HOME
POLICY & GUIDANCE
NEWS
FAQS
RSS FEEDS
Trending
Cybersecurity
Telecommunications
Spectrum
InfoSharing
BROWSE ALL TOPICS
Audit Readiness of IT Systems (3)
DIACAP (8)
IM/IT Strategy (29)
NGEN (19)
Awards (50)
DON Enterprise Architecture (31)
Information Assurance (51)
NMCI (27)
Business Case Analysis (9)
Enterprise Licensing Agreements (13)
Information Sharing (42)
Open Source (2)
CIO Authorities (72)
Enterprise Services (23)
IT Asset Management (12)
Personal Electronic Device (14)
Civil Liberties (21)
Enterprise Software Initiative (32)
IT Efficiencies (90)
Printing and Imaging (Copiers/MFDs) (18)
Clinger-Cohen Act Compliance (10)
FISMA (4)
IT Expenditure Approval Authority (12)
Privacy (292)
Cloud Computing (37)
Forms/Reports (11)
IT Governance (32)
Public Key Infrastructure (10)
Common Access Card (6)
Freedom of Information Act (25)
IT Infrastructure (12)
Records Management (30)
Cybersecurity (309)
Functional Area Manager (6)
IT Investment Management (47)
Section 508 (9)
Cyberspace/IT Workforce (40)
GIG Standards (12)
IT Portfolio Management (3)
Social Media (27)
DADMS/DITPR-DON (26)
Governance (11)
Knowledge Management (28)
Spectrum (86)
Data at Rest (5)
Green IT (6)
Naval Enterprise Networks (32)
Telecommunications (62)
Data Center Consolidation (34)
Identity Management (91)
Naval Networking Environment (8)
Wireless (66)
Data Strategy (18)
Print
Email
Other Privacy Act Resources
By DON CIO Privacy Team - Published, September 15, 2010
The following additional resources are provided:
NARA General Records Schedule 14 - Information Services Records (Records and Retention Periods)
DON FOIA Office Home Page
E-Government Act of 2002
Federal Information Security Management Act of 2002
Standard Navy Distribution List (SNDL) OPNAVNOTE 5400
DON Navy Records Management Manual SECNAV M-5210.1 November 2007 (rev)
CNO DNS-36 Memorandum, Recall Rosters, 7 Sep 2006
TAGS:
FISMA
,
FOIA
,
IA
,
IDManagement
,
InfoSharing
,
Privacy
Related Policy
DON Privacy Program
DoD Privacy Impact Assessment Guidance
DON Implementation of FOIAonline
Processing of Electronic Storage Media for Disposal
Reduction of SSN Use Within DoD
View More
DON FOIA, Privacy and Civil Liberties Programs
DON Public Affairs Policy and Regulations
DITPR-DON Process Guidance v1.0
Updated Plan to Remove Social Security Numbers from DoD Identification Cards
Safeguarding Personally Identifiable Information (PII)
Safeguarding Personally Identifiable Information
DON Privacy Impact Assessment Guidance
Safeguarding Personally Identifiable Information from Unauthorized Disclosure
Safeguarding Personally Identifiable Information
Recall Rosters
DoD Implementation Guide for Transitional PIV II SP 800-73 v1
National Industrial Security Program Operating Manual
DON Information Assurance Manual
DON Privacy Impact Assessment Format Guidance
DON Public Key Infrastructure Implementation Guidance
Privacy Act Program Update
DoD Health Information Privacy Regulation
Privacy Act of 1974
Related News
Join DON CIO, DCNO Information Warfare and the Deputy Commandant for Information for a Cybersecurity Awareness Month Discussion
DON IT Conference Schedule Now Available; Pre-Registration Closed
DON IT Community Recognizes IT Advances, Excellence and Professionalism in the Fleet
Privacy Tips
Deadline Extended - DON IM/IT Excellence Awards Nominations Due Nov. 27
View More
PII Breach Articles from CHIPS Magazine
