PBGC - Risk Management and Early Warning / Legal Management
|
|
|
- Oliver Whitehead
- 10 years ago
- Views:
Transcription
1 PBGC - Risk and Early Warning / Legal Exhibit 300: Capital Asset Plan and Business Case Summary Part I: Summary Information And Justification Section A: Overview 1. Date of submission: Sep 9, Agency: Bureau: Name of this Capital Asset: PBGC - Risk and Early Warning / Legal 5. Unique Project (Investment) Identifier: What kind of investment will this be in FY2008? Mixed Life Cycle 7. What was the first budget year this investment was submitted to OMB? FY Provide a brief summary and justification for this investment, including a brief description of how this closes in part or in whole an identified agency performance gap: One of the PBGC s strategic corporate goals is to better safeguard the pension insurance system. In 2004 two new departments were created to focus resources on achieving this goal: the Department of Insurance Supervision and Compliance (DISC) and the Office of Chief Counsel (OCC). PBGC planned two coordinated systems to support these new departments: a Risk and Early Warning System (RMEWS) focused on assessing the risk posed to the insurance program by large under-funded plans and determining which plans to focus analytical and litigation resources on, and a Legal Matter System (LMMS) focused on managing the full range of legal efforts needed to support the negotiation and settlement process. As initially conceived, RMEWS would combine electronic sources of business information (e.g., Moody s, S&P, SEC) with automated business rules to greatly enhance PBGC s ability to identify and quickly react to significant risks to the insurance program. A subset of RMEWS -- the e-4010 system already supports electronic filing of financial data from companies with pension plan underfunding in excess of $50 million. This addresses a PART finding (in section 3.1): that the Corporation needs better information sooner from sponsors who cant fund their pension plans. The LMMS was to replace in OCC an existing Office of General Counsel system designed for general practice rather than OCC s more specialized bankruptcy litigation. LMMS will be a COTS package modified to OCC's unique requirements so that the limited number of in-house legal staff to effectively deal with the increasingly large volume of documents, issues, and legal actions relating to "mega-cases" such as major airline bankruptcies. Preliminary analyses have made it clear that the most important performance gap to be closed in the short-term is
2 integration between DISC and OCC. Closing this gap requires re-engineering processes in both departments, and defining common data models that will enable information to be shared quickly and completely. There are several options, ranging a single integrated COTS package for both departments to enhancing legacy systems w serving these departments. Even modified, this investment is essential to addressing the PART deficiency by improving early identification of increased exposure and significant risks involved in pending legal matters, quicker analysis of electronic plan filings and court documents, and more routine matters. 9. Did the Agency's Executive/Investment Committee approve this request? a. If "," what was the date of this approval? Apr 22, Did the Project Manager review this Exhibit? 11. Contact information of Project Manager? NameMichael Schaffner Phone Number [email protected] 12. Has the agency developed and/or promoted cost effective, energy efficient and environmentally sustainable techniques or practices for this project. a. Will this investment include electronic assets (including computers)? b. Is this investment for new construction or major retrofit of a Federal building or facility? (answer applicable to n-it assets only) answered] 1. If "," is an ESPC or UESC being used to help fund this investment? answered] 2. If "," will this investment meet sustainable design principles? answered] 3. If "," is it designed to be 30% more energy efficient than relevant code? answered] 13. Does this investment directly support one of the PMA initiatives? Expanded E-Government Financial Performance a. Briefly describe how this asset directly supports the identified initiative(s)? Supports Financial Performance by acting on a root cause of the PBGC deficit: under-funding in insured pension plans. By safeguarding the system, PBGC protects the defined-benefit pensions of American workers by ensuring that the sponsoring companies keep them adequately funded. Supports expanded E-Government through Risk s E-4010 feature, enabling practitioners to file regulatory information electronically (i.e., to e-file 4010, 4043, and distress termination requests.
