SYSTEM AUTHORIZATION ACCESS REQUEST NAVY (SAAR-N)
|
|
|
- Alberta Cunningham
- 9 years ago
- Views:
Transcription
1 SYSTEM AUTHORIZATION ACCESS REQUEST NAVY (SAAR-N) PRIVACY ACT STATEMENT AUTHORITY: Executive Order 10450, Public Law , the Computer Fraud and Abuse Act; and System of Records Notice: NM Program Management and Locator System. PRINCIPAL PURPOSE: To record user identification for the purpose of verifying the identities of individuals requesting access to Department of Defense (DOD) systems and information. ROUTINE USES: The collection of data is used by Navy Personnel Supervisors/Managers, Administration Office, Security Managers, Information Assurance Managers, and System Administration with a need to know. DISCLOSURE: Disclosure of this information is voluntary; however, failure to provide the requested information may impede, delay or prevent further processing of this request. TYPE OF REQUEST: INITIAL MODIFICATION DEACTIVATE USER ID SYSTEM NAME (Platform or Application): One Touch Support LOCATION (Physical location of system): DATE (DDMMMYYYY): NAVSUP Business Systems Center Mechanicsburg, PA PART I (To be completed by Requester) 1. NAME (Last, First, Middle Initial): 2. ORGANIZATION: - 3. OFFICE SYMBOL/DEPARTMENT: 4. PHONE (DSN and Commercial): DSN: COM: 5. OFFICIAL ADDRESS: 6. JOB TITLE AND GRADE/RANK: 7. OFFICIAL MAILING ADDRESS: 8. CITIZENSHIP: US FN 9. DESIGNATION OF PERSON: MILITARY CIVILIAN LN Other CONTRACTOR 10. INFORMATION AWARENESS (IA) AWARENESS TRAINING REQUIREMENTS (Complete as required for user or functional level access.): I have completed Annual IA Awareness Training DATE (DDMMMYYYY): PART II - ENDORSEMENT OF ACCESS BY INFORMATION OWNER, USER SUPERVISOR OR GOVERNMENT SPONSOR (If an individual is a contractor - provide company name, contract number, and date of contract expiration in Block 14a). 11. JUSTIFICATION FOR ACCESS: 12. TYPE OF ACCESS REQUIRED: AUTHORIZED PRIVILEGED 12a. If Block 12 is checked "Privileged", user must sign a Privileged Access Agreement Form. DATE SIGNED (DDMMMYYYY): 13. USER REQUIRES ACCESS TO: UNCLASSIFIED CLASSIFIED (Specify category): OTHER: 14. VERIFICATION OF NEED TO KNOW: I certify that this user requires access as requested. 14a ACCESS EXPIRATION DATE (Contractors must specify Company Name, Contract Number, Expiration Date): 15. SUPERVISOR'S ORGANIZATION/DEPARTMENT: 15a. SUPERVISOR'S ADDRESS: 15b. PHONE NUMBER: 16. SUPERVISOR'S NAME (Print Name): 16a. SUPERVISOR'S SIGNATURE: 16b. DATE (DDMMMYYYY): 17. SIGNATURE OF INFORMATION OWNER/OPR: 17a. PHONE NUMBER: 17b. DATE (DDMMMYYYY): 18. SIGNATURE OF IAM OR APPOINTEE: 19. ORGANIZATION/DEPARTMENT: 20. PHONE NUMBER: 21. DATE (DDMMMYYYY): Page 1 of 6
2 22. USER AGREEMENT - STANDARD MANDATORY NOTICE AND CONSENT PROVISION By signing this document, you acknowledge and consent that when you access Department of Defense (DoD) information systems: - You are accessing a U.S. Government (USG) information system (IS) (which includes any device attached to this information system) that is provided for U.S. Government-authorized use only. - You consent to the following conditions: The U.S. Government routinely intercepts and monitors communications on this information system for purposes including, but not limited to, penetration testing, communications security, (COMSEC) monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE) and counterintelligence (CI) investigations. At any time, the U.S. Government may inspect and seize data stored on this information system. Communications using, or data stored on, this information system are not private, are subject to routine monitoring, interception and search, and may be disclosed or used for any U.S. Government-authorized purpose. This information system includes security measures (e.g., authentication and access controls) to protect U.S. Government interests--not for your personal benefit or privacy. Notwithstanding the above, using an information system does not constitute consent to personnel misconduct, law enforcement, or counterintelligence investigative searching or monitoring of the content of privileged communications or data (including work product) that are related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Under these