Listing of Defense Intelligence Agency (DIA) Inspector General (OIG) investigations closed during CY 2013
|
|
- Neil Elliott
- 5 years ago
- Views:
Transcription
1 Description of document: Requested date: Released date: Posted date: Source of document: Listing of Defense Intelligence Agency (DIA) Inspector General (OIG) investigations closed during CY January September December-2015 Defense Intelligence Agency ATTN: FAC2A1 (FOIA) 7400 Pentagon Washington, DC Fax: (301) Request templates available here The governmentattic.org web site ( the site ) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website.
2 DEFENSE INTELLIGENCE AGENCY WASHINGTON, D.C U /FAC2Al (FOIA) SEP This responds to your Freedom oflnformation Act (FOIA) request, dated January 5, 2015, case number , that you submitted to the Defense Intelligence Agency (DIA)/or a copy of the list or printout or database listing of JG investigations closed during calendar year I apologize for the delay in responding to your request. DIA continues its efforts to eliminate the large backlog of pending FOIA requests. In order to properly respond, it was necessary to consult with another office within the agency. A search ofdia's systems ofrecords located one document (5 pages) responsive to your request. Upon review, I have determined that this document is appropriate for release in full. DIA has not withheld any reasonably segregable non-exempt portions of the record. Sincerely, 1 Enclosure a/s Alesia Y. Williams Chief, FOIA and Declassification Services Office
3 Case Type Case Number Case Title Date Initiated Investigation Case Closed Closed Date Date Criminal Investigations (U) Time and Attendance (T&A) Fraud Investigation 04/30/ /26/ /17/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 06/02/ /30/ /17/2013 Criminal Investigations (U) Privacy Act Violation Investigation 10/13/ /12/ /18/2013 Criminal Investigations (U) Privacy Act Violation Investigation 10/13/ /01/ /08/2013 Criminal lnvestirations I (U) Time and Attendance (T&A) Fraud Investigation 12/01/ /08/ /11/2013 Criminal Investigations (U) Misuse of Government IT Systems Investigation 05/02/ /01/ /01/2013 Criminal Investigations (U) Bribery and Conflict of Interest Investigation 05/10/ /07/ /18/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 06/02/ /29/ /24/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 06/02/ /12/ /24/2013 Criminal Investigations (U) Temporary Duty Fraud Investigation 06/13/ /10/ /20/2013 Criminal Investigations (U) External Request for Assistance 06/16/ /20/ /21/2013 Criminal Investigations (U) Failure to Pay Debt Investigation 07/26/ /23/ /28/2013 Criminal lnvestirations (U) Misuse of Government Property Investigation 07/26/ /27/ /20/2013 Criminal Investigations (U) Time and Attendance (T&A) Fraud Investigation 07/26/ /06/ /18/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 07/26/ /22/ /03/2013 Criminal Investigations (U) Contractor Cost Mischarglng Investigation 09/09/ /20/ /14/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 09/12/ /12/ /03/2013 Criminal Investigations (U) Whistleblower Reprisal Investigation 09/15/ /06/ /08/2013 Criminal Investigations (U) Time and Attendance (T&A) Fraud Investigation 09/30/ /07/ /08/2013 Criminal Investigations (U) Misuse of Government IT Systems Investigation 10/13/ /27/ /20/2013 Criminal Investigations (U) Misuse of Government IT Systems Investigation 10/14/ /06/ /10/2013 Criminal Investigations (U) Time and Attendance (T&A) Fraud Investigation 12/02/ /21/ /18/2013 Criminal Investigations (U) Theft of Government Information Investigation 01/19/ /29/ /17/2013 Criminal lnvestiaations (U) Misuse of Government IT Systems Investigation 01/23/ /02/ /11/2013 Criminal Investigations (U) Time and Attendance (T&A) Investigation 02/29/ /26/ /20/2013 Criminal Investigations (U) Time and Attendance (T&A) Investigation 03/06/ /19/ /18/2013 Criminal Investigations I (U) Time and Attendance (T&A) Investigation 03/28/ /20/ /14/2013 Criminal Investigations (U) Misuse of Government Travel Card Investigation 04/23/ /28/ /29/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 05/11/ /02/ /03/2013 Criminal Investigations (U) Temporary Quarters Subsistence Eicpenses Investigation 05/14/ /02/ /08/2013 Criminal Investigations I (U) Security Matters Investigation 06/07/ /19/ /20/2013 Criminal Investigations (U) Conflict of Interest Investigation 06/11/ /26/ /11/2013 Criminal Investigations (U) Employee Misconduct Investigation 06/11/ /16/ /17/2013