3 14. Does this investment support a program assessed using the Program Assessment Rating Tool (PART)? (For more information about the PART, visit a. If "," does this investment address a weakness found during a PART review? b. If "," what is the name of the PARTed program? Pension Benefit Guaranty Corporation c. If "," what rating did the PART receive? Moderately Effective 15. Is this investment for information techlogy? For information techlogy investments only: 16. What is the level of the IT Project? (per CIO Council PM Guidance) Level What project management qualifications does the Project Manager have? (per CIO Council PM Guidance) (4) Project manager assigned but qualification status review has t yet started 18. Is this investment identified as "high risk" on the Q4 - FY 2006 agency high risk report (per OMB's "high risk" memo)? 19. Is this a financial management system? a. If "," does this investment address a FFMIA compliance area? answered] 1. If "," which compliance area: answered] 2. If "," what does it address? answered] b. If "," please identify the system name(s) and system acronym(s) as reported in the most recent financial systems inventory update required by Circular A-11 section 52 answered] 20. What is the percentage breakout for the total FY2008 funding request for the following? Hardware5 Software25 s70 Other0 21. If this project produces information dissemination products for the public, are these products published to the Internet in conformance with OMB Memorandum and included in your agency inventory, schedules and priorities? n/a 22. Contact information of individual responsible for privacy related questions: Name Philip Hertz Phone Number
4 Title Deputy General Counsel / Chief Privacy Officer [email protected] 23. Are the records produced by this investment appropriately scheduled with the National Archives and Records Administration's approval? Section B: Summary of Spending 1. Table 1: SUMMARY OF SPENDING FOR PROJECT PHASES (REPORTED IN MILLIONS) (Estimates for BY+1 and beyond are for planning purposes only and do t represent budget decisions) PY-1 and earlier PY 2006 CY 2007 BY 2008 BY BY BY BY+4 and beyond Total Planning: Acquisition: Subtotal Planning & Acquisition: Operations & Maintenance: TOTAL: Government FTE Costs should t be included in the amounts provided above. Government FTE Costs Number of FTE represented by Costs: Will this project require the agency to hire additional FTE's? a. If "", How many and in what year? answered] 3. If the summary of spending has changed from the FY2007 President's budget request, briefly explain those changes: The Risk / Early Warning and Legal Matter systems were envisioned to be comprehensive information systems based on COTS products, but requiring substantial customization, that
5 would integrate the activities of the two PBGC organizations in the fore-front of negotiating settlements with companies sponsoring troubled pension plans. To that end, the FY 2007 summary of spending included substantial funds for software acquisition, software development and systems integration. Planning activities conducted in FY 2006 with the assistance of a consultant familiar with the business activities of the two organizations indicated that such a large-scale approach to solving the problem and closing the performance gap was t prudent at this time. The consultant was engaged to identify and explore options that were available, including both the integrated COTS approach as well as a more limited approach focused on improve the usability of the systems already supporting the individual organizations. Section C: Acquisition/Contract Strategy url( /itweb/resources/app.css ); Contracts/Task Orders Table: Contract or Task Order Number PBGC-01-CT Type of Contract/Task Order Has the contract been awarded If so what is the date of the award? If t, what is the planned award date? Labor Hr Sep 15, 2006 Start date of Contract/Task Order Sep 15, 2005 End date of Contract/Task Order Sep 14, 2010 Total Value of Contract/ Task Order ($M) 1.6 Is this an Interagency Acquisition? Is it performance based? Competitively awarded? What, if any, alternative financing option is being used? Is EVM in the contract? NA
6 Does the contract include the required security & privacy clauses? Name of CO Michele Gray CO Contact information Contracting Officer Certification Level 3 If N/A, has the agency determined the CO assigned has the competencies and skills necessary to support this acquisition? Contract or Task Order Number PBGC-CT- Type of Contract/Task Order Has the contract been awarded If so what is the date of the award? If t, what is the planned award date? UNKNOWN Sep 28, 2007 Start date of Contract/Task Order Sep 28, 2007 End date of Contract/Task Order Sep 30, 2011 Total Value of Contract/ Task Order ($M) 6.5 Is this an Interagency Acquisition? Is it performance based? Competitively awarded? What, if any, alternative financing option is being used? Is EVM in the contract? Does the contract include the required security & privacy NA
7 clauses? Name of CO CO Contact information Contracting Officer Certification Level UNKNOWN UNKNOWN 3 If N/A, has the agency determined the CO assigned has the competencies and skills necessary to support this acquisition? answered] Contract or Task Order Number GS35F4594G Type of Contract/Task Order Has the contract been awarded If so what is the date of the award? If t, what is the planned award date? Labor Hour Oct 1, 2004 Start date of Contract/Task Order Oct 1, 2004 End date of Contract/Task Order Sep 30, 2009 Total Value of Contract/ Task Order ($M) 2 Is this an Interagency Acquisition? Is it performance based? Competitively awarded? What, if any, alternative financing option is being used? Is EVM in the contract? Does the contract include the required security & privacy clauses? NA
8 Name of CO CO Contact information Contracting Officer Certification Level UNKNOWN UNKNOWN 3 If N/A, has the agency determined the CO assigned has the competencies and skills necessary to support this acquisition? answered] 2. If earned value is t required or will t be a contract requirement for any of the contracts or task orders above, explain why: PBGC's application of EVM is limited to development projects budgeted for $500,000 or more. 3. Do the contracts ensure Section 508 compliance? a. Explain why: Section 508 compliance is a mandatory requirement of all PBGC contracts, and will be for these systems. Among the mandatory technical requirements will be: provide an application interface that complies with the software application standards required by Section 508 of the Rehabilitation Act, as detailed in 36 CFR 1194, Subpart B. PBGC reviews contractor test plans for completeness, and for traceability back to requirements. During testing, Section 508 compliance will be tested and assured. 4. Is there an acquisition plan which has been approved in accordance with agency requirements? a. If "," what is the date? Sep 17, 2006 b. If "," will an acquisition plan be developed? 1. If "," briefly explain why: answered] Section D: Performance Information Performance Information Table 1: Fisca l Year Strategic Goal(s) Supported Performa nce Measure Actual/baseline (from Previous Year) Planned performance Metric (Target) Performance Metric Results (Actual) There are performance goals.
