Retail Loss Information in Mail Theft Investigations. A private public partnership benefiting the consumer.

Size: px
Start display at page:

Download "Retail Loss Information in Mail Theft Investigations. A private public partnership benefiting the consumer."

Transcription

1 Retail Loss Information in Mail Theft Investigations A private public partnership benefiting the consumer.

2 The OIG Office of Investigations OI s structure is designed to cover postal program vulnerabilities and are aligned geographically to the postal workforce. Approximately 450 Special Agents stationed in more than 108 offices nationwide. OI meets its statutory responsibility by investigating internal postal crimes involving: Health Care Fraud Contract Fraud Financial Fraud Internal Mail Theft Official Misconduct Specialized units in Headquarters include the Computer Crimes Unit and Cyber & Technical Operations Unit. 2

3 3

4 What is Internal Mail Theft??? THE PARCEL COMPLAINT WHERE

5 United States Postal Inspection Service Jurisdiction Military Personnel Highway Contract Drivers (Dock to Dock) Airline Employees Bank/Firm Employees Mail Messenger/Courier Mail Room Personnel Anyone who has access to the mail for reasons of their employment (non-postal)

6 Sanctity of the Seal Sanctity of the Seal ono person in the USPS including contractors shall break, or permit to be broken, the seal of any mail sealed against inspection while in USPS custody.

7 What is CAPE? Countermeasures And Performance Evaluations. Our Mission: To provide visibility into data and deliver decision ready information to our stakeholders. CAPE is staffed by: Subject Matter Experts Data Modelers Information Technology Specialists 7

8 Enterprise Customer Care (ecc) Data Mining Text Fields for Keywords

9 ecc USPS receives ecc complaints Data Mining Text Search for Keywords brings actionable leads to our Mail Theft Agents around the country. Keywords Used: gift cards greeting cards cash jewelry prescriptions Firearms Agents are not limited to these keywords. Agents can search a specific date range, keyword, 3 or 5 digit zip code. 9

10 Success Stories A mail theft investigation initiated in January 2015, determined a labor custodian, stole at least eight gift cards with a total value of $210, as well as two $5 dollar bonus cards and two $10 off coupons from the mail. During an interview with agents from the USPS OIG, the labor custodian confessed to the thefts and wrote a sworn statement acknowledging her activities. A mail theft investigation initiated in June 2015 revealed a rural carrier associate was responsible for the theft of gift cards from the mail. In July 2015, the rural carrier associate submitted her resignation from the postal service effective immediately based upon the USPS OIG investigation 10

11 RADR Risk Assessment Data Repository The OIG working closely with mailers to develop testing programs to deter employee theft.

12 Data Analytics as a Service The OIG Vision is to have analytics and data sharing services as the foundation of internal mail theft investigations. Allows for allocation of time/resources Allows the computer to identify the areas of concern RADR transforms data into information Comes at no cost to the retailer. 12

13 RADR Mail Theft Facts Analyze reported losses from major mailers. Identifies the most likely location for each loss: major mailer warehouse, plant, post office, route, carrier. Groups location losses and trends over specific time periods - to identify hotspots. Provides the agent with investigative guidance about the who, what, when, and where. Does not assume carriers are responsible for all losses. For plant losses, identifies suspected machine type (SPBS, APPS, PSS) where losses are occurring. 13

14 External Data Postal Data High-Level Model Architecture DOIS Data AMS Data RADR Analytic Tool Facility Data RADR Reporting Tool Mail Loss Records MT Model

15 Mail Theft Model Retailer 1 Retailer 2 Retailer 3

16 Tripwires Utilizing Retail Information in Mail Theft Investigations

17 Package Loss Tripwire Similar to mailer loss analysis, but we focus on package losses Is it internal mail theft, external mail theft or consumer fraud? By analyzing the last scan information, we focus on: Evidence of the package entering the Postal Service mail stream Evidence pointing to the package going missing inside the Postal Service Evidence of the package Scanned as Delivered 17

18 External Theft or Consumer Fraud United States Postal Inspection Service Jurisdiction involves external influences on USPS Referral process and cooperation Information will be available to your organization. The goal is to protect the retailer and ultimately the customer 18

