Outside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service
|
|
|
- Alban Young
- 1 years ago
- Views:
Transcription
1 Outside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service February 2014
2 Training Objectives FOCI Control Procedures FOCI Visitation Electronic Communications Plan Technology Control Plan Affiliated Operations Plan Facilities Location Plan Preparing for a FOCI Assessment Reviewing Relationships with the Affiliates Subsidiary Compliance FOCI Training FOCI Records National Interest Determinations 2
3 FOCI Control Procedures All FOCI Mitigation Agreements require the establishment of the following control documents*: Visitation Procedures; Electronic Communications Plan (ECP); Technology Control Plan (TCP); Other Implementation Procedures Affiliated Operations Plan (AOP); and Facilities Location Plan (FLP) for review of potential FOCI Collocation The Government Security Committee is responsible for reviewing and approving these documents by submitting a written certification to the DSS FOCI Operations Division via the cleared company s or in-process company s Electronic Facility Clearance (e-fcl) or * These control procedures are required for all FOCI Companies even if not explicitly addressed in the mitigation agreement 3
4 FOCI Control Procedures Visitation Procedures All visits with the Affiliates must be approved in advance within the timeframe designated by the Government Security Committee FOCI Mitigation Agreements often differentiate between Visits and Routine Business Visits Visits Require advanced approval by the designated Outside Director or Proxy Holder Routine Business Visits Require advanced approval by the Facility Security Officer, and generally do not apply to Proxy Agreements unless approved by DSS Visits that pertain only to the commercial aspects of the Company s business: made in connection with the regular day-to-day business operations of the Company; do not involve Key Management Personnel or senior officials of the Affiliates; do not involve the transfer or receipt of classified information or Export Controlled Information; and do not pertain to activities bearing upon the Company s performance of its classified contracts 4
5 FOCI Control Procedures Visitation Procedures The Government Security Committee should periodically review visit requests to ensure sufficient information is provided and that visits are being approved by the correct individual Generally, visits that exceed 30 consecutive business days or cumulatively exceed 200 days in a single year require advance DSS approval Categorizing visits along the lines of DSS approved Affiliated Operations, the nature of the interactions, or other means to develop metrics can provide the Government Security Committee with significant insights into the areas of the Company s business with the greatest risk for violations to the FOCI Mitigation Agreement 5
6 FOCI Control Procedures Electronic Communications Plan Demonstrates how the FOCI Company will monitor/control electronic communications (i.e. , fax, phone) including the company s unclassified network(s) - to ensure there is no unauthorized disclosure of classified or export controlled material. Ensures the FOCI Company s unclassified network(s) is separated from the Affiliates unless approved otherwise by DSS The Government Security Committee has the right to determine if video teleconferences and teleconferences should be categorized as visits (requiring advanced approval) or subject to reporting/logs after the fact 6
7 FOCI Control Procedures Technology Control Plan Shall prescribe all security measures determined necessary to reasonably foreclose the possibility of unauthorized access to classified or export controlled information by non-u.s. citizen employees or visitors The TCP shall also establish measures to assure that access by non- U.S. citizens is strictly limited to only the information for which appropriate Federal Government disclosure authorization has been obtained. 7
8 FOCI Control Procedures Affiliated Operations Plan Business functions or teaming arrangement with Affiliates of a FOCI mitigated company are not authorized. When a company desires to engage in such arrangements with any Affiliate the services must be approved by the GSC and DSS in advance or as set forth in your FOCI Mitigation Agreement. Relationships with the Affiliates requiring advance approval include: Affiliated Services; Shared Third-Party Services (a service that will be provided by a third party service provider to both the Company or any of its Controlled Entities and any of the Affiliates)*; Shared Person; and Cooperative Commercial Arrangement* The above require approval through an Affiliated Operations Plan prior to the FOCI Company engaging in the relationship The intent of the Affiliated Operations Plan is to provide DSS and the Government Security Committee with an understanding of the operational relationship between the FOCI Company and the Affiliates to ensure risks to the performance on classified contracts are effectively mitigated *may be approved in advance by the GSC with notification to DSS 8