9 Performance Information Table 2: Fisc Measure Measurement al ment Area Year Grouping Measurement Indicator Bas elin e Planned Improvement to the Baseline Actual Result s 2006 Mission and Business Results Productivi ty Number of settlements reached TBD 2006 Customer Results Timelines s Days to respond to minimum funding waiver applications for IRS TBD 2006 Processes and Activities Cycle Time Days to process reportable events TBD 2006 Techlogy Reliabilit y Number of errors found in financial statement audit 20-5 TBD 2007 Mission and Business Results Productivi ty Number of settlements reached TBD 2007 Customer Results Timelines s Days to respond to minimum funding waiver applications for IRS TBD 2007 Processes and Activities Cycle Time Days to process reportable events TBD 2007 Techlogy Reliabilit y Number of errors found in financial statement audit 15-5 TBD 2008 Mission and Business Results Productivi ty Number of settlements reached TBD 2008 Customer Results Timelines s Days to respond to minimum funding waiver applications for IRS TBD 2008 Techlogy Reliabilit y Number of errors found in financial statement audit 10-2 TBD 2008 Processes and Activities Cycle Time Days to process reportable events TBD
10 2009 Mission and Business Results Productivi ty Number of settlements reached TBD 2009 Customer Results Timelines s Days to respond to minimum funding waiver applications for IRS TBD 2009 Processes and Activities Cycle Time Days to process reportable events 45 0 TBD 2009 Techlogy Reliabilit y Number of errors found in financial statement audit 5 3 TBD Section E: Security and Privacy 1. Have the IT security costs for the system(s) been identified and integrated into the overall costs of the investment: a. If "," provide the "Percentage IT Security" for the budget year: 2 2. Is identifying and assessing security and privacy risks a part of the overall risk management effort for each system supporting or part of this investment. 3. Systems in Planning - Security Table: Name of System Agency/ or Contractor Operated System? Planned Operational Date Planned or Actual C&A Completion Date Risk / Early Warning Legal Matter Government Only Oct 1, 2008 Sep 15, 2008 Government Only Oct 1, 2008 Sep 15, Operational Systems - Security Table: Name of Syste m Agency/ or Contractor Operated System? NIST FIPS 199 Risk Impact Has C&A been Completed, using NIST Date C& A Com What standards were used for the Security Controls tests? Date Complete(d) : Security Control Date the contingen cy plan tested
11 level ? plete Testing Legal Manag Government Moderate ement Only System Mar FIPS 200 / NIST 5, Dec 23, 2003 Aug 12, Have any weaknesses, t yet remediated, related to any of the systems part of or supporting this investment been identified by the agency or IG? a. If "," have those weaknesses been incorporated into the agency's plan of action and milestone process? 6. Indicate whether an increase in IT security funding is requested to remediate IT security weaknesses? a. If "," specify the amount, provide a general description of the weakness, and explain how the funding request will remediate the weakness. Yes, a request of $2.7 million was requested but t approved, pending further information. OMB's approval is pending further information. Of that $2.7 million, $1.5 million was requested to make various improvements to PBGC's enterprisewide information security program and to complete eight additional C&As during FY2007. The remainder of the request related to smart cards, data encryption and two-factor authentication. Additionally, during January 2007, PBGC management will begin a strategic review of security requirements and funding, in order to decide the funding schedule and possible funding sources for the improvements and C&As needed. PBGC has made substantial progress by hiring a third party Information Security vendor to assist in developing an effective Risk Program and performing Independent Validation and Verification (IV&V) on new and in progress C&A efforts. While in this role, the Vendor also performed a gap analysis comparing PBGC s security program to all OMB, NIST Special Publications, and FISMA information security guidelines, and then mapped them back to PBGC s information security reportable condition. This analysis served as a baseline for planned Risk activities upgrading PBGC s security program to include Risk and Certification and Accreditation. The IV&V vendor is also assisting PBGC in developing system specific/ enterprise-level Security Plans of Action and Milestones. The systems listed in this investment have been certified and accredited as listed. PBGC will re-certify the systems listed, each one receiving a C&A as prioritized and aligned with the strategic planning process scheduled from January to April How are contractor security procedures monitored, verified, and validated by the agency for the contractor systems above? Not applicable, PBGC believes: ne of these systems will be operated outside of PBGC control