19 Gift Card Loss Tripwire Gift cards reported lost/stolen Loss Metrics or Exceptions: Identify multiple gift cards used in same transaction EX: Four (4) $50 Gift Cards used in same transaction Gift Cards fraudulently negotiated outside of intended destination EX: Gift Card destined for Cincinnati used in Las Vegas 19

20 Sharing Data The more loss data the OIG can obtain the better will help the Postal Service, the Mailing Industry, and the Customer. The OIG needs this from you: give us your problem shipments, and we can work to determine the most likely points of loss. 20

21 Secured File Transfer Over 150 of the Fortune 1000, Including the largest civilian federal agencies, 6 of the top 12 private equity firms Most of the 6 major Hollywood studios 21

22 be.com/watch?v= wwf8uvx2tym&fe ature=player_deta ilpage

23 23

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal

More information

Julia Allen Principal Researcher, CERT Division

Julia Allen Principal Researcher, CERT Division Improving the Security and Resilience of U.S. Postal Service Mail Products and Services Using CERT -RMM (Case Study) Julia Allen Principal Researcher, CERT Division Julia Allen is a principal researcher

More information

INSPECTOR GENERAL U.S. DEPARTMENT OF THE INTERIOR

INSPECTOR GENERAL U.S. DEPARTMENT OF THE INTERIOR All deletions have been made under 5 U.S.C. 552(b)(6) and (b)(7)(c) unless otherwise noted OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF THE INTERIOR REPORT OF INVESTIGATION Case Title NPS-GCNP SCADA

More information

Professional Education Short Courses and Certificate Programs

Professional Education Short Courses and Certificate Programs Professional Education Short Courses and Certificate Programs January-December 2017 cce.umn.edu/professionaleducation College of Continuing Education 353 Ruttan Hall 1994 Buford Avenue St. Paul, MN 55108-6080

More information

Postal Inspection Service Mail Covers Program

Postal Inspection Service Mail Covers Program Postal Inspection Service Mail Covers Program May 28, 2014 AUDIT REPORT Report Number HIGHLIGHTS BACKGROUND: In fiscal year 2013, the U.S. Postal Inspection Service processed about 49,000 mail covers.

More information

NASA Policy Directive

NASA Policy Directive NASA Policy Directive NPD 8820.2D Effective Date: July 02, 2013 Expiration Date: July 02, 2018 COMPLIANCE IS MANDATORY Subject: Design and Construction of Facilities Responsible Office: Facilities Engineering

More information

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90 th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither

More information

FREQUENTLY ASKED QUESTIONS FOR MAILERS AND THE MAILING INDUSTRY

FREQUENTLY ASKED QUESTIONS FOR MAILERS AND THE MAILING INDUSTRY FREQUENTLY ASKED QUESTIONS FOR MAILERS AND THE MAILING INDUSTRY For Phase 2 Network Rationalization What is Network Rationalization? The Postal Service is responsible for maintaining an efficient mail

More information

Report Number NO-AR November 21, 2018

Report Number NO-AR November 21, 2018 Office of Inspector General United States Postal Service Audit Report Delayed Mail at the Denver, CO, Processing and Distribution Center November 21, 2018 Table of Contents Cover Highlights... 1 Objective...

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

213 Prices and Eligibility

213 Prices and Eligibility 213213.1.4 213 Prices and Eligibility Overview 1.0 Prices and Fees 2.0 Content Standards for Priority Mail Express 3.0 Basic Standards for Priority Mail Express 4.0 Service Features of Priority Mail Express

More information

Figure 11-1: Organizational Issues. Managing the Security Function. Chapter 11. Figure 11-1: Organizational Issues. Figure 11-1: Organizational Issues

Figure 11-1: Organizational Issues. Managing the Security Function. Chapter 11. Figure 11-1: Organizational Issues. Figure 11-1: Organizational Issues 1 Managing the Security Function Chapter 11 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Top Management Support Top-Management security awareness briefing (emphasis on brief)

More information

Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers

Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers Ben Vickery Senior Technical Analyst NIST MEP September

More information

Integrating Mailing Services to become a Total Solutions Provider. Written by Jane Friddell Vertical Market Manager

Integrating Mailing Services to become a Total Solutions Provider. Written by Jane Friddell Vertical Market Manager Integrating Mailing Services to become a Total Solutions Provider Written by Jane Friddell Vertical Market Manager OVERVIEW: The purpose of this plan is to assist print for pay owners with integrating

