Listing of Defense Intelligence Agency (DIA) Inspector General (OIG) investigations closed during CY 2013

Size: px
Start display at page:

Download "Listing of Defense Intelligence Agency (DIA) Inspector General (OIG) investigations closed during CY 2013"

Transcription

1 Description of document: Requested date: Released date: Posted date: Source of document: Listing of Defense Intelligence Agency (DIA) Inspector General (OIG) investigations closed during CY January September December-2015 Defense Intelligence Agency ATTN: FAC2A1 (FOIA) 7400 Pentagon Washington, DC Fax: (301) Request templates available here The governmentattic.org web site ( the site ) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website.

2 DEFENSE INTELLIGENCE AGENCY WASHINGTON, D.C U /FAC2Al (FOIA) SEP This responds to your Freedom oflnformation Act (FOIA) request, dated January 5, 2015, case number , that you submitted to the Defense Intelligence Agency (DIA)/or a copy of the list or printout or database listing of JG investigations closed during calendar year I apologize for the delay in responding to your request. DIA continues its efforts to eliminate the large backlog of pending FOIA requests. In order to properly respond, it was necessary to consult with another office within the agency. A search ofdia's systems ofrecords located one document (5 pages) responsive to your request. Upon review, I have determined that this document is appropriate for release in full. DIA has not withheld any reasonably segregable non-exempt portions of the record. Sincerely, 1 Enclosure a/s Alesia Y. Williams Chief, FOIA and Declassification Services Office

3 Case Type Case Number Case Title Date Initiated Investigation Case Closed Closed Date Date Criminal Investigations (U) Time and Attendance (T&A) Fraud Investigation 04/30/ /26/ /17/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 06/02/ /30/ /17/2013 Criminal Investigations (U) Privacy Act Violation Investigation 10/13/ /12/ /18/2013 Criminal Investigations (U) Privacy Act Violation Investigation 10/13/ /01/ /08/2013 Criminal lnvestirations I (U) Time and Attendance (T&A) Fraud Investigation 12/01/ /08/ /11/2013 Criminal Investigations (U) Misuse of Government IT Systems Investigation 05/02/ /01/ /01/2013 Criminal Investigations (U) Bribery and Conflict of Interest Investigation 05/10/ /07/ /18/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 06/02/ /29/ /24/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 06/02/ /12/ /24/2013 Criminal Investigations (U) Temporary Duty Fraud Investigation 06/13/ /10/ /20/2013 Criminal Investigations (U) External Request for Assistance 06/16/ /20/ /21/2013 Criminal Investigations (U) Failure to Pay Debt Investigation 07/26/ /23/ /28/2013 Criminal lnvestirations (U) Misuse of Government Property Investigation 07/26/ /27/ /20/2013 Criminal Investigations (U) Time and Attendance (T&A) Fraud Investigation 07/26/ /06/ /18/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 07/26/ /22/ /03/2013 Criminal Investigations (U) Contractor Cost Mischarglng Investigation 09/09/ /20/ /14/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 09/12/ /12/ /03/2013 Criminal Investigations (U) Whistleblower Reprisal Investigation 09/15/ /06/ /08/2013 Criminal Investigations (U) Time and Attendance (T&A) Fraud Investigation 09/30/ /07/ /08/2013 Criminal Investigations (U) Misuse of Government IT Systems Investigation 10/13/ /27/ /20/2013 Criminal Investigations (U) Misuse of Government IT Systems Investigation 10/14/ /06/ /10/2013 Criminal Investigations (U) Time and Attendance (T&A) Fraud Investigation 12/02/ /21/ /18/2013 Criminal Investigations (U) Theft of Government Information Investigation 01/19/ /29/ /17/2013 Criminal lnvestiaations (U) Misuse of Government IT Systems Investigation 01/23/ /02/ /11/2013 Criminal Investigations (U) Time and Attendance (T&A) Investigation 02/29/ /26/ /20/2013 Criminal Investigations (U) Time and Attendance (T&A) Investigation 03/06/ /19/ /18/2013 Criminal Investigations I (U) Time and Attendance (T&A) Investigation 03/28/ /20/ /14/2013 Criminal Investigations (U) Misuse of Government Travel Card Investigation 04/23/ /28/ /29/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 05/11/ /02/ /03/2013 Criminal Investigations (U) Temporary Quarters Subsistence Eicpenses Investigation 05/14/ /02/ /08/2013 Criminal Investigations I (U) Security Matters Investigation 06/07/ /19/ /20/2013 Criminal Investigations (U) Conflict of Interest Investigation 06/11/ /26/ /11/2013 Criminal Investigations (U) Employee Misconduct Investigation 06/11/ /16/ /17/2013

