HOME
POLICY & GUIDANCE
NEWS
FAQS
RSS FEEDS
Trending
Cybersecurity
Telecommunications
Spectrum
InfoSharing
BROWSE ALL TOPICS
Audit Readiness of IT Systems (3)
DIACAP (8)
IM/IT Strategy (29)
NGEN (19)
Awards (51)
DON Enterprise Architecture (31)
Information Assurance (51)
NMCI (27)
Business Case Analysis (9)
Enterprise Licensing Agreements (13)
Information Sharing (43)
Open Source (2)
CIO Authorities (74)
Enterprise Services (23)
IT Asset Management (12)
Personal Electronic Device (14)
Civil Liberties (21)
Enterprise Software Initiative (32)
IT Efficiencies (90)
Printing and Imaging (Copiers/MFDs) (18)
Clinger-Cohen Act Compliance (10)
FISMA (4)
IT Expenditure Approval Authority (12)
Privacy (294)
Cloud Computing (39)
Forms/Reports (11)
IT Governance (32)
Public Key Infrastructure (10)
Common Access Card (6)
Freedom of Information Act (25)
IT Infrastructure (12)
Records Management (30)
Cybersecurity (314)
Functional Area Manager (6)
IT Investment Management (47)
Section 508 (9)
Cyberspace/IT Workforce (40)
GIG Standards (12)
IT Portfolio Management (3)
Social Media (27)
DADMS/DITPR-DON (26)
Governance (11)
Knowledge Management (28)
Spectrum (88)
Data at Rest (5)
Green IT (6)
Naval Enterprise Networks (32)
Telecommunications (62)
Data Center Consolidation (34)
Identity Management (91)
Naval Networking Environment (8)
Wireless (66)
Data Strategy (20)
TAGS:
IA
,
IDManagement
,
Privacy
Related Policy
DON Privacy Program
DoD Privacy Impact Assessment Guidance
Processing of Electronic Storage Media for Disposal
Reduction of SSN Use Within DoD
DITPR-DON Process Guidance v1.0
View More
Updated Plan to Remove Social Security Numbers from DoD Identification Cards
Safeguarding Personally Identifiable Information (PII)
Safeguarding Personally Identifiable Information
DON Privacy Impact Assessment Guidance
Safeguarding Personally Identifiable Information from Unauthorized Disclosure
Safeguarding Personally Identifiable Information
Recall Rosters
DoD Implementation Guide for Transitional PIV II SP 800-73 v1
National Industrial Security Program Operating Manual
DON Information Assurance Manual
DON Privacy Impact Assessment Format Guidance
DON Public Key Infrastructure Implementation Guidance
Privacy Act Program Update
DoD Health Information Privacy Regulation
Privacy Act of 1974
Related News
Join DON CIO, DCNO Information Warfare and the Deputy Commandant for Information for a Cybersecurity Awareness Month Discussion
DON IT Conference Schedule Now Available; Pre-Registration Closed
Privacy Tips
PII Breach Articles from CHIPS Magazine
DON Digital Signature and Encryption Policy for Emails Containing PII
View More
DON to Migrate to Use of Stronger Cryptographic Algorithms
Steps For Military Personnel to Take to Defend Against ID Theft
Rules for Handling PII by DON Contractor Support Personnel
SSNs to be Removed from Government ID Cards
DON SSN Reduction Plan
Unique DoD ID Replaces SSN
Elements of a Good Privacy Program (Part Two)
DoD Memo on PIV-I Credentials Released
Elements of a Good Privacy Program
DON Electronic Signature Policy Released
The Use of Recall Rosters
Top 10 PII Lessons Learned
Compliance Spot Checks Key to Successful Privacy Program
Theft of Storage Media Containing PII
Copier/Printer May Present Information Security Risks
Improper Disposal of HR Documents
Protect Your Personal Information: It's Valuable
Defending Cell Phones and PDAs Against Attack
