HOME
POLICY & GUIDANCE
NEWS
CONTACT US
RSS FEEDS
Trending
DADMS/DITPR-DON
Cybersecurity
Privacy
IA
BROWSE ALL TOPICS
Audit Readiness of IT Systems (0)
DIACAP (12)
Information Sharing (48)
Open Source (3)
Awards (35)
DON Enterprise Architecture (49)
IT Asset Management (20)
Performance Measurement (2)
Business Case Analysis (11)
Enterprise Licensing Agreements (12)
IT Efficiencies (119)
Personal Electronic Device (17)
CIO Authorities (56)
Enterprise Services (35)
IT Expenditure Approval Authority (12)
Printing and Imaging (Copiers/MFDs) (17)
Civil Liberties (21)
Enterprise Software Initiative (32)
IT Governance (48)
Privacy (257)
Clinger-Cohen Act Compliance (25)
FISMA (11)
IT Infrastructure (17)
Public Key Infrastructure (19)
Cloud Computing (21)
Forms/Reports (14)
IT Investment Management (77)
Records Management (38)
Common Access Card (9)
Freedom of Information Act (27)
IT Portfolio Management (1)
Section 508 (10)
Cybersecurity (240)
Functional Area Manager (9)
Knowledge Management (34)
Social Media (31)
Cyberspace/IT Workforce (34)
GIG Standards (20)
Naval Enterprise Networks (38)
Spectrum (56)
DADMS/DITPR-DON (42)
Green IT (10)
Naval Networking Environment (12)
Statutory & Regulatory Compliance (11)
Data at Rest (10)
Identity Management (112)
NGEN (18)
Telecommunications (62)
Data Center Consolidation (37)
IM/IT Strategy (44)
NMCI (27)
Wireless (65)
Data Strategy (12)
Information Assurance (63)
Print
Email
Other Privacy Act Resources
By DON CIO Privacy Team - Published, September 15, 2010
The following additional resources are provided:
NARA General Records Schedule 14 - Information Services Records (Records and Retention Periods)
DON FOIA Office Home Page
E-Government Act of 2002
Federal Information Security Management Act of 2002
Standard Navy Distribution List (SNDL) OPNAVNOTE 5400
DON Navy Records Management Manual SECNAV M-5210.1 November 2007 (rev)
CNO DNS-36 Memorandum, Recall Rosters, 7 Sep 2006
TAGS:
FISMA
,
FOIA
,
IA
,
IDManagement
,
InfoSharing
,
Privacy
Related Policy
DON Implementation of FOIAonline
Processing of Electronic Storage Media for Disposal
Reduction of SSN Use Within DoD
DON FOIA, Privacy and Civil Liberties Programs
DON Public Affairs Policy and Regulations
View More
DITPR-DON Process Guidance v1.0
Department of the Navy Social Security Number Reduction Plan for Forms Phase One
DoD and DON Privacy Impact Assessment Guidance
Updated Plan to Remove Social Security Numbers from DoD Identification Cards
DoD Acceptance and Use of Personal Identity Verification-Interoperable (PIV-I) Credentials
Code of Federal Regulations (32 CFR Part 701)
DON Electronic Signature Policy
DON Social Security Number Reduction Plan for Forms Phase One
Safeguarding Personally Identifiable Information (PII)
Safeguarding Personally Identifiable Information
DON Privacy Impact Assessment Guidance
DoD Privacy Impact Assessment Guidance
Senior Information Assurance Officer Alignment and Responsibilities for Information Assurance and Certification and Accreditation Processes
Web 2.0: Utilizing New Web Tools
Approval of External Public Key Infrastructures
DON Encryption of Sensitive Unclassified Data at Rest Guidance
Safeguarding Personally Identifiable Information from Unauthorized Disclosure
Safeguarding Personally Identifiable Information
Common Access Card Eligibility for Foreign National Personnel
Recall Rosters
Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency IT Investments
Protection of Sensitive Department of Defense Data at Rest on Portable Computing Devices
DoD Implementation Guide for Transitional PIV II SP 800-73 v1
Federal Information Processing Standard 201-1: Personal Identity Verification of Federal Employees and Contractors
National Industrial Security Program Operating Manual
DON Privacy Program
DON Information Assurance Manual
Withholding of Information that Personally Identifies DoD Personnel
DON Privacy Impact Assessment Format Guidance
DON Public Key Infrastructure Implementation Guidance
Policy for a Common Identification Standard for Federal Employees and Contractors
Privacy Act Program Update
DoD Health Information Privacy Regulation
Instructions on Complying with President's Memorandum of May 14, 1998: "Privacy and Personal Information in Federal Records"
