IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO TABLE OF CONTENTS
|
|
|
- Marcia Randall
- 10 years ago
- Views:
Transcription
1 OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES VII. EXCEPTIONS VIII. REFERENCES IX. EFFECT ON OTHER POLICIES IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO TABLE OF CONTENTS I. PURPOSE This document establishes the uniform policy within the United States Patent and Trademark Office (USPTO) for Information Technology (IT) security training and awareness. This policy also establishes minimum standards for mandatory periodic training in IT security user awareness including accepted computer security practices of all users. The Department of Commerce has identified two requirements specific to Security Awareness and Training: The USPTO shall develop, disseminate, and periodically review/update: II. 1. A formal documented, security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and 2. A formal, documented procedure to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls. AUTHORITY This policy is issued pursuant to: The Federal Information Management Security Act of 2002 (FISMA) IT Security Education Awareness Training Policy Version
2 III. IT SECURITY EDUCATION AWARENESS TRAINING POLICY USPTO IT Security Policy Management Policy SCOPE The provisions of this policy apply to all USPTO employees and contractor employees using or operating USPTO computer systems, and to employees of contractor systems owned and operated on behalf of the USPTO. The scope of this policy is limited to security awareness and security training. IV. DEFINITIONS Awareness: Awareness is not training. Awareness focuses attention on security and is intended to allow individuals to recognize security concerns and respond accordingly. It is a state whereby a user is familiar with IT security, policies, practices, and procedures that are required of him/her to operate a workstation, server or other automated device in a secure environment. Training: Training strives to produce relevant and needed security skills and competency in practitioners of functional specialties other than IT security (e.g., management, system design, acquisition, auditing). The content of training programs is designed to the requirements of specific target audiences. The goal of training is to build knowledge and skill to facilitate job performance. Education: Education integrates all of the security skills and competencies of the various functional specialties into a common body of knowledge, adds a multi-disciplinary study of concepts, issues, and principles, and strives to produce IT security specialists and professionals capable of vision and pro-active response. Note: The definition of education is included in this document to differentiate it from training and to reinforce the intent and scope of this policy. Sensitive Information: Any information, the loss, misuse, or unauthorized access to or modification of that could adversely affect the national interest, the conduct of federal programs, or the privacy to which individuals are entitled under section 552a of title 5, United States Code (the Privacy Act), but that has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept secret in the interest of national defense or foreign policy. V. POLICY A. General Policy USPTO requires users to complete an IT security awareness course annually. The objective of this course is to raise USPTO s employees and contractors IT security awareness. Completion of this course facilitates user recognition of, and response to, security concerns. Additionally, the course familiarizes employees and contractors with USPTO IT security policies and procedures. Attendance of an IT security awareness presentation, provided as part of a new employees orientation, is a mandatory prerequisite to receiving logical access to USPTO systems. New users shall complete a formal IT security awareness course, provided via the Commerce Learning System, within 30 days of receiving logical access to USPTO systems. IT Security Education Awareness Training Policy Version
3 Employees of contractors whose IT systems are owned and operated on behalf of the USPTO and process, store or forward USPTO information shall complete annual security awareness training. The scope of this requirement is tightly coupled to the requirement for those contractors that are required to have a Certification and Accreditation (C&A) performed on their system(s). Contractors that have certified and accredited (C&A) their system also have the requirement for individuals accessing those systems to have completed an approved security awareness training course. These individuals may never need (or have) direct access to PTOnet and associated systems, but the requirement for security awareness course completion exists by extension. Contractors can meet this requirement by generating their own course (consistent with FISMA and NIST guidance) and submit it to ITSMG for approval or a contractor may use the USPTO s approved course in electronic or paper format to certify to ITSMG that their employees have completed the course. All users shall complete an annual refresher security awareness course by September 30 th of each year. Attendance at all applicable IT security awareness and training activities shall be documented for each user. Due to the aggregate impact of IT security and awareness activities on the Business Units, particularly the Patent and Trademarks businesses, mandatory annual IT security