Outside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service
|
|
|
- Alban Young
- 9 years ago
- Views:
Transcription
1 Outside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service February 2014
2 Training Objectives FOCI Control Procedures FOCI Visitation Electronic Communications Plan Technology Control Plan Affiliated Operations Plan Facilities Location Plan Preparing for a FOCI Assessment Reviewing Relationships with the Affiliates Subsidiary Compliance FOCI Training FOCI Records National Interest Determinations 2
3 FOCI Control Procedures All FOCI Mitigation Agreements require the establishment of the following control documents*: Visitation Procedures; Electronic Communications Plan (ECP); Technology Control Plan (TCP); Other Implementation Procedures Affiliated Operations Plan (AOP); and Facilities Location Plan (FLP) for review of potential FOCI Collocation The Government Security Committee is responsible for reviewing and approving these documents by submitting a written certification to the DSS FOCI Operations Division via the cleared company s or in-process company s Electronic Facility Clearance (e-fcl) or [email protected] * These control procedures are required for all FOCI Companies even if not explicitly addressed in the mitigation agreement 3
4 FOCI Control Procedures Visitation Procedures All visits with the Affiliates must be approved in advance within the timeframe designated by the Government Security Committee FOCI Mitigation Agreements often differentiate between Visits and Routine Business Visits Visits Require advanced approval by the designated Outside Director or Proxy Holder Routine Business Visits Require advanced approval by the Facility Security Officer, and generally do not apply to Proxy Agreements unless approved by DSS Visits that pertain only to the commercial aspects of the Company s business: made in connection with the regular day-to-day business operations of the Company; do not involve Key Management Personnel or senior officials of the Affiliates; do not involve the transfer or receipt of classified information or Export Controlled Information; and do not pertain to activities bearing upon the Company s performance of its classified contracts 4
5 FOCI Control Procedures Visitation Procedures The Government Security Committee should periodically review visit requests to ensure sufficient information is provided and that visits are being approved by the correct individual Generally, visits that exceed 30 consecutive business days or cumulatively exceed 200 days in a single year require advance DSS approval Categorizing visits along the lines of DSS approved Affiliated Operations, the nature of the interactions, or other means to develop metrics can provide the Government Security Committee with significant insights into the areas of the Company s business with the greatest risk for violations to the FOCI Mitigation Agreement 5
6 FOCI Control Procedures Electronic Communications Plan Demonstrates how the FOCI Company will monitor/control electronic communications (i.e. , fax, phone) including the company s unclassified network(s) - to ensure there is no unauthorized disclosure of classified or export controlled material. Ensures the FOCI Company s unclassified network(s) is separated from the Affiliates unless approved otherwise by DSS The Government Security Committee has the right to determine if video teleconferences and teleconferences should be categorized as visits (requiring advanced approval) or subject to reporting/logs after the fact 6
7 FOCI Control Procedures Technology Control Plan Shall prescribe all security measures determined necessary to reasonably foreclose the possibility of unauthorized access to classified or export controlled information by non-u.s. citizen employees or visitors The TCP shall also establish measures to assure that access by non- U.S. citizens is strictly limited to only the information for which appropriate Federal Government disclosure authorization has been obtained. 7
