Privacy, Civil Rights, and Civil Liberties 101 December 10, 2012

Size: px
Start display at page:

Download "Privacy, Civil Rights, and Civil Liberties 101 December 10, 2012"

Transcription

1 Privacy, Civil Rights, and Civil Liberties 101 December 10, 2012 e-courts 2012 Conference - Las Vegas, NV National Center for State Courts The Honorable Anthony Capizzi Montgomery County, Ohio, Juvenile Court Chair, Global Privacy and Information Quality Working Group

2 Topics Why Should We Be Worried About Privacy and Information Quality Issues? Overview of Privacy Terms and Concepts The Importance of Having a Privacy Policy What Can Happen Without a Privacy Policy? From Privacy to Information Quality Global Privacy and Information Quality Resources OJP Justice Information Sharing Web Site Global Privacy Success Stories 2

3 Why The Columbus Dispatch October 28, 2008 Headline: Ohio State Official Ordered Search of Joe the Plumber's Private Records Ohio's Inspector General concluded in a report that the ODJFS director had wrongly authorized searches of Wurzelbacher through records kept on child support payments, temporary aid to families, and unemployment benefits. A state employee concerned that privacy rules had been violated initially disclosed the breaches. 3

4 Why Fox 6 News, WITI, Milwaukee August 25, 2011 Headline: State Senator Darling to Introduce Bill to Give Police Greater Access to Juvenile Records What my bill does is coordinate the information so law enforcement can get the whole picture of a juvenile who has committed a crime. 4

5 Why Star Tribune, Las Vegas September 6, 2011 Headline: One Prosecutor s Proposal for Juvenile Justice in Wyoming Cook County Prosecuting Attorney Joseph Baron s proposal includes making confidential juvenile court records available to community juvenile service boards, criminal justice agencies, and public and private entities that supervise or care for minors. 5

6 Privacy Overview Privacy refers to individuals interests in preventing the inappropriate collection, storage, use, and release of personally identifiable information Privacy interests include privacy of personal behavior, privacy of personal communications, and privacy of personal data 6

7 Privacy Overview Civil liberties are fundamental individual rights or freedoms, such as freedom of speech, press, assembly, or religion; the right to due process, to fair trial, and to privacy; and other limitations on the power of the government to restrain or dictate the actions of individuals Civil rights are rights and privileges of citizenship and equal protection that the state is constitutionally bound to guarantee all citizens regardless of race, religion, sex, or other characteristics unrelated to the worth of the individual 7

8 Privacy Overview What Is a Privacy and Civil Liberties Policy? What Is the Purpose of a Privacy and Civil Liberties Policy? 8

9 Privacy Overview What Is the Difference Between A Privacy Policy and a Security Policy? 9

10 The Importance of Having a Privacy Policy Reasons for Having a Privacy Policy It s the Right Thing to Do! 10

11 What Can Happen Without a Privacy Policy? Effects of Improper Practices Tarnishing an individual s reputation or standing Inappropriate invasion of privacy Personal or financial injury to individuals Getting sued and paying settlements or judgments Loss of public support and confidence Loss of means and methods Loss of funding and resources Decline in morale, or worse, getting shut down 11

12 What Can Happen Without a Privacy Policy? CBS News September 14, 2010 Headline: Pennsylvania Governor Apologizes for Terror Bulletins on Protests An embarrassed Governor Ed Rendell apologized Tuesday to groups whose peaceful protests or events, from an animal rights demonstration to a gay and lesbian festival, were the subject of regular anti-terrorism bulletins being distributed by his homeland security director. 12

13 What Can Happen Without a Privacy Policy? The Atlanta Journal Constitution September 25, 2005 Headline: Homeland Security Officials Wrongly ARRESTED Peaceful Protestors in Georgia, Charges ACLU Vegans Targeted for Protesting Outside HoneyBaked Ham Store 13

14 From Privacy to Information Quality The collection and sharing of poor quality information raises serious privacy concerns because the two concepts are inherently linked Quality information plays an extremely important role in the protection of the privacy rights of juveniles Through cross-collaboration among local, state, tribal, and federal justice entities, personally identifiable information is shared to form the information and records that underlie justice decision making As this cross-collaboration increases and improves, it is imperative that juvenile justice entities address the quality of the information shared 14

15 From Privacy to Information Quality How Can You Develop and Implement Privacy and Information Quality Policies and Procedures? 15