circumstances, such communications and work product are private and confidential, as further explained below: - Nothing in this User Agreement shall be interpreted to limit the user's consent to, or in any other way restrict or affect, any U.S. Government actions for purposes of network administration, operation, protection, or defense, or for communications security. This includes all communications and data on an information system, regardless of any applicable privilege or confidentiality. - The user consents to interception/capture and seizure of ALL communications and data for any authorized purpose (including personnel misconduct, law enforcement, or counterintelligence investigation). However, consent to interception/capture or seizure of communications and data is not consent to the use of privileged communications or data for personnel misconduct, law enforcement, or counterintelligence investigation against any party and does not negate any applicable privilege or confidentiality that otherwise applies. - Whether any particular communication or data qualifies for the protection of a privilege, or is covered by a duty of confidentiality, is determined in accordance with established legal standards and DoD policy. Users are strongly encouraged to seek personal legal counsel on such matters prior to using an information system if the user intends to rely on the protections of a privilege or confidentiality. - Users should take reasonable steps to identify such communications or data that the user asserts are protected by any such privilege or confidentiality. However, the user's identification or assertion of a privilege or confidentiality is not sufficient to create such protection where none exists under established legal standards and DoD policy. - A user's failure to take reasonable steps to identify such communications or data as privileged or confidential does not waive the privilege or confidentiality if such protections otherwise exist under established legal standards and DoD policy. However, in such cases the U.S. Government is authorized to take reasonable actions to identify such communication or data as being subject to a privilege or confidentiality, and such actions do not negate any applicable privilege or confidentiality. - These conditions preserve the confidentiality of the communication or data, and the legal protections regarding the use and disclosure of privileged information, and thus such communications and data are private and confidential. Further, the U.S. Government shall take all reasonable measures to protect the content of captured/seized privileged communications and data to ensure they are appropriately protected. In cases when the user has consented to content searching or monitoring of communications or data for personnel misconduct, law enforcement, or counterintelligence investigative searching, (i.e., for all communications and data other than privileged communications or data that are related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants), the U.S. Government may, solely at its discretion and in accordance with DoD policy, elect to apply a privilege or other restriction on the U.S. Government's otherwise-authorized use or disclosure of such information. All of the above conditions apply regardless of whether the access or use of an information system includes the display of a Notice and Consent Banner ("banner"). When a banner is used, the banner functions to remind the user of the conditions that are set forth in this User Agreement, regardless of whether the banner describes these conditions in full detail or provides a summary of such conditions, and regardless of whether the banner expressly references this User Agreement. USER RESPONSIBILITIES: I understand that to ensure the confidentiality, integrity, availability, and security of Navy Information Technology (IT) resources and information, when using those resources, I shall: - Safeguard information and information systems from unauthorized or inadvertent modification, disclosure, destruction, or misuse. - Protect Controlled Unclassified Information (CUI), to include Personally Identifiable Information (PII), and classified information to prevent unauthorized access, compromise, tampering, or