Telephone Security Equipment. Submission and Evaluation. Procedures COMMITTEE ON NATIONAL SECURITY SYSTEMS. CNSSI No.
|
|
|
- Kelly May
- 9 years ago
- Views:
Transcription
1 COMMITTEE ON NATIONAL SECURITY SYSTEMS April 2013 Telephone Security Equipment Submission and Evaluation Procedures THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION
2 National Manager FOREWORD 1. The Committee on National Security Systems Instruction (CNSSI) No. 5007, Telephone Security Equipment Submission and Evaluation Procedures, provides guidance to U.S. Government Departments or Agencies, U.S. Government sponsors, and vendors for submission and evaluation of telephone equipment or devices. 2. The National Telephone Security Working Group (NTSWG), formerly known as the Telephone Security Group (TSG), is the primary technical and policy resource of the U.S. Government for all aspects of the technical security program involving telephone systems located in areas where National Security Information (NSI), ( regardless of classification level) or other sensitive government information is discussed. The TSG was originally chartered to develop and promulgate telephone security standards. 3. This instruction also supports compliance with Intelligence Community Directive No. 705, Sensitive Compartmented Information Facilities (SCIF), 26 May 2010, which delineate SCIF compliance for the protection of sensitive information and unclassified telecommunications information processing systems and equipment. 4. Existing TSG standards will be replaced and issued as CNSS Instructions. 5. CNSS Instruction No is effective on the date of signature. 6. Copies of this instruction may be obtained by contacting the Secretariat as cited below or at 7. U.S. Government contractors and vendors shall contact their appropriate government agency or Contracting Officer Representative regarding distribution of this document. FOR THE NATIONAL MANAGER /s/ DEBORA A. PLUNKETT CNSS Secretariat (IE32) / National Security Agency * 9800 Savage Road - Suite Ft Meade MD Office: (410) / Fax: (410) [email protected]
3 TABLE OF CONTENTS SECTION PAGE SECTION I PURPOSE 1 SECTION II AUTHORITY 1 SECTION III - SCOPE 1 SECTION IV RESPONSIBILITIES 2 SECTION V DEFINITIONS 2 SECTION VI REFERENCES 2 SECTION VII - SUBMISSION PROCEDURES 2 ANNEX ANNEX A REFERENCES A-1 ANNEX B SUBMITTAL REQUIREMENTS B-1 ANNEX C PRODUCT PRE-TESTING/LAB CHECKLIST C-1 SECTION I PURPOSE 1. This instruction provides guidance to U.S. Government Departments or Agencies, U.S. Government Sponsors, and vendors for submission and evaluation of telephone equipment or devices by the Interagency Telephony Lab (ITL). SECTION II AUTHORITY 2. The authority to issue this instruction derives from National Security Directive 42, (reference a.) which outlines the roles and responsibilities for securing National Security Systems (NSS), consistent with applicable law, E.O , as amended, and other Presidential directives. 3. Nothing in this Instruction shall alter or supersede the authorities of the Director of National Intelligence. SECTION III SCOPE 4. The provisions of this instruction apply to all U.S. Government Departments or Agencies or U.S. Government contractors who install and use telephony and related systems in spaces that National Security Information (NSI), regardless of classification 1
4 level, or other sensitive government information is discussed, or when used as a point of isolation in accordance with Intelligence Community Directive Number 705, Sensitive Compartmented Information Facilities, 26 May 2010 (reference b). 5. This instruction shall be referenced and included in U.S. Government-sponsored procurement specifications to define NTSWG type accepted telephones. 6. This instruction shall be made available to telephony manufacturers who are supporting U.S. Government requirements for the NTSWG. SECTION IV RESPONSIBILITIES 7. Heads of Federal Departments and Agencies shall: a. Develop, fund, implement, and manage programs to ensure that the goals of this policy are achieved and that plans, programs, and policy issuances that implement this instruction are fully supported. b. Incorporate the content of this instruction into annual user education, training, and awareness programs to include procurement training programs. SECTION V DEFINTIONS 8. The definitions contained in CNSS Instruction No. 4009, National IA Glossary (reference c) apply to this Instruction. SECTION VI REFERENCES 9. Future updates to referenced documents, unless they are in direct contradiction to the requirements of the effective edition of this policy, shall be considered applicable to this policy. SECTION VII SUBMISSION PROCEDURES 10. Telephone security equipment or device submission procedures are separated by the roles/responsibilities of the U.S. Government Sponsor, vendor, and ITL. References d through q provide specific guidance that should be reviewed and considered prior to submission of any telephone security equipment, device, or system. a. U.S. Government Sponsors must: 2