4 Criminal Investigations (U) Misuse of Government Purchase card Investigation 06/14/ /09/ /13/2013 Criminal Investigations (U) Whistleblower Reprisal Investigation 06/22/ /25/ /02/2013 Criminal Investigations (U) Misuse of Government IT Systems Investigation 06/25/ /16/ /15/2013 Criminal Investigations (U) Whistleblower Reprisal Investigation 07/18/ /15/ /28/2013 Criminal Investigations (U) Time and Attendance (T&A) Investigation 07/25/ /06/ /23/2013 Criminal Investigations (U) Contract Improprieties Investigation 08/09/ /23/ /24/2013 Criminal Investigations (U) Misuse of Government IT Systems Investigation 09/13/ /15/ /17/2013 Criminal Investigations (U) Security Matters Investigation 09/13/ /16/ /24/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 09/20/ /01/ /14/2013 Criminal Investigations (U) DIA, 1st Quarter FY 2013 Fraud Awareness Briefing File 09/28/ /07/ /10/2013 Criminal lnvestigation (U) Misuse of Government Vehicle Investigation 10/02/ /19/ /20/2013 Criminal Investigations (U) Employee Misconduct Investigation 10/09/ /16/ /25/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 10/11/ /04/ /19/2013 Criminal Investigations (U) External Request for Assistance 10/26/ /08/ /11/2013 Criminal Investigations (U) Misuse of Government Vehicle Investigation 11/14/ /26/ /10/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 11/20/ /29/ /18/2013 I Criminal Investigations (U) Abuse of Authority Investigation 11/28/ /05/ /10/2013 Criminal Investigations (U) Temporary Duty Fraud Investigation 12/11/ /15/ /22/2013 Criminal Investigations (U) Contract Improprieties Investigation 12/17/ /16/ /28/2013 Criminal Investigations (U) DIA, 2nd Quarter FY 2013 Fraud Awareness Briefing File 01/07/ /01/ /03/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 01/07/ /21/ /19/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 01/08/ /31/ /31/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 01/15/ /17/ /18/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 01/16/ /03/ /17/2013 Criminal Investigations (U) False Official Statements and Waste of 02/08/ /04/ /23/2013 Government Funds Investigation Criminal Investigations (U) USERRA Violation Investigation 02/08/ /08/ /11/2013 Criminal Investigations (U) Temporary Duty Fraud Investigation 02/19/ /27/ /27/2013 Criminal Investigations (U) Conflict of Interest Investigation 02/27/ /12/ /14/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 02/27/ /26/ /22/2013 Criminal Investigations DI {U) Theft of Government Property 03/01/ /29/ /27/2013 Criminal Investigations (U) External Request for Assistance 03/15/ /01/ /02/2013 Criminal Investigations DI (U) External Request for Assistance 03/21/ /07/ /10/2013 Criminal Investigations (U) Unauthorized Personnel Actions Investigation 03/27/ /02/ /20/2013
5 Criminal Investigations (U) Waste of Government Resources Investigation 03/28/ /15/ /20/2013 Criminal Investigations I (U) DIA, 3rd Quarter Pl 2013 Fraud Awareness Briefing File 03/29/ /30/ /18/2013 Criminal Investigations (U) Whistleblower Reprisal Investigation 04/04/ /16/ /20/2013 Criminal Investigations (U) Waste of Government Resources Investigation 04/08/ /20/ /19/2013 Criminal Investigations (U) Contractor Cost Mischarging Investigation 04/11/ /06/ /09/2013 Criminal Investigations (U) Contract Irregularities Investigation 04/16/ /17/ /24/2013 Criminal Investigations (U) Unauthorized Personnel Actions Investigation 05/22/ /18/ /19/2013 Criminal Investigations (U} Employee Misconduct Investigation 05/30/ /25/ /26/2013 Criminal Investigations (U) Procurement Matters Investigation 06/10/ /24/ /05/2013 Criminal Investigations (U) External Request for Assistance 06/28/ /26/ /27/2013 Criminal Investigations (U} DIA, 4th Quarter F'l 2013 Fraud Awareness Briefing File 07/15/ /21/ /22/2013 Criminal Investigations (U) External Request for Assistance 07/23/ /28/ /05/2013 Criminal Investigations {U} External Request for Assistance 08/07/ /23/ /27/2013 Criminal Investigations I (U) External Request for Assistance 09/13/ /02/ /11/2013 Criminal Investigations 'U) Internal Request for Assistance 10/17/ /01/ /01/2013 Criminal Investigations (U} Misuse of Government Vehicle Investigation 10/17/ /21/ /22/2013 Criminal Investigations (U} Employee Misconduct Investigation 11/15/ /03/ /11/2013 Intelligence Oversight lnvesti MA (U) Intelligence Oversight (10} Investigation 08/16/ /08/ /08/2013 Workforce Assistance lnvestij WA {U) Employee Misconduct Investigation 04/14/ /29/ /15/2013 Workforce Assistance lnvestif WA (U) Misuse of Government IT Systems Investigation 02/27/ /22/ /27/2013 Workforce Assistance lnvesti~ WA (U) Misuse of Government IT Systems Investigation 02/28/ /25/ /25/2013 Workforce Assistance lnvestif WA (U) Misuse of Government IT Systems lnvestii:iation 03/06/ /27/ /27/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/02/ /16/ /06/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems lnvestiration 04/02/ /08/ /06/2013 Workforce Assistance lnvesti~ WA (U) Misuse of Government IT Systems Investigation 04/10/ /29/ /18/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/23/ /25/ /25/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/25/ /18/ /25/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/27/ /17/ /28/2013 Workforce Assistance lnvesti~ WA {U) Misuse of Government IT Systems Investigation 05/02/ /10/ /01/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 05/11/ /17/ /18/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 05/11/ /05/ /18/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 05/21/ /25/ /25/2013 Workforce Assistance lnvestl WA (U} Unauthorized Personnel Action Investigation 05/21/ /09/ /10/2013 Workforce Assistance lnvestii WA (U) Misuse of Government IT Systems Investigation 05/24/ /21/ /18/2013 Workforce Assistance lnvesti WA (U} Misuse of Government IT Systems Investigation 08/02/ /27/ /25/2013
