for agency security education and... uniformity in the conduct of agency security education and training programs; and (3) Reduce instances of...

  9. 32 CFR 322.4 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... physical security requirements for the protection of personal information and ensure that such requirements... NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.4 Responsibilities. (a) The... Associate Director for Human Resources Services or designee shall: (1) Establish the physical security...

  10. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    ERIC Educational Resources Information Center

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  11. Understanding Information Security Culture in an Organization: An Interpretive Case Study

    ERIC Educational Resources Information Center

    Bess, Donald Arlo

    2012-01-01

    Information systems are considered to be a critical and strategic part of most organizations today. Because of this it has become increasingly important to ensure that there is an effective information security program in place protecting those information systems. It has been well established by researchers that the success of an information…

  12. 48 CFR 2804.470 - Contractor Personnel Security Program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contractor Personnel Security Program. 2804.470 Section 2804.470 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 2804.470 Contractor...

  13. 49 CFR 1549.7 - Approval, amendment, renewal of the security program and certification of a certified cargo...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... information requested by TSA concerning Security Threat Assessments. (viii) A statement acknowledging and ensuring that each individual will successfully complete a Security Threat Assessment under § 1549.111... Security Coordinator for an applicant successfully completes a security threat assessment, TSA will provide...

  14. Supplemental nutrition assistance program participation and child food security.

    PubMed

    Mabli, James; Worthington, Julie

    2014-04-01

    This article investigates the association between Supplemental Nutrition Assistance Program (SNAP) participation and child food security by using data from the largest national survey of the food security of SNAP participants to date. The analysis used a survey of nearly 3000 households with children and a quasi-experimental research design that consisted of 2 sets of comparisons. Using a cross-sectional sample, we compared information collected from SNAP households within days of program entry with information collected from a contemporaneous sample of SNAP households that had participated for ∼6 months. Next, by using a longitudinal sample, we compared baseline information collected from new-entrant SNAP households with information from those same households 6 months later. Multivariate logistic regression analysis was used to estimate associations between SNAP and child food security. SNAP participation was associated with an approximately one-third decrease in the odds of children being food insecure in both samples. In the cross-sectional analysis only, SNAP was also associated with a decrease in the odds of children experiencing severe food insecurity (designated very low food security). Findings were qualitatively robust to different empirical specifications. After controlling for other possible confounders, we found children in households that had participated in SNAP for 6 months experienced improvements in food security. On the basis of these findings, we conclude SNAP serves a vital role in improving the health and well-being of low-income children by increasing food security. Future research is needed to determine whether specific groups of children experience differential improvements in food security.

  15. 77 FR 74022 - Notice of Proposed Information Collection: Comment Request; Ginnie Mae Mortgage-Backed Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-12

    ... multiple Issuer MBS is structured so that small issuers, who do not meet the minimum number of loans and... program, securities are backed by single-family or multifamily loans. Under the Ginnie Mae II program, securities are only backed by single family loans. Both the Ginnie Mae I and II MBS are modified pass-through...

  16. Automated Information Security Will Not Improve until Effectively Supported by IRM.

    ERIC Educational Resources Information Center

    Chick, Morey J.

    1989-01-01

    The first of two articles on the nature of the growing problem of automated information systems security, especially in the federal government, this article presents a brief history of the problem and describes the need for integrating security activities into overall policies and programs to help reduce system vulnerabilities and risks. (23…

  17. 32 CFR 299.7 - Exempt records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...

  18. 32 CFR 299.7 - Exempt records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...

  19. 32 CFR 299.7 - Exempt records.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...

  20. 32 CFR 299.7 - Exempt records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...

  1. 32 CFR 299.7 - Exempt records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...

  2. Survey of Cyber Crime in Big Data

    NASA Astrophysics Data System (ADS)

    Rajeswari, C.; Soni, Krishna; Tandon, Rajat

    2017-11-01

    Big data is like performing computation operations and database operations for large amounts of data, automatically from the data possessor’s business. Since a critical strategic offer of big data access to information from numerous and various areas, security and protection will assume an imperative part in big data research and innovation. The limits of standard IT security practices are notable, with the goal that they can utilize programming sending to utilize programming designers to incorporate pernicious programming in a genuine and developing risk in applications and working frameworks, which are troublesome. The impact gets speedier than big data. In this way, one central issue is that security and protection innovation are sufficient to share controlled affirmation for countless direct get to. For powerful utilization of extensive information, it should be approved to get to the information of that space or whatever other area from a space. For a long time, dependable framework improvement has arranged a rich arrangement of demonstrated ideas of demonstrated security to bargain to a great extent with the decided adversaries, however this procedure has been to a great extent underestimated as “needless excess” and sellers In this discourse, essential talks will be examined for substantial information to exploit this develop security and protection innovation, while the rest of the exploration difficulties will be investigated.

  3. Impact of Security Awareness Programs on End-User Security Behavior: A Quantitative Study of Federal Workers

    ERIC Educational Resources Information Center

    Smith, Gwendolynn T.

    2012-01-01

    The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…

  4. 76 FR 15368 - Minimum Security Devices and Procedures

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-21

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures... concerning the following information collection. Title of Proposal: Minimum Security Devices and Procedures... establish a written security program is necessitated by the Bank Protection Act (12 U.S.C. 1881-1884), which...

  5. Stacking The Deck - Can We Better Develop Future Homeland Security Leaders With Formal Mentoring Programs?

    DTIC Science & Technology

    2014-09-01

    under workman’s compensation? 9) Describe the Laissez -Fa ire leadership style. Is this style applicable in the fire service? 10) Is training required...Informal mentoring appears to be the status quo in homeland security agencies for leadership development. However, informal mentoring is flawed due to...formal mentoring programs can assist organizations with employee retention, succession planning, leadership development, closing generational gaps, and

  6. 49 CFR 1522.127 - Assessment report.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program...) The assessment report must include the following information, in addition to any other information...

  7. 46 CFR 503.51 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security Program...) National security means the national defense or foreign relations of the United States. (m) Need to know... new form into a new document. (s) Unauthorized disclosure means a communication or physical transfer...

  8. 78 FR 70244 - Electronic Interim Assistance Reimbursement Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-25

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2011-0104] RIN 0960-AH45 Electronic Interim Assistance Reimbursement Program AGENCY: Social Security Administration. ACTION: Notice of.... We strongly urge you not to include in your comments any personal information, such as Social...

  9. NASA Information Resources Management Long Range Plan, FY 1994-1998

    NASA Technical Reports Server (NTRS)

    1993-01-01

    Table of Contents: Introduction; Agency 5-Year IRM Investment Projections; Program Specific IRM Activities by Program Office; Major IRM Program Accomplishments for FY 1992; Information Collection Budget; Summary of Computer Security Plans; and Appendix: Acronym List.

  10. 32 CFR 2001.71 - Coverage.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Security Education and Training § 2001.71 Coverage. (a) General. Each department or agency shall establish and maintain a formal security education and training program which provides for initial training, refresher training...

  11. 77 FR 56845 - Multi-Agency Informational Meeting Concerning Compliance With the Federal Select Agent Program...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-14

    ... Informational Meeting Concerning Compliance With the Federal Select Agent Program; Public Webcast AGENCY... with the Federal Select Agent Program. The purpose of this notice is to notify all interested parties... changes to the select agent regulations; occupational health, information and physical security; personnel...

  12. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2014-01-01 2014-01-01 false Protected Critical Infrastructure Information...

  13. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2011-01-01 2011-01-01 false Protected Critical Infrastructure Information...

  14. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2010-01-01 2010-01-01 false Protected Critical Infrastructure Information...

  15. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2012-01-01 2012-01-01 false Protected Critical Infrastructure Information...

  16. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2013-01-01 2013-01-01 false Protected Critical Infrastructure Information...

  17. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  18. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  19. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  20. 45 CFR 205.56 - Requirements governing the use of income and eligibility information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) of the Social Security Act must provide that: (a) The State agency will use the information obtained... received from the Internal Revenue Service, and earnings information received from the Social Security... Federal computer matching program that is subject to the requirements in the Computer Matching and Privacy...