awareness activities shall be coordinated with the Heads of the Business Areas, and accommodations will be made for users busy schedules. In all cases, awareness and training beyond that which is mandatory will be approved by the user s supervisor. Users shall be solicited for ideas on how to improve information security. NOTE: USPTO employees and contractor employees should be encouraged to view IT security as a positive procedural tool for ensuring the confidentiality, integrity, and availability of USPTO AIS. B. Annual Awareness Requirements Each user (USPTO employee, contractor employees, and all other individuals using AIS resources) shall understand the basic purpose of the USPTO Information Technology Security Program and its implementation. At a minimum, the annual security awareness course shall include the following IT security components: 1. USPTO IT Security Policies 2. Common System Threats, Vulnerabilities, and Risks 3. Confidentiality, Integrity, and Availability 4. Password Security; Logging Off; Multiple Sign-on's 5. Appropriate IT Security Rules of Behaviors 6. Peer-to-Peer Software Restrictions 7. Malicious Software 8. Hoaxes 9. Back-ups (where appropriate) IT Security Education Awareness Training Policy Version
4 10. Internet Use 11. Software Licensing 12. Manners 13. Expectations of Privacy IT SECURITY EDUCATION AWARENESS TRAINING POLICY 14. Incident Handling and Reporting 15. Personally Identifiable Information Definition and Protection 16. Telecommunication Security 17. Network Overview 18. Remote Sign-on 19. Physical and Environmental Security 20. Information Accessibility, Handling, Labeling, and Storage 21. Disposal of Sensitive Information 22. Repercussions of Misuse of AIS Resources or Failure to Follow IT Security Policy 23. Disaster Recovery and Contingency Planning 24. Configuration Management and Controls 25. Copyright Compliance 26. Social Engineering Threats 27. Anti-virus Software 28. Information and Data Sensitivity C. IT Security Awareness Reinforcement Activities As part of an effective IT security training program, IT security awareness reinforcement activities will also be provided for all users. IT security awareness reinforcement activities will include, but are not limited to: 1. Distribution of AIS security pamphlets and flyers 2. Viewing of AIS security videos 3. Dissemination of security posters throughout the facility 4. Security articles in the site s newsletters, daily bulletins, web pages, etc. D. Role-based Training Specialized, role-based training shall be provided on an annual basis to employees who have the following positions: IT Security Education Awareness Training Policy Version
5 1. Executive Management Authority (authorizing official or business area head); 2. Security Management (Information Technology Security Officer, System Owners, C&A Program Managers, Information System Security Officers); 3. IT Management Support (legal staff, public affairs, procurement staff and Contracting Officers Technical Representatives); 4. IT Support Staff (system administrator, help desk personnel, network administrator,) 5. Operational Managers and System Users Training course content shall be tailored to a user s role. E. Training Methods IT security training will be presented using multiple mediums in various settings including, but not limited to, interactive computer sessions in the USPTO E-Learning Center (computer-based training) or in-classroom instruction (instructor led training). Training methods will be tailored to effectively provide what the user needs to know to perform his or her duties and reflect the business rules of the USPTO. Training methods for members of the public shall be constrained by controls that allow access to the training. F. Education and Professional Certification Specialized IT security positions based on the roles in section D of this policy do not require professional certification. Specialized IT security positions shall be reviewed to ensure minimum knowledge, skill, and ability levels are met. G. Implementation Specific implementation details for this policy, including a role-based training curriculum, will be provided in additional Information Technology Security Standards (ITSS), Program Plans, and/or Security Bulletins. H. Compliance This policy is pursuant to Section 3544 of the Federal Information Security Management Act (FISMA) of USC 3544 requirement for agencies to develop and implement an agency-wide information security program that includes periodic mandatory IT security user awareness and role-specific training; and the Office of Management and Budget (OMB) Circular A-130, Appendix III that requires mandatory security training prior to granting access to AIS. Compliance with this policy shall be enforced through oversight, inspection, and administrative, disciplinary, and corrective actions. IT security awareness and training for USPTO personnel shall be audited, tracked, and reported on a regular basis to ensure compliance with this policy. Annual testing of personnel shall be performed to evaluate effectiveness and compliance. IT Security Education Awareness Training Policy Version
