You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.

Slides:



Advertisements
Similar presentations
FREEDOM OF INFORMATION EXECUTIVE BRIEFING PART II.
Advertisements

PRIVACY ACT OF 1974 OVERVIEW. FAIR INFORMATION PRACTICES The Privacy Act is primarily concerned with fair information practices. The Privacy Act is primarily.
Overview of the Privacy Act
National Cancer Institute Cancer Therapy Evaluation Program (CTEP) presents: How to Obtain Protected Health Information (PHI) from an Outside Healthcare.
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Chapter #11-Acquisition, Use & Dissemination of Information.
FAR P ART 24. This part prescribes policies and procedures that apply requirements of the Privacy Act of 1974 (5 U.S.C. 552a) (the Act) and OMB Circular.
Service Provider Title VI Training Civil Rights Act of 1964 Presented By: Tennessee Department of Intellectual and Developmental Disabilities.
US Department of Defense Warning Statement
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Conversation on the Chemical Facility Anti-Terrorism Standards (CFATS) and Critical Infrastructure Protection Chemical-Terrorism Vulnerability Information.
PA/FOIA INTERFACE OSD/JS Privacy Office (703)
 Freedom of Information Act General Background. Access to Army Records. Exemptions. Exclusions. Procedural Rules for Processing FOIA Requests for Army.
Congress and Contractor Personal Conflicts of Interest May 21, 2008 Jon Etherton Etherton and Associates, Inc.
Code of Federal Regulations Title 42, Chapter 1, Subchapter A Part 2 – CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENTS BRYANT D. MILLER CAC II, MAC,
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
Data Classification & Privacy Inventory Workshop
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 17 Administrativ e Law.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Towards a Freedom of Information Law in Qatar Fahad bin Mohammed Al Attiya Executive Chairman, Qatar National Food Security Programme.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Per Anders Eriksson
The Privacy Act of 1974: An Introduction The Privacy Act of 1974: An Introduction September 2010 For Official Use Only 0.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Use Policies Deputy Attorney General Robert Morgester
Environmental Compliance Assistance Workshop for Colleges and Universities September 13-14, 2005 Chapel Hill, NC.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Headquarters U. S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters Air Force FOIA Exemptions Brief Della Macias HAF/IMII.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
The right item, right place, right time. Privacy Act 101 Privacy Awareness Training AUDIENCE: DLA Workforce Annually (Civilian employees, Military members,
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Chapter 43 Administrative Law and Regulatory Agencies
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Staff Development Module Click Here to Begin. Legal questions often arise in the education field. This module has been developed to introduce you to some.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
School District Records Lindsay Hale David Wheelus Assistant Attorneys General Open Records Division Views expressed are those of the presenter, do not.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
HIPAA Privacy Rule Implementation Status Report Richard M. Campanelli, J.D. Director, Office for Civil Rights Before the The Tenth National HIPAA Summit.
Privacy Act United States Army (Managerial Training)
FREEDOM of INFORMATION CHAPTER 9
1 The Public Interest Disclosure (Whistleblower Protection) Act.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
Indiana’s Public Access Laws Heather Willis Neal Indiana Public Access Counselor Indiana Association of Cities and Towns Red Flag and Sunshine Workshop.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Freedom of Information Act: Protecting your Information from Public Disclosure Ryan K. Manger.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Nassau Association of School Technologists
Surveillance around the world
Obligations of Educational Agencies: Parents’ Bill of Rights
An Introduction to Public Records Office of the General Counsel
Army FOIA/Privacy/Records Management Conference
Linda M. Chatwin, Esq. RAC Business Manager, UL LLC
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Chapter 43 Administrative Law and Regulatory Agencies
Presentation transcript:

You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: - The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. - At any time, the USG may inspect and seize data stored on this IS. - Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. - This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. - Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. Defense Industrial Base (DIB) Cyber Security/ Information Assurance (CS/IA) Program AgreeDisagree DoD Consent Banner 1

Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program Privacy Statement Authorities: 10 U.S.C. 2224, 44 U.S.C. 3544, HSPD 7, DoDD , DoDD E, DoDI , and DoDI Purpose: Administrative management of the DIB CS/IA Program’s information sharing activities. Personal information is covered by OSD SORN DCIO 01, Defense Industrial Base (DIB) Cyber Security/Information Assurance Records. Routine Use(s): The DoD Blanket Routine Uses found at apply to this collection. Of those blanket routine uses, we anticipate the following two would most likely be used: DoD Blanket Routine Use 01 (Law Enforcement Routine Use). If a system of records maintained by a DoD Component to carry out its functions indicates a violation or potential violation of law, whether civil, criminal, or regulatory in nature, and whether arising by general statute or by regulation, rule or order issued pursuant thereto, the relevant records in the system of records may be referred, as a routine use, to the agency concerned, whether federal, state, local, or foreign charged with the responsibility of investigating or prosecuting such violation or charged with enforcing or implementing the statute, rule, regulation, or order issued pursuant thereto. DoD Blanket Routine Use 14 (Counterintelligence Purpose Routine Use). A record from a system of records maintained by a DoD Component may be disclosed as a routine use outside the DoD or the U.S. Government for the purpose of counterintelligence activities authorized by U.S. Law or Executive Order or for the purpose of enforcing laws which protect the national security of the United States. Disclosure: Voluntary. However, failure to provide requested information may limit the ability of the DoD to contact the individual or provide other information necessary to facilitate this program. Freedom of Information Act (FOIA). Agency records, which may include qualifying information received from non-federal entities, are subject to request under the Freedom of Information Act (5 U.S.C. 552) (FOIA), which is implemented in the Department of Defense by DoD Directive and DoD Regulation R (see 32 C.F.R. Parts 285 and 286, respectively). Pursuant to established procedures and applicable regulations, the Government will protect sensitive nonpublic information under this Program against unauthorized public disclosure by asserting applicable FOIA exemptions, and will inform the non-Government source or submitter (e.g., DIB participants) of any such information that may be subject to release in response to a FOIA request, to permit the source or submitter to support the withholding of such information or pursue any other available legal remedies. Defense Industrial Base (DIB) Cyber Security/ Information Assurance (CS/IA) Program AgreeDisagree DoD Privacy Notice 2

Defense Industrial Base (DIB) Cyber Security/ Information Assurance (CS/IA) Program Company RegistrationDocument Library Company Application Process Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program *=Required Field SaveCancel Submit I certify that the information provided is accurate to the best of my knowledge. I understand that DoD will confirm the accuracy of the information, including with my company and the Defense Security Service. Application Screen: Company Information Tab Company Name*: ________ CAGE Code*: ____________ Street 1*: _______________ Street 2: ________________ City*: __________________ State*: _________________ ZIP Code*: ______________ Phone: _________________ FAX: ___________________ Additional Information: ____ Company Company Representative CEOAdditional POCsCIOCISO Select Company tab 3

Defense Industrial Base (DIB) Cyber Security/ Information Assurance (CS/IA) Program Company RegistrationDocument Library Company Application Process Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program *=Required Field SaveCancel Submit I certify that the information provided is accurate to the best of my knowledge. I understand that DoD will confirm the accuracy of the information, including with my company and the Defense Security Service. Application Screen: Company Representative Tab First Name*: ___________ Middle Initial: __________ Last Name*: ___________ Title*: ________________ Work Street 1*: ________ Street 2: ______________ Work City*: ___________ Work State*: __________ Work ZIP Code*: _______ Work Phone: __________ Work FAX: ____________ Work *: __________ U.S. Citizen: Yes/No Security Clearance: Yes/No Company Company Representative CEOAdditional POCsCIOCISO Select Company Rep tab Please provide your contact information as the Company Representative for the application process. 4