More information

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES: (Solutions Brief) An integrated cybersecurity Administration solution for securing any Large Enterprise. The Industry s most complete protection for the Large Enterprise and Cloud Deployments. KEY SERVICES:

More information

Food Safety and Inspection Service:

Food Safety and Inspection Service: USDA-FSIS-OIEA Compliance and Investigations Division (CID) Mark W. Crowe Director Washington, D.C. 2 FSIS Program Areas Office of the Administrator Office of Field Operations Office Policy and Program

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 4525.8 December 26, 2001 USD(AT&L) SUBJECT: DoD Official Mail Management References: (a) DoD Directive 4525.6, "Single Manager for Military Postal Service," May

More information

Cincinnati/Northern Kentucky International Airport. Partnership for Nuclear Security Insider Threat Summit September, 2015

Cincinnati/Northern Kentucky International Airport. Partnership for Nuclear Security Insider Threat Summit September, 2015 Cincinnati/Northern Kentucky International Airport Partnership for Nuclear Security Insider Threat Summit September, 2015 Cincinnati USA Story 2 28 th largest metropolitan area in the USA with 2.1M population

More information

SURROUNDING LAND OWNER NOTICE/CALL UP OPTION NOTIFICATION PROCEDURE

SURROUNDING LAND OWNER NOTICE/CALL UP OPTION NOTIFICATION PROCEDURE SURROUNDING LAND OWNER NOTICE/CALL UP OPTION NOTIFICATION PROCEDURE Notice to surrounding land owners (SLO) and notice of call up option is required pursuant to La Plata County Land Use Code (LPLUC Section

More information

Be Prepared for the Intelligent Mail Package barcode (IMpb)* *Excerpted from Neopost webinar 4/24/14

Be Prepared for the Intelligent Mail Package barcode (IMpb)* *Excerpted from Neopost webinar 4/24/14 Be Prepared for the Intelligent Mail Package barcode (IMpb)* *Excerpted from Neopost webinar 4/24/14 1 Agenda IMpb Overview How IMpb affects businesses that ship packages with mailing systems IMpb Requirements

More information

Us mail tracking site usps com site gov

Us mail tracking site usps com site gov Us mail tracking site usps com site gov The Borg System is 100 % Us mail tracking site usps com site gov MENU BACK USPS. USPS Tracking. SCAN Clear text field. Label Formats. USPS Tracking : 9400 1000 0000

More information

ITU Regional Cybersecurity Forum for Asia-Pacific

ITU Regional Cybersecurity Forum for Asia-Pacific ITU Regional Cybersecurity Forum for Asia-Pacific Incident Management Capabilities Australia Country Case Study Graham Ingram General Manager AusCERT July 2008 Copyright 2008 AusCERT Not for further distribution

More information

Us postal service tracking #

Us postal service tracking # P ford residence southampton, ny Us postal service tracking # 2-8-2013 The Postal Service takes a picture of every letter and package mailed in the United States and will give a photo to a requesting law

More information

Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis)

Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis) Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis) (CFI-12-IGCI-02) Background INTERPOL recognizes that police worldwide

More information

COLORADO DEPARTMENT OF LABOR AND EMPLOYMENT Arapahoe Street Denver, CO

COLORADO DEPARTMENT OF LABOR AND EMPLOYMENT Arapahoe Street Denver, CO STANDARD PROCEDURE COLORADO DEPARTMENT OF LABOR AND EMPLOYMENT 1515 Arapahoe Street Denver, CO 80202-2117 Number... Effective Date...12/13/90 Supersedes... Revision Date... Executive Director's SP-71 Approval...

More information

ACTION: Notice of modification to existing systems of records. its General and Customer Privacy Act Systems of Records. These modifications

ACTION: Notice of modification to existing systems of records. its General and Customer Privacy Act Systems of Records. These modifications This document is scheduled to be published in the Federal Register on 06/27/2012 and available online at http://federalregister.gov/a/2012-15606, and on FDsys.gov POSTAL SERVICE 7710-12 Privacy Act of

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Geneva 18 April 2016 David Satola Why combatting cybercrime matters to the World Bank Demand for a single source of access