16 Global Justice Information Sharing Initiative (Global) FACA advisory body to nation s chief law enforcement officer, the U.S. Attorney General (AG) Supported by the Bureau of Justice Assistance (BJA) and the Office of Justice Programs (OJP), U.S. DOJ Addressing technical and policy issues Thirty-two AG-selected agencies, associations, constituencies Key personnel from all governmental levels: local, state, tribal, federal, and international Representatives from across the justice landscape, affecting the work of more than 1.2 million justice professionals 16

17 Global Advisory Committee s (GAC s) Development and Collaboration Efforts GAC working groups, councils, task teams, etc.: Consist of GAC committee members, as well as other subject-matter experts who expand the GAC s knowledge and experience. These groups are formed around timely issues affecting justice information sharing. Intelligence Infrastructure, Standards, and Security Business Solutions Privacy and Information Quality 17

18 Global Privacy Resources 18

19 Global Privacy Resources Booklet A road map to help justice entities navigate the diverse privacy policy and implementation products and tools available today Structured to help the reader determine which products to use for what purpose Products are grouped according to their use at each stage of a Privacy Program Cycle 19

20 Global Privacy Resources (Continued) Stages of a Privacy Program Cycle Educate and raise awareness Assess agency privacy risks Develop the privacy policy Perform a policy evaluation Implement and train Conduct an annual review All Global Privacy Resources are available online at 20

21 Global Privacy Resources Stage 1. Educate and Raise Awareness Executive Summary for Justice Decision Makers: Privacy, Civil Rights, and Civil Liberties Program Development 7 Steps to a Privacy, Civil Rights, and Civil Liberties Policy 21

22 Global Privacy Resources Stage 2. Assess Agency Privacy Risks Guide to Conducting Privacy Impact Assessments for State, Local, and Tribal Justice Entities 22

23 Global Privacy Resources Stage 3. Develop the Privacy Policy Privacy, Civil Rights, and Civil Liberties Policy Development Guide for State, Local, and Tribal Justice Entities (Global Privacy Guide) Privacy, Civil Rights, and Civil Liberties Policy Development Template for State, Local, and Tribal Justice Entities (SLT Policy Development Template) 23

24 Global Privacy Resources Stage 4. Perform a Policy Evaluation Privacy, Civil Rights, and Civil Liberties Policy Development Template for State, Local, and Tribal Justice Entities: Policy Review Checklist 24

25 Global Privacy Resources Stage 5. Implement and Train Coming Soon! Establishing a Privacy Officer Function Within a Justice or Public Safety Entity: Recommended Responsibilities and Training 25

26 Global Privacy Resources Stage 5. Implement and Train (continued) Implementing Privacy Policy in Justice Information Sharing: A Technical Framework Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise Guidance for Building Communities of Trust The Importance of Privacy, Civil Rights, and Civil Liberties Protections in American Law Enforcement and Public Safety DVD Criminal Intelligence Systems Operating Policies (28 CFR Part 23) Online Training 26

27 Global Privacy Resources Stage 6. Conduct an Annual Review Privacy, Civil Rights, and Civil Liberties Policy Development Template for State, Local, and Tribal Justice Entities: Policy Review Checklist 27

28 Global s Information Quality (IQ) Series Information Quality: The Foundation for Justice Decision Making 9 Elements of an Information Quality Program Information Quality Self-Assessment Tool Information Quality Program Guide 28

29 Global Information Sharing Toolkit (GIST) An online tool to help users navigate Global s numerous products, with three search options: Search: Using keywords, phrases, titles, or a combination of selected filters Browse: Using an extensive classification hierarchy to find categorized groups of products Guide: Using business needs or interests based on a series of guided questions 29

30 GIST Search Refine your search by selecting multiple applicable filters, such as: Focus Area Product Type Discipline/Community Role Business Problem/Need and many more filters 30

31 GIST Search Example For example, as the Focus Area filter reveals, there is only one privacy-focused policy evaluation product available in the GIST repository 31

32 GIST Browse Navigate through the classification hierarchy to find the group of products that suits your needs 32

33 GIST Guide Sample Business Problems The following sample business problems are currently available in the GIST Guide: Global Reference Architecture (GRA) Global Federated Identity and Privilege Management (GFIPM) Privacy and Information Quality Intelligence 33

