HOME
POLICY & GUIDANCE
NEWS
CONTACT US
RSS FEEDS
Trending
DADMS/DITPR-DON
Cybersecurity
Privacy
IA
BROWSE ALL TOPICS
Audit Readiness of IT Systems (0)
DIACAP (12)
Information Sharing (48)
Open Source (3)
Awards (35)
DON Enterprise Architecture (49)
IT Asset Management (20)
Performance Measurement (2)
Business Case Analysis (11)
Enterprise Licensing Agreements (12)
IT Efficiencies (119)
Personal Electronic Device (18)
CIO Authorities (57)
Enterprise Services (35)
IT Expenditure Approval Authority (12)
Printing and Imaging (Copiers/MFDs) (17)
Civil Liberties (21)
Enterprise Software Initiative (32)
IT Governance (48)
Privacy (261)
Clinger-Cohen Act Compliance (25)
FISMA (11)
IT Infrastructure (17)
Public Key Infrastructure (19)
Cloud Computing (21)
Forms/Reports (14)
IT Investment Management (77)
Records Management (38)
Common Access Card (9)
Freedom of Information Act (26)
IT Portfolio Management (1)
Section 508 (10)
Cybersecurity (243)
Functional Area Manager (9)
Knowledge Management (34)
Social Media (33)
Cyberspace/IT Workforce (35)
GIG Standards (20)
Naval Enterprise Networks (38)
Spectrum (57)
DADMS/DITPR-DON (42)
Green IT (10)
Naval Networking Environment (12)
Statutory & Regulatory Compliance (11)
Data at Rest (10)
Identity Management (113)
NGEN (18)
Telecommunications (63)
Data Center Consolidation (37)
IM/IT Strategy (44)
NMCI (27)
Wireless (66)
Data Strategy (12)
Information Assurance (63)
Print
Email
Blanket Purchase Agreements for Identity Monitoring
Published, July 11, 2016
The following list provides resources for Blanket Purchase Agreements for Identity Monitoring.
GSA Awards BPAs for Identity Monitoring, Data Breach Response and Protection Services
OMB M-16-14: Providing Comprehensive Identity Protection Services, Identity Monitoring, and Data Breach Response
Available BPA Options and Associated Prices (as of Nov 2016)
TAGS:
Privacy
Related Policy
Providing Comprehensive Identity Protection Services, Identity Monitoring, and Data Breach Response
Federal Acquisition Regulation; Basic Safeguarding of Contractor Information Systems
DON Revision of PII Breach Reporting Forms
Use of Best Judgment for Individual PII Breach Notification Determinations
DoD Component Responsibility to Ensure Government Contract Compliance with the Privacy Act
View More
Use of the Electronic Data Interchange Person Identifier for Identification in the Military Drug Testing Program
Unauthorized Disclosures of Classified Information or Controlled Unclassified Information on DoD Information Systems
Personally Identifiable Information, Protected Health Information, and Federal Information Requirements
DON Implementation of FOIAonline
DON PIA Guidance
Improving Critical Infrastructure Cybersecurity
DON Fax Policy
Guidelines for Media Sanitization: Recommendations of the National Institute of Standards and Technology
Processing of Electronic Storage Media for Disposal
Reduction of SSN Use Within DoD
DoD Civil Liberties Program
DoD Civil Liberties Program
DON FOIA, Privacy and Civil Liberties Programs
DON Public Affairs Policy and Regulations
DON SSN Reduction Plan Phase Three
DITPR-DON Process Guidance v1.0
Department of the Navy Social Security Number Reduction Plan for Forms Phase One
DoD and DON Privacy Impact Assessment Guidance
Updated Plan to Remove Social Security Numbers from DoD Identification Cards
Code of Federal Regulations (32 CFR Part 701)
DON Social Security Number Reduction Plan for Forms Phase One
Safeguarding Personally Identifiable Information (PII)
Safeguarding Personally Identifiable Information
Safeguarding Personally Identifiable Information
DON Privacy Program and Appointment of the Senior Military Component Official for Privacy
DON Privacy Impact Assessment Guidance
DoD Privacy Impact Assessment Guidance
DON Enterprise Data At Rest Solution For All Non-NMCI Assets
DON Personally Identifiable Information Training Requirement
Protecting Personally Identifiable Information on DON Shared Drives and Application Based Portals
Web 2.0: Utilizing New Web Tools
DON Policy Updates for Personal Electronic Devices Security and Application of Email Signature and Encryption
Approval of External Public Key Infrastructures
Loss of Personally Identifiable Information Reporting Process
DON Encryption of Sensitive Unclassified Data at Rest Guidance
DON Personally Identifiable Information Annual Training Policy
Privacy and Civil Liberties
Safeguarding Personally Identifiable Information from Unauthorized Disclosure
Safeguarding Personally Identifiable Information
Common Access Card Eligibility for Foreign National Personnel
Recall Rosters
Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency IT Investments
DoD and DON Privacy Impact Assessment Guidance
Protection of Sensitive Department of Defense Data at Rest on Portable Computing Devices
