Framework Notes. How has it come to be used or considered by DHS? Where is it used or being considered for use?
|
|
|
- Blanche Stevenson
- 10 years ago
- Views:
Transcription
1 Framework for Privacy Analysis of Programs, Technologies, and Applications This document is a recommended framework for analyzing programs, technologies, and applications in light of their effects on privacy and related interests. It was written for the use of the U.S. Department of Homeland Security s Data Privacy and Integrity Advisory Committee but it may also be useful elsewhere within the Department and for other governmental entities that are working to reconcile personal data-intensive programs and activities with important social and human values. Framework Summary The recommended framework is comprised of five steps. They are summarized on this page and discussed more fully in the Notes on the succeeding pages. Step 1. Scope Committee asks DHS to provide a description of the program, technology, or application. Committee reviews and comments, if appropriate. Step 2. Legal Basis Committee asks DHS to provide legal authority and legal limits for program, technology, or application. Committee reviews and comments, if appropriate. Step 3. Risk Management: Efficacy Committee asks DHS to provide results of their risk analysis and estimation of the efficacy of the program, technology, or application. Committee reviews and comments. Step 4. Effects on Privacy Interests Committee analyzes privacy interests implicated by the program, technology, or application. Step 5. Conclusion: Recommendation Committee assesses results of first four steps and makes recommendations on the program, technology, or application. 1 of 6
2 Framework Notes Step 1. Scope In Step 1, the Committee asks the relevant Department of Homeland Security component to provide a description of the program, technology, or application (hereinafter program ). The Committee then reviews and comments on the scope, if appropriate. The description should answer the following questions: What is the program under review? What is its history and origin? How has it come to be used or considered by DHS? Where is it used or being considered for use? Depending on the circumstances, it might also be important to exclude programs, technologies, or applications that are not within the ambit of the current study. In essence, the scope of the study is described here. Step 2. Legal Basis In this step, the Committee asks the relevant Department of Homeland Security component to provide the legal authority for and legal limits on the program, technology or application. The Committee then reviews and comments, if appropriate. Specifically, the following questions should be answered to the extent they can be: What is the legal authority for the item under consideration? Please consider constitutional, statutory, and other legal authority. What are the legal limits on the item under consideration? Please consider constitutional, statutory, and other legal authority. Many programs, technologies, or applications may implicate the constitutional rights that underlie privacy and related interests. This step does not require a full inquiry into the meaning of every right, but relevant constitutional provisions and rights as interpreted by the courts should be mentioned and briefly discussed, if appropriate. Step 3. Risk Management: Efficacy In Step 3, the Committee asks the relevant Department of Homeland Security component to describe the program in the context of risk management and to show how, and how well, it addresses threats. The following questions illustrate a general risk management framework: 2 of 6
3 What are you trying to protect? Every security program or technology is meant to protect some institution, infrastructure, process, person, or group that may be impacted by a threat. The asset being protected should be identified with relative particularity along with some assessment of its value if that is not obvious. This is known as target assessment. A good, specific answer to the question What are you trying to protect? would be My car. Less useful answers are too general, such as the American people. What are you trying to protect it from? Harm can come to the asset you are trying to protect various ways. The job here is to describe the relevant ways an asset may be harmed. Threats to a car include theft, accident, vandalism, misuse, grime, scratches, towing, and breakdowns. The listing of threats is called threat assessment. What is the likelihood of each threat occurring and the consequence if it does? Each threat has a different likelihood and consequence. As far as risks to a car, grime is inevitable, but it has very low consequences. Accidents are rare and have consequences that range from simple embarrassment to fatality and massive property destruction. Comparing and contrasting among relevant threats is the heart of risk management, known as risk assessment. Risk assessment helps target limited resources efficiently by focusing attention on the threats with the greatest combined likelihood and consequence. What kind of action does the program take in response to the threat? Acceptance of a threat is a rational alternative that is often chosen when it has low probability, low consequence, or both. When it merits one, there are three ways of responding to a threat: prevention, mitigation, and interdiction. The response that the program represents may be placed in one or more of these categories: o Prevention Prevention is the alteration of the target or its circumstances to diminish the risk of the bad thing happening. Driving defensively and soberly is a way of preventing accidents, for example, as is taking alternate forms of transportation. These are changes to the circumstances of the target that help avoid the threat. o Mitigation Mitigation is preparation so that, in the event of the bad thing happening, its consequences are reduced. Carrying automobile insurance is a way of reducing the consequences to you when your car is involved in an accident. o Interdiction Interdiction is any confrontation with, or influence exerted on, an attacker to eliminate or limit its movement toward causing harm. Flashing your lights to warn another car about the fact that you are passing is a mild interdiction against the threat that it will veer into your lane. 3 of 6
4 Interdiction stops or slows a person or thing that has a harmful motive or impetus. Does the response create new risks to the asset or others? The final step in analyzing the program s efficacy is to be aware of new risks created by the prevention, mitigation, or interdiction of the threats under consideration. Installing heavy iron siding to a car may mitigate the risk to the car from accidents. At the same time, the reinforced car may pose new risks to other cars and pedestrians. The creation of new risk to others is called risk transfer. Step 4. Effects on Privacy Interests This step is the heart of the process. In it, the Committee analyzes the privacy interests implicated by the program under study and how they are affected. The overarching question here is: What are the costs to privacy values and interests? Homeland security programs have many costs. Costs denominated in dollars are relatively easy to track. The focus here is on costs that are less tangible but no less important: costs to privacy and related interests. Nearly every program will have some costs to privacy and related interests, and this is not fatal. Minimizing these costs, though, is an important part of choosing and molding the appropriate response. The key privacy interests that may be affected by a particular program include: Privacy: Does the program erode individuals ability to control how personal information is collected, used, or shared? i Important subsets of this value include: o Confidentiality: Does the program include rules and practices that maximize the confidentiality of personal information? ii o Anonymity: Does the program erode individuals ability to control identifying information and to remain anonymous when they want? iii o Freedom from Surveillance: Does the program unduly use or foster surveillance? iv Several rules and practices minimize surveillance. The extent of their use may help determine how much a program promotes or restricts surveillance: Collection limitations require data collected to be highly relevant to a limited purpose. Does the program carefully circumscribe the personal data it uses or collects to that which is highly relevant? Use limitations prevent the conversion of data collected for one purpose to another use. Does the program prevent data collected 4 of 6
5 for one purpose from being used in another? Does it use data that was collected for a different purpose? Retention limitations require the disposal of data once it has been used. Does the program require the destruction of data as soon as it is no longer needed? Fairness: Does the program treat individuals fairly at every step? v Several rules and practices promote fairness. The extent of their use may help determine how much a program promotes or denies fair treatment: o Does the program collect data from the subject of the information and from known, verifiable sources? vi o Does the program ensure that it uses accurate and timely data and allow individuals access and correction rights? Does it ensure that corrections are propagated throughout the system? vii o Does the program provide redress mechanisms wherever a person may suffer an adverse determination? viii o Is the program open to public scrutiny, understanding, and participation? ix Liberty: Does the program limit individual freedom in some dimension or condition freedom of movement or action on the diminution of some privacy interest? x Data Security: Is the program secure against threats to the privacy and integrity of personal data? xi Step 5. Conclusion: Recommendation In the final step, the Committee assesses the results of first four steps and makes recommendations as to the program. The conclusion section should include any commentary, suggestions, or material that the Committee deems appropriate, but particular questions that should be answered include: Are there changes that could be made in the program that would reduce its privacy costs? Is the program worth it? Does the efficacy of the program as described in Step 3 justify the costs to privacy interests described in Step 4? Would the changes described above affect this analysis? 5 of 6
6 i Privacy: In FREEDOM AND PRIVACY (1967), Alan Westin formulated the classic early definition of privacy: the claim of individuals, groups, or institutions to determine for themselves when, how a, and to what extent information about them is communicated to others. ii Confidentiality: A pledge of confidentiality is a promise not to share further information that has already been shared. In commercial environments, this protects privacy because it allows sharing consistent with what a consumer likely wants, and no further. When governments mandate the collection of information, confidentiality rules approximate privacy as well as possible. iii Anonymity is the condition of having one s name or identity unknown or concealed. It serves valuable social purposes and empowers individuals as against institutions by limiting surveillance, but it is also used by wrongdoers to hide their actions or avoid accountability. iv Surveillance: Active surveillance is directed observation of some person or entity using means such as bugs or human operatives. Passive surveillance is the indirect monitoring of a person or entity through observation of actions, transactions, or communications. Surveillance is not inherently wrong or harmful, but awareness or even suspicion of surveillance in some contexts can inhibit individuals senses of freedom, privacy, and self-determination. v Fairness: People very much want to be treated fairly. The constitutional requirement of Due Process mandates essential fairness in government decision-making. vi Source Limitation: Source limitations require data to be collected from the subject individual when the information may result in adverse determinations about the individual s rights, benefits, and privileges. Information whose source and provenance is known and capable of independent verification is more accurate, more useful, and fairer to use than information from unknown or undisclosed sources. vii Accuracy: Accurate information is essential to accurate decision-making. Rights to access and correct personal information promote accuracy and concomitant fairness. Giving individuals access to personal information within a reasonable time, in a reasonable manner, and for a minimal fee, if any promotes fairness. The ability to challenge accuracy and correct information does so as well. viii Redress: When an adverse determination has been made about an individual s rights, benefits, or privileges, timely redress the opportunity to contest that decision with an impartial arbiter is an essential element of the fairness of that process. ix Transparency and Individual Participation: Transparency and participation promote the perception of fairness to go along with the reality of it. People should be able to find out about what personal information collected, the uses of it, and whom to contact with questions or concerns. People who understand how a program, technology, or application works, why it works, their role in it, and their rights are more inclined to perceive it as fair. x Liberty: The liberties enjoyed in a republic like the United States are many. These include Americans simple freedoms to move about, speak freely, transact business, and structure their lives and lifestyles as they choose. Programs, technologies, or applications that lessen freedom of action, movement, conscience, or choice undermine liberty. Conditioning the exercise of certain freedoms on degradation of interests like privacy also undermines liberty. xi Security: People expect organizations that collect personal information about them to protect it from unauthorized access, use, disclosure, or destruction. The steps that an organization must take to protect its assets, processes, and functions include securing servers and computers inside locked and patrolled buildings; checking the background of employees, if appropriate, and training them to use procedures that protect data; ensuring that software systems are up-to-date and that new exploits are patched quickly. An institution that lacks security cannot be certain of its ability to protect privacy and related interests. (Failure to provide sufficient data security creates new risks to others, as discussed at the end of Step 3.) 6 of 6
Enterprise K12 Network Security Policy
Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,
Corporate Policy. Data Protection for Data of Customers & Partners.
Corporate Policy. Data Protection for Data of Customers & Partners. 02 Preamble Ladies and gentlemen, Dear employees, The electronic processing of virtually all sales procedures, globalization and growing
Information for Management of a Service Organization
Information for Management of a Service Organization Copyright 2011 American Institute of Certified Public Accountants, Inc. New York, NY 10036-8775 All rights reserved. For information about the procedure
Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.
New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
POLICY. on the Protection of Personal Data of Persons of Concern to UNHCR DATA PROTECTION POLICY
POLICY on the Protection of Personal Data of Persons of Concern to UNHCR DATA PROTECTION POLICY CONTENTS 2 DATA PROTECTION POLICY 1 GENERAL PROVISIONS... 6 1.1 Purpose... 7 1.2 Rationale... 7 1.3 Scope...
Privacy Impact Assessment Of the. Office of Inspector General Information Technology Infrastructure Systems
Privacy Impact Assessment Of the Office of Inspector General Information Technology Infrastructure Systems Program or application name: Office of Inspector General Information Technology Infrastructure
RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES
PURPOSE Records and information are important strategic assets of an organization and, like other organizational assets (people, capital and technology), must be managed to maximize their value. Information
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
Accountable Privacy Management in BC s Public Sector
Accountable Privacy Management in BC s Public Sector Contents Accountable Privacy Management In BC s Public Sector 2 INTRODUCTION 3 What is accountability? 4 Steps to setting up the program 4 A. PRIVACY
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
THE BUSINESS VALUE OF SOFTWARE QUALITY
David Chappell THE BUSINESS VALUE OF SOFTWARE QUALITY Sponsored by Microsoft Corporation Every organization builds custom software for the same reason: to create business value. An essential part of that
United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)
for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
CODE OF BUSINESS CONDUCT AND ETHICS
Effective: 1 st April 2015 Table of Contents 1. PURPOSE... 3 2. SCOPE... 3 3. OWNERSHIP... 3 4. DEFINITIONS... 3 5. CONFLICTS OF INTEREST... 3 6. CORPORATE OPPORTUNITIES... 4 7. CONFIDENTIALITY AND PRIVACY...
IDENTITY THEFT AND MUNICIPAL UTILITIES
Minnesota Municipal Utilities Association IDENTITY THEFT AND MUNICIPAL UTILITIES Identity Theft and Red Flags Rule requirements The Red Flags Rule implements portions of the Fair and Accurate Credit Transactions
H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
DIVISION N CYBERSECURITY ACT OF 2015
H. R. 2029 694 DIVISION N CYBERSECURITY ACT OF 2015 SEC. 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 2015. (b) TABLE OF CONTENTS. The table
HIPAA Compliance Evaluation Report
Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations
Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development
Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development RECOMMENDATION OF THE OECD COUNCIL CONCERNING GUIDELINES FOR CONSUMER PROTECTION IN THE
The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D.
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada Purpose: This document provides
Federal Trade Commission Privacy Impact Assessment
Federal Trade Commission Privacy Impact Assessment for the: W120023 ONLINE FAX SERVICE December 2012 1 System Overview The Federal Trade Commission (FTC, Commission or the agency) is an independent federal
Privacy Impact Assessment for the. E-Verify Self Check. March 4, 2011
for the E-Verify Self Check March 4, 2011 Contact Point Janice M. Jackson Privacy Branch, Verification Division United States Citizenship and Immigration Services 202-443-0109 Reviewing Official Mary Ellen
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
Voya Financial Advisors, Inc. Registered Representative s Website Terms of Use
Voya Financial Advisors, Inc. Registered Representative s Website Terms of Use Welcome to our site. This page provides important information about use of this site and other legal matters. Please read
PHILIPPINE LONG DISTANCE TELEPHONE COMPANY CODE OF BUSINESS CONDUCT AND ETHICS
PHILIPPINE LONG DISTANCE TELEPHONE COMPANY CODE OF BUSINESS CONDUCT AND ETHICS Philippine Long Distance Telephone Company ( PLDT or the Company ) is dedicated to doing business in accordance with the highest
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: October 2001 LETTER NO.: 01-CU-12 TO: SUBJ: Federally Insured Credit Unions e-commerce Insurance
INFORMATION SECURITY MANAGEMENT POLICY
INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June
Valdosta Technical College. Information Security Plan
Valdosta Technical College Information Security 4.4.2 VTC Information Security Description: The Gramm-Leach-Bliley Act requires financial institutions as defined by the Federal Trade Commision to protect
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
Federal Bureau of Investigation s Integrity and Compliance Program
Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established
Data Protection Policy.
Data Protection Policy. Data Protection Policy Foreword 2 Foreword Ladies and Gentlemen, In the information age, we offer customers the means to be always connected, even in their cars. This requires data
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
Autoridade Bancária e de Pagamentos de Timor-Leste Banking and Payments Authority of Timor-Leste
Autoridade Bancária e de Pagamentos de Timor-Leste Banking and Payments Authority of Timor-Leste PUBLIC INSTRUCTION 02/2004 ON THE PREVENTION OF MONEY LAUNDERING, CUSTOMER IDENTIFICATION AND RECORD-KEEPING
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)
Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative
Preservation of longstanding, roles and missions of civilian and intelligence agencies
Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto
Civil Justice Council response to Insurance Task Force interim report. May 2015
Civil Justice Council response to Insurance Task Force interim report May 2015 The CJC welcomes an initiative to combat insurance fraud, which is not always easy to detect, but is a crime, and does lead
Risk Assessment Guide
KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment
Corporate Policy and Procedure
Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
Introduction to Information Security
Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit
COMMISSION REGULATION (EU) No /.. of XXX
EUROPEAN COMMISSION Brussels, XXX [ ](2013) XXX draft COMMISSION REGULATION (EU) No /.. of XXX on the measures applicable to the notification of personal data breaches under Directive 2002/58/EC on privacy
Cyber Threats: Exposures and Breach Costs
Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals
Electronic Payment Schemes Guidelines
BANK OF TANZANIA Electronic Payment Schemes Guidelines Bank of Tanzania May 2007 Bank of Tanzania- Electronic Payment Schemes and Products Guidleness page 1 Bank of Tanzania, 10 Mirambo Street, Dar es
The Strategic Operating Plan of The Internet Society. Part I Strategy
The Strategic Operating Plan of The Internet Society Part I Strategy Our Vision The Internet Society believes that the Internet is for everyone. From its inception the purpose of the Internet Society has
Identity Theft Prevention Program. Effective: November 1, 2009
Identity Theft Prevention Program Effective: November 1, 2009 I. BACKGROUND Galveston College ("College" / Institution ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal
1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services
1. Computer Security: An Introduction Definitions Security threats and analysis Types of security controls Security services Mar 2012 ICS413 network security 1 1.1 Definitions A computer security system
Personal Information Protection Act Information Sheet 11
Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores
Charter of the Audit Committee of the Board of Directors
Charter of the Audit Committee of the Board of Directors Dated as of April 27, 2015 1. Purpose The Audit Committee is a committee of the Board of Directors (the Board ) of Yamana Gold Inc. (the Company
C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
United States Department of State Privacy Impact Assessment Risk Analysis and Management
United States Department of State Privacy Impact Assessment Risk Analysis and Management Bureau of Administration 1. Contact Information Risk Analysis and Management (RAM) PIA Department of State Privacy
WESTERN ASSET MORTGAGE CAPITAL CORPORATION CODE OF CONDUCT
WESTERN ASSET MORTGAGE CAPITAL CORPORATION CODE OF CONDUCT I. Introduction This Code of Conduct (the "Code") sets out basic principles to guide the day-today business activities of directors, officers
STATE OF MINNESOTA POLICY ON ALCOHOL AND OTHER DRUG USE BY STATE EMPLOYEES. I. Introduction. II. Scope of Coverage. III.