Privacy Act of 1974
Related News
Nominations for DON IM/IT Excellence Awards Due Dec. 5
SECNAV M-5000.3 Provides Guidance for Timely Response to Documentary Material Requests
DON CIO Awards Recognize Information Management and Information Technology Excellence
DON CIO Congratulates 2016 DON IM/IT Award Winners
DON to Implement FOIAonline
View More
PII Breach Articles from CHIPS Magazine
Data as a Critical DON Asset
Streamlining DON Business Processes for a More Effective and Efficient Future
DON Digital Signature and Encryption Policy for Emails Containing PII
DON to Migrate to Use of Stronger Cryptographic Algorithms
Steps For Military Personnel to Take to Defend Against ID Theft
Privacy Tips
Rules for Handling PII by DON Contractor Support Personnel
SSNs to be Removed from Government ID Cards
DON SSN Reduction Plan
Unique DoD ID Replaces SSN
Elements of a Good Privacy Program (Part Two)
DoD Memo on PIV-I Credentials Released
Elements of a Good Privacy Program
DON Electronic Signature Policy Released
The Use of Recall Rosters
Top 10 PII Lessons Learned
Compliance Spot Checks Key to Successful Privacy Program
Theft of Storage Media Containing PII
Copier/Printer May Present Information Security Risks
Improper Disposal of HR Documents
Protect Your Personal Information: It's Valuable
Defending Cell Phones and PDAs Against Attack
Reducing the Use of SSNs is Key to Securing PII
Insider Threat
Reduce PII Loss by Proper Disposal/Sanitization of Unclass Equipment
What You Should Know About Identity Theft
Privacy Must be Considered When Using Web 2.0 Tools
Related CHIPS Magazine
Tech Support Companies Using Deceptive Pop-Up Ads to Scare Consumers into Purchasing Unneeded Service
Creating a Smart, Skilled Cybersecurity Workforce
‘Security Fatigue’ Can Cause Computer Users to Feel Hopeless and Act Recklessly, New Study Suggests
Factsheet: National Background Investigations Bureau
DISA Announces Video Series for the National Background Investigation System
View More
Senior Officials: DoD Supports Strong Encryption for Defense, Commercial Security
Transparency Has Place in Intelligence World, DoD Official Says
DARPA: Autonomous Bug-Hunting Bots Will Lead to Improved Cybersecurity
OPM Announces New Chief Information Officer
DoD CIO Issues Information Technology Environment Way Forward
DON Cyberspace (Cyber) IT and Cybersecurity Workforce — Who Are We?
DON IT West and East 2017 Conference Registration Now Open
Download CHIPS Magazine Mobile App!
Kenneth W. Bible, Deputy Director, C4 / Deputy CIO, Headquarters, U.S. Marine Corps
Listen In DON IT Users: DON CIO Rob Foster Discusses Changes for the Cyber IT/Cybersecurity Workforce, Mobility, Cloud Computing, and More
Navigating DoD ITSM Policy
Nominations for DON IM/IT Excellence Awards Due Dec. 5
Privacy Awareness Tips
Safeguarding Your Common Access Cards and Military Identification Cards
Strengthening Privacy Awareness and Protection
Your mobile phone account could be hijacked by an identity thief
Sailors Build Cybersecurity Awareness
SECNAV Revises & Reissues OPNAV Personally Identifiable Information (PII) Breach Reporting Forms
Two New GMT Mobile Apps Released
DON CIO Awards Recognize Information Management and Information Technology Excellence
Q&A with Capt. Michael N. Abreu
Q&A with Cmdr. Damen Hofheinz, OPNAV N2N6BC lead for the JIE/JRSS
Veteran Identity Theft and Online Dating Scams
Privacy or Security in Cyber? Both, NSA Chief Says
Visit or Dial-in to West Coast DON IT Conference
Protect Your Identity During Tax Season
10th Fleet Personnel Selected to Participate in Leadership Development Program
DON IT Conference West Coast 2016 Registration Available Until February 5
NIST Released NIST Interagency Report 8055, Derived Personal Identity Verification Credentials Proof of Concept Research
Modernization of Enterprise Terminal Comes to Diego Garcia
Cybersecurity Is An All-Hands Effort
Avoid Being a Target of Foreign Intelligence
Bring your shades: Cutting-edge nanosatellites, virtual reality technologies take center stage at West 2016
BUPERS Privacy Cadre Works to Safeguard the Privacy of Sailors and Veterans
Changing the DoD Cyberspace Culture
Cybersecurity is an all-hands effort!
