HOME
POLICY & GUIDANCE
NEWS
CONTACT US
RSS FEEDS
Trending
DADMS/DITPR-DON
Cybersecurity
Privacy
IA
BROWSE ALL TOPICS
Audit Readiness of IT Systems (0)
DIACAP (12)
Information Sharing (48)
Open Source (3)
Awards (35)
DON Enterprise Architecture (49)
IT Asset Management (20)
Performance Measurement (2)
Business Case Analysis (11)
Enterprise Licensing Agreements (12)
IT Efficiencies (119)
Personal Electronic Device (18)
CIO Authorities (57)
Enterprise Services (35)
IT Expenditure Approval Authority (12)
Printing and Imaging (Copiers/MFDs) (17)
Civil Liberties (21)
Enterprise Software Initiative (32)
IT Governance (48)
Privacy (260)
Clinger-Cohen Act Compliance (25)
FISMA (11)
IT Infrastructure (17)
Public Key Infrastructure (19)
Cloud Computing (21)
Forms/Reports (14)
IT Investment Management (77)
Records Management (38)
Common Access Card (9)
Freedom of Information Act (27)
IT Portfolio Management (1)
Section 508 (10)
Cybersecurity (241)
Functional Area Manager (9)
Knowledge Management (34)
Social Media (33)
Cyberspace/IT Workforce (35)
GIG Standards (20)
Naval Enterprise Networks (38)
Spectrum (57)
DADMS/DITPR-DON (42)
Green IT (10)
Naval Networking Environment (12)
Statutory & Regulatory Compliance (11)
Data at Rest (10)
Identity Management (113)
NGEN (18)
Telecommunications (63)
Data Center Consolidation (37)
IM/IT Strategy (44)
NMCI (27)
Wireless (66)
Data Strategy (12)
Information Assurance (63)
TAGS:
Related Policy
Processing of Electronic Storage Media for Disposal
Reduction of SSN Use Within DoD
DITPR-DON Process Guidance v1.0
Department of the Navy Social Security Number Reduction Plan for Forms Phase One
DoD and DON Privacy Impact Assessment Guidance
View More
Updated Plan to Remove Social Security Numbers from DoD Identification Cards
DoD Acceptance and Use of Personal Identity Verification-Interoperable (PIV-I) Credentials
Code of Federal Regulations (32 CFR Part 701)
DON Electronic Signature Policy
DON Social Security Number Reduction Plan for Forms Phase One
Safeguarding Personally Identifiable Information (PII)
Safeguarding Personally Identifiable Information
DON Privacy Impact Assessment Guidance
DoD Privacy Impact Assessment Guidance
Approval of External Public Key Infrastructures
DON Encryption of Sensitive Unclassified Data at Rest Guidance
Safeguarding Personally Identifiable Information from Unauthorized Disclosure
Safeguarding Personally Identifiable Information
Common Access Card Eligibility for Foreign National Personnel
Recall Rosters
Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency IT Investments
Protection of Sensitive Department of Defense Data at Rest on Portable Computing Devices
DoD Implementation Guide for Transitional PIV II SP 800-73 v1
Federal Information Processing Standard 201-1: Personal Identity Verification of Federal Employees and Contractors
National Industrial Security Program Operating Manual
DON Privacy Program
DON Information Assurance Manual
Withholding of Information that Personally Identifies DoD Personnel
DON Privacy Impact Assessment Format Guidance
DON Public Key Infrastructure Implementation Guidance
Policy for a Common Identification Standard for Federal Employees and Contractors
Privacy Act Program Update
DoD Health Information Privacy Regulation
Instructions on Complying with President's Memorandum of May 14, 1998: "Privacy and Personal Information in Federal Records"
Privacy Act of 1974
Related News
Privacy Tips
PII Breach Articles from CHIPS Magazine
DON Digital Signature and Encryption Policy for Emails Containing PII
DON to Migrate to Use of Stronger Cryptographic Algorithms
Steps For Military Personnel to Take to Defend Against ID Theft
View More
Rules for Handling PII by DON Contractor Support Personnel
SSNs to be Removed from Government ID Cards
DON SSN Reduction Plan
Unique DoD ID Replaces SSN
Elements of a Good Privacy Program (Part Two)
DoD Memo on PIV-I Credentials Released
Elements of a Good Privacy Program
DON Electronic Signature Policy Released
The Use of Recall Rosters
Top 10 PII Lessons Learned
Compliance Spot Checks Key to Successful Privacy Program
Theft of Storage Media Containing PII
Copier/Printer May Present Information Security Risks
Improper Disposal of HR Documents
Protect Your Personal Information: It's Valuable
Defending Cell Phones and PDAs Against Attack
Reducing the Use of SSNs is Key to Securing PII
Insider Threat
Reduce PII Loss by Proper Disposal/Sanitization of Unclass Equipment
What You Should Know About Identity Theft
Related CHIPS Magazine
Protecting Businesses and Consumers from Email Scams
Factsheet: National Background Investigations Bureau
“Why’s Everybody Always Picking on Me?”
Download CHIPS Magazine Mobile App!
What is "Insider Threat?"