  1. 45 CFR 205.56 - Requirements governing the use of income and eligibility information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) of the Social Security Act must provide that: (a) The State agency will use the information obtained... received from the Internal Revenue Service, and earnings information received from the Social Security... Federal computer matching program that is subject to the requirements in the Computer Matching and Privacy...

  2. 45 CFR 205.56 - Requirements governing the use of income and eligibility information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) of the Social Security Act must provide that: (a) The State agency will use the information obtained... received from the Internal Revenue Service, and earnings information received from the Social Security... Federal computer matching program that is subject to the requirements in the Computer Matching and Privacy...

  3. 45 CFR 205.56 - Requirements governing the use of income and eligibility information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) of the Social Security Act must provide that: (a) The State agency will use the information obtained... received from the Internal Revenue Service, and earnings information received from the Social Security... Federal computer matching program that is subject to the requirements in the Computer Matching and Privacy...

  4. 45 CFR 205.56 - Requirements governing the use of income and eligibility information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) of the Social Security Act must provide that: (a) The State agency will use the information obtained... received from the Internal Revenue Service, and earnings information received from the Social Security... Federal computer matching program that is subject to the requirements in the Computer Matching and Privacy...

  5. 14 CFR 1203.300 - General.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true General. 1203.300 Section 1203.300 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM... information and material requiring protection in the interest of national security lie in the areas of applied...

  6. 14 CFR 1203.407 - Duration of classification.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 1203.407 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.407 Duration of classification. (a) Information shall be classified as long as required by national security considerations. When it can be determined, a specific...

  7. 14 CFR 1203.407 - Duration of classification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Section 1203.407 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.407 Duration of classification. (a) Information shall be classified as long as required by national security considerations. When it can be determined, a specific...

  8. 14 CFR 1203.300 - General.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false General. 1203.300 Section 1203.300 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM... information and material requiring protection in the interest of national security lie in the areas of applied...

  9. 75 FR 81284 - National Protection and Programs Directorate; National Infrastructure Advisory Council Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-27

    ... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... Directorate; National Infrastructure Advisory Council Meeting AGENCY: National Protection and Programs...

  10. 32 CFR 299.5 - Procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM.../CSS by other government agencies shall be placed in the processing queue according to the date the... placed in the queue according to the date of the requester's letter. (d) The FOIA office shall maintain...

  11. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    PubMed

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  12. 12 CFR Appendix B to Part 748 - Guidance on Response Programs for Unauthorized Access to Member Information and Member Notice

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....d. 37 See FFIEC Information Technology Examination Handbook, Information Security Booklet, (December... response program. 38 See FFIEC Information Technology Examination Handbook, Outsourcing Technology Services... accounts, while preserving records and other evidence; 40 and 40 See FFIEC Information Technology...

  13. Guia Legal para Ciudadanos Envejeciente: Leyes y Programas Afectando los Ciudadanos Envejeciente de Kansas. (Legal Guide for Senior Citizens: Laws and Programs Affecting Kansas Senior Citizens).

    ERIC Educational Resources Information Center

    Hollinger, Judith A.

    This booklet, translated into Spanish, is intended to inform (not advise) older Kansans about eligibility requirements and benefits provided by state and federal programs. Financial assistance programs discussed are Social Security, railroad retirements, veterans' benefits, unrestricted general assistance, Employee Retirement Income Security Act,…

  14. 22 CFR 9.2 - Objective.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Objective. 9.2 Section 9.2 Foreign Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.2 Objective. The objective of the Department's classification program is to ensure that national security information is protected from...

  15. 45 CFR 5.67 - Exemption six: Clearly unwarranted invasion of personal privacy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... employees; social security numbers; medical information about individuals participating in clinical research studies; names and addresses of individual beneficiaries of our programs, or benefits such individuals receive; earning records, claim files, and other personal information maintained by the Social Security...

  16. 45 CFR 5.67 - Exemption six: Clearly unwarranted invasion of personal privacy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... employees; social security numbers; medical information about individuals participating in clinical research studies; names and addresses of individual beneficiaries of our programs, or benefits such individuals receive; earning records, claim files, and other personal information maintained by the Social Security...

  17. 45 CFR 5.67 - Exemption six: Clearly unwarranted invasion of personal privacy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... employees; social security numbers; medical information about individuals participating in clinical research studies; names and addresses of individual beneficiaries of our programs, or benefits such individuals receive; earning records, claim files, and other personal information maintained by the Social Security...

  18. 45 CFR 5.67 - Exemption six: Clearly unwarranted invasion of personal privacy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... employees; social security numbers; medical information about individuals participating in clinical research studies; names and addresses of individual beneficiaries of our programs, or benefits such individuals receive; earning records, claim files, and other personal information maintained by the Social Security...

  19. 9 CFR 121.15 - Training.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... must provide information and training on biosafety and security to each individual with access approval... or entity must provide information and training on biosafety and security to each individual not... Internet at http://www.aphis.usda.gov/programs/ag_selectagent/index.html. (b) Refresher training must be...

  20. 22 CFR 9.2 - Objective.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Objective. 9.2 Section 9.2 Foreign Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.2 Objective. The objective of the Department's classification program is to ensure that national security information is protected from...

  1. 45 CFR 303.30 - Securing medical support information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Securing medical support information. 303.30 Section 303.30 Public Welfare Regulations Relating to Public Welfare OFFICE OF CHILD SUPPORT ENFORCEMENT (CHILD SUPPORT ENFORCEMENT PROGRAM), ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND...

  2. 32 CFR 236.4 - Procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...

  3. 32 CFR 236.4 - Procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...

  4. 32 CFR 236.4 - Procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...

  5. 78 FR 41943 - Agency Information Collection Activities; Trusted Traveler Programs

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-12

    ...: Trusted Traveler Programs (Global Entry, SENTRI and FAST). OMB Number: 1651-0121. Form Numbers: 823S (SENTRI) and 823F (FAST). Abstract: This collection of information is for CBP's Trusted Traveler Programs... entry at specified southwest land border ports of entry; the Free and Secure Trade Program (FAST), which...

  6. 75 FR 23223 - Multi-Agency Informational Meeting Concerning Compliance With the Federal Select Agent Program...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-03

    ...] Multi-Agency Informational Meeting Concerning Compliance With the Federal Select Agent Program; Public... Select Agent Program established under the Public Health Security and Bioterrorism Preparedness and... Roberson, Veterinary Permit Examiner, APHIS Select Agent Program, VS, ASAP, APHIS, 4700 River Road Unit 2...

  7. 75 FR 1552 - Chemical Facility Anti-Terrorism Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-12

    ... Protection Agency RMP--Risk Management Program SSP--Site Security Plan STQ--Screening Threshold Quantity SVA... Protection Agency (EPA) under the Clean Air Act's Risk Management Program (RMP) for counting-- or excluding... Safety, Information, Site Security and Fuels Regulatory Relief Act, Public Law 106-40. Cf. 72 FR 65410...

  8. 32 CFR 299.5 - Procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM § 299.5 Procedures. (a) Requests for copies of records of the NSA/CSS shall be delivered to the Director... Director of Policy, if so designated, shall endeavor to respond to a direct request to NSA/CSS within 20...

  9. 32 CFR 299.5 - Procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM § 299.5 Procedures. (a) Requests for copies of records of the NSA/CSS shall be delivered to the Director... Director of Policy, if so designated, shall endeavor to respond to a direct request to NSA/CSS within 20...

  10. 75 FR 43579 - Privacy Act of 1974; Computer Matching Program Between the Office of Personnel Management and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... safeguards for disclosure of Social Security benefit information to OPM via direct computer link for the... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office of Personnel Management and Social Security Administration AGENCY: Office of Personnel Management...

  11. 75 FR 68396 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Labor (DOL))-Match...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-05

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0052] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1003 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...