12 8. Planning & Operational Systems - Privacy Table: Name of Syste m Is this a new syst em? Is there a Privacy Impact Assessment (PIA) that covers this system? Is the PIA available to the public? Is a System of Records Notice (SORN) required for this system? Was a new or amended SORN published in FY 06? Risk Manag ement / Early Warnin g Legal Matter Manag ement Legal Manag ement System 3. No, because the 2. No, because a system does t contain, PIA is t yet process, or transmit personal identifying information. required to be completed at this time. 3. No, because the 2. No, because a system does t contain, PIA is t yet process, or transmit personal identifying information. required to be completed at this time. 3. No, because the 2. No, because a system does t contain, PIA is t yet process, or transmit personal identifying information. required to be completed at this time. 5. No, because the system is t a Privacy Act system of records. 5. No, because the system is t a Privacy Act system of records. 5. No, because the system is t a Privacy Act system of records. E Yes. 1. Yes. 3. No, because the existing Privacy Act system of records was t substantially revised in FY 06. Section F: Enterprise Architecture (EA) 1. Is this investment included in your agency's target enterprise architecture? a. If "," please explain why? answered] 2. Is this investment included in the agency's EA Transition Strategy? a. If "," provide the investment name as identified in the Transition Strategy provided in the agency's most recent annual EA Assessment. Risk Early Warning Systems & Legal Matter System b. If "," please explain why? answered]
13 3. Reference Model (SRM) Table : Agency Compo nent Name Agency Description FEA SRM Type FEA SRM Com Compone pone nt nt Nam e Reused UPI Internal or External Reuse? BY Fundin g Percen tage SAS Statistical modeling for DOL 5500 data Data Manage ment Data Exchange answ ered] answere d] No Reuse 100 PIMS Pension insurance modeling and simulation Analysis and Statistic s Meta Data Managem ent answ ered] answere d] No Reuse 100 CHAM PS Financial and actuarial management system for risk identification and valuation Investm ent Manage ment Strategic Planning answ answere and Mgmt ered] d] No Reuse 100 CHAM PS Financial and actuarial management system for risk identification and valuation Manage ment of Sales and answ answere Processe Marketing ered] d] s No Reuse 100 IPS Imaging Processing System for document storage and retrieval Docume nt Manage ment Document Imaging and OCR answ ered] Internal 0 Legal Manage ment Suite Legal case processing and document management Routing and Scheduli ng Case Managem ent answ ered] answere d] No Reuse 100 CAS Case Administration for plan terminations Trackin g and Workflo w Case Managem ent answ ered] Internal 0
14 4. Technical Reference Model (TRM) Table: FEA SRM FEA TRM Area FEA TRM Category FEA TRM Standard Specification Network Business Logic Software Configuration.Net / Windows 2000 Case Business Logic Platform Independent Java / Linux Data Exchange Data Interchange Data Exchange XML/SOAP Data Integration Data Database Connectivity JDBC/ADO.NET Content Publishing and Delivery Presentation / Dynamic Server- Interface Side Display ASP.NET Content Publishing and Delivery Presentation / Static Display Interface HTML Content Publishing and Delivery Presentation / Dynamic Server- Interface Side Display JSP/JSF Content Publishing and Delivery Presentation / Content Interface Rendering HTML Identification and Authentication Security Certificates / Digital Signatures SSL Identification and Authentication Security Supporting Security s WS Security Computers / Access Channels Web Browser IE 6.0
15 Network Delivery Channels Extranet TCP/IP Network Delivery Channels Internet TCP/IP Network Delivery Channels Intranet TCP/IP Identification and Authentication Requirement s Authentication / Single Sign-on Oracle Internet Directory / Active Directory Procurement Requirement s Legislative / Compliance Section 508 Computers / Requirement s Hosting Internal Network Transport Transport HTTP, HTTPS Network Transport Supporting Network s DHCP Network Transport Supporting Network s DNS Network Transport Transport TCP/IP Enterprise Application Integration Interface and Integration Integration Enterprise Application Integration Oracle BPEL Enterprise Application Integration Interface and Integration Integration Middleware PLSQL, Net8 Enterprise Application Integration Interface and Integration Interface Description / Interface WSDL, API Data Exchange Interoperabili ty Data Format / Classification XML
16 Data Exchange Interface and Integration Interoperabili ty Data Types / Validation XML Schema Computers / Database / Storage Database MS SQL Server Computers / Database / Storage Database Oracle Document Imaging and OCR Database / Storage Database FileNet, Optical Image Storage Computers / Delivery Servers Application Servers Oracle 10gAS,.NET Computers / Delivery Servers Web Servers Oracle 10gAS, IIS Computers / Hardware / Servers / Infrastructure Computers Enterprise server Computers / Hardware / Wide Area Infrastructure Network (WAN) Frame Relay Computers / Hardware / Local Area Infrastructure Network (LAN) Ethernet Software Development Software Engineering Integrated Development Environment Oracle JDeveloper Software Development Software Engineering Modeling All Fusion, Oracle JDeveloper Software Development Software Engineering Test Mercury Interactive Configuration Software Engineering Software Configuration Peregrine, PVCS Version Manager