Reducing the Use of SSNs is Key to Securing PII
Insider Threat
Reduce PII Loss by Proper Disposal/Sanitization of Unclass Equipment
What You Should Know About Identity Theft
Related CHIPS Magazine
NSWC Dahlgren Division Scientists and Engineers Develop Identity Dominance System Tech Refresh for Delivery to Global Fleet Despite Pandemic Challenges
NSA Year in Review
No Trust = More Security and More Usability: The Journey Toward Zero-Trust
COVID-Related Telework Accelerates DISA's Zero-Trust Adoption
Reminder: Join DISA's Virtual Experience 2020
View More
Vice Adm. Norton Shares DISA Drumbeat
DON CIO Wraps Up Cybersecurity Awareness Month Highlighting Featured Articles and Videos
FTC Requires Zoom to Enhance its Security Practices as Part of Settlement
DON IT Virtual Conference Sessions Now Available for Viewing On Demand
NIST Offers ‘Quick-Start’ Guide for Its Security and Privacy Safeguards Catalog
NSA Releases Cybersecurity Guidance “Selecting and Safely Using Multifactor Authentication Services”
FBI Announces Strategy to Combat Cyber Threats and Impose Greater Costs to Cyber Actors
Reminder: DoD CIO Hosts Second Annual Global Virtual Town Hall Meeting Aug 12
DoD Sees Enormous Jump in Telework, Remote Collaboration
Vice Adm. Norton outlines new cybersecurity model at Army Signal Conference
Army testing zero-trust environment amid cloud computing push
Artificial Intelligence Deployment Requires Diverse Image Data
DoD awards $154 million to Army-led flexible hybrid electronics program
A Message to the DON Community from the DON Chief Information Security Officer
DON CIO Aaron Weis Speaks at FedScoop's Cloud Together Summit
Modernize, Innovate and Defend Enabled by DON Data and Workforce
October 2020 Cybersecurity Awareness Month
Rear Adm. Kathleen M. Creighton, Navy Cyber Security Division Director, Office of the Chief of Naval Operations
“Cyber 9-Line” improves cybersecurity and enables election integrity
Digital Identity Guidelines: NIST Pre-Draft Call for Comments
NIST Offers Recommendation for Cryptographic Key Generation
Cyber Essentials
Registration Now Open for DON IT Conference, East Coast 2020
DoD Signs MOU with Cybersecurity Maturity Model Certification Accreditation Board
Getting Ready for Post-Quantum Cryptography
DCNO for Information Warfare and Fleet Cyber Command/10th Fleet Update Effective Use of Remote Work Options
NCIS: Beware of Online Sexual Exploitation of Children
NIST Publishes SP 800-57 Part 1, Revision 5, Recommendation for Crypto-Key Management
ARCYBERCOM: Use caution to avoid email extortion
DoD CIO FY20 Global Town Hall Postponed
NSWC PCD keeps Task Force New York connected with Expeditionary Carry-On Network
Teleworking? Use Collaboration Services More Securely, NSA says
DoD Cyber Crime Center Issues Threat Warning
U.S. Secret Service, FBI, federal agencies fight cyber threats
FBI Warns of Money Mule Schemes Exploiting the COVID-19 Pandemic
Distance Learning precautions to take for Children’s Privacy Protection
NCIS: Sailors, Marines, Civilians Beware of Card-Cracking Scams
Telework Tips from the National Cyber Security Alliance
NAVWAR Enterprise Delivers Innovative Solutions for Increased Readiness in Support of COVID-19 Relief Efforts
FTC Says Big Jump in Coronavirus-related Fraud
Save the Date: DON IT Conference, East Coast 2020, Rescheduled for Nov. 4-6
The 2020 United States Census – Is my Personal Information Safe?
