Operational and Policy Considerations. Glenn R. Cook Department of Information Sciences Naval Postgraduate School Monterey, CA
|
|
- Beverly Green
- 8 years ago
- Views:
Transcription
1 Identity Management: Operational and Policy Considerations Glenn R. Cook Department of Information Sciences Naval Postgraduate School Monterey, CA
2 IdM Operations and Policy Who Are You? Identifying Friend and Foe Architecture and Federation: Creating Capabilities IdM Policy: What do we do with the data? Legal and Ethical Implications of Identity Management
3 Identity Mangement Operations
4 Identity Management: Where and How? Drivers Licenses Social Security Cards CAC Passports Biometrics Clear Card Transportation Workers Identification Credential AFIS RFID Bar Codes (1D & 2D) Many sources of Identity from Different sources; who and what do We trust? t? TSA: Airport Security Coast Guard: Port Security Ops Law Enforcement tagencies Immigration and Customs Enforcement Border Patrol Material Logistics/Supply Chain DoD Operations: ESG Operations HA/DR Local National Vetting/Pay IED Forensics Maritime Interdiction Operations Anti-Piracy Efforts Access Control (Logical & Physical) Supply Chain Management
5 Who are You? Blue (Friendly) Forces Military and Civilian Employees Coalition Forces Grey (Unknown) Forces Unknown or Unverified Status Assumed friendly/assumed Unfriendly Red (Unfriendly) Forces Known to be unfriendly Identified Terrorists/Criminals Identity may change over the course of time
6 Who are You? Gray Force Identification Verification Identity Assurance based on Ability to Vet Identification Event Context Verifiable, Consistent Identity No Verifiable or consistent Identity Suspicious Circumstances Known Terrorist or criminal Question - Where does the DoD Gray Population fit?
7 Creating Credentials: DoD CAC Suitability Vetting Biometrics Bind Bind Verify Bind CAC Verify Bind PKI Certificates Verify US Citizens Foreign NAtionals SSN, NAME DOB Identity Vetting Foreign ID Biometrics Passports Affiliation To DoD Create Identifier Bind Bind DoD Personal Identity DoD EDI PI Authorization Process Identity Management Access Control Benefits Pay Logical & Physical Access
8 Sharing Data: Federation DoD Information Sharing Strategy The Department of Defense (DoD) Information Sharing Strategy provides the common vision, goals and approaches that guide the many information sharing initiatives and investments t for all of DoD. D Deliver the power of information to ensure mission success through an agile enterprise with freedom of maneuverability across the information environment. Source: Executive Office of the CIO of DOD, May 4, 2007
9 Sharing Data: Federation 1. Recognize and leverage the Information Sharing Value Chain (minimize risk to the value chain) 2. Forge Information Mobility (make information mobility seamless) Federated Data Environment 3. Make information a force multiplier (Create geometric advances in value) 4. Minimize Economic Impact of Identity Theft (minimize loss due to identify theft)
10 Sharing Data: IdM Objectives Applications IdM Objectives - Modeled Information- Sharing Identity Management Federation IMF Root ID BLUE GREY RED Cross-Domain Interoperability
11 Sharing Data: Architecture Identity Management Architecture bility ork opera amewo Inter Fra Process Architecture Data Architecture Technical Reference Architecture Policie es Governance Framework and Business Context
12 Creating Identity: Applying Policy How do we create, use, maintain and destroy credentials? Provision Propagate Use Deprovision Policy Questions: Who do we provision? To whom do we propagate? How/Where/When is the Identity Used? How often, when, how do we maintain? When/who do we deprovision? Maintain
13 IdM Concerns: Privacy The right to privacy is not explicitly mentioned in the U.S. Constitution. The right to privacy is considered implicit in the Constitution through the bill of rights (specifically the first, third, fourth, fifth and ninth amendments) and the fourteenth amendment. The Supreme Court has held that there is a fundamental right to privacy in the 14 th Amendment s due process clause Supreme Court s position on privacy has been influenced by social values and political beliefs
14 Privacy Rights (U.S. Soil) Activities that implicate the Right to Privacy Surveillance by the government Collection and retention of personal information Legally obtained personal information for improper uses. Illegally obtained personal information for legitimate purposes Absence of any reliable means to verify or contest the accuracy of personal data Retention of extensive amounts of legally obtained personal g y p information that has little or no relevance to legitimate purposes.