17 Computers / Support Platforms Platform Dependent Windows 2000/2003, Windows.NET Computers / Support Platforms Platform Independent Linux 5. Will the application leverage existing components and/or applications across the Government (i.e., FirstGov, Pay.Gov, etc)? a. If "," please describe. answered] 6. Does this investment provide the public with access to a government automated information system? a. If "," does customer access require specific software (e.g., a specific web browser version)? 1. If "," provide the specific product name(s) and version number(s) of the required software and the date when the public will be able to access this investment by any software (i.e. to ensure equitable and timely access of government information and services). No specific software required. Part II: Planning, Acquisition And Performance Information Section A: Alternatives Analysis 1. Did you conduct an alternatives analysis for this project? a. If "," provide the date the analysis was completed? Apr 22, 2005 b. If "," what is the anticipated date this analysis will be completed? answered] c. If analysis is planned, please briefly explain why: answered] 2. Alternatives Analysis Results: Alter native Analy zed Description of Alternative Risk Adjusted Lifecycle Costs estimate Risk Adjusted Lifecycle Benefits estimate Baseli ne Status quo Altern Use of COTS for each system, with modest configuration
18 ative #1 and customization to meet the unusual business needs. Includes conducting a complete BPR in both major business units, a gap analysis, development of high-level specifications, performing market research, developing an RFP, and designing, developing and testing the new system. Also include would be the development of new interfaces to other PBGC systems. The new system would automate workflows - including approval and authorization routing Altern ative #2 This alternative is a custom-built RMEW / LMM, delivering the same services and the same benefits Which alternative was selected by the Agency's Executive/Investment Committee and why was it chosen? Alternative #1 was chosen, both for its lower estimated cost and its use of COTS. However, during the planning phase, an assessment of the current systems supporting these business activities was conducted, but as of 9/5/2006 has t been finalized. This assessment looked at the immediate business needs of the organizations for which RMEW and LMM were targeted, and will pose choices to management as to how to proceed. Those choices will be made in Q1 FY What specific qualitative benefits will be realized? As w envisioned for the nearterm, this investment will significantly improve communication between the business units that are engaged in safeguarding the pension insurance system. It will enable them to better share information, use a common data model to describe and track the work that they do, and give the managers in each business unit a much better organizational view of priorities, and allow more effective team assignments to be made by each. Section B: Risk 1. Does the investment have a Risk Plan? a. If "," what is the date of the plan? answered] b. Has the Risk Plan been significantly changed since last year's submission to OMB? answered] c. If "," describe any significant changes: answered] 2. If there currently is plan, will a plan be developed? a. If "," what is the planned completion date? Mar 31, 2007 b. If "," what is the strategy for managing the risks? answered] 3. Briefly describe how investment risks are reflected in the life cycle cost estimate and investment schedule: A Risk Plan is currently under development with an anticipated completion date of 03/31/2007. The Risk Early Warning / Legal Matter project manager will work within the allocated budget to determine activities that can be supported for the year. The budget will be
19 divided into areas of support, which will be aligned with the project schedule. The schedule will track activities relating to risk, specifically: MOUs and ISAs, OMB reporting, application and data releases, partner working groups and meetings, and overall project management. Each of Risk Early Warning / Legal Matter fiscal year goals will be tracked in the project schedule so as to ensure on-time and on-budget delivery. The investment's scope, schedule, and cost will be reviewed and baseline through the initiative's oversight and governance procedures. In addition, the milestones will be reported to OMB through the OMB Dashboard and Milestone reporting process. The tasks' scope and completion are validated, and the cost and schedule are tracked using earned value management. Section B of this Exhibit 300 will be included in the enterprise plans of actions of milestones (POA&M). Section C: Cost and Schedule Performance 1. Does the earned value management system meet the criteria in ANSI/EIA Standard - 748? 2. Answer the following questions about current cumulative cost and schedule performance. The numbers reported below should reflect current actual information. (Per OMB requirements Cost/Schedule Performance information should include both Government and Contractor Costs): a. What is the Planned Value (PV)? 3.8 b. What is the Earned Value (EV)? 0 c. What is the actual cost of work performed (AC)? 0 d. What costs are included in the reported Cost/Schedule Performance information (Government Only/Contractor Only/Both)? Contractor Only e. "As of" date: Sep 30, What is the calculated Schedule Performance Index (SPI= EV/PV)? 0 4. What is the schedule variance (SV = EV-PV)? 0 5. What is the calculated Cost Performance Index (CPI = EV/AC)? 0 6. What is the cost variance (CV = EV-AC)? 0 7. Is the CV% or SV% greater than ± 10%? (CV%= CV/EV x 100; SV%= SV/PV x 100) a. If "," was it the? answered] b. If "," explain the variance: answered] c. If "," what corrective actions are being taken? answered] d. What is most current "Estimate at Completion"? Have any significant changes been made to the baseline during the past fiscal year? a. If "," when was it approved by OMB? As far as is kwn, baseline changes have t been approved.