DoD SHA-256 Upgrade
DON CIO Congratulates Award Winners
DON IT Conference, East Coast 2016 and USN-USMC Electromagnetic Spectrum Summit Begin April 20
How to Protect Yourself from Medical Identity Theft
Information Security in the Mobile Environment
Medical Technology Cybersecurity — Not Easy, But Not Impossible
Operations Security or Cybersecurity?
Q&A with Rear Adm. Danelle Barrett
Taking Advantage of Learning and Networking Opportunities
Where is the Rickover for Navy Networks?
U.S. Navy History and Week in Review
Like A Weapons System, Don't Make Unauthorized Changes to Navy IT Networks
Cybersecurity While Traveling
What All Hands Need To Do To Protect Against Cyber Threats
Cyber Safety
Recovering from Identity Theft is Easier with a Plan
Combating Cyber Crime
18 Tips to Safeguard Your Mobile Devices, Social Media
Social Media
Cyber Hygiene Personal Social Media Standards of Conduct
October Is National Cyber Security Awareness Month
National Cyber Security Awareness Month
DoD Announces October Cybersecurity Awareness Month
Intelligence Transparency in the IC
Nominations for DON IM/IT Excellence Awards Due Jan. 7, 2016
OPM Launches Verification Website, Updates FAQs Related to Data Breach
Register Now For DON IT Conference, West Coast 2016
See Something? Say Something to Keep the Navy's Network Guarded
Strengthening Cybersecurity Awareness
U.S. Cyber Command Chief Details Plans to Meet Cyberspace Threats
What is "Insider Threat?"
Defense, Intel Leaders: Cybersecurity Priorities are Defense, Deterrence
Pilot Projects to Improve Cybersecurity, Reduce Online Theft
Rogers Discusses NSA Reorganization, National Security Threats
Director of National Intelligence Delivers Statement on Worldwide Cyber Threats before the House Permanent Select Committee on Intelligence
Rogers Outlines Cyber Challenges Facing DoD, U.S.
National Counterintelligence and Security Center Partners with Office of Personnel Management to Assist Personnel Affected by Data Breaches
New ALNAV Regarding OPM Data Breach Notifications and Services Related to Data Breach Two
Hands Off!
NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets
Four Things to Know About Spear Phishing
Rogers: NSA, Cybercom Need Partners to Aid Cybersecurity
DoD CIO Discusses Pentagon Wireless, Mobility Programs
OPM Establishes New, Online Cybersecurity Incident Resource Center
OPM Acts to Protect Federal Workers, Others From Cyber Threats
OPM Announces Steps to Protect Federal Workers and Others From Cyber Threats
A Text Message Mess
Getting calls from your own phone number?
Military, Federal, Private-Sector Partners Key to Cyber Guard 15
SECNAV Opens Dedicated OPM Databreach Website
Actions to Take If Your Personal Information Is Compromised
Cultivating a culture of innovation
Department of the Navy Social Security Number Reduction Plan
DONCEAP Provides ID Theft Assistance
It Can Happen to You: Know the Anatomy of A Cyber Intrusion
Keeping the Fleet Safe through Inclusion, Diversity and Innovation
OPM Data Breach – List of Affected Personnel Grows
OPM, DoD Announce Identity Theft Protection and Credit Monitoring Contract
Who is Trying to be You?
You've Been Exposed
OPM Data Breach Reminders
Robert Foster Named New DON CIO
NAVIDFOR Ensures Shipboard Systems Interoperate
OPM Announces Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Data Breach May Impact Federal Employees
DoD’s Classified Mobile Capability Moves Forward
Identity theft is America's fastest-growing crime
DISA Leaders Discuss Agency’s Efforts to Evolve
OPM Data Breach Update
Outsmart Hackers with Two-factor Authentication
Using Money Transfer Services: Beware!
Email from OPM – is it the real deal?
Paying your friends through an app? Read this.
DISA Releases Strategic Plan for 2015-2020
OPM data breach – what should you do?