15 IdM: Ethical Concerns (Biometrics) Biometrics are PERSONAL data items Biometrics are not (currently) defined as SENSITIVE data Identity Management is a method for LINKING personal data (Biometric and other data) Biometrics creates associations Biometrics may reveal sensitive information when linked Biometrics, as a key, may lead to use other than intended Biometrics facilitates DIFFERENTIATION and DISCRIMINATION
16 Wrap-Up and Questions IdM concepts widely used across multiple domains Technology and Sense of Urgency have driven capabilities There are significant organizational and policy barriers to an integrated, effective DoD-wide capability Legal and Ethical issues will likely be the biggest long-term impediment to a government directed Identity Management capability
Biometrics in Identity as a Service
Daon - your trusted Identity Partner Biometrics in Identity as a Service What is BaaS and who is doing it? Catherine Tilton 28 September 2011 The Need As the world becomes more interdependent, as transactions
More informationLife After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May 2009. By Lynne Prince Defense Manpower Data Center
Life After PIV Authentication In Federated Spaces Presented to Card Tech/Secure Tech By Lynne Prince Defense Manpower Data Center Interoperability with HSPD12 Capability PIV provides a secure common credential,
More informationIdentity Management An Executive Perspective
Identity Management An Executive Perspective May 6, 2008 Presented By: Mary Dixon Director, DMDC May 2008 1 Identity Management What is it? A Process that provides a solid foundation for benefits, logical
More informationGood Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries
More informationAn Operational Architecture for Federated Identity Management
An Operational Architecture for Federated Identity Management March 2011 Implementing federated identity management and assurance in operational scenarios Federated Identity Solution The Federated identity
More information28042 Federal Register / Vol. 75, No. 96 / Wednesday, May 19, 2010 / Notices
28042 Federal Register / Vol. 75, No. 96 / Wednesday, May 19, 2010 / Notices the records are part of an on-going investigation in which case they may be retained until completion of the investigation.
More information2. APPLICABILITY AND SCOPE
Department of Defense DIRECTIVE NUMBER 1000.25 July 19, 2004 Certified Current as of April 23, 2007 USD(P&R) SUBJECT: DoD Personnel Identity Protection (PIP) Program References: (a) DoD Directive 1000.22,
More informationATTACHMENT 1 GUIDANCE ON THE USE OF THE SSN BY THE DEPARTMENT OF DEFENSE
ATTACHMENT 1 GUIDANCE ON THE USE OF THE SSN BY THE DEPARTMENT OF DEFENSE 1. OVERVIEW a. The SSN has been used as a means to efficiently identify and authenticate individuals. Expanded use of the SSN has
More informationAudio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
More informationDEPARTMENT OF HOMELAND SECURITY
DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $43.2 billion, an increase of $309 million above the 2010 enacted level. Increases were made in core homeland security functions such as border
More informationDEPARTMENT OF HOMELAND SECURITY
DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $39.5 billion, a decrease of 0.5 percent or $191 million, below the 2012 enacted level. The Budget continues strong investments in core homeland
More informationSUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon
This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02788, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
More informationIdentity and Access Management Initiatives in the United States Government
Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"
More informationDepartment of Homeland Security
Department of Homeland Security Biometrics Overview Neal Latta US-VISIT IDENT Program Manager 1 Importance of Biometric Standards in Post 9/11 Environment Dramatic Increase in Utilization of Biometric
More informationCloud SSO and Federated Identity Management Solutions and Services
Cloud SSO and Federated Identity Management Solutions and Services Achieving Balance Between Availability and Protection Discussion Points What is Cloud Single Sign-On (SSO) What is Federated Identity
More informationU.S. Coast Guard Biometric Enabled Identity Program. Provide consistent and repeatable maritime safety and security throughout our nation.
U.S. Coast Guard Biometric Enabled Identity Program Provide consistent and repeatable maritime safety and security throughout our nation. Unclassified 17 July 2012 Agenda Understanding the maritime domain
More informationPRIVACY IMPACT ASSESSMENT (PIA) For the AMAG HOMELAND SECURITY MANAGEMENT SOFTWARE ENTERPRISE EDITION (AMAG HSMS ENT)
PRIVACY IMPACT ASSESSMENT (PIA) For the AMAG HOMELAND SECURITY MANAGEMENT SOFTWARE ENTERPRISE EDITION (AMAG HSMS ENT) Department of the Navy - CNIC - NAS Jacksonville SECTION 1: IS A PIA REQUIRED? a. Will
More informationSmart Borders: Comparing the Use of New Technology in Border Controls in the US and the EU
Smart Borders: Comparing the Use of New Technology in Border Controls in the US and the EU Maegan Hendow Research Unit Tampa, FL, April 2014 Technology at border control Fingerprint scanners Databases
More informationComprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board
Comprehensive European Security Approaches: EU Security Programmes Robert HAVAS EOS Chairman of the Board INTRODUCTION the EOS Programmes rationale Why implementing EU Security Programmes / ASPIDA approach?