20 9. Comparison of Initial Baseline and Current Approved Baseline: Description of Milestone Initial Baseline Planned Completio n Date Total Cost ($M) Estimated Current Baseline Completion Date Planned/Act ual Total Cost ($M) Planned/ Actual Current Baseline Variance Schedule/C ost (# days/$m) Percen t Compl ete LMMS Market Nov 30, Research / Alternatives 2005 Analysis 0.2 Nov 30, 2006 answe red] RMEWS Market Dec 30, Research / Alternatives 2005 Analysis 0.3 Nov 30, 2006 answe red] RMEWS Development Mar 30, Sep 30, 2008 answe red] 2.3 answe red] LMMS Development Jan 31, Sep 30, 2008 answe red] 2.3 answe red]
PBGC - Risk Management Early Warning / Legal Matter
OMB Exhibit 3 Budget Year 29 PBGC - Risk Early Warning / Legal Matter PBGC - Risk Early Warning / Legal Matter [redacted] Agency: 12 Exhibit 3: Capital Asset Plan Case Summary Part I: Summary Information
014-00-01-01-01-1146-00. Mixed Life Cycle FY2002
Consolidated American System (CAPPS) and Interagency e Migration Exhibit 300: Part I: Summary Information and Justification (All Capital Assets) I.A. Overview 1. Date of Submission: 2. Agency: Department
Exhibit 300: Capital Asset Plan and Business Case Summary PART I: SUMMARY INFORMATION AND JUSTIFICATION (All Capital Assets)
Exhibit 300: Capital Asset Plan and Business Case Summary PART I: SUMMARY INFORMATION AND JUSTIFICATION (All Capital Assets) Section A: Overview (All Capital Assets) 1. Date of Submission: 09/08/2006 2.
Exhibit 300: Capital Asset Plan and Business Case Summary PART I: SUMMARY INFORMATION AND JUSTIFICATION (All Capital Assets)
Exhibit 300: Capital Asset Plan and Business Case Summary PART I: SUMMARY INFORMATION AND JUSTIFICATION (All Capital Assets) Section A: Overview (All Capital Assets) 1. Date of Submission: 09/08/2006 2.
Exhibit 300: Exhibit 300 - Electronic Medical Record (EMR) (Revision 11) 4. Name of this Capital Asset: Exhibit 300 - Electronic Medical Record (EMR)
Exhibit 300: Capital Asset Plan and Case Summary Part I: Summary Information And Justification (All Capital Assets) Section A: Overview (All Capital Assets) 1. Date of Submission: 4/10/2009 2. Agency:
Exhibit 300: Capital Asset Plan and Business Case Summary PART I: SUMMARY INFORMATION AND JUSTIFICATION (All Capital Assets)
Exhibit 300: Capital Asset Plan and Business Case Summary PART I: SUMMARY INFORMATION AND JUSTIFICATION (All Capital Assets) Section A: Overview (All Capital Assets) 1. Date of Submission: 09/08/2007 2.
