HOME
POLICY & GUIDANCE
NEWS
CONTACT US
RSS FEEDS
Trending
DADMS/DITPR-DON
Cybersecurity
Privacy
IA
BROWSE ALL TOPICS
Audit Readiness of IT Systems (0)
DIACAP (12)
Information Sharing (48)
Open Source (3)
Awards (35)
DON Enterprise Architecture (49)
IT Asset Management (20)
Performance Measurement (2)
Business Case Analysis (11)
Enterprise Licensing Agreements (12)
IT Efficiencies (119)
Personal Electronic Device (18)
CIO Authorities (57)
Enterprise Services (35)
IT Expenditure Approval Authority (12)
Printing and Imaging (Copiers/MFDs) (17)
Civil Liberties (21)
Enterprise Software Initiative (32)
IT Governance (48)
Privacy (261)
Clinger-Cohen Act Compliance (25)
FISMA (11)
IT Infrastructure (17)
Public Key Infrastructure (19)
Cloud Computing (21)
Forms/Reports (14)
IT Investment Management (77)
Records Management (38)
Common Access Card (9)
Freedom of Information Act (26)
IT Portfolio Management (1)
Section 508 (10)
Cybersecurity (243)
Functional Area Manager (9)
Knowledge Management (34)
Social Media (33)
Cyberspace/IT Workforce (35)
GIG Standards (20)
Naval Enterprise Networks (38)
Spectrum (57)
DADMS/DITPR-DON (42)
Green IT (10)
Naval Networking Environment (12)
Statutory & Regulatory Compliance (11)
Data at Rest (10)
Identity Management (113)
NGEN (18)
Telecommunications (63)
Data Center Consolidation (37)
IM/IT Strategy (44)
NMCI (27)
Wireless (66)
Data Strategy (12)
Information Assurance (63)
DON Public Key Infrastructure Implementation Guidance
DTG 061525Z OCT 04 - Publish Date: 10/08/04
download PDF
This Naval message provides amplifying public key infrastructure implementation guidance.
TAGS:
Cybersecurity
,
IDManagement
,
PKI
,
Privacy
Related Policy
Federal Acquisition Regulation; Basic Safeguarding of Contractor Information Systems
Improving Critical Infrastructure Cybersecurity
Processing of Electronic Storage Media for Disposal
Reduction of SSN Use Within DoD
PKI Interoperability with FVEY Partner Nations on the NIPRNet
View More
DON Public Affairs Policy and Regulations
DITPR-DON Process Guidance v1.0
DON Secure Hash Algorithm Migration
DON Public Key Enablement Waiver Request Process for Unclassified Networks, Private Web Servers, Portals and Web Applications
Updated Plan to Remove Social Security Numbers from DoD Identification Cards
DoD Acceptance and Use of Personal Identity Verification-Interoperable (PIV-I) Credentials
DON Electronic Signature Policy
DON Social Security Number Reduction Plan for Forms Phase One
Safeguarding Personally Identifiable Information (PII)
Safeguarding Personally Identifiable Information
Safeguarding Personally Identifiable Information
Public Key Enablement of DON Unclassified Private Web Servers and Applications
DON Privacy Impact Assessment Guidance
DoD Privacy Impact Assessment Guidance
DON Enterprise Data At Rest Solution For All Non-NMCI Assets
DON Personally Identifiable Information Training Requirement
DON Policy Updates for Use of NIPRNET Public Key Infrastructure Software Certificates
Protecting Personally Identifiable Information on DON Shared Drives and Application Based Portals
Web 2.0: Utilizing New Web Tools
DON Policy Updates for Personal Electronic Devices Security and Application of Email Signature and Encryption
Approval of External Public Key Infrastructures
Public Key Infrastructure Software Certificate Minimization Effort for DON Unclassified Environments
Loss of Personally Identifiable Information Reporting Process
DON Encryption of Sensitive Unclassified Data at Rest Guidance
DON Personally Identifiable Information Annual Training Policy
Safeguarding Personally Identifiable Information from Unauthorized Disclosure
Encryption of Sensitive Unclassified Data at Rest on Mobile Computing Devices and Removable Storage Media
Safeguarding Personally Identifiable Information
Common Access Card Eligibility for Foreign National Personnel
Compliance and Review of Logical Access Control in DoD Processes
Policy for Digital Signature Functionality and Acceptance
Recall Rosters
Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency IT Investments
DoD and DON Privacy Impact Assessment Guidance
DoD-Wide Digital Signature Interoperability
Protection of Sensitive Department of Defense Data at Rest on Portable Computing Devices
DoD Implementation Guide for Transitional PIV II SP 800-73 v1
Federal Information Processing Standard 201-1: Personal Identity Verification of Federal Employees and Contractors
National Industrial Security Program Operating Manual
DON Privacy Program
DoD Compliance with Electronic Biometric Transmission Specification
DON Information Assurance Manual
Withholding of Information that Personally Identifies DoD Personnel
DON Privacy Impact Assessment Format Guidance
Policy for a Common Identification Standard for Federal Employees and Contractors
Privacy Act Program Update
DoD Health Information Privacy Regulation
Instructions on Complying with President's Memorandum of May 14, 1998: "Privacy and Personal Information in Federal Records"
Privacy Act of 1974
Related News
DON IM/IT Excellence Awards Nominations Due Dec. 5
Privacy Tips
Register for DON IT East and West 2017
PII Breach Articles from CHIPS Magazine
Strengthening the DON’s Cybersecurity Posture
View More
DON CIO Awards Recognize Information Management and Information Technology Excellence
DON IT Conference Presentations Available
DON CIO Congratulates 2016 DON IM/IT Award Winners
SSN Reduction Related Articles from CHIPS Magazine
Taking Advantage of Learning and Networking Opportunities
Customize Your Email to Make Signing/Encrypting Messages Easier
The Time for Digital Spring Cleaning is Now!