6 Users who refuse to engage in, or cannot meet the IT security awareness and training requirement may have access to information and IT resources suspended or terminated. This may result in personnel action if access is required for fulfillment of position responsibilities. VI. RESPONSIBILITIES The Under Secretary and the Deputy Director provide the high-level direction for carrying out the IT security mission. They are responsible for the USPTO IT Security Program, including IT Security Training. The authority for carrying out the IT Security Program is delegated to other USPTO officials within the USPTO. All users and managers shall be aware of and observe the USPTO policy regarding IT security training and awareness. The IT Security Officer shall establish procedures for IT security awareness and training program for all USPTO personnel, including role-based training. It is the responsibility of all USPTO employees and contractor employees to adhere to this policy and to refrain from any activity that might circumvent this policy. End users must read and understand all applicable training and awareness materials. The CIO shall ensure that a USPTO IT Security Training and Awareness Program is established under the lead of the ITSMG. The USPTO ITSMG shall: Work with the Office of Training and Office of Human Resources to ensure implementation of the overall IT Security Training and Awareness Program Oversee the implementation of an IT Security Training and Awareness Program Determine the IT security training and awareness goals Ensure management support and appropriate funding Determine the content of the IT security training and awareness materials Ensure that all training materials are reviewed by the Business Units for compliance with the patent and trademark laws, policies and business rules Coordinate IT security training and awareness planning activities Conduct periodic reviews of compliance with USPTO IT security training and awareness policies Maintain and update the policy, review and approve or deny waivers, and monitor compliance through the conduct of annual compliance reviews Be responsible for monitoring system user compliance with this policy as part of the periodic IT security self-assessment program or automated system evaluations Maintain approved waivers as part of the documentation for appropriate system security plan(s) IT Security Education Awareness Training Policy Version
7 Ensure that the IT Security Awareness and Training Programs are communicated to all USPTO users and contractor employees The Office of Human Resources shall: Provide new USPTO users IT Security User Awareness material for their review Initiate courtesy union notifications for required training Facilitate disciplinary actions for violations of policy Contracting Officers Technical Representatives (COTRs) shall: Have contract oversight security responsibilities and ensure that contractor-related security requirements are followed throughout the contract life-cycle Ensure that contractor employees working for the USPTO receive annual User Awareness courses Ensure that technical personnel meet USPTO requirements for IT Security training and expertise before they start work Violations of this policy are to be reported to the USPTO Helpdesk by calling or by using the "Helpdesk 9000" address in the Microsoft Outlook Global Address or Incidents may be also forwarded to VII. EXCEPTIONS Exceptions to this policy shall be determined on a case-by-case basis using the waiver process as defined in the USPTO IT Security Handbook. VIII. REFERENCES E-Government Act (Public Law ), Title III Federal Information Security Management Act (FISMA), December Federal Information Processing Standards (FIPS) Publication 140-2, Security Requirements for Cryptographic Modules, February Federal Information Processing Standards (FIPS) Publication 199, Standards for Security Categorization of Federal Information and Information Systems, February Federal Information Processing Standard (FIPS) Publication 200, Minimum Security Requirements for Federal Information and Information Systems, March Office of Management and Budget (OMB) Circular A-130, Management of Federal Information Resources, Appendix III, Revised November OMB M Guidance for implementing the Privacy Provisions of the E-Government Act of OMB Memorandum M-06-15, Safeguarding Personally Identifiable Information, May IT Security Education Awareness Training Policy Version
8 OMB Memorandum M-06-16, Protection of Sensitive Agency Information, June OMB Memorandum M-06-19, Reporting Incidents Involving Personally Identifiable Information and Incorporating the Costfor Security in Agency Information Technology Investments, July OMB Memorandum M-07-16, Saj2guardingAgainst and Responding to the Breach of Personally Identifiable Iformarion, May The Privacy Act of 1974,5 U.S.C. 5552a. U.S. Department of Commerce, IT Privacy Policy. U.S. Department of Commerce, IT Security Program Policy and Minimum Implementation Standards, June 30,2005. U.S. Patent and Trademark Office, Agency Administrative Order 212-4, USPTO ITSecurity Handbook. U.S. Patent and Trademark Office, IT Privacy Policy. U.S. Patent and Trademark Office, Rules of the Road. U.S. Patent and Trademark Office, Comprehensive Records Schedule. NIST SP , Information Technology Security Training Requirements: A Role- and Performance-Based Model. NIST SP , Building an Infirmation Technology Security Awareness and Training Program. IX. EFFECT ON OTHER POLICIES This policy affects all new, revised, or retired policies issued in Fiscal Year ISSUED BY: United States Patent and Trademark Office OFFICE OF PRIMARY INTEREST: IT Security Management Group IT Security Education Awareness Training Policy Version
NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section
REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.