5 1) Be a CNSS Organizational Member or Observer; 2) Identify the requirement for submitting the equipment or device; 3) Confirm that the required evaluation, as delineated in ANNEX B, is completed prior to submission of equipment or device; 4) Notify the NTSWG Chair of the intent to present telephone equipment or device to working group members; 5) Follow applicable instructions in Product Pre-testing/Lab Checklist as delineated in ANNEX C. b. Vendors must: 1) Obtain U.S. Government sponsorship from a CNSS Member/Observer organization; Sponsor; 2) Complete an evaluation and present the results to their U.S. Government 3) Follow instructions in the Product Pre-testing/Lab Checklist and submit telephone equipment or device to the ITL for evaluation, which may include additional components as necessary; 4) Any additional components needed to make the equipment operational for testing is a sponsor/vendor responsibility. c. Interagency Telephony Lab must: 1) Prior to testing, review the Product Pre-testing/Lab Checklist, as delineated in ANNEX C. The Product Pre-testing/Lab Checklist shall be provided to the ITL by the U.S. Government Sponsor and/or vendor; 2) Prior to testing, notify the NTSWG Chair of receipt of the checklist; 3) Prior to testing, provide the vendor/sponsor a cost estimate based upon the number and kinds of tests that are to be performed; 4) Review pre-test evaluation results as presented by the vendor during a presentation session to the NTSWG; 5) Conduct evaluations of telephone equipment or devices to ensure specifications are met by the vendor; 3
6 6) Notify the NTSWG of pass or fail evaluation results and brief the NTSWG members of the status; 7) Provide a monthly status report of equipment currently under evaluation, as well as the prioritization of those in the evaluation queue. Encl: ANNEX A ANNEX B ANNEX C REFERENCES SUBMITTAL REQUIREMENTS PRODUCT PRE-TESTING/LAB CHECKLIST 4
7 ANNEX A REFERENCES a. National Security Directive (NSD) 42, National Policy for the Security of National Security Telecommunications and Information Systems, July 5, b. Intelligence Community Directive Number 705, Sensitive Compartmented Information Facilities, 26 May 2010 with associate technical specifications. c. Committee on National Security Systems Instruction (CNSSI) No. 4009, National Information Assurance (IA) Glossary, Revised April d. Code of Federal Regulations, Title 32 National Defense, Volume 6, Part 2004 Directive on Safeguarding Classified National Security Information, Revised July e. Intelligence Community Directive (ICD) Number 702, Technical Surveillance Countermeasures, February 18, f. National Institute for Standards and Technology (NIST), Federal Information Processing Standards (FIPS) Publication 140-2, Security Requirements for Cryptographic Modules, 25 May g. Telephone Security Group (TSG) Standard 1, Introduction to Telephone Security, March h. Telephone Security Group (TSG) Standard 5, On-Hook Telephone Audio Security Performance Specifications, March i. Committee on National Security Systems Instruction (CNSSI) No. 5000, Guidelines for Voice over Internet Protocol (VoIP) Computer Telephony, April j. Committee on National Security Systems Instruction (CNSSI) No. 5001, Type- Acceptance Program for Voice over Internet Protocol (VoIP) Telephones, December k. CNSSI No (formerly known as TSG 2), National Information Assurance (IA) Instruction for Computerized Telephone Systems, Revised September l. CNSSI No (formerly known as TSG 6), Telephone Security Group Approved Equipment, Revised September A-1 ANNEX A to
8 m. IEEE Q, IEEE Standard for Local and metropolitan area networks Virtual Bridged Local Area Networks, n. CNSS Policy No. 17, Policy on Wireless Communications; Protecting National Security Information, May o. Telephone Security Group (TSG) Standard 2a, NTSWG Guidelines for Computerized Telephone Systems Supplemental, dated March p. Telephone Security Group (TSG) Standard 3, Type-Acceptance Program for Telephones used with the Conventional Central Office Interface, March q. Telephone Security Group (TSG) Standard 4, Type-Acceptance Program for Electronic Telephones used in Computerized Telephone Systems, dated March A-2 ANNEX A to
9 ANNEX B SUBMITTAL REQUIREMENTS 1. The Evaluation process enumerates the documentation package s components and contents that vendors must submit to their sponsor for the NTSWG to consider for use of the product in spaces where NSI or other sensitive government information is discussed, and to recommend approval by the National Manager for National Security Telecommunications and Information Systems Security. 2. The documentation package must be comprised of the following: a. Application Letter b. Product Summary c. Product Functional Description d. Electrical Schematics e. Criterion Citation f. Field Test Guide g. Completed Entry Data Sheet (reference CNSSI No. 5006) 3. The documentation package components and contents are as follows: a. The Application Letter must contain: i. Product identification to include manufacturer, product line, model, serial number, and additional descriptive information, as necessary, to eliminate all possibility of ambiguity or confusion with any other product. ii. Device type and class for which application is being made. iii. Certification that the product meets the criteria for that type and class, if applicable, and that it may be opened for visual and electrical inspection at any time without invalidating the normal product warranties, except Type 1 Encryption Devices that are exempt from this requirement. iv. Point of contact for inquiries to include name, title, address, telephone number, and address. B-1 ANNEX B to