The COVID-19 Impact on Modernize, Innovate and Defend
NIST Seeks Comments for Managing the Security of Mobile Devices
NIST Issues ‘Approaches for Federal Agencies to Use the Cybersecurity Framework’
The kids are home—what are they doing? U.S. Army says social media platforms offer children exciting, frightening encounters
NIST Seeks Comments for Final Draft of SP 800-53 Rev 5: Security and Privacy Controls for Information Systems and Organizations
View the DON CIO Keynote Luncheon Speech at WEST Conference
DoD's Cyber Strategy of Past Year Outlined Before Congress
NIST requests comments on SP 800-133 Rev 2, Recommendation for Cryptographic Key Generation
Vice Adm. Norton shares DISA’s commitment for 2020
Defense Department Adopts Ethical Principles for Artificial Intelligence
Government Agencies Warn of Coronavirus Scams
NIST’s National Cybersecurity Center of Excellence releases two draft practice guides to protect data integrity
A Very Important Patch
Assessing and Developing Information Security Continuous Monitoring Programs
Aaron Weis, Special Assistant to SECNAV for IM and DON CIO Discusses Quick-Wins and Long-Term Plans
Congratulations to the 2020 DON IM/IT Excellence Award Winners
DON Advises Active Duty Military and National Guard Members to Take Advantage of Free Electronic Credit Monitoring Services
Message to the DON Community from Aaron D. Weis, DON CIO
Modernize, Innovate, Defend
NCIS: Sailors, Marines, Civilians Beware of Tax Scams
NIST Releases Data to Help Measure Accuracy of Biometric Identification
New ‘lifesaving’ biometric system identifies friend from foe
DC3 Cyber Training Academy
Defense Innovation Board Recommends AI Ethical Guidelines
DISA Director Vice Adm. Nancy Norton Shares Drumbeat Update
The Need for a Cybersecurity Paradigm Shift
Cybersecurity: More than a Buzzword
Air Force Observes National Cybersecurity Awareness Month
NIST Invites Comments on Draft Recommendation for Cryptographic Key Management
Seven Steps to Reducing Your Cybersecurity Risk
Prevent Cyber-enabled Crime: Security Tips from the FBI
DON IM/IT Excellence Awards Nominations Extended to Dec. 13
National Cybersecurity Awareness Month: #BeCyberSmart
Newly Restructured DON CIO Provides Organizational Unity for IT and Cybersecurity
The Threat from Within
Assume Networks Are Compromised, DoD Official Urges
DoD Program Aims to Deter Insiders from Harmful Acts
NIST Asks for Feedback on Draft Privacy Framework, Designed to Work with its Cybersecurity Framework
Intelligence Agencies Launch National Insider Threat Awareness Month
DISA’s assured identity initiative featured on NBC News
DoD SAFE Now Available for File Transfer
Equifax to Pay $575 Million as Part of Settlement with FTC, CFPB, and States Related to 2017 Data Breach
Understanding Emerging Blockchain Identity Management Systems
Dr. Ray A. Letteer, Deputy Branch Head, Compliance Branch, Cybersecurity Section
Program Executive Officer for PEO EIS Ruth A. Youngs Lew
From Cloud First to Cloud Smart
Cyber Actors Fake 'Secure' Websites in Phishing Campaigns
Best Practices for Key Management Organizations
Marines evaluate biometric systems in tactical environment via Identity Intelligence Analytics Cell
DISA provides Public Key Infrastructure security for the mobile environment
DISA continues to explore alternative authentication processes
Improving Sailor data across all networks
DON IT Conference, East Coast 2019 Schedule Updated, Registration Closed
If you think you know everything about identity theft prevention — think again
NIST Threshold Cryptography Workshop 2019 Live Webcast
Is it really the IRS calling?
Related Resources
Safeguarding PII
Inventory of DON Systems With Completed Privacy Impact Assessments
The Privacy Impact Assessment Process, a.k.a. "The Gouge"
Privacy Frequently Asked Questions
Rules for Handling PII by DON Contractor Support Personnel
View More
PII Breach Reporting Resources
Privacy Training and Compliance Resources
Privacy Impact Assessment Resources
Take the DON Privacy Quiz!
SSN Reduction Plan Resources
Privacy Briefs
Personally Identifiable Information Posters
2014 PII Brief
Privacy Act System of Records Notices
Justification For The Use Of The SSN
Privacy Resources for Military Members and Their Families
Publically Accessible Website Privacy Resources (including Official DON Social Networking Sites)
How to Find Your DoD ID Number
Recommended Facebook Privacy Settings
SSN Reduction Frequently Asked Questions
How and When to Write a Privacy Act Statement
Privacy Act Resources
Fair Information Practices
Guidelines for Establishing a New Privacy Act System of Records Notice
Identifying Privacy Act Systems of Records You May Be Using
How to Obtain Military Personnel, Health, and Award Records
Privacy Act Exemptions
Sample Checklist for Conducting Privacy Act Assessment/Staff Visits
DoD Privacy Program Resources
How to Make a Privacy Act Request
Instructions for Using WinZip to Encrypt Files
Other Privacy Act Resources
PEO EIS Portal Procedures for Safeguarding PII
Privacy Act Desk Reference Guide
Privacy-Related OMB Memoranda
Disclosure Accounting Form (OPNAV 5211/9 (MAR 1992))
General Purpose Privacy Act Statement (OPNAV FORM 5211/12)
Methods for Hard Drive/Disk Destruction
Acceptable Use Criteria for Systems Collecting SSNs
Privacy Recommended Reading List
2012 Identity Theft Brief
OMB Information Collection Number
Privacy Information and Resources
Potential Consequences for Failing to Safeguard PII