exploitation of the information. - Protect authenticators (e.g., Password and Personal Identification Numbers (PIN)) required for logon authentication at the same classification as the highest classification of the information accessed. - Protect authentication tokens (e.g., Common Access Card (CAC), Alternate Logon Token (ALT), Personal Identity Verification (PIV), National Security Systems (NSS) tokens, etc.) at all times. Authentication tokens shall not be left unattended at any time unless properly secured. - Virus-check all information, programs, and other files prior to uploading onto any Navy IT resource. - Report all security incidents including PII breaches immediately in accordance with applicable procedures. - Access only that data, control information, software, hardware, and firmware for which I am authorized access by the cognizant Department of the Navy (DON) Commanding Officer, and have a need-to-know, have the appropriate security clearance. Assume only those roles and privileges for which I am authorized. - Observe all policies and procedures governing the secure operation and authorized use of a Navy information system. - Digitally sign and encrypt in accordance with current policies. - Employ sound operations security measures in accordance with DOD, DON, service and command directives. Page 2 of 6
3 (Block 22 Cont) I further understand that, when using Navy IT resources, I shall not: - Auto-forward any from a Navy account to commercial account (e.g.,.com). - Bypass, stress, or test IA or Computer Network Defense (CND) mechanisms (e.g., Firewalls, Content Filters, Proxy Servers, Anti-Virus Programs). - Introduce or use unauthorized software, firmware, or hardware on any Navy IT resource. - Relocate or change equipment or the network connectivity of equipment without authorization from the Local IA Authority (i.e., person responsible for the overall implementation of IA at the command level). - Use personally owned hardware, software, shareware, or public domain software without written authorization from the Local IA Authority. - Upload/download executable files (e.g., exe,.com,.vbs, or.bat) onto Navy IT resources without the written approval of the Local IA Authority. - Participate in or contribute to any activity resulting in a disruption or denial of service. - Write, code, compile, store, transmit, transfer, or Introduce malicious software, programs, or code. - Use Navy IT resources in a way that would reflect adversely on the Navy. Such uses include pornography, chain letters, unofficial advertising, soliciting or selling except on authorized bulletin boards established for such use, violation of statute or regulation, inappropriately handled classified information and PII, and other uses that are incompatible with public service. - Place data onto Navy IT resources possessing insufficient security controls to protect that data at the required classification (e.g., Secret onto Unclassified). 23. NAME (Last, First, Middle Initial): 24. USER SIGNATURE: 25. DATE SIGNED (DDMMMYYYY): PART III - SECURITY MANAGER VALIDATES THE BACKGROUND INVESTIGATION OR CLEARANCE INFORMATION 26. TYPE OF INVESTIGATION: 26a. DATE OF INVESTIGATION (DDMMMYYYY): 26b. CLEARANCE LEVEL: 26c. IT LEVEL DESIGNATION: LEVEL I LEVEL II LEVEL III 27. VERIFIED BY (Print name): 28. SECURITY MANAGER TELEPHONE NUMBER: 29. SECURITY MANAGER SIGNATURE: 30. DATE (DDMMMYYYY): PART IV - COMPLETION BY AUTHORIZED STAFF PREPARING ACCOUNT INFORMATION 31. TITLE: 31a. SYSTEM: 31b. ACCOUNT CODE: 31c. DOMAIN: 31d. SERVER: 31e. APPLICATION: 31f. DATASETS: 31g. DIRECTORIES: 31h. FILES: 32. DATE PROCESSED (DDMMMYYYY): 32a. PROCESSED BY: 32b. DATE (DDMMMYYYY): 33. DATE REVALIDATED (DDMMMYYYY): 33a. REVALIDATED BY: 33b. DATE (DDMMMYYYY): Page 3 of 6