8 FOCI Control Procedures Affiliated Operations Plan Business functions or teaming arrangement with Affiliates of a FOCI mitigated company are not authorized. When a company desires to engage in such arrangements with any Affiliate the services must be approved by the GSC and DSS in advance or as set forth in your FOCI Mitigation Agreement. Relationships with the Affiliates requiring advance approval include: Affiliated Services; Shared Third-Party Services (a service that will be provided by a third party service provider to both the Company or any of its Controlled Entities and any of the Affiliates)*; Shared Person; and Cooperative Commercial Arrangement* The above require approval through an Affiliated Operations Plan prior to the FOCI Company engaging in the relationship The intent of the Affiliated Operations Plan is to provide DSS and the Government Security Committee with an understanding of the operational relationship between the FOCI Company and the Affiliates to ensure risks to the performance on classified contracts are effectively mitigated *may be approved in advance by the GSC with notification to DSS 8
9 FOCI Control Procedures Affiliated Operations Plan An Affiliated Operations Plan must address: Description of the service, to include: which entity will provide the service; which entity is paying for the service; how the shared service benefits the entities; specific sub-categories of services; procedures associated with providing the service; technology to be utilized, including shared software, information systems and applications; whether the technology described above is classified or export-controlled; types of information to be exchanged through the service; whether any Key Management Personnel will be involved in the shared administrative service; and include any supporting documentation such as examples, screenshots, network configuration diagrams or sample reports as attachments Identification of risks associated with the proposed Affiliated Operation with proposed Mitigation Procedures; and Compliance review procedures and documentation. 9
10 FOCI Control Procedures Affiliated Operations Plan The Government Security Committee is responsible for: Overseeing the development and implementation of the Affiliated Operations Plan Submitting the Affiliated Operations Plan for DSS approval Ensuring no unapproved Affiliated Operations are occurring at the FOCI Company Ensuring that the FOCI Company notifies DSS of any proposed changes to an Affiliated Operations Plan prior to them occurring Certifying annually that the AOP is effectively executed and that the Affiliated Operations do not circumvent the requirements of the FOCI Mitigation Agreement Any substantive change made to an existing Affiliated Operations Plan requires approval by DSS prior to the changes being implemented The nature and extent of a Company s FOCI plays a significant role in the DSS determination on the approval of an Affiliated Operations Plan 10
11 FOCI Control Procedures Facilities Location Plan FOCI Collocation is when a FOCI Company is located within the proximity of an Affiliate, which would reasonably inhibit the company s ability to comply with the FOCI agreement. Such scenarios may include location in the same building or campus. Collocation is not authorized unless approved in advance by DSS. When a FOCI Company is located within close proximity of an Affiliate, DSS requires a Facilities Location Plan A DSS approved Facilities Location Plan establishes that FOCI Collocation is not present so long as all requirements of the FOCI Mitigation Agreement and Facilities Location Plan are met DSS identification of an unreported FOCI Collocation may negatively impact the status of the FOCI Company s Facility Security Clearance 11
12 FOCI Control Procedures Facilities Location Plan The Facilities Location Plan is the vehicle for the FOCI Company and the Government Security Committee to demonstrate to DSS that being closely located to an Affiliate does not degrade the Company s ability to comply with its FOCI Mitigation Agreement The Facilities Location Plan must: Identify organizational relationship between collocated entities (parent, affiliate, etc.) Describe the existing collocation situation & identify why the entities are collocated Identify if the arrangement is interim or permanent Identify common areas Demonstrate if effective separation of the facilities in the areas of IT systems, phone systems, access control systems, alarm systems or guards Establish mitigation measures to ensure full compliance with the FOCI Mitigation Agreement 12