View More
DISA Announces Video Series for the National Background Investigation System
Senior Officials: DoD Supports Strong Encryption for Defense, Commercial Security
Transparency Has Place in Intelligence World, DoD Official Says
DoD CIO Issues Information Technology Environment Way Forward
DON Cyberspace (Cyber) IT and Cybersecurity Workforce — Who Are We?
Privacy Awareness Tips
Safeguarding Your Common Access Cards and Military Identification Cards
Strengthening Privacy Awareness and Protection
Your mobile phone account could be hijacked by an identity thief
SECNAV Revises & Reissues OPNAV Personally Identifiable Information (PII) Breach Reporting Forms
Two New GMT Mobile Apps Released
DON CIO Awards Recognize Information Management and Information Technology Excellence
Q&A with Cmdr. Damen Hofheinz, OPNAV N2N6BC lead for the JIE/JRSS
Visit or Dial-in to West Coast DON IT Conference
Protect Your Identity During Tax Season
DON IT Conference West Coast 2016 Registration Available Until February 5
NIST Released NIST Interagency Report 8055, Derived Personal Identity Verification Credentials Proof of Concept Research
Changing the DoD Cyberspace Culture
DoD SHA-256 Upgrade
How to Protect Yourself from Medical Identity Theft
Information Security in the Mobile Environment
Medical Technology Cybersecurity — Not Easy, But Not Impossible
Where is the Rickover for Navy Networks?
Recovering from Identity Theft is Easier with a Plan
OPM Launches Verification Website, Updates FAQs Related to Data Breach
Register Now For DON IT Conference, West Coast 2016
Strengthening Cybersecurity Awareness
U.S. Cyber Command Chief Details Plans to Meet Cyberspace Threats
Defense, Intel Leaders: Cybersecurity Priorities are Defense, Deterrence
Pilot Projects to Improve Cybersecurity, Reduce Online Theft
Rogers Outlines Cyber Challenges Facing DoD, U.S.
National Counterintelligence and Security Center Partners with Office of Personnel Management to Assist Personnel Affected by Data Breaches
New ALNAV Regarding OPM Data Breach Notifications and Services Related to Data Breach Two
Hands Off!
NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets
OPM Establishes New, Online Cybersecurity Incident Resource Center
OPM Acts to Protect Federal Workers, Others From Cyber Threats
OPM Announces Steps to Protect Federal Workers and Others From Cyber Threats
Getting calls from your own phone number?
Department of the Navy Social Security Number Reduction Plan
OPM, DoD Announce Identity Theft Protection and Credit Monitoring Contract
Who is Trying to be You?
OPM Data Breach Reminders
OPM Announces Actions to Strengthen Cybersecurity and Protect Critical IT Systems
OPM data breach – what should you do?
DON IT Conference Final Preparations Complete
DON IT Conference Schedule Now Available
Related Resources
Personally Identifiable Information Posters
2014 PII Brief
Privacy Act System of Records Notices
Inventory of DON Systems With Completed Privacy Impact Assessments
2012 Social Security Number Reduction Brief
View More
Privacy Frequently Asked Questions
Justification For The Use Of The SSN
Privacy Briefs
Privacy Resources for Military Members and Their Families
Publically Accessible Website Privacy Resources (including Official DON Social Networking Sites)
How to Find Your DoD ID Number
Unique Investment Identifiers for FY2013
Safeguarding PII
Recommended Facebook Privacy Settings
SSN Reduction Plan Resources
Privacy Training and Compliance Resources
SSN Reduction Frequently Asked Questions
How and When to Write a Privacy Act Statement
Privacy Act Resources
Fair Information Practices
Guidelines for Establishing a New Privacy Act System of Records Notice
Identifying Privacy Act Systems of Records You May Be Using
How to Obtain Military Personnel, Health, and Award Records
Privacy Act Exemptions
Sample Checklist for Conducting Privacy Act Assessment/Staff Visits
DoD Privacy Program Resources
How to Make a Privacy Act Request
Instructions for Using WinZip to Encrypt Files
Other Privacy Act Resources
Overview of the Privacy Act of 1974 (2012 Edition)
PEO EIS Portal Procedures for Safeguarding PII
Privacy Act Desk Reference Guide
Privacy-Related OMB Memoranda
Disclosure Accounting Form (OPNAV 5211/9 (MAR 1992))
General Purpose Privacy Act Statement (OPNAV FORM 5211/12)
DON SSN Reduction Review Form SECNAV 5213/1 (Jul 2010)
Department of Defense SORN Training Materials
Methods for Hard Drive/Disk Destruction
Acceptable Use Criteria for Systems Collecting SSNs
Privacy Recommended Reading List
2012 Identity Theft Brief
2012 Privacy Impact Assessment (PIA) Brief
Privacy Impact Assessment Signature Routing Guidance
OMB Information Collection Number
Privacy Impact Assessment Resources
Privacy Impact Assessment Template "Gouge"
Privacy Impact Assessment Template Risk Mitigation Question Responses
Take the DON Privacy Quiz!
PII Breach Reporting Resources
Privacy Information and Resources
Potential Consequences for Failing to Safeguard PII