4 INSTRUCTIONS A. PART I:The following information is provided by the user when establishing or modifying their USER IDENTIFICATION (ID). (1) Name. The last name, first name, and middle initial of the user. (2) Organization. The user's current organization (i.e., USS xx, DoD,and government agency or commercial firm). (3) Office Symbol/Department. The office symbol within the current organization (i.e., SDI). (4) Telephone Number/DSN. The Defense Switching Network (DSN) and commercial phone number of the user. (5) Official Address. The user's official address. (6) Job Title/Grade/Rank. The civilian job title (i.e., Systems Analyst YA-02, military rank (CAPT, United States Navy) or "CONT" if user is a contractor. (7) Official Mailing Address. The user's official mailing address. (8) Citizenship (United States (US), Foreign National (FN), Local National (LN), or Other), Identify appropriate citizenship in accordance with (IAW) SECNAV M (9) Designation of Person (Military, Civilian, Contractor). (10) IA Training and Awareness Certification Requirements. User must indicate if he/she has completed the Annual Information Awareness Training and the date of completion. B. PART II:The information below requires the endorsement from the user's Supervisor or the Government Sponsor. (11) Justification for Access. A brief statement is required to justify establishment of an initial USER ID. Provide appropriate information if the USER ID or access to the current USER ID is modified. (12) Type of Access Required: Place an "X" in the appropriate box. (Authorized - Individual with normal access. Privileged - Those with privilege to amend or change system configuration, parameters or settings.) (12a) If Block 12 is Privileged, user must sign a Privilege Access Agreement form. Enter date of when Privilege Access Agreement (PAA) form was signed. Users can obtain a PAA form from the Information Assurance Manager (IAM) or Appointee. (13) User Requires Access To. Place an "X" in the appropriate box. Specify category. (14) Verification of Need to Know. To verify that the user requires access as requested. (14a) Expiration Date for Access. The user must specify expiration date if less than 1 year. (15) Supervisor's Organization/Department. Supervisor's organization and department. (15a) Official Address. Supervisor's address. (15b) Phone Number. Supervisor's telephone number. (16) Supervisor's Name (Print Name). The supervisor or representative prints his/her name to indicate that the above information has been verified and that access is required. (16a) Supervisor's Signature. Supervisor's signature is required by the endorser or his/her representative. (16b) Date. Date supervisor signs the form. (17) Signature of Information Owner/OPR. Signature of the functional appointee responsible for approving access to the system being requested. (17a) Phone Number. Functional appointee telephone number. (17b) Date. The date the functional appointee signs the OPNAV 5239/14. (18) Signature of Information Assurance Manager (IAM) or Appointee. Signature of the IAM or Appointee of the office responsible for approving access to the system being requested. (19) Organization/Department. IAM's organization and department. (20) Phone Number. IAM's telephone number. (21) Date. The date the IAM signs the OPNAV 5239/14 form. (22) Standard Mandatory Notice and Consent Provision and User Responsibilities. These items are in accordance with DoD Memo dtd May 9, 2008 (Policy on Use of DoD Information Systems - Standard Consent Banner and User Agreement) and DON CIO message Responsible and Effective Use of Dept of Navy Information Technology Resources" DTG Z JUL 05. (23) Name. The last name, first name, and middle initial of the user. (24) User Signature. User must sign the OPNAV 5239/14 with the understanding that they are responsible and accountable for their password and access to the system(s). User shall digitally sign form. Pen and ink signature is acceptable for users that do not have a Common Access Card (CAC) or the ability to digitally sign the form. (25) Date. Date signed. C. PART III:Certification of Background Investigation or Clearance. (26) Type of Investigation. The user's last type of background investigation (i.e., National Agency Check (NAC), National Agency Check with Inquiries (NACI), or Single Scope Background Investigation (SSBI)). (26a) Date of Investigation. Date of last investigation. (26b) Clearance Level. The user's current security clearance level (Secret or Top Secret). (26c) Identify the user's IT designation level. If Block 12 is designated as "Authorized" then IT Level Designation is "Level III". If Block 12 is designated as "Privileged" then IT Level Designation is "Level I or II" based on SECNAV M dtd June (27) Verified By. The Security Manager or representative prints his/her name to indicate that the above clearance and investigation information has been verified. (28) Security Manager Telephone Number. The telephone number of the Security Manager or his/her representative. (29) Security Manager Signature. The Security Manager or his/her representative indicates that the above clearance and investigation information has been verified. (30) Date. The date that the form was signed by the Security Manager or his/her representative. D. PART IV: This information is site specific and can be customized by either the functional activity or the customer with approval from OPNAV. This information will specifically identify the access required by the user. (31-33b). Fill in appropriate information. E. DISPOSITION OF FORM: TRANSMISSION: Form may be electronically transmitted, faxed or mailed. If the completed form is transmitted electronically, the must be digitally signed and encrypted. FILING: Form is purposed to use digital signatures. Digitally signed forms must be stored electronically to retain non-repudiation of electronic signature. If pen and ink signature must be applied, original signed form must be retained. Retention of this form shall be IAW SECNAV Manual M , Records Management Manual. Form may be maintained by the Navy, the user's IAM, and/or Security Manager. Completed forms contain Personal Identifiable Information (PII) and must be protected as such. Page 4 of 6
5 ADDENDUM - ONE TOUCH SUPPORT BUSINESS FUNCTION ACCESS REQUEST (SUPPLEMENTAL FORM TO SAAR-N) 1. NAME (Last, First, Middle Initial): 2. DoDAAC/UIC: 3. PRIMARY JOB FUNCTION: SUPPLY OFFICER TRAINER EXPEDITER SUPPLY CLERK TECHNICAL SCREENER CONTRACTING ANALYST IT SUPPORT INVENTORY MANAGER CUSTOMER SERVICE OTHER (Specify): 4. BUSINESS FUNCTION REQUIREMENTS: 1. Does your job include transmitting MILSTRIP Requisitions, Follow-up, Modifier, Cancellation, and or MOV records to the supply system? Yes (If yes complete Block 5) No (Authorizing Official Signature Not Required) 2. Does your job require that you have access to Requisitions besides your own DoDAAC/UIC? Yes (If yes complete Block 6) No 5. MILSTRIP AUTHORIZATION (complete this section if you selected yes for question 1 in Block 4): Material Receipt Acknowledgement - Capability to submit MILSTRIP receipt confirmations only Regular - Capability to submit MILSTRIP and Material Receipt Acknowledgement transactions for your own DoDAAC/UIC Limited Proxy - Capability to submit MILSTRIP and Material Receipt Acknowledgement transactions for a list of DoDAACs/UICs (specified in text box to the right) Universal Proxy - Capability to submit MILSTRIP transactons for ALL DoDAACs. Controlled Access granted to LSR, PMO, TYCOM and GDSC- Logistics personnel (Authorizing officials must be cognizant of the impact of this level of functionality) DoDAAC/UIC Proxy List for MILSTRIP: 6. MY LOG DASHBOARD (complete this section if you selected yes for question 2 in Block 4): Limited Proxy - Capability to view requisitions for a list of DoDAACs/UICs (specified in text box to the right) Universal Proxy - Capability to view all DoDAACs/UICs (this is a controlled cabability that may require justification) DoDAAC/UIC Proxy List for MY LOG DASHBOARD: NOTE: The below signature authorization is only required for MILSTRIP processing authority. You do not need authorization for OTS Query or My Log Dashboard functionality. 7. AUTHORIZING OFFICIAL / COMMAND SUPPLY OFFICER / COMPTROLLER SIGNATURE: 8. DATE (DDMMMYYYY): (By signing, my signature indicates that the Applicant is authorized to process MILSTRIP documents for the UICs requested) Signature: (* MANDATORY FOR AUTHORIZING MILSTRIP) Name (typed/printed): (Authorizing Officials must be E7 Military/GS9 Civilian and above with Budget Authority) 9. AUTHORIZING OFFICIAL ADDRESS: 10. AUTHORIZING OFFICIAL PHONE NUMBER (COMMERCIAL): 11. DSN PREFIX: Page 5 of 6