DoD Implementation Guide for Transitional PIV II SP 800-73 v1
Federal Information Processing Standard 201-1: Personal Identity Verification of Federal Employees and Contractors
National Industrial Security Program Operating Manual
DON Privacy Program
DoD Compliance with Electronic Biometric Transmission Specification
Withholding of Information that Personally Identifies DoD Personnel
DON Privacy Impact Assessment Format Guidance
DON Public Key Infrastructure Implementation Guidance
Policy for a Common Identification Standard for Federal Employees and Contractors
Privacy Act Program Update
DoD Health Information Privacy Regulation
Instructions on Complying with President's Memorandum of May 14, 1998: "Privacy and Personal Information in Federal Records"
Privacy Act of 1974
Related News
DON IM/IT Excellence Awards Nominations Due Dec. 5
How to Obtain Military Personnel, Health, and Award Records
Privacy Tips
Register for DON IT East and West 2017
PII Breach Articles from CHIPS Magazine
View More
Strengthening the DON’s Cybersecurity Posture
Strengthening Privacy Awareness and Protection
SECNAV M-5000.3 Provides Guidance for Timely Response to Documentary Material Requests
Navy Mobile Apps Bring Information and Training to Your Smartphone and Tablet
DON CIO Awards Recognize Information Management and Information Technology Excellence
DON IT Conference Presentations Available
DON CIO Congratulates 2016 DON IM/IT Award Winners
SSN Reduction Related Articles from CHIPS Magazine
Protect Your Identity During Tax Season
Taking Advantage of Learning and Networking Opportunities
OPM Opens Verification Center for Cyber Breach Incidents
How to Protect Yourself from Medical Identity Theft
Four Things to Know About Spear Phishing
Comprehensive Identity Theft Support Provided by the DONCEAP
OPM Data Breach Information
GSA Awards BPAs for Identity Monitoring, Data Breach Response and Protection Services
Customize Your Email to Make Signing/Encrypting Messages Easier
The Time for Digital Spring Cleaning is Now!
Secure Your Social Media Presence
Using Blind Copy Feature Protects PII
No Loss of PII Reported in OPM Network Breach
Take Action If Your Personal Information Is Compromised
For Military, Identity Protection is a Must
Pentagon Visitor's Entrance Tightens Protection of SSNs
Don't Get Hooked By Spear Phishing
Correct PII Breach Procedures
Protect PII on Social Media
Don't Get Caught by Spear Phishing
DON Makes Progress With Budget Cuts; Savings Initiative Continues
DoD ID Number Authorized as Substitute for SSN
DON Revises Fax Policy on Transmitting PII
Which Paper Shredder Should I Use?
A Landfill is No Place for PII
Data as a Critical DON Asset
Business IT Transformation Town Hall Transcript Available
Encrypting Email Containing PII
Streamlining DON Business Processes for a More Effective and Efficient Future
Message From the DON CIO: Keeping PII and PHI Secure
Sailor Stores PII in Commercial Facility; Fails to Pay Bill
SSN Reduction Plan Phase 1 and 2 Results
Supervisor Sends PII Without Encrypting Email
The DON SSN Reduction Plan Continues
Report Your Breaches
Website Question Leads to a Strengthened Privacy Process
DON Digital Signature and Encryption Policy for Emails Containing PII
Contractor Improperly Handles PII
DON Employee Challenges Use of Unauthorized DoD "Form"
Steps For Military Personnel to Take to Defend Against ID Theft
Rules for Handling PII by DON Contractor Support Personnel
SSNs to be Removed from Government ID Cards
DONCAF Reduces SSN Use
To Err is Human: Human Error is Main Cause of PII Breaches
DON SSN Reduction Plan
Unique DoD ID Replaces SSN
Elements of a Good Privacy Program (Part Two)
Elements of a Good Privacy Program
The Use of Recall Rosters
Top 10 PII Lessons Learned
Web Portals and Shared Drives Must Be Continually Monitored
Your Office Copier/Printer May Present Information Security Risks
Protecting PII on Removable Storage Devices
Compliance Spot Checks Key to Successful Privacy Program
Theft of Storage Media Containing PII
Web 2.0: Federal CIO Council Releases Guidelines for Secure Use of Social Media
PII and Records Management
Copier/Printer May Present Information Security Risks
Using Shredders Versus Shredder Services
Improper Disposal of HR Documents
Protect Your Personal Information: It's Valuable
Defending Cell Phones and PDAs Against Attack
Un-Encrypted Email With NSPS Information
Reducing the Use of SSNs is Key to Securing PII
Insider Threat
DON Enterprise Data At Rest Solution For All Non-NMCI Assets Is Awarded
Reduce PII Loss by Proper Disposal/Sanitization of Unclass Equipment
Action Steps for Identity Theft Victims
What You Should Know About Identity Theft
Privacy Must be Considered When Using Web 2.0 Tools
