Privacy, Civil Rights, and Civil Liberties 101 December 10, 2012
|
|
- Henry Blankenship
- 6 years ago
- Views:
Transcription
1 Privacy, Civil Rights, and Civil Liberties 101 December 10, 2012 e-courts 2012 Conference - Las Vegas, NV National Center for State Courts The Honorable Anthony Capizzi Montgomery County, Ohio, Juvenile Court Chair, Global Privacy and Information Quality Working Group
2 Topics Why Should We Be Worried About Privacy and Information Quality Issues? Overview of Privacy Terms and Concepts The Importance of Having a Privacy Policy What Can Happen Without a Privacy Policy? From Privacy to Information Quality Global Privacy and Information Quality Resources OJP Justice Information Sharing Web Site Global Privacy Success Stories 2
3 Why The Columbus Dispatch October 28, 2008 Headline: Ohio State Official Ordered Search of Joe the Plumber's Private Records Ohio's Inspector General concluded in a report that the ODJFS director had wrongly authorized searches of Wurzelbacher through records kept on child support payments, temporary aid to families, and unemployment benefits. A state employee concerned that privacy rules had been violated initially disclosed the breaches. 3
4 Why Fox 6 News, WITI, Milwaukee August 25, 2011 Headline: State Senator Darling to Introduce Bill to Give Police Greater Access to Juvenile Records What my bill does is coordinate the information so law enforcement can get the whole picture of a juvenile who has committed a crime. 4
5 Why Star Tribune, Las Vegas September 6, 2011 Headline: One Prosecutor s Proposal for Juvenile Justice in Wyoming Cook County Prosecuting Attorney Joseph Baron s proposal includes making confidential juvenile court records available to community juvenile service boards, criminal justice agencies, and public and private entities that supervise or care for minors. 5
6 Privacy Overview Privacy refers to individuals interests in preventing the inappropriate collection, storage, use, and release of personally identifiable information Privacy interests include privacy of personal behavior, privacy of personal communications, and privacy of personal data 6
7 Privacy Overview Civil liberties are fundamental individual rights or freedoms, such as freedom of speech, press, assembly, or religion; the right to due process, to fair trial, and to privacy; and other limitations on the power of the government to restrain or dictate the actions of individuals Civil rights are rights and privileges of citizenship and equal protection that the state is constitutionally bound to guarantee all citizens regardless of race, religion, sex, or other characteristics unrelated to the worth of the individual 7
8 Privacy Overview What Is a Privacy and Civil Liberties Policy? What Is the Purpose of a Privacy and Civil Liberties Policy? 8
9 Privacy Overview What Is the Difference Between A Privacy Policy and a Security Policy? 9
10 The Importance of Having a Privacy Policy Reasons for Having a Privacy Policy It s the Right Thing to Do! 10
11 What Can Happen Without a Privacy Policy? Effects of Improper Practices Tarnishing an individual s reputation or standing Inappropriate invasion of privacy Personal or financial injury to individuals Getting sued and paying settlements or judgments Loss of public support and confidence Loss of means and methods Loss of funding and resources Decline in morale, or worse, getting shut down 11
12 What Can Happen Without a Privacy Policy? CBS News September 14, 2010 Headline: Pennsylvania Governor Apologizes for Terror Bulletins on Protests An embarrassed Governor Ed Rendell apologized Tuesday to groups whose peaceful protests or events, from an animal rights demonstration to a gay and lesbian festival, were the subject of regular anti-terrorism bulletins being distributed by his homeland security director. 12
13 What Can Happen Without a Privacy Policy? The Atlanta Journal Constitution September 25, 2005 Headline: Homeland Security Officials Wrongly ARRESTED Peaceful Protestors in Georgia, Charges ACLU Vegans Targeted for Protesting Outside HoneyBaked Ham Store 13
14 From Privacy to Information Quality The collection and sharing of poor quality information raises serious privacy concerns because the two concepts are inherently linked Quality information plays an extremely important role in the protection of the privacy rights of juveniles Through cross-collaboration among local, state, tribal, and federal justice entities, personally identifiable information is shared to form the information and records that underlie justice decision making As this cross-collaboration increases and improves, it is imperative that juvenile justice entities address the quality of the information shared 14