4 Criminal Investigations (U) Misuse of Government Purchase card Investigation 06/14/ /09/ /13/2013 Criminal Investigations (U) Whistleblower Reprisal Investigation 06/22/ /25/ /02/2013 Criminal Investigations (U) Misuse of Government IT Systems Investigation 06/25/ /16/ /15/2013 Criminal Investigations (U) Whistleblower Reprisal Investigation 07/18/ /15/ /28/2013 Criminal Investigations (U) Time and Attendance (T&A) Investigation 07/25/ /06/ /23/2013 Criminal Investigations (U) Contract Improprieties Investigation 08/09/ /23/ /24/2013 Criminal Investigations (U) Misuse of Government IT Systems Investigation 09/13/ /15/ /17/2013 Criminal Investigations (U) Security Matters Investigation 09/13/ /16/ /24/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 09/20/ /01/ /14/2013 Criminal Investigations (U) DIA, 1st Quarter FY 2013 Fraud Awareness Briefing File 09/28/ /07/ /10/2013 Criminal lnvestigation (U) Misuse of Government Vehicle Investigation 10/02/ /19/ /20/2013 Criminal Investigations (U) Employee Misconduct Investigation 10/09/ /16/ /25/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 10/11/ /04/ /19/2013 Criminal Investigations (U) External Request for Assistance 10/26/ /08/ /11/2013 Criminal Investigations (U) Misuse of Government Vehicle Investigation 11/14/ /26/ /10/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 11/20/ /29/ /18/2013 I Criminal Investigations (U) Abuse of Authority Investigation 11/28/ /05/ /10/2013 Criminal Investigations (U) Temporary Duty Fraud Investigation 12/11/ /15/ /22/2013 Criminal Investigations (U) Contract Improprieties Investigation 12/17/ /16/ /28/2013 Criminal Investigations (U) DIA, 2nd Quarter FY 2013 Fraud Awareness Briefing File 01/07/ /01/ /03/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 01/07/ /21/ /19/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 01/08/ /31/ /31/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 01/15/ /17/ /18/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 01/16/ /03/ /17/2013 Criminal Investigations (U) False Official Statements and Waste of 02/08/ /04/ /23/2013 Government Funds Investigation Criminal Investigations (U) USERRA Violation Investigation 02/08/ /08/ /11/2013 Criminal Investigations (U) Temporary Duty Fraud Investigation 02/19/ /27/ /27/2013 Criminal Investigations (U) Conflict of Interest Investigation 02/27/ /12/ /14/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 02/27/ /26/ /22/2013 Criminal Investigations DI {U) Theft of Government Property 03/01/ /29/ /27/2013 Criminal Investigations (U) External Request for Assistance 03/15/ /01/ /02/2013 Criminal Investigations DI (U) External Request for Assistance 03/21/ /07/ /10/2013 Criminal Investigations (U) Unauthorized Personnel Actions Investigation 03/27/ /02/ /20/2013

5 Criminal Investigations (U) Waste of Government Resources Investigation 03/28/ /15/ /20/2013 Criminal Investigations I (U) DIA, 3rd Quarter Pl 2013 Fraud Awareness Briefing File 03/29/ /30/ /18/2013 Criminal Investigations (U) Whistleblower Reprisal Investigation 04/04/ /16/ /20/2013 Criminal Investigations (U) Waste of Government Resources Investigation 04/08/ /20/ /19/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 04/11/ /06/ /09/2013 Criminal Investigations (U) Contract Irregularities Investigation 04/16/ /17/ /24/2013 Criminal Investigations (U) Unauthorized Personnel Actions Investigation 05/22/ /18/ /19/2013 Criminal Investigations (U} Employee Misconduct Investigation 05/30/ /25/ /26/2013 Criminal Investigations (U) Procurement Matters Investigation 06/10/ /24/ /05/2013 Criminal Investigations (U) External Request for Assistance 06/28/ /26/ /27/2013 Criminal Investigations (U} DIA, 4th Quarter F'l 2013 Fraud Awareness Briefing File 07/15/ /21/ /22/2013 Criminal Investigations (U) External Request for Assistance 07/23/ /28/ /05/2013 Criminal Investigations {U} External Request for Assistance 08/07/ /23/ /27/2013 Criminal Investigations I (U) External Request for Assistance 09/13/ /02/ /11/2013 Criminal Investigations 'U) Internal Request for Assistance 10/17/ /01/ /01/2013 Criminal Investigations (U} Misuse of Government Vehicle Investigation 10/17/ /21/ /22/2013 Criminal Investigations (U} Employee Misconduct Investigation 11/15/ /03/ /11/2013 Intelligence Oversight lnvesti MA (U) Intelligence Oversight (10} Investigation 08/16/ /08/ /08/2013 Workforce Assistance lnvestij WA {U) Employee Misconduct Investigation 04/14/ /29/ /15/2013 Workforce Assistance lnvestif WA (U) Misuse of Government IT Systems Investigation 02/27/ /22/ /27/2013 Workforce Assistance lnvesti~ WA (U) Misuse of Government IT Systems Investigation 02/28/ /25/ /25/2013 Workforce Assistance lnvestif WA (U) Misuse of Government IT Systems lnvestii:iation 03/06/ /27/ /27/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/02/ /16/ /06/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems lnvestiration 04/02/ /08/ /06/2013 Workforce Assistance lnvesti~ WA (U) Misuse of Government IT Systems Investigation 04/10/ /29/ /18/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/23/ /25/ /25/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/25/ /18/ /25/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/27/ /17/ /28/2013 Workforce Assistance lnvesti~ WA {U) Misuse of Government IT Systems Investigation 05/02/ /10/ /01/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 05/11/ /17/ /18/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 05/11/ /05/ /18/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 05/21/ /25/ /25/2013 Workforce Assistance lnvestl WA (U} Unauthorized Personnel Action Investigation 05/21/ /09/ /10/2013 Workforce Assistance lnvestii WA (U) Misuse of Government IT Systems Investigation 05/24/ /21/ /18/2013 Workforce Assistance lnvesti WA (U} Misuse of Government IT Systems Investigation 08/02/ /27/ /25/2013