9 FOCI Control Procedures Affiliated Operations Plan An Affiliated Operations Plan must address: Description of the service, to include: which entity will provide the service; which entity is paying for the service; how the shared service benefits the entities; specific sub-categories of services; procedures associated with providing the service; technology to be utilized, including shared software, information systems and applications; whether the technology described above is classified or export-controlled; types of information to be exchanged through the service; whether any Key Management Personnel will be involved in the shared administrative service; and include any supporting documentation such as examples, screenshots, network configuration diagrams or sample reports as attachments Identification of risks associated with the proposed Affiliated Operation with proposed Mitigation Procedures; and Compliance review procedures and documentation. 9
10 FOCI Control Procedures Affiliated Operations Plan The Government Security Committee is responsible for: Overseeing the development and implementation of the Affiliated Operations Plan Submitting the Affiliated Operations Plan for DSS approval Ensuring no unapproved Affiliated Operations are occurring at the FOCI Company Ensuring that the FOCI Company notifies DSS of any proposed changes to an Affiliated Operations Plan prior to them occurring Certifying annually that the AOP is effectively executed and that the Affiliated Operations do not circumvent the requirements of the FOCI Mitigation Agreement Any substantive change made to an existing Affiliated Operations Plan requires approval by DSS prior to the changes being implemented The nature and extent of a Company s FOCI plays a significant role in the DSS determination on the approval of an Affiliated Operations Plan 10
11 FOCI Control Procedures Facilities Location Plan FOCI Collocation is when a FOCI Company is located within the proximity of an Affiliate, which would reasonably inhibit the company s ability to comply with the FOCI agreement. Such scenarios may include location in the same building or campus. Collocation is not authorized unless approved in advance by DSS. When a FOCI Company is located within close proximity of an Affiliate, DSS requires a Facilities Location Plan A DSS approved Facilities Location Plan establishes that FOCI Collocation is not present so long as all requirements of the FOCI Mitigation Agreement and Facilities Location Plan are met DSS identification of an unreported FOCI Collocation may negatively impact the status of the FOCI Company s Facility Security Clearance 11
12 FOCI Control Procedures Facilities Location Plan The Facilities Location Plan is the vehicle for the FOCI Company and the Government Security Committee to demonstrate to DSS that being closely located to an Affiliate does not degrade the Company s ability to comply with its FOCI Mitigation Agreement The Facilities Location Plan must: Identify organizational relationship between collocated entities (parent, affiliate, etc.) Describe the existing collocation situation & identify why the entities are collocated Identify if the arrangement is interim or permanent Identify common areas Demonstrate if effective separation of the facilities in the areas of IT systems, phone systems, access control systems, alarm systems or guards Establish mitigation measures to ensure full compliance with the FOCI Mitigation Agreement 12
13 FOCI Control Procedures Facilities Location Plan The Government Security Committee is responsible for: Overseeing the development and implementation of the Facilities Location Plan Submitting the Facilities Location Plan for DSS approval prior to the FOCI Company becoming located within close proximity to an Affiliate Ensuring no FOCI Collocation is present at any of the FOCI Company s facilities Monitoring the Facilities Location Plan to ensure all FOCI Mitigation requirements are met Ensuring the FOCI Company notifies DSS of any proposed changes to a Facilities Location Plan prior to them occurring Certifying annually that the FLP has been effectively implemented and being located in close proximity to an Affiliate has not degraded the Company s ability to comply with their FOCI Mitigation Agreement The nature and extent of a Company s FOCI are important factors in the DSS determination on the approval of a Facilities Location Plan 13