13 FOCI Control Procedures Facilities Location Plan The Government Security Committee is responsible for: Overseeing the development and implementation of the Facilities Location Plan Submitting the Facilities Location Plan for DSS approval prior to the FOCI Company becoming located within close proximity to an Affiliate Ensuring no FOCI Collocation is present at any of the FOCI Company s facilities Monitoring the Facilities Location Plan to ensure all FOCI Mitigation requirements are met Ensuring the FOCI Company notifies DSS of any proposed changes to a Facilities Location Plan prior to them occurring Certifying annually that the FLP has been effectively implemented and being located in close proximity to an Affiliate has not degraded the Company s ability to comply with their FOCI Mitigation Agreement The nature and extent of a Company s FOCI are important factors in the DSS determination on the approval of a Facilities Location Plan 13
14 Preparing for a FOCI Assessment The FOCI Company should: Confirm all FOCI Control Procedures have been approved by the Government Security Committee and DSS, if required Compare the extent of the relationships with the Affiliates to determine they are within the scope of, and managed consistently with, the DSS approved FOCI Control Procedures FOCI Mitigation is unique and tailored for each individual company either through the language in the Mitigation Agreement and/or the FOCI Control Procedures Maintain a record of all DSS approvals and denials Proxy Companies are subject to an annual independent financial audit, and must provide DSS with confirmation that an audit has been completed Identify any pending requests with DSS 14
15 Preparing for a FOCI Assessment Assess the implementation of FOCI Control Procedures to ensure: Protection from Unauthorized Access of Classified Information Protection from Unauthorized Access of Controlled Unclassified Information (CUI), i.e. Export Controlled information (ITAR & EAR) Compliance with the DSS approved FOCI Control Procedures (Visitation, TCP, ECP, and, if applicable, AOP and FLP) Undue Influence: Any action taken to control or influence the FOCI Company s classified contracts, its participation in classified programs, or its corporate policies concerning the security of classified information and export controlled information. Operational Security (OPSEC)* - if any * Additional security requirements required by the Government Contracting Activity typically established in the DD Form 254 (Contract Security Classification Specification) 15
16 Reviewing Relationships with the Affiliates Level of interaction with the Foreign Parent and/or Affiliates will vary significantly Use the FOCI Control Procedures to understand the nature of each relationship with the Affiliates, i.e. Foreign Investment only Marketing Arm of their Foreign Parent or U.S. Parent Access Elsewhere/Services Firm Integrating Affiliate components into U.S. equipment Assess whether the scope and frequency of interactions are consistent with approved Affiliated Operations and other FOCI Mitigation requirements Ensure Affiliate Operations and interactions are being managed consistently with the DSS approved plans 16
17 FOCI Subsidiary Compliance The FOCI Action Plan applies to the entire FOCI Company including its subsidiaries and controlled entities as defined in the FOCI Mitigation Agreement - not just the cleared employees and cleared facilities Ensure FOCI Control Procedures are fully implemented across the entire corporation The FOCI Company should ensure that all employees understand their responsibilities under the FOCI Mitigation Agreement 17
18 FOCI Training FOCI training should ensure employees demonstrate a strong understanding of the following: The intent of FOCI Mitigation; Nature of the FOCI at the Company; Requirements levied on employees per the FOCI Control Procedures: Visitation; Technology Control Plan; ECP; and If applicable, AOP and FLP Thorough FOCI Training is a strong indicator of strong FOCI Compliance Program 18
19 FOCI Records Ensure the following are maintained for review by DSS and the Government Security Committee: Visit Logs; Contact Reports; Social Contact Reports; Phone/Fax Logs; GCA approval for use of Affiliate Technology; Board Meeting Minutes; and GSC Meeting Minutes Identify anomalies in interactions Inconsistent with normal business Did not obtain proper approval High frequency of unnecessary interactions 19
20 FOCI Records Records provide the following insights: Feel for their business Relationship with the FOCI Company s Parent(s) & Affiliates Does the FOCI Company Board run the company? How much weight do the Inside Directors carry? Feel for compliance/amount of energy/effort Identify business areas and individuals which may require greater attention from the Government Security Committee 20