6 Workforce Assistance lnvesti WA (U) Unauthorized Personnel Action Investigation 08/20/ /28/ /05/2013 Workforce Assistance lnvestij WA (U) Misuse of Government IT Systems Investigation 09/17/ /25/ /05/2013 Workforce Assistance lnvesti WA (U) Senior Official Misconduct Investigation 09/18/ /14/ /14/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 09/24/ /18/ /08/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 09/27/ /27/ /28/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 09/27/ /20/ /20/2013 Workforce Assistance lnvesti WA (U) Security Matters Investigation 10/02/ /22/ /22/2013 Workforce Assistance lnvesti WA (U) Abuse of Authority Investigation 10/16/ /29/ /07/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 10/23/ /15/ /15/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 11/19/ /18/ /25/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 11/21/ /18/ /25/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 11/26/ /18/ /25/2013 Workforce Assistance lnvesti WA (U) Unauthorized Personnel Action Investigation 11/29/ /06/ /07/2013 Workforce Assistance lnvesti WA (U) Employee Misconduct Investigation 01/23/ /24/2013 Workforce Assistance lnvestie WA (U) Abuse of Authority Investigation 01/23/ /28/ /05/2013 Workforce Assistance lnvestif WA (U) Absent without Leave Investigation 01/28/ /22/ /25/2013 Workforce Assistance lnvesti WA (U) Improper Hiring Practices Investigation 03/01/ /08/ /15/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 03/18/ /08/ /20/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 03/18/ /20/ /26/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 03/18/ /23/ /26/2013 Workforce Assistance lnvesti WA (U} Misuse of Government IT Systems Investigation 03/18/ /01/ /05/2013 Workforce Assistance lnvesti WA (U} Unauthorized Personnel Action 03/27/ /08/ /26/2013 Workforce Assistance lnvesti WA (U} Misuse of Government IT Systems Investigation 04/09/ /17/ /26/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/16/ /20/ /05/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/16/ /20/ /20/2013 Workforce Assistance lnvesti WA {U) Misuse of Government IT Systems Investigation 04/16/ /09/ /11/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/16/ /17/ /26/2013 Workforce Assistance lnvestil WA (U) Misuse of Government IT Systems Investigation 04/17/ /04/ /26/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/18/ /05/ /20/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 04/22/ /15/ /26/2013 Workforce Assistance lnvesti WA (U) Unauthorized Entitlements lnvesigation 04/26/ /20/ /05/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 05/02/ /19/ /30/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 05/03/ /20/ /05/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 05/09/ /15/ /15/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 05/09/ /15/ /29/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 06/07/ /05/ /30/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 06/21/ /05/ /20/2013
7 Workforce Assistance lnvestij WA (U) Misuse of Government IT Systems Investigation 06/21/ /22/ /05/2013 Workforce Assistance lnvestlf WA (U) Misuse of Government IT Systems Investigation 07/23/ /26/ /05/2013 Workforce Assistance lnvestif WA (U) Misuse of Government IT Systems Investigation 07/11/ /22/ /05/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 07/17/ /09/ /09/2013 Workforce Assistance lnvesth WA (U) Congressional Inquiry 08/19/ /16/ /17/2013 Workforce Assistance lnvesti WA (U) Misuse of Government IT Systems Investigation 09/11/ /19/ /11/2013
FOIA Officer Office of Management th Street, N.W. Washington, D.C Fax:
Description of document: Requested date: Released date: Posted date: Date/date range of document: Source of document: List of US Peace Corps Office of Inspector General (OIG) investigations closed March
More informationList of reports produced by the Washington Metropolitan Area Transit Authority (WMATA) Inspector General (OIG),
Description of document: Requested date: Released date: Posted date: Source of document: List of reports produced by the Washington Metropolitan Area Transit Authority (WMATA) Inspector General (OIG),
More informationFOIA Request - EEOC-DIG Investigations that are closed. (202) (phone) (202) (fax)
Description of document: Requested date: Released date: Posted date: Title of Document Date/date range of document: Source of document: US Equal Employment Opportunity Commission (EEOC) Inspector General