PART ONE OVERVIEW. ESMD - Integrated Collaborative Environment
Exhibit 300 (BY2010) PART ONE OVERVIEW 1. Date of Submission: 2008-09-08 2. Agency: 026 3. Bureau: 00 4. Name of this Capital Asset: 5. Unique Project Identifier: ESMD - Integrated Collaborative Environment
Tuesday, September 11, 2007-12:17 AM Page 1 of 8
Exhibit 300: Capital Asset Plan and Case Summary Part I: Summary Information And Justification (All Capital Assets) Section A: Overview (All Capital Assets) 1. Date of Submission: 9/10/2007 2. Agency:
Exhibit 300: JMD Law Enforcement Wireless Communication (LEWC) (Revision 9)
Exhibit 300: Capital Asset Plan and Business Case Summary Part I: Summary Information And Justification (All Capital Assets) Section A: Overview (All Capital Assets) 1. Date of Submission: 4/3/2009 2.
Exhibit 300: BOP Inmate Telephone System (TRUFONE) (Revision 10) 4. Name of this Capital Asset: BOP Inmate Telephone System (TRUFONE)
Exhibit 300: Capital Asset Plan and Business Case Summary Part I: Summary Information And Justification (All Capital Assets) Section A: Overview (All Capital Assets) 1. Date of Submission: 8/17/2007 2.
Exhibit 300: JMD Unified Financial Management System (UFMS) (Revision 9)
Exhibit 300: Unified System (UFMS) (Revision 9) Exhibit 300: Capital Asset Plan and Business Case Summary Part I: Summary Information And Justification (All Capital Assets) Section A: Overview (All Capital
PART ONE OVERVIEW. JSC Space Shuttle Program Flight Software
Exhibit 300 (BY2009) PART ONE OVERVIEW 1. Date of Submission: 2007-09-07 2. Agency: 026 3. Bureau: 00 4. of this Capital Asset: 5. Unique Project Identifier: JSC Space Shuttle Program Flight Software 026-00-01-03-01-1418-00
CAPITAL ASSET PLAN AND BUSINESS CASE SUMMARY EXHIBIT 300
Exhibit 300: Capital Asset Plan and Business Case Summary Part I: Summary Information And Justification (All Capital Assets) Section A: Overview ( All Capital Assets) 1. Date of Submission: January 26,
Total Cost of Ownership
Protecting America's Pensions Office of Information Technology IT Investment Owner's Guide to Total Cost of Ownership Version 1.0 Last Updated Date: January 25, 2011 Revision History Document Version Release
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Treasury Inspector General for Tax Administration Federal Information Security Management Act Report October 27, 2009 Reference Number: 2010-20-004 This
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Significant Revisions to OMB Circular A-127. Section Revision to A-127 Purpose of Revision Section 1. Purpose
Significant Revisions to OMB Circular A-127 Section Revision to A-127 Purpose of Revision Section 1. Purpose Section 5. Definitions Section 6. Policy Section 7. Service Provider Requirements Section 8.
Network Infrastructure - General Support System (NI-GSS) Privacy Impact Assessment (PIA)
Network Infrastructure - General Support System (NI-GSS) Privacy Impact Assessment (PIA) System Categorization: Moderate Version 1.5 May 30, 2013 Prepared by: Security & Compliance Services (SCS) and Infrastructure
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
Privacy Impact Assessment. For Person Authentication Service (PAS) Date: January 9, 2015
For Person Authentication Service (PAS) Date: January 9, 2015 Point of Contact and Author: Hanan Abu Lebdeh [email protected] System Owner: Ganesh Reddy [email protected] Office of Federal Student
UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL
UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL AUDIT SERVICES August 24, 2015 Control Number ED-OIG/A04N0004 James W. Runcie Chief Operating Officer U.S. Department of Education Federal
NARA s Information Security Program. OIG Audit Report No. 15-01. October 27, 2014
NARA s Information Security Program OIG Audit Report No. 15-01 October 27, 2014 Table of Contents Executive Summary... 3 Background... 4 Objectives, Scope, Methodology... 7 Audit Results... 8 Appendix
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
ClOP CHAPTER 1351.39. Departmental Information Technology Governance Policy TABLE OF CONTENTS. Section 39.1
ClOP CHAPTER 1351.39 Departmental Information Technology Governance Policy TABLE OF CONTENTS Section 39.1 Purpose... 1 Section 39.2 Section 39.3 Section 39.4 Section 39.5 Section 39.6 Section 39.7 Section
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106
Department of the Interior Privacy Impact Assessment
Department of the Interior August 15, 2014 Name of Project: email Enterprise Records and Document Management System (eerdms) Bureau: Office of the Secretary Project s Unique ID: Not Applicable A. CONTACT
FHFA. Privacy Impact Assessment Template FM: SYSTEMS (SYSTEM NAME)
FHFA Privacy Impact Assessment Template FM: SYSTEMS (SYSTEM NAME) This template is used when the Chief Privacy Officer determines that the system contains Personally Identifiable Information and a more