21 National Interest Determinations FOCI Companies operating under Special Security Agreements require a National Interest Determination (NID) prior to being granted proscribed information Proscribed Information includes: Top Secret Communications Security (COMSEC), excluding controlled cryptographic items when unkeyed or utilized with unclassified keys Sensitive Compartmentalized Information (SCI) Restricted Data (RD) Special Access Program (SAP) To facilitate the NID process the Government Security Committee should maintain a record of all classified contracts requiring access to proscribed information and the status of the NID The FOCI Company shall promptly notify DSS when a contract requiring a NID is awarded via [email protected] The FOCI Company should educate each Government Contracting Activity of the NID requirement prior to the award of a contract can help expedite the process Verify with the Government Contracting Activity that access to proscribed information is actually required 21
22 References FOCI Information FOCI Mitigation Instruments FOCI Process In-process Companies FOCI Process Acquisitions FOCI Implementation Documents NID Process Regulations 22
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service February 2014 Training Objectives DSS Agency DSS Mission
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 5220.22, Volume 3 April 17, 2014 USD(I) SUBJECT: National Industrial Security Program: Procedures for Government Activities Relating to Foreign Ownership, Control, or
Selected Troublesome/Unacceptable Clauses Related to Information Release and Foreign Nationals
Selected Troublesome/Unacceptable Clauses Related to Information Release and Foreign Nationals (Note: Please review the applicable clause in the most current version available to you to ensure you have
Defense Security Service (DSS)
Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) ADMINISTRATIVE INQUIRY (AI) PROCESS JOB AID July 2011 TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 Scope... 1 2. PRELIMINARY
Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS
Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS The Contractor Security Review Requirement... 2 The Self-Inspection Handbook for NISP Contractors... 2 The Elements of Inspection... 2 Self-Inspection
Webinar Questions and Answers
Webinar Questions and Answers New Facility Clearance (FCL) Sponsorship for Government Contracting Activities (GCAs) and Prime Contractors (PCs) Webinar guests submitted several questions before and during
Suggested Contractor File Folder Headings
Suggested Contractor File Folder Headings 1. Facility Clearance 2. Personnel Clearances 3. Recurring Security Education 4. Self-Inspection 5. Security Correspondence 6. Standard Practice Procedures 7.
CHAPTER 5 - SAFETY ASSESSMENTS, LOG OF DEFICIENCIES AND CORRECTIVE ACTION PLANS
CHAPTER 5 - SAFETY ASSESSMENTS, LOG OF DEFICIENCIES AND CORRECTIVE ACTION PLANS A. INTRODUCTION... 1 B. CHAPTER-SPECIFIC ROLES AND RESPONSIBILITIES... 1 C. SAFETY PROGRAM ASSESSMENT PROCESS... 3 D. FACILITY-MAINTAINED
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
EXPORT CONTROLS COMPLIANCE
Responsible University Official: Vice President for Research Responsible Office: Office for Export Controls Compliance Origination Date: May 1, 2014 EXPORT CONTROLS COMPLIANCE Policy Statement Northwestern
DSS Electronic Facility Clearance System (e-fcl) Submission Site User Guide
U. S. Department of Defense Defense Security Service Industrial Security Program DSS Electronic Facility Clearance System (e-fcl) Submission Site User Guide June 2013 Version 7.2 1 e-fcl Submission Site
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
2016 OCR AUDIT E-BOOK
!! 2016 OCR AUDIT E-BOOK About BlueOrange Compliance: We specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that
SECURE ENTERPRISE SUPPORT MAINTENANCE PLAN
SECURE ENTERPRISE SUPPORT MAINTENANCE PLAN SUMMARY: This document describes the deliverables provided by SAP National Security Services TM (SAP NS2 TM ) under SAP Secure Enterprise Support. SIN 132-34
ADDENDUM No. 1. This addendum incorporates the minutes from the pre-proposal conference held on December 21, 2015 at 1:30 p.m.
Howard Community College RFP: Campus Security Services Bid Number: 16P-004 RFP Opening Date: January 20, 2016 ADDENDUM No. 1 This addendum incorporates the minutes from the pre-proposal conference held
This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.