10 b. The Product Summary must contain: i. A brief description of the product, major features, common applications, and technical specifications that would be annotated in the manufacturer s sales and technical brochures c. The Product Functional Description must contain: i. Product operation theory ii. Appearance iii. Installation Requirements iv. Operations manual v. Identification of all systems with which the product is compatible vi. Features, options, and auxiliary units available with the product d. Electrical Schematics must: i. Contain high-level block diagram that show relationship between functions. ii. Identify all transducers, circuit components, circuit boards, and subassemblies that provide audio protection. iii. Identify all signal and power paths into and out of the device. iv. Identify manufacturer and model of all components used to implement and control positive security measures. v. Identify on-page and off-page connectors with clear and consistent labels, as required. vi. Clearly identify label test points where protection integrity can be electrically confirmed. e. Criterion Citation contains: i. A citation of each applicable type-acceptance criterion by paragraph number in the Design and Construction Specifications/Requirements part of the pertinent document and show how the proposed product complies with the criterion in the following sections: B-2 ANNEX B to
11 1) Introduction 2) Operational Limitations 3) Telephone Security Inspection Support Measures ii. Telephone type and pertinent document include References e, i, and j that are listed in ANNEX A and are posted on the CNSS website, f. Field Test Guide, except for Type 1 Encryption Devices that are exempt from this requirement: i. Instructions on how to disassemble the device and gain access to the electrical test points from a field tester s perspective. ii. Explanation of testing to include instruments used, measurement values, and/or thresholds for passing and failing. iii. Instructions on how to assemble the device back to an operational state. g. The Completed Entry Data Sheet must document: i. Device Type ii. Manufacturer iii. Model iv. Trade Name v. Description and Use vi. Order Code vii. Point of Contact viii. Price ix. Comments B-3 ANNEX B to
12 ANNEX C PRODUCT PRE-TESTING/LAB CHECKLIST 1. The Interagency Telephony Lab (ITL) package enumerates the product pre-testing/lab checklist components and content. The sponsor shall ensure delivery of or request the vendor deliver these components and content to the ITL prior to the product testing. The ITL shall not conduct any testing until receipt of the package components and content are acknowledged by the NTSWG Chair. 2. Sponsor, vendor, and ITL personnel shall coordinate delivery of the package components and content. The ITL shall provide the mailing address to the Sponsor/vendor to expedite delivery of the package components and content. 3. The ITL package must be comprised of the following components: a. Product Identification b. Production Units (2 each) c. Ancillary Parts, which may include additional system components as necessary. d. Network Connection Instructions e. Product Functional Description f. Technical point of contact g. Sponsor contact information 4. The ITL package components must contain the following: a. Product Identification to include: i. Manufacturer, product line, model, serial number, and additional descriptive information, as necessary, to eliminate all possibility of ambiguity or confusion with any other product. b. Production Units i. Two fully functioning production units with all items that would be delivered C-1 ANNEX C to
13 during normal procurement must be received by the ITL. Production units are devices from a normal production run or are identical to units that would be manufactured during a normal production run. c. Ancillary Parts / Components Requested for Operation i. Items, such as expansion modules and headsets, that the vendor would like tested while connected to the product, must be received by the ITL. Parts that have not been submitted, while the product is under testing, will not be considered as CNSS approved. ii. Any additional components needed to make the equipment operational for testing is a sponsor/vendor responsibility. d. Network Connection Instructions i. The ITL must receive instructions on how to connect the product to the network(s) that it will use. Instructions shall include how to place the product into a mode that permits configuration; details on the settings that should be configured; and suggestions for setting values. Lastly, instructions shall identify the type, configuration, and required settings for the network(s) where the product is used. e. Product Functional Description: i. The description is available from the ITL package submitted by the sponsor or vendor and shall include the following: 1) Product operational theory 2) Appearance 3) Installation requirements 4) Operation manual 5) Identification of all systems with which the product is compatible 6) Features, options, and auxiliary units available with the product f. Technical Point of Contact i. The sponsor/vendor shall provide the name, telephone number, address, and organization of at least, one individual who will be available to provide technical guidance in the event that the ITL personnel require assistance in configuring C-2 ANNEX C to
