Agencies Should Ensure That Designated Senior Officials Have Oversight of Key Functions

Author: Linda D. Koontz

Publisher: DIANE Publishing

ISBN: 1437906672


Page: 37

View: 354

Government agencies have a long-standing obligation under the Privacy Act of 1974 to protect the privacy of individuals about whom they collect personal information. A number of additional laws have been enacted in recent years directing agency heads to designate senior officials as focal points with overall responsibility for privacy. This report: (1) describes laws and guidance that set requirements for senior privacy officials within fed. agencies; and (2) describes the organizational structures used by agencies to address privacy requirements and assesses whether senior officials have oversight over key functions. The author analyzed the laws and guidance and analyzed policies and procedures relating to key privacy functions at 12 agencies.

Department of Education

Improved Oversight and Controls Could Help Education Better Respond to Evolving Priorities

Author: George A. Scott

Publisher: DIANE Publishing

ISBN: 1437981429


Page: 67

View: 1540

The Future of the Internet: Ubiquity, mobility, security

Author: Janna Quitney Anderson,Harrison Rainie

Publisher: Cambria Press

ISBN: 1604976152

Category: Computers

Page: 627

View: 3096

About the series: Technology builders, entrepreneurs, consultants, academicians, and futurists from around the world share their wisdom in The Future of the Internet surveys conducted by the Pew Internet & American Life Project and Elon University. The series of surveys garners smart, detailed assessments of multilayered issues from a variety of voices, ranging from the scientists and engineers who created the first Internet architecture a decade ago to social commentators to technology leaders in corporations, media, government, and higher education. Among the respondents are people affiliated with many of the world's top organizations, including IBM, AOL, Microsoft, Intel, ICANN, the Internet Society, Google, W3C, Internet2, and Oracle; Harvard, MIT, and Yale; and the Federal Communications Commission, FBI, U.S. Census Bureau, Social Security Administration, and U.S. Department of State. They provide significant and telling responses to questions about the future of government, education, media, entertainment, commerce, and more. They foresee continuing conflicts over control of networked communications and the content produced and shared online. Ubiquity, Mobility, Security: The Future of the Internet, Volume 3: Based on the third canvassing of Internet specialists and analysts by the Pew Internet & American Life Project, this volume showcases the responses of technology stakeholders and critics who were asked to assess scenarios about the future social, political, and economic impact of the Internet. Some 578 leading Internet activists, builders, and commentators responded in this survey to scenarios about the effect of the Internet on social, political, and economic life in the year 2020. An additional 618 stakeholders also participated in the study, for a total of 1,196 participants who shared their views. The insights garnered in the study included predictions made on the role and importance of mobile devices, the transparency of people and organizations, talk and touch user interfaces with the Internet, the challenges of sharing content while trying to perfect intellectual property law and copyright protection, divisions between work and personal time given the blurring of physical and virtual reality, and the "next-generation" engineering of the network to improve the current Internet structure.

Public Administration and Public Affairs

Author: Nicholas Henry

Publisher: Prentice Hall


Category: Political Science

Page: 404

View: 4538

For introductory courses in public administration, public affairs, and public policy. "Public Administration and Public Affairs "examines the realities underlying the stereotypes that are brought out by both phrases. "Public Administration and ""Public Affairs "is about both the means used to fulfill the public interest, and the human panoply that is the public interest. It keeps up with the tumultuous world of public administration and public affairs and it reports that tumult in a reasonably engaging manner.

Information Security

NASA Needs to Remedy Vulnerabilities in Key Networks

Author: Gregory C. Wilshusen

Publisher: DIANE Publishing

ISBN: 1437924360


Page: 53

View: 3973

NASA relies extensively on information systems and networks to pioneer space exploration, scientific discovery, and aeronautics research. Many of these systems and networks are interconnected through the Internet, and may be targeted by evolving and growing cyber threats from a variety of sources. This report: (1) determines whether NASA has implemented appropriate controls to protect the confidentiality, integrity, and availability of the information and systems used to support NASA¿s mission directorates; and (2) assesses NASA¿s vulnerabilities in the context of prior incidents and corrective actions. The report examined network and system controls in place at 3 centers; and analyzed IS policies, plans, and reports.

Risk Management Framework

A Lab-Based Approach to Securing Information Systems

Author: James Broad

Publisher: Newnes

ISBN: 0124047238

Category: Computers

Page: 316

View: 500

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader’s own organization. A comprehensive case study from initiation to decommission and disposal Detailed explanations of the complete RMF process and its linkage to the SDLC Hands on exercises to reinforce topics Complete linkage of the RMF to all applicable laws, regulations and publications as never seen before

Privacy in the hands of the government

the privacy officer for the Department of Homeland Security and the privacy officer for the Department of Justice : hearing before the Subcommittee on Commercial and Administrative Law of the Committee on the Judiciary, House of Representatives, One Hundred Ninth Congress, second session, May 17, 2006

Author: United States. Congress. House. Committee on the Judiciary. Subcommittee on Commercial and Administrative Law

Publisher: Not Avail


Category: Law

Page: 73

View: 5304

GAO documents

Author: United States. General Accounting Office

Publisher: N.A


Category: Political Science

Page: N.A

View: 8302

"Catalog of reports, decisions and opinions, testimonies and speeches".