34 GIST Guide Sample Search 34

35 Global Web Site Office of Justice Programs (OJP) Justice Information Sharing Web site for Global, Provides justice agencies with timely and useful resources that support privacy, information quality, intelligence, and technology initiatives, including NIEM and the GRA 35

36 and today, there is cloud computing! 36

37 Privacy Success Stories Connect South Dakota - NGA Privacy TA Effort Using Global Resources, such as the SLT Policy Development Template, we were able to Connect South Dakota (Connect SD) law enforcement in a statewide data exchange project, while ensuring the privacy rights and civil liberties of the citizens we serve. Upon completion of the Connect SD privacy policy, it was important to ensure our officers were trained on privacy protections. To accomplish this goal, we utilized Global s line officer training video and First Amendment-protected event resources. Bryan Gortmaker, Director South Dakota Division of Criminal Investigation 37

38 Privacy Success Stories CONNECT Consortium NGA Privacy TA Effort For several years, the Alabama Criminal Justice Information Center (ACJIC) has been involved in a multi-state initiative called CONNECT which has served as a proof-of-concept for sharing rich criminal justice information across state lines. Since its inception, the CONNECT leadership has recognized the importance of adopting a strong privacy and civil liberties policy to govern usage of CONNECT. Thanks to the Global SLT Policy Development Template and the Global Privacy Impact Assessment Guide, CONNECT was able to craft a model policy to meet the needs of the member states (Alabama, Kansas, Nebraska and Wyoming). Despite the fact that each state has its own set of governing laws and policies concerning the sharing of criminal justice information, the Global templates were robust enough to allow for the creation of a single policy to govern CONNECT usage. Maury Mitchell, Director Alabama Criminal Justice Information Center 38

39 Privacy Success Stories Hawaii Integrated Justice Information Sharing (HIJIS) Program NGA Privacy TA Effort Indiana Data Exchange (IDEx) 77 Designated Fusion Centers and 15 Regional Nodes 39

40 Privacy Success Stories Alabama Fusion Center DOJ s OJP Web site pertaining to Global Privacy Resources, is an amazing resource and I highly recommend it to anyone that wants to learn more about privacy, civil rights, and civil liberties. The site is designed to help with all aspects of the Privacy Program Cycle, including providing all the materials necessary to develop a comprehensive privacy policy or to evaluate an existing policy. As a relatively new Fusion Center Director, privacy was one of the first areas that I focused on and this site provided all the materials necessary to help create our program. Thanks to the DOJ subject matter experts who developed this site! Joe B. Davis, Ph.D., Director Alabama Fusion Center 40

41 Questions? Anthony Capizzi Montgomery County, Ohio, Juvenile Court 380 West Second Street Dayton, Ohio (937)

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

Statement of Chief Richard Beary President of the International Association of Chiefs of Police

Statement of Chief Richard Beary President of the International Association of Chiefs of Police Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of

More information

Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011

Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Presentation Topics Current and Future HIJIS Activities Background HIJIS Strategic Plan HIJIS Architecture Joins

More information

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

Good morning, Chairman Harman, Ranking Member Reichert, and Members of Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

U.S. Department of Justice Global Justice Information Sharing Initiative Annual Report 2011

U.S. Department of Justice Global Justice Information Sharing Initiative Annual Report 2011 U.S. Department of Justice Global Justice Information Sharing Initiative Annual Report 2011 Introduction Never before has America s need for justice information sharing been more compelling. The absence

More information

SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES

SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES Dru Sjodin National Sex Offender Public Website Updates to the public website are in development to meet the

More information

Criminal Justice System INFRASTRUCTURE COMMITTEE

Criminal Justice System INFRASTRUCTURE COMMITTEE Criminal Justice System INFRASTRUCTURE COMMITTEE SUB-COMMITTEE CHAIR: John Casbon Call for Action Hurricanes Katrina and Rita severely damaged law enforcement, prosecution, and judicial infrastructure

More information

NIEM in Action: Roadmap to Successful Standards- Based Information- Sharing

NIEM in Action: Roadmap to Successful Standards- Based Information- Sharing NIEM in Action: Roadmap to Successful Standards- Based Information- Sharing The National Information Exchange Model (NIEM) A Presentation to the IACP-LIEM Conference May 9, 2008 Nashville, TN Paul Wormeli,