14 and/or making the product operate properly. The technical point of contact shall be prepared to visit the ITL, as required. g. Sponsor Contact Information i. The sponsor shall provide their name, telephone number, address, agency, and organization to the ITL. C-3 ANNEX C to
POLICY ON WIRELESS SYSTEMS
Committee on National Security Systems CNSSP No. 17 January 2014 POLICY ON WIRELESS SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CHAIR
POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS
Committee on National Security Systems CNSSP No. 7 9 December 2015 POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT
GUIDELINES FOR VOICE OVER INTERNET PROTOCOL (VoIP) COMPUTER TELEPHONY
Committee on National Security Systems CNSS Instruction No. 5000 April 2007 GUIDELINES FOR VOICE OVER INTERNET PROTOCOL (VoIP) COMPUTER TELEPHONY CNSS Secretariat (I922) / National Security Agency 9800
NATIONAL INFORMATION ASSURANCE (IA) INSTRUCTION FOR COMPUTERIZED TELEPHONE SYSTEMS
Committee on National Security Systems CNSS Instruction No. 5002 24 February 2012 NATIONAL INFORMATION ASSURANCE (IA) INSTRUCTION FOR COMPUTERIZED TELEPHONE SYSTEMS Committee on National Security Systems
Policy on Information Assurance Risk Management for National Security Systems
CNSSP No. 22 January 2012 Policy on Information Assurance Risk Management for National Security Systems THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION
NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC
Committee on National Security Systems 1 CNSSD No. 507 January 2014 NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC
Committee on National Security Systems
Committee on National Security Systems CNSS POLICY No.25 March 2009 NATIONAL POLICY FOR PUBLIC KEY INFRASTRUCTURE IN NATIONAL SECURITY SYSTEMS. 1 CHAIR FOREWORD 1. (U) The CNSS Subcommittee chartered a
Enterprise Audit Management Instruction for National Security Systems (NSS)
UNCLASSIFIED September 2013 Enterprise Audit Management Instruction for National Security Systems (NSS) THIS DOCUMENT PRESCRIBES STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION UNCLASSIFIED
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8523.01 April 22, 2008 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) References: (a) DoD Directive C-5200.5, Communications Security (COMSEC) (U),
UNCLASSIFIED NATIONAL POLICY ON CERTIFICATION AND ACCREDITATION OF NATIONAL SECURITY SYSTEMS UNCLASSIFIED. CNSS Policy No.
October 2005 NATIONAL POLICY ON CERTIFICATION AND ACCREDITATION OF NATIONAL SECURITY SYSTEMS Committee on National Security Systems FOREWORD 1. The national security community, in order to ensure the security
TSG GUIDELINES FOR COMPUTERIZED TELEPHONE SYSTEMS TSG STANDARD 2
TSG GUIDELINES FOR COMPUTERIZED TELEPHONE SYSTEMS TSG STANDARD 2 March 1990 PREFACE This standard was prepared by the Telephone Security Group (TSG). The charter members of the TSG are: Department of the
This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.
Department of Homeland Security Management Directives System MD Number: 11043 Issue Date: 09/17/2004 SENSITIVE COMPARTMENTED INFORMATION PROGRAM MANAGEMENT I. Purpose This directive establishes Department
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-32 July 2005 PROCESSING CLASSIFIED
How To Write A Contract For Software Quality Assurance
U.S. Department of Energy Washington, D.C. NOTICE DOE N 203.1 Approved: Expires: 06-02-01 SUBJECT: SOFTWARE QUALITY ASSURANCE 1. OBJECTIVES. To define requirements and responsibilities for software quality
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
(U) RED/BLACK Installation Guidance
CNSSAM TEMPEST/1-13 17 January 2014 (U) RED/BLACK Installation Guidance This document prescribes guidance to be used by a CTTA to determine the required standards for their department or agency. (U) FOREWORD
CARMEL UNIFIED SCHOOL DISTRICT REQUEST FOR PROPOSALS - VOIP SYSTEMS
CARMEL UNIFIED SCHOOL DISTRICT REQUEST FOR PROPOSALS - VOIP SYSTEMS Carmel Unified School District ( District ) hereby invites qualified telecommunication specialists to submit proposals ( Proposals )
Baseline Cyber Security Program
NNSA Policy Letter NAP-14.1-D Approved: Baseline Cyber Security Program NATIONAL NUCLEAR SECURITY ADMINISTRATION Office of Information Management and the Chief Information Officer AVAILABLE ONLINE AT:
Announcing Approval of Federal Information Processing Standard (FIPS) 197, Advanced. National Institute of Standards and Technology (NIST), Commerce.