6 Workforce Assistance lnvesti WA (U) Unauthorized Personnel Action Investigation 08/20/ /28/ /05/2013 Workforce Assistance lnvestij WA (U) Misuse of Government IT Systems Investigation 09/17/ /25/ /05/2013 Workforce Assistance lnvesti WA (U) Senior Official Misconduct Investigation 09/18/ /14/ /14/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 09/24/ /18/ /08/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 09/27/ /27/ /28/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 09/27/ /20/ /20/2013 Workforce Assistance lnvesti WA (U) Security Matters Investigation 10/02/ /22/ /22/2013 Workforce Assistance lnvesti WA (U) Abuse of Authority Investigation 10/16/ /29/ /07/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 10/23/ /15/ /15/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 11/19/ /18/ /25/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 11/21/ /18/ /25/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 11/26/ /18/ /25/2013 Workforce Assistance lnvesti WA (U) Unauthorized Personnel Action Investigation 11/29/ /06/ /07/2013 Workforce Assistance lnvesti WA (U) Employee Misconduct Investigation 01/23/ /24/2013 Workforce Assistance lnvestie WA (U) Abuse of Authority Investigation 01/23/ /28/ /05/2013 Workforce Assistance lnvestif WA (U) Absent without Leave Investigation 01/28/ /22/ /25/2013 Workforce Assistance lnvesti WA (U) Improper Hiring Practices Investigation 03/01/ /08/ /15/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 03/18/ /08/ /20/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 03/18/ /20/ /26/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 03/18/ /23/ /26/2013 Workforce Assistance lnvesti WA (U} Misuse of Government IT Systems Investigation 03/18/ /01/ /05/2013 Workforce Assistance lnvesti WA (U} Unauthorized Personnel Action 03/27/ /08/ /26/2013 Workforce Assistance lnvesti WA (U} Misuse of Government IT Systems Investigation 04/09/ /17/ /26/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/16/ /20/ /05/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/16/ /20/ /20/2013 Workforce Assistance lnvesti WA {U) Misuse of Government IT Systems Investigation 04/16/ /09/ /11/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/16/ /17/ /26/2013 Workforce Assistance lnvestil WA (U) Misuse of Government IT Systems Investigation 04/17/ /04/ /26/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/18/ /05/ /20/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/22/ /15/ /26/2013 Workforce Assistance lnvesti WA (U) Unauthorized Entitlements lnvesigation 04/26/ /20/ /05/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 05/02/ /19/ /30/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 05/03/ /20/ /05/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 05/09/ /15/ /15/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 05/09/ /15/ /29/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 06/07/ /05/ /30/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 06/21/ /05/ /20/2013

7 Workforce Assistance lnvestij WA (U) Misuse of Government IT Systems Investigation 06/21/ /22/ /05/2013 Workforce Assistance lnvestlf WA (U) Misuse of Government IT Systems Investigation 07/23/ /26/ /05/2013 Workforce Assistance lnvestif WA (U) Misuse of Government IT Systems Investigation 07/11/ /22/ /05/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 07/17/ /09/ /09/2013 Workforce Assistance lnvesth WA (U) Congressional Inquiry 08/19/ /16/ /17/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 09/11/ /19/ /11/2013

FOIA Officer Office of Management th Street, N.W. Washington, D.C Fax:

FOIA Officer Office of Management th Street, N.W. Washington, D.C Fax: Description of document: Requested date: Released date: Posted date: Date/date range of document: Source of document: List of US Peace Corps Office of Inspector General (OIG) investigations closed March

More information

List of reports produced by the Washington Metropolitan Area Transit Authority (WMATA) Inspector General (OIG),

List of reports produced by the Washington Metropolitan Area Transit Authority (WMATA) Inspector General (OIG), Description of document: Requested date: Released date: Posted date: Source of document: List of reports produced by the Washington Metropolitan Area Transit Authority (WMATA) Inspector General (OIG),

More information

FOIA Request - EEOC-DIG Investigations that are closed. (202) (phone) (202) (fax)

FOIA Request - EEOC-DIG Investigations that are closed. (202) (phone) (202) (fax) Description of document: Requested date: Released date: Posted date: Title of Document Date/date range of document: Source of document: US Equal Employment Opportunity Commission (EEOC) Inspector General

More information

List of National Archives and Records Administration (NARA) Inspector General (OIG) investigations closed October September 2016

List of National Archives and Records Administration (NARA) Inspector General (OIG) investigations closed October September 2016 Description of document: Requested date: Released date: Posted date: Source of document: List of National Archives and Records Administration (NARA) Inspector General (OIG) investigations closed October

More information

Handbooks and Manuals published on the employee-only Ex-Im Bank Intranet website, 2016

Handbooks and Manuals published on the employee-only Ex-Im Bank Intranet website, 2016 Description of document: Requested date: Released date: Posted date: Source of document: List of Export-Import Bank of the United States (EX-IM) Handbooks and Manuals published on the employee-only Ex-Im

More information

Table of contents of the Office of Government Ethics (OGE) INTEGRITY efiling system user guide, 2015

Table of contents of the Office of Government Ethics (OGE) INTEGRITY efiling system user guide, 2015 Description of document: Requested date: Released date: Posted date: Source of document: Table of contents of the Office of Government Ethics (OGE) INTEGRITY efiling system user guide, 2015 23-July-2015

More information

response to a Congressional request for agency -specific information on climate change, 2013 Requested date: 2013

response to a Congressional request for agency -specific information on climate change, 2013 Requested date: 2013 Description of document: Department of Justice (DOJ) Inspector General (OIG) response to a Congressional request for agency -specific information on climate change, 2013 Requested date: 2013 Released date:

More information

We are releasing 7 pages of responsive documents. Pursuant to FOIA, certain information has been redacted as it is exempt from release.