Department of Homeland Security Management Directives System MD Number: 11043 Issue Date: 09/17/2004 SENSITIVE COMPARTMENTED INFORMATION PROGRAM MANAGEMENT I. Purpose This directive establishes Department
Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2
03/21/2013. Security Incident Requirements. Information Security Webinar. Administrative Announcements. Security Incident Requirements
Security Incident Requirements Information Security Webinar Security Incident Requirements Host: Lisa Rainey, SAPPC Information Security Curriculum Manager, DSS - CDSE Distinguished career-security professional
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee
American Express Data Security Operating Policy United States
American Express Data Security Operating Policy United States As a leader in consumer protection, American Express has a long-standing commitment to protect Cardmember Information, ensuring that it is
Approvals Program Desk Guide
Approvals Program Desk Guide Version 2.2 March 2016 Approvals Program Standard Operating Procedures Version 1.0 i Disclaimer The materials contained in this document consist of guidance and other information
Supplier Awareness. Export Control/ ITAR
Export Control & ITAR Supplier Awareness Export Control/ ITAR THIS INFORMATION IS PROVIDED BY PAR SYSTEMS, INC. ("PAR"). PAR IS NOT A LAW FIRM, AND THE INFORMATION CONTAINED HEREIN IS NOT INTENDED TO BE
SMSe Privacy Impact Assessment
1. Contact Information Department of State Privacy Coordinator Margaret P. Grafeld Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
PC Connect Agreement & Disclosure Receipt of Disclosures Equipment Requirements Definition of Business Day
PC Connect Agreement & Disclosure This agreement provides information about the Sutter Community Bank PC Connect Online banking service and contains the disclosures required by the Electronic Funds Transfer
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
Physical Access Control System
for the Physical Access Control System DHS/ALL 039 June 9, 2011 Contact Point David S. Coven Chief, Access Control Branch (202) 282-8742 Reviewing Official Mary Ellen Callahan Chief Privacy Officer (703)
How To Do A Vulnerability Assessment
2013 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories Table of Contents Vulnerability Assessments... 2 Vulnerabilities... 3 NISP Enhancements... 4 1 Company Sponsored
Information Technology
Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level
Intel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
GAO DEFENSE CONTRACT AUDITS. Actions Needed to Improve DCAA's Access to and Use of Defense Company Internal Audit Reports
GAO United States Government Accountability Office Report to the Committee on Armed Services, U.S. Senate December 2011 DEFENSE CONTRACT AUDITS Actions Needed to Improve DCAA's Access to and Use of Defense
2014 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories
2014 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories Table of Contents Vulnerability Assessments... 2 Vulnerabilities... 3 NISP Enhancements... 4 1 Company Sponsored
Using Technology Control Plans in Export Compliance. Mary Beran, Georgia Tech David Brady, Virginia Tech
Using Technology Control Plans in Export Compliance Mary Beran, Georgia Tech David Brady, Virginia Tech What is a Technology Control Plan (TCP)? The purpose of a TCP is to control the access and dissemination
white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations
white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations WWW.EPIQSYSTEMS.COM 800 314 5550 Mitigate Risk in Handling ediscovery Data Subject to the U.S.
TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt.
TICSA Telecommunications (Interception Capability and Security) Act 2013 Guidance for Network Operators www.gcsb.govt.nz www.ncsc.govt.nz Contents Introduction...2 Overview of the Guidance...3 Focus of
September 2010 Report No. 11-003
John Keel, CPA State Auditor Selected Investment Practices at the Texas Treasury Safekeeping Trust Company, the Employees Retirement System, and the Texas A&M University System Report No. 11-003 Selected
PROCEDURE. Ontario Technical Feasibility Exception PUBLIC. Issue 0.2 IESO_PRO_0680
PROCEDURE PUBLIC IESO_PRO_0680 Ontario Technical Feasibility Exception Issue 0.2 This procedure provides guidance to TFE applicants on the Ontario-adapted NERC Technical Feasibility Exception process.