More information

EPUB // USPS PRICE REPAIR MANUAL DOCUMENT

EPUB // USPS PRICE REPAIR MANUAL DOCUMENT 25 December, 2017 EPUB // USPS PRICE REPAIR MANUAL DOCUMENT Document Filetype: PDF 321.87 KB 0 EPUB // USPS PRICE REPAIR MANUAL DOCUMENT I-Team "the policy in the Postal Operations Manualstates mail receptacles

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

Let s Get Connected. with. USPS Delivery Partner Program

Let s Get Connected. with. USPS Delivery Partner Program Let s Get Connected with USPS Delivery Partner Program March 14, 2018 Liz Flannery Mail & Package Information Systems Enterprise Analytics United States Postal Service elizabeth.j.flannery@usps.gov USPSDeliveryPartnerProgram@usps.gov

More information

PROVIDING INVESTIGATIVE SOLUTIONS

PROVIDING INVESTIGATIVE SOLUTIONS PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

New Standards to Enhance Business Reply Mail (BRM) Visibility. SUMMARY: The Postal Service proposes to revise Mailing Standards of the

New Standards to Enhance Business Reply Mail (BRM) Visibility. SUMMARY: The Postal Service proposes to revise Mailing Standards of the This document is scheduled to be published in the Federal Register on 08/18/2014 and available online at http://federalregister.gov/a/2014-19433, and on FDsys.gov 7710-12 POSTAL SERVICE 39 CFR Part 111

More information

OpenText Buys Guidance Software

OpenText Buys Guidance Software OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations

More information

Digital Solutions. January, 2016

Digital Solutions. January, 2016 Digital Solutions January, 2016 This document provides an outline of a presentation and is incomplete without the accompanying oral commentary and discussion. Conclusions and/ or potential strategies contained

More information

Defensive Cyber Operations Industry Overview 3 APR 18

Defensive Cyber Operations Industry Overview 3 APR 18 Defensive Cyber Operations Industry Overview 3 APR 18 LTC Scott Helmore UNCLASSIFIED Introduction Welcome Transforming I3C2 to DCO Themes: Innovation Secure Communications Collaboration WWII was won with

More information

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,

More information

Vendor Fraud. Goals of Presentation. Detection and Investigation

Vendor Fraud. Goals of Presentation. Detection and Investigation Vendor Fraud Detection and Investigation by CPAs Dan Dreibelbis dlrg1@verizon.net Maryland Association of CPAs Goals of Presentation Alert CPAs to their ability to detect fraud Fraud detection is a responsibility

More information

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements

More information

National Rural Letter Carriers Union Rebuttal Testimony Before the President s Commission on the United States Postal Service

National Rural Letter Carriers Union Rebuttal Testimony Before the President s Commission on the United States Postal Service National Rural Letter Carriers Union Rebuttal Testimony Before the President s Commission on the United States Postal Service We submit this rebuttal testimony on behalf of 102,000 Rural Letter Carriers,

More information

PRIVACY IMPACT ASSESSMENT (PIA) Family and Employer Programs and Policy (FEPP) Communications ListServ (GovDelivery)

PRIVACY IMPACT ASSESSMENT (PIA) Family and Employer Programs and Policy (FEPP) Communications ListServ (GovDelivery) PRIVACY IMPACT ASSESSMENT (PIA) For the Family and Employer Programs and Policy (FEPP) Communications ListServ (Govelivery) Family and Employer Programs and Policy (FEPP) SECTION 1: IS A PIA REQUIRE? a.

More information

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company Written Statement of Timothy J. Scott Chief Security Officer The Dow Chemical Company Representing The Dow Chemical Company and the American Chemistry Council To the United States Senate Committee on Homeland

More information

OVERVIEW BROCHURE GRC. When you have to be right

OVERVIEW BROCHURE GRC. When you have to be right OVERVIEW BROCHURE GRC When you have to be right WoltersKluwerFS.com In response to today s demanding economic and regulatory climate, many financial services firms are transforming operations to enhance

More information

PTLGateway Data Breach Policy

PTLGateway Data Breach Policy 1 PTLGateway Data Breach Policy Last Updated Date: 02 March 2018 Data Breach Policy This page informs you of our policy which is to establish the goals and the vision for the breach response process. This

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

Donor Credit Card Security Policy

Donor Credit Card Security Policy Donor Credit Card Security Policy INTRODUCTION This document explains the Community Foundation of Northeast Alabama s credit card security requirements for donors as required by the Payment Card Industry