More informationStatus: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS
Status: Final Form Date: 30-SEP-13 Question 1: OPDIV Question 1 Answer: OS Question 2: PIA Unique Identifier (UID): Question 2 Answer: P-2277902-798208 Question 2A: Name: Question 2A Answer: Identity and
More informationIdentity and Access Management The road to sustained compliance
Identity and Access Management The road to sustained compliance Identity and Access Management An overview 1 On-boarding is the process of establishing an identity for a person, device, or system account
More informationAPPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
More informationBiometric Template Protection & Usage
Protection & Usage September 23, 2002 Colin Soutar, CTO Bioscrypt Inc. Consortium Conference (BC2002) Company Overview Definition of Terms User Identifier Protection Conclusions 2 Mytec Technologies Inc.
More informationSurveillance and Security Systems
Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems
More informationThe Leading Provider of Identity Solutions and Services in the U.S.
THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that
More informationIntegrated Security Management System (ISMS)
for the (ISMS) September 16, 2014 Contact Point David Colangelo Security Systems Division, Office of the Chief Security Officer Management Directorate (202) 447-5320 Reviewing Official Karen L. Neuman
More informationTHE LEADING EDGE OF BORDER SECURITY
THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing THE ERA OF THE MOBILE IDENTITY In an increasingly
More informationPII = Personally Identifiable Information
PII = Personally Identifiable Information EMU is committed to protecting the privacy of personally identifiable information of its students, faculty, staff, and other individuals associated with the University.
More informationPRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Naval Audit Service Information Management System (NASIMS) Department of the Navy - DON/AA - NAVAUDSVC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense
More informationPRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Army Medical Department Personnel Education and Quality System (APEQS) US Army Medical Command - Defense Health Program (DHP) Funded Application SECTION 1: IS A
More informationplantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
More informationDefending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
More informationAutomated Biometric Identification System (IDENT)
for the Automated Biometric Identification System (IDENT) DHS/NPPD/USVISIT/PIA-002 December 7, 2012 Contact Point Kenneth Gantt Assistant Director Program Integration and Mission Services Division DHS/NPPD/US-VISIT
More informationNavy Contributions to Identity Management
Navy Contributions to Identity Management CAPT John M. Boyd Director, Dept of the Navy Identity Management Capability Biometric Consortium Conference 22 September 2009 UNCLASSIFIED Applications UNCLASSIFIED
More informationHSIN R3 User Accounts: Manual Identity Proofing Process
for the HSIN R3 User Accounts: Manual Identity Proofing Process DHS/OPS/PIA-008(a) January 15, 2013 Contact Point James Lanoue DHS Operations HSIN Program Management Office (202) 282-9580 Reviewing Official
More information[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM Effective May 1, 2009 Because [FACILITY NAME] offers and maintains covered accounts, as defined by 16 C.F.R. Part 681 (the Regulations ), [FACILITY NAME]
More informationREVISION: This directive supersedes TSA MD 3700.4, Handling Sensitive Personally Identifiable Information, dated March 13, 2008.
OFFICE OF THE SPECIAL COUNSELOR Privacy TSA MANAGEMENT DIRECTIVE No. 3700.4 To enhance mission performance, TSA is committed to promoting a culture founded on its values of Integrity, Innovation and Team
More informationFEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS
FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS Homeland Security Presidential Directive 12 (HSPD 12), FIPS 201, and the latest Federal Identity,
More informationNATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
More informationPRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the DCAA Management Information System Defense Contract Audit Agency SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system or electronic
More informationAct on Background Checks
NB: Unofficial translation Ministry of Justice, Finland Act on Background Checks (177/2002) Chapter 1 General provisions Section 1 Scope of application (1) This Act applies to background checks, which
More informationUniversity Policy: Identity Theft Prevention Policy
University Policy: Identity Theft Prevention Policy Policy Category: Ethics, Integrity and Legal Compliance Policies Subject: Detection, prevention and mitigation of identity theft Office Responsible for
More information2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
More informationJourney to Peak Performance. Mountain Point. NCTA Mobility Network Agile Methodologies
Journey to Peak Performance Mountain Point NCTA Mobility Network Agile Methodologies Background 2000: Inception U.S. Army Biometric Program 2003: Biometrics could be used to prevent the enemy in Iraq and
More informationDepartment of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
More informationSupplemental Guide For Federal Contractors. September 2010. Supplemental Guide for Federal Contractors September 2010 1
Supplemental Guide For Federal Contractors September 2010 Supplemental Guide for Federal Contractors September 2010 1 TABLE OF CONTENTS 1.0 E-VERIFY FEDERAL CONTRACTOR RULE OVERVIEW... 4 1.1 BACKGROUND...