SECNAV M-5000.3 Provides Guidance for Timely Response to Documentary Material Requests
DON CIO Awards Recognize Information Management and Information Technology Excellence
DON CIO Congratulates 2016 DON IM/IT Award Winners
DON to Implement FOIAonline
Data as a Critical DON Asset
Streamlining DON Business Processes for a More Effective and Efficient Future
DON Digital Signature and Encryption Policy for Emails Containing PII
DON to Migrate to Use of Stronger Cryptographic Algorithms
Steps For Military Personnel to Take to Defend Against ID Theft
Rules for Handling PII by DON Contractor Support Personnel
SSNs to be Removed from Government ID Cards
DON SSN Reduction Plan
Unique DoD ID Replaces SSN
Elements of a Good Privacy Program (Part Two)
DoD Memo on PIV-I Credentials Released
Elements of a Good Privacy Program
DON Electronic Signature Policy Released
The Use of Recall Rosters
Top 10 PII Lessons Learned
Compliance Spot Checks Key to Successful Privacy Program
Theft of Storage Media Containing PII
Copier/Printer May Present Information Security Risks
Improper Disposal of HR Documents
Protect Your Personal Information: It's Valuable
Defending Cell Phones and PDAs Against Attack
Reducing the Use of SSNs is Key to Securing PII
Insider Threat
Reduce PII Loss by Proper Disposal/Sanitization of Unclass Equipment
What You Should Know About Identity Theft
Privacy Must be Considered When Using Web 2.0 Tools
Related CHIPS Magazine
DON Establishes DevSecOps Task Force
MCTSSA establishes cyber ‘Blue Team’ designation
NSA Recommends How Enterprises Can Securely Adopt Encrypted DNS
DISA says continuous improvement requires continuous planning
NSA Year in Review
View More
What a Year for the JAIC – Looking back at 2020
Hardware-Enabled Security: Container Platform Security Prototype in Cloud Environments
New NIST Report: Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management
Defense Department Reinforces National Space Policy
US and Australia sign first-ever cyber agreement to develop virtual training range
7 Nations Deepen Science and Technology Cooperation To Preserve Safe, Stable and Secure Polar Regions
NSA Cybersecurity Alert: Russian State-Sponsored Malicious Cyber Actors Exploit Known Vulnerability in Virtual Workspaces
COVID-19 Draws Attention to Defense Industrial Base Vulnerabilities
Estonia, U.S. Conduct Joint Defensive Cyber Operation
NGA Deputy Discusses Technology in Government at Cyber Summit
COVID-Related Telework Accelerates DISA's Zero-Trust Adoption
NIST to Host DevSecOps and Zero Trust Architecture for Multi-Cloud Environments Event
Reminder: Join DISA's Virtual Experience 2020
Uncase the Colors: 1st Network Battalion Is Born
NSA’s Tech Transfer Team Wins Top DoD Award
Army releases industry request for proposal to support next-generation cryptographic device
CIWT Domain’s Cyber Threat Intelligence Analyst Course Ready for Prime Time
No ‘easy-button’ in Army modernization, says G-8
Vice Adm. Norton Shares DISA Drumbeat
DON CIO Wraps Up Cybersecurity Awareness Month Highlighting Featured Articles and Videos
FTC Requires Zoom to Enhance its Security Practices as Part of Settlement
Hack The Army 3.0 furthers innovative bug bounty program to defend networks, data
DON IT Virtual Conference Sessions Now Available for Viewing On Demand
MARADMIN 664/20: Implementation of DODI 5200.48, Controlled Unclassified Information
Be Cyber Smart. All The Time.