14 Preparing for a FOCI Assessment The FOCI Company should: Confirm all FOCI Control Procedures have been approved by the Government Security Committee and DSS, if required Compare the extent of the relationships with the Affiliates to determine they are within the scope of, and managed consistently with, the DSS approved FOCI Control Procedures FOCI Mitigation is unique and tailored for each individual company either through the language in the Mitigation Agreement and/or the FOCI Control Procedures Maintain a record of all DSS approvals and denials Proxy Companies are subject to an annual independent financial audit, and must provide DSS with confirmation that an audit has been completed Identify any pending requests with DSS 14
15 Preparing for a FOCI Assessment Assess the implementation of FOCI Control Procedures to ensure: Protection from Unauthorized Access of Classified Information Protection from Unauthorized Access of Controlled Unclassified Information (CUI), i.e. Export Controlled information (ITAR & EAR) Compliance with the DSS approved FOCI Control Procedures (Visitation, TCP, ECP, and, if applicable, AOP and FLP) Undue Influence: Any action taken to control or influence the FOCI Company s classified contracts, its participation in classified programs, or its corporate policies concerning the security of classified information and export controlled information. Operational Security (OPSEC)* - if any * Additional security requirements required by the Government Contracting Activity typically established in the DD Form 254 (Contract Security Classification Specification) 15
16 Reviewing Relationships with the Affiliates Level of interaction with the Foreign Parent and/or Affiliates will vary significantly Use the FOCI Control Procedures to understand the nature of each relationship with the Affiliates, i.e. Foreign Investment only Marketing Arm of their Foreign Parent or U.S. Parent Access Elsewhere/Services Firm Integrating Affiliate components into U.S. equipment Assess whether the scope and frequency of interactions are consistent with approved Affiliated Operations and other FOCI Mitigation requirements Ensure Affiliate Operations and interactions are being managed consistently with the DSS approved plans 16
17 FOCI Subsidiary Compliance The FOCI Action Plan applies to the entire FOCI Company including its subsidiaries and controlled entities as defined in the FOCI Mitigation Agreement - not just the cleared employees and cleared facilities Ensure FOCI Control Procedures are fully implemented across the entire corporation The FOCI Company should ensure that all employees understand their responsibilities under the FOCI Mitigation Agreement 17
18 FOCI Training FOCI training should ensure employees demonstrate a strong understanding of the following: The intent of FOCI Mitigation; Nature of the FOCI at the Company; Requirements levied on employees per the FOCI Control Procedures: Visitation; Technology Control Plan; ECP; and If applicable, AOP and FLP Thorough FOCI Training is a strong indicator of strong FOCI Compliance Program 18
19 FOCI Records Ensure the following are maintained for review by DSS and the Government Security Committee: Visit Logs; Contact Reports; Social Contact Reports; Phone/Fax Logs; GCA approval for use of Affiliate Technology; Board Meeting Minutes; and GSC Meeting Minutes Identify anomalies in interactions Inconsistent with normal business Did not obtain proper approval High frequency of unnecessary interactions 19
20 FOCI Records Records provide the following insights: Feel for their business Relationship with the FOCI Company s Parent(s) & Affiliates Does the FOCI Company Board run the company? How much weight do the Inside Directors carry? Feel for compliance/amount of energy/effort Identify business areas and individuals which may require greater attention from the Government Security Committee 20
21 National Interest Determinations FOCI Companies operating under Special Security Agreements require a National Interest Determination (NID) prior to being granted proscribed information Proscribed Information includes: Top Secret Communications Security (COMSEC), excluding controlled cryptographic items when unkeyed or utilized with unclassified keys Sensitive Compartmentalized Information (SCI) Restricted Data (RD) Special Access Program (SAP) To facilitate the NID process the Government Security Committee should maintain a record of all classified contracts requiring access to proscribed information and the status of the NID The FOCI Company shall promptly notify DSS when a contract requiring a NID is awarded via The FOCI Company should educate each Government Contracting Activity of the NID requirement prior to the award of a contract can help expedite the process Verify with the Government Contracting Activity that access to proscribed information is actually required 21