More informationBank Secrecy Act E-Filing. Privacy Impact Assessment (PIA) Bank Secrecy Act E-Filing. Version 1.5
Bank Secrecy Act E-Filing Privacy Impact Assessment (PIA) Bank Secrecy Act E-Filing Version 1.5 August13, 2014 E-Filing Privacy Impact Assessment Revision Number Change Effective Date Revision History
More informationSection 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
More informationTechnology Strategy April 2014
Technology Strategy April 2014 Contents Overview 1 Our environment 1 Why change? 2 Our vision for technology what success looks like 3 Our approach 7 Transformation shifts how will we know we have been
More informationIncreasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards
Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards September 2010 SURGE logistics- GSProgress Inc. 1000 Potomac Street NW The Flour Mill Building Washington,
More informationFor Official Use Only (FOUO)
The FEMA Mission To support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, and
More information1. The human guard at the access control entry point determines whether the PIV Card appears to be genuine and has not been altered in any way.
+ Expiration date + Agency card serial number (back of card) + Issuer identification (back of card). The PIV Card may also bear the following optional components: + Agency name and/or department + Department
More informationHuman Factors/Behavioral Sciences Division
Human Factors/Behavioral Sciences Division DHS Technology Successes and Initiatives Biometrics Consortium Conference September 21, 2010 Sharla Rausch, Ph.D. Division Director Human Factors/Behavioral Sciences
More informationIDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More informationU.S. Coast Guard. America s Maritime Guardian
U.S. Coast Guard America s Maritime Guardian Nov. 2009 A few armed vessels, judiciously stationed at the entrances of our ports, might at a small expense be made useful sentinels of the laws. Alexander
More informationPRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the TOTAL WORKFORCE MANAGEMENT SERVICES (TWMS) Department of the Navy - CNIC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system
More informationAPPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES
APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES Northern Border Activities B-1 July 2012 CBP MISSION We are the guardians of our Nation s borders. We are America s frontline.
More informationLAW OF THE REPUBLIC OF GEORGIA ON CITIZENSHIP OF GEORGIA
/unofficial translation/ LAW OF THE REPUBLIC OF GEORGIA ON CITIZENSHIP OF GEORGIA Citizenship is the stable legal relationship of a person with the state which is expressed in the totality of their mutual
More informationDEPARTMENT OF STATE PRIVACY IMPACT ASSESSMENT
DEPARTMENT OF STATE PRIVACY IMPACT ASSESSMENT Integrated Document Management and Analysis System (IDMAS) (Updated April 2008) Conducted by: Bureau of Administration Information Sharing Services Office
More informationIntroduction to The Privacy Act
Introduction to The Privacy Act Defense Privacy and Civil Liberties Office dpclo.defense.gov 1 Introduction The Privacy Act (5 U.S.C. 552a, as amended) can generally be characterized as an omnibus Code
More informationStatement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy
Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy We thank the administration for this valuable opportunity to engage in a national
More informationREPEAL OF DON T ASK, DON T TELL
FAQ EDUCATION What education will be required for Soldiers and their families when repeal occurs? Soldiers will be informed of the change in policy and expectations for behavior. Members involved in certain
More informationMerchant Mariner Licensing and Documentation System
for the Merchant Mariner Licensing and Documentation System DHS/USCG/PIA-020 March 1, 2011 Contact Point Gary Chappell MMLD Project Officer U.S. Coast Guard CG-633 (202) 372-1293 Reviewing Official Mary
More informationIdentity & Privacy Protection
Identity & Privacy Protection An Essential Component for a Federated Access Ecosystem Dan Turissini - CTO, WidePoint Corporation turissd@orc.com 703 246 8550 CyberSecurity One of the most serious economic
More informationIT Security Handbook. Incident Response and Management: Targeted Collection of Electronic Data
IT Security Handbook Incident Response and Management: Targeted Collection of Electronic Data ITS HBK 2810.09 03 Effective Date: 20110824 Expiration Date: 20130824 Responsible Office: OCIO/ Deputy CIO
More informationThe Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015
The Department of Health and Human Services Privacy Awareness Training Fiscal Year 2015 Course Objectives At the end of the course, you will be able to: Define privacy and explain its importance. Identify
More informationNationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance
Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance Christina Stephan, MD Co-Chair Liberty Alliance ehealth SIG National Library of Medicine
More informationPrivacy Impact Assessment (PIA) Consular Affairs Enterprise Service Bus (CAESB) 01.00.00. Last Updated: May 1, 2015
United States Department of State (PIA) Consular Affairs Enterprise Service Bus (CAESB) 01.00.00 Last Updated: May 1, 2015 Bureau of Administration 1. Contact Information A/GIS/IPS Director Bureau of Administration
More informationTHE WHITE HOUSE Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT S REMARKS IN LAS VEGAS, NV January 29, 2013
---------- Forwarded message ---------- From: White House Office of Communications Date: Tue, Jan 29, 2013 at 2:49 PM Subject: EMBARGOED: FACT SHEET: Fixing our Broken
More informationCATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C.
