HOME
POLICY & GUIDANCE
NEWS
FAQS
RSS FEEDS
Trending
Cybersecurity
Telecommunications
Spectrum
InfoSharing
BROWSE ALL TOPICS
Audit Readiness of IT Systems (3)
DIACAP (8)
IM/IT Strategy (29)
NGEN (19)
Awards (50)
DON Enterprise Architecture (31)
Information Assurance (51)
NMCI (27)
Business Case Analysis (9)
Enterprise Licensing Agreements (13)
Information Sharing (42)
Open Source (2)
CIO Authorities (72)
Enterprise Services (23)
IT Asset Management (12)
Personal Electronic Device (14)
Civil Liberties (21)
Enterprise Software Initiative (32)
IT Efficiencies (90)
Printing and Imaging (Copiers/MFDs) (18)
Clinger-Cohen Act Compliance (10)
FISMA (4)
IT Expenditure Approval Authority (12)
Privacy (292)
Cloud Computing (37)
Forms/Reports (11)
IT Governance (32)
Public Key Infrastructure (10)
Common Access Card (6)
Freedom of Information Act (25)
IT Infrastructure (12)
Records Management (30)
Cybersecurity (309)
Functional Area Manager (6)
IT Investment Management (47)
Section 508 (9)
Cyberspace/IT Workforce (40)
GIG Standards (12)
IT Portfolio Management (3)
Social Media (27)
DADMS/DITPR-DON (26)
Governance (11)
Knowledge Management (28)
Spectrum (86)
Data at Rest (5)
Green IT (6)
Naval Enterprise Networks (32)
Telecommunications (62)
Data Center Consolidation (34)
Identity Management (91)
Naval Networking Environment (8)
Wireless (66)
Data Strategy (18)
DON Public Key Infrastructure Implementation Guidance
DTG 061525Z OCT 04 - Publish Date: 10/08/04
download PDF
This Naval message provides amplifying public key infrastructure implementation guidance.
TAGS:
Cybersecurity
,
IDManagement
,
PKI
,
Privacy
Related Policy
Destruction of Electronic Storage Media
Authorized Telework Capabilities and Guidance
Force Health Protection Guidance (Supplement 8) - DoD Guidance for Protecting Personnel in Workplaces during the Response to the Coronavirus Disease 2019 Pandemic
DON Privacy Program
Update to DoD CIO Memorandum on Commercial Public Key Infrastructure Certificates on Public-Facing DoD Websites
View More
DoD Privacy Impact Assessment Guidance
Federal Acquisition Regulation; Basic Safeguarding of Contractor Information Systems
Improving Critical Infrastructure Cybersecurity
Processing of Electronic Storage Media for Disposal
Reduction of SSN Use Within DoD
DON Public Affairs Policy and Regulations
DITPR-DON Process Guidance v1.0
Updated Plan to Remove Social Security Numbers from DoD Identification Cards
Safeguarding Personally Identifiable Information (PII)
Safeguarding Personally Identifiable Information
Safeguarding Personally Identifiable Information
DON Privacy Impact Assessment Guidance
DON Personally Identifiable Information Training Requirement
DON Policy Updates for Use of NIPRNET Public Key Infrastructure Software Certificates
DON Policy Updates for Personal Electronic Devices Security and Application of Email Signature and Encryption
DON Personally Identifiable Information Annual Training Policy
Safeguarding Personally Identifiable Information from Unauthorized Disclosure
Safeguarding Personally Identifiable Information
Recall Rosters
DoD and DON Privacy Impact Assessment Guidance
DoD-Wide Digital Signature Interoperability
DoD Implementation Guide for Transitional PIV II SP 800-73 v1
National Industrial Security Program Operating Manual
DON Information Assurance Manual
DON Privacy Impact Assessment Format Guidance
Privacy Act Program Update
DoD Health Information Privacy Regulation
Privacy Act of 1974
Related News
DON IT Excellence Awards Nominations Deadline Extended; Next DON IT Conference to be held in May 2021
Congratulations to the 2020 DON IM/IT Excellence Award Winners
Cybersecurity Awareness Month - Week 3
Cybersecurity Awareness Month - Week 2
Join DON CIO, DCNO Information Warfare and the Deputy Commandant for Information for a Cybersecurity Awareness Month Discussion
View More
Cybersecurity Awareness Month - Week 1
Call for Nominations: 2021 DON IT Excellence Awards
Modernize, Innovate, and Defend Enabled by DON Data and Workforce
DON IT Conference, East Coast 2020 to be Held Virtually