More informationList of National Archives and Records Administration (NARA) Inspector General (OIG) investigations closed October September 2016
Description of document: Requested date: Released date: Posted date: Source of document: List of National Archives and Records Administration (NARA) Inspector General (OIG) investigations closed October
More informationHandbooks and Manuals published on the employee-only Ex-Im Bank Intranet website, 2016
Description of document: Requested date: Released date: Posted date: Source of document: List of Export-Import Bank of the United States (EX-IM) Handbooks and Manuals published on the employee-only Ex-Im
More informationTable of contents of the Office of Government Ethics (OGE) INTEGRITY efiling system user guide, 2015
Description of document: Requested date: Released date: Posted date: Source of document: Table of contents of the Office of Government Ethics (OGE) INTEGRITY efiling system user guide, 2015 23-July-2015
More informationresponse to a Congressional request for agency -specific information on climate change, 2013 Requested date: 2013
Description of document: Department of Justice (DOJ) Inspector General (OIG) response to a Congressional request for agency -specific information on climate change, 2013 Requested date: 2013 Released date:
More informationWe are releasing 7 pages of responsive documents. Pursuant to FOIA, certain information has been redacted as it is exempt from release.
Description of document: Requested date: Released date: Posted date: Source of document: President's Council on Integrity and Efficiency Information (PCIE) Information Technology Investigations Sub- Committee
More informationInvestigation Board (CSB) Orders 011, 012, 020, 034, 036, 040, and 041, undated
Description of document: Requested date: Released date: Posted date: Source of document: Title pages of Unpublished Chemical Safety and Hazard Investigation Board (CSB) Orders 011, 012, 020, 034, 036,
More informationInternational Space Station (ISS) Depressurization Initial Response Procedure, 2016
Description of document: Requested date: Released date: Posted date: Source of document: International Space Station (ISS) Depressurization Initial Response Procedure, 2016 12-September-2017 12-December-2017
More information(Information Technology) Modernization Plan maintained by the Office of Information Technology, Requested date: 2016
Description of document: Consumer Product Safety Commission (CPSC) IT (Information Technology) Modernization Plan maintained by the Office of Information Technology, 2009 Requested date: 2016 Released
More information60 Massachusetts Avenue, NE Washington, D.C Fax:
Description of document: Requested date: Released date: Posted date: Source of document: AMTRAK presentation re: improved train handling techniques to reduce energy consumption with an emphasis on reducing
More informationCenters for Disease Control and Prevention and Agency for Toxic Substances and Disease Registry (CDC/ATSDR) CDC Brand Identity Standards, 2017
Description of document: Requested date: Release date: Posted date: Source of document: Centers for Disease Control and Prevention and Agency for Toxic Substances and Disease Registry (CDC/ATSDR) CDC Brand
More informationChildren s Services Council of Palm Beach County
COVER SHEET FOR PROCEDURE RECOMMENDATIONS CSC PROCEDURE: Reporting Mismanagement, Fraud, Theft, or Bribery to CEO Process Owner: General Counsel Effective Date: February 22, 2012 Document #: 126348 Supersedes:
More informationOffice of Inspector General Office of Professional Practice Services
Office of Inspector General Office of Professional Practice Services Executive Summary In accordance with the Department of Education s fiscal year 2017-18 audit plan, the Office of Inspector General (OIG)
More informationSUBJECT: Freedom of Information Act (FOIA) and Privacy Act (PA) Handbook
Defense Finance and Accounting Service INSTRUCTION SUBJECT: Freedom of Information Act (FOIA) and Privacy Act (PA) Handbook References: See Enclosure 1. Number 5400.8-I April 14, 2010 Corporate Communications
More informationInvestigating Insider Threats
Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior
More informationInspector General (OIG) HUB intranet site, 2017
Description of document: Requested date: Released date: Posted date: Source of document: Home page for the Department of the Interior (DOI) Inspector General (OIG) HUB intranet site, 2017 14-March-2017
More informationResponse Deadline Date/Time: November 22, 2016, 2:00 PM
Administered by University of Maine System Office of Strategic Procurement Request for Bid (RFB) RFB #042-17 Plate Imaging Machine University of Maine Printing & Mailing Services Response Deadline Date/Time:
More informationSEP A search was performed by Air Traffic Control Services and the responsive records are enclosed.