6 Users System Authorization Access Request Guidelines Complete Sections ALL User signature, etc. (blocks 1-10, 23-33, OTS Addendum 1-6) MILSTRIP USERS FOR OFFICIAL USE ONLY WHEN FILLED DO NOT SUBMIT THIS SECTION WITH YOUR SAAR MILSTRIP Authorizing Official (AO) must be E7 and above or DoD Civilian GS-9 or above (OTS Addendum 4-11). Background Investigation Without Background Investigation Security Officer Minimum Required Background Investigation completed and favorably adjudicated within the past 10 years: Active Duty - NACLC; Government Civilian - ANACI or NACLC on a reinvestigation subsequent to the original ANACI; DOD Contractor - NACLC Your Security Officer must initiate the minimum required investigation or reinvestigation and indicate on form (Block 26) "(TYPE OF INVESTIGATION) SUBMITTED TO OPM/DSS ON (DATE)." Information Assurance Officer / Security Manager / Representative must submit the completed form to OTS using the following: Via Fax: (619) or DSN: 522 Via Mail: Commander, Global Logistics Support Attn: OTS Registrar, Code North Harbor Drive (7th Floor) San Diego, CA Via (PDF/image): [email protected] Page 6 of 6 DO NOT SUBMIT THIS SECTION WITH YOUR SAAR
ACCEPTABLE USE POLICY (AUP)
ACCEPTABLE USE POLICY (AUP) Reference: AR 25-2 (Information Assurance). A well-protected DoD/Army network enables organizations to easily handle the increasing dependence on the Internet. For a DoD/Army
Commanding Officer and Executive Officer. Information and Personnel Security Reference Handbook
Commanding Officer and Executive Officer Information and Personnel Security Reference Handbook Assistant for Information and Personnel Security (N09N2) Office of the Chief of Naval Operations Governing
USAFRICOM System Authorization Access Request (SAAR) TTP
PURPOSE: The USAFRICOM SAAR (DD Form 2875) is the required document for authorizing access for USAFRICOM staff on the Joint Enterpise Network (JEN). This document authorizes properly cleared individuals
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
DoD ANNEX FOR MOBILE DEVICE MANAGEMENT (MDM) PROTECTION PROFILE Version 1, Release 1. 14 February 2014
DoD ANNEX FOR MOBILE DEVICE MANAGEMENT (MDM) PROTECTION PROFILE Version 1, Release 1 14 February 2014 Trademark Information Names, products, and services referenced within this document may be the trade
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
Privacy Impact Assessment (PIA) Waiver Review System (WRS) Version 03.06.01.01. Last Updated: December 2, 2013
United States Department of State (PIA) Waiver Review System (WRS) Version 03.06.01.01 Last Updated: December 2, 2013 Bureau of Administration 1. Contact Information Department of State Privacy Coordinator
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Joint Personnel Adjudication System (JPAS) Account Management Policy
Defense Manpower Data Center Personnel Security & Assurance Joint Personnel Adjudication System (JPAS) Account Management Policy Document Version 7.8 9/15/2014 Table of Contents 1 PURPOSE... 4 2 BACKGROUND...
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) 2. Name of IT System: Defense Biometric Identification System (DBIDS)
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) (Use N/A where appropriate) 1. DoD Component: Defense Manpower Data Center (DMDC) 2. Name of IT System: Defense Biometric Identification System (DBIDS) 3. Budget
Frequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
Computer Security Incident Reporting and Response Policy
SECTION: 3.8 SUBJECT: Computer Security Incident Reporting and Response Policy AUTHORITY: Executive Director; Chapter 282.318, Florida Statutes - Security of Data and Information Technology Resources;
CASE MATTER MANAGEMENT TRACKING SYSTEM
for the CASE MATTER MANAGEMENT TRACKING SYSTEM September 25, 2009 Contact Point Mr. Donald A. Pedersen Commandant (CG-0948) (202) 372-3818 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
IT Security Handbook. Incident Response and Management: Targeted Collection of Electronic Data
IT Security Handbook Incident Response and Management: Targeted Collection of Electronic Data ITS HBK 2810.09 03 Effective Date: 20110824 Expiration Date: 20130824 Responsible Office: OCIO/ Deputy CIO
Joint Personnel Adjudication System (JPAS) Account Management Policy Document Version 7.13 7/23/2015
Defense Manpower Data Center Personnel Security & Assurance Joint Personnel Adjudication System (JPAS) Account Management Policy Document Version 7.13 7/23/2015 Table of Contents 1 PURPOSE... 3 2 BACKGROUND...