22 References FOCI Information FOCI Mitigation Instruments FOCI Process In-process Companies FOCI Process Acquisitions FOCI Implementation Documents NID Process Regulations 22
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service February 2014 Training Objectives DSS Agency DSS Mission
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 5220.22, Volume 3 April 17, 2014 USD(I) SUBJECT: National Industrial Security Program: Procedures for Government Activities Relating to Foreign Ownership, Control, or
Summary of Major NISPOM Changes
Summary of Major NISPOM Changes General The term contractor used throughout the NISPOM means a cleared contractor; i.e., a contractor that has been granted a facility clearance (FCL). The term company
INDUSTRIAL SECURITY. 2. (1-204) Cooperation with Contractors That Are Officially Credentialed Representatives of Federal Agencies
DEPARTMENT OF DEFENSE DEFENSE SECURITY SERVICE, INDUSTRIAL SECURITY PROGRAM OFFICE INDUSTRIAL SECURITY LETTER Industrial Security letters will be issued periodically to inform Industry, User Agencies and
Foreign Collection Methods: Indicators and Countermeasures
Foreign Collection Methods: and Most Commonly Used Collection Methods... 2 Unsolicited and Direct Requests... 3... 3... 3... 3 Suspicious Network Activity... 3... 4... 4... 4 Targeting at Seminars, Conventions,
Indian Webinar Series:
Indian Webinar Series: National Security and Other U.S. Government Regulatory Requirements for U.S. India Inbound or Outbound Sales, Joint Ventures, Mergers and Acquisitions Valerie Demont, Michael Hordell,
Selected Troublesome/Unacceptable Clauses Related to Information Release and Foreign Nationals
Selected Troublesome/Unacceptable Clauses Related to Information Release and Foreign Nationals (Note: Please review the applicable clause in the most current version available to you to ensure you have
Number: M-002 Revision: A Page 1 of 9. Traffic in Arms Regulations (ITAR) MANUAL
Page 1 of 9 THIS DOCUMENT IS CONSIDERED UNCONTROLLED UNLESS ISSUED IDENTIFIED AS CONTROLLED Page 2 of 9 REVISION HISTORY DATE CHANGE DESCRIPTION 10/21/09 Original release Approval: Robert Faia Robert Faia,
Suggested Contractor File Folder Headings
Suggested Contractor File Folder Headings 1. Facility Clearance 2. Personnel Clearances 3. Recurring Security Education 4. Self-Inspection 5. Security Correspondence 6. Standard Practice Procedures 7.
COOPER INTERCONNECT, INC. TECHNOLOGY CONTROL PLAN (TCP)
COOPER INTERCONNECT, INC. TECHNOLOGY CONTROL PLAN (TCP) I. SCOPE The procedures contained in this plan apply to all elements of Cooper Interconnect, Inc. (hereinafter referred to as Cooper Interconnect
Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS
Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS The Contractor Security Review Requirement... 2 The Self-Inspection Handbook for NISP Contractors... 2 The Elements of Inspection... 2 Self-Inspection
Webinar Questions and Answers
Webinar Questions and Answers New Facility Clearance (FCL) Sponsorship for Government Contracting Activities (GCAs) and Prime Contractors (PCs) Webinar guests submitted several questions before and during
Defense Security Service (DSS)
Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) ADMINISTRATIVE INQUIRY (AI) PROCESS JOB AID July 2011 TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 Scope... 1 2. PRELIMINARY
National Information Assurance Corporation A SBA Certified 8(a) SDB & a CVE Verified Service-Disabled Veteran-Owned Small Business
National Information Assurance Corporation A SBA Certified 8(a) SDB & a CVE Verified Service-Disabled Veteran-Owned Small Business Insight into the National Industrial Security Program (NISP) 26th Annual
DSS Electronic Facility Clearance System (e-fcl) Submission Site User Guide
U. S. Department of Defense Defense Security Service Industrial Security Program DSS Electronic Facility Clearance System (e-fcl) Submission Site User Guide June 2013 Version 7.2 1 e-fcl Submission Site
Information Security Handbook
Information Security Handbook Adopted 6/4/14 Page 0 Page 1 1. Introduction... 5 1.1. Executive Summary... 5 1.2. Governance... 5 1.3. Scope and Application... 5 1.4. Biennial Review... 5 2. Definitions...