Secure Your Social Media Presence
Using Blind Copy Feature Protects PII
No Loss of PII Reported in OPM Network Breach
Don't Get Hooked By Spear Phishing
DoD ID Number Authorized as Substitute for SSN
DoD to Cease Issuance of Software PKI Certificates to FVEY Partner Nations
Supervisor Sends PII Without Encrypting Email
DON Digital Signature and Encryption Policy for Emails Containing PII
DON to Migrate to Use of Stronger Cryptographic Algorithms
PKE Waiver Process Is Updated
Steps For Military Personnel to Take to Defend Against ID Theft
Rules for Handling PII by DON Contractor Support Personnel
SSNs to be Removed from Government ID Cards
To Err is Human: Human Error is Main Cause of PII Breaches
DON SSN Reduction Plan
Unique DoD ID Replaces SSN
Elements of a Good Privacy Program (Part Two)
DoD Memo on PIV-I Credentials Released
Elements of a Good Privacy Program
DON Electronic Signature Policy Released
The Use of Recall Rosters
Top 10 PII Lessons Learned
DON Current and Future PKI and PKE Activities
Your Office Copier/Printer May Present Information Security Risks
Identity Management Operations to Improve Cybersecurity
Protecting PII on Removable Storage Devices
Compliance Spot Checks Key to Successful Privacy Program
Theft of Storage Media Containing PII
Web 2.0: Federal CIO Council Releases Guidelines for Secure Use of Social Media
PII and Records Management
Copier/Printer May Present Information Security Risks
Improper Disposal of HR Documents
Protect Your Personal Information: It's Valuable
Defending Cell Phones and PDAs Against Attack
Un-Encrypted Email With NSPS Information
Reducing the Use of SSNs is Key to Securing PII
Insider Threat
DON Enterprise Data At Rest Solution For All Non-NMCI Assets Is Awarded
Reduce PII Loss by Proper Disposal/Sanitization of Unclass Equipment
Action Steps for Identity Theft Victims
What You Should Know About Identity Theft
Privacy Must be Considered When Using Web 2.0 Tools
GSA Awards BPA for Credit Monitoring Services
Safeguarding PII on the Command Shared Drive
Reduce PII in Electronic and Paper Files
Why Peer-to-Peer File Sharing Is Not a Good Idea
Handbook Provides Cyber Crime Prevention Tips
Guidance Updated for DAR Compliance Effort on Non-NMCI Networks
Don't Get Caught by Phishing
Secure Those Laptops
Information Privacy Professional Certification Available
PII Has No Shelf Life
Use Caution With Wi-Fi
Web Site Postings of PII
Related CHIPS Magazine
Ignoring Cybersecurity is Risky Business
Rethinking Cybersecurity from the Inside Out
We Are in the Battlespace Every Single Day
3 Components in the Hunt for Cyber Threats
FTC sues phone scammers who promised free money
View More
How to Create a Secure Password
Federal Trade Commission Fights International Scams
Frank Cable Sailors Recognize Cyber Awareness Month
Protecting Businesses and Consumers from Email Scams
Phony computer techs shut down
Tech Support Companies Using Deceptive Pop-Up Ads to Scare Consumers into Purchasing Unneeded Service
Creating a Smart, Skilled Cybersecurity Workforce
Factsheet: National Background Investigations Bureau
“Why’s Everybody Always Picking on Me?”
BUPERS Continues to Reduce its Use of the SSN
Download CHIPS Magazine Mobile App!
Loss of a Roster Containing Social Security Numbers
Still Using That Same Old Wireless Keyboard At Home?