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

OpenFox. Configurator

OpenFox. Configurator OpenFox Configurator Product Guide 2018 OpenFox Configurator Ever-changing technology and demands for information at a faster pace poses the challenge of ensuring your system is flexible and able to adapt

More information

CJIS Advisory Policy Board. Disposition Task Force. SEARCH 2011 Winter Membership Meeting

CJIS Advisory Policy Board. Disposition Task Force. SEARCH 2011 Winter Membership Meeting CJIS Advisory Policy Board Disposition Task Force 1 History The APB discussed the issue of incomplete records and the need to include courts in future discussions The APB recommended the formation of a

More information

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90 th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither

More information

Nationwide Suspicious Activity Reporting. Crime Stoppers USA Training Conference New Orleans September 2018

Nationwide Suspicious Activity Reporting. Crime Stoppers USA Training Conference New Orleans September 2018 Nationwide Suspicious Activity Reporting Crime Stoppers USA Training Conference New Orleans September 2018 2 NSI Project Partners If You See Something, Say Something Campaign Overview Launched in 2010

More information

Bureau of Justice Statistics (BJS) - Law Enforcement law enforcement in a new century and a changing world improving the administration of.

Bureau of Justice Statistics (BJS) - Law Enforcement law enforcement in a new century and a changing world improving the administration of. DOWNLOAD OR READ : LAW ENFORCEMENT IN A NEW CENTURY AND A CHANGING WORLD IMPROVING THE ADMINISTRATION OF FEDERAL LAW ENFORCEMENT REPORT OF THE COMMISSION ON THE ADVANCEMENT OF FEDERAL LAW ENFORCEMENT IMPROVING

More information

The National Network of Fusion Center: Where We Have Been and Where We are Going

The National Network of Fusion Center: Where We Have Been and Where We are Going The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National

More information

Department of Justice Policing and Victim Services BUSINESS PLAN

Department of Justice Policing and Victim Services BUSINESS PLAN Policing and Victim Services BUSINESS PLAN 2004-2005 1. The Creation of a New Division The was created in 2001 by joining the former Divisions: Policing and Public Safety Services and Victims Services.

More information

Kansas City s Metropolitan Emergency Information System (MEIS)

Kansas City s Metropolitan Emergency Information System (MEIS) Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)

More information

Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)

Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) Nationwide SAR Initiative (NSI) Responds directly to the Intelligence Reform and Terrorism Prevention Act of 2004 and to the direction of

More information

NSI. Suspicious Activity Reporting Line Officer Training

NSI. Suspicious Activity Reporting Line Officer Training Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding

More information

STATE OF MARYLAND GOVERNOR'S OFFICE OF CRIME CONTROL & PREVENTION

STATE OF MARYLAND GOVERNOR'S OFFICE OF CRIME CONTROL & PREVENTION NGA Center for Best Practices' Next Generation Justice Information Sharing Policy Academy Application December 9, 2011 STATE OF MARYLAND GOVERNOR'S OFFICE OF CRIME CONTROL & PREVENTION TEAM LEADER: Kristen

More information

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0 P.O. Box 212 Philip D. Murphy, Governor 300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ 08625-0212 www.tech.nj.gov STATE OF NEW JERSEY TECHNOLOGY CIRCULAR Enterprise Information

More information

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog April 6, 2012 National Institute of Standards and Technology 100 Bureau Drive, Stop 1070 Gaithersburg, MD 20899-1070 Re: Special Publication 800-53 Revision 4, Security Controls of Federal Information

More information

JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION

JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION PRESENTED BY: Leon Frederick, CIO, Iowa Department of Public Safety Liz Pearson, URL Integration PRESENTATION OVERVIEW What is N-DEx? What is Iowa

More information

Managing and Electronic Records: A Transition Priority

Managing  and Electronic Records: A Transition Priority TRANSITION Managing Email and Electronic Records: A Transition Priority NGA RESOURCES AUGUST 2018 Electronic communications tools such as email and text messaging present new challenges to the governor-elect

More information

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal

More information

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company Written Statement of Timothy J. Scott Chief Security Officer The Dow Chemical Company Representing The Dow Chemical Company and the American Chemistry Council To the United States Senate Committee on Homeland

More information

UNC Campus Security Initiatives Update. Business Affairs Committee May 9, 2017

UNC Campus Security Initiatives Update. Business Affairs Committee May 9, 2017 UNC Campus Security Initiatives Update Business Affairs Committee May 9, 2017 UNC Campus Security Initiative In August 2013, President Ross asked for a review of current security practices, an assessment