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government
Department of Information Technology Remote Access Audit Final Report January 2010 promoting efficient & effective local government Background Remote access is a service provided by the county to the Fairfax
Joint Personnel Adjudication System (JPAS) Account Request Procedures
Defense Manpower Data Center Personnel Security & Assurance Joint Personnel Adjudication System (JPAS) Account Request Procedures Document Version 4.2 7/23/2015 Table of Contents 1 New JPAS Account Checklist...
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
Privacy Impact Assessment (PIA) Consular Affairs Enterprise Service Bus (CAESB) 01.00.00. Last Updated: May 1, 2015
United States Department of State (PIA) Consular Affairs Enterprise Service Bus (CAESB) 01.00.00 Last Updated: May 1, 2015 Bureau of Administration 1. Contact Information A/GIS/IPS Director Bureau of Administration
FirstCarolinaCare Insurance Company Business Associate Agreement
FirstCarolinaCare Insurance Company Business Associate Agreement THIS BUSINESS ASSOCIATE AGREEMENT ("Agreement"), is made and entered into as of, 20 (the "Effective Date") between FirstCarolinaCare Insurance
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
PERSONAL COMPUTER SECURITY
PERSONAL COMPUTER SECURITY April 2001 TABLE OF CONTENTS 1 INTRODUCTION... 1 1.1 PC INFORMATION SECURITY OVERVIEW... 1 1.2 EXCLUSIONS... 1 1.3 COMMENTS AND SUGGESTIONS... 1 2 PC INFORMATION SECURITY RESPONSIBILITIES...
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the TOTAL WORKFORCE MANAGEMENT SERVICES (TWMS) Department of the Navy - CNIC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system
Introduction to The Privacy Act
Introduction to The Privacy Act Defense Privacy and Civil Liberties Office dpclo.defense.gov 1 Introduction The Privacy Act (5 U.S.C. 552a, as amended) can generally be characterized as an omnibus Code
Synapse Privacy Policy
Synapse Privacy Policy Last updated: April 10, 2014 Introduction Sage Bionetworks is driving a systems change in data-intensive healthcare research by enabling a collective approach to information sharing
esnc ACCESS AGREEMENT
FEDERAL RESERVE BOARD Shared National Credit Function esnc ACCESS AGREEMENT A. Introduction This agreement (Agreement) sets forth the terms for your Institution s use of our Electronic Shared National
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.
Department of Homeland Security Management Directives System MD Number: 11043 Issue Date: 09/17/2004 SENSITIVE COMPARTMENTED INFORMATION PROGRAM MANAGEMENT I. Purpose This directive establishes Department
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Naval Audit Service Information Management System (NASIMS) Department of the Navy - DON/AA - NAVAUDSVC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense
M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General
M E M O R A N D U M To: From: IT Steering Committee Brian Cohen Date: March 26, 2009 Subject: Revised Information Technology Security Procedures The following is a revised version of the Information Technology
Reference Guide for Security in Networks
Reference Guide for Security in Networks This reference guide is provided to aid in understanding security concepts and their application in various network architectures. It should not be used as a template
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
SMSe Privacy Impact Assessment
1. Contact Information Department of State Privacy Coordinator Margaret P. Grafeld Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
Report No. D-2010-058 May 14, 2010. Selected Controls for Information Assurance at the Defense Threat Reduction Agency
Report No. D-2010-058 May 14, 2010 Selected Controls for Information Assurance at the Defense Threat Reduction Agency Additional Copies To obtain additional copies of this report, visit the Web site of
Southern Law Center Law Center Policy #IT0004. Title: Email Policy
Southern Law Center Law Center Policy #IT0004 Title: Email Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/2012 1.0 Purpose: To provide members of
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
Covered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
This revision replaces AF Form 40A with AF Form 1289 in Attachment 3. A bar ( ) indicates a revision from the previous version.