CAYMAN ISLANDS. Supplement No. 5 published with Gazette No. 19 dated 14 September, STATEMENT OF GUIDANCE: OUTSOURCING REGULATED ENTITIES
CAYMAN ISLANDS Supplement No. 5 published with Gazette No. 19 dated 14 September, 2015. STATEMENT OF GUIDANCE: OUTSOURCING REGULATED ENTITIES Statement of Guidance: Outsourcing Regulated Entities 1. STATEMENT
CHECKLIST OF COMPLIANCE ISSUES UNDER THE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS
Thomas B. McVey Direct Dial: 202.293.8118 tmcvey@williamsmullen.com CHECKLIST OF COMPLIANCE ISSUES UNDER THE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS By: Thomas B. McVey Williams Mullen June 2, 2014 The
EXPORT CONTROLS COMPLIANCE
Responsible University Official: Vice President for Research Responsible Office: Office for Export Controls Compliance Origination Date: May 1, 2014 EXPORT CONTROLS COMPLIANCE Policy Statement Northwestern
Fortune Making AA AA AA
AA AA A B C D 2011 6 AA AA AA 26 2 0 1 1 7 AA 1. 2. 3. 4. 60 90 30 AA 10 3 AA AA 3 CGCC VISION JUL 2011 27 Verification Inspection - Threshold to Become AA Enterprise With the Measures of the General Administration
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Department of Defense INSTRUCTION. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI)
Department of Defense INSTRUCTION NUMBER 5200.01 April 21, 2016 USD(I) SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI) References: See Enclosure 1
What Every Contract Manufacturer Needs to Know About Export Compliance
A Compliance Assurance LLC White Paper P.O. Box 211415 Royal Palm Beach, FL 33421 561.641.5036 www.wearecompliant.com What Every Contract Manufacturer Needs to Know About Export Compliance By James Anzalone,
Export Management System: Technology Control Plan May, Introduction. Requirements. Signatures & Certifications. Appendices
May, 2009 Introduction Requirements Signatures & Certifications Appendices -1-6/3/2009 Introduction Overview A Technology Control Plan (TCP) outlines the procedures used by the Research Foundation (RF)
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
Physical Access Control System
for the Physical Access Control System DHS/ALL 039 June 9, 2011 Contact Point David S. Coven Chief, Access Control Branch (202) 282-8742 Reviewing Official Mary Ellen Callahan Chief Privacy Officer (703)
-Are there shareholder agreements? If yes, attach a copy(ies), and if none, so state.
Question 1: INSTRUCTIONS FOR COMPLETION OF THE CERTIFICATE PERTAINING TO FOREIGN INTERESTS a. Do any foreign person(s), directly or indirectly, own or have beneficial ownership of 5% or more of the outstanding
This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.
Department of Homeland Security Management Directives System MD Number: 11043 Issue Date: 09/17/2004 SENSITIVE COMPARTMENTED INFORMATION PROGRAM MANAGEMENT I. Purpose This directive establishes Department
Information Technology Security Policy for IBTS
Information Technology Security Policy for IBTS Pakistan Stock Exchange Limited Table of contents Information Technology Security Policy for IBTS 1- INTRODUCTION AND SCOPE... 3 2- CHARTER OF THE DOCUMENT...
2016 OCR AUDIT E-BOOK
!! 2016 OCR AUDIT E-BOOK About BlueOrange Compliance: We specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that
Case 2:13-cv-01887-ES-JAD Document 282-1 Filed 12/09/15 Page 1 of 18 PageID: 4861 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY
Case 2:13-cv-01887-ES-JAD Document 282-1 Filed 12/09/15 Page 1 of 18 PageID: 4861 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY Federal Trade Commission, Plaintiff, v. Wyndham Worldwide
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee
SMSe Privacy Impact Assessment
1. Contact Information Department of State Privacy Coordinator Margaret P. Grafeld Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information
COMPLIANCE WITH US TRADE CONTROLS LAWS
Statement of Policy COMPLIANCE WITH US TRADE CONTROLS LAWS Villanova University is committed to maintaining an open academic environment, protecting the academic freedom of its faculty and students, and
Export Control What You Need to Know
Export Control What You Need to Know What are export control regulations? US Export control regulations restrict the use of, and access to, certain sensitive or controlled technical information, materials
Obtaining a Facility Security Clearance A Pinkerton Government Services White Paper
Obtaining a Facility Security Clearance A Pinkerton Government Services White Paper Robert Maydoney Vice President Sales Pinkerton Government Services, Inc. 740 North Main Street Mansfield, MA 02048 T:
THIS IS NOT A SOLICITATION FOR PROPOSALS AND NO CONTRACT SHALL BE AWARDED.
1 This is a Sources Sought Synopsis announcement issued for the purpose of market research in accordance with Federal Acquisition Regulation (FAR) Part 10. No proposals are being requested or accepted
United States Department of State Privacy Impact Assessment Risk Analysis and Management
United States Department of State Privacy Impact Assessment Risk Analysis and Management Bureau of Administration 1. Contact Information Risk Analysis and Management (RAM) PIA Department of State Privacy
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map Prepared by: Booz Allen Hamilton Career progression within the 0080-Information/Personnel
ADMINISTRATION. 7. Current Contractor Grant# (If applicable) Agency # Fund # 8. Are outgoing sub agreements proposed on this project?