We are releasing 7 pages of responsive documents. Pursuant to FOIA, certain information has been redacted as it is exempt from release. Description of document: Requested date: Released date: Posted date: Source of document: President's Council on Integrity and Efficiency Information (PCIE) Information Technology Investigations Sub- Committee

More information

Investigation Board (CSB) Orders 011, 012, 020, 034, 036, 040, and 041, undated

Investigation Board (CSB) Orders 011, 012, 020, 034, 036, 040, and 041, undated Description of document: Requested date: Released date: Posted date: Source of document: Title pages of Unpublished Chemical Safety and Hazard Investigation Board (CSB) Orders 011, 012, 020, 034, 036,

More information

International Space Station (ISS) Depressurization Initial Response Procedure, 2016

International Space Station (ISS) Depressurization Initial Response Procedure, 2016 Description of document: Requested date: Released date: Posted date: Source of document: International Space Station (ISS) Depressurization Initial Response Procedure, 2016 12-September-2017 12-December-2017

More information

(Information Technology) Modernization Plan maintained by the Office of Information Technology, Requested date: 2016

(Information Technology) Modernization Plan maintained by the Office of Information Technology, Requested date: 2016 Description of document: Consumer Product Safety Commission (CPSC) IT (Information Technology) Modernization Plan maintained by the Office of Information Technology, 2009 Requested date: 2016 Released

More information

60 Massachusetts Avenue, NE Washington, D.C Fax:

60 Massachusetts Avenue, NE Washington, D.C Fax: Description of document: Requested date: Released date: Posted date: Source of document: AMTRAK presentation re: improved train handling techniques to reduce energy consumption with an emphasis on reducing

More information

Centers for Disease Control and Prevention and Agency for Toxic Substances and Disease Registry (CDC/ATSDR) CDC Brand Identity Standards, 2017

Centers for Disease Control and Prevention and Agency for Toxic Substances and Disease Registry (CDC/ATSDR) CDC Brand Identity Standards, 2017 Description of document: Requested date: Release date: Posted date: Source of document: Centers for Disease Control and Prevention and Agency for Toxic Substances and Disease Registry (CDC/ATSDR) CDC Brand

More information

Children s Services Council of Palm Beach County

Children s Services Council of Palm Beach County COVER SHEET FOR PROCEDURE RECOMMENDATIONS CSC PROCEDURE: Reporting Mismanagement, Fraud, Theft, or Bribery to CEO Process Owner: General Counsel Effective Date: February 22, 2012 Document #: 126348 Supersedes:

More information

Office of Inspector General Office of Professional Practice Services

Office of Inspector General Office of Professional Practice Services Office of Inspector General Office of Professional Practice Services Executive Summary In accordance with the Department of Education s fiscal year 2017-18 audit plan, the Office of Inspector General (OIG)

More information

SUBJECT: Freedom of Information Act (FOIA) and Privacy Act (PA) Handbook

SUBJECT: Freedom of Information Act (FOIA) and Privacy Act (PA) Handbook Defense Finance and Accounting Service INSTRUCTION SUBJECT: Freedom of Information Act (FOIA) and Privacy Act (PA) Handbook References: See Enclosure 1. Number 5400.8-I April 14, 2010 Corporate Communications

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

Inspector General (OIG) HUB intranet site, 2017

Inspector General (OIG) HUB intranet site, 2017 Description of document: Requested date: Released date: Posted date: Source of document: Home page for the Department of the Interior (DOI) Inspector General (OIG) HUB intranet site, 2017 14-March-2017

More information

Response Deadline Date/Time: November 22, 2016, 2:00 PM

Response Deadline Date/Time: November 22, 2016, 2:00 PM Administered by University of Maine System Office of Strategic Procurement Request for Bid (RFB) RFB #042-17 Plate Imaging Machine University of Maine Printing & Mailing Services Response Deadline Date/Time:

More information

SEP A search was performed by Air Traffic Control Services and the responsive records are enclosed.

SEP A search was performed by Air Traffic Control Services and the responsive records are enclosed. Description of document: Requested date: Released date: Posted date: Source of document: Federal Aviation Administration (FAA) prioritization list for Air Traffic Control Facility (Airport Traffic Control

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Better Administration of Automated Targeting System Controls Can Further Protect Personally Identifiable Information (Redacted) NOTICE: The Department

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

GAO INFORMATION SECURITY. Veterans Affairs Needs to Address Long-Standing Weaknesses

GAO INFORMATION SECURITY. Veterans Affairs Needs to Address Long-Standing Weaknesses GAO United States Government Accountability Office Testimony Before the Subcommittee on Oversight and Investigations, Committee on Veterans Affairs, House of Representatives For Release on Delivery Expected

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Directory of Personal Information Banks Residential Tenancies Dispute Resolution Services (RTDRS)

Directory of Personal Information Banks Residential Tenancies Dispute Resolution Services (RTDRS) Directory of Personal Banks RTDRS Hearing Files PIB #: 1 RTDRS Offices and Archives May include name, address, postal code, telephone numbers, e-mail addresses, rental property addresses and other personal

More information

PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC

PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC APPROVAL AUTHORITY: President, CHSi GARY G. PALMER /s/ OPR: Director, Information Security NUMBER: ISSUED: VERSION: APRIL 2015 2 THOMAS P. DELAINE JR. /s/ 1.0