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 36-8002 1 JULY 1998 Personnel TELECOMMUTING GUIDELINES FOR AIR FORCE RESERVISTS AND THEIR SUPERVISORS COMPLIANCE WITH THIS PUBLICATION IS
E-mail Policy Of Government of India
E-mail Policy Of Government of India October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government of India New Delhi -
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Healthcare Continuing Education and Training Enterprise Subscription Service (Swank Healthcare) US Army Medical Command - Defense Health Program (DHP) Funded Application
United States Department of State Privacy Impact Assessment Risk Analysis and Management
United States Department of State Privacy Impact Assessment Risk Analysis and Management Bureau of Administration 1. Contact Information Risk Analysis and Management (RAM) PIA Department of State Privacy
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Integrated Visual and Auditory Continuous Performance Test (IVA-AE) US Army Medical Command - Defense Health Program (DHP) Funded Application SECTION 1: IS A PIA
BUSINESS ONLINE BANKING AGREEMENT
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This
SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281. SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh
SYSTEM OF RECORDS NO.: OCIO/QN.01 SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281 SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh Street, SW, Washington
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Call Management System (Microlog ServiceFirst ) US Army Medical Command - Defense Health Program (DHP) Funded Application SECTION 1: IS A PIA REQUIRED? a. Will this
NAVY RECORDS MANAGEMENT PROGRAM COMMAND PROGRAM GUIDE
NAVY RECORDS MANAGEMENT PROGRAM COMMAND PROGRAM GUIDE Ref: (a) SECNAVINST 5210.8D, Department of the Navy Records Management Program, 31 December 2005 (b) SECNAV Manual M-5210.1, Department of the Navy,
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
PRIVACY POLICY. The effective date of this Privacy Policy is December 15, 2010. Last Updated September 29, 2014. Overview
PRIVACY POLICY The effective date of this Privacy Policy is December 15, 2010 Last Updated September 29, 2014 Overview The Bay Area Toll Authority (BATA) is committed to ensuring customer privacy and security.
An Introduction to HIPAA and how it relates to docstar
Disclaimer An Introduction to HIPAA and how it relates to docstar This document is provided by docstar to our partners and customers in an attempt to answer some of the questions and clear up some of the
TERMS OF SERVICE TELEPORT REQUEST RECEIVERS
TERMS OF SERVICE These terms of service and the documents referred to in them ( Terms ) govern your access to and use of our services, including our website teleportapp.co ( our site ), applications, buttons,
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment CGFS/DCFO/GFMS 1. Contact Information Privacy Impact Assessment (PIA) Department of State Privacy Coordinator
APHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-32 July 2005 PROCESSING CLASSIFIED
Bank Independent Bank to Bank Transfer Addendum (Consumers Only)
Bank Independent Bank to Bank Transfer Addendum (Consumers Only) This Bank to Bank Transfer Addendum (this Addendum ) is an addendum to your Online Banking Agreement and Electronic Funds Transfer Act Notice,
LET S ENCRYPT SUBSCRIBER AGREEMENT
Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf
This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.
Microsoft Online Subscription Agreement Amendment adding Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Proposal ID MOSA number Microsoft to complete This Amendment
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Diabetes Health Management System (CoPilot ) US Army Medical Command - DHP Funded Application SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD)
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Job Order Cost Accounting System (JOCAS II) United States Air Force SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system or
DATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