PROPOSAL CERTIFICATION (PC) FORM PAGE 1 of 5 Due Date: 07/31/2011 PDS Doc.#: 109973 Start Date: 08/01/2010 Program Project ID: Agency Code: 31001 PDS Umbrella Doc.#: ADMINISTRATION 1. Principal Investigator
CHAPTER 5 - SAFETY ASSESSMENTS, LOG OF DEFICIENCIES AND CORRECTIVE ACTION PLANS
CHAPTER 5 - SAFETY ASSESSMENTS, LOG OF DEFICIENCIES AND CORRECTIVE ACTION PLANS A. INTRODUCTION... 1 B. CHAPTER-SPECIFIC ROLES AND RESPONSIBILITIES... 1 C. SAFETY PROGRAM ASSESSMENT PROCESS... 3 D. FACILITY-MAINTAINED
TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt.
TICSA Telecommunications (Interception Capability and Security) Act 2013 Guidance for Network Operators www.gcsb.govt.nz www.ncsc.govt.nz Contents Introduction...2 Overview of the Guidance...3 Focus of
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE
Department of Defense (DoD) Lockheed Martin Security
Department of Defense (DoD) INITIAL TRAINING GUIDE Lockheed Martin Security Table of Contents Congratulations 2 Introduction 3 Reporting Requirements 4 Procedures and Duties 5 Safeguarding 6 Reproduction
CONTENTS OF COMPLIANCE PROGRAM MINIMUM REQUIREMENTS Written polices and procedures reasonably designed to document, describe, monitor, and limit all
PROGRAM REQUIREMENT Each banking entity must develop and provide for the continued administration of a compliance program reasonably designed to ensure and monitor compliance with the prohibitions and
white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations
white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations WWW.EPIQSYSTEMS.COM 800 314 5550 Mitigate Risk in Handling ediscovery Data Subject to the U.S.
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
SECURE ENTERPRISE SUPPORT MAINTENANCE PLAN
SECURE ENTERPRISE SUPPORT MAINTENANCE PLAN SUMMARY: This document describes the deliverables provided by SAP National Security Services TM (SAP NS2 TM ) under SAP Secure Enterprise Support. SIN 132-34
Department of Defense DIRECTIVE. SUBJECT: Withholding of Unclassified Technical Data From Public Disclosure
Department of Defense DIRECTIVE NUMBER 5230.25 November 6, 1984 Incorporating Change 1, August 18, 1995 USDR&E SUBJECT: Withholding of Unclassified Technical Data From Public Disclosure References: (a)
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5230.25 November 6, 1984 Administrative Reissuance Incorporating Change 1, August 18, 1995 SUBJECT: Withholding of Unclassified Technical Data From Public Disclosure
Sarbanes-Oxley Compliance for Cloud Applications
Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this
PENNSYLVANIA DEPARTMENT OF HEALTH BUREAU OF MANAGED CARE Interim APPLICATION FOR CERTIFICATION AS A UTILIZATION REVIEW ENTITY
...in pursuit of good health PENNSYLVANIA DEPARTMENT OF HEALTH BUREAU OF MANAGED CARE Interim APPLICATION FOR CERTIFICATION AS A UTILIZATION REVIEW ENTITY NOTE: Act 68 gives utilization review (UR) entities,
Practice Test Security Fundamentals Professional Certification (SFPC) Multiple Choice. Multiple-Choice Sample Question # 1
The following Practice Test presents samples of the type, difficulty, and format of questions found on the SFPC assessment. At the end of the Practice Test, a table is provided outlining the topics and
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
Information Technology Policy
ITP Number ITP-SEC024 Category Security Contact RA-ITCentral@pa.gov Information Technology Policy IT Security Incident Policy Effective Date August 2, 2012 Supersedes Scheduled Review Annual 1. Purpose
Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION
DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350-1000 SECNAVINST 5510.36A N09N2 SECNAV INSTRUCTION 5510.36A From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5230.20 June 22, 2005 USD(P) SUBJECT: Visits and Assignments of Foreign Nationals References: (a) DoD Directive 5230.20, "Visits, Assignments, and Exchanges of Foreign
BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011
BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011 Communications and Information MANAGEMENT OF PORTALS AND WEB SITES COMPLIANCE WITH THIS PUBLICATION
University of Maryland Export Compliance Program
April 6, 2015 Message from the Vice President for Research Export control is governed by a group of federal regulations intended to advance the national security, foreign policy, and economic interests
2014 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories
2014 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories Table of Contents Vulnerability Assessments... 2 Vulnerabilities... 3 NISP Enhancements... 4 1 Company Sponsored
TABLE OF CONTENTS. University of Northern Colorado
TABLE OF CONTENTS University of Northern Colorado HIPAA Policies and Procedures Page # Development and Maintenance of HIPAA Policies and Procedures... 1 Procedures for Updating HIPAA Policies and Procedures...