Description of document: Requested date: Released date: Posted date: Source of document: Federal Aviation Administration (FAA) prioritization list for Air Traffic Control Facility (Airport Traffic Control
More informationOhio Supercomputer Center
Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
More informationOffice of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Better Administration of Automated Targeting System Controls Can Further Protect Personally Identifiable Information (Redacted) NOTICE: The Department
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative
More informationGAO INFORMATION SECURITY. Veterans Affairs Needs to Address Long-Standing Weaknesses
GAO United States Government Accountability Office Testimony Before the Subcommittee on Oversight and Investigations, Committee on Veterans Affairs, House of Representatives For Release on Delivery Expected
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationDirectory of Personal Information Banks Residential Tenancies Dispute Resolution Services (RTDRS)
Directory of Personal Banks RTDRS Hearing Files PIB #: 1 RTDRS Offices and Archives May include name, address, postal code, telephone numbers, e-mail addresses, rental property addresses and other personal
More informationPROCEDURE COMPREHENSIVE HEALTH SERVICES, INC
PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC APPROVAL AUTHORITY: President, CHSi GARY G. PALMER /s/ OPR: Director, Information Security NUMBER: ISSUED: VERSION: APRIL 2015 2 THOMAS P. DELAINE JR. /s/ 1.0
More informationWhistleblower Submission Form
Whistleblower Submission Form FORM C Complete this form IF you are a lawyer a whistleblower (or a group of whistleblowers) who wish to be anonymous. If you are a individual whistleblower, please complete
More informationWHEN TO HOLD YOUR TONGUE - THE BENEFITS AND RISKS OF SELF-DISCLOSURE. WHAT IS A PHYSICIAN PRACTICE TO DO? October 13, 2009
, II C II EA i :1'11 C.\Il C(HI l' I.L\ '" C..\SSOCIATI \"'l\lull...... Ii \ ~ L~ WHEN TO HOLD YOUR TONGUE - THE BENEFITS AND RISKS OF SELF-DISCLOSURE WHAT IS A PHYSICIAN PRACTICE TO DO? October 13, 2009
More informationSafeguarding Controlled Unclassified Information and Cyber Incident Reporting. Kevin R. Gamache, Ph.D., ISP Facility Security Officer
Safeguarding Controlled Unclassified Information and Cyber Incident Reporting Kevin R. Gamache, Ph.D., ISP Facility Security Officer Why Are We Seeing These Rules? Stolen data provides potential adversaries
More informationRETINAL CONSULTANTS OF ARIZONA, LTD. HIPAA NOTICE OF PRIVACY PRACTICES. Our Responsibilities. Our Uses and Disclosures
RETINAL CONSULTANTS OF ARIZONA, LTD. HIPAA NOTICE OF PRIVACY PRACTICES This notice describes how health information about you may be used and disclosed and how you can get access to this information. Please
More informationCUMBRE VISTA HOMEOWNERS ASSOCIATION, INC. RECORDS INSPECTION AND COMMUNICATIONS POLICY AND PROCEDURE. 1-Pl) ~ \ 1
CUMBRE VISTA HOMEOWNERS ASSOCIATION, INC. RECORDS INSPECTION AND EMAIL COMMUNICATIONS POLICY AND PROCEDURE Effective Date: ~ \ 1 1-Pl) Pursuant to Article XIII of the Association's Bylaws, "records and
More informationDepartment of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY
Department of Veterans Affairs VA DIRECTIVE 6502.3 Washington, DC 20420 Transmittal Sheet WEB PAGE PRIVACY POLICY 1. REASON FOR ISSUE: To establish policy for the Department of Veterans Affairs (VA) for
More informationSecurity Awareness, Training, And Education Plan
Security Awareness, Training, And Education Plan Version 2.0 December 2016 TABLE OF CONTENTS 1.1 SCOPE 2 1.2 PRINCIPLES 2 1.3 REVISIONS 3 2.1 OBJECTIVE 4 3.1 PLAN DETAILS 4 3.2 WORKFORCE DESIGNATION 4
More informationCalifornia Institute of Technology
California Institute of Technology Human Resources Using Kronos Workforce Timekeeper For Exception Reporting User Guide Workforce Timekeeper (Kronos) software enables employees to use an industrystandard
More informationSTATE OF NEW JERSEY IT CIRCULAR
NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ Chris Christie, Governor 300 Riverview Plaza E. Steven Emanuel, Chief Technology Officer Trenton, NJ 08625-0212 STATE OF NEW JERSEY IT
More informationTerms of Reference Consultant Investigations Section Office of Audit and Investigations
Background: The (OAI) reports to the Administrator and is responsible for internal audit and investigations services to UNDP and its affiliated entities. OAI provides independent, objective assurance on
More informationIntegrating HIPAA into Your Managed Care Compliance Program
Integrating HIPAA into Your Managed Care Compliance Program The First National HIPAA Summit October 16, 2000 Mark E. Lutes, Esq. Epstein Becker & Green, P.C. 1227 25th Street, N.W., Suite 700 Washington,
More informationDelegated Entity Exclusion, Sanction & Debarment Checks. OIG/GSA database screening
Delegated Entity Exclusion, Sanction & Debarment Checks OIG/GSA database screening 2016 Contents Sanction/Exclusion/Debarment Checks... 2 Office of Inspector General (OIG)... 2 Searching for Exclusions
More informationPrevention of Identity Theft in Student Financial Transactions AP 5800
Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to