Strengthening Cybersecurity Awareness
Strengthening the DON’s Cybersecurity Posture
Three Priorities Straight from HQ Marine Corps C4
What is "Insider Threat?"
DISA Announces Video Series for the National Background Investigation System
Senior Officials: DoD Supports Strong Encryption for Defense, Commercial Security
Transparency Has Place in Intelligence World, DoD Official Says
DoD Releases Update of Manual Governing Defense Intelligence Activities
OPM Announces New Chief Information Officer
DoD CIO Issues Information Technology Environment Way Forward
DON Cyberspace (Cyber) IT and Cybersecurity Workforce — Who Are We?
Nominations for DON IM/IT Excellence Awards Due Dec. 5
Online tracking — more than cookies
Privacy Awareness Tips
Protecting Your Privacy
Q&A with Capt. John D. Zimmerman Deputy CIO Naval Sea Systems Command
Q&A with Steve Muck, Director for Privacy and Information Sharing for the DON CIO
Safeguarding Your Common Access Cards and Military Identification Cards
Strengthening Privacy Awareness and Protection
Your mobile phone account could be hijacked by an identity thief
Sailors Build Cybersecurity Awareness
SECNAV Revises & Reissues OPNAV Personally Identifiable Information (PII) Breach Reporting Forms
Mobile Apps Released for Records Management and Personally Identifiable Information
NIST Released the final version of "Best Practices Guide for Personal Identity Verification (PIV)-enabled Privileged Access"
Two New GMT Mobile Apps Released
DON CIO Awards Recognize Information Management and Information Technology Excellence
NIST Releases New Cryptographic Standards and Guidelines Process
Q&A with Capt. Michael N. Abreu
Q&A with Cmdr. Damen Hofheinz, OPNAV N2N6BC lead for the JIE/JRSS
New NIST Security Standard Can Protect Credit Cards, Health Information
Privacy or Security in Cyber? Both, NSA Chief Says
Visit or Dial-in to West Coast DON IT Conference
Protect Your Identity During Tax Season
DON IT Conference West Coast 2016 Registration Available Until February 5
NIST Released NIST Interagency Report 8055, Derived Personal Identity Verification Credentials Proof of Concept Research
Avoid Being a Target of Foreign Intelligence
BUPERS Privacy Cadre Works to Safeguard the Privacy of Sailors and Veterans
Changing the DoD Cyberspace Culture
Cybersecurity is an all-hands effort!
DoD SHA-256 Upgrade
DON CIO Congratulates Award Winners
DON IT Conference, East Coast 2016 and USN-USMC Electromagnetic Spectrum Summit Begin April 20
How to Protect Yourself from Medical Identity Theft
Information Security in the Mobile Environment
Medical Technology Cybersecurity — Not Easy, But Not Impossible
Taking Advantage of Learning and Networking Opportunities
Where is the Rickover for Navy Networks?
U.S. Navy History and Week in Review
NAVSEA Hosts First Cybersecurity Industry Day
Cybersecurity While Traveling
What All Hands Need To Do To Protect Against Cyber Threats
Cyber Safety
Recovering from Identity Theft is Easier with a Plan
Combating Cyber Crime
Social Media
Internal DoD Effort Focuses on Individual Cybersecurity Responsibility
Mobile Security
Cybersecurity Reminders for Government Personnel
Cyber Hygiene Personal Social Media Standards of Conduct
Cybersecurity Tips from the Department of Homeland Security
October Is National Cyber Security Awareness Month
NIST Tackles Email Security with a Two-Faceted Approach
National Cyber Security Awareness Month
DoD Announces October Cybersecurity Awareness Month
Cybersecurity: All Hands on Deck
Identity Fraud Committed by One of Our Own
Nominations for DON IM/IT Excellence Awards Due Jan. 7, 2016
OPM Launches Verification Website, Updates FAQs Related to Data Breach
Q&A with Mr. Rob Foster
Register Now For DON IT Conference, West Coast 2016
Strengthening Cybersecurity Awareness
U.S. Cyber Command Chief Details Plans to Meet Cyberspace Threats
Defense, Intel Leaders: Cybersecurity Priorities are Defense, Deterrence
Pilot Projects to Improve Cybersecurity, Reduce Online Theft
Rogers Outlines Cyber Challenges Facing DoD, U.S.
National Counterintelligence and Security Center Partners with Office of Personnel Management to Assist Personnel Affected by Data Breaches
New ALNAV Regarding OPM Data Breach Notifications and Services Related to Data Breach Two
Hands Off!
NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets
OPM Data Breach: Deckplate Training for Navy Sailors
Interagency Report Advocates Support for International Cybersecurity Standardization
Four Things to Know About Spear Phishing
Rogers: NSA, Cybercom Need Partners to Aid Cybersecurity
OPM Establishes New, Online Cybersecurity Incident Resource Center
OPM Acts to Protect Federal Workers, Others From Cyber Threats
OPM Announces Steps to Protect Federal Workers and Others From Cyber Threats
Getting calls from your own phone number?