More information

Whistleblower Submission Form

Whistleblower Submission Form Whistleblower Submission Form FORM C Complete this form IF you are a lawyer a whistleblower (or a group of whistleblowers) who wish to be anonymous. If you are a individual whistleblower, please complete

More information

WHEN TO HOLD YOUR TONGUE - THE BENEFITS AND RISKS OF SELF-DISCLOSURE. WHAT IS A PHYSICIAN PRACTICE TO DO? October 13, 2009

WHEN TO HOLD YOUR TONGUE - THE BENEFITS AND RISKS OF SELF-DISCLOSURE. WHAT IS A PHYSICIAN PRACTICE TO DO? October 13, 2009 , II C II EA i :1'11 C.\Il C(HI l' I.L\ '" C..\SSOCIATI \"'l\lull...... Ii \ ~ L~ WHEN TO HOLD YOUR TONGUE - THE BENEFITS AND RISKS OF SELF-DISCLOSURE WHAT IS A PHYSICIAN PRACTICE TO DO? October 13, 2009

More information

Safeguarding Controlled Unclassified Information and Cyber Incident Reporting. Kevin R. Gamache, Ph.D., ISP Facility Security Officer

Safeguarding Controlled Unclassified Information and Cyber Incident Reporting. Kevin R. Gamache, Ph.D., ISP Facility Security Officer Safeguarding Controlled Unclassified Information and Cyber Incident Reporting Kevin R. Gamache, Ph.D., ISP Facility Security Officer Why Are We Seeing These Rules? Stolen data provides potential adversaries

More information

RETINAL CONSULTANTS OF ARIZONA, LTD. HIPAA NOTICE OF PRIVACY PRACTICES. Our Responsibilities. Our Uses and Disclosures

RETINAL CONSULTANTS OF ARIZONA, LTD. HIPAA NOTICE OF PRIVACY PRACTICES. Our Responsibilities. Our Uses and Disclosures RETINAL CONSULTANTS OF ARIZONA, LTD. HIPAA NOTICE OF PRIVACY PRACTICES This notice describes how health information about you may be used and disclosed and how you can get access to this information. Please

More information

CUMBRE VISTA HOMEOWNERS ASSOCIATION, INC. RECORDS INSPECTION AND COMMUNICATIONS POLICY AND PROCEDURE. 1-Pl) ~ \ 1

CUMBRE VISTA HOMEOWNERS ASSOCIATION, INC. RECORDS INSPECTION AND  COMMUNICATIONS POLICY AND PROCEDURE. 1-Pl) ~ \ 1 CUMBRE VISTA HOMEOWNERS ASSOCIATION, INC. RECORDS INSPECTION AND EMAIL COMMUNICATIONS POLICY AND PROCEDURE Effective Date: ~ \ 1 1-Pl) Pursuant to Article XIII of the Association's Bylaws, "records and

More information

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY Department of Veterans Affairs VA DIRECTIVE 6502.3 Washington, DC 20420 Transmittal Sheet WEB PAGE PRIVACY POLICY 1. REASON FOR ISSUE: To establish policy for the Department of Veterans Affairs (VA) for

More information

Security Awareness, Training, And Education Plan

Security Awareness, Training, And Education Plan Security Awareness, Training, And Education Plan Version 2.0 December 2016 TABLE OF CONTENTS 1.1 SCOPE 2 1.2 PRINCIPLES 2 1.3 REVISIONS 3 2.1 OBJECTIVE 4 3.1 PLAN DETAILS 4 3.2 WORKFORCE DESIGNATION 4

More information

California Institute of Technology

California Institute of Technology California Institute of Technology Human Resources Using Kronos Workforce Timekeeper For Exception Reporting User Guide Workforce Timekeeper (Kronos) software enables employees to use an industrystandard

More information

STATE OF NEW JERSEY IT CIRCULAR

STATE OF NEW JERSEY IT CIRCULAR NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ Chris Christie, Governor 300 Riverview Plaza E. Steven Emanuel, Chief Technology Officer Trenton, NJ 08625-0212 STATE OF NEW JERSEY IT

More information

Terms of Reference Consultant Investigations Section Office of Audit and Investigations

Terms of Reference Consultant Investigations Section Office of Audit and Investigations Background: The (OAI) reports to the Administrator and is responsible for internal audit and investigations services to UNDP and its affiliated entities. OAI provides independent, objective assurance on

More information

Integrating HIPAA into Your Managed Care Compliance Program

Integrating HIPAA into Your Managed Care Compliance Program Integrating HIPAA into Your Managed Care Compliance Program The First National HIPAA Summit October 16, 2000 Mark E. Lutes, Esq. Epstein Becker & Green, P.C. 1227 25th Street, N.W., Suite 700 Washington,

More information

Delegated Entity Exclusion, Sanction & Debarment Checks. OIG/GSA database screening

Delegated Entity Exclusion, Sanction & Debarment Checks. OIG/GSA database screening Delegated Entity Exclusion, Sanction & Debarment Checks OIG/GSA database screening 2016 Contents Sanction/Exclusion/Debarment Checks... 2 Office of Inspector General (OIG)... 2 Searching for Exclusions

More information

Prevention of Identity Theft in Student Financial Transactions AP 5800

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to

More information

PROVIDING INVESTIGATIVE SOLUTIONS

PROVIDING INVESTIGATIVE SOLUTIONS PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely

More information

Your FOIA Rights. You have the right to request to inspect or receive copies of public records, or both. 09/23/16