More informationPROVIDING INVESTIGATIVE SOLUTIONS
PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely
More informationYour FOIA Rights. You have the right to request to inspect or receive copies of public records, or both. 09/23/16
1 Rights & Responsibilities: The Rights of Requesters and the Responsibilities of Wytheville Community College under the Virginia Freedom of Information Act The Virginia Freedom of Information Act (FOIA),
More informationRe: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog
April 6, 2012 National Institute of Standards and Technology 100 Bureau Drive, Stop 1070 Gaithersburg, MD 20899-1070 Re: Special Publication 800-53 Revision 4, Security Controls of Federal Information
More informationResponsible Officer Approved by
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
More informationBreckenridge Financial Supplies Website Use Policy
Breckenridge Financial Supplies Website Use Policy Revised January 2014 Thank You for visiting the Breckenridge Financial Supplies Website (the Website ) and reviewing our Online Website Use and Privacy
More informationGENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2007 H 1 HOUSE BILL 1699
GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 0 H HOUSE BILL Short Title: Option to Stop Junk Mail. (Public) Sponsors: Representatives Fisher; Alexander, Faison, Harrison, and Samuelson. Referred to: Judiciary
More informationHomeland Security. September 19, Re: DBS/MGMT
Description of document: Requested date: Released date: Posted date: Source of document: Department of Homeland Security (DHS), internal agency memos, correspondence, documents that review or discuss the
More informationMaking a Request for records from The Town of Gordonsville
Rights & Responsibilities: The Rights of Requesters and the Responsibilities of the Town of Gordonsville under the Virginia Freedom of Information Act The Virginia Freedom of Information Act (FOIA), located
More informationNASD NOTICE TO MEMBERS 97-58
NASD NOTICE TO MEMBERS 97-58 NASD Regulation Requests Comment On Proposed Interpretive Material 1031 Regarding Cold Calling Activity; Comment Period Expires October 31, 1997 Suggested Routing Senior Management
More informationA Framework for Managing Crime and Fraud
A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic
More informationArticle II - Standards Section V - Continuing Education Requirements
Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update
More informationInvestigation. City of Edmonton Office of the City Auditor. ETS Workforce Development. January 14, 2019
City of Edmonton Office of the City Auditor Investigation ETS Workforce Development January 14, 2019 1200, Scotia Place, Tower 1 10060 Jasper Ave Edmonton, AB T5J 3R8 Phone: 780-496-8300 edmonton.ca/auditor
More informationProtecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors
Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program
More informationDEFINITIONS AND REFERENCES
DEFINITIONS AND REFERENCES Definitions: Insider. Cleared contractor personnel with authorized access to any Government or contractor resource, including personnel, facilities, information, equipment, networks,
More information- Cyber threat information: information directly pertaining to,
WHAT INFORMATION MAY BE SHARED H.R. 3674, the PRECISE Act of 2011, as reported from HHSC Subcmte on Cybersecurity (Lungren) law, H.R. 3523, the Cyber Intelligence sharing and Protection Act of 2011, as
More informationOpening and Closing the Door to Medicaid. Program Integrity Joseph Kopsa, MA, JD Section Chief Program Integrity DHH HIPAA Privacy & Security Officer
Opening and Closing the Door to Medicaid Program Integrity Joseph Kopsa, MA, JD Section Chief Program Integrity DHH HIPAA Privacy & Security Officer PURPOSE Assure the Programmatic and Fiscal Integrity
More informationNUCONNECT INTERNET ACCEPTABLE USE POLICY
NUCONNECT INTERNET ACCEPTABLE USE POLICY This Acceptable Use Policy ( AUP ) applies to NUconnect Internet and related services ("Services ) delivered by Newport Utilities. This policy is designed to encourage
More informationSECTION/OWNER: CCO CONTRACTORS
Policy/Procedures POLICY NO: UOP ACO-COMP-005 SANCTION PROCESS- SECTION/OWNER: CCO CONTRACTORS EFFECTIVE DATE: 01/01/2017 DATE TO QIC: 01/15/2017 DATE TO BOARD: 01/31/2017 1.0 PURPOSE This policy is to
More informationHPE DATA PRIVACY AND SECURITY
ARUBA, a Hewlett Packard Enterprise company, product services ( Services ) This Data Privacy and Security Agreement ("DPSA") Schedule governs the privacy and security of Personal Data by HPE in connection
More informationFiscal Year 2013 Federal Information Security Management Act Report
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Fiscal Year 2013 Federal Information Security Management Act Report Status of EPA s Computer Security Program Report. 14-P-0033 vember 26,
More informationVIACOM INC. PRIVACY SHIELD PRIVACY POLICY
VIACOM INC. PRIVACY SHIELD PRIVACY POLICY Last Modified and Effective as of October 23, 2017 Viacom respects individuals privacy, and strives to collect, use and disclose personal information in a manner
More informationUSER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.