Defense Industrial Base (DIB) Cyber Security/ Information Assurance (CS/IA) Program Company RegistrationDocument Library Company Application Process Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program *=Required Field SaveCancel Submit I certify that the information provided is accurate to the best of my knowledge. I understand that DoD will confirm the accuracy of the information, including with my company and the Defense Security Service. Application Screen: Company Chief Executive Officer (CEO) Tab CEO Name*: ___________ (or equivalent) Title*: ________________ Work Phone: __________ Work *: __________ EA Name: _____________ EA Phone: _____________ EA ______________ Company Company Representative CEOAdditional POCsCIOCISO Select CEO tab 5

Defense Industrial Base (DIB) Cyber Security/ Information Assurance (CS/IA) Program Company RegistrationDocument Library Company Application Process Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program *=Required Field SaveCancel Submit I certify that the information provided is accurate to the best of my knowledge. I understand that DoD will confirm the accuracy of the information, including with my company and the Defense Security Service. Application Screen: Company Chief Information Officer (CIO) Tab Company Company Representative CEOAdditional POCsCIOCISO Select CIO tab CIO Name*: ___________ (or equivalent) Title*: ________________ Work Street 1*: ________ Street 2: ______________ Work City*: ___________ Work State*: __________ Work ZIP Code*: ________ Work Phone*: __________ Work *: __________ EA Name: _____________ EA Phone: _____________ EA ______________ 6

Defense Industrial Base (DIB) Cyber Security/ Information Assurance (CS/IA) Program Company RegistrationDocument Library Company Application Process Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program *=Required Field SaveCancel Submit I certify that the information provided is accurate to the best of my knowledge. I understand that DoD will confirm the accuracy of the information, including with my company and the Defense Security Service. Application Screen: Company Chief Information Security Officer (CISO) Tab Company Company Representative CEOAdditional POCsCIOCISO Select CISO tab CISO Name*: ___________ (or equivalent) Title*: ________________ Work Street 1*: ________ Street 2: ______________ Work City*: ___________ Work State*: __________ Work ZIP Code*: ________ Work Phone*: __________ Work *: __________ EA Name: _____________ EA Phone: _____________ EA ______________ 7

Defense Industrial Base (DIB) Cyber Security/ Information Assurance (CS/IA) Program Company RegistrationDocument Library Company Application Process Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program *=Required Field SaveCancel Submit I certify that the information provided is accurate to the best of my knowledge. I understand that DoD will confirm the accuracy of the information, including with my company and the Defense Security Service. Application Screen: Company Additional POCs Tab Company Company Representative CEOAdditional POCsCIOCISO Select Additional POCs tab Chief Privacy Officer Name*: _____________ (or equivalent) Chief Privacy Officer Title*: _______________ Chief Privacy Officer *: ______________  Not applicable General Counsel Representative Name*: ____ General Counsel Representative Title*: _____ General Counsel Representative *: ____ Corporate Security Officer or Facility Security Officer (CSO/FSO) Name*: _______________ CSO/FSO Title*: ________________________ CSO/FSO *: _______________________ 8

Defense Industrial Base (DIB) Cyber Security/ Information Assurance (CS/IA) Program Company RegistrationDocument Library Company Application Process Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program *=Required Field SaveCancel Submit I certify that the information provided is accurate to the best of my knowledge. I understand that DoD will confirm the accuracy of the information, including with my company and the Defense Security Service. Application Screen: Company Additional POCs Tab Company Company Representative CEO Additional POCs (continued) CIOCISO Select Additional POCs tab Administrative Policy Name: _____________Name: ___________ Title: ______________Title: _____________ _____________ ____________U.S. Citizen: Y/NClearance: Y/N Technical Name: _____________ Title: ______________ _____________ U.S. Citizen: Y/N Clearance: Y/N Authorized Incident Report Submitters Name: ___________ Title: _____________ ____________ U.S. Citizen: Y/N Clearance: Y/N  Click here to add another POC. 9