Laptop Security
GSA Awards BPA for Credit Monitoring Services
Safeguarding PII on the Command Shared Drive
Reduce PII in Electronic and Paper Files
Why Peer-to-Peer File Sharing Is Not a Good Idea
Handbook Provides Cyber Crime Prevention Tips
Guidance Updated for DAR Compliance Effort on Non-NMCI Networks
Don't Get Caught by Phishing
Secure Those Laptops
Information Privacy Professional Certification Available
PII Has No Shelf Life
Use Caution With Wi-Fi
Web Site Postings of PII
Related Resources
Privacy Briefs
Contractor Privacy Responsibilities
Quickstep Process for Marking Emails Containing PII
Email and PII
Safeguarding Your Common Access Cards and Military Identification Cards
View More
DoD and DON Issuances and Forms
DoD and DON Forms
Accessing Your Health Information
Federal Trade Commission Privacy and Identity Theft Resources
Increasing Privacy Awareness? Consider a Command-Wide Stand Down
Guide to Keeping Your Social Media Accounts Secure
Personally Identifiable Information Posters
PII Resources for Commanders
Rob Foster, Department of the Navy Chief Information Officer
OPM Data Breach - HQMC C4 CY Division Guidance
How to Remove Your PII From Public Websites
Identity Theft and Your Social Security Number
Setting Email Encryption as Your Default
The DoD ID Number as PII
2014 PII Brief
Privacy Act/FOIA Interface
"No PII" Placard for Use on Dumpsters and Recycle Bins
Your Military ID and Civilian Health Care Providers: Copying Military ID Cards
Protected Health Information
Privacy Act System of Records Notices
DON Users Guide to Personally Identifiable Information
Inventory of DON Systems With Completed Privacy Impact Assessments
Messages From the DON CIO
2012 Social Security Number Reduction Brief
Encrypting Emails Containing PII FAQs
Identity Theft FAQs
Laptops and Portable Devices FAQs
PII Breach Reporting FAQs
Privacy Frequently Asked Questions
Privacy Impact Assessments (PIAs) FAQs
Privacy Training FAQs
Justification For The Use Of The SSN
PII Annual Training Certificate
Safe Access File Exchange
Privacy and Personally Identifiable Information Awareness Training
PII Refresher Training Scenarios
Privacy Resources
Process for Substituting the DoD ID Number for the SSN in IT Systems
Privacy Resources for Military Members and Their Families
Publically Accessible Website Privacy Resources (including Official DON Social Networking Sites)
How to Find Your DoD ID Number
Unique Investment Identifiers for FY2013
Digitally Signing and Encrypting Email Containing PII Brief
Safeguarding PII
Department of the Navy Personally Identifiable Information Sample Compliance Spot Checklist
Sample Social Security Number Elimination Plan
Privacy Complaint Process
Recommended Facebook Privacy Settings
SSN Reduction Plan Resources
DON Social Security Number Reduction Plan for IT Systems Phase Two
IT System SSN Reduction Review Process
What is Personally Identifiable Information?
IT System SSN Reduction Response Matrix
Justification Memo for the Continued Collection of the SSN
Privacy Act Data Cover Sheet
Privacy Training and Compliance Resources
Privacy Act Training
SSN Reduction Frequently Asked Questions
How and When to Write a Privacy Act Statement
Privacy Act Resources
Fair Information Practices
Guidelines for Establishing a New Privacy Act System of Records Notice
Identifying Privacy Act Systems of Records You May Be Using
How to Obtain Military Personnel, Health, and Award Records
Privacy Act Exemptions
Sample Checklist for Conducting Privacy Act Assessment/Staff Visits
DoD Privacy Program Resources
How to Make a Privacy Act Request
Instructions for Using WinZip to Encrypt Files
Other Privacy Act Resources
Overview of the Privacy Act of 1974 (2012 Edition)
PEO EIS Portal Procedures for Safeguarding PII
Privacy Act Desk Reference Guide
Privacy-Related OMB Memoranda
Disclosure Accounting Form (OPNAV 5211/9 (MAR 1992))
General Purpose Privacy Act Statement (OPNAV FORM 5211/12)
DON SSN Reduction Review Form SECNAV 5213/1 (Jul 2010)
Department of Defense SORN Training Materials
Hard Drive Disposal Resources
Methods for Hard Drive/Disk Destruction
Acceptable Use Criteria for Systems Collecting SSNs
Privacy Recommended Reading List
2012 Identity Theft Brief
2012 Privacy Impact Assessment (PIA) Brief
Privacy Impact Assessment Signature Routing Guidance
OMB Information Collection Number
Privacy Impact Assessment Resources
Privacy Impact Assessment Template "Gouge"
Privacy Impact Assessment Template Risk Mitigation Question Responses
Take the DON Privacy Quiz!
PII Breach Reporting Resources
BUPERS Safeguarding PII Presentation
Privacy Information and Resources
DoD Privacy Impact Assessment Template
Reporting PII Breach Notifications
Potential Consequences for Failing to Safeguard PII
DON Cyber Crime Handbook