These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection
More informationMaking a Request for records from Portsmouth Public Schools
Rights & Responsibilities: The Rights of Requesters and the Responsibilities of Portsmouth Public Schools under the Virginia Freedom of Information Act The Virginia Freedom of Information Act (FOIA), located
More informationAcknowledgement of Receipt of Notice of Privacy Practices
Acknowledgement of Receipt of Notice of Privacy Practices I acknowledge that I have reviewed and understand Rainbow Pediatrics' Notice of Privacy Practices containing a description of the uses and disclosures
More informationCTI BioPharma Privacy Notice
CTI BioPharma Privacy Notice Effective: 29 November 2018 Introduction and Scope CTI BioPharma Corp. ( CTI, our, us ) takes the protection of your personal data very seriously. This Privacy Notice (this
More information2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY
2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on
More informationPlease print or type. Complete all areas of Agreement and Enrollment form, unless otherwise indicated.
Please complete the following Mississippi Medicaid Provider EDI Enrollment Packet. The package consists of the Conduent EDI Form, Mississippi EDI Provider Agreement and the Conduent EDI Gateway Inc., Trading
More informationThe University of British Columbia Board of Governors
The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:
More informationRights & Responsibilities: The Rights of Requesters and the Responsibilities of New College Institute under the Virginia Freedom of Information Act
Rights & Responsibilities: The Rights of Requesters and the Responsibilities of under the Virginia Freedom of Information Act The Virginia Freedom of Information Act (FOIA), 2.2-3700 et seq. of the Code
More informationPublished Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).
This document is scheduled to be published in the Federal Register on 03/22/2012 and available online at http://federalregister.gov/a/2012-06847, and on FDsys.gov 9110-9L DEPARTMENT OF HOMELAND SECURITY
More informationAPPENDIX H: McMURDO STATION COMPUTER INFORMATION For more information, visit
APPENDIX H: McMURDO STATION COMPUTER INFORMATION For more information, visit http://www.usap.gov/technology/contenthandler.cfm?id=94 In this appendix, you will find information on the following: H.1 Information
More informationDFARS Cyber Rule Considerations For Contractors In 2018
Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com DFARS Cyber Rule Considerations For Contractors
More informationEnterprise Income Verification (EIV) System User Access Authorization Form
Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be
More informationRappahannock-Rapidan Regional Commission (RRRC) Freedom of Information Act (FOIA) Administrative Policy
Rappahannock-Rapidan Regional Commission (RRRC) Freedom of Information Act (FOIA) Administrative Policy The Virginia Freedom of Information Act (FOIA), located 2.2-3700 et seq. of the Code of Virginia,
More informationU. S. POSTAL SERVICE CHIEF FOIA OFFICER REPORT. Fiscal Year 2009
U. S. POSTAL SERVICE CHIEF FOIA OFFICER REPORT Fiscal Year 2009 This report is submitted in response to Attorney General Holder s directive to Agency Chief FOIA Officers to review and to report each year
More informationService Description: Solution Support for Service Provider Software - Preferred This document
Page 1 of 5 Service Description: Solution Support for Service Provider Software - Preferred This document describes the Cisco Solution Support for Service Provider Software - Preferred. Related Documents:
More informationVFS GLOBAL PVT LTD PRIVACY DISCLAIMER
VFS GLOBAL PVT LTD PRIVACY DISCLAIMER Version 1.0 Privacy Disclaimer Scope VFS GLOBAL (hereinafter referred to as VFS GLOBAL ) is an outsourced partner of Diplomatic Missions across globe, and is authorized
More informationESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN
More informationPrivacy Policy. Your Personal Information will be processed by Whistle Sports in the United States.
Updated and Effective as of: February 24, 2017 Privacy Policy We are concerned about privacy issues and want you to be familiar with how we collect, use and disclose Personal Information (as defined below).