Billing Code: 3510-CN DEPARTMENT OF COMMERCE National Institute of Standards and Technology (Docket No. 000929280-1201-02 RIN No. 0693-ZA42 Announcing Approval of Federal Information Processing Standard
U.S. Department of Energy
U.S. Department of Energy Washington, D.C. ORDER DOE O 470.6 Approved: 09-02-2015 SUBJECT: TECHNICAL SECURITY PROGRAM 1. PURPOSE. a. This order implements the Department of Energy (DOE) Technical Security
PROPOSALS REQUESTED THE TOWN OF OLD ORCHARD BEACH POLICE DEPARTMENT FOR IP-BASED VOICE COMMUNICATION SYSTEM
PROPOSALS REQUESTED BY THE TOWN OF OLD ORCHARD BEACH POLICE DEPARTMENT FOR IP-BASED VOICE COMMUNICATION SYSTEM The Town of Old Orchard Beach will receive sealed bids for an IP based phone system. The project
B1 Project Management 100
Assignment of points B1 Project Management 100 Requirements for Design Presentation Meetings and Proposal Submissions for Key to Project Management Design Presentation Meeting and Proposal Submissions
FAR 15.408 Table 15-2 -- Instructions for Submitting Cost/Price Proposals When Cost or Pricing Data Are Required
FAR 15.408 Table 15-2 -- Instructions for Submitting Cost/Price Proposals When Cost or Pricing Data Are Required This document provides instructions for preparing a contract pricing proposal when cost
National Security Agency Perspective on Key Management
National Security Agency Perspective on Key Management IEEE Key Management Summit 5 May 2010 Petrina Gillman Information Assurance (IA) Infrastructure Development & Operations Technical Director National
SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS
1 CNSSI No. 1253 15 March 2012 SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS Version 2 THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER
REQUEST FOR INFORMATION (RFI) RFI No. 16-0012 FOR INFORMATION TECHNOLOGY DISASTER RECOVERY AND COLOCATION DATA CENTER SOLUTIONS
REQUEST FOR INFORMATION (RFI) RFI No. 16-0012 FOR INFORMATION TECHNOLOGY DISASTER RECOVERY AND COLOCATION DATA CENTER SOLUTIONS Refer ALL Inquiries to: Michael Talbot, Procurement Officer Purchasing Department
2. Electronic Health Record EHR : is a medical record in digital format.
Policies of the University of North Texas Health Science Center Chapter 14 14.601 Electronic Health Record Policy UNT Health Policy Statement. The University of North Texas Health Science Center (UNTHSC)
PROTECTED DISTRIBUTION SYSTEMS (PDS)
CNSSI No.7003 September 2015 PROTECTED DISTRIBUTION SYSTEMS (PDS) THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CNSS Secretariat (IE414) National
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 4630.09 July 15, 2015 DoD CIO SUBJECT: Communication Waveform Management and Standardization References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues
REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the
REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the maintenance, retention and submission of electronic records.
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
Configuration Management Self Assessment Checklist
Configuration Management Self Assessment Checklist Introduction: The purpose of this Configuration Management (CM) Self- Assessment Checklist is to ensure that the Organization correctly understands the
NTSWG GUIDELINES FOR COMPUTERIZED TELEPHONE SYSTEMS (CTS) Supplemental. NTSWG STANDARD 2(a)
NTSWG GUIDELINES FOR COMPUTERIZED TELEPHONE SYSTEMS (CTS) Supplemental NTSWG STANDARD 2(a) March 2001 PREFACE The Telephone Security Group Standards were initially written back in the early 1980 s to prescribe
Final FAR Rule For Implementing Section 508 of the Rehab Act Electronic and Information Technology Accessibility for Persons with Disabilities
Final FAR Rule For Implementing Section 508 of the Rehab Act Electronic and Information Technology Accessibility for Persons with Disabilities As published in the Federal Register April 25, 2001 DEPARTMENT
ORDER 1370.108. National Policy. Effective Date 09/21/09. Voice Over Internet Protocol (VoIP) Security Policy SUBJ:
National Policy ORDER 1370.108 Effective Date 09/21/09 SUBJ: Voice Over Internet Protocol (VoIP) Security Policy 1. Purpose of This Order. This Order establishes the Federal Aviation Administration s (FAA)
Medicaid Eligibility and Enrollment (EE) Implementation Advanced Planning Document (IAPD) Template. Name of State Medicaid Agency:
Name of State: Name of State Medicaid Agency: Name of Contact(s) at State Medicaid Agency: E-Mail Address(es) of Contact(s) at State Medicaid Agency: Telephone Number(s) of Contact(s) at State Medicaid
Department of Defense
Department of Defense DIRECTIVE NUMBER 8100.02 April 14, 2004 Certified Current as of April 23, 2007 ASD(NII) SUBJECT: Use of Commercial Wireless Devices, Services, and Technologies in the Department of
U.S. Department of Energy Washington, D.C.