Army Software Readiness
IWTC Virginia Beach Sailor Trains Warfighters, DoD Civilians
NIST Offers ‘Quick-Start’ Guide for Its Security and Privacy Safeguards Catalog
NSWCDD Dam Neck Activity Change of Command Highlights Teamwork and ‘War Winning Capability” for the Fleet
Army Cyber Protection Brigade welcomes new commander
NIST Security Guidelines for Storage Infrastructure: Special Publication 800-209
The Threat from Within
Army launches software repository for faster, easier cyber patching
Hon Dana Deasy and General Paul M. Nakasone Deliver a Video Message for National Cybersecurity Awareness Month
Air Force’s Spectrum Management Office officially transfers to ISR and Cyber Effects Operations staff to continue to integrate ‘information warfare’
National Initiative for Cybersecurity Education Conference and Expo Virtual Conference Series
NSA/CSS Senior Enlisted Leader: The First Line of Defense in Cybersecurity
Common Forms of Social Engineering
DoD Releases 2020 Military Intelligence Program Budget
NSA Warns Chinese State-Sponsored Malicious Cyber Actors Exploiting 25 CVEs
The Army’s Only Cyber Warfare Battalion Confirms Training Program
USCYBERCOM: It’s Everyone’s Job to Ensure Cybersecurity at Work
DoD Official Outlines Space Strategy
AI/ML Models to Resolve Complex Financial Errors
Make cybersecurity part of our DNA
Spectrum Supportability Requirements for Spectrum-Dependent Equipment Certification
Army Cyber Command celebrates decade of service
If You Connect It, Protect It: A Live Hacking Demo
MARADMIN 581/20 NATIONAL CYBERSECURITY AWARENESS MONTH
Advancing the DON Information Superiority Vision
Congratulations to the 2020 DON IM/IT Excellence Award Winners
DON IT Conference Successfully Goes Virtual for First Time
Fleet Cyber Readiness: Cyber Operational Response Procedures
Operation CATTLE DRIVE
Securing LinkedIn — Protecting Your Professional Online Presence
National Security Agency launches the Center for Cybersecurity Standards
NSWC Corona to Host ‘Industry Day’ Networking Event for Business Owners, Entrepreneurs Oct. 14
NSA Releases Cybersecurity Guidance “Selecting and Safely Using Multifactor Authentication Services”
JAIC Mission Initiative in the Spotlight: Joint Information Warfare
NASA, US Space Force Establish Foundation for Broad Collaboration
Commitment in the Face of Adversity: IWTC Monterey Sailor Earns a Second Chance
DoD Personnel Proving Productive, Resilient During Pandemic
Army’s Project Convergence aims to accelerate change in modernization efforts
JAIC facilitates first-ever International AI Dialogue for Defense
FBI Announces Strategy to Combat Cyber Threats and Impose Greater Costs to Cyber Actors
Technology Proliferation, Influence Ops May Be as Disruptive as COVID-19
Sailors Helping Sailors: IWTC Monterey Student Mentors Provide Guidance to Peers
The Cutting Edge of Defense
Esper Says Artificial Intelligence Will Change the Battlefield
IWTC San Diego Trains and Prepares International Partners
Joint Artificial Intelligence Center’s JCF Aspires to Lead in Continuous Monitoring
Headquarters dedication heralds arrival of Army Cyber operations at Fort Gordon
Marine Corps Activates Network Activity - National Capital Region to Provide Unity of Command and Effort to the Enterprise Network
Navy College Virtual Education Center Resumes Normal Operations Through Enhanced Technology
NSA, National Cryptologic Museum Foundation Reveal Design Plans for State-of-the-Art Cyber Center for Education and Innovation
Agency Awards Contracts to Enable Data Transfer from Space
CISA, International Agencies, Reveal Common Missteps in Cyber Incident Response
NAVWAR Hosts Virtual Town Hall to Support Inclusive Work Environment
Navy's First Reserve Cyber Defense Unit Brings Reinforcements to Newest Fight
IWTC Virginia Beach’s NIOBC Prepares Naval Intelligence Officers to Fight and Win
National Background Investigative System Directorate deploys Develop, Security, Operations pipeline
CISA, TREASURY, FBI AND USCYBERCOM RELEASE CYBER ALERT ON LATEST NORTH KOREA BANK ROBBING SCHEME
NISTIR 8272 — Analysis Tool for Independent Cyber Supply Chain Risks
Army announces its service component command for U.S. Space Command
DISA expands Provisional Authorization for Microsoft Azure
