These forms are used in administering the security classification programs in Government. The following three cover sheets are placed on top of documents to clearly identify the classification level of the document and protect classified information from inadvertent disclosure. The following are placed on various forms of U. Government property i. CDs, diskettes, computers, etc.
|Published (Last):||25 June 2015|
|PDF File Size:||13.75 Mb|
|ePub File Size:||2.71 Mb|
|Price:||Free* [*Free Regsitration Required]|
Department of the Navy Breach Response Plan. View More. DoD Breach Response Plan. Improving Critical Infrastructure Cybersecurity. Processing of Electronic Storage Media for Disposal. Safeguarding Personally Identifiable Information. Navy Collaboration Tools Available.
Fight Back Against Illegal Robocalls. Renting a Car? Five Ways to be Cyber Secure at Work. For Military, Identity Protection is a Must. Don't Get Caught by Spear Phishing.
Elements of a Good Privacy Program. Web 2. Using Shredders Versus Shredder Services. Action Steps for Identity Theft Victims.
Information Privacy Professional Certification Available. Department of the Navy Annual Privacy Training. Contractor Privacy Responsibilities. Featured Articles: Oct - Dec Featured Articles: July - Sept Federal Acquisition Regulation - Privacy Training.
Featured Articles: Jan - Mar Privacy Training and Compliance Resources. Privacy Impact Assessment Resources. United States Breach Notification Laws.
Blanket Purchase Agreements for Identity Monitoring. Increasing Privacy Awareness? Consider a Command-Wide Stand Down. Personally Identifiable Information Posters. Setting Email Encryption as Your Default.
Privacy Act System of Records Notices. Recommended Facebook Privacy Settings. Email Alert Signup. Audit Readiness of IT Systems 3. NGEN Awards DON Enterprise Architecture Information Assurance NMCI Business Case Analysis Enterprise Licensing Agreements Information Sharing Open Source 2. CIO Authorities Enterprise Services IT Asset Management Personal Electronic Device Civil Liberties Enterprise Software Initiative IT Efficiencies Clinger-Cohen Act Compliance FISMA 4.
IT Expenditure Approval Authority Privacy Cloud Computing IT Governance Public Key Infrastructure Common Access Card 6. Freedom of Information Act IT Infrastructure Records Management Cybersecurity Functional Area Manager 6. IT Investment Management Section 9. GIG Standards IT Portfolio Management 1. Social Media Governance Knowledge Management Spectrum Data at Rest 5.
Green IT 6. Naval Enterprise Networks Telecommunications Data Center Consolidation Identity Management Naval Networking Environment 8. Wireless Data Strategy Key Documents. Military Service Records. Naval Forms Online. Report a PII Breach. Veterans Crisis Line.
GSA Forms Library