More informationAccountable Care Organizations: Testing Their Impact
Accountable Care Organizations: Testing Their Impact Eligibility Criteria * * Indicates required Preference will be given to applicants that are public agencies or are tax-exempt under Section 501(c)(3)
More informationControlled Substances
45.75.1 POLICY This policy addresses obtaining, using, storing, recordkeeping, dispensing, and disposing of controlled substances at WSU. This policy provides information and procedures to enable individuals
More informationRights & Responsibilities: The Rights of Requesters and the Responsibilities of Hampton City Schools under the Virginia Freedom of Information Act
Rights & Responsibilities: The Rights of Requesters and the Responsibilities of Hampton City Schools under the Virginia Freedom of Information Act The Virginia Freedom of Information Act (FOIA), located
More informationNEWTON COUNTY OPEN RECORDS ACT POLICY
NEWTON COUNTY OPEN RECORDS ACT POLICY As a public entity, Newton County is subject to the Open Records Act, O. C. G.A. 50-18- 70 et seq. Newton County is committed to conducting its business in a manner
More informationHPE CUSTOMER TERMS - PORTFOLIO
HPE Agreement Number(s) where required:. HPE entity: Customer: Effective Date (if applicable):. Term Length (if applicable):... HPE CUSTOMER TERMS - PORTFOLIO 1. Parties. These terms represent the agreement
More informationENCORE II REQUIREMENTS CHECKLIST AND CERTIFICATIONS
ENCORE II REQUIREMENTS CHECKLIST AND CERTIFICATIONS This form is completed by the Task Monitors and forwarded to DISA/DITCO-Scott with a complete ENCORE II Requirements Package. (electronic signatures
More informationRefund Policy. About us. Use of Site. Disclaimer of Warranty 1/6
Refund Policy draslcaribbean.com/index.php/refund-policy Terms and Conditions (including but not limited to the Description of Services offered, Refund/Return Policy, Merchant contact information, Export
More informationc. Software downloaded from electronic bulletin board systems.
February 6, 2001 INSPECTOR GENERAL INSTRUCTION 7950.4 SUBJECT: Microcomputer Antivirus Program References. See Appendix A. A. Purpose. This Instruction updates the Office of the Inspector General, Department
More informationOFFICE OF THE UNDER SECRETARY OF DEFENSE 3000DEFENSEPENTAGON WASHINGTON, DC
OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000DEFENSEPENTAGON WASHINGTON, DC 20301-3000 ACQUISITION, TECHNO LOGY. A N D LOGISTICS SEP 2 1 2017 MEMORANDUM FOR COMMANDER, UNITED ST A TES SPECIAL OPERATIONS
More informationPutting It All Together:
Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,
More informationPrivacy Policy... 1 EU-U.S. Privacy Shield Policy... 2
Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your
More informationCell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance.
Cell Phone Policy 1. Purpose: Establish a policy for cell phone use and compensation allowance. 2. Authority: The Clinton County Board of Commissioners. 3. Application: This Cell Phone Policy (the Policy)
More informationMarch 1, Dear Vendors: Reference: RFQ No. FY Subject: Website Consulting Services
March 1, 2019 Dear Vendors: Reference: RFQ No. FY19-18390 Subject: Website Consulting Services Vendors, AAMVA is hereby requesting quotes on the following services below. Please make sure that you read
More informationEffective October 31, Privacy Policy
Privacy Policy The nic.gop website is operated by Republican State Leadership Committee, Inc. ( Team.gop, we or us ). This Privacy Policy applies to nic.gop and any other website offered by Team.gop, which
More informationLYNX PHONE SUBSCRIBER TERMS OF SERVICE
LYNX PHONE SUBSCRIBER TERMS OF SERVICE The terms you, your or user, as used in this Agreement, shall mean the user of Lynx Phone Voice over Internet Protocol (VoIP) Residential or Business Communication
More informationZONE PROGRAM INTEGRITY CONTRACTOR (ZPIC) TASK ORDER STATEMENT OF WORK Zone 1 - Parts A, B, DME and HH +H
Attachment J.2.A Page 1 of 6 I. SCOPE ZONE PROGRAM INTEGRITY CONTRACTOR (ZPIC) TASK ORDER STATEMENT OF WORK Zone 1 - Parts A, B, DME and HH +H The ZPIC shall perform fraud, waste and abuse detection, deterrence
More informationManaging and Electronic Records: A Transition Priority
TRANSITION Managing Email and Electronic Records: A Transition Priority NGA RESOURCES AUGUST 2018 Electronic communications tools such as email and text messaging present new challenges to the governor-elect
More informationMobile Application Privacy Policy
Mobile Application Privacy Policy Introduction This mobile application is hosted and operated on behalf of your health plan. As such, some information collected through the mobile application may be considered
More informationma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018
ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:
More informationBCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement
BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance
More informationComponents and Considerations in Building an Insider Threat Program
Components and Considerations in Building an Insider Threat Program Carly Huth Insider Threat Researcher, CEWM Carly L. Huth is an insider threat researcher in the Cyber Enterprise and Workforce Management
More information