COUNCIL POLICY NO. C-13
COUNCIL POLICY NO. C-13 TITLE: POLICY: Identity Theft Prevention Program See attachment. REFERENCE: Salem City Council Finance Committee Report dated November 7, 2011, Agenda Item No. 3 (a) Supplants Administrative
CLASSIFICATION AND CONTROL MARKINGS SYSTEM (EFFECTIVE : 11 SEPTEMBER 2009)
INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 710 CLASSIFICATION AND CONTROL MARKINGS SYSTEM (EFFECTIVE : 11 SEPTEMBER 2009) A. AUTHORITY : The National Security Act of 1947, as amended ; Executive Order (EO)
FOR OFFICIAL USE ONLY AGREEMENT BETWEEN THE DEPARTMENT OF DEFENSE OF THE UNITED STATES OF AMERICA AND THE MINISTRY OF DEFENSE OF THE STATE OF ISRAEL
FOR OFFICIAL USE ONLY AGREEMENT BETWEEN THE DEPARTMENT OF DEFENSE OF THE UNITED STATES OF AMERICA AND THE MINISTRY OF DEFENSE OF THE STATE OF ISRAEL FOR RESEARCH, DEVELOPMENT, TEST AND EVALUATION PROJECTS
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
September 2010 Report No. 11-003
John Keel, CPA State Auditor Selected Investment Practices at the Texas Treasury Safekeeping Trust Company, the Employees Retirement System, and the Texas A&M University System Report No. 11-003 Selected
HIPAA Privacy Rule Policies
DRAFT - Policies and Procedures PRIVACY OFFICE ASSIGNMENT AND RESPONSIBILITIES APPROVED BY: SUPERCEDES POLICY: Policy #1 ADOPTED: REVISED: REVIEWED: Purpose This policy is designed to assure the establishment
INSTRUCTION. Department of Defense. NUMBER 5230.24 August 23, 2012 USD(AT&L) Distribution Statements on Technical Documents
Department of Defense INSTRUCTION NUMBER 5230.24 August 23, 2012 USD(AT&L) SUBJECT: Distribution Statements on Technical Documents References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version November 3, 2015 1. Scope and order of precedence This agreement (the Data Processing Agreement ) applies to Oracle s Processing of Personal
Middle Tennessee State University. Office of Research Services
Middle Tennessee State University Office of Research Services Procedure No.: ORS 007: Export Control Date Approved: December 08, 2011 1. INTRODUCTION: It is the intent of Middle Tennessee State University
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
CMC REQUIRED PROCEDURES
Revised: October 2014 CMC REQUIRED PROCEDURES The following information is provided as guidance for Federal Government, Contractor and Military entities authorized to send COMSEC and classified non- COMSEC
Addendum 529 (5/13) Page 1 of 5
Additional Terms and Conditions E-2D Full Rate Production (FRP) Lot 2 (Prime Contract No. N00019-13-C-9999) All of the additional terms and conditions set forth below are incorporated in and made part
2013 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories
2013 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories Table of Contents Vulnerability Assessments... 2 Vulnerabilities... 3 NISP Enhancements... 4 1 Company Sponsored
03/21/2013. Security Incident Requirements. Information Security Webinar. Administrative Announcements. Security Incident Requirements
Security Incident Requirements Information Security Webinar Security Incident Requirements Host: Lisa Rainey, SAPPC Information Security Curriculum Manager, DSS - CDSE Distinguished career-security professional
Compliance Services CONSULTING. Gap Analysis. Internal Audit
Compliance Services Gap Analysis The gap analysis is a fast track assessment to establish understanding on an organization s current capabilities. The purpose of this step is to evaluate the current capabilities
Intel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
ADDENDUM No. 1. This addendum incorporates the minutes from the pre-proposal conference held on December 21, 2015 at 1:30 p.m.