More information

Draft Resolution for Committee Consideration and Recommendation

Draft Resolution for Committee Consideration and Recommendation Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations

More information

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America

More information

alliance FROM DISPATCH THROUGH DISPOSITION Tyler Alliance Leads the Way with Integrated Criminal Justice and Public Safety Solutions

alliance FROM DISPATCH THROUGH DISPOSITION Tyler Alliance Leads the Way with Integrated Criminal Justice and Public Safety Solutions alliance FROM DISPATCH THROUGH DISPOSITION Tyler Alliance Leads the Way with Integrated Criminal Justice and Public Safety Solutions FIRE/EMS Fire and emergency service teams access information faster

More information

Data Standards and Electronic Information Exchange Child Support Enforcement. Craig D. Burlingame Chief Information Officer March 20, 2012

Data Standards and Electronic Information Exchange Child Support Enforcement. Craig D. Burlingame Chief Information Officer March 20, 2012 w The Commonwealth of Massachusetts Administrative Office of the Trial Court Trial Court Information Services Two Center Plaza, 9 th Floor Boston, Massachusetts 02108 Honorable Robert A. Mulligan Chief

More information

Privacy Policy on the Responsibilities of Third Party Service Providers

Privacy Policy on the Responsibilities of Third Party Service Providers Privacy Policy on the Responsibilities of Third Party Service Providers Privacy Office Document ID: 2489 Version: 3.2 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2016,

More information

Cybersecurity in Higher Ed

Cybersecurity in Higher Ed Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,

More information

Putting It All Together:

Putting It All Together: Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,

More information

Global Reference Architecture: Overview of National Standards. Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants

Global Reference Architecture: Overview of National Standards. Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants Global Reference Architecture: Overview of National Standards Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants Goals for this Presentation Define the Global Reference Architecture

More information

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program

More information

NCSC Study on Court Reporters

NCSC Study on Court Reporters NCSC Study on Court Reporters [S.L. 2013-360, 18B.21] March 13, 2014 S.L. 2013-360, 18B.21 STUDY USE AND COMPENSATION OF COURT REPORTERS SECTION 18B.21. The Administrative Office of the Courts, in consultation

More information

ACF Interoperability Human Services 2.0 Overview. August 2011 David Jenkins Administration for Children and Families

ACF Interoperability Human Services 2.0 Overview. August 2011 David Jenkins Administration for Children and Families ACF Interoperability Human Services 2.0 Overview August 2011 David Jenkins Administration for Children and Families Interoperability: An Operational Definition Creating a Health and Human Service System

More information

Address: 730 Simms, Suite #109, Golden, CO Digital Government: Government to Citizen (G to C)*

Address: 730 Simms, Suite #109, Golden, CO Digital Government: Government to Citizen (G to C)* NASCIO Nomination Form Title of Nomination: Colorado Integrated Criminal Justice Information System (CICJIS) Project/System Manager: Theresa Brandorff Job Title: Agency: Chief Information Officer Colorado

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, Looking Back at 2011

HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, Looking Back at 2011 HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, 2012 Phyllis F. Granade The Granade Law Firm Atlanta, GA (678) 705 2507 pgranade@granadelaw.com www.granadelaw.com Looking

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

TITLE SOCIAL MEDIA AND COLLABORATION POLICY

TITLE SOCIAL MEDIA AND COLLABORATION POLICY DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the

More information

EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND

EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND MARYLAND DEPARTMENT OF PUBLIC SAFETY AND CORRECTIONAL SERVICES INFORMATION TECHNOLOGY AND COMMUNICATIONS DIVISION FOR

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support

More information

Security Survey Executive Summary October 2008

Security Survey Executive Summary October 2008 A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government

More information

OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE INTELLIGENCE COMMUNITY POLICY MEMORANDUM NUMBER

OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE INTELLIGENCE COMMUNITY POLICY MEMORANDUM NUMBER OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE INTELLIGENCE COMMUNITY POLICY MEMORANDUM NUMBER 2007-500-3 SUBJECT: (U) INTELLIGENCE INFORMATION SHARING A. AUTHORITY: The National Security Act of 1947,