15 From Privacy to Information Quality How Can You Develop and Implement Privacy and Information Quality Policies and Procedures? 15
16 Global Justice Information Sharing Initiative (Global) FACA advisory body to nation s chief law enforcement officer, the U.S. Attorney General (AG) Supported by the Bureau of Justice Assistance (BJA) and the Office of Justice Programs (OJP), U.S. DOJ Addressing technical and policy issues Thirty-two AG-selected agencies, associations, constituencies Key personnel from all governmental levels: local, state, tribal, federal, and international Representatives from across the justice landscape, affecting the work of more than 1.2 million justice professionals 16
17 Global Advisory Committee s (GAC s) Development and Collaboration Efforts GAC working groups, councils, task teams, etc.: Consist of GAC committee members, as well as other subject-matter experts who expand the GAC s knowledge and experience. These groups are formed around timely issues affecting justice information sharing. Intelligence Infrastructure, Standards, and Security Business Solutions Privacy and Information Quality 17
18 Global Privacy Resources 18
19 Global Privacy Resources Booklet A road map to help justice entities navigate the diverse privacy policy and implementation products and tools available today Structured to help the reader determine which products to use for what purpose Products are grouped according to their use at each stage of a Privacy Program Cycle 19
20 Global Privacy Resources (Continued) Stages of a Privacy Program Cycle Educate and raise awareness Assess agency privacy risks Develop the privacy policy Perform a policy evaluation Implement and train Conduct an annual review All Global Privacy Resources are available online at 20
21 Global Privacy Resources Stage 1. Educate and Raise Awareness Executive Summary for Justice Decision Makers: Privacy, Civil Rights, and Civil Liberties Program Development 7 Steps to a Privacy, Civil Rights, and Civil Liberties Policy 21
22 Global Privacy Resources Stage 2. Assess Agency Privacy Risks Guide to Conducting Privacy Impact Assessments for State, Local, and Tribal Justice Entities 22
23 Global Privacy Resources Stage 3. Develop the Privacy Policy Privacy, Civil Rights, and Civil Liberties Policy Development Guide for State, Local, and Tribal Justice Entities (Global Privacy Guide) Privacy, Civil Rights, and Civil Liberties Policy Development Template for State, Local, and Tribal Justice Entities (SLT Policy Development Template) 23
24 Global Privacy Resources Stage 4. Perform a Policy Evaluation Privacy, Civil Rights, and Civil Liberties Policy Development Template for State, Local, and Tribal Justice Entities: Policy Review Checklist 24
25 Global Privacy Resources Stage 5. Implement and Train Coming Soon! Establishing a Privacy Officer Function Within a Justice or Public Safety Entity: Recommended Responsibilities and Training 25
26 Global Privacy Resources Stage 5. Implement and Train (continued) Implementing Privacy Policy in Justice Information Sharing: A Technical Framework Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise Guidance for Building Communities of Trust The Importance of Privacy, Civil Rights, and Civil Liberties Protections in American Law Enforcement and Public Safety DVD Criminal Intelligence Systems Operating Policies (28 CFR Part 23) Online Training 26
27 Global Privacy Resources Stage 6. Conduct an Annual Review Privacy, Civil Rights, and Civil Liberties Policy Development Template for State, Local, and Tribal Justice Entities: Policy Review Checklist 27
28 Global s Information Quality (IQ) Series Information Quality: The Foundation for Justice Decision Making 9 Elements of an Information Quality Program Information Quality Self-Assessment Tool Information Quality Program Guide 28
29 Global Information Sharing Toolkit (GIST) An online tool to help users navigate Global s numerous products, with three search options: Search: Using keywords, phrases, titles, or a combination of selected filters Browse: Using an extensive classification hierarchy to find categorized groups of products Guide: Using business needs or interests based on a series of guided questions 29
30 GIST Search Refine your search by selecting multiple applicable filters, such as: Focus Area Product Type Discipline/Community Role Business Problem/Need and many more filters 30
31 GIST Search Example For example, as the Focus Area filter reveals, there is only one privacy-focused policy evaluation product available in the GIST repository 31
32 GIST Browse Navigate through the classification hierarchy to find the group of products that suits your needs 32