  12. 14 CFR 1203.304 - Internal effect.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.304 Internal effect. The effect of security protection on... effects and added costs inherent in a security classification must be assessed in light of the detrimental...

  13. 14 CFR 1203.304 - Internal effect.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.304 Internal effect. The effect of security protection on... effects and added costs inherent in a security classification must be assessed in light of the detrimental...

  14. 12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... risks. C. Manage and Control Risk. Each bank shall: 1. Design its information security program to... A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service...) Aggregate information, such as the mean credit score, derived from a group of consumer reports; or (B) Blind...

  15. 12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... risks. C. Manage and Control Risk. Each bank shall: 1. Design its information security program to... A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service...) Aggregate information, such as the mean credit score, derived from a group of consumer reports; or (B) Blind...

  16. 32 CFR 299.4 - Responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...

  17. 32 CFR 299.4 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...

  18. 32 CFR 299.4 - Responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...

  19. 32 CFR 299.4 - Responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...

  20. 32 CFR Appendix F to Part 286 - DoD Freedom of Information Act Program Components

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Information Systems Agency Defense Contract Audit Agency Defense Intelligence Agency Defense Security Service Defense Logistics Agency National Imagery and Mapping Agency Defense Special Weapons Agency National Security Agency Office of the Inspector General, Department of Defense Defense Finance...

  1. 77 FR 29616 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-18

    .... DCIO 01 System name: Defense Industrial Base (DIB) Cyber Security/Information Assurance Records. System location: Director, Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program, 1235 South Clark Street, Suite 1500, Arlington, VA 22202. DoD Cyber Crime Center, 911 Elkridge Landing...

  2. 32 CFR 806b.12 - Requesting the Social Security Number.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...

  3. 32 CFR 806b.12 - Requesting the Social Security Number.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...

  4. 32 CFR 806b.12 - Requesting the Social Security Number.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...

  5. 32 CFR 806b.12 - Requesting the Social Security Number.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...

  6. 32 CFR 806b.12 - Requesting the Social Security Number.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...

  7. 75 FR 19464 - Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-14

    ... for Unauthorized Access to Customer Information and Customer Notice AGENCY: Office of Thrift...: Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice... physical safeguards to: (1) Ensure the security and confidentiality of customer records and information; (2...

  8. 76 FR 71993 - Extension of Agency Information Collection Activity Under OMB Review: TSA Claims Management Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-21

    ... Information Collection Activity Under OMB Review: TSA Claims Management Program AGENCY: Transportation... Security Administration (TSA) has forwarded the Information Collection Request (ICR), Office of Management... the nature of the information collection and its expected burden. TSA published a Federal Register...

  9. Seasonal Difference in National School Lunch Program Participation and Its Impacts on Household Food Security.

    PubMed

    Huang, Jin; Kim, Youngmi; Barnidge, Ellen

    2016-11-20

    The National School Lunch Program (NSLP) is one of the most important food assistance programs in the United States to ensure children's food security and healthy development. Previous studies have offered mixed results and challenges in estimating the effects of program participation. This study assesses NSLP's effect on household food security using data from the Survey of Income and Program Participation (SIPP). SIPP collects information on food security that covers four reference months, including both summer (June, July, August) and nonsummer months. The number of summer months in these four reference months varies by SIPP rotation group. These unique features allow this study to address the potential selection bias in the research of NSLP and food security by examining a seasonal difference in program participation. The analysis found that one more summer month in the reference period increases the difference in low food security rates by about 1.5 percentage points between recipients and nonrecipients eligible for free or reduced-price lunch. Findings have important social work and health policy implications for increasing food security among low-income households with children. © 2016 National Association of Social Workers.

  10. 17 CFR 200.10 - The Commission.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false The Commission. 200.10 Section 200.10 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General Organization § 200.10...

  11. 17 CFR 200.10 - The Commission.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false The Commission. 200.10 Section 200.10 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General Organization § 200.10...

  12. 17 CFR 200.16a - Inspector General.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Inspector General. 200.16a Section 200.16a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General Organization...

  13. 17 CFR 200.10 - The Commission.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false The Commission. 200.10 Section 200.10 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General Organization § 200.10...

  14. 17 CFR 200.17 - Chief Management Analyst.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Chief Management Analyst. 200.17 Section 200.17 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General Organization...

  15. 17 CFR 200.2 - Statutory functions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management § 200.2 Statutory... such securities, it is unlawful to sell the securities in interstate commerce or through the mails... registered holding company must obtain Commission approval before it can issue and sell securities, acquire...

  16. Cyber Security--Are You Prepared?

    ERIC Educational Resources Information Center

    Newman, Scott

    2007-01-01

    During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…

  17. Fifty Years of Social Security: Past Achievements and Future Challenges. An Information Paper Prepared for Use by the Special Committee on Aging. United States Senate, Ninety-Ninth Congress, First Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Special Committee on Aging.

    This document contains six essays examining the history and impact of the social security program on America's economic and social development. "Social Security: The Cornerstone of American Social Welfare Policy," by Malcolm H. Morrison, presents brief background information on the system and discusses the basic principles of social…

  18. Statistical security for Social Security.

    PubMed

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  19. 22 CFR 9.3 - Senior agency official.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Senior agency official. 9.3 Section 9.3 Foreign Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.3 Senior agency official. The... senior agency official to direct and administer its information security program. The Department's senior...

  20. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  1. 14 CFR 1203.101 - Other applicable NASA regulations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Other applicable NASA regulations. 1203.101... PROGRAM Scope § 1203.101 Other applicable NASA regulations. (a) Subpart H of this part, “Delegation of..., “NASA Information Security Program Committee.” (c) NASA Handbook 1620.3, “NASA Physical Security...

  2. 14 CFR 1203.101 - Other applicable NASA regulations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Other applicable NASA regulations. 1203.101... PROGRAM Scope § 1203.101 Other applicable NASA regulations. (a) Subpart H of this part, “Delegation of..., “NASA Information Security Program Committee.” (c) NASA Handbook 1620.3, “NASA Physical Security...

  3. 14 CFR 1203.101 - Other applicable NASA regulations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Other applicable NASA regulations. 1203.101... PROGRAM Scope § 1203.101 Other applicable NASA regulations. (a) Subpart H of this part, “Delegation of..., “NASA Information Security Program Committee.” (c) NASA Handbook 1620.3, “NASA Physical Security...

  4. 14 CFR 1203.101 - Other applicable NASA regulations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Other applicable NASA regulations. 1203.101... PROGRAM Scope § 1203.101 Other applicable NASA regulations. (a) Subpart H of this part, “Delegation of..., “NASA Information Security Program Committee.” (c) NASA Handbook 1620.3, “NASA Physical Security...

  5. 75 FR 32833 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-09

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0077] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Office of Personnel Management (OPM))--Match 1307 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  6. 77 FR 24756 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Labor (DOL))-Match...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0084] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1003 AGENCY: Social Security... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988...

  7. 76 FR 12397 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Public Debt (BPD...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-07

    ...; Computer Matching Program (SSA/ Bureau of the Public Debt (BPD))--Match Number 1038 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection... containing SSNs extracted from the Supplemental Security Record database. Exchanges for this computer...

  8. 77 FR 6620 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/the States); Match 6000 and 6003

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-08

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0102] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ the States); Match 6000 and 6003 AGENCY: Social Security Administration..., as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...

  9. 75 FR 18251 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Internal Revenue Service (IRS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-09

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0066] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match 1305 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  10. 76 FR 12398 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Public Debt (BPD...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-07

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0034] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Bureau of the Public Debt (BPD))--Match Number 1304 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...

  11. 78 FR 12128 - Privacy Act of 1974; Computer Matching Program (SSA/Department of the Treasury, Internal Revenue...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-21

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0067] Privacy Act of 1974; Computer Matching... Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  12. Notification: Audit of EPA's Processes for Managing Background Investigations of Privileged Users and Taking Action to Remediate Weaknesses in Agency's Information Security Program

    EPA Pesticide Factsheets

    Project #OA-FY17-0139, Feb 15, 2017.The EPA OIG plans to begin preliminary research on an audit of EPA's processes for managing background investigations of privileged users and taking action to remediate weaknesses in agency's info security program.