More information

Presented by the Federal Interagency Elder Justice Working Group May 13, 2013

Presented by the Federal Interagency Elder Justice Working Group May 13, 2013 Presented by the Federal Interagency Elder Justice Working Group May 13, 2013 The inaugural meeting of the Elder Justice Coordinating Council took place in October 2012 Fall meeting agenda determined with

More information

-Eight types of cyber data, (Sec. 708(7))

-Eight types of cyber data, (Sec. 708(7)) WHAT INFORMATION MAY BE SHARED H.R. 624, the Cyber Intelligence sharing and Protection Act of 2013 (CISPA) (Rogers- -Notwithstanding any provision of law, S. 3414, the Cybersecurity Act of 2012 (Lieberman-Collins-

More information

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable

More information

NATIONAL INFORMATION SHARING STRATEGY

NATIONAL INFORMATION SHARING STRATEGY The Federal Bureau of Investigation NATIONAL INFORMATION SHARING STRATEGY August 2008 August 2008 1 PURPOSE The Federal Bureau of Investigation (FBI) National Information Sharing Strategy (NISS) provides

More information

NEWTON COUNTY OPEN RECORDS ACT POLICY

NEWTON COUNTY OPEN RECORDS ACT POLICY NEWTON COUNTY OPEN RECORDS ACT POLICY As a public entity, Newton County is subject to the Open Records Act, O. C. G.A. 50-18- 70 et seq. Newton County is committed to conducting its business in a manner

More information

Collaboration Trail - how Corrections information is shared. CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014

Collaboration Trail - how Corrections information is shared. CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014 Collaboration Trail - how Corrections information is shared CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014 Agenda Introductions Why Collaborate? Along the Collaboration Trail

More information

Postal Inspection Service Mail Covers Program

Postal Inspection Service Mail Covers Program Postal Inspection Service Mail Covers Program May 28, 2014 AUDIT REPORT Report Number HIGHLIGHTS BACKGROUND: In fiscal year 2013, the U.S. Postal Inspection Service processed about 49,000 mail covers.

More information

Maryland Health Care Commission

Maryland Health Care Commission Special Review Maryland Health Care Commission Security Monitoring of Patient Information Maintained by the State-Designated Health Information Exchange September 2017 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT

More information

STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY

STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY INFORMATION TECHNOLOGY GENERAL CONTROLS INFORMATION SYSTEMS AUDIT JANUARY 2016 EXECUTIVE SUMMARY PURPOSE

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose: STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security

More information

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN

More information

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP) To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the

More information

SOC 3 for Security and Availability

SOC 3 for Security and Availability SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2015 through September 30, 2016 Independent SOC 3 Report for the Security and Availability Trust

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

HIPAA Security. An Ounce of Prevention is Worth a Pound of Cure

HIPAA Security. An Ounce of Prevention is Worth a Pound of Cure HIPAA Security An Ounce of Prevention is Worth a Pound of Cure Presented by CJ Wolf, MD, COC, CPC, CHC, CCEP, CIA Healthicity Senior Compliance Executive Paul R. Hales, Attorney at Law Subject Matter Expert

More information

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS Information Technology Shared Service Team North Dakota Cyber Security Across North Dakota Threats and Opportunities 15 September 2018 EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS AGENDA SIRN / FirstNet

More information

Privacy Impact Assessment

Privacy Impact Assessment Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions

More information

ITU Model Cybercrime Law: Project Overview

ITU Model Cybercrime Law: Project Overview ITU Model Cybercrime Law: Project Overview Jody R. Westby ICT Applications and Cybersecurity Division Policies and Strategies Department, BDT International Telecommunication Union International

More information

Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650

Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650 Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650 President Obama issued Executive Order (EO) 13650 - Improving Chemical

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need

More information

Overview of Court Information Technology. Jeffrey M. Marecic, Chief Information Officer Administrative Office of the Courts March 2015

Overview of Court Information Technology. Jeffrey M. Marecic, Chief Information Officer Administrative Office of the Courts March 2015 Overview of Court Information Technology Jeffrey M. Marecic, Chief Information Officer Administrative Office of the Courts March 2015 Agenda IT Service Delivery Drivers in North Carolina Connecting People

More information

Breach Notification Assessment Tool

Breach Notification Assessment Tool Breach Notification Assessment Tool December 2006 Information and Privacy Commissioner of Ontario David Loukidelis Commissioner Ann Cavoukian, Ph.D. Commissioner This document is for general information

More information

Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version

Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Date: 18 October 2010 Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Introduction: Below are: 1) suggested amendments to the RAA and; 2) due diligence recommendations

More information

We are releasing 7 pages of responsive documents. Pursuant to FOIA, certain information has been redacted as it is exempt from release.