33 GIST Guide Sample Business Problems The following sample business problems are currently available in the GIST Guide: Global Reference Architecture (GRA) Global Federated Identity and Privilege Management (GFIPM) Privacy and Information Quality Intelligence 33
34 GIST Guide Sample Search 34
35 Global Web Site Office of Justice Programs (OJP) Justice Information Sharing Web site for Global, Provides justice agencies with timely and useful resources that support privacy, information quality, intelligence, and technology initiatives, including NIEM and the GRA 35
36 and today, there is cloud computing! 36
37 Privacy Success Stories Connect South Dakota - NGA Privacy TA Effort Using Global Resources, such as the SLT Policy Development Template, we were able to Connect South Dakota (Connect SD) law enforcement in a statewide data exchange project, while ensuring the privacy rights and civil liberties of the citizens we serve. Upon completion of the Connect SD privacy policy, it was important to ensure our officers were trained on privacy protections. To accomplish this goal, we utilized Global s line officer training video and First Amendment-protected event resources. Bryan Gortmaker, Director South Dakota Division of Criminal Investigation 37
38 Privacy Success Stories CONNECT Consortium NGA Privacy TA Effort For several years, the Alabama Criminal Justice Information Center (ACJIC) has been involved in a multi-state initiative called CONNECT which has served as a proof-of-concept for sharing rich criminal justice information across state lines. Since its inception, the CONNECT leadership has recognized the importance of adopting a strong privacy and civil liberties policy to govern usage of CONNECT. Thanks to the Global SLT Policy Development Template and the Global Privacy Impact Assessment Guide, CONNECT was able to craft a model policy to meet the needs of the member states (Alabama, Kansas, Nebraska and Wyoming). Despite the fact that each state has its own set of governing laws and policies concerning the sharing of criminal justice information, the Global templates were robust enough to allow for the creation of a single policy to govern CONNECT usage. Maury Mitchell, Director Alabama Criminal Justice Information Center 38
39 Privacy Success Stories Hawaii Integrated Justice Information Sharing (HIJIS) Program NGA Privacy TA Effort Indiana Data Exchange (IDEx) 77 Designated Fusion Centers and 15 Regional Nodes 39
40 Privacy Success Stories Alabama Fusion Center DOJ s OJP Web site pertaining to Global Privacy Resources, is an amazing resource and I highly recommend it to anyone that wants to learn more about privacy, civil rights, and civil liberties. The site is designed to help with all aspects of the Privacy Program Cycle, including providing all the materials necessary to develop a comprehensive privacy policy or to evaluate an existing policy. As a relatively new Fusion Center Director, privacy was one of the first areas that I focused on and this site provided all the materials necessary to help create our program. Thanks to the DOJ subject matter experts who developed this site! Joe B. Davis, Ph.D., Director Alabama Fusion Center 40
41 Questions? Anthony Capizzi Montgomery County, Ohio, Juvenile Court 380 West Second Street Dayton, Ohio (937)
Cellular Site Simulator Usage and Privacy
Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and
More informationStatement of Chief Richard Beary President of the International Association of Chiefs of Police
Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of
More informationHawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011
Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Presentation Topics Current and Future HIJIS Activities Background HIJIS Strategic Plan HIJIS Architecture Joins
More informationGood morning, Chairman Harman, Ranking Member Reichert, and Members of
Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationU.S. Department of Justice Global Justice Information Sharing Initiative Annual Report 2011
U.S. Department of Justice Global Justice Information Sharing Initiative Annual Report 2011 Introduction Never before has America s need for justice information sharing been more compelling. The absence
More informationSEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES
SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES Dru Sjodin National Sex Offender Public Website Updates to the public website are in development to meet the
More informationCriminal Justice System INFRASTRUCTURE COMMITTEE
Criminal Justice System INFRASTRUCTURE COMMITTEE SUB-COMMITTEE CHAIR: John Casbon Call for Action Hurricanes Katrina and Rita severely damaged law enforcement, prosecution, and judicial infrastructure
More informationNIEM in Action: Roadmap to Successful Standards- Based Information- Sharing