A Message to the DON Community from Christopher P. Cleary, DON Chief Information Security Officer
DON IT Conference West Coast 2020 by the Numbers
The COVID-19 Impact on Modernize, Innovate and Defend
Navy Collaboration Tools Available
COVID-19/Telework Information
Save the Date: DON IT Conference, East Coast 2020, Rescheduled for Nov. 4-6
A Message to the DON Community from Aaron D. Weis, DON CIO
DON CIO Discusses Leadership Change
DON IT Conference, East Coast 2020 Cancelled
Congratulations to the 2020 DON IM/IT Excellence Award Winners
DON IT Conference Schedule Now Available; Pre-Registration Closed
DON IM/IT Excellence Awards Nominations Deadline Extended to Dec. 13
Twelve PII Lessons Learned
DON IT Conference Presentations Available
DON IT Conference, East Coast 2019 Descriptive Schedule Available
2019 DON IM/IT Excellence Award Winners
DON IT Conference Walk-in Registration
DON CIO Remains Focused on DON IM/IT policy and Governance Oversight
DON IT Conference Presentations Available
Privacy Tips
Deadline Extended - DON IM/IT Excellence Awards Nominations Due Nov. 27
Five Ways to be Cyber Secure at Work
Simple Steps to Online Safety
PII Breach Articles from CHIPS Magazine
DON CIO Awards Recognize Information Management and Information Technology Excellence
DON CIO Congratulates 2016 DON IM/IT Award Winners
SSN Reduction Related Articles from CHIPS Magazine
Customize Your Email to Make Signing/Encrypting Messages Easier
The Time for Digital Spring Cleaning is Now!
Secure Your Social Media Presence
Using Blind Copy Feature Protects PII
No Loss of PII Reported in OPM Network Breach
Don't Get Hooked By Spear Phishing
DoD ID Number Authorized as Substitute for SSN
DoD to Cease Issuance of Software PKI Certificates to FVEY Partner Nations
Supervisor Sends PII Without Encrypting Email
DON Digital Signature and Encryption Policy for Emails Containing PII
DON to Migrate to Use of Stronger Cryptographic Algorithms
Steps For Military Personnel to Take to Defend Against ID Theft
Rules for Handling PII by DON Contractor Support Personnel
SSNs to be Removed from Government ID Cards
To Err is Human: Human Error is Main Cause of PII Breaches
DON SSN Reduction Plan
Unique DoD ID Replaces SSN
Elements of a Good Privacy Program (Part Two)
DoD Memo on PIV-I Credentials Released
Elements of a Good Privacy Program
DON Electronic Signature Policy Released
The Use of Recall Rosters
Top 10 PII Lessons Learned
DON Current and Future PKI and PKE Activities
Your Office Copier/Printer May Present Information Security Risks
Identity Management Operations to Improve Cybersecurity
Protecting PII on Removable Storage Devices
Compliance Spot Checks Key to Successful Privacy Program
Theft of Storage Media Containing PII
Web 2.0: Federal CIO Council Releases Guidelines for Secure Use of Social Media
PII and Records Management
Copier/Printer May Present Information Security Risks
Improper Disposal of HR Documents
Protect Your Personal Information: It's Valuable
Defending Cell Phones and PDAs Against Attack
Un-Encrypted Email With NSPS Information
Reducing the Use of SSNs is Key to Securing PII
Insider Threat
DON Enterprise Data At Rest Solution For All Non-NMCI Assets Is Awarded
Reduce PII Loss by Proper Disposal/Sanitization of Unclass Equipment
Action Steps for Identity Theft Victims
What You Should Know About Identity Theft
Privacy Must be Considered When Using Web 2.0 Tools
GSA Awards BPA for Credit Monitoring Services
Safeguarding PII on the Command Shared Drive
Reduce PII in Electronic and Paper Files
Why Peer-to-Peer File Sharing Is Not a Good Idea
Handbook Provides Cyber Crime Prevention Tips
Guidance Updated for DAR Compliance Effort on Non-NMCI Networks
Don't Get Caught by Phishing
Secure Those Laptops
Information Privacy Professional Certification Available
PII Has No Shelf Life
Use Caution With Wi-Fi
Web Site Postings of PII
Related CHIPS Magazine
NSA Year in Review
DoD Consolidates IT Services to Improve Efficiency
COVID-Related Telework Accelerates DISA's Zero-Trust Adoption
Reminder: Join DISA's Virtual Experience 2020