Protecting Personal Information

Is the Federal Government Doing Enough? : Hearing Before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, Second Session, June 18, 2008

Author: N.A

Publisher: N.A


Category: Data protection

Page: 170

View: 7906

Privacy in the hands of government

the Privacy and Civil Liberties Oversight Board and the privacy officer for the U.S. Department of Homeland Security : hearing before the Subcommittee on Commercial and Administrative Law of the Committee on the Judiciary, House of Representatives, One Hundred Tenth Congress, first session, July 24, 2007

Author: United States. Congress. House. Committee on the Judiciary. Subcommittee on Commercial and Administrative Law

Publisher: Government Printing Office


Category: Law

Page: 238

View: 4838

Congressional Record

Proceedings and Debates of the ... Congress

Author: United States. Congress

Publisher: N.A


Category: Law

Page: N.A

View: 3142

The Congressional Record is the official record of the proceedings and debates of the United States Congress. It is published daily when Congress is in session. The Congressional Record began publication in 1873. Debates for sessions prior to 1873 are recorded in The Debates and Proceedings in the Congress of the United States (1789-1824), the Register of Debates in Congress (1824-1837), and the Congressional Globe (1833-1873)

Oversight of U.S. Government intelligence functions

hearings before the Committee on Government Operations, United States Senate, Ninety-fourth Congress, second session ....

Author: N.A

Publisher: N.A


Category: Intelligence service

Page: 535

View: 9066

United States Code


Author: N.A

Publisher: N.A


Category: Law

Page: N.A

View: 6657

Bundesverfassungsgerichtsgesetz -BVerfGG

Author: Deutschland

Publisher: "Издательство ""Проспект"""

ISBN: 5392068219

Category: Law

Page: 55

View: 9852

BVerfGG Ausfertigungsdatum: 12.03.1951 Vollzitat: "Bundesverfassungsgerichtsgesetz in der Fassung der Bekanntmachung vom 11. August 1993 (BGBl. I S. 1473), das zuletzt durch Artikel 2 des Gesetzes vom 24. November 2011 (BGBl. I S. 2302) geändert worden ist" Stand: Neugefasst durch Bek. v. 11.8.1993 I 1473; zuletzt geändert Art. 2 G v. 24.11.2011 I 2302

OECD-Leitsätze für multinationale Unternehmen

Author: OECD

Publisher: OECD Publishing

ISBN: 9264122354


Page: 106

View: 5765

Die OECD-Leitsätze für multinationale Unternehmen sind das weltweit wichtigste staatlich geförderte Instrument für verantwortungsvolles unternehmerisches Handeln. Die Ausgabe 2011 enthält neue Empfehlungen zu den Menschenrechten und zur Verantwortung der Unternehmen für ihre Zulieferketten.

Leading Change

Wie Sie Ihr Unternehmen in acht Schritten erfolgreich verändern

Author: John P. Kotter

Publisher: Vahlen

ISBN: 3800646153

Category: Fiction

Page: 158

View: 6448

John P. Kotters wegweisendes Werk Leading Change erschien 1996 und zählt heute zu den wichtigsten Managementbüchern überhaupt. Es wurde in zahlreiche Sprachen übersetzt und millionenfach verkauft. Der Druck auf Unternehmen, sich den permanent wandelnden internen und externen Einflüssen zu stellen, wird weiter zunehmen. Dabei gehört ein offener, aber professionell geführter Umgang mit Change-Prozessen zu den Wesensmerkmalen erfolgreicher Unternehmen im 21. Jahrhundert und zu den größten Herausforderungen in der Arbeit von Führungskräften. Einer der weltweit renommiertesten Experten auf diesem Gebiet hat basierend auf seinen Erfahrungen aus Forschung und Praxis einen visionären Text geschrieben, der zugleich inspirierend und gefüllt ist mit bedeutenden Implikationen für das Change-Management. Leading Change zeigt Ihnen, wie Sie Wandlungsprozesse in Unternehmen konsequent führen. Beginnend mit den Gründen, warum viele Unternehmen an Change-Prozessen scheitern, wird im Anschluss ein Acht-Stufen-Plan entwickelt, der Ihnen hilft, pragmatisch einen erfolgreichen Wandel zu gestalten. Wenn Sie wissen möchten, warum Ihre letzte Change-Initiative scheiterte, dann lesen Sie dieses Buch am besten gleich, sodass Ihr nächstes Projekt von Erfolg gekrönt wird. Ralf Dobelli, Leading Change is simply the best single work I have seen on strategy implementation. William C. Finnie, Editor-in-Chief Strategy & Leadership Leading Change ist ein weltweiter, zeitloser Bestseller. Werner Seidenschwarz, Seidenschwarz & Comp.