  13. Collaborating to optimize nursing students' agency information technology use.

    PubMed

    Fetter, Marilyn S

    2009-01-01

    As the learning laboratory for gaining actual patient care experience, clinical agencies play an essential role in nursing education. With an information technology revolution transforming healthcare, nursing programs are eager for their students to learn the latest informatics systems and technologies. However, many healthcare institutions are struggling to meet their own information technology needs and report limited resources and other as barriers to nursing student training. In addition, nursing students' information technology access and use raise security and privacy concerns. With the goal of a fully electronic health record by 2014, it is imperative that agencies and educational programs collaborate. They need to establish educationally sound, cost-effective, and secure policies and procedures for managing students' use of information technology systems. Strategies for evaluating options, selecting training methods, and ensuring data security are shared, along with strategies that may reap clinical, economic, and educational benefits. Students' information technology use raises numerous issues that the nursing profession must address to participate in healthcare's transformation into the digital age.

  14. Cleared DoD Employees at Risk - Report 2 A Study of Barriers to Seeking Help

    DTIC Science & Technology

    2002-01-01

    PERSEREC examined the relationship between DoD security policy and federally mandated employee assistance programs ( EAPs ) for civilians and...counseling/referral services for military personnel to identify any barriers for cleared DoD employees to using these programs . The study, based largely on...appendices that provides background information for the interested reader on such topics as the EAP movement, military counseling/referral programs , and DoD personnel security policies and programs .

  15. 77 FR 14955 - DoD Information Assurance Scholarship Program (IASP)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-14

    ... IA and information technology (IT) management, technical, digital and multimedia forensics, cyber..., digital and multimedia forensics, electrical engineering, electronics engineering, information security...

  16. NASA Automatic Information Security Handbook

    NASA Technical Reports Server (NTRS)

    1993-01-01

    This handbook details the Automated Information Security (AIS) management process for NASA. Automated information system security is becoming an increasingly important issue for all NASA managers and with rapid advancements in computer and network technologies and the demanding nature of space exploration and space research have made NASA increasingly dependent on automated systems to store, process, and transmit vast amounts of mission support information, hence the need for AIS systems and management. This handbook provides the consistent policies, procedures, and guidance to assure that an aggressive and effective AIS programs is developed, implemented, and sustained at all NASA organizations and NASA support contractors.

  17. SSA Disability: Other Programs May Provide Lessons for Improving Return-to-Work Efforts. Testimony before the Subcommittee on Social Security, Committee on Ways and Means, House of Representatives.

    ERIC Educational Resources Information Center

    Bovbjerg, Barbara D.

    This report compares the Social Security Administration's Disability Insurance (DI) program and the practices of the private sector and other countries in helping people with severe disabilities return to work. Information was gathered in in-depth interviews and a review of policy documents and program data at three private sector disability…

  18. 75 FR 15991 - Designation of Greece for the Visa Waiver Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-31

    ... of Homeland Security, in consultation with the Secretary of State, designated Greece as a country... Security, Office of Policy, (202) 282-8732. SUPPLEMENTARY INFORMATION: I. Background A. The Visa Waiver... of Homeland Security (the Secretary), in consultation with the Secretary of State, may designate...

  19. 32 CFR 2004.11 - Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)].

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Implementation and Oversight § 2004.11 Agency...

  20. Space Shuttle security policies and programs

    NASA Astrophysics Data System (ADS)

    Keith, E. L.

    The Space Shuttle vehicle consists of the orbiter, external tank, and two solid rocket boosters. In dealing with security two major protective categories are considered, taking into account resource protection and information protection. A review is provided of four basic programs which have to be satisfied. Aspects of science and technology transfer are discussed. The restrictions for the transfer of science and technology information are covered under various NASA Management Instructions (NMI's). There were two major events which influenced the protection of sensitive and private information on the Space Shuttle program. The first event was a manned space flight accident, while the second was the enactment of a congressional bill to establish the rights of privacy. Attention is also given to national resource protection and national defense classified operations.

  1. Space Shuttle security policies and programs

    NASA Technical Reports Server (NTRS)

    Keith, E. L.

    1985-01-01

    The Space Shuttle vehicle consists of the orbiter, external tank, and two solid rocket boosters. In dealing with security two major protective categories are considered, taking into account resource protection and information protection. A review is provided of four basic programs which have to be satisfied. Aspects of science and technology transfer are discussed. The restrictions for the transfer of science and technology information are covered under various NASA Management Instructions (NMI's). There were two major events which influenced the protection of sensitive and private information on the Space Shuttle program. The first event was a manned space flight accident, while the second was the enactment of a congressional bill to establish the rights of privacy. Attention is also given to national resource protection and national defense classified operations.

  2. 12 CFR Appendix D-2 to Part 208 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... Design its information security program to control the identified risks, commensurate with the... Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the... score, derived from a group of consumer reports; or (B) Blind data, such as payment history on accounts...

  3. 12 CFR Appendix D-2 to Part 208 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .... Design its information security program to control the identified risks, commensurate with the... Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the... score, derived from a group of consumer reports; or (B) Blind data, such as payment history on accounts...

  4. 12 CFR Appendix C to Part 1720 - Policy Guidance; Safety and Soundness Standards for Information

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... implementation and reviewing reports from management. 2. Assess Risk. Each Enterprise shall: a. Identify... control risks. 3. Manage and Control Risk. Each Enterprise shall: a. Design its information security... security program. The frequency and nature of such tests should be determined by the Enterprise's risk...

  5. 76 FR 49503 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Airport Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-10

    ...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), Office of Management and Budget (OMB) control number 1652-0002, abstracted below that we will submit to OMB for renewal in compliance with the Paperwork Reduction Act (PRA). The ICR describes the nature of the information collection and its expected burden. These programs require airport operators to maintain and update records to ensure compliance with security provisions outlined in 49 CFR part 1542.

  6. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  7. Guidelines for Automatic Data Processing Physical Security and Risk Management. Federal Information Processing Standards Publication 31.

    ERIC Educational Resources Information Center

    National Bureau of Standards (DOC), Washington, DC.

    These guidelines provide a handbook for use by federal organizations in structuring physical security and risk management programs for their automatic data processing facilities. This publication discusses security analysis, natural disasters, supporting utilities, system reliability, procedural measures and controls, off-site facilities,…

  8. 28 CFR 17.46 - Access by persons outside the Executive Branch.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... subject to the National Industrial Security Program require access to classified information originated by... Branch. 17.46 Section 17.46 Judicial Administration DEPARTMENT OF JUSTICE CLASSIFIED NATIONAL SECURITY... propriety of such action, in the interest of the national security, and must approve the release. Prior to...

  9. 32 CFR 264.4 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... purposes only. 2. This information shall be accorded substantially the same degree of security protection... 413(a) of the Mutual Security Act of 1954, as amended (22 U.S.C. 1933(a)), and pursuant to the... the Mutual Security Program, to relieve the Department of Defense of administrative burdens, and to...

  10. School Safety Gets the Ax

    ERIC Educational Resources Information Center

    Eisele-Dyrli, Kurt

    2010-01-01

    A new informal federal survey has found that for many districts, budget cuts have had a profound effect on school safety and security measures. Administrators have been forced to cut safety and security staffing and programs, reorganize security departments and find alternative sources of funding in order to maintain levels of safety and security…

  11. Marketing Plan for Demonstration and Validation Assets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    The National Security Preparedness Project (NSPP), is to be sustained by various programs, including technology demonstration and evaluation (DEMVAL). This project assists companies in developing technologies under the National Security Technology Incubator program (NSTI) through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. This report documents the DEMVAL marketing and visibility plan, which will focus on collecting information about, and expanding the visibility of, DEMVAL assets serving businesses with national security technology applications in southern New Mexico.

