HOME
POLICY & GUIDANCE
NEWS
CONTACT US
RSS FEEDS
Trending
DADMS/DITPR-DON
Cybersecurity
Privacy
IA
BROWSE ALL TOPICS
Audit Readiness of IT Systems (0)
DIACAP (12)
Information Sharing (48)
Open Source (3)
Awards (35)
DON Enterprise Architecture (49)
IT Asset Management (20)
Performance Measurement (2)
Business Case Analysis (11)
Enterprise Licensing Agreements (12)
IT Efficiencies (119)
Personal Electronic Device (18)
CIO Authorities (56)
Enterprise Services (35)
IT Expenditure Approval Authority (12)
Printing and Imaging (Copiers/MFDs) (17)
Civil Liberties (21)
Enterprise Software Initiative (32)
IT Governance (48)
Privacy (258)
Clinger-Cohen Act Compliance (25)
FISMA (11)
IT Infrastructure (17)
Public Key Infrastructure (19)
Cloud Computing (21)
Forms/Reports (14)
IT Investment Management (77)
Records Management (38)
Common Access Card (9)
Freedom of Information Act (27)
IT Portfolio Management (1)
Section 508 (10)
Cybersecurity (240)
Functional Area Manager (9)
Knowledge Management (34)
Social Media (32)
Cyberspace/IT Workforce (34)
GIG Standards (20)
Naval Enterprise Networks (38)
Spectrum (56)
DADMS/DITPR-DON (42)
Green IT (10)
Naval Networking Environment (12)
Statutory & Regulatory Compliance (11)
Data at Rest (10)
Identity Management (113)
NGEN (18)
Telecommunications (62)
Data Center Consolidation (37)
IM/IT Strategy (44)
NMCI (27)
Wireless (65)
Data Strategy (12)
Information Assurance (63)
TAGS:
Related Policy
Processing of Electronic Storage Media for Disposal
PKI Interoperability with FVEY Partner Nations on the NIPRNet
DON Secure Hash Algorithm Migration
DON Public Key Enablement Waiver Request Process for Unclassified Networks, Private Web Servers, Portals and Web Applications
DoD Acceptance and Use of Personal Identity Verification-Interoperable (PIV-I) Credentials
View More
DON Electronic Signature Policy
Public Key Enablement of DON Unclassified Private Web Servers and Applications
DON Privacy Impact Assessment Guidance
DoD Privacy Impact Assessment Guidance
DON Policy Updates for Use of NIPRNET Public Key Infrastructure Software Certificates
Approval of External Public Key Infrastructures
DON Naval Networking Environment (NNE)~2016 Strategic Definition, Scope and Strategy
Public Key Infrastructure Software Certificate Minimization Effort for DON Unclassified Environments
DON Guidance on Wireless Local Area Network Implementation of the 802.11I Standard
DON Encryption of Sensitive Unclassified Data at Rest Guidance
Safeguarding Personally Identifiable Information from Unauthorized Disclosure
Encryption of Sensitive Unclassified Data at Rest on Mobile Computing Devices and Removable Storage Media
Safeguarding Personally Identifiable Information
Common Access Card Eligibility for Foreign National Personnel
Compliance and Review of Logical Access Control in DoD Processes
Policy for Digital Signature Functionality and Acceptance
Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency IT Investments
DoD-Wide Digital Signature Interoperability
Protection of Sensitive Department of Defense Data at Rest on Portable Computing Devices
DoD Implementation Guide for Transitional PIV II SP 800-73 v1
Federal Information Processing Standard 201-1: Personal Identity Verification of Federal Employees and Contractors
National Industrial Security Program Operating Manual
DON Privacy Program
DON Information Assurance Manual
Withholding of Information that Personally Identifies DoD Personnel
DON Privacy Impact Assessment Format Guidance
DON Public Key Infrastructure Implementation Guidance
Policy for a Common Identification Standard for Federal Employees and Contractors
Smart Card Senior Coordinating Group
Related News
PII Breach Articles from CHIPS Magazine
DoD to Cease Issuance of Software PKI Certificates to FVEY Partner Nations
NMCI's Ever-Improving Security Profile
DON Digital Signature and Encryption Policy for Emails Containing PII
DON to Migrate to Use of Stronger Cryptographic Algorithms
View More
PKE Waiver Process Is Updated
Privacy Tips
DoD Memo on PIV-I Credentials Released
DON Electronic Signature Policy Released
DON Current and Future PKI and PKE Activities
Identity Management Operations to Improve Cybersecurity
Compliance Spot Checks Key to Successful Privacy Program
Theft of Storage Media Containing PII
Copier/Printer May Present Information Security Risks
DoD Releases Information Systems Certification and Accreditation Reciprocity Memo
Protect Your Personal Information: It's Valuable
Defending Cell Phones and PDAs Against Attack
Reducing the Use of SSNs is Key to Securing PII
Insider Threat
Reduce PII Loss by Proper Disposal/Sanitization of Unclass Equipment
What You Should Know About Identity Theft
Related CHIPS Magazine
Factsheet: National Background Investigations Bureau
Creating a National Cyber Strategic Framework
Download CHIPS Magazine Mobile App!