Marine Corps to Build Innovative Wargaming Center
NIST Releases Pub to Mitigate Cloud Computing Forensic Science Challenges
Army embraces resilience as cybersecurity strategy
DoD Focuses on Minimizing Cyber Threats to Department, Contractors
Commercial waveforms provide flexibility for the Army’s Manpack radios
Army assesses Soldier-to-Soldier communications resiliency during annual Network Modernization Experiment
Reminder: DoD CIO Hosts Second Annual Global Virtual Town Hall Meeting Aug 12
Space Force awards National Security Space Launch Phase 2 launch service contracts to ULA, SpaceX
NSA Releases Guidance on How Mobile Device Users Can Limit Their Location Data Exposure
NIST Control Baselines for Information Systems and Organizations Draft Open for Comment
More companies enter Advanced Battle Management Systems innovation pipeline
DISA team to deploy enhanced Web Conference 2.2 for NIPR and SIPR
Why National Security, History, Organizations and Missions Matter to IW Sailors
DoD Sees Enormous Jump in Telework, Remote Collaboration
Space Force begins transition into field organizational structure
Army Cyber Command ceremony heralds its arrival at new headquarters at Fort Gordon
CISA hires top cybersecurity experts in response to IT infrastructure risk
New discovery robustly screens cyberattacks
Vice Adm. Norton outlines new cybersecurity model at Army Signal Conference
Army testing zero-trust environment amid cloud computing push
FTC reports charities fraud in donations to USS Bonhomme Richard Sailors
NIST Releases Security Guidelines for Storage Infrastructure – an often overlooked component of IT Security
NSWC Dahlgren Engineer Attributes Award Win to ‘Hackers-for-Good’ Cyber Team
Army’s network, communication and cloud capabilities postured for quick data delivery
Artificial Intelligence Deployment Requires Diverse Image Data
Cybersecurity for 2020 Elections a Top DoD Priority, General Says
DoD awards $154 million to Army-led flexible hybrid electronics program
Naval Logistics Library Update Expands Access to Publications
NSA Teams with NCSC, CSE, DHS CISA to Expose Russian Intelligence Services Targeting COVID-19 Researchers
Updates to Workforce Framework for Cybersecurity
USSPACECOM adds Portugal – a strategic NATO Ally – to Space Situational Data Sharing cadre
DISA Boosts Telework Connections in Response to Pandemic
Cybersecurity Experts Provide Remote Work Best Practices
IWTC San Diego Incorporates Remote Instruction into Information Warfare Training
Defense Manufacturing Supply Chain Ensures Economic Prosperity and National Security
5G Breakout Session Open for Registration at DON IT Virtual Conference - Nov 5
A Message to the DON Community from the DON Chief Information Security Officer
Creating a Cyber Secure Home
Cybersecurity Awareness Month: The Future of Connected Devices in the Department of the Navy
DON CIO Aaron Weis Speaks at FedScoop's Cloud Together Summit
Join DON CIO, DCNO Information Warfare and the Deputy Commandant for Information for a Cybersecurity Awareness Month Discussion
Jupiter: Bringing the Power of Data Analytics to the DON
Modernize, Innovate and Defend Enabled by DON Data and Workforce
National Cybersecurity Awareness Month: Defending Against Cyber Attacks at Work and at Home
Navy Data Platform Aligns, Accelerates Supply-Chain Analytics
October 2020 Cybersecurity Awareness Month
Rear Adm. Kathleen M. Creighton, Navy Cyber Security Division Director, Office of the Chief of Naval Operations
Registration Now Open for DON IT Conference East Coast 2020 Virtual Event
THE FUTURE IS NOW: Marines’ Partnerships Achieve 5G connection
The most famous spectrum quote
Work Effectiveness Is a Product, Not a Location, DoD Official Says
NAVSUP BSC Solution Improves Contract Delivery Tracking
Army researchers augment combat vehicles with Artificial Intelligence for multidomain operations
First-ever Distributed Coalition Warrior Interoperability eXercise Successfully Concludes
Protecting America's Global Positioning System
NUWC Division Newport taps into digital tools to stay connected to workforce
Marine Corps Activates New Battalion to Fight in Cyberspace
NCDOC Wins a Federal Capture-The-Flag Competition
Army researchers take proactive approach to cybersecurity