More information

ADVISORY. Forensic services. Protecting your business from fraud, misconduct and non-compliance. kpmg.com/in

ADVISORY. Forensic services. Protecting your business from fraud, misconduct and non-compliance. kpmg.com/in ADVISORY Forensic Protecting your business from fraud, misconduct and non-compliance kpmg.com/in Protect your organisation from fraud, misconduct and non-compliance risks Our preventive can ensure that

More information

CITYWIDE Part I Crime CITYWIDE PROPERTY PART I CRIME

CITYWIDE Part I Crime CITYWIDE PROPERTY PART I CRIME CITYWIDE Part I Crime 25-214 14 vs 5 14 vs 13 Total Part I Crime 14952 135985 129263 127374 11831 111188 16375 1625 12368 1779 16 14 12 1 8 6 4 2 14 vs 5 14 vs 13 Total Violent Crimes 14 vs 5 Total Property

More information

EXPERT GROUP MEETING ON CYBERCRIME

EXPERT GROUP MEETING ON CYBERCRIME EXPERT GROUP MEETING ON CYBERCRIME VIENNA, 17-21 JANUARY 2011 Presentation by Ayo Olukanni Charge D affaires ai Embassy/Permanent Mission of Nigeria, Vienna Nigeria and the fight against Cybercrime Establishment

More information

ACTION: Notice of modification to existing systems of records. General and Customer Privacy Act Systems of Records. These modifications are

ACTION: Notice of modification to existing systems of records. General and Customer Privacy Act Systems of Records. These modifications are This document is scheduled to be published in the Federal Register on 09/13/2012 and available online at http://federalregister.gov/a/2012-22511, and on FDsys.gov 7710-12 POSTAL SERVICE Privacy Act of

More information

9/11/2014. Agenda. What is Counterintelligence?

9/11/2014. Agenda. What is Counterintelligence? Critical Industrial Elements Security of a Suspicious Training Products Contact & Resources Report (Internal) (SCR) Agenda What is Counterintelligence (CI)? NISPOM Reporting Requirements DSS Reporting

More information

Annual Report for the Utility Savings Initiative

Annual Report for the Utility Savings Initiative Report to the North Carolina General Assembly Annual Report for the Utility Savings Initiative July 1, 2016 June 30, 2017 NORTH CAROLINA DEPARTMENT OF ENVIRONMENTAL QUALITY http://portal.ncdenr.org Page

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

DEFINITIONS AND REFERENCES

DEFINITIONS AND REFERENCES DEFINITIONS AND REFERENCES Definitions: Insider. Cleared contractor personnel with authorized access to any Government or contractor resource, including personnel, facilities, information, equipment, networks,

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Emerging Markets Multinationals Network For Sustainability (EMM)

Emerging Markets Multinationals Network For Sustainability (EMM) Emerging Markets Multinationals Network For Sustainability (EMM) EMSD is a network of change agents and decision makers from think tanks, multinational corporations, and the financial sector. Our members

More information

The Corporate Security Review (CSR) Program September 11, 2008

The Corporate Security Review (CSR) Program September 11, 2008 The Corporate Security Review (CSR) Program September 11, 2008 Transportation Sector Network Management Highway and Motor Carrier Security Division Corporate Security Review Background Spring 2003 TSA

More information

CFC Charitable Giving User Guide

CFC Charitable Giving User Guide United States Office of Personnel Management CFC Charitable Giving User Guide 2017 CFC September 2017 1 Table of Contents How to Use this Manual Page 3 About the CFC Page 4 CFC Zones Page 4 CFC Approved

More information

Regulation P & GLBA Training

Regulation P & GLBA Training Regulation P & GLBA Training Overview Regulation P governs the treatment of nonpublic personal information about consumers by the financial institution. (Gramm-Leach-Bliley Act of 1999) The GLBA is composed

More information

Please process as per my usual instructions.

Please process as per my usual instructions. Same Day Process Service 1413 K Street, NW 7th Floor Washington, DC 20005 (202) 398-4200 Fax (202) 658-7925 www.samedayprocess.com info@samedayprocess.com Dear Brandon, Please process as per my usual instructions.