Vice Adm. Norton Shares DISA Drumbeat
View More
DON CIO Wraps Up Cybersecurity Awareness Month Highlighting Featured Articles and Videos
FTC Requires Zoom to Enhance its Security Practices as Part of Settlement
DON IT Virtual Conference Sessions Now Available for Viewing On Demand
NIST Proposes Update to Personal Identity Verification Standard for Federal Employees and Contractors
NIST Offers ‘Quick-Start’ Guide for Its Security and Privacy Safeguards Catalog
DoD Issues New Data Strategy
Congratulations to the 2020 DON IM/IT Excellence Award Winners
Department of the Navy Data Security and Protection
DON IT Conference Successfully Goes Virtual for First Time
Securing LinkedIn — Protecting Your Professional Online Presence
The Use of Rosters Containing Personally Identifiable Information
NSA Releases Cybersecurity Guidance “Selecting and Safely Using Multifactor Authentication Services”
FBI Announces Strategy to Combat Cyber Threats and Impose Greater Costs to Cyber Actors
Growing a Workforce to Mitigate Privacy Risk
Army researchers earn patent for secure communications authentication
DoD Leaders Provide Digital Modernization Updates
Zero Trust Architecture: NIST Publishes SP 800-207
Reminder: DoD CIO Hosts Second Annual Global Virtual Town Hall Meeting Aug 12
DoD Sees Enormous Jump in Telework, Remote Collaboration
Vice Adm. Norton outlines new cybersecurity model at Army Signal Conference
Army testing zero-trust environment amid cloud computing push
Artificial Intelligence Deployment Requires Diverse Image Data
DoD awards $154 million to Army-led flexible hybrid electronics program
A Message to the DON Community from the DON Chief Information Security Officer
DON CIO Aaron Weis Speaks at FedScoop's Cloud Together Summit
Long-Term Teleworking and Privacy Concerns
Modernize, Innovate and Defend Enabled by DON Data and Workforce
October 2020 Cybersecurity Awareness Month
Rear Adm. Kathleen M. Creighton, Navy Cyber Security Division Director, Office of the Chief of Naval Operations
Transforming the Naval Network Experience
“Cyber 9-Line” improves cybersecurity and enables election integrity
Digital Identity Guidelines: NIST Pre-Draft Call for Comments
Intelligence Community CIO John Sherman on Being an Effective Senior Leader
NIST Offers Recommendation for Cryptographic Key Generation
Cyber Essentials
Registration Now Open for DON IT Conference, East Coast 2020
DoD Signs MOU with Cybersecurity Maturity Model Certification Accreditation Board
Getting Ready for Post-Quantum Cryptography
NAVSUP BSC Examines IT Requirements to Shape Future Force
NIST Study Measures Performance Accuracy of Contactless Fingerprinting Technologies
DCNO for Information Warfare and Fleet Cyber Command/10th Fleet Update Effective Use of Remote Work Options
NCIS: Beware of Online Sexual Exploitation of Children
NIST Publishes SP 800-57 Part 1, Revision 5, Recommendation for Crypto-Key Management
ARCYBERCOM: Use caution to avoid email extortion
DoD CIO FY20 Global Town Hall Postponed
NSWC PCD keeps Task Force New York connected with Expeditionary Carry-On Network
Teleworking? Use Collaboration Services More Securely, NSA says
DoD Cyber Crime Center Issues Threat Warning
U.S. Secret Service, FBI, federal agencies fight cyber threats
FBI Warns of Money Mule Schemes Exploiting the COVID-19 Pandemic
Distance Learning precautions to take for Children’s Privacy Protection
NCIS: Sailors, Marines, Civilians Beware of Card-Cracking Scams
Telework Tips from the National Cyber Security Alliance
NAVWAR Enterprise Delivers Innovative Solutions for Increased Readiness in Support of COVID-19 Relief Efforts
Final: Guidance for Cryptographic Standards in the Federal Government: Cryptographic Mechanisms
FTC Says Big Jump in Coronavirus-related Fraud
NIST Hosts Virtual Event for Implementing Privacy Controls for Information Systems and Organizations
Protecting your digital footprint
Save the Date: DON IT Conference, East Coast 2020, Rescheduled for Nov. 4-6
The 2020 United States Census – Is my Personal Information Safe?