NIEM in Action: Roadmap to Successful Standards- Based Information- Sharing The National Information Exchange Model (NIEM) A Presentation to the IACP-LIEM Conference May 9, 2008 Nashville, TN Paul Wormeli,
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More informationOpenFox. Configurator
OpenFox Configurator Product Guide 2018 OpenFox Configurator Ever-changing technology and demands for information at a faster pace poses the challenge of ensuring your system is flexible and able to adapt
More informationCJIS Advisory Policy Board. Disposition Task Force. SEARCH 2011 Winter Membership Meeting
CJIS Advisory Policy Board Disposition Task Force 1 History The APB discussed the issue of incomplete records and the need to include courts in future discussions The APB recommended the formation of a
More information79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90
th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither
More informationNationwide Suspicious Activity Reporting. Crime Stoppers USA Training Conference New Orleans September 2018
Nationwide Suspicious Activity Reporting Crime Stoppers USA Training Conference New Orleans September 2018 2 NSI Project Partners If You See Something, Say Something Campaign Overview Launched in 2010
More informationBureau of Justice Statistics (BJS) - Law Enforcement law enforcement in a new century and a changing world improving the administration of.
DOWNLOAD OR READ : LAW ENFORCEMENT IN A NEW CENTURY AND A CHANGING WORLD IMPROVING THE ADMINISTRATION OF FEDERAL LAW ENFORCEMENT REPORT OF THE COMMISSION ON THE ADVANCEMENT OF FEDERAL LAW ENFORCEMENT IMPROVING
More informationThe National Network of Fusion Center: Where We Have Been and Where We are Going
The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National
More informationDepartment of Justice Policing and Victim Services BUSINESS PLAN
Policing and Victim Services BUSINESS PLAN 2004-2005 1. The Creation of a New Division The was created in 2001 by joining the former Divisions: Policing and Public Safety Services and Victims Services.
More informationKansas City s Metropolitan Emergency Information System (MEIS)
Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)
More informationNationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) Nationwide SAR Initiative (NSI) Responds directly to the Intelligence Reform and Terrorism Prevention Act of 2004 and to the direction of
More informationNSI. Suspicious Activity Reporting Line Officer Training
Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding
More informationSTATE OF MARYLAND GOVERNOR'S OFFICE OF CRIME CONTROL & PREVENTION
NGA Center for Best Practices' Next Generation Justice Information Sharing Policy Academy Application December 9, 2011 STATE OF MARYLAND GOVERNOR'S OFFICE OF CRIME CONTROL & PREVENTION TEAM LEADER: Kristen
More information300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0
P.O. Box 212 Philip D. Murphy, Governor 300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ 08625-0212 www.tech.nj.gov STATE OF NEW JERSEY TECHNOLOGY CIRCULAR Enterprise Information
More informationRe: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog
April 6, 2012 National Institute of Standards and Technology 100 Bureau Drive, Stop 1070 Gaithersburg, MD 20899-1070 Re: Special Publication 800-53 Revision 4, Security Controls of Federal Information
More informationJOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION
JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION PRESENTED BY: Leon Frederick, CIO, Iowa Department of Public Safety Liz Pearson, URL Integration PRESENTATION OVERVIEW What is N-DEx? What is Iowa
More informationManaging and Electronic Records: A Transition Priority
TRANSITION Managing Email and Electronic Records: A Transition Priority NGA RESOURCES AUGUST 2018 Electronic communications tools such as email and text messaging present new challenges to the governor-elect
More informationCritical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division
Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal
More informationWritten Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company
Written Statement of Timothy J. Scott Chief Security Officer The Dow Chemical Company Representing The Dow Chemical Company and the American Chemistry Council To the United States Senate Committee on Homeland
More informationUNC Campus Security Initiatives Update. Business Affairs Committee May 9, 2017
UNC Campus Security Initiatives Update Business Affairs Committee May 9, 2017 UNC Campus Security Initiative In August 2013, President Ross asked for a review of current security practices, an assessment
More informationDraft Resolution for Committee Consideration and Recommendation
Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations
More informationTestimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON
Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America
More informationalliance FROM DISPATCH THROUGH DISPOSITION Tyler Alliance Leads the Way with Integrated Criminal Justice and Public Safety Solutions
alliance FROM DISPATCH THROUGH DISPOSITION Tyler Alliance Leads the Way with Integrated Criminal Justice and Public Safety Solutions FIRE/EMS Fire and emergency service teams access information faster
More informationData Standards and Electronic Information Exchange Child Support Enforcement. Craig D. Burlingame Chief Information Officer March 20, 2012
w The Commonwealth of Massachusetts Administrative Office of the Trial Court Trial Court Information Services Two Center Plaza, 9 th Floor Boston, Massachusetts 02108 Honorable Robert A. Mulligan Chief
More informationPrivacy Policy on the Responsibilities of Third Party Service Providers
Privacy Policy on the Responsibilities of Third Party Service Providers Privacy Office Document ID: 2489 Version: 3.2 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2016,
More informationCybersecurity in Higher Ed
Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,
More informationPutting It All Together:
Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,
More informationGlobal Reference Architecture: Overview of National Standards. Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants
Global Reference Architecture: Overview of National Standards Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants Goals for this Presentation Define the Global Reference Architecture
More informationCalifornia Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT
California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program
More informationNCSC Study on Court Reporters
NCSC Study on Court Reporters [S.L. 2013-360, 18B.21] March 13, 2014 S.L. 2013-360, 18B.21 STUDY USE AND COMPENSATION OF COURT REPORTERS SECTION 18B.21. The Administrative Office of the Courts, in consultation
More informationACF Interoperability Human Services 2.0 Overview. August 2011 David Jenkins Administration for Children and Families
ACF Interoperability Human Services 2.0 Overview August 2011 David Jenkins Administration for Children and Families Interoperability: An Operational Definition Creating a Health and Human Service System
More informationAddress: 730 Simms, Suite #109, Golden, CO Digital Government: Government to Citizen (G to C)*
NASCIO Nomination Form Title of Nomination: Colorado Integrated Criminal Justice Information System (CICJIS) Project/System Manager: Theresa Brandorff Job Title: Agency: Chief Information Officer Colorado
More informationINFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES
INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using
More informationHIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, Looking Back at 2011
HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, 2012 Phyllis F. Granade The Granade Law Firm Atlanta, GA (678) 705 2507 pgranade@granadelaw.com www.granadelaw.com Looking
More informationCyber Security Program
Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationTITLE SOCIAL MEDIA AND COLLABORATION POLICY
DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the
More informationEV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND
EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND MARYLAND DEPARTMENT OF PUBLIC SAFETY AND CORRECTIONAL SERVICES INFORMATION TECHNOLOGY AND COMMUNICATIONS DIVISION FOR
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support
More informationSecurity Survey Executive Summary October 2008
A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government
More informationOFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE INTELLIGENCE COMMUNITY POLICY MEMORANDUM NUMBER
OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE INTELLIGENCE COMMUNITY POLICY MEMORANDUM NUMBER 2007-500-3 SUBJECT: (U) INTELLIGENCE INFORMATION SHARING A. AUTHORITY: The National Security Act of 1947,
More informationPresented by the Federal Interagency Elder Justice Working Group May 13, 2013
Presented by the Federal Interagency Elder Justice Working Group May 13, 2013 The inaugural meeting of the Elder Justice Coordinating Council took place in October 2012 Fall meeting agenda determined with
More information-Eight types of cyber data, (Sec. 708(7))
WHAT INFORMATION MAY BE SHARED H.R. 624, the Cyber Intelligence sharing and Protection Act of 2013 (CISPA) (Rogers- -Notwithstanding any provision of law, S. 3414, the Cybersecurity Act of 2012 (Lieberman-Collins-
More informationData Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory
Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable
More informationNATIONAL INFORMATION SHARING STRATEGY