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

NASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen

NASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen NASCIO Recognition Award Nomination Title: Central Issuance of State Drivers Licenses Category: Digital Government Government to Citizen State: North Carolina Executive Summary The NCDMV wanted to reduce

More information

Ready, Willing & Able. Michael Cover, Manager, Blue Cross Blue Shield of Michigan

Ready, Willing & Able. Michael Cover, Manager, Blue Cross Blue Shield of Michigan Ready, Willing & Able Michael Cover, Manager, Blue Cross Blue Shield of Michigan Agenda 1. Organization Overview 2. GRC Journey Story 3. GRC Program Roadmap 4. Program Objectives and Guiding Principals

More information

Credit Card Data Compromise: Incident Response Plan

Credit Card Data Compromise: Incident Response Plan Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,

More information

INTERNAL ASSESSMENT TEST 3 Answer Keys

INTERNAL ASSESSMENT TEST 3 Answer Keys INTERNAL ASSESSMENT TEST 3 Answer Keys Subject & Code: Information Sytems-10IS72 Name of the faculty: Mrs. Aisha Begam Q. No Questions Marks 1 a) Explain the ethical responsibilities of business professionals.

More information

Inbound International Mail Operations. Service Center. Audit Report. Report Number MS-AR December 30, 2016

Inbound International Mail Operations. Service Center. Audit Report. Report Number MS-AR December 30, 2016 Service Center Audit Report Report Number MS-AR-17-003 December 30, 2016 Inbound International Mail Operations With limited exception, all inbound international mail is subject to inspection by US CBP

More information

Records Retention Policy

Records Retention Policy June 21, 2017 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Review Cycle...3 1.4 Document Owner...3 1.5 Definitions...3 2 Policy...4 2.1 Records and Record Storage...4 2.2 Applicable

More information

Changes at the USPS how to adapt your mailing strategies. Tracey Evans Vice President of Operations Pitney Bowes Mail Services

Changes at the USPS how to adapt your mailing strategies. Tracey Evans Vice President of Operations Pitney Bowes Mail Services Changes at the USPS how to adapt your mailing strategies Tracey Evans Vice President of Operations Pitney Bowes Mail Services 1 Agenda Changes to USPS Mailing Services Strategies to Mitigate Price Increases

More information

Texas Lottery Commission Internal Audit. Mailroom Processes. August 30, 2018 Report # An Internal Audit of. Prepared by:

Texas Lottery Commission Internal Audit. Mailroom Processes. August 30, 2018 Report # An Internal Audit of. Prepared by: Texas Lottery Commission Internal Audit An Internal Audit of Mailroom Processes August 30, 2018 Report #18-005 Prepared by: This report provides management with information about the condition of risks

More information

Internal Audit Report. Electronic Bidding and Contract Letting TxDOT Office of Internal Audit

Internal Audit Report. Electronic Bidding and Contract Letting TxDOT Office of Internal Audit Internal Audit Report Electronic Bidding and Contract Letting TxDOT Office of Internal Audit Objective Review of process controls and service delivery of the TxDOT electronic bidding process. Opinion Based

More information

10/18/2016. Preparing Your Organization for a HHS OIG Information Security Audit. Models for Risk Assessment

10/18/2016. Preparing Your Organization for a HHS OIG Information Security Audit. Models for Risk Assessment Preparing Your Organization for a HHS OIG Information Security Audit David Holtzman, JD, CIPP/G CynergisTek, Inc. Brian C. Johnson, CPA, CISA HHS OIG Section 1: Models for Risk Assessment Section 2: Preparing

More information

BPF GLOBAL SECURITY DETECT DEFEND DETER. Company Profile

BPF GLOBAL SECURITY DETECT DEFEND DETER. Company Profile BPF GLOBAL SECURITY Company Profile BPF GLOBAL SECURITY Guarding, patrolling and protecting Australia wide BPF Global Security is a specialist Security and Facilities Management company providing professional

More information

ISSP Network Security Plan

ISSP Network Security Plan ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...