DISA Announces Video Series for the National Background Investigation System
Senior Officials: DoD Supports Strong Encryption for Defense, Commercial Security
View More
Transparency Has Place in Intelligence World, DoD Official Says
Under Secretary of Defense Visits U.S. Navy's Cyber Thought Leaders
Pacific Endeavor Exercise Tests New Communications Capability
Chiefs of US and Chinese Navies Agree on Need for Cooperation
DoD CIO Issues Information Technology Environment Way Forward
DON Cyberspace (Cyber) IT and Cybersecurity Workforce — Who Are We?
Kenneth W. Bible, Deputy Director, C4 / Deputy CIO, Headquarters, U.S. Marine Corps
Navigating DoD ITSM Policy
Privacy Awareness Tips
Q&A with Capt. John D. Zimmerman Deputy CIO Naval Sea Systems Command
Safeguarding Your Common Access Cards and Military Identification Cards
Strengthening Privacy Awareness and Protection
Your mobile phone account could be hijacked by an identity thief
DISA Hosts Command and Control Interoperability Program Symposium
Defense Secretary Ash Carter Releases Hack the Pentagon Results
3 Common Misperceptions about the Joint Regional Security Stacks
NIST Released the final version of "Best Practices Guide for Personal Identity Verification (PIV)-enabled Privileged Access"
‘Gloves Are Off’ in Cyber says DISA Director
DoD CIO Discusses Modernizing Networks, Consolidating Data Centers
Army chief information officer announces long-term network strategy, 2025-2040
Cyber Defense for Ships of Today and Tomorrow
DON CIO Awards Recognize Information Management and Information Technology Excellence
NIST Releases New Cryptographic Standards and Guidelines Process
Q&A with Capt. Michael N. Abreu
Q&A with Cmdr. Damen Hofheinz, OPNAV N2N6BC lead for the JIE/JRSS
Vice Adm. Ted Branch: Sea Change in Information Warfare
CIO Priorities Include Cybersecurity, Innovation, Retaining IT Workforce
Navy Service Migration Team Established To Migrate Navy Behind Joint Regional Security Stack
Visit or Dial-in to West Coast DON IT Conference
DON IT Conference West Coast 2016 Registration Available Until February 5
NIST Released NIST Interagency Report 8055, Derived Personal Identity Verification Credentials Proof of Concept Research
Changing the DoD Cyberspace Culture
DoD SHA-256 Upgrade
DON IT Conference, East Coast 2016 and USN-USMC Electromagnetic Spectrum Summit Begin April 20
Information Security in the Mobile Environment
Net-Centricity: a Review of DoD Net-Centric Concepts
Taking Advantage of Learning and Networking Opportunities
Recovering from Identity Theft is Easier with a Plan
Register Now For DON IT Conference, West Coast 2016
Strengthening Cybersecurity Awareness
Defense, Intel Leaders: Cybersecurity Priorities are Defense, Deterrence
Pilot Projects to Improve Cybersecurity, Reduce Online Theft
National Counterintelligence and Security Center Partners with Office of Personnel Management to Assist Personnel Affected by Data Breaches
New ALNAV Regarding OPM Data Breach Notifications and Services Related to Data Breach Two
NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets
OPM Establishes New, Online Cybersecurity Incident Resource Center
OPM Acts to Protect Federal Workers, Others From Cyber Threats
OPM Announces Steps to Protect Federal Workers and Others From Cyber Threats
Christopher J. Page, Command Information Officer, Office of Naval Intelligence
OPM, DoD Announce Identity Theft Protection and Credit Monitoring Contract
OPM Data Breach Reminders
OPM Announces Actions to Strengthen Cybersecurity and Protect Critical IT Systems
NIST’s NextGen PIV Card Strengthens Security and Authentication
OPM data breach – what should you do?
As Enterprise Operations Centers Roll Out, So Does the Joint Information Environment
ActivIdentity ESL Supports DON IT Security Infrastructure While Saving Millions
FCC/C10F Releases Strategic Plan
Personnel Now Permitted to Use Navy-Issued Mobile Devices for Personal Use
DISA Rolls Out Defense Department Online Collaboration Tool
Enterprise IT Solutions and Flexibility at the Tactical Edge
JIE Brings Capabilities Focused on Improving Joint Cybersecurity
Navy is Committed to the Joint Information Environment
Navy Supports IC ITE Deployment
NCTAMS LANT — Assured Communications to the Fleet — by a Highly Motivated Workforce
Pushing the Boundaries of Cybersecurity for the Marine Corps Forces Cyber Command
Seeing the Forest Through the Trees
DoD Advances Information Technology to Lower Costs
'Chip and PIN' Credit Cards Coming to DoD Travelers
Related Resources
Personally Identifiable Information Posters
2014 PII Brief
Inventory of DON Systems With Completed Privacy Impact Assessments
Privacy Frequently Asked Questions
Privacy Briefs
View More
Unique Investment Identifiers for FY2013
Privacy Training and Compliance Resources
Privacy Recommended Reading List
2012 Identity Theft Brief
2012 Privacy Impact Assessment (PIA) Brief
Privacy Impact Assessment Signature Routing Guidance
OMB Information Collection Number
Privacy Impact Assessment Resources
Privacy Impact Assessment Template "Gouge"
Privacy Impact Assessment Template Risk Mitigation Question Responses
Take the DON Privacy Quiz!
PII Breach Reporting Resources
Privacy Information and Resources
Potential Consequences for Failing to Safeguard PII