U.S. Department of Energy Washington, D.C. ORDER DOE O 205.1A SUBJECT: DEPARTMENT OF ENERGY CYBER SECURITY MANAGEMENT Approved: 1. PURPOSE. The Department of Energy s (DOE s) overarching mission to advance
SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS
Committee on National Security Systems CNSS Instruction No. 1253 October 2009 SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS Version 1 Committee on National Security Systems
2301.1 Scope: Communications and Electronic Systems addressed in this section include:
Chapter 23 COMMUNICATIONS / ELECTRONIC SYSTEMS SECTION 2301 - GENERAL 2301.1 Scope: Communications and Electronic Systems addressed in this section include: 1. Fire Alarm System 2. Telecommunication and
Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
Directives and Instructions Regarding Wireless LAN in Department of Defense (DoD) and other Federal Facilities
Directives and Instructions Regarding Wireless LAN in Department of Defense (DoD) and other Federal Facilities Wireless Infrastructure, Article 12-29-2011 The federal government, and the Department of
VILLAGE OF PALMETTO BAY PUBLIC RECORD REQUEST POLICY
VILLAGE OF PALMETTO BAY PUBLIC RECORD REQUEST POLICY TABLE OF CONTENTS I. Introduction II. III. IV. Scope Purpose References V. Definitions VI. VII. VIII. Policy Determination of Public Record for Village
FROM: «Contract_Start_Date» VENDOR ID NUMBER: TO: «Contract_End_Date» «Federal_Tax_ID_» FUNDING AMOUNT FOR INITIAL PERIOD: «Contract_Amount»
STATE AGENCY (Name & Address): Office of Court Administration Community Dispute Resolution Centers Program 98 Niver Street Cohoes, New York 12047 CONTRACT NUMBER: UCS02-«Contract»-5000234 ORIGINATING AGENCY
OFFICE OF INSURANCE REGULATION Company Admissions
OFFICE OF INSURANCE REGULATION Company Admissions APPLICATION FOR LICENSE This package is designed to assist individuals in preparing the application with all the information required by statute and to
CITY OF MILTON REQUEST FOR PROPOSAL #09-001-ITS
CITY OF MILTON REQUEST FOR PROPOSAL #09-001-ITS to provide INFORMATION TECHNOLOGY SUPPORT SERVICES Issued: November 2, 2009 Submit completed application to: City of Milton 1000 Laurel Street Milton, WA
DRAWING NUMBER REVISION TITLE PAGE 90-2000-7.1 C Planning of Product Realization 1 of 5
90-2000-7.1 C Planning of Product Realization 1 of 5 WRITTEN BY: DATE: APPROVED BY: DATE: J. Caruso J. Porter PRODUCT RESOURCES NEWBURYPORT, MA USA NOTICE: THIS DOCUMENT IS PROPRIETARY AND ITS CONTENTS
Request for Proposal for Telephone System Hosted VoIP System On Premise VoIP System Hybrid IP System #RFP PHONE SYSTEM 1
Page 1 Request for Proposal for Telephone System Hosted VoIP System On Premise VoIP System Hybrid IP System #RFP PHONE SYSTEM 1 Submitted by Appalachian Council of Governments Date December 11, 2015 Inquiries
Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities
Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities Wireless Infrastructure, Article 3-15-2012 The federal government recognizes that standards based
-1- PSEG-LI Update of LIPA SGIP Full Docw-NYISO reqmts above 10 MW 10-27-14
PSEG-Long Island Smart Grid Small Generator Interconnection Procedures for New Distributed Resources 20 MW or Less Connected in Parallel with LIPA s Radial Distribution Systems -1- PSEG-LI Update of LIPA
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8310.01 February 2, 2015 DoD CIO SUBJECT: Information Technology Standards in the DoD References: See Enclosure 1 1. PURPOSE. In accordance with the authority in
E X E C U T I V E O F F I CE O F T H E P R E S I D EN T
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR M-05-24 August 5, 2005 MEMORANDUM FOR THE HEADS OF ALL DEPARTMENTS AND AGENCIES FROM: SUBJECT: Joshua
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
REQUEST FOR PROPOSAL to provide ON-CALL ENVIRONMENTAL CONSULTING SERVICES for the RIVERSIDE COUNTY TRANSPORTATION DEPARTMENT
REQUEST FOR PROPOSAL to provide ON-CALL ENVIRONMENTAL CONSULTING SERVICES for the RIVERSIDE COUNTY TRANSPORTATION DEPARTMENT Table of Contents I. Events Calendar. 1 II. Introduction.. 2 III. Inquires.