More information

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Professional Training Course - Cybercrime Investigation Body of Knowledge - Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce

More information

Identity Theft Victim s Complaint and Affidavit

Identity Theft Victim s Complaint and Affidavit Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors

More information

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

Sales Presentation Case 2018 Dell EMC

Sales Presentation Case 2018 Dell EMC Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations

More information

503 Extra and Additional Services. 1.0 Basic Standards for Extra Services

503 Extra and Additional Services. 1.0 Basic Standards for Extra Services 503503.1.3 Additional Services: Registered Mail 503 Extra and Additional Services Overview 1.0 Basic Standards for Extra Services 2.0 Registered Mail 3.0 Certified Mail 4.0 Insured Mail 5.0 Certificate

More information

Law Enforcement Commercial Price List ManTech International Corporation August 2017

Law Enforcement Commercial Price List ManTech International Corporation August 2017 Law Enforcement Commercial Price List ManTech International Corporation August 2017 Table of Contents Rates and Description... 3 General Guidelines... 54 Contact Information... 56 Page - 2 Rates and Description

More information

Components and Considerations in Building an Insider Threat Program

Components and Considerations in Building an Insider Threat Program Components and Considerations in Building an Insider Threat Program Carly Huth Insider Threat Researcher, CEWM Carly L. Huth is an insider threat researcher in the Cyber Enterprise and Workforce Management

More information

Data ownership within governance: getting it right

Data ownership within governance: getting it right Data ownership within governance: getting it right Control your data An Experian white paper Data Ownership within Governance : Getting it right - 1 Table of contents 1. Introduction 03 2. Why is data

More information

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm Insider Threat Program: Protecting the Crown Jewels Monday, March 2, 2:15 pm - 3:15 pm Take Away Identify your critical information Recognize potential insider threats What happens after your critical

More information

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure EXECUTIVE ORDER [13800] - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin Advanced Technology Academic Research Council Federal CISO Summit Ms. Thérèse Firmin Acting Deputy DoD CIO Cyber Security Department of Defense 25 January 2018 2 Overview Secretary Mattis Priorities Cybersecurity

More information

The CIS Security Metrics & Benchmarking Service. Clint Kreitner The Center for Internet Security

The CIS Security Metrics & Benchmarking Service. Clint Kreitner The Center for Internet Security The CIS Security Metrics & Benchmarking Service Clint Kreitner The Center for Internet Security The Center for Internet Security (CIS) Formed - October 2000 As a not-for-profit public-private partnership

More information

Railroad Infrastructure Security

Railroad Infrastructure Security TRB Annual Meeting January 14, 2002 Session 107 - Railroad Security William C. Thompson william.thompson@jacobs.com 402-697-5011 Thanks to: Bob Ulrich Dr. William Harris Byron Ratcliff Frank Thigpen John

More information

TITLE SLIDE Today s topic is Secure Destruction, a new sustainable BlueEarth mail service offering that provides a solution for USPS customers

TITLE SLIDE Today s topic is Secure Destruction, a new sustainable BlueEarth mail service offering that provides a solution for USPS customers TITLE SLIDE Today s topic is Secure Destruction, a new sustainable BlueEarth mail service offering that provides a solution for USPS customers business needs while providing environmental and economic

More information

FIRESOFT CONSULTING Privacy Policy

FIRESOFT CONSULTING Privacy Policy FIRESOFT CONSULTING Privacy Policy FIRESOFT CONSULTING abides by the Australian Privacy Principles ( APPs ), which provides relative information to businesses in relation to the collection, disclosure,

More information

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Cybersecurity Landscape Major Data Breaches (e.g., OPM, IRS) Data Breach Notification Laws Directors Derivative Suits Federal Legislation

More information

Identity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation

Identity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation Booz Allen Hamilton Proprietary 1 Conference Presentation Identity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation Kris O Neal Dan Steinberg Harvard Privacy Symposium August

More information

Best Practices for Campus Security. January 26, 2017

Best Practices for Campus Security. January 26, 2017 Best Practices for Campus Security January 26, 2017 Welcome to Safe University (Safe U ) Protecting People, Property, and Tradition: The Safe University (Safe U SM ) Program By G. Michael Verden, Owner

More information

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045 Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that

More information

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN

More information

IMO MEASURES TO ENHANCE MARITIME SECURITY. Outcome of the 2002 SOLAS conference. Information on the current work of the ILO

IMO MEASURES TO ENHANCE MARITIME SECURITY. Outcome of the 2002 SOLAS conference. Information on the current work of the ILO INTERNATIONAL MARITIME ORGANIZATION E IMO MARITIME SAFETY COMMITTEE 77th session Agenda item 6 MSC 77/6/9 20 March 2003 Original: ENGLISH MEASURES TO ENHANCE MARITIME SECURITY Outcome of the 2002 SOLAS

More information

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information