Howard Community College RFP: Campus Security Services Bid Number: 16P-004 RFP Opening Date: January 20, 2016 ADDENDUM No. 1 This addendum incorporates the minutes from the pre-proposal conference held
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2
Acquiring a Federal Government Contractor: Avoiding Pitfalls
Acquiring a Federal Government Contractor: Avoiding Pitfalls Erin L. Toomey, Foley & Lardner LLP, with Practical Law Commercial This Practice Note highlights common pitfalls to avoid in an acquisition
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
A. The following changes are made to the clause entitled, FAR and DFARS Provisions/Clauses :
Additional Terms and Conditions Basic Ordering Agreement (BOA) in Support of Supplies and Services for E-2C, E-2D, C-2, EA-6B Weapons Systems, BAMS Program and NAVICP Mechanicsburg/Philadelphia (Domestic
University of Louisiana System
Policy Number: M-(16) University of Louisiana System Title: EXPORT CONTROL Effective Date: October 26, 2009 Cancellation: None Chapter: Miscellaneous Policy and Procedures Memorandum The University of
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
EXPORT CONTROL PROCEDURES THOMAS JEFFERSON NATIONAL ACCELERATOR FACILITY
EXPORT CONTROL PROCEDURES THOMAS JEFFERSON NATIONAL ACCELERATOR FACILITY MANAGED BY SOUTHEASTERN UNIVERSITIES RESEARCH ASSOCIATION FOR THE US DEPARTMENT OF ENERGY February 2001 JEFFERSON LAB EXPORT CONTROL
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1320.14 December 11, 2013 USD(P&R) SUBJECT: Commissioned Officer Promotion Program Procedures References: See Enclosure 1 1. PURPOSE. In accordance with the authority
Using Technology Control Plans in Export Compliance. Mary Beran, Georgia Tech David Brady, Virginia Tech
Using Technology Control Plans in Export Compliance Mary Beran, Georgia Tech David Brady, Virginia Tech What is a Technology Control Plan (TCP)? The purpose of a TCP is to control the access and dissemination
2015 Security Training Schedule
2015 Security Training Schedule Risk Management Framework Course (RMF) / $1,950.00 Per Student Dates June 1-4 Location 4775 Centennial Blvd., Suite 103 / Colorado Springs, CO 80919 July 20 23 444 W. Third
Interagency Review of Foreign National Access to Export-Controlled Technology in the United States. Executive Summary
Offices of Inspector General of the Departments of Commerce, Defense, Energy, Homeland Security, and State and the Central Intelligence Agency Report No. D-2004-062 April 16, 2004 Interagency Review of
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets
HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets FULL POLICY CONTENTS Scope Policy Statement Reason for Policy Definitions ADDITIONAL DETAILS Web Address Forms Related Information
Privacy Act of 1974; Department of Homeland Security/United States Coast Guard-015. AGENCY: Privacy Office, Department of Homeland Security.
This document is scheduled to be published in the Federal Register on 07/14/2016 and available online at http://federalregister.gov/a/2016-16598, and on FDsys.gov 9110-04 DEPARTMENT OF HOMELAND SECURITY
Case 15-8 Controlling Revenue
Case 15-8c: Controlling Revenue Page 1 Case 15-8 Controlling Revenue An engagement team is planning the audit of Always Better Care Company (ABC or the Company ), an SEC registrant that develops, manufactures,
Aproved by: doron berger Data Security Manager - National Security unit
Israel Electric Corporation National Security unit Data Security Security of critical project performed by vendor abroad Aproved by: doron berger Data Security Manager - National Security unit Project
DATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
Supplier Awareness. Export Control/ ITAR
Export Control & ITAR Supplier Awareness Export Control/ ITAR THIS INFORMATION IS PROVIDED BY PAR SYSTEMS, INC. ("PAR"). PAR IS NOT A LAW FIRM, AND THE INFORMATION CONTAINED HEREIN IS NOT INTENDED TO BE