The Federal Bureau of Investigation NATIONAL INFORMATION SHARING STRATEGY August 2008 August 2008 1 PURPOSE The Federal Bureau of Investigation (FBI) National Information Sharing Strategy (NISS) provides
More informationNEWTON COUNTY OPEN RECORDS ACT POLICY
NEWTON COUNTY OPEN RECORDS ACT POLICY As a public entity, Newton County is subject to the Open Records Act, O. C. G.A. 50-18- 70 et seq. Newton County is committed to conducting its business in a manner
More informationCollaboration Trail - how Corrections information is shared. CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014
Collaboration Trail - how Corrections information is shared CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014 Agenda Introductions Why Collaborate? Along the Collaboration Trail
More informationPostal Inspection Service Mail Covers Program
Postal Inspection Service Mail Covers Program May 28, 2014 AUDIT REPORT Report Number HIGHLIGHTS BACKGROUND: In fiscal year 2013, the U.S. Postal Inspection Service processed about 49,000 mail covers.
More informationMaryland Health Care Commission
Special Review Maryland Health Care Commission Security Monitoring of Patient Information Maintained by the State-Designated Health Information Exchange September 2017 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT
More informationSTATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY
STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY INFORMATION TECHNOLOGY GENERAL CONTROLS INFORMATION SYSTEMS AUDIT JANUARY 2016 EXECUTIVE SUMMARY PURPOSE
More informationInvestigating Insider Threats
Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior
More informationSTAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:
STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security
More informationESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN
More informationTERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)
To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the
More informationSOC 3 for Security and Availability
SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2015 through September 30, 2016 Independent SOC 3 Report for the Security and Availability Trust
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationMotorola Mobility Binding Corporate Rules (BCRs)
Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,
More informationHIPAA Security. An Ounce of Prevention is Worth a Pound of Cure
HIPAA Security An Ounce of Prevention is Worth a Pound of Cure Presented by CJ Wolf, MD, COC, CPC, CHC, CCEP, CIA Healthicity Senior Compliance Executive Paul R. Hales, Attorney at Law Subject Matter Expert
More informationEMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS
Information Technology Shared Service Team North Dakota Cyber Security Across North Dakota Threats and Opportunities 15 September 2018 EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS AGENDA SIRN / FirstNet
More informationPrivacy Impact Assessment
Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions
More informationITU Model Cybercrime Law: Project Overview
ITU Model Cybercrime Law: Project Overview Jody R. Westby ICT Applications and Cybersecurity Division Policies and Strategies Department, BDT International Telecommunication Union International
More informationActions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650
Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650 President Obama issued Executive Order (EO) 13650 - Improving Chemical
More information2 The IBM Data Governance Unified Process
2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.
More informationNEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES
NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need
More informationOverview of Court Information Technology. Jeffrey M. Marecic, Chief Information Officer Administrative Office of the Courts March 2015
Overview of Court Information Technology Jeffrey M. Marecic, Chief Information Officer Administrative Office of the Courts March 2015 Agenda IT Service Delivery Drivers in North Carolina Connecting People
More informationBreach Notification Assessment Tool
Breach Notification Assessment Tool December 2006 Information and Privacy Commissioner of Ontario David Loukidelis Commissioner Ann Cavoukian, Ph.D. Commissioner This document is for general information
More informationLaw Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version
Date: 18 October 2010 Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Introduction: Below are: 1) suggested amendments to the RAA and; 2) due diligence recommendations
More informationWe are releasing 7 pages of responsive documents. Pursuant to FOIA, certain information has been redacted as it is exempt from release.
