Sep 18

Industry News

BYOD: Why Managing Devices is Not Enough

Federal Computer Week - April 26, 2013

DoD Officials Cite Advances in Cyber Operations, Security

American Forces Press Service - March 14, 2013

NIST Proposes Privacy Controls for Federal Information Systems

Government Computer News - July 22, 2011

Personal Electronic Device

CHIPS Articles: 5   News: 7   Policy: 7   Resources: 3   All: 22
Sort by Date | Title


Policy

Guidelines for Media Sanitization: Recommendations of the National Institute of Standards and Technology

NIST Special Publication, February 1, 2011 - August 29, 2012

Special Publication 800-88 recommends a number of methods for sanitizing electronic data on hard drives and other electronic media. Media sanitization is the process of removing data from a hard drive, CD-ROM or other electronic media, generally at the end of the data’s life cycle.

Modification to Personal Electronic Device Smart Card Reader Compliance Mandate

DTG 231919Z NOV 09 - November 30, 2009

This Naval message modifies the Dec. 31, 2009, compliance requirement established for purchase and installation of personal electronic device smart card readers as a result of shortages and unavailability of the required hardware at the manufacturer level.

Amplification Guidance for Purchase and Installation of Personal Electronic Device Smart Card Readers

DTG 281919Z JAN 09 - February 2, 2009

This Naval message provides amplification guidance for the purchase and installation of Common Access Card readers on all Personal Electronic Devices including BlackBerrys. It also identifies the procurement options for the required hardware.

DON Policy Updates for Personal Electronic Devices Security and Application of Email Signature and Encryption

DTG 032009Z OCT 08 - October 6, 2008

This Naval message provides updates to the DON policy for digital signature and encryption of email. It also provides updated budget guidance for procurement and use of Smart Card Reader technology to support digital signature and encryption of email from Personal Electronic Devices.

DON Security Guidance for Personal Electronic Devices

DTG 202041Z AUG 07 - December 17, 2007

This Naval message provides guidance for the use of personal electronic devices (PEDs). Commands are encouraged to immediately begin transition to PEDs that support digital signature and encryption. Effective March 31, 2008, use of PEDs that are not natively compliant or have not upgraded to meet the requirements will no longer be permitted.

Safeguarding Personally Identifiable Information

DTG 171952Z APR 07 - December 18, 2007

This Naval message establishes interim policy for the handling of personally identifiable information when stored on government furnished laptop computers, other mobile computing devices and removable storage media (e.g., removable hard drives, thumb drives, blackberries, personal digital assistants, compact discs and DVDs).

Protection of Sensitive Department of Defense Data at Rest on Portable Computing Devices

DoD Memo - December 18, 2007

This memo provides suggestions on technical means to protect unclassified sensitive information on portable computing devices used within DoD. The measures are in addition to the normal physical security required for such devices so that, if they fall into the wrong hands for any reason, access to the sensitive DoD information they contain will be more difficult.

News

Telework Driving Demand for Remote Access

by Mike Hernon - October 26, 2011

The Department of the Navy anticipates that personnel will begin teleworking in significant numbers when a new telework policy is released shortly. As a result, there will be explosive growth in the number of users who need to connect to the Navy Marine Corps Intranet and other government networks from remote locations, primarily from a home office, but also from other locations via cellular or Wi-Fi networks.

DON Digital Signature and Encryption Policy for Emails Containing PII

by DON CIO Privacy Team - July 14, 2011

The purpose of this tip is to reinforce existing DON policy regarding digitally signing and encrypting emails that contain personally identifiable information (PII).

Top 10 PII Lessons Learned

by DON CIO Privacy Team - July 9, 2010

When a Department of the Navy activity reports a personally identifiable information breach, it must include lessons learned in an after-action report. Lessons learned are an important feedback mechanism and are used to shape future DON privacy policy. The following information is a compilation of the most frequently reported lessons learned.

DON Current and Future PKI and PKE Activities

by James Mauck - May 17, 2010

The Secretary of Defense has embraced public key cryptography as a critical component of defense-in-depth and contributor to the overall Department of Defense information assurance (IA) strategy for protecting its information and networks. DoD Instruction 8520.2, "Public Key Infrastructure (PKI) and Public Key Enabling (PKE)" establishes the requirements for PK-enabling all email, private web servers and networks.

Defending Cell Phones and PDAs Against Attack

by DON CIO Privacy Team - April 30, 2009

As cell phones and personal digital assistants (PDAs) become more technologically advanced, attackers are finding new ways to target victims. By using text messaging or email, an attacker could lure you to a malicious site or convince you to install malicious code on your portable device.

New BlackBerry Security Settings Take Effect

by Enterprise Services Management Team - February 15, 2008

Stronger and improved security settings were implemented for all NMCI BlackBerry devices in February. These settings comply with mandatory security policies to protect the devices from unauthorized access and to change features that pose potential security vulnerabilities.

BlackBerries and CACs Get Connected

by Mike Hernon - February 15, 2008

The Department of the Navy is a dynamic enterprise with personnel constantly on the move between the office, temporary duty assignments and military deployments. Maintaining connectivity to voice and data services is essential to mobile workers so that they may perform their jobs as efficiently and effectively as possible. This capability, referred to as "enterprise mobility," is a critical component of the ongoing work ...

CHIPS Magazine

Social Media: The Wild, Wild West of the World Wide Web

by Darcy Hotchkiss, HQMC C4, Cyber - July-September 2014 - July-September 2014

SSC Pacific Provides Secure Mobile Communications to Navy Warfighters

by Ashley Nekoui, SSC Pacific Public Affairs Specialist - July-September 2014 - July-September 2014

DoD’s Commercial Mobile Device Implementation Plan

by CHIPS editors, Sharon Anderson and Heather Rutherford - April-June 2013 - April-June 2013

Enabling the mobile workforce

Rear Adm. David G. Simpson

by CHIPS Magazine - April-June 2013 - April-June 2013

Vice Director of the Defense Information Systems Agency

Where DARPA is Going — You Don’t Need Passwords

by DARPA News - Web Only 0 - February 20, 2013

Active Authentication program investigates behavioral biometrics for mobile devices

Resources

Privacy Resources for Military Members and Their Families

by DON CIO Privacy Team - April 26, 2012

Service members and their families face many life altering events that most people never experience, such as frequent moves, extended deployments and multiple family separations. Each of these events can potentially expose the service member to an increased risk of identity theft and/or fraud. The following links provide information on what to do if you find yourself in a situation where your personal information has ...

Privacy Training and Compliance Resources

by DON CIO Privacy Team - February 25, 2009

The following resources are provided to support the Department of the Navy's annual privacy training and semi-annual compliance spot-check requirements. Note: The GENADMIN (DTG 181905Z DEC 08) training requirement supercedes the ALNAV 070/07 training requirement. The compliance spot check requirements of the ALNAV remain in effect.

Privacy Information and Resources

December 17, 2008

In addition to the privacy resources and information available on the DON CIO website, the following list of websites provide further information on privacy and identity theft prevention.