Your FOIA Rights. You have the right to request to inspect or receive copies of public records, or both. 09/23/16 1 Rights & Responsibilities: The Rights of Requesters and the Responsibilities of Wytheville Community College under the Virginia Freedom of Information Act The Virginia Freedom of Information Act (FOIA),

More information

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog April 6, 2012 National Institute of Standards and Technology 100 Bureau Drive, Stop 1070 Gaithersburg, MD 20899-1070 Re: Special Publication 800-53 Revision 4, Security Controls of Federal Information

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

Breckenridge Financial Supplies Website Use Policy

Breckenridge Financial Supplies Website Use Policy Breckenridge Financial Supplies Website Use Policy Revised January 2014 Thank You for visiting the Breckenridge Financial Supplies Website (the Website ) and reviewing our Online Website Use and Privacy

More information

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2007 H 1 HOUSE BILL 1699

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2007 H 1 HOUSE BILL 1699 GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 0 H HOUSE BILL Short Title: Option to Stop Junk Mail. (Public) Sponsors: Representatives Fisher; Alexander, Faison, Harrison, and Samuelson. Referred to: Judiciary

More information

Homeland Security. September 19, Re: DBS/MGMT

Homeland Security. September 19, Re: DBS/MGMT Description of document: Requested date: Released date: Posted date: Source of document: Department of Homeland Security (DHS), internal agency memos, correspondence, documents that review or discuss the

More information

Making a Request for records from The Town of Gordonsville

Making a Request for records from The Town of Gordonsville Rights & Responsibilities: The Rights of Requesters and the Responsibilities of the Town of Gordonsville under the Virginia Freedom of Information Act The Virginia Freedom of Information Act (FOIA), located

More information

NASD NOTICE TO MEMBERS 97-58

NASD NOTICE TO MEMBERS 97-58 NASD NOTICE TO MEMBERS 97-58 NASD Regulation Requests Comment On Proposed Interpretive Material 1031 Regarding Cold Calling Activity; Comment Period Expires October 31, 1997 Suggested Routing Senior Management

More information

A Framework for Managing Crime and Fraud

A Framework for Managing Crime and Fraud A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic

More information

Article II - Standards Section V - Continuing Education Requirements

Article II - Standards Section V - Continuing Education Requirements Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update

More information

Investigation. City of Edmonton Office of the City Auditor. ETS Workforce Development. January 14, 2019

Investigation. City of Edmonton Office of the City Auditor. ETS Workforce Development. January 14, 2019 City of Edmonton Office of the City Auditor Investigation ETS Workforce Development January 14, 2019 1200, Scotia Place, Tower 1 10060 Jasper Ave Edmonton, AB T5J 3R8 Phone: 780-496-8300 edmonton.ca/auditor

More information

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program

More information

DEFINITIONS AND REFERENCES

DEFINITIONS AND REFERENCES DEFINITIONS AND REFERENCES Definitions: Insider. Cleared contractor personnel with authorized access to any Government or contractor resource, including personnel, facilities, information, equipment, networks,

More information

- Cyber threat information: information directly pertaining to,

- Cyber threat information: information directly pertaining to, WHAT INFORMATION MAY BE SHARED H.R. 3674, the PRECISE Act of 2011, as reported from HHSC Subcmte on Cybersecurity (Lungren) law, H.R. 3523, the Cyber Intelligence sharing and Protection Act of 2011, as

More information

Opening and Closing the Door to Medicaid. Program Integrity Joseph Kopsa, MA, JD Section Chief Program Integrity DHH HIPAA Privacy & Security Officer

Opening and Closing the Door to Medicaid. Program Integrity Joseph Kopsa, MA, JD Section Chief Program Integrity DHH HIPAA Privacy & Security Officer Opening and Closing the Door to Medicaid Program Integrity Joseph Kopsa, MA, JD Section Chief Program Integrity DHH HIPAA Privacy & Security Officer PURPOSE Assure the Programmatic and Fiscal Integrity

More information

NUCONNECT INTERNET ACCEPTABLE USE POLICY

NUCONNECT INTERNET ACCEPTABLE USE POLICY NUCONNECT INTERNET ACCEPTABLE USE POLICY This Acceptable Use Policy ( AUP ) applies to NUconnect Internet and related services ("Services ) delivered by Newport Utilities. This policy is designed to encourage

More information

SECTION/OWNER: CCO CONTRACTORS

SECTION/OWNER: CCO CONTRACTORS Policy/Procedures POLICY NO: UOP ACO-COMP-005 SANCTION PROCESS- SECTION/OWNER: CCO CONTRACTORS EFFECTIVE DATE: 01/01/2017 DATE TO QIC: 01/15/2017 DATE TO BOARD: 01/31/2017 1.0 PURPOSE This policy is to

More information

HPE DATA PRIVACY AND SECURITY

HPE DATA PRIVACY AND SECURITY ARUBA, a Hewlett Packard Enterprise company, product services ( Services ) This Data Privacy and Security Agreement ("DPSA") Schedule governs the privacy and security of Personal Data by HPE in connection

More information

Fiscal Year 2013 Federal Information Security Management Act Report

Fiscal Year 2013 Federal Information Security Management Act Report U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Fiscal Year 2013 Federal Information Security Management Act Report Status of EPA s Computer Security Program Report. 14-P-0033 vember 26,