DoD Notified of OPM Cybersecurity Incident
Delivering a Mobile Classified Communications Suite to the Enterprise
U.S. Coast Guard Lieutenant Qualifies as an Information Dominance Warrior
New DoD Cyber Strategy Nears Release, Official Says
Cyber Hygiene Personal Social Media Standards of Conduct
DoD Warns Troops, Families to be Cyber Crime Smart
Four Things to Know about Operations Security and Your Privacy
Identity Thieves Caught in the Act
Intelligence Transparency
Personnel Now Permitted to Use Navy-Issued Mobile Devices for Personal Use
Seeing the Forest Through the Trees
The Standards of Conduct as Applied to Personal Social Media Use
DoD to Boost Modernization of Weapons, Capabilities
Automated Inventory Avoids Costs, Reduces Inventory Time for Logisticians
U.S. Navy History and Week in Review
DARPA Hones Skills of Future Cyber Officers
New Threat Center to Integrate Cyber Intelligence
Rear Adm. Kohler Engages with IDC Sailors During Visit to Korea
Five Years of Innovation and Operational Excellence
DON IT Conference Final Preparations Complete
U.S. Fleet Cyber Command Celebrating 5 years of Operations
Operating the Future of Worldwide Mobile Satellite Communications
Lift-off, Signal Acquired for Navy Communications Satellite
MUOS-3 Launched — Mission Success!
DON IT Conference Schedule Now Available
DISA Continues to Advance Enterprise Services
Enterprise IT Solutions and Flexibility at the Tactical Edge
General Dominance Theory: A Better Way to Achieve Information Dominance
JIE Brings Capabilities Focused on Improving Joint Cybersecurity
Navy Reserve — Ready, Innovative, Agile
Navy’s Jump Start on Cybersecurity Readiness
NCTAMS LANT — Assured Communications to the Fleet — by a Highly Motivated Workforce
Q&A with Supreme Allied Commander Transformation (SACT)
Salute to DON Innovators
Nominations for DON IM/IT Excellence Awards Due Jan. 7
CNO Visits US Fleet Cyber Command, Presents Navy Unit Commendation Award
CYBERCOM Chief Details U.S. Cyber Threats
Joint Staff J6 Civilian Receives Top DoD Service Award
DoD Advances Information Technology to Lower Costs
'Chip and PIN' Credit Cards Coming to DoD Travelers
Related Resources
Personally Identifiable Information Posters
2014 PII Brief
Privacy Act/FOIA Interface
Privacy Act System of Records Notices
Inventory of DON Systems With Completed Privacy Impact Assessments
View More
2012 Social Security Number Reduction Brief
Privacy Frequently Asked Questions
Justification For The Use Of The SSN
Safe Access File Exchange
Privacy Resources
Privacy Briefs
Publically Accessible Website Privacy Resources (including Official DON Social Networking Sites)
How to Find Your DoD ID Number
Unique Investment Identifiers for FY2013
Digitally Signing and Encrypting Email Containing PII Brief
Safeguarding PII
Recommended Facebook Privacy Settings
SSN Reduction Plan Resources
Privacy Training and Compliance Resources
SSN Reduction Frequently Asked Questions
How and When to Write a Privacy Act Statement
Privacy Act Resources
Fair Information Practices
Guidelines for Establishing a New Privacy Act System of Records Notice
Identifying Privacy Act Systems of Records You May Be Using
How to Obtain Copies of Military Personnel Records
Privacy Act Exemptions
Sample Checklist for Conducting Privacy Act Assessment/Staff Visits
DoD Privacy Program Resources
How to Make a Privacy Act Request
Instructions for Using WinZip to Encrypt Files
Overview of the Privacy Act of 1974 (2012 Edition)
PEO EIS Portal Procedures for Safeguarding PII
Privacy Act Desk Reference Guide
Privacy-Related OMB Memoranda
Disclosure Accounting Form (OPNAV 5211/9 (MAR 1992))
General Purpose Privacy Act Statement (OPNAV FORM 5211/12)
DON SSN Reduction Review Form SECNAV 5213/1 (Jul 2010)
Department of Defense SORN Training Materials
Methods for Hard Drive/Disk Destruction
Acceptable Use Criteria for Systems Collecting SSNs
Privacy Recommended Reading List
2012 Identity Theft Brief
2012 Privacy Impact Assessment (PIA) Brief
Privacy Impact Assessment Signature Routing Guidance
OMB Information Collection Number
Privacy Impact Assessment Resources
Privacy Impact Assessment Template "Gouge"
Privacy Impact Assessment Template Risk Mitigation Question Responses
Take the DON Privacy Quiz!
PII Breach Reporting Resources
Privacy Information and Resources
Potential Consequences for Failing to Safeguard PII
Related Industry News
New Pentagon Website Can Tell If You Were Hacked by China
Nextgov