Description of document: Requested date: Released date: Posted date: Source of document: President's Council on Integrity and Efficiency Information (PCIE) Information Technology Investigations Sub- Committee
More informationDane County Criminal Justice Council Data-Sharing Project Progress Report
Dane County Criminal Justice Council Data-Sharing Project Progress Report February 2018 Prepared for Dane County Criminal Justice Council Dane County, Wisconsin The Dane County Criminal Justice Council
More informationASSESSMENT LAYERED SECURITY
FFIEC BUSINESS ACCOUNT GUIDANCE RISK & ASSESSMENT LAYERED SECURITY FOR ONLINE BUSINESS TRANSACTIONS New financial standards will assist banks and business account holders to make online banking safer and
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More information- Cyber threat information: information directly pertaining to,
WHAT INFORMATION MAY BE SHARED H.R. 3674, the PRECISE Act of 2011, as reported from HHSC Subcmte on Cybersecurity (Lungren) law, H.R. 3523, the Cyber Intelligence sharing and Protection Act of 2011, as
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationINCIDENT-BASED CRIME REPORTING
INCIDENT-BASED CRIME REPORTING NCS-X and NIBRS Program Planning Bureau of Justice Statistics Federal Bureau of Investigation IACP/SEARCH/RTI/IJIS/PERF 1 AGENDA Overview of the NCS-X Program Overview of
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationTSA/FTA Security and Emergency Management Action Items for Transit Agencies
TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:
More informationAnnual Report for the Utility Savings Initiative
Report to the North Carolina General Assembly Annual Report for the Utility Savings Initiative July 1, 2016 June 30, 2017 NORTH CAROLINA DEPARTMENT OF ENVIRONMENTAL QUALITY http://portal.ncdenr.org Page
More informationInformation Systems Security Requirements for Federal GIS Initiatives
Requirements for Federal GIS Initiatives Alan R. Butler, CDP Senior Project Manager Penobscot Bay Media, LLC 32 Washington Street, Suite 230 Camden, ME 04841 1 Federal GIS "We are at risk," advises the
More informationPrivacy Notice. General Information Protection Regulation ( GDPR )
Privacy Notice General Information Protection Regulation ( GDPR ) Please read the following information carefully. This privacy notice contains information about the information collected, stored and otherwise
More informationMemorandum of Agreement
Memorandum of Agreement I. Parties This agreement is entered into between the Disaster Management Electronic Government Initiative (DM Egov) in the Department of Homeland Security (DHS), and the Emergency
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationCITYWIDE Part I Crime CITYWIDE PROPERTY PART I CRIME
CITYWIDE Part I Crime 25-214 14 vs 5 14 vs 13 Total Part I Crime 14952 135985 129263 127374 11831 111188 16375 1625 12368 1779 16 14 12 1 8 6 4 2 14 vs 5 14 vs 13 Total Violent Crimes 14 vs 5 Total Property
More informationFederal Bureau of Investigation CJIS Division Next Generation Identification
Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment
More informationUTAH VALLEY UNIVERSITY Policies and Procedures
Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information
More informationPasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:
CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function
More informationClark County Property Taxes Overview
Clark County Property Taxes Overview Joint Meeting of the Senate Committee on Revenue and Economic Development and the Assembly Committee on Taxation Tuesday, February 14, 2017 Property Tax Abatement Impact
More informationGuiding principles on the Global Alliance against child sexual abuse online
Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child
More informationStephanie Zierten Associate Counsel Federal Reserve Bank of Boston
Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Cybersecurity Landscape Major Data Breaches (e.g., OPM, IRS) Data Breach Notification Laws Directors Derivative Suits Federal Legislation
More informationUN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security
UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More information