More information

VIACOM INC. PRIVACY SHIELD PRIVACY POLICY

VIACOM INC. PRIVACY SHIELD PRIVACY POLICY VIACOM INC. PRIVACY SHIELD PRIVACY POLICY Last Modified and Effective as of October 23, 2017 Viacom respects individuals privacy, and strives to collect, use and disclose personal information in a manner

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

Making a Request for records from Portsmouth Public Schools

Making a Request for records from Portsmouth Public Schools Rights & Responsibilities: The Rights of Requesters and the Responsibilities of Portsmouth Public Schools under the Virginia Freedom of Information Act The Virginia Freedom of Information Act (FOIA), located

More information

Acknowledgement of Receipt of Notice of Privacy Practices

Acknowledgement of Receipt of Notice of Privacy Practices Acknowledgement of Receipt of Notice of Privacy Practices I acknowledge that I have reviewed and understand Rainbow Pediatrics' Notice of Privacy Practices containing a description of the uses and disclosures

More information

CTI BioPharma Privacy Notice

CTI BioPharma Privacy Notice CTI BioPharma Privacy Notice Effective: 29 November 2018 Introduction and Scope CTI BioPharma Corp. ( CTI, our, us ) takes the protection of your personal data very seriously. This Privacy Notice (this

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Please print or type. Complete all areas of Agreement and Enrollment form, unless otherwise indicated.

Please print or type. Complete all areas of Agreement and Enrollment form, unless otherwise indicated. Please complete the following Mississippi Medicaid Provider EDI Enrollment Packet. The package consists of the Conduent EDI Form, Mississippi EDI Provider Agreement and the Conduent EDI Gateway Inc., Trading

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information

Rights & Responsibilities: The Rights of Requesters and the Responsibilities of New College Institute under the Virginia Freedom of Information Act

Rights & Responsibilities: The Rights of Requesters and the Responsibilities of New College Institute under the Virginia Freedom of Information Act Rights & Responsibilities: The Rights of Requesters and the Responsibilities of under the Virginia Freedom of Information Act The Virginia Freedom of Information Act (FOIA), 2.2-3700 et seq. of the Code

More information

Published Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).

Published Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA). This document is scheduled to be published in the Federal Register on 03/22/2012 and available online at http://federalregister.gov/a/2012-06847, and on FDsys.gov 9110-9L DEPARTMENT OF HOMELAND SECURITY

More information

APPENDIX H: McMURDO STATION COMPUTER INFORMATION For more information, visit

APPENDIX H: McMURDO STATION COMPUTER INFORMATION For more information, visit APPENDIX H: McMURDO STATION COMPUTER INFORMATION For more information, visit http://www.usap.gov/technology/contenthandler.cfm?id=94 In this appendix, you will find information on the following: H.1 Information

More information

DFARS Cyber Rule Considerations For Contractors In 2018

DFARS Cyber Rule Considerations For Contractors In 2018 Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com DFARS Cyber Rule Considerations For Contractors

More information

Enterprise Income Verification (EIV) System User Access Authorization Form

Enterprise Income Verification (EIV) System User Access Authorization Form Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be

More information

Rappahannock-Rapidan Regional Commission (RRRC) Freedom of Information Act (FOIA) Administrative Policy

Rappahannock-Rapidan Regional Commission (RRRC) Freedom of Information Act (FOIA) Administrative Policy Rappahannock-Rapidan Regional Commission (RRRC) Freedom of Information Act (FOIA) Administrative Policy The Virginia Freedom of Information Act (FOIA), located 2.2-3700 et seq. of the Code of Virginia,

More information

U. S. POSTAL SERVICE CHIEF FOIA OFFICER REPORT. Fiscal Year 2009

U. S. POSTAL SERVICE CHIEF FOIA OFFICER REPORT. Fiscal Year 2009 U. S. POSTAL SERVICE CHIEF FOIA OFFICER REPORT Fiscal Year 2009 This report is submitted in response to Attorney General Holder s directive to Agency Chief FOIA Officers to review and to report each year

More information

Service Description: Solution Support for Service Provider Software - Preferred This document

Service Description: Solution Support for Service Provider Software - Preferred This document Page 1 of 5 Service Description: Solution Support for Service Provider Software - Preferred This document describes the Cisco Solution Support for Service Provider Software - Preferred. Related Documents:

More information

VFS GLOBAL PVT LTD PRIVACY DISCLAIMER

VFS GLOBAL PVT LTD PRIVACY DISCLAIMER VFS GLOBAL PVT LTD PRIVACY DISCLAIMER Version 1.0 Privacy Disclaimer Scope VFS GLOBAL (hereinafter referred to as VFS GLOBAL ) is an outsourced partner of Diplomatic Missions across globe, and is authorized

More information

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN

More information

Privacy Policy. Your Personal Information will be processed by Whistle Sports in the United States.

Privacy Policy. Your Personal Information will be processed by Whistle Sports in the United States. Updated and Effective as of: February 24, 2017 Privacy Policy We are concerned about privacy issues and want you to be familiar with how we collect, use and disclose Personal Information (as defined below).