  12. An Analysis of Federal Airport and Air Carrier Employee Access Control, Screening. and Training Regulations

    DTIC Science & Technology

    1998-03-01

    traveling public, air carriers, and persons employed by or conducting business at public airports. 14. SUBJECT TERMS Airport Security , Federal...26 4. Sterile Area 28 5. Exclusive Area 28 E. SECURITY ALERT LEVELS 29 F. AIRPORT SECURITY TOOLS 30 1. Electronic Detection System 31 a... Security Coordinator ASP Airport Security Program BIS Biometrie Identification System CCTV Closed Circuit Television CJIS Criminal Justice Information

  13. SHI(EL)DS: A Novel Hardware-Based Security Backplane to Enhance Security with Minimal Impact to System Operation

    DTIC Science & Technology

    2008-03-01

    executables. The current roadblock to detecting Type I Malware consistantly is the practice of legitimate software , such as antivirus programs, using this... Software Security Systems . . 31 3.2.2 Advantages of Hardware . . . . . . . . . . . . . 32 3.2.3 Trustworthiness of Information . . . . . . . . . 33...Towards a Hardware Security Backplane . . . . . . . . . 42 IV. Review of State of the Art Computer Security Solutions . . . . . 46 4.1 Software

  14. Software For Computer-Security Audits

    NASA Technical Reports Server (NTRS)

    Arndt, Kate; Lonsford, Emily

    1994-01-01

    Information relevant to potential breaches of security gathered efficiently. Automated Auditing Tools for VAX/VMS program includes following automated software tools performing noted tasks: Privileged ID Identification, program identifies users and their privileges to circumvent existing computer security measures; Critical File Protection, critical files not properly protected identified; Inactive ID Identification, identifications of users no longer in use found; Password Lifetime Review, maximum lifetimes of passwords of all identifications determined; and Password Length Review, minimum allowed length of passwords of all identifications determined. Written in DEC VAX DCL language.

  15. [The concept and measurement of food security].

    PubMed

    Kim, Kirang; Kim, Mi Kyung; Shin, Young Jeon

    2008-11-01

    During the past two decades, food deprivation and hunger have been recognized to be not just the concerns of only underdeveloped or developing countries, but as problems for many affluent Western nations as well. Many countries have made numerous efforts to define and measure the extent of these problems. Based on these efforts, the theory and practice of food security studies has significantly evolved during the last decades. Thus, this study aims to provide a comprehensive review of the concept and measurement of food security. In this review, we introduce the definition and background of food security, we describe the impact of food insecurity on nutrition and health, we provide its measurements and operational instruments and we discuss its applications and implications. Some practical information for the use of the food security index in South Korea is also presented. Food security is an essential element in achieving a good nutritional and health status and it has an influence to reduce poverty. The information about the current understanding of food security can help scientists, policy makers and program practitioners conduct research and maintain outreach programs that address the issues of poverty and the promotion of food security.

  16. Cox report and the US-China arms control technical exchange program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Di Capua, M S

    The ACE program furthered the national security interests of the US by promoting technical approaches to the implementation and verification of arms control treaties that the international community embraces. The Cox Committee report suggests that uncontrolled interactions were taking place between US and Chinese nuclear weapons scientists in the course of the ACE program. On the contrary, elaborate controls were in place at the very beginning and remained in place to control the interactions and protect US national security information. The ACE program payoff to national security was just beginning and its suspension, resulting from the Cox reports allegations, ismore » a setback to US-China progress on arms control.« less

  17. 77 FR 19025 - Extension of Agency Information Collection Activity Under OMB Review: Aircraft Operator Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-29

    ... appropriate automated, electronic, mechanical, or other technological collection techniques or other forms of... with TSA-approved comprehensive security programs to ensure the safety of persons and property...

  18. Analyzing the security of an existing computer system

    NASA Technical Reports Server (NTRS)

    Bishop, M.

    1986-01-01

    Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines.

  19. Safeguards and security research and development: Progress report, October 1994--September 1995

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rutherford, D.R.; Henriksen, P.W.

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IVmore » is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years.« less

  20. 32 CFR 299.2 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... request. (1) A written request for NSA/CSS records, that reasonably describes the records sought, made by... implicitly invokes 5 U.S.C. 552, as amended, 5 U.S.C. 552a, as amended, DoD 5400.7-R, or NSA/CSS Freedom of...

  1. 32 CFR 299.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... request. (1) A written request for NSA/CSS records, that reasonably describes the records sought, made by... implicitly invokes 5 U.S.C. 552, as amended, 5 U.S.C. 552a, as amended, DoD 5400.7-R, or NSA/CSS Freedom of...

  2. 32 CFR 299.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... request. (1) A written request for NSA/CSS records, that reasonably describes the records sought, made by... implicitly invokes 5 U.S.C. 552, as amended, 5 U.S.C. 552a, as amended, DoD 5400.7-R, or NSA/CSS Freedom of...

  3. A Weakest Precondition Approach to Robustness

    NASA Astrophysics Data System (ADS)

    Balliu, Musard; Mastroeni, Isabella

    With the increasing complexity of information management computer systems, security becomes a real concern. E-government, web-based financial transactions or military and health care information systems are only a few examples where large amount of information can reside on different hosts distributed worldwide. It is clear that any disclosure or corruption of confidential information in these contexts can result fatal. Information flow controls constitute an appealing and promising technology to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in the area of language-based security. Robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is unable to disclose more private information than a passive attacker, who merely observes unclassified data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from public output towards private input. The choice of semantics allows us to distinguish between different attacks models and to characterize the security of applications in different scenarios.

  4. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  5. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  6. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  7. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  8. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  9. 75 FR 28253 - Privacy Act of 1974; Notice of new System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-20

    ... certified by the National Computer Security Association. RETENTION AND DISPOSAL: System records are retained... Agency suspects or has confirmed that the security or confidentiality of information in the system of... security or integrity of this system or other systems or programs (whether maintained by GSA or another...

  10. 76 FR 20986 - Privacy Act of 1974; Notice of New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-14

    ... but are not limited to: name, social security number, addresses, phone numbers, e- mail address, birth... persons when (1) the Agency suspects or has confirmed that the security or confidentiality of information... or fraud, or harm to the security or integrity of this system or other systems or programs (whether...

  11. 77 FR 61620 - Privacy Act of 1974; Home Equity Reverse Mortgage Information Technology (HERMIT)-Notice of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-10

    ... borrowers who participate in the HECM program: Name, title, property addresses, birthdates, Social Security... submitted to the Office of Management and Budget (OMB), the Senate Committee on Homeland Security and... addresses, birthdates, Social Security Numbers, phone numbers and dates of death; case-level details on the...

  12. Information Security in the 1990s: Keeping the Locks on.

    ERIC Educational Resources Information Center

    Kovac, Ron J.

    1999-01-01

    As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…

  13. Information-Flow-Based Access Control for Web Browsers

    NASA Astrophysics Data System (ADS)

    Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu

    The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.

  14. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.

    PubMed

    Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam

    2017-01-01

    Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.

  15. 20 CFR 410.120 - Disclosure of program information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Disclosure of program information. 410.120 Section 410.120 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, TITLE IV-BLACK LUNG BENEFITS (1969- ) Introduction, General Provisions, and Definitions...

  16. How to implement security controls for an information security program at CBRN facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in anmore » easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.« less

  17. 20 CFR 402.175 - Fees for providing information and related services for non-program purposes.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... related services for non-program purposes. (a) General. Section 1106(c) of the Social Security Act permits... (including costs of duplication) of providing information and related services under section 1106(c) of the... described in paragraph (c) of this section. (c) Fee schedule. Our fee schedule for non-program related...