We are releasing 7 pages of responsive documents. Pursuant to FOIA, certain information has been redacted as it is exempt from release. Description of document: Requested date: Released date: Posted date: Source of document: President's Council on Integrity and Efficiency Information (PCIE) Information Technology Investigations Sub- Committee

More information

Dane County Criminal Justice Council Data-Sharing Project Progress Report

Dane County Criminal Justice Council Data-Sharing Project Progress Report Dane County Criminal Justice Council Data-Sharing Project Progress Report February 2018 Prepared for Dane County Criminal Justice Council Dane County, Wisconsin The Dane County Criminal Justice Council

More information

ASSESSMENT LAYERED SECURITY

ASSESSMENT LAYERED SECURITY FFIEC BUSINESS ACCOUNT GUIDANCE RISK & ASSESSMENT LAYERED SECURITY FOR ONLINE BUSINESS TRANSACTIONS New financial standards will assist banks and business account holders to make online banking safer and

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

- Cyber threat information: information directly pertaining to,

- Cyber threat information: information directly pertaining to, WHAT INFORMATION MAY BE SHARED H.R. 3674, the PRECISE Act of 2011, as reported from HHSC Subcmte on Cybersecurity (Lungren) law, H.R. 3523, the Cyber Intelligence sharing and Protection Act of 2011, as

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape

More information

INCIDENT-BASED CRIME REPORTING

INCIDENT-BASED CRIME REPORTING INCIDENT-BASED CRIME REPORTING NCS-X and NIBRS Program Planning Bureau of Justice Statistics Federal Bureau of Investigation IACP/SEARCH/RTI/IJIS/PERF 1 AGENDA Overview of the NCS-X Program Overview of

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

Annual Report for the Utility Savings Initiative

Annual Report for the Utility Savings Initiative Report to the North Carolina General Assembly Annual Report for the Utility Savings Initiative July 1, 2016 June 30, 2017 NORTH CAROLINA DEPARTMENT OF ENVIRONMENTAL QUALITY http://portal.ncdenr.org Page

More information

Information Systems Security Requirements for Federal GIS Initiatives

Information Systems Security Requirements for Federal GIS Initiatives Requirements for Federal GIS Initiatives Alan R. Butler, CDP Senior Project Manager Penobscot Bay Media, LLC 32 Washington Street, Suite 230 Camden, ME 04841 1 Federal GIS "We are at risk," advises the

More information

Privacy Notice. General Information Protection Regulation ( GDPR )

Privacy Notice. General Information Protection Regulation ( GDPR ) Privacy Notice General Information Protection Regulation ( GDPR ) Please read the following information carefully. This privacy notice contains information about the information collected, stored and otherwise

More information

Memorandum of Agreement

Memorandum of Agreement Memorandum of Agreement I. Parties This agreement is entered into between the Disaster Management Electronic Government Initiative (DM Egov) in the Department of Homeland Security (DHS), and the Emergency

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

CITYWIDE Part I Crime CITYWIDE PROPERTY PART I CRIME

CITYWIDE Part I Crime CITYWIDE PROPERTY PART I CRIME CITYWIDE Part I Crime 25-214 14 vs 5 14 vs 13 Total Part I Crime 14952 135985 129263 127374 11831 111188 16375 1625 12368 1779 16 14 12 1 8 6 4 2 14 vs 5 14 vs 13 Total Violent Crimes 14 vs 5 Total Property

More information

Federal Bureau of Investigation CJIS Division Next Generation Identification

Federal Bureau of Investigation CJIS Division Next Generation Identification Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference: CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function

More information

Clark County Property Taxes Overview

Clark County Property Taxes Overview Clark County Property Taxes Overview Joint Meeting of the Senate Committee on Revenue and Economic Development and the Assembly Committee on Taxation Tuesday, February 14, 2017 Property Tax Abatement Impact

More information

Guiding principles on the Global Alliance against child sexual abuse online

Guiding principles on the Global Alliance against child sexual abuse online Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child

More information

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Cybersecurity Landscape Major Data Breaches (e.g., OPM, IRS) Data Breach Notification Laws Directors Derivative Suits Federal Legislation

More information

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information