IC 8-1-32.5 Chapter 32.5. Certificates of Territorial Authority for Communications Service Providers
IC 8-1-32.5 Chapter 32.5. Certificates of Territorial Authority for Communications Service Providers IC 8-1-32.5-1 Application of chapter Sec. 1. This chapter applies to a communications service provider
ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE
AbbVie is a participant in the U.S. Customs supply chain security program called the Customs-Trade Partnership Against Terrorism (C-TPAT). Participation in C-TPAT requires AbbVie to ensure that its overseas
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
Information Technology Policy
ITP Number ITP-SEC024 Category Security Contact [email protected] Information Technology Policy IT Security Incident Policy Effective Date August 2, 2012 Supersedes Scheduled Review Annual 1. Purpose
Command Center, Inc. CORPORATE GOVERNANCE GUIDELINES
Command Center, Inc. CORPORATE GOVERNANCE GUIDELINES These (the Guidelines ) have been adopted by the Board of Directors of Command Center, Inc., to assist the Board and its committees in the exercise
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
Spillemyndigheden s change management programme. Version 1.3.0 of 1 July 2012
Version 1.3.0 of 1 July 2012 Contents 1 Introduction... 3 1.1 Authority... 3 1.2 Objective... 3 1.3 Target audience... 3 1.4 Version... 3 1.5 Enquiries... 3 2. Framework for managing system changes...
II. Tuition, Fees, Charges, Penalties and Deposits
II. Tuition, Fees, Charges, Penalties and Deposits Introduction Students are not entitled to enter class or laboratory until their tuition, fees, and deposits have been paid.* Payment may be made by personal
Foreign Disclosure and Contacts with Foreign Representatives
Army Regulation 380 10 Security Foreign Disclosure and Contacts with Foreign Representatives Headquarters Department of the Army Washington, DC 14 July 2015 UNCLASSIFIED SUMMARY of CHANGE AR 380 10 Foreign
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
Interagency Review of Foreign National Access to Export-Controlled Technology in the United States. Executive Summary
Offices of Inspector General of the Departments of Commerce, Defense, Energy, Homeland Security, and State and the Central Intelligence Agency Report No. D-2004-062 April 16, 2004 Interagency Review of
Mobile Audio/Video Recorder Policy
Mobile Audio/Video Recorder Policy 446.1 PURPOSE AND SCOPE The Fort Collins Police Services has equipped selected vehicles and officers with a Mobile Audio/Video Recording (MAV) system and also allows
Addendum 529 (5/13) Page 1 of 5
Additional Terms and Conditions E-2D Full Rate Production (FRP) Lot 2 (Prime Contract No. N00019-13-C-9999) All of the additional terms and conditions set forth below are incorporated in and made part
Practice Test Security Fundamentals Professional Certification (SFPC) Multiple Choice. Multiple-Choice Sample Question # 1
The following Practice Test presents samples of the type, difficulty, and format of questions found on the SFPC assessment. At the end of the Practice Test, a table is provided outlining the topics and
AGENDA HIP Ho AA w i rivacy d The B reach Happen? I P nc AA Secu dent R rit esp y o nse Corrective Action Plan What We Learned ACRONYMS USED
Michael Almvig Skagit County Information Services Director 1 AGENDA 1 2 HIPAA How Did Privacy The Breach Happen? HIPAA Incident Security Response 3 Corrective Action Plan 4 What We Learned Questions? ACRONYMS
BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011
BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011 Communications and Information MANAGEMENT OF PORTALS AND WEB SITES COMPLIANCE WITH THIS PUBLICATION
Statement of Guidance: Outsourcing All Regulated Entities
Statement of Guidance: Outsourcing All Regulated Entities 1. STATEMENT OF OBJECTIVES 1.1. 1.2. 1.3. 1.4. This Statement of Guidance ( Guidance ) is intended to provide guidance to regulated entities on
Personal Information Protection and Electronic Documents Act
PIPEDA Self-Assessment Tool Personal Information Protection and Electronic Documents Act table of contents Why this tool is needed... 3 How to use this tool... 4 PART 1: Compliance Assessment Guide Principle
1. Not Subject to the EAR and Defense Article. (1) Reserved. (2) Reserved