The COVID-19 Impact on Modernize, Innovate and Defend
NIST Seeks Comments for Managing the Security of Mobile Devices
NIST Issues ‘Approaches for Federal Agencies to Use the Cybersecurity Framework’
The kids are home—what are they doing? U.S. Army says social media platforms offer children exciting, frightening encounters
NIST Seeks Comments for Final Draft of SP 800-53 Rev 5: Security and Privacy Controls for Information Systems and Organizations
View the DON CIO Keynote Luncheon Speech at WEST Conference
DoD's Cyber Strategy of Past Year Outlined Before Congress
DISA is Piloting Systems Security Analyst No-cost Courses in the National Capital Region Open to all DoD Personnel
NIST requests comments on SP 800-133 Rev 2, Recommendation for Cryptographic Key Generation
Vice Adm. Norton shares DISA’s commitment for 2020
Defense Department Adopts Ethical Principles for Artificial Intelligence
Government Agencies Warn of Coronavirus Scams
NIST’s National Cybersecurity Center of Excellence releases two draft practice guides to protect data integrity
Building Secure Microservices-Based Applications Using Service-Mesh Architecture
DISA Defending, Improving DoD Network, Director Says
A Very Important Patch
Assessing and Developing Information Security Continuous Monitoring Programs
Aaron Weis, Special Assistant to SECNAV for IM and DON CIO Discusses Quick-Wins and Long-Term Plans
Congratulations to the 2020 DON IM/IT Excellence Award Winners
DISA renews anti-virus software license agreement helping teleworkers keep machines safe at home
DON Advises Active Duty Military and National Guard Members to Take Advantage of Free Electronic Credit Monitoring Services
DON CIO Discusses Leadership Change
DON CIO Issues COVID-19 Updates, Telework Information & Resources
DON CIO Releases Information Superiority Vision
DON IT Conference Schedule Now Available
Message to the DON Community from Aaron D. Weis, DON CIO
Modernize, Innovate, Defend
NCIS: Sailors, Marines, Civilians Beware of Tax Scams
Cybersecurity checklist for internet-connected toys
NIST Releases Data to Help Measure Accuracy of Biometric Identification
NIST’s Light-Sensing Camera May Help Detect Extraterrestrial Life, Dark Matter
Start a conversation about cybersecurity
New ‘lifesaving’ biometric system identifies friend from foe
DC3 Cyber Training Academy
Identity Management & Access Control in Multiclouds Workshop and Conference
Defense Innovation Board Recommends AI Ethical Guidelines
DISA Director Vice Adm. Nancy Norton Shares Drumbeat Update
FTC Warns of SIM Swap Scams
The Need for a Cybersecurity Paradigm Shift
Attention Developers: NIST to Host Open Security Controls Assessment Language Workshops
Cybersecurity: More than a Buzzword
Air Force Observes National Cybersecurity Awareness Month
NIST Invites Comments on Draft Recommendation for Cryptographic Key Management
Seven Steps to Reducing Your Cybersecurity Risk
Learn to Reduce Online Threats During Cybersecurity Month at NSA Souda Bay, Greece
NIST Releases Draft NISTIR 8267: Security Review of Consumer Home IoT Products
Prevent Cyber-enabled Crime: Security Tips from the FBI
DON IM/IT Excellence Awards Nominations Extended to Dec. 13
National Cybersecurity Awareness Month: #BeCyberSmart
Newly Restructured DON CIO Provides Organizational Unity for IT and Cybersecurity
The Threat from Within
Assume Networks Are Compromised, DoD Official Urges
DoD Program Aims to Deter Insiders from Harmful Acts
NIST Asks for Feedback on Draft Privacy Framework, Designed to Work with its Cybersecurity Framework
Intelligence Agencies Launch National Insider Threat Awareness Month
Social Media Security: Tips from an Army Special Agent
DISA’s assured identity initiative featured on NBC News
DoD SAFE Now Available for File Transfer
DoD Secure Access File Exchange achieves Initial Operating Capability
Army Developing New Wearable Authentication for Secure Network Access
FTC Imposes $5 Billion Penalty and Sweeping New Privacy Restrictions on Facebook
Equifax to Pay $575 Million as Part of Settlement with FTC, CFPB, and States Related to 2017 Data Breach
Securing Web Transactions: TLS Server Certificate Management
Understanding Emerging Blockchain Identity Management Systems
Dr. Ray A. Letteer, Deputy Branch Head, Compliance Branch, Cybersecurity Section
Lost or Stolen Credit, ATM, and Debit Cards – What’s My Liability?
Program Executive Officer for PEO EIS Ruth A. Youngs Lew
Before Connecting an IoT Device, Read the New NIST Report for Cybersecurity Advice
Managing IoT Cybersecurity and Privacy Risks
From Cloud First to Cloud Smart
Global City Teams Challenge Smart and Secure City Expo Convenes July 10-12 in Washington, D.C.