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment CGFS/DCFO/GFMS 1. Contact Information Privacy Impact Assessment (PIA) Department of State Privacy Coordinator
Primavera Portfolio Management
Exhibit 300 BY13 (Form) / FEMA - Mapping, Assessment and Planning (RISKMAP) Program (Item) / Feb 29, 2012 (Data as of) Primavera Portfolio Management 300A - OVERVIEW Section A: Overview 1. Name of this
Information Resource Management Directive 5000.05 USAP Information Security Architecture
The National Science Foundation Polar Programs United States Antarctic Program Information Resource Management Directive 5000.05 USAP Information Security Architecture Organizational Function Information
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
Migration Planning Guidance (Draft)
Financial Management Line of Business Migration Planning Guidance (Draft) Section 1.1 Overview The purpose of the Migration Planning Guidance document is to help agencies prepare for, and manage, a migration
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
5 FAM 620 INFORMATION TECHNOLOGY (IT) PROJECT MANAGEMENT
5 FAM 620 INFORMATION TECHNOLOGY (IT) PROJECT MANAGEMENT 5 FAM 621 GENERAL (Office of Origin: IRM/BMP/SPO/PMD) a. The strategic importance of Information Technology (IT) to the mission of the State Department
DIRECTIVE TRANSMITTAL
U.S. NUCLEAR REGULATORY COMMISSION DIRECTIVE TRANSMITTAL TN: DT-07-08 To: Subject: Purpose: Office and Division of Origin: NRC Management Directives Custodians Transmittal of Management Directive 2.8,
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
Final Audit Report. Report No. 4A-CI-OO-12-014
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: AUDIT OF THE INFORMATION TECHNOLOGY SECURITY CONTROLS OF THE U.S. OFFICE OF PERSONNEL MANAGEMENT'S
Project Type Guide. Project Planning and Management (PPM) V2.0. Custom Development Version 1.1 January 2014. PPM Project Type Custom Development
Project Planning and Management (PPM) V2.0 Project Type Guide Custom Development Version 1.1 January 2014 Last Revision: 1/22/2014 Page 1 Project Type Guide Summary: Custom Development Custom software
AUDIT REPORT. The Energy Information Administration s Information Technology Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department
PRIVACY IMPACT ASSESSMENT (PIA) GUIDE
U.S. Securities and Exchange Commission Office of Information Technology Alexandria, VA PRIVACY IMPACT ASSESSMENT (PIA) GUIDE Revised January 2007 Privacy Office Office of Information Technology PRIVACY
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015 An effective risk management program and compliance with the Federal Information Security Management Act (FISMA) requires the U.S.
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Audit of Veterans Health Administration Blood Bank Modernization Project
Department of Veterans Affairs Office of Inspector General Audit of Veterans Health Administration Blood Bank Modernization Project Report No. 06-03424-70 February 8, 2008 VA Office of Inspector General
INFORMATION DIRECTIVE GUIDANCE GUIDANCE FOR MANUALLY COMPLETING INFORMATION SECURITY AWARENESS TRAINING
INFORMATION DIRECTIVE GUIDANCE GUIDANCE FOR MANUALLY COMPLETING INFORMATION SECURITY AWARENESS TRAINING Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19,dated 07/07/2005 GUIDANCE
Security Controls Assessment for Federal Information Systems
Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
Enterprise Projects Fiscal Year 2011/2012 Third Quarter Report
Enterprise Projects Fiscal Year 2011/2012 Third Quarter Report Enterprise Projects Fiscal Year 2011/2012 Third Quarter Report The Enterprise Program Investment Council (EPIC) is responsible for governance
PRIVACY IMPACT ASSESSMENT
PRIVACY IMPACT ASSESSMENT Once the Privacy Impact Assessment is completed and the signature approval page is signed, please submit an electronic copy and hard copy with original signatures of the PIA to
CMS Policy for Information Technology (IT) Investment Management & Governance
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Policy for Information Technology (IT) Investment Management & Governance May 17, 2007 Document Number:
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009 ISD-EV-MOA-0002-2009 Contents Acronyms and Other Reference
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 Washington, DC 20420 Transmittal Sheet February 28, 2012 CLOUD COMPUTING SERVICES 1. REASON FOR ISSUE: This Directive establishes the Department of Veterans
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
A. SYSTEM DESCRIPTION
NOTE: The following reflects the information entered in the PIAMS website. A. SYSTEM DESCRIPTION Authority: Office of Management Budget (OMB) Memorandum (M) 03-22, OMB Guidance for Implementing the Privacy
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 24, 2010
UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL September 24, 2010 AUDIT SERVICES FINAL ALERT MEMORANDUM TO: Danny Harris Chief Information Officer Office of the Chief Information Officer