1. Not Subject to the EAR and Defense Article 734.3 (a) (NO REVISION) (b) The following are not subject to the EAR: (1) (NO REVISION) (2) (NO REVISION) (3) Information and software that: (i) Are published,
Case 2:13-cv-01887-ES-JAD Document 282-1 Filed 12/09/15 Page 1 of 18 PageID: 4861 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY
Case 2:13-cv-01887-ES-JAD Document 282-1 Filed 12/09/15 Page 1 of 18 PageID: 4861 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY Federal Trade Commission, Plaintiff, v. Wyndham Worldwide
Council for Higher Education Accreditation. Recognition of Accrediting Organizations. Policy and Procedures
Council for Higher Education Accreditation Recognition of Accrediting Organizations Policy and Procedures Approved by the CHEA Board of Directors September 28, 1998 Revised by the CHEA Board of Directors
Military Considerations
Military Considerations (A) (B) (C) A veteran means any person who has completed service in the armed forces, including the national guard of any state, or a reserve component of the armed forces, who
Privacy and Data Security Update for Defense Contractors
Privacy and Data Security Update for Defense Contractors T.J. Crane May 19, 2017 Overview DoD interim rule Expanded DFAR reporting obligations New DFAR definitions Cloud services Changes to local breach
CONTROL PROCEDURES FOR UNCLASSIFIED TECHNICAL DATA DISCLOSING MILITARILY CRITICAL TECHNOLOGY
(Example) CONTROL PROCEDURES FOR UNCLASSIFIED TECHNICAL DATA DISCLOSING MILITARILY CRITICAL TECHNOLOGY TITLE: Unclassified Technical Data Control Procedures PROC. NUMBER: ISSUE NUMBER: ISSUE DATE: PURPOSE
POLICY 4.2.9 INVESTIGATIONS OF LEGAL AND ETHICAL MISCONDUCT
I. POLICY A. This policy applies to all investigations by CB Richard Ellis, Inc., referred to herein as CBRE or the Company, of allegations or occurrences of legal and ethical misconduct (including fraud)
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
IRAP Policy and Procedures up to date as of 16 September 2014.
Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map Prepared by: Booz Allen Hamilton Career progression within the 0080-Information/Personnel
NorthStar Alarm Services. Website Privacy Policy
NorthStar Alarm Services Website Privacy Policy NorthStar Alarm Services ( NorthStar ) values your privacy. To that end, we strive to provide a safe, secure online user experience for you. In this Privacy
Zubi Advertising Privacy Policy
Zubi Advertising Privacy Policy This privacy policy applies to information collected by Zubi Advertising Services, Inc. ( Company, we or us ), on our Latino Emoji mobile application or via our Latino Emoji
FOR OFFICIAL USE ONLY AGREEMENT BETWEEN THE DEPARTMENT OF DEFENSE OF THE UNITED STATES OF AMERICA AND THE MINISTRY OF DEFENSE OF THE STATE OF ISRAEL
FOR OFFICIAL USE ONLY AGREEMENT BETWEEN THE DEPARTMENT OF DEFENSE OF THE UNITED STATES OF AMERICA AND THE MINISTRY OF DEFENSE OF THE STATE OF ISRAEL FOR RESEARCH, DEVELOPMENT, TEST AND EVALUATION PROJECTS
Privacy Management Program Toolkit Health Custodians Personal Health Information Act
Office of the Information and Privacy Commissioner for Nova Scotia Privacy Management Program Toolkit Health Custodians Personal Health Information Act Introduction: This toolkit was prepared by the Information
INSTRUCTION. Department of Defense. NUMBER 5230.24 August 23, 2012 USD(AT&L) Distribution Statements on Technical Documents
Department of Defense INSTRUCTION NUMBER 5230.24 August 23, 2012 USD(AT&L) SUBJECT: Distribution Statements on Technical Documents References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE
Acquiring a Federal Government Contractor: Avoiding Pitfalls
Acquiring a Federal Government Contractor: Avoiding Pitfalls Erin L. Toomey, Foley & Lardner LLP, with Practical Law Commercial This Practice Note highlights common pitfalls to avoid in an acquisition
Defense Security Service Industrial Security Field Operations. FCL Orientation Handbook
Industrial Security Field Operations February 18, 2015 Table of Contents WELCOME MESSAGE FROM DSS DIRECTOR... 3 1.0 FCL ROADMAP... 5 2.0 FCL PROCESS REQUIREMENTS WORKSHEET... 6 3.0 BUSINESS STRUCTURE AND
Austin Independent School District
2011 Austin Independent School District American Express Travel Related Services Company, Inc. has been contracted to provide services under the American Express Corporate Purchasing Card Account program.