Cyber Actors Fake 'Secure' Websites in Phishing Campaigns
Best Practices for Key Management Organizations
Marines evaluate biometric systems in tactical environment via Identity Intelligence Analytics Cell
DISA provides Public Key Infrastructure security for the mobile environment
DISA continues to explore alternative authentication processes
Improving Sailor data across all networks
Navy to Showcase Innovative Information Warfare Capabilities at the Navy Information Warfare Pavilion at Sea-Air-Space 2019
NIST Requests Information on Artificial Intelligence Technical Standards and Tools
Purebred: DISA’s modern mobile security solution
DON IT Conference, East Coast 2019 Schedule Updated, Registration Closed
Protect your privacy from risks associated with mobile device apps
Twelve PII Lessons Learned
NIST Issues Two Cryptography Key Management Updates
If you think you know everything about identity theft prevention — think again
NIST Threshold Cryptography Workshop 2019 Live Webcast
Is it really the IRS calling?
NIST Announces Attribute Considerations for Access Control Systems
Let’s talk about IoT device security
NIST Reveals 26 Algorithms Advancing to the Post-Quantum Crypto ‘Semifinals’
New Strategy Encourages Innovation, Better Intel Sharing
Reminder from DON OCIO: Users Must Make Changes to CAC Certificates
Related Resources
Inventory of DON Systems With Completed Privacy Impact Assessments
Featured Articles: Oct - Dec 2020
The Internet of Things
5 Steps to Protecting Your Digital Home
A How-To-Guide For Multi-Factor Authentication
View More
Be Cybersmart on Identity Theft and Internet Scams
Be Cybersmart on Password Security
Cybersecurity Awareness Month Word Puzzles - Week 2
Be Cybersmart on Cybersecurity While Traveling
Be Cybersmart on Online Privacy
Be Cybersmart on Phishing
Be Cybersmart on Social Media Cybersecurity
Phishing Warfare Executive Handout
DON Deputy CIO (Navy) COVID-19 Resources
Privacy Protection of COVID-19 Information
Telework Dos and Don't
NAVADMIN Effective Use of Remote Work Options
Dial-In Numbers for DON IT Conference, West Coast 2020 Sessions
Safeguarding PII
Label for CDs Containing PII
Featured Articles: Oct - Dec 2018
The NEW PIA "Gouge"
Privacy Frequently Asked Questions
Rules for Handling PII by DON Contractor Support Personnel
Featured Articles: July - Sept 2018
PII Breach Reporting Resources
DON Users Guide to Personally Identifiable Information
Featured Articles: Jan - Mar 2018
Privacy Training and Compliance Resources
DON CIO Frequently Asked Questions
DoD Privacy Impact Assessment Template
Privacy Impact Assessment Resources
Featured Articles: July - Sept 2017
Take the DON Privacy Quiz!
SSN Reduction Plan Resources
Privacy Briefs
Personally Identifiable Information Posters
2014 PII Brief
Privacy Act System of Records Notices
Justification For The Use Of The SSN
Privacy Resources for Military Members and Their Families
Publically Accessible Website Privacy Resources (including Official DON Social Networking Sites)
How to Find Your DoD ID Number
Department of the Navy Personally Identifiable Information Sample Compliance Spot Checklist
Recommended Facebook Privacy Settings
SSN Reduction Frequently Asked Questions
How and When to Write a Privacy Act Statement
Privacy Act Resources
Fair Information Practices
Guidelines for Establishing a New Privacy Act System of Records Notice
Identifying Privacy Act Systems of Records You May Be Using
How to Obtain Military Personnel, Health, and Award Records
Privacy Act Exemptions
Sample Checklist for Conducting Privacy Act Assessment/Staff Visits
DoD Privacy Program Resources
How to Make a Privacy Act Request
Instructions for Using WinZip to Encrypt Files
Other Privacy Act Resources
PEO EIS Portal Procedures for Safeguarding PII
Privacy Act Desk Reference Guide
Privacy-Related OMB Memoranda
Disclosure Accounting Form (OPNAV 5211/9 (MAR 1992))
General Purpose Privacy Act Statement (OPNAV FORM 5211/12)
Methods for Hard Drive/Disk Destruction
Acceptable Use Criteria for Systems Collecting SSNs
Privacy Recommended Reading List
2012 Identity Theft Brief
OMB Information Collection Number
BUPERS Safeguarding PII Presentation
Privacy Information and Resources
Reporting PII Breach Notifications
Potential Consequences for Failing to Safeguard PII
DON Cyber Crime Handbook