PASSWORD MANAGEMENT POLICY OCIO-6012-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER PASSWORD MANAGEMENT POLICY OCIO-6012-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY
SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO-6013-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER OCIO-6013-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series. Secure Baseline Attachment
UNITED STATES PATENT AND TRADEMARK OFFICE AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series Secure Baseline Attachment Date of Issuance: Effective Date: TABLE OF CONTENTS I. Purpose
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
Department of Veterans Affairs VA Handbook 6500. Information Security Program
Department of Veterans Affairs VA Handbook 6500 Washington, DC 20420 Transmittal Sheet September 18, 2007 Information Security Program 1. REASON FOR ISSUE: To provide specific procedures and establish
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
EPA Classification No.: CIO-2150.3-P-02.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM AWARENESS AND TRAINING PROCEDURES V3.1 JULY 18, 2012 1. PURPOSE The purpose of this
Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1
APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and
Standards for Security Categorization of Federal Information and Information Systems
FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology
Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
Final Audit Report. Report No. 4A-CI-OO-12-014
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: AUDIT OF THE INFORMATION TECHNOLOGY SECURITY CONTROLS OF THE U.S. OFFICE OF PERSONNEL MANAGEMENT'S
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
Review of the SEC s Systems Certification and Accreditation Process
Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy
NIST Special Publication 800-60 Version 2.0 Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories
NIST Special Publication 800-60 Version 2.0 Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories William C. Barker I N F O R M A T I O N S E C U R I T Y Computer
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
Information Security Guide For Government Executives. Pauline Bowen Elizabeth Chew Joan Hash
Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Introduction Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS
OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Compliance Risk Management IT Governance Assurance
Compliance Risk Management IT Governance Assurance Solutions That Matter Introduction to Federal Information Security Management Act (FISMA) Without proper safeguards, federal agencies computer systems
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM
PREFACE TO SELECTED INFORMATION DIRECTIVES CIO Transmittal No.: 15-010 CIO Approval Date: 06/12/2015 Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 CHIEF INFORMATION
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106
Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance
WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE Instruction 60-701 28 May 2012 Information Technology IT Security Assignment of Responsibilities
United States Antarctic Program Information Resource Management Directive 5000.01 The USAP Information Security Program
The National Science Foundation Office of Polar Programs United States Antarctic Program Information Resource Management Directive 5000.01 The USAP Information Security Program Organizational Function
INFORMATION DIRECTIVE GUIDANCE GUIDANCE FOR MANUALLY COMPLETING INFORMATION SECURITY AWARENESS TRAINING
INFORMATION DIRECTIVE GUIDANCE GUIDANCE FOR MANUALLY COMPLETING INFORMATION SECURITY AWARENESS TRAINING Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19,dated 07/07/2005 GUIDANCE
Office of Inspector General
Office of Inspector General DEPARTMENT OF HOMELAND SECURITY U.S. Department of Homeland Security Washington, DC 20528 Office of Inspector General Security Weaknesses Increase Risks to Critical DHS Databases
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Treasury Inspector General for Tax Administration Federal Information Security Management Act Report October 27, 2009 Reference Number: 2010-20-004 This
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 Washington, DC 20420 Transmittal Sheet February 28, 2012 CLOUD COMPUTING SERVICES 1. REASON FOR ISSUE: This Directive establishes the Department of Veterans
AUDIT REPORT. The Energy Information Administration s Information Technology Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department
Section 37.1 Purpose... 1. Section 37.2 Background... 3. Section 37.3 Scope and Applicability... 4. Section 37.4 Policy... 5
CIOP CHAPTER 37 Departmental Cybersecurity Policy TABLE OF CONTENTS Section 37.1 Purpose... 1 Section 37.2 Background... 3 Section 37.3 Scope and Applicability... 4 Section 37.4 Policy... 5 Section 37.5