CATO HANDBOOK FOR CONGRESS POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS Washington, D.C. 13. National ID Cards and Military Tribunals Congress should resist the establishment of a national identification
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
More informationBig Data and Security: At the Edge of Prediction
Big Data and Security: At the Edge of Prediction Mark Seward Splunk Inc. Fred Wilmot Splunk Inc. Session ID: Session Classification: SPO2-T17 Intermediate The Way Cyber Adversaries Think Where is the most
More informationAIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended)
for the AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended) Contact Point Lisa S. Dean Privacy Officer Transportation Security Administration (571) 227-3947
More informationNorth Dakota Legislative Council Briefing On UASs January 23, 2014. Dr. Bruce A. Smith Dean
APPENDIX D North Dakota Legislative Council Briefing On UASs January 23, 2014 Dr. Bruce A. Smith Dean UND s Odegard School UAS Evolution 2005: Convinced the BRAC to keep the GFAFB open and Realign to UAS
More informationUnited States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)
for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy
More informationFORETHOUGHT LIFE INSURANCE COMPANY AND FORETHOUGHT NATIONAL LIFE INSURANCE COMPANY ANTI-MONEY LAUNDERING GUIDELINES FOR PRODUCERS
FORETHOUGHT LIFE INSURANCE COMPANY AND FORETHOUGHT NATIONAL LIFE INSURANCE COMPANY ANTI-MONEY LAUNDERING GUIDELINES FOR PRODUCERS Revised July 7, 2010 Which Insurance Products Are Covered By These Guidelines?
More informationUS-VISIT Five Country Joint Enrollment and Information-Sharing Project (FCC)
for the Five Country Joint Enrollment and Information-Sharing Project (FCC) November 2, 2009 Contact Point Paul Hasson, Privacy Officer Program National Protection & Programs Directorate (202) 298-5200
More informationPart 1 About your Self-Assessment Appendix Read Guidance notes, Part 1
POINTS BASED SYSTEM FORM (VAF9 MAR 2009) PERSONAL DETAILS This form is for use outside the UK only. This form is provided free of charge. READ THIS FIRST This form must be completed in blue or black ink.
