Sep 27

Personal Electronic Device

CHIPS Articles: 47   News: 8   Policy: 7   Resources: 2    All: 64
Sort by Date | Title


Guidelines for Media Sanitization: Recommendations of the National Institute of Standards and Technology

NIST Special Publication, February 1, 2011 - August 31, 2012

Special Publication 800-88 recommends a number of methods for sanitizing electronic data on hard drives and other electronic media. Media sanitization is the process of removing data from a hard drive, CD-ROM or other electronic media, generally at the end of the data’s life cycle.

Modification to Personal Electronic Device Smart Card Reader Compliance Mandate

DTG 231919Z NOV 09 - November 23, 2009

This Naval message modifies the Dec. 31, 2009, compliance requirement established for purchase and installation of personal electronic device smart card readers as a result of shortages and unavailability of the required hardware at the manufacturer level.

Amplification Guidance for Purchase and Installation of Personal Electronic Device Smart Card Readers

DTG 281919Z JAN 09 - January 28, 2009

This Naval message provides amplification guidance for the purchase and installation of Common Access Card readers on all Personal Electronic Devices including BlackBerrys. It also identifies the procurement options for the required hardware.

DON Policy Updates for Personal Electronic Devices Security and Application of Email Signature and Encryption

DTG 032009Z OCT 08 - October 3, 2008

This Naval message provides updates to the DON policy for digital signature and encryption of email. It also provides updated budget guidance for procurement and use of Smart Card Reader technology to support digital signature and encryption of email from Personal Electronic Devices.

DON Security Guidance for Personal Electronic Devices

DTG 202041Z AUG 07 - August 20, 2007

This Naval message provides guidance for the use of personal electronic devices (PEDs). Commands are encouraged to immediately begin transition to PEDs that support digital signature and encryption. Effective March 31, 2008, use of PEDs that are not natively compliant or have not upgraded to meet the requirements will no longer be permitted.

Safeguarding Personally Identifiable Information

DTG 171952Z APR 07 - April 17, 2007

This Naval message establishes interim policy for the handling of personally identifiable information when stored on government furnished laptop computers, other mobile computing devices and removable storage media (e.g., removable hard drives, thumb drives, blackberries, personal digital assistants, compact discs and DVDs).

Protection of Sensitive Department of Defense Data at Rest on Portable Computing Devices

DoD Memo - April 18, 2006

This memo provides suggestions on technical means to protect unclassified sensitive information on portable computing devices used within DoD. The measures are in addition to the normal physical security required for such devices so that, if they fall into the wrong hands for any reason, access to the sensitive DoD information they contain will be more difficult.


Navy Mobile Apps Bring Information and Training to Your Smartphone and Tablet

by Rob Foster - May 9, 2016

There are mobile applications for almost everything, and now there are apps that allow Department of the Navy active duty and civilian personnel in any location to access important information and required training on their personal smartphone or tablet. These apps will work on personal devices outside of the Navy Marine Corps Intranet (NMCI) domain.

Telework Driving Demand for Remote Access

by Mike Hernon - October 27, 2011

The Department of the Navy anticipates that personnel will begin teleworking in significant numbers when a new telework policy is released shortly. As a result, there will be explosive growth in the number of users who need to connect to the Navy Marine Corps Intranet and other government networks from remote locations, primarily from a home office, but also from other locations via cellular or Wi-Fi networks.

DON Digital Signature and Encryption Policy for Emails Containing PII

by DON CIO Privacy Team - July 18, 2011

The purpose of this tip is to reinforce existing DON policy regarding digitally signing and encrypting emails that contain personally identifiable information (PII).

Top 10 PII Lessons Learned

by DON CIO Privacy Team - July 15, 2010

When a Department of the Navy activity reports a personally identifiable information breach, it must include lessons learned in an after-action report. Lessons learned are an important feedback mechanism and are used to shape future DON privacy policy. The following information is a compilation of the most frequently reported lessons learned.

DON Current and Future PKI and PKE Activities

by James Mauck - May 18, 2010

The Secretary of Defense has embraced public key cryptography as a critical component of defense-in-depth and contributor to the overall Department of Defense information assurance (IA) strategy for protecting its information and networks. DoD Instruction 8520.2, "Public Key Infrastructure (PKI) and Public Key Enabling (PKE)" establishes the requirements for PK-enabling all email, private web servers and networks.

Defending Cell Phones and PDAs Against Attack

by DON CIO Privacy Team - May 1, 2009

As cell phones and personal digital assistants (PDAs) become more technologically advanced, attackers are finding new ways to target victims. By using text messaging or email, an attacker could lure you to a malicious site or convince you to install malicious code on your portable device.

New BlackBerry Security Settings Take Effect

by Enterprise Services Management Team - February 29, 2008

Stronger and improved security settings were implemented for all NMCI BlackBerry devices in February. These settings comply with mandatory security policies to protect the devices from unauthorized access and to change features that pose potential security vulnerabilities.

BlackBerries and CACs Get Connected

by Mike Hernon - December 3, 2007

The Department of the Navy is a dynamic enterprise with personnel constantly on the move between the office, temporary duty assignments and military deployments. Maintaining connectivity to voice and data services is essential to mobile workers so that they may perform their jobs as efficiently and effectively as possible. This capability, referred to as "enterprise mobility," is a critical component of the ongoing work ...