  18. Exploring Public Health's roles and limitations in advancing food security in British Columbia.

    PubMed

    Seed, Barbara A; Lang, Tim M; Caraher, Martin J; Ostry, Aleck S

    2014-07-22

    This research analyzes the roles and limitations of Public Health in British Columbia in advancing food security through the integration of food security initiatives into its policies and programs. It asks the question, can Public Health advance food security? If so, how, and what are its limitations? This policy analysis merges findings from 38 key informant interviews conducted with government and civil society stakeholders involved in the development of food security initiatives, along with an examination of relevant documents. The Population Health Template is used to delineate and analyze Public Health roles in food security. Public Health was able to advance food security in some ways, such as the adoption of food security as a core public health program. Public Health's leadership role in food security is constrained by a restricted mandate, limited ability to collaborate across a wide range of sectors and levels, as well as internal conflict within Public Health between Food Security and Food Protection programs. Public Health has a role in advancing food security, but it also faces limitations. As the limitations are primarily systemic and institutional, recommendations to overcome them are not simple but, rather, require movement toward embracing the determinants of health and regulatory pluralism. The results also suggest that the historic role of Public Health in food security remains salient today.

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jacobs, R

    The Physics and Advanced Technologies (PAT) Directorate was created in July 2000 by Bruce Tarter, Director of Lawrence Livermore National Laboratory (LLNL). The Director called for the new organization to execute and support programs that apply cutting-edge physics and advanced technology to develop integrated solutions to problems in national security, fusion energy, information science, health care, and other national grand challenges. When I was appointed a year later as the PAT Directorate's first Associate Director, I initiated a strategic planning project to develop a vision, mission, and long-term goals for the Directorate. We adopted the goal of becoming a leadermore » in frontier physics and technology for twenty-first-century national security missions: Stockpile Stewardship, homeland security, energy independence, and the exploration of space. Our mission is to: (1) Help ensure the scientific excellence and vitality of the major LLNL programs through its leadership role in performing basic and applied multidisciplinary research and development with programmatic impact, and by recruiting and retaining science and technology leaders; (2) Create future opportunities and directions for LLNL and its major programs by growing new program areas and cutting-edge capabilities that are synergistic with, and supportive of, its national security mission; (3) Provide a direct conduit to the academic and high-tech industrial sectors for LLNL and its national security programs, through which the Laboratory gains access to frontier science and technology, and can impact the science and technology communities; (4) Leverage unique Laboratory capabilities, to advance the state universe. This inaugural PAT Annual Report begins a series that will chronicle our progress towards fulfilling this mission. I believe the report demonstrates that the PAT Directorate has a strong base of capabilities and accomplishments on which to build in meeting its goals. Some of the highlights include: (1) Leadership of the Laboratory's Physical Data Research Program that provides fundamental physics information for the Stockpile Stewardship Program. (2) Development of the handheld Microbead Immunoassay Dipstick System that will allow relatively untrained first-responders to run sophisticated onsite diagnostics for pathogens, including those associated with biowarfare agents, by using a simple, one-step measurement. (3) Major advances in target design for inertial fusion energy research using both laser and ion-beam drivers. (4) Development of the Advanced Technology Kill Vehicle concept for use as a high-performance interceptor in a broad range of missile defense programs. Over the course of the past decade, the Laboratory has seen its major program evolve from weapons research, development, and testing, to Stockpile Stewardship. Today, the country's national security priorities are changing rapidly: nuclear security is becoming a broader set of missions, and the Laboratory is being asked to contribute to a range of new mission areas from countering bioterrorism to ensuring information security. As we embark on the twenty-first century, the new PAT Directorate is poised to help lead the Laboratory's response to the country's changing national security needs.« less

  20. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ... within that agency. Sec. 2. Policy Direction. With policy guidance from the National Security Advisor and... of other agencies and representatives of SLTPS entities, as nominated by any Committee member and...

  1. Report: FISMA - Fiscal Year 2004 Status of EPA’s Computer Security Program

    EPA Pesticide Factsheets

    Report #2004-S-00007, September 30, 2004. This report synopsizes the results of information technology security work the U.S. Environmental Protection Agency’s Office of Inspector General (OIG) performed during Fiscal Year (FY) 2004.

  2. Report: FY 2007 FISMA Report: Status of EPA’s Computer Security Program

    EPA Pesticide Factsheets

    Report #2007-S-00003, September 25, 2007. This is the Office of Inspector General’s Fiscal Year 2007 Federal Information Security Management Act Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  3. 78 FR 60821 - Request for Extension and Revision of a Currently Approved Information Collection Under the Clear...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-02

    ... Extension and Revision of a Currently Approved Information Collection Under the Clear Title Program AGENCY... ``Clear Title'' regulations as authorized by Section 1324 of the Food Security Act of 1985, as amended... . SUPPLEMENTARY INFORMATION: GIPSA administers the Clear Title Program under the Act (7 U.S.C. 1631) for the...

  4. 32 CFR Appendix A to Part 806 - References

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION AIR FORCE FREEDOM OF..., Air Force Security and Policy Review Program AFI 36-2603, Air Force Board for Correction of Military... Responsibility AFI 36-2907, Unfavorable Information File (UIF) Program AFPD 37-1, Air Force Information...

  5. 32 CFR Appendix A to Part 806 - References

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION AIR FORCE FREEDOM OF..., Air Force Security and Policy Review Program AFI 36-2603, Air Force Board for Correction of Military... Responsibility AFI 36-2907, Unfavorable Information File (UIF) Program AFPD 37-1, Air Force Information...

  6. 6 CFR 29.6 - Acknowledgment of receipt, validation, and marking.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.6 Acknowledgment of receipt, validation, and marking. (a... Program Manager's designees. (e) Validation of information. (1) The PCII Program Manager shall be... 6 Domestic Security 1 2010-01-01 2010-01-01 false Acknowledgment of receipt, validation, and...

  7. 6 CFR 29.6 - Acknowledgment of receipt, validation, and marking.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Acknowledgment of receipt, validation, and... PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.6 Acknowledgment of receipt, validation, and marking. (a... Program Manager's designees. (e) Validation of information. (1) The PCII Program Manager shall be...

  8. 6 CFR 29.6 - Acknowledgment of receipt, validation, and marking.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Acknowledgment of receipt, validation, and... PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.6 Acknowledgment of receipt, validation, and marking. (a... Program Manager's designees. (e) Validation of information. (1) The PCII Program Manager shall be...

  9. 6 CFR 29.6 - Acknowledgment of receipt, validation, and marking.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Acknowledgment of receipt, validation, and... PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.6 Acknowledgment of receipt, validation, and marking. (a... Program Manager's designees. (e) Validation of information. (1) The PCII Program Manager shall be...

  10. 6 CFR 29.6 - Acknowledgment of receipt, validation, and marking.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Acknowledgment of receipt, validation, and... PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.6 Acknowledgment of receipt, validation, and marking. (a... Program Manager's designees. (e) Validation of information. (1) The PCII Program Manager shall be...

  11. 22 CFR 125.9 - Filing of licenses and other authorizations for exports of classified technical data and...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Defense Trade Controls to the Defense Security Service of the Department of Defense in accordance with the provisions of the Department of Defense National Industrial Security Program Operating Manual (unless such... a copy of the license to the applicant for the applicant's information. The Defense Security Service...

  12. 75 FR 69693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... system will be included in the Department of Homeland Security's inventory of record systems. DATES... FURTHER INFORMATION CONTACT: For general questions please contact: Emily Andrew (703-235-2182), Privacy.... Background In accordance with the Privacy Act of 1974, 5 U.S.C. 552a, the Department of Homeland Security...

  13. 17 CFR 200.19c - Director of the Office of Compliance Inspections and Examinations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Director of the Office of Compliance Inspections and Examinations. 200.19c Section 200.19c Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General Organizatio...

  14. 78 FR 5787 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-28

    ... Act System of Records entitled ``Public Affairs Management Information System.'' This notice responds..., 2012. FOR FURTHER INFORMATION CONTACT: Mrs. Cindy Allard at (571) 372-0461. SUPPLEMENTARY INFORMATION... 4, DoD Information Security Program, Controlled Unclassified Information (CUI) requires that...