Cybersecurity Expert Discusses DoD's Role in National Security
IT Experts Discuss DoD's Use of Digital Communications
Artificial Intelligence, Warfighters Form Enhanced Partnership on Battlefield
FBI Arrests Hacker Who Stole Data from Tech Company for Ransom
DoD Summarizes its Space Strategy
NIST Publishes Transport Layer Security Server Certificate Management Practice Guide
NIST Webinar: De-mystifying Secure Software Development June 25
Army develops prototype for PNT rapid tech insertion
New NGA St. Louis campus construction continues, on schedule despite COVID-19 pandemic
III MEF G6 adapts to support teleworking conditions during COVID-19
DoD Unveils Women, Peace, Security Strategy
IWTC San Diego Changes Command
“Cyber 9-Line” improves cybersecurity and enables election integrity
Air Force Materiel Command digital campaign aims to modernize, streamline lifecycle process
Digital Identity Guidelines: NIST Pre-Draft Call for Comments
Experts Predict Artificial Intelligence Will Transform warfare
IWTC Virginia Beach Honors the Battle of Midway
NIST Offers Recommendation for Cryptographic Key Generation
NSA Updated Guidance: Select and Use Collaboration Services More Securely
Station Hypo and its Impact on the Battle of Midway
DISA: Root Certificate in McAfee certificate chain might need update
Cyber Essentials
NGA Tech Strategy shows the way to geospatial advantage
Registration Now Open for DON IT Conference, East Coast 2020
SPACECOM, Space Force Officials Discuss Planetary Defense, Astronaut Launch
Army research advances state-of-the-art cybersecurity methods
DoD Signs MOU with Cybersecurity Maturity Model Certification Accreditation Board
DoD Cyber Crime Center and National Defense Information Sharing and Analysis Center partner to combat threats to Defense Industrial Base
Agency provides big cybersecurity support to small business
Building Secure Microservices-based Applications with a Service-Mesh Architecture
DoD, USAF Warfare Center to Build a 5G Network, Test Prototype Software at Nellis
Getting Ready for Post-Quantum Cryptography
NIST Seeks Comments on Use of Positioning, Navigation and Timing Services
SECDEF Visits NSA and USCYBERCOM’s Integrated Cyber Center
USCYBERCOM Releases 10th Anniversary Video
Assessing Information Security Continuous Monitoring Effectiveness
NGA Director shares his intent for the future of GEOINT
NIST Study Measures Performance Accuracy of Contactless Fingerprinting Technologies
MCSC achieves High Frequency Radio II fielding decision after ‘herculean’ effort
Satellite hacking challenge shifts to virtual event
DoD, Private Sector Leaders See Danger to GPS Due to FCC Licensing Ruling
NATO’s Combined Joint Operations from the Sea Centre of Excellence Virtual Maritime Security Regimes Round Table
DCNO for Information Warfare and Fleet Cyber Command/10th Fleet Update Effective Use of Remote Work Options
NCIS: Beware of Online Sexual Exploitation of Children
NIST Publishes SP 800-57 Part 1, Revision 5, Recommendation for Crypto-Key Management
ARCYBERCOM: Use caution to avoid email extortion
NIWC Atlantic releases Commercial Solutions Opening for Navy, Marine Technology Exercise
Impact Study of Cybercrime on U.S. Manufacturing and Economy
NGA Tech Focus Areas chart path for geospatial technologies
DoD CIO FY20 Global Town Hall Postponed
NSWC PCD keeps Task Force New York connected with Expeditionary Carry-On Network
GPS celebrates 25th year of operation
Space Surveillance Telescope Transfers to Australia, Improves Space Surveillance Network
Student Thesis Explores Russian Tactics to Influence U.S. Nuclear Perceptions
Teleworking? Use Collaboration Services More Securely, NSA says
Army Futures and Concepts Center evaluates new Multi-domain Operations force structure
CIO Council teams with top tech providers to speed critical resources
DoD Cyber Crime Center Issues Threat Warning
U.S. Secret Service, FBI, federal agencies fight cyber threats
Air Force geospatial tools help commanders identify COVID-19 risk
JAIC Mission Initiative in the Spotlight: Warfighter Health
U.S. Space Command says Russia tests direct-ascent anti-satellite missile
FBI Warns of Money Mule Schemes Exploiting the COVID-19 Pandemic
U.S. Issues Advisory on North Korean Cyber Threats
Distance Learning precