Privacy

Agencies Should Ensure That Designated Senior Officials Have Oversight of Key Functions

Author: Linda D. Koontz

Publisher: DIANE Publishing

ISBN: 1437906672

Category:

Page: 37

View: 9594

Government agencies have a long-standing obligation under the Privacy Act of 1974 to protect the privacy of individuals about whom they collect personal information. A number of additional laws have been enacted in recent years directing agency heads to designate senior officials as focal points with overall responsibility for privacy. This report: (1) describes laws and guidance that set requirements for senior privacy officials within fed. agencies; and (2) describes the organizational structures used by agencies to address privacy requirements and assesses whether senior officials have oversight over key functions. The author analyzed the laws and guidance and analyzed policies and procedures relating to key privacy functions at 12 agencies.

Department of Education

Improved Oversight and Controls Could Help Education Better Respond to Evolving Priorities

Author: George A. Scott

Publisher: DIANE Publishing

ISBN: 1437981429

Category:

Page: 67

View: 2997

The Future of the Internet: Ubiquity, mobility, security

Author: Janna Quitney Anderson,Harrison Rainie

Publisher: Cambria Press

ISBN: 1604976152

Category: Computers

Page: 627

View: 1956

About the series: Technology builders, entrepreneurs, consultants, academicians, and futurists from around the world share their wisdom in The Future of the Internet surveys conducted by the Pew Internet & American Life Project and Elon University. The series of surveys garners smart, detailed assessments of multilayered issues from a variety of voices, ranging from the scientists and engineers who created the first Internet architecture a decade ago to social commentators to technology leaders in corporations, media, government, and higher education. Among the respondents are people affiliated with many of the world's top organizations, including IBM, AOL, Microsoft, Intel, ICANN, the Internet Society, Google, W3C, Internet2, and Oracle; Harvard, MIT, and Yale; and the Federal Communications Commission, FBI, U.S. Census Bureau, Social Security Administration, and U.S. Department of State. They provide significant and telling responses to questions about the future of government, education, media, entertainment, commerce, and more. They foresee continuing conflicts over control of networked communications and the content produced and shared online. Ubiquity, Mobility, Security: The Future of the Internet, Volume 3: Based on the third canvassing of Internet specialists and analysts by the Pew Internet & American Life Project, this volume showcases the responses of technology stakeholders and critics who were asked to assess scenarios about the future social, political, and economic impact of the Internet. Some 578 leading Internet activists, builders, and commentators responded in this survey to scenarios about the effect of the Internet on social, political, and economic life in the year 2020. An additional 618 stakeholders also participated in the study, for a total of 1,196 participants who shared their views. The insights garnered in the study included predictions made on the role and importance of mobile devices, the transparency of people and organizations, talk and touch user interfaces with the Internet, the challenges of sharing content while trying to perfect intellectual property law and copyright protection, divisions between work and personal time given the blurring of physical and virtual reality, and the "next-generation" engineering of the network to improve the current Internet structure.

Information Security

NASA Needs to Remedy Vulnerabilities in Key Networks

Author: Gregory C. Wilshusen

Publisher: DIANE Publishing

ISBN: 1437924360

Category:

Page: 53

View: 7949

NASA relies extensively on information systems and networks to pioneer space exploration, scientific discovery, and aeronautics research. Many of these systems and networks are interconnected through the Internet, and may be targeted by evolving and growing cyber threats from a variety of sources. This report: (1) determines whether NASA has implemented appropriate controls to protect the confidentiality, integrity, and availability of the information and systems used to support NASA¿s mission directorates; and (2) assesses NASA¿s vulnerabilities in the context of prior incidents and corrective actions. The report examined network and system controls in place at 3 centers; and analyzed IS policies, plans, and reports.

Information Security Fundamentals, Second Edition

Author: Thomas R. Peltier

Publisher: CRC Press

ISBN: 143981063X

Category: Business & Economics

Page: 438

View: 7562

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act. Detailing physical security requirements and controls, this updated edition offers a sample physical security policy and includes a complete list of tasks and objectives that make up an effective information protection program. Includes ten new chapters Broadens its coverage of regulations to include FISMA, PCI compliance, and foreign requirements Expands its coverage of compliance and governance issues Adds discussions of ISO 27001, ITIL, COSO, COBIT, and other frameworks Presents new information on mobile security issues Reorganizes the contents around ISO 27002 The book discusses organization-wide policies, their documentation, and legal and business requirements. It explains policy format with a focus on global, topic-specific, and application-specific policies. Following a review of asset classification, it explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. The text concludes by describing business continuity planning, preventive controls, recovery strategies, and how to conduct a business impact analysis. Each chapter in the book has been written by a different expert to ensure you gain the comprehensive understanding of what it takes to develop an effective information security program.

Privacy in the hands of the government

the privacy officer for the Department of Homeland Security and the privacy officer for the Department of Justice : hearing before the Subcommittee on Commercial and Administrative Law of the Committee on the Judiciary, House of Representatives, One Hundred Ninth Congress, second session, May 17, 2006

Author: United States. Congress. House. Committee on the Judiciary. Subcommittee on Commercial and Administrative Law

Publisher: Not Avail

ISBN: N.A

Category: Law

Page: 73

View: 3912

GAO documents

Author: United States. General Accounting Office

Publisher: N.A

ISBN: N.A

Category: Political Science

Page: N.A

View: 1979

"Catalog of reports, decisions and opinions, testimonies and speeches".

Congressional Record

Proceedings and Debates of the ... Congress

Author: United States. Congress

Publisher: N.A

ISBN: N.A

Category: Law

Page: N.A

View: 1345

The Congressional Record is the official record of the proceedings and debates of the United States Congress. It is published daily when Congress is in session. The Congressional Record began publication in 1873. Debates for sessions prior to 1873 are recorded in The Debates and Proceedings in the Congress of the United States (1789-1824), the Register of Debates in Congress (1824-1837), and the Congressional Globe (1833-1873)

Annual Report

Author: International Monetary Fund

Publisher: N.A

ISBN: N.A

Category: Globalization

Page: N.A

View: 8401

Credit Rating Agencies and the Next Financial Crisis

Hearing Before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, First Session, September 30, 2009

Author: N.A

Publisher: N.A

ISBN: N.A

Category: Global Financial Crisis, 2008-2009

Page: 202

View: 7800

Leadership Challenge

Author: James M. Kouzes,Barry Z. Posner

Publisher: John Wiley & Sons

ISBN: 9783527503742

Category: Executive ability

Page: 382

View: 5405

Through research, interviews and the experience of hundreds of managers, Kouzes and Posner show how leadership can be learned and mastered by all. Readable, interesting, and up-to-date. Highly recommended.--Library Journal.

OECD-Leitsätze für multinationale Unternehmen

Author: OECD

Publisher: OECD Publishing

ISBN: 9264122354

Category:

Page: 106

View: 9998

Die OECD-Leitsätze für multinationale Unternehmen sind das weltweit wichtigste staatlich geförderte Instrument für verantwortungsvolles unternehmerisches Handeln. Die Ausgabe 2011 enthält neue Empfehlungen zu den Menschenrechten und zur Verantwortung der Unternehmen für ihre Zulieferketten.

Die entscheidenden 90 Tage

So meistern Sie jede neue Managementaufgabe

Author: Michael Watkins

Publisher: Campus Verlag

ISBN: 3593501295

Category: Law

Page: 247

View: 1374

Michael Watkins gibt Managern aller Ebenen einen überzeugenden Zehn-Punkte-Plan an die Hand, der die strategische Grundlage für langfristigen Erfolg in einer neuen Position legt. Er zeigt unter anderem, wie man die Situation des Unternehmens umfassend analysiert, die eigenen Stärken und Schwächen erkennt und ein schlagkräftiges Team zusammenstellt. In der Neuauflage geht Watkins auf die neuesten Entwicklungen des Executive Onboarding ein, wie zum Beispiel die verbesserte Kommunikation und Führung des Teams oder die strategische Ausrichtung von Organisationen. Wer in den ersten 90 Tagen die richtigen Entscheidungen trifft, wird seine neue Aufgabe erfolgreich meistern.

Leading Change

Wie Sie Ihr Unternehmen in acht Schritten erfolgreich verändern

Author: John P. Kotter

Publisher: Vahlen

ISBN: 3800646153

Category: Fiction

Page: 158

View: 9037

John P. Kotters wegweisendes Werk Leading Change erschien 1996 und zählt heute zu den wichtigsten Managementbüchern überhaupt. Es wurde in zahlreiche Sprachen übersetzt und millionenfach verkauft. Der Druck auf Unternehmen, sich den permanent wandelnden internen und externen Einflüssen zu stellen, wird weiter zunehmen. Dabei gehört ein offener, aber professionell geführter Umgang mit Change-Prozessen zu den Wesensmerkmalen erfolgreicher Unternehmen im 21. Jahrhundert und zu den größten Herausforderungen in der Arbeit von Führungskräften. Einer der weltweit renommiertesten Experten auf diesem Gebiet hat basierend auf seinen Erfahrungen aus Forschung und Praxis einen visionären Text geschrieben, der zugleich inspirierend und gefüllt ist mit bedeutenden Implikationen für das Change-Management. Leading Change zeigt Ihnen, wie Sie Wandlungsprozesse in Unternehmen konsequent führen. Beginnend mit den Gründen, warum viele Unternehmen an Change-Prozessen scheitern, wird im Anschluss ein Acht-Stufen-Plan entwickelt, der Ihnen hilft, pragmatisch einen erfolgreichen Wandel zu gestalten. Wenn Sie wissen möchten, warum Ihre letzte Change-Initiative scheiterte, dann lesen Sie dieses Buch am besten gleich, sodass Ihr nächstes Projekt von Erfolg gekrönt wird. Ralf Dobelli, getabstract.com Leading Change is simply the best single work I have seen on strategy implementation. William C. Finnie, Editor-in-Chief Strategy & Leadership Leading Change ist ein weltweiter, zeitloser Bestseller. Werner Seidenschwarz, Seidenschwarz & Comp.