  15. 14 CFR 1203.700 - Identification.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Foreign Government Information § 1203.700 Identification. In order to qualify as foreign government information, information must fall into one of the two following categories: (a) Information provided to the United States...

  16. 14 CFR 1203.700 - Identification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Foreign Government Information § 1203.700 Identification. In order to qualify as foreign government information, information must fall into one of the two following categories: (a) Information provided to the United States...

  17. DOD Education Benefits: Further Actions Needed to Improve Oversight of Tuition Assistance Program. Testimony before the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, United States Senate. GAO-11-389T

    ERIC Educational Resources Information Center

    Scott, George A.

    2011-01-01

    This testimony discusses the Department of Defense's (DOD) oversight of its Military Tuition Assistance (TA) Program. In fiscal year 2010, the TA Program provided $531 million in tuition assistance to approximately 302,000 service members who elected to pursue off-duty postsecondary education. DOD offers these benefits to service members in order…

  18. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data.

    PubMed

    Beck, Eduard J; Gill, Wayne; De Lay, Paul R

    2016-01-01

    As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs) may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV . The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The success of programs like Universal Health Coverage, under the recently ratified Sustainable Development Goals is also contingent on the availability of personal health information for communicable and non-communicable diseases. Guidance for countries to develop and implement their own guidelines for protecting HIV-information formed the basis of identifying a number of fundamental principles, governing the areas of privacy, confidentiality and security. The use of individual-level data must balance maximizing the benefits from their most effective and fullest use, and minimizing harm resulting from their malicious or inadvertent release. These general principles are described in this paper, as along with a bibliography referring to more detailed technical information. A country assessment tool and user's manual, based on these principles, have been developed to support countries to assess the privacy, confidentiality, and security of personal health information at facility, data warehouse/repository, and national levels. The successful development and implementation of national guidance will require strong collaboration at local, regional, and national levels, and this is a pre-condition for the successful implementation of a range of national and global programs. This paper is a call for action for stakeholders in low- and middle-income countries to develop and implement such coherent policies and provides fundamental principles governing the areas of privacy, confidentiality, and security of personal health information being collected in low- and middle-income countries.

  19. 14 CFR 1203.501 - Applying derivative classification markings.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... INFORMATION SECURITY PROGRAM Derivative Classification § 1203.501 Applying derivative classification markings... classification decisions: (b) Verify the information's current level of classification so far as practicable...

  20. 14 CFR 1203.501 - Applying derivative classification markings.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION SECURITY PROGRAM Derivative Classification § 1203.501 Applying derivative classification markings... classification decisions: (b) Verify the information's current level of classification so far as practicable...

  1. 75 FR 16910 - Information Reporting Program Advisory Committee (IRPAC); Nominations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-02

    ... leadership to provide recommendations on a wide range of information reporting administration issues..., insurance companies, state tax administration, colleges and universities, securities, payroll, foreign...

  2. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning... management; and management and implementation level training in system/application life cycle management...

  3. 76 FR 14678 - Communications Unit Leader Prerequisite and Evaluation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0004] Communications Unit Leader Prerequisite... Security (DHS), National Protection and Programs Directorate (NPPD), Cybersecurity and Communications (CS&C), Office of Emergency Communications (OEC) will submit the following information collection request to the...

  4. 45 CFR 308.2 - Required program compliance criteria.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Motor Vehicles, and credit bureaus; (iii) Repeating location attempts quarterly and when new information... employment security agency, Department of motor vehicles, and credit bureaus; (ii) Repeating attempts to..., State employment security agency, unemployment data, Department of Motor Vehicles, and credit bureaus...

  5. 46 CFR 503.57 - Mandatory review for declassification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 503.57 Shipping FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security Program § 503.57 Mandatory review for declassification. (a) Information originally... describes the documents or material containing the information with sufficient specificity to enable the...

  6. 32 CFR 291.9 - For official use only (FOUO).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) FREEDOM OF INFORMATION ACT PROGRAM DEFENSE NUCLEAR AGENCY (DNA) FREEDOM OF INFORMATION ACT PROGRAM § 291.9... authorized as an anemic form of classification to protect national security interests. See DNA Instruction... papers. Records, such as notes, working papers, and drafts retained as historical evidence of DNA actions...

  7. 32 CFR 291.9 - For official use only (FOUO).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) FREEDOM OF INFORMATION ACT PROGRAM DEFENSE NUCLEAR AGENCY (DNA) FREEDOM OF INFORMATION ACT PROGRAM § 291.9... authorized as an anemic form of classification to protect national security interests. See DNA Instruction... papers. Records, such as notes, working papers, and drafts retained as historical evidence of DNA actions...

  8. 77 FR 19303 - Agency Information Collection Activities: Submission for OMB Review; Comment Request, Application...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-30

    ...--Collateral Security, FEMA Form 085-0-1, 10 hours; Application for Community Disaster Loan, FEMA Form 090-0-2... Request, Application for Community Disaster Loan (CDL) Program AGENCY: Federal Emergency Management Agency... Title: Application for Community Disaster Loan (CDL) Program. Type of information collection: Extension...

  9. Quality and security - They work together

    NASA Technical Reports Server (NTRS)

    Carr, Richard; Tynan, Marie; Davis, Russell

    1991-01-01

    This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.

  10. Defining a risk-informed framework for whole-of-government lessons learned: A Canadian perspective.

    PubMed

    Friesen, Shaye K; Kelsey, Shelley; Legere, J A Jim

    Lessons learned play an important role in emergency management (EM) and organizational agility. Virtually all aspects of EM can derive benefit from a lessons learned program. From major security events to exercises, exploiting and applying lessons learned and "best practices" is critical to organizational resilience and adaptiveness. A robust lessons learned process and methodology provides an evidence base with which to inform decisions, guide plans, strengthen mitigation strategies, and assist in developing tools for operations. The Canadian Safety and Security Program recently supported a project to define a comprehensive framework that would allow public safety and security partners to regularly share event response best practices, and prioritize recommendations originating from after action reviews. This framework consists of several inter-locking elements: a comprehensive literature review/environmental scan of international programs; a survey to collect data from end users and management; the development of a taxonomy for organizing and structuring information; a risk-informed methodology for selecting, prioritizing, and following through on recommendations; and standardized templates and tools for tracking recommendations and ensuring implementation. This article discusses the efforts of the project team, which provided "best practice" advice and analytical support to ensure that a systematic approach to lessons learned was taken by the federal community to improve prevention, preparedness, and response activities. It posits an approach by which one might design a systematic process for information sharing and event response coordination-an approach that will assist federal departments to institutionalize a cross-government lessons learned program.

  11. Geospatial Informational Security Risks and Concerns of the U.S. Air Force GeoBase Program

    DTIC Science & Technology

    2007-03-01

    multiple governmental directives such as the Government Performance and Results Act (GPRA), Paperwork Reduction Act (PRA), and Office of Management and... governments , non- governmental organizations (NGOs), universities, and commercial sector contractors (Lachman, 2006). One command noted that over...Defense, or the United States Government . AFIT/GEM/ENV/07-M1 GEOSPATIAL INFORMATIONAL SECURITY RISKS AND CONCERNS OF THE UNITED STATES

  12. Computer Security: Improvements Needed to Reduce Risk to Critical Federal Operations and Assets

    DTIC Science & Technology

    2001-11-09

    COMPUTER SECURITY Improvements Needed to Reduce Risk to Critical Federal Operations and Assets Statement of Robert F. Dacey Director, Information...Improvements Needed to Reduce Risk to Critical Federal Operations and Assets Contract Number Grant Number Program Element Number Author(s...The benefits have been enormous. Vast amounts of information are now literally at our fingertips, facilitating research on virtually every topic

  13. 76 FR 78267 - Medicare and Medicaid Programs; Quarterly Listing of Program Issuances-July Through September 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-16

    ... provisions of the Social Security Act (the Act) and Public Health Service Act. We also issue various manuals..., there is a 3-month lapse between the information available on the Web site and information covered by... notice that provided only Web links to the addenda, or provide this information on a newly- created CMS...