Appendix A: Rules of Behavior for VA Employees
Appendix A: Rules of Behavior for VA Employees Department of Veterans Affairs (VA) National Rules of Behavior 1 Background a) Section 5723(b)(12) of title 38, United States Code, requires the Assistant
Guide for the Security Certification and Accreditation of Federal Information Systems
NIST Special Publication 800-37 Guide for the Security Certification and Accreditation of Federal Information Systems Ron Ross Marianne Swanson Gary Stoneburner Stu Katzke Arnold Johnson I N F O R M A
^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS. KOGAN PAGE London and Sterling, VA
^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS KOGAN PAGE London and Sterling, VA Contents Foreword by Nigel Turnbull How to use this book
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
NIST Special Publication 800-66 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule Joan Hash, Pauline Bowen, Arnold Johnson, Carla
APHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
2012 FISMA Executive Summary Report
2012 FISMA Executive Summary Report March 29, 2013 UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 OI'!'ICEOI' lnstfl! C1'0R GENERAt MEMORANDUM March 29,2013 To: Jeff Heslop, Chief
FITSP-Auditor Candidate Exam Guide
FITSP-Auditor Candidate Exam An Overview of the FITSP-A Certification 2010 Edition Copyright 2009-2010 FITSI 1 FITSP-Auditor Candidate Exam This page is left intentionally blank Copyright 2009-2010 FITSI
5 FAM 620 INFORMATION TECHNOLOGY (IT) PROJECT MANAGEMENT
5 FAM 620 INFORMATION TECHNOLOGY (IT) PROJECT MANAGEMENT 5 FAM 621 GENERAL (Office of Origin: IRM/BMP/SPO/PMD) a. The strategic importance of Information Technology (IT) to the mission of the State Department
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL
FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL Clifton Gunderson LLP s Independent Audit of the Federal Housing Finance Agency s Information Security Program - 2011 Audit Report: AUD-2011-002
Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan
INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES
INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES Report No.: ISD-IS-OCIO-0001-2014 June 2014 OFFICE OF INSPECTOR GENERAL U.S.DEPARTMENT OF THE INTERIOR Memorandum JUN 0 4 2014 To: From:
Appendix 10 IT Security Implementation Guide. For. Information Management and Communication Support (IMCS)
Appendix 10 IT Security Implementation Guide For Information Management and Communication Support (IMCS) 10.1 Security Awareness Training As defined in NPR 2810.1A, all contractor personnel with access
Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
White Paper. Understanding NIST 800 37 FISMA Requirements
White Paper Understanding NIST 800 37 FISMA Requirements Contents Overview... 3 I. The Role of NIST in FISMA Compliance... 3 II. NIST Risk Management Framework for FISMA... 4 III. Application Security
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-32 July 2005 PROCESSING CLASSIFIED
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
Information Security @ Blue Valley Schools FEBRUARY 2015
Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that
INFORMATION MANAGEMENT
United States Government Accountability Office Report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate May 2015 INFORMATION MANAGEMENT Additional Actions Are Needed to Meet Requirements
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000.
U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Memorandum ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098
Publication Number: Third Draft Special Publication 800 16 Revision 1. A Role Based Model for Federal Information Technology / Cyber Security Training
This (Second) DRAFT of Special Publication 800 16 Revision 1 document has been superceded by the following draft publication: Publication Number: Third Draft Special Publication 800 16 Revision 1 Title:
Final Audit Report -- CAUTION --
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management
Identity and Access Management Initiatives in the United States Government
Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"
This policy applies to all DRC employees, contractors, volunteers, interns and other agents of the state.
STATE OF OHIO SUBJECT: PAGE 1 OF 9 DRC Sensitive Data Security Requirements NUMBER: 05-OIT-23 DEPARTMENT OF REHABILITATION AND CORRECTION RULE/CODE REFERENCE: RELATED ACA STANDARDS: SUPERSEDES: 05-OIT-23
United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)
for the United States Citizenship and Immigration Services (USCIS) June 22, 2007 Contact Point Harry Hopkins Office of Information Technology (OIT) (202) 272-8953 Reviewing Official Hugo Teufel III Chief