More information

Accountable Care Organizations: Testing Their Impact

Accountable Care Organizations: Testing Their Impact Accountable Care Organizations: Testing Their Impact Eligibility Criteria * * Indicates required Preference will be given to applicants that are public agencies or are tax-exempt under Section 501(c)(3)

More information

Controlled Substances

Controlled Substances 45.75.1 POLICY This policy addresses obtaining, using, storing, recordkeeping, dispensing, and disposing of controlled substances at WSU. This policy provides information and procedures to enable individuals

More information

Rights & Responsibilities: The Rights of Requesters and the Responsibilities of Hampton City Schools under the Virginia Freedom of Information Act

Rights & Responsibilities: The Rights of Requesters and the Responsibilities of Hampton City Schools under the Virginia Freedom of Information Act Rights & Responsibilities: The Rights of Requesters and the Responsibilities of Hampton City Schools under the Virginia Freedom of Information Act The Virginia Freedom of Information Act (FOIA), located

More information

NEWTON COUNTY OPEN RECORDS ACT POLICY

NEWTON COUNTY OPEN RECORDS ACT POLICY NEWTON COUNTY OPEN RECORDS ACT POLICY As a public entity, Newton County is subject to the Open Records Act, O. C. G.A. 50-18- 70 et seq. Newton County is committed to conducting its business in a manner

More information

HPE CUSTOMER TERMS - PORTFOLIO

HPE CUSTOMER TERMS - PORTFOLIO HPE Agreement Number(s) where required:. HPE entity: Customer: Effective Date (if applicable):. Term Length (if applicable):... HPE CUSTOMER TERMS - PORTFOLIO 1. Parties. These terms represent the agreement

More information

ENCORE II REQUIREMENTS CHECKLIST AND CERTIFICATIONS

ENCORE II REQUIREMENTS CHECKLIST AND CERTIFICATIONS ENCORE II REQUIREMENTS CHECKLIST AND CERTIFICATIONS This form is completed by the Task Monitors and forwarded to DISA/DITCO-Scott with a complete ENCORE II Requirements Package. (electronic signatures

More information

Refund Policy. About us. Use of Site. Disclaimer of Warranty 1/6

Refund Policy. About us. Use of Site. Disclaimer of Warranty 1/6 Refund Policy draslcaribbean.com/index.php/refund-policy Terms and Conditions (including but not limited to the Description of Services offered, Refund/Return Policy, Merchant contact information, Export

More information

c. Software downloaded from electronic bulletin board systems.

c. Software downloaded from electronic bulletin board systems. February 6, 2001 INSPECTOR GENERAL INSTRUCTION 7950.4 SUBJECT: Microcomputer Antivirus Program References. See Appendix A. A. Purpose. This Instruction updates the Office of the Inspector General, Department

More information

OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000DEFENSEPENTAGON WASHINGTON, DC

OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000DEFENSEPENTAGON WASHINGTON, DC OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000DEFENSEPENTAGON WASHINGTON, DC 20301-3000 ACQUISITION, TECHNO LOGY. A N D LOGISTICS SEP 2 1 2017 MEMORANDUM FOR COMMANDER, UNITED ST A TES SPECIAL OPERATIONS

More information

Putting It All Together:

Putting It All Together: Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,

More information

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your

More information

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance.

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance. Cell Phone Policy 1. Purpose: Establish a policy for cell phone use and compensation allowance. 2. Authority: The Clinton County Board of Commissioners. 3. Application: This Cell Phone Policy (the Policy)

More information

March 1, Dear Vendors: Reference: RFQ No. FY Subject: Website Consulting Services

March 1, Dear Vendors: Reference: RFQ No. FY Subject: Website Consulting Services March 1, 2019 Dear Vendors: Reference: RFQ No. FY19-18390 Subject: Website Consulting Services Vendors, AAMVA is hereby requesting quotes on the following services below. Please make sure that you read

More information

Effective October 31, Privacy Policy

Effective October 31, Privacy Policy Privacy Policy The nic.gop website is operated by Republican State Leadership Committee, Inc. ( Team.gop, we or us ). This Privacy Policy applies to nic.gop and any other website offered by Team.gop, which

More information

LYNX PHONE SUBSCRIBER TERMS OF SERVICE

LYNX PHONE SUBSCRIBER TERMS OF SERVICE LYNX PHONE SUBSCRIBER TERMS OF SERVICE The terms you, your or user, as used in this Agreement, shall mean the user of Lynx Phone Voice over Internet Protocol (VoIP) Residential or Business Communication

More information

ZONE PROGRAM INTEGRITY CONTRACTOR (ZPIC) TASK ORDER STATEMENT OF WORK Zone 1 - Parts A, B, DME and HH +H

ZONE PROGRAM INTEGRITY CONTRACTOR (ZPIC) TASK ORDER STATEMENT OF WORK Zone 1 - Parts A, B, DME and HH +H Attachment J.2.A Page 1 of 6 I. SCOPE ZONE PROGRAM INTEGRITY CONTRACTOR (ZPIC) TASK ORDER STATEMENT OF WORK Zone 1 - Parts A, B, DME and HH +H The ZPIC shall perform fraud, waste and abuse detection, deterrence

More information

Managing and Electronic Records: A Transition Priority

Managing  and Electronic Records: A Transition Priority TRANSITION Managing Email and Electronic Records: A Transition Priority NGA RESOURCES AUGUST 2018 Electronic communications tools such as email and text messaging present new challenges to the governor-elect

More information

Mobile Application Privacy Policy

Mobile Application Privacy Policy Mobile Application Privacy Policy Introduction This mobile application is hosted and operated on behalf of your health plan. As such, some information collected through the mobile application may be considered

More information

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018 ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:

More information

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance

More information

Components and Considerations in Building an Insider Threat Program

Components and Considerations in Building an Insider Threat Program Components and Considerations in Building an Insider Threat Program Carly Huth Insider Threat Researcher, CEWM Carly L. Huth is an insider threat researcher in the Cyber Enterprise and Workforce Management

More information