CFIUS AND EXON-FLORIO
CFIUS AND EXON-FLORIO Arnold & Porter LLP has extensive experience assisting both US and foreign companies in transactions subject to review by the Committee on Foreign Investment in the United States
United States Department of State Privacy Impact Assessment Risk Analysis and Management
United States Department of State Privacy Impact Assessment Risk Analysis and Management Bureau of Administration 1. Contact Information Risk Analysis and Management (RAM) PIA Department of State Privacy
Novo Service Desk Software
Product Data Sheet The Novo Service Desk has helped streamline processes, reduce costs, provide better metrics, and run a more efficient help desk Lender Processing Services Novo Service Desk Software
July 6, 2015. Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263
July 6, 2015 Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263 Re: Security Over Electronic Protected Health Information Report 2014-S-67
Obtaining a Facility Security Clearance A Pinkerton Government Services White Paper
Obtaining a Facility Security Clearance A Pinkerton Government Services White Paper Robert Maydoney Vice President Sales Pinkerton Government Services, Inc. 740 North Main Street Mansfield, MA 02048 T:
Introduction. Derivative Classification Training JOB AID
Introduction Derivative Classification Training The purpose of this job aid is to provide reference information for the responsibilities and procedures associated with derivative classification. This job
Presentation by BSI on the main changes to the IATF ISO/TS 16949 certification scheme
Presentation by BSI on the main changes to the IATF ISO/TS 16949 certification scheme ISO/TS 16949 IATF Scheme rules 4 th edition areas that impact BSI Clients Copyright 2014 BSI. All rights reserved.
Additional Terms And Conditions Taiwan Air Force (TAF) E-2T Aircraft Retrofit of TW 1-4 (Prime Contract No. N00019-09-C-0040)
Additional Terms And Conditions Taiwan Air Force (TAF) E-2T Aircraft Retrofit of TW 1-4 (Prime Contract No. N00019-09-C-0040) All of the additional terms and conditions set forth below are incorporated
Position Classification Flysheet for Security Clerical and Assistance Series, GS-0086
Position Classification Flysheet for Security Clerical and Assistance Series, GS-0086 Table of Contents SERIES DEFINITION... 2 SERIES COVERAGE... 2 EXCLUSIONS... 2 OCCUPATIONAL INFORMATION... 2 AUTHORIZED
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Human Resources Management Policy. Leave Transfer Program. Policy 48
Human Resources Management Policy Leave Transfer Program Policy 48 NOTE: THIS POLICY, LIKE ALL OTHER MUSC HUMAN RESOURCES POLICIES, IS NOT A CONTRACT OF EMPLOYMENT AND SHOULD NOT BE RELIED UPON AS SUCH.
IBM Maximo Asset Management IBM Tivoli Asset Management for IT IBM Tivoli Service Request Manager. Version 7.1. Workflow Implementation Guide
IBM Maximo Asset Management IBM Tivoli Asset Management for IT IBM Tivoli Service Request Manager Version 7.1 Workflow Implementation Guide Note Before using this information and the product it supports,