  14. Compatibility of Army Systems with Anthropometric Characteristics of Female Soldiers

    DTIC Science & Technology

    1997-09-01

    M, Industrial Security Manual, Section 11-19 or DoD 5200.1-R, Information Security Program Regulation, Chapter IX. For Unclassified/ Limited ...of female soldiers. Participation was limited to female soldiers whose height did not exceed 5’ 5", the 5th percentile value of male soldiers’ height...CLASSIFICATION tffcMSSIFIED 18. SECURITY CLASSIFICATION uffdLÄS^FIED 19. SECURITY CLASSIFICATION ST*—FIED 20. LIMITATION OF ABSTRACT SAR

  15. Report: Fiscal Year 2012 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    EPA Pesticide Factsheets

    Report #13-P-0032, October 26, 2012. We believe the evidence obtained provides a reasonable basis for our findings and conclusions, and in all material respects, meets the FISMA reporting requirements prescribed by OMB.

  16. 10 CFR 37.7 - Communications.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... regulations in this part may be sent as follows: (a) By mail addressed to: ATTN: Document Control Desk... Management Programs; or Director, Division of Security Policy, Office of Nuclear Security and Incident... electronic submission, for example, Electronic Information Exchange, or CD-ROM. Electronic submissions must...

  17. 46 CFR 503.57 - Mandatory review for declassification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 503.57 Shipping FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security Program § 503.57 Mandatory review for declassification. (a) Reviews and referrals in... classified information and material in possession of the Commission for declassification. All information...

  18. 76 FR 17992 - Information Reporting Program Advisory Committee (IRPAC); Nominations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ... and other IRS leadership to provide recommendations on a wide range of information reporting... universities, securities, payroll, financial institutions and other industries. DATES: Written nominations must...

  19. 17 CFR 200.13b - Director of the Office of Public Affairs, Policy Evaluation, and Research.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Director of the Office of Public Affairs, Policy Evaluation, and Research. 200.13b Section 200.13b Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General...

  20. Information Resources Management Long Range Plan, FY 1995-1999

    NASA Technical Reports Server (NTRS)

    1994-01-01

    Table of Contents: Introduction; Agency 5-Year IRM Investment Projections; Major IRM Program Accomplishments for FY 1993; Information Collection Budget; Summary of Computer Security Plans; Appendix: Acronym List.

  1. An Integrative Behavioral Model of Information Security Policy Compliance

    PubMed Central

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized. PMID:24971373

  2. An integrative behavioral model of information security policy compliance.

    PubMed

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized.

  3. Federal Personnel. Federal Agencies' Part-Time Employment Programs. Briefing Report to the Chairwoman, Task Force on Economic Security, Select Committee on Children, Youth and Families, House of Representatives.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC.

    This report provides information on permanent part-time employment programs in the federal government. It contains statistical data showing general characteristics of the federal part-time work force and information about the part-time employment programs of the Office of Personnel Management (OPM), Veterans Administration, General Services…

  4. 32 CFR 701.101 - Privacy program terms and definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... biometric records. (q) Record. Any item, collection, or grouping of information, whatever the storage media...

  5. 32 CFR 701.101 - Privacy program terms and definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... biometric records. (q) Record. Any item, collection, or grouping of information, whatever the storage media...

  6. 32 CFR 701.101 - Privacy program terms and definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... biometric records. (q) Record. Any item, collection, or grouping of information, whatever the storage media...

  7. 48 CFR 1804.470-4 - Contract clause.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Contract clause. (a) Insert the clause at 1852.204-76, Security Requirements for Unclassified Information...) Have physical or electronic access to NASA's computer systems, networks, or IT infrastructure; or (2... security program meets or exceeds the requirements of NASA Procedural Requirements (NPR) 2810.1 in effect...

  8. 48 CFR 1804.470-4 - Contract clause.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Contract clause. (a) Insert the clause at 1852.204-76, Security Requirements for Unclassified Information...) Have physical or electronic access to NASA's computer systems, networks, or IT infrastructure; or (2... security program meets or exceeds the requirements of NASA Procedural Requirements (NPR) 2810.1 in effect...

  9. 48 CFR 1804.470-4 - Contract clause.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Contract clause. (a) Insert the clause at 1852.204-76, Security Requirements for Unclassified Information...) Have physical or electronic access to NASA's computer systems, networks, or IT infrastructure; or (2... security program meets or exceeds the requirements of NASA Procedural Requirements (NPR) 2810.1 in effect...

  10. 48 CFR 1804.470-4 - Contract clause.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Contract clause. (a) Insert the clause at 1852.204-76, Security Requirements for Unclassified Information...) Have physical or electronic access to NASA's computer systems, networks, or IT infrastructure; or (2... security program meets or exceeds the requirements of NASA Procedural Requirements (NPR) 2810.1 in effect...

  11. 76 FR 63321 - U.S. Citizenship and Immigration Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-12

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services Agency Information... Program. The Department of Homeland Security, U.S. Citizenship and Immigration Services (USCIS) will be... sponsoring the collection: No Agency Form Number; File Number OMB-18. U.S. Citizenship and Immigration...

  12. 77 FR 27473 - Agency Information Collection Activities: Form I-924; Extension of an Existing Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-10

    ... Immigrant Investor Pilot Program. The Department of Homeland Security (DHS), U.S. Citizenship and... whether to revise the Application for Regional Center Under the Immigrant Investor Pilot Program, Form I-924. Should USCIS decide to revise the Application for Regional Center Under the Immigrant Investor...

  13. 76 FR 81909 - Notice of Request for Extension of a Currently Approved Information Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ..., financial feasibility determinations and loan security determinations as required by the Con Act. Estimate... Industry Loan Program. DATES: Comments on this notice must be received by February 27, 2012 to be assured... for TDD users. SUPPLEMENTARY INFORMATION: Title: Business and Industry Loan Program. OMB Number: 0570...

  14. 76 FR 50487 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-15

    ... Information (PCII) Stakeholder Survey AGENCY: National Protection and Programs Directorate, DHS. ACTION: 30... Collection Request, Protected Critical Infrastructure Information (PCII) Stakeholder Survey. DHS previously... homeland security duties. This survey is designed to gather information from PCII Officers that can be used...

  15. 16 CFR 314.3 - Standards for safeguarding customer information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Standards for safeguarding customer... OF CONGRESS STANDARDS FOR SAFEGUARDING CUSTOMER INFORMATION § 314.3 Standards for safeguarding customer information. (a) Information security program. You shall develop, implement, and maintain a...

  16. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification of information requiring protection. Classifiers shall identify the level of classification of each classified... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Identification of information requiring...

  17. NOAA - National Oceanic and Atmospheric Administration - Information

    Science.gov Websites

    Council Committees Services & Programs Freedom of Information Act (FOIA) Commerce Geospatial Resources Homeland Security and Employee Check-In Information Quality NOAA Libraries NOAALink Paperwork Reduction & Information Collection Privacy Radio Frequency Management Contact Us Staff Directory IT Workforce

  18. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification of information requiring protection. Classifiers shall identify the level of classification of each classified... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Identification of information requiring...

  19. 78 FR 16692 - Chemical Facility Anti-Terrorism Standards (CFATS)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Protection (IP), Infrastructure Security Compliance Division (ISCD) will submit the following Information... submissions of responses. FOR FURTHER INFORMATION CONTACT: CFATS Program Manager, DHS/NPPD/IP/ ISCD, [email protected

  20. 20 CFR 402.65 - Health care information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Health care information. 402.65 Section 402.65 Employees' Benefits SOCIAL SECURITY ADMINISTRATION AVAILABILITY OF INFORMATION AND RECORDS TO THE PUBLIC § 402.65 Health care information. We have some information about health care programs under titles...

Top