More informationAlien Criminal Response Information Management System (ACRIMe) April 22, 2010
for Alien Criminal Response Information Management System (ACRIMe) April 22, 2010 Contact Point James A. Dinkins, Director Office of Investigations U.S. Immigration & Customs Enforcement (202) 732-5100
More informationData Protection Policy
Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review
More informationST. CLOUD STATE UNIVERSITY IDENTITY THEFT PREVENTION PROGRAM Effective November 1, 2009
TABLE OF CONTENTS BACKGROUND:... 2 PURPOSE:... 2 DEFINITIONS:... 2 GUIDELINES:... 3 1. Identify theft... 3 2. Changing Account Data... 3 3. Pretext Calling... 3 4. Receiving Telephone Calls:... 4 5. Receiving
More informationUS-VISIT Program, Increment 1 Privacy Impact Assessment
US-VISIT Program, Increment 1 Privacy Impact Assessment December 18, 2003 Contact Point Steve Yonkers US-VISIT Privacy Officer Department of Homeland Security (202) 298-5200 Reviewing Official Nuala O
More informationDepartment of Homeland Security Information Sharing Strategy
Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction
More informationPrivacy Impact Assessment for Threat Assessments for Access to Sensitive Security Information for Use in Litigation December 28, 2006
for Threat Assessments for Access to Sensitive Security Information for Use in Litigation December 28, 2006 Contact Point Andrew Colsky Sensitive Security Information (SSI) Office SSI@dhs.gov Reviewing
More informationTo the Men and Women of the Coast Guard:
United States Coast Guard Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance & Information Technology (C4ISR&IT) Strategic Plan Fiscal Years 2015-2019 To the Men and
More informationEnterprise Biometric Identity Services at DHS: OBIM Update and Plans AFCEA Global Identity Summit 2014 Tampa, Florida September 15-18, 2014
Enterprise Biometric Identity Services at DHS: OBIM Update and Plans AFCEA Global Identity Summit 2014 Tampa, Florida September 15-18, 2014 Acting Deputy Director Kenneth Gantt Office of Biometric Identity
More informationDEPARTMENT OF HOMELAND SECURITY
DEPARTMENT OF HOMELAND SECURITY Since 2001, the Administration: Funded over 5,700 new Border Patrol agents, and acquired nearly 7,800 new detention beds; Provided nearly $37.5 billion to State, local,
More informationDBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) 2. Name of IT System: Defense Biometric Identification System (DBIDS)
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) (Use N/A where appropriate) 1. DoD Component: Defense Manpower Data Center (DMDC) 2. Name of IT System: Defense Biometric Identification System (DBIDS) 3. Budget
More informationLake Havasu City. Identity Theft Prevention Program
Lake Havasu City Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION Lake Havasu City (City) developed this Identity Theft Prevention Program (Program) pursuant to the
More informationPrivacy Impact Assessment for TRUFONE Inmate Telephone System
Federal Bureau of Prisons Privacy Impact Assessment for TRUFONE Inmate Telephone System Issued by: Sonya D. Thompson Reviewed by: Approved by: Vance E. Hitch, Chief Information Officer, Department of Justice
More informationSTATE OF LOUISIANA STANDARD OPERATING PROCEDURE. Statewide Credentialing/Access Program. All Hazards Access
STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Statewide Credentialing/Access Program All Hazards Access STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Critical Infrastructure Owners/Operators Pilot
More informationBalancing Privacy & Security: The Role of Privacy and Civil Liberties in the Information Sharing Environment
Balancing Privacy & Security: The Role of Privacy and Civil Liberties in the Information Sharing Environment IAPP Conference 2010 Samuel P. Jenkins Director for Privacy, Defense Privacy & Civil Liberties
More informationPRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Healthcare Continuing Education and Training Enterprise Subscription Service (Swank Healthcare) US Army Medical Command - Defense Health Program (DHP) Funded Application
More informationDepartment of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE
Department of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE I. Purpose This directive establishes Department of Homeland Security (DHS) policy
More informationPolicies and Procedures: IDENTITY THEFT PREVENTION
Policies and Procedures: IDENTITY THEFT PREVENTION Section: Chapter: Policy: Compliance Administration Identity Theft Prevention I. PURPOSE The purpose of this policy is to protect patients and West Virginia
More informationAn Executive Overview of GAPP. Generally Accepted Privacy Principles
An Executive Overview of GAPP Generally Accepted Privacy Principles Current Environment One of today s key business imperatives is maintaining the privacy of your customers personal information. As business
More informationUniversity of Tennessee's Identity Theft Prevention Program
IDENTITY THEFT PREVENTION PROGRAM 1. BACKGROUND The University of Tennessee (UT) developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission s Red Flags Rule, Section 114
More informationBorder technology strategy. Chair: Mike Milford, First Assistant Secretary, Major Capability Division
Border technology strategy Chair: Mike Milford, First Assistant Secretary, Major Capability Division Session outline Using technology to improve how we manage the flow of people and goods and identify
More informationDerived credentials. NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials
Daon your trusted Identity Partner Derived Credentials A Use Case Cathy Tilton Daon 1 February 2012 Derived credentials NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials Derived credential
More informationEXPORT CONTROLS COMPLIANCE
Responsible University Official: Vice President for Research Responsible Office: Office for Export Controls Compliance Origination Date: May 1, 2014 EXPORT CONTROLS COMPLIANCE Policy Statement Northwestern
More information