STATE OF MINNESOTA POLICY ON ALCOHOL AND OTHER DRUG USE BY STATE EMPLOYEES I. Introduction The State of Minnesota recognizes that alcoholism and other drug dependencies are a significant social problem
Privacy Impact Assessment for the. E-Verify Self Check. DHS/USCIS/PIA-030(b) September 06, 2013
for the E-Verify Self Check DHS/USCIS/PIA-030(b) September 06, 2013 Contact Point Donald K. Hawkins Privacy Officer United States Citizenship and Immigration Services (202) 272-8030 Reviewing Official
MALAYSIAN TECHNOLOGY DEVELOPMENT CORPORATION SDN. BHD.
MALAYSIAN TECHNOLOGY DEVELOPMENT CORPORATION SDN. BHD. WHISTLEBLOWING POLICY AND GUIDELINES 16 March 2012 Version 1.0 TABLE OF CONTENTS WHISTLEBLOWING POLICY Page WHISTLEBLOWING GUIDELINES B1 DEFINITION
Reducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner, Ontario, Canada Purpose: This document
National Infrastructure Protection Center
National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities
Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy
Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy We thank the administration for this valuable opportunity to engage in a national
At Cambrian, Your Privacy is Our Priority. Regardless of how you deal with us on the phone, online, or in person we have strict security measures
Privacy Policy At Cambrian, Your Privacy is Our Priority At Cambrian Credit Union, we know our members are concerned about the confidentiality and security of their personal information. This Policy ensures
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
United States Trustee Program
United States Trustee Program Privacy Impact Assessment for the Credit Counseling/Debtor Education System (CC/DE System) Issued by: Larry Wahlquist, Privacy Point of Contact Reviewed by: Approved by: Vance
Open Source Voting Systems
Presented to: 2015 State Certification Testing of Voting Systems National Conference Paul W. Craft Kathleen A. McGregor May, 19, 2015 Introduction One concern raised in the aftermath of Election 2000 was
4.10 Information Management Policy
Policy Statement Information is a strategic business resource that the must manage as a public trust on behalf of Nova Scotians. Effective information management makes program and service delivery more
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Setting the Record Straight: U.S. Department of Homeland Security Policies on Protecting Privacy. Lauren Saadat and Shannon Ballard 1
Setting the Record Straight: U.S. Department of Homeland Security Policies on Protecting Privacy Lauren Saadat and Shannon Ballard 1 As published in the November 2007 issue of Data Protection Law & Policy
CORK INSTITUTE OF TECHNOLOGY
CORK INSTITUTE OF TECHNOLOGY DATA PROTECTION POLICY APPROVED BY GOVERNING BODY ON 30 APRIL 2009 INTRODUCTION Cork Institute of Technology is committed to a policy of protecting the rights and privacy of
Security Defense Strategy Basics
Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
Personal Data Protection Policy and Practices ( the Policy )
Personal Data Protection Policy and Practices ( the Policy ) FWD Life Insurance Company (Bermuda) Limited ("the Company") is committed to implementation and compliance with the provisions of the Personal
Information which may be refused (with reference to the Part 2 of Code on access
Information which may be refused (with reference to the Part 2 of Code on access to Information of the Government published in Feb 2009) CC may refuse to disclose information, or may refuse to confirm