SECNAV Opens Dedicated OPM Databreach Website
Christopher J. Page, Command Information Officer, Office of Naval Intelligence
Cultivating a culture of innovation
Department of the Navy Social Security Number Reduction Plan
OPM, DoD Announce Identity Theft Protection and Credit Monitoring Contract
Who is Trying to be You?
You've Been Exposed
OPM Data Breach Reminders
OPM Announces Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Data Breach May Impact Federal Employees
Customize Your Email to Make Signing/Encrypting Messages Easier
OPM Data Breach Update
Outsmart Hackers with Two-factor Authentication
NIST’s NextGen PIV Card Strengthens Security and Authentication
Email from OPM – is it the real deal?
Paying your friends through an app? Read this.
Update #2 for DoD Personnel on OPM Breach Notification Procedures
OPM data breach – what should you do?
DON CIO Town Hall Rescheduled
Carter Unveils New DoD Cyber Strategy in Silicon Valley
Unlocking the Code
ActivIdentity ESL Supports DON IT Security Infrastructure While Saving Millions
Civilian Health Care Providers and Their Use of the SSN to Verify Eligibility and Process Claims
Cyber Hygiene Personal Social Media Standards of Conduct
DoD Warns Troops, Families to be Cyber Crime Smart
FCC/C10F Releases Strategic Plan
Federal Funding Opportunity Solicits Projects That Support Online Privacy
Four Things to Know about Operations Security and Your Privacy
Identity Thieves Caught in the Act
Intelligence Transparency
The Standards of Conduct as Applied to Personal Social Media Use
DARPA “Brandeis” Program Aims to Ensure Online Privacy Through Technology
Customize Your Email to Make Signing/Encrypting Messages Easier
U.S. Navy History and Week in Review
DON IT Conference Final Preparations Complete
DON IT Conference Schedule Now Available
Hackers Caught and Sentenced
Password Protecting Microsoft Documents
Pushing the Boundaries of Cybersecurity for the Marine Corps Forces Cyber Command
Related Resources
Privacy Briefs
Personally Identifiable Information Posters
2014 PII Brief
Privacy Act System of Records Notices
DON Users Guide to Personally Identifiable Information
View More
Inventory of DON Systems With Completed Privacy Impact Assessments
2012 Social Security Number Reduction Brief
Privacy Frequently Asked Questions
Justification For The Use Of The SSN
Privacy Resources for Military Members and Their Families
Publically Accessible Website Privacy Resources (including Official DON Social Networking Sites)
How to Find Your DoD ID Number
Unique Investment Identifiers for FY2013
Digitally Signing and Encrypting Email Containing PII Brief
Safeguarding PII
Department of the Navy Personally Identifiable Information Sample Compliance Spot Checklist
Recommended Facebook Privacy Settings
SSN Reduction Plan Resources
Privacy Training and Compliance Resources
SSN Reduction Frequently Asked Questions
How and When to Write a Privacy Act Statement
Privacy Act Resources
Fair Information Practices
Guidelines for Establishing a New Privacy Act System of Records Notice
Identifying Privacy Act Systems of Records You May Be Using
How to Obtain Military Personnel, Health, and Award Records
Privacy Act Exemptions
Sample Checklist for Conducting Privacy Act Assessment/Staff Visits
DoD Privacy Program Resources
How to Make a Privacy Act Request
Instructions for Using WinZip to Encrypt Files
Other Privacy Act Resources
Overview of the Privacy Act of 1974 (2012 Edition)
PEO EIS Portal Procedures for Safeguarding PII
Privacy Act Desk Reference Guide
Privacy-Related OMB Memoranda
Disclosure Accounting Form (OPNAV 5211/9 (MAR 1992))
General Purpose Privacy Act Statement (OPNAV FORM 5211/12)
DON SSN Reduction Review Form SECNAV 5213/1 (Jul 2010)
Methods for Hard Drive/Disk Destruction
Acceptable Use Criteria for Systems Collecting SSNs
Privacy Recommended Reading List
2012 Identity Theft Brief
2012 Privacy Impact Assessment (PIA) Brief
Privacy Impact Assessment Signature Routing Guidance
OMB Information Collection Number
Privacy Impact Assessment Resources
Privacy Impact Assessment Template "Gouge"
Privacy Impact Assessment Template Risk Mitigation Question Responses
Take the DON Privacy Quiz!
PII Breach Reporting Resources
BUPERS Safeguarding PII Presentation
Privacy Information and Resources
DoD Privacy Impact Assessment Template
Reporting PII Breach Notifications
Potential Consequences for Failing to Safeguard PII
DON Cyber Crime Handbook