LCD SOLUTIONS and CLICKTATE.COM BUSINESS ASSOCIATE AGREEMENT and DISCLOSURE of RIGHTS to COVERED ENTITIES
LCD SOLUTIONS and CLICKTATE.COM BUSINESS ASSOCIATE AGREEMENT and DISCLOSURE of RIGHTS to COVERED ENTITIES This agreement ("Agreement") is effective upon its execution and delivery to LCD SOLUTIONS, INC.
Introduction 2. 1. The Role of Pharmacy Within a NHS Trust 3. 2. Pharmacy Staff 4. 3. Pharmacy Facilities 5. 4. Pharmacy and Resources 6
Index Index Section Page Introduction 2 1. The Role of Pharmacy Within a NHS Trust 3 2. Pharmacy Staff 4 3. Pharmacy Facilities 5 4. Pharmacy and Resources 6 5. Prescription Charges 7 6. Communication
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5205.16 September 30, 2014 USD(I) SUBJECT: The DoD Insider Threat Program References: See Enclosure 1 1. PURPOSE. In accordance with sections 113 and 131 through
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
INDEPENDENT CONTRACTOR CONSULTING AGREEMENT INSTRUCTIONS, ROUTING AND APPROVAL COVER SHEET
INDEPENDENT CONTRACTOR CONSULTING AGREEMENT INSTRUCTIONS, ROUTING AND APPROVAL COVER SHEET I. The requesting department should complete the following Independent Contractor Consulting Agreement ( Agreement
City of Kenmore, Washington
City of Kenmore, Washington Financial Management Software System Request for Proposals Issued: November 2, 2015 Date Due: December 4, 2015 Time Due: 5:00 p.m. Pacific Standard Time Page 1 of 10 1. Introduction
UCLA Information Technology Services/ Medical Center Information Technology Services Ronald Reagan UCLA Medical Center
UCLA Information Technology Services/ Medical Center Information Technology Services Ronald Reagan UCLA Medical Center STRUCTURED CABLING Service Level Agreement Effective Date: _07/14/11 Service Level
This is the Annexure A to Positive Covenant between and Woollahra Municipal Council
This is the Annexure A to Positive Covenant between and Woollahra Municipal Council 1. Definitions and Interpretation 1.1. For the purpose of this covenant, the following definitions apply: Act means the
CMS Policy for Configuration Management
Chief Information Officer Centers for Medicare & Medicaid Services CMS Policy for Configuration April 2012 Document Number: CMS-CIO-POL-MGT01-01 TABLE OF CONTENTS 1. PURPOSE...1 2. BACKGROUND...1 3. CONFIGURATION
Joyce Plummer, Procurement Agent
FLORIDA DEPARTMENT OF TRANSPORTATION Procurement Office 605 Suwannee Street, MS 20 Tallahassee, Florida 32399-0450 Phone: (850) 414-4568 Fax: (850) 414-4951 ADDENDUM NO. 2 DATE: August 14, 2013 RFP NO:
Department of Defense INSTRUCTION. SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling
Department of Defense INSTRUCTION NUMBER 8520.2 April 1, 2004 SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling ASD(NII) References: (a) DoD Directive 8500.1, "Information Assurance
ALS Configuration Management Plan. Nuclear Safety Related
Westinghouse Non-Proprietary Class 3 Advanced Logic System 6002-00002-NP, Rev. 10 Function Author Nuclear Safety Related July 2014 APPROVALS Name and Signature Anthony C. Pagano* Integrated Process Lead,
8. Master Test Plan (MTP)
8. Master Test Plan (MTP) The purpose of the Master Test Plan (MTP) is to provide an overall test planning and test management document for multiple levels of test (either within one project or across
HAWAI I RULES GOVERNING TRUST ACCOUNTING
HAWAI I RULES GOVERNING TRUST ACCOUNTING Adopted and Promulgated by the Supreme Court of the State of Hawai i Adopted November 8, 1991 With Amendments as Noted The Judiciary State of Hawai i RULES GOVERNING
QUALITY MANAGEMENT SYSTEM REVIEW AND APPROVAL TEMPLATE (DOE G 414.1-2A, Appendix A, 6-17-05)
QUALITY MANAGEMENT SYSTEM REVIEW AND APPROVAL TEMPLATE (DOE G 414.1-2A, Appendix A, 6-17-05) This review template is intended for use by the DOE for evaluating a DOE Site Office or Contractor Quality Assurance
DATA ITEM DESCRIPTION
DD Form 1664, APR 89 Previous editions are obsolete Page 1 of 6 Pages 135/123 DATA ITEM DESCRIPTION Form Approved OMB NO.0704-0188 Public reporting burden for collection of this information is estimated
Draft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
Electronic Medical Record (EMR) Request for Proposal (RFP)
Electronic Medical Record (EMR) Request for Proposal (RFP) SAMPLE Proposal Due: [INSERT DESIRED DUE DATE] Table of Contents SECTION 1 RFP INFORMATION... 2 I. Introduction... 2 A. Purpose and Background...
CHARTER OF THE AUDIT AND RISK MANAGEMENT COMMITTEE OF THE BOARD OF DIRECTORS OF BLACKBERRY LIMITED AS ADOPTED BY THE BOARD ON MARCH 27, 2014
CHARTER OF THE AUDIT AND RISK MANAGEMENT COMMITTEE OF THE BOARD OF DIRECTORS OF BLACKBERRY LIMITED AS ADOPTED BY THE BOARD ON MARCH 27, 2014 1. AUTHORITY The Audit and Risk Management Committee (the "Committee")
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8440.01 December 24, 2015 DoD CIO SUBJECT: DoD Information Technology (IT) Service Management (ITSM) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
National Information Assurance Certification and Accreditation Process (NIACAP)
NSTISSI No. 1000 April 2000 National Information Assurance Certification and Accreditation Process (NIACAP) THIS DOCUMENT PROVIDES MINIMUM STANDARDS. FURTHER INFORMATION MAY BE REQUIRED BY YOUR DEPARTMENT
WHITEPAPER: SOFTWARE APPS AS MEDICAL DEVICES THE REGULATORY LANDSCAPE
WHITEPAPER: SOFTWARE APPS AS MEDICAL DEVICES THE REGULATORY LANDSCAPE White paper produced by Maetrics For more information, please contact global sales +1 610 458 9312 +1 877 623 8742 [email protected]
Avaya DECT R4 Telephones Models 3720, 3725, 3740, 3745 and 3749
Avaya DECT R4 Telephones Models Voluntary Product Accessibility Template (VPAT) The DECT ( Digital Enhanced Cordless Technology ) standard originated in Europe as a replacement for earlier cordless telephone
IT Security Handbook. Incident Response and Management: Targeted Collection of Electronic Data
IT Security Handbook Incident Response and Management: Targeted Collection of Electronic Data ITS HBK 2810.09 03 Effective Date: 20110824 Expiration Date: 20130824 Responsible Office: OCIO/ Deputy CIO
Business Associate Agreement
Business Associate Agreement This Agreement is entered into as of ("Effective Date"), between ( Covered Entity ), and ( Business Associate ). RECITALS WHEREAS, Business Associate provides services on behalf
Old Phase Description New Phase Description
Prologue This amendment of The FAA and Industry Guide to Product Certification (CPI Guide) incorporates changes based on lessons learned and supports the broader use of this guide by providing additional
NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?
NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with
MATERIALS: The Contractor shall provide the latest version of Primavera SureTrak software.
DESCRIPTION: '108-01, Start and Progress of Work, is hereby amended to require that the Contractor furnish and participate in a computerized CPM (critical path method) network scheduling system. The purpose
CYBER SECURITY PROCESS REQUIREMENTS MANUAL
MANUAL DOE M 205.1-5 Approved: Admin Chg 1: 9-1-09 Admin Chg 2: 12-22-09 CYBER SECURITY PROCESS REQUIREMENTS MANUAL U.S. DEPARTMENT OF ENERGY Office of the Chief Information Officer AVAILABLE ONLINE AT:
Project Completion Report (PCR) User Guide
Project Completion Report (PCR) User Guide FM0027-GDL-00041-EV17 8 February 2010 Page 2 of 10 1. Introduction The Project Completion Report (PCR) is a structured reporting format provided by the Financial
UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED 1
UNCLASSIFIED DNI Special Security Center Policy & Strategic Planning Division UNCLASSIFIED UNCLASSIFIED 1 UNCLASSIFIED Policy UNCLASSIFIED UNCLASSIFIED 2 Policy Core Objectives Review, revise, facilitate
MS 893: Freedom of Information Act Administration
MS 893: Freedom of Information Act Administration Effective Date: September 30, 2004 Supersedes: 5/1/88; 10/18/84 Responsible Office: Management 1.0 Background The Peace Corps' policies with respect to
Promulgation Details for 1 RCNY 19-02. This rule became effective on August, 04, 2014.
Promulgation Details for 1 RCNY 19-02 This rule became effective on August, 04, 2014. Statement of Basis and Purpose The Department of Buildings ( Department ) is amending sections 104-01 and 104-02,
FIRE ALARM SYSTEM SUBMITTAL CHECKLIST AND APPLICATION
PERMITS AND INSPECTIONS FIRE ALARM SYSTEM SUBMITTAL CHECKLIST AND APPLICATION 911 Assigned PROJECT LOCATION Subdivision: Lot: Blk: Sec: PROJECT New Construction Addition/Remodel Demolition Other: Number
FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2662 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Voice Over IP CTS 2655 and CNT 2102 with grade