CHIPS Magazine

AFMC commander says cyber threats are real, need to get ahead of them

by Staff Sgt. Christopher Gross, Air Force News Service - September 23, 2016

Senior Officials: DoD Supports Strong Encryption for Defense, Commercial Security

by Cheryl Pellerin, DoD News, Defense Media Activity - September 14, 2016

Transparency Has Place in Intelligence World, DoD Official Says

by Jim Garamone, DoD News, Defense Media Activity - September 14, 2016

The Incredible Loudness of Whispering

by DARPA News - September 1, 2016

Sending and receiving wireless messages could be in for a transformative leap in security and reliability

#NavyInnovates: eSailor Puts Technology and Information at Sailors’ Fingertips

by Chief of Naval Personnel Public Affairs - August 9, 2016

Download CHIPS Magazine Mobile App!

by CHIPS Magazine - July-September 2016

Kenneth W. Bible, Deputy Director, C4 / Deputy CIO, Headquarters, U.S. Marine Corps

by CHIPS Magazine - July-September 2016

The seamless MCEN, MCEITS, JIE, Mobility … from the fighting hole back to the flagpole

Online tracking — more than cookies

by Lisa Weintraub Schifferle, Attorney, FTC, Division of Consumer & Business Education - July-September 2016

Privacy Awareness Tips

by DON Privacy Team - July-September 2016

Protecting Your Privacy

by Sharon Anderson - July-September 2016

Q&A with Steve Muck, Director for Privacy and Information Sharing for the DON CIO

by CHIPS Magazine - July-September 2016

Eighty percent of DON data breaches are caused by human error or the failure to follow policy

Streamlining Real Estate Processes for Commercial Wireless Broadband Deployment

by James D. Omans, OASN (EI&E), Joanne Wills and Tom Kidd, DON CIO - July-September 2016

Strengthening Privacy Awareness and Protection

by Robert Foster - July-September 2016

An update from the DON CIO

Your mobile phone account could be hijacked by an identity thief

by Lorrie Cranor, Federal Trade Commission Chief Technologist - July-September 2016

Sailors Build Cybersecurity Awareness

by NCTAMS LANT Det. Rota Public Affairs - June 27, 2016

Upgrade to Navy COOL Mobile App Includes Advancement BIBs

by Ed Barker, Naval Education and Training Professional Development Center Public Affairs - April 29, 2016

Visit or Dial-in to West Coast DON IT Conference

by DON CIO - February 17, 2016

Feb. 17-18, 2016

Blue Angels Fly Over 2016 Super Bowl

by MC2 Jenn Lebron, Blue Angels Public Affairs Office - February 8, 2016

Cybersecurity is an all-hands effort!

by Sharon Anderson - January-March 2016

Information Security in the Mobile Environment

by Teague de La Plaine, Security Specialist, Deputy Under Secretary of the Navy (Policy) Security Directorate - January-March 2016

Cybersecurity: All Hands on Deck

by Vice Adm. Ted N. Branch, Deputy Chief of Naval Operations for Information Dominance (N2/N6) - October-December 2015

Strengthening Cybersecurity Awareness

by Rob Foster - October-December 2015

Message From the DON CIO

DoD News Broadcast Channel Transitions to On-demand

by DoD News, Defense Media Activity - April 15, 2015

N-ZERO “Asleep-yet-Aware” Electronics Could Revolutionize Remote Wireless Sensors

by DARPA News - April 14, 2015

Power for the growing global network of Internet-enabled devices

DoD Warns Troops, Families to be Cyber Crime Smart

by Terri Moon Cronk, DoD News, Defense Media Activity - April-June 2015

Download the New DoD Cyber Strategy

by CHIPS Magazine - April-June 2015

Navy and Marine Corps: Good Neighbors in the Frequency Spectrum Community

by Thomas Kidd and Elizabeth Morin - April-June 2015

Personnel Now Permitted to Use Navy-Issued Mobile Devices for Personal Use

by Sharon Anderson - April-June 2015

No more juggling two devices!

The eDIVO and MPT&E Mobile Apps

by PEO EIS Sea Warrior Program (PMW 240) - April-June 2015

Sea Warrior Technical Director Ken Johnson talks about BYOD efforts in the Navy

The Standards of Conduct as Applied to Personal Social Media Use

by Sharon Anderson - April-June 2015

What federal employees need to know

Time for Digital Spring Cleaning

by National Cyber Security Alliance and Better Business Bureau - April-June 2015

Make sure your online life is in tip-top shape!

DoD Advances Elements of Joint Information Environment

by By Cheryl Pellerin, DoD News, Defense Media Activity - March 25, 2015

eDIVO Mobile App for U.S. Navy DIVOs and CPOs Now Available

by Sea Warrior Program (PEO EIS PMW 240) Public Affairs - March 12, 2015

Navy Reserve — Ready, Innovative, Agile

by Sharon Anderson - January-March 2015

International Hacker Sentenced

by FBI Atlanta Division News - October 29, 2014

One of the most sophisticated cybercrime rings in the world brought to justice

Cybersecurity or Convenience?

by CHIPS Magazine - October 16, 2014

Latest Scam Alerts from the Federal Trade Commission

by CHIPS Magazine - October 15, 2014

Cybersecurity matters!

Protecting the Nation’s Intellectual Property

by CHIPS Magazine - October 14, 2014

A National Cybersecurity Awareness Month Reminder

Viruses, Spyware and Bots

by CHIPS Magazine - October 8, 2014

A National Cybersecurity Awareness Month Message from the FBI

by FBI News - October 7, 2014

Security is Everyone’s Responsibility


Privacy Training and Compliance Resources

by DON CIO Privacy Team - May 31, 2011

The following resources are provided to support the Department of the Navy's annual privacy training and semi-annual compliance spot-check requirements. Note: The GENADMIN (DTG 181905Z DEC 08) training requirement supercedes the ALNAV 070/07 training requirement. The compliance spot check requirements of the ALNAV remain in effect.

Privacy Information and Resources

December 19, 2008

In addition to the privacy resources and information available on the DON CIO website, the following list of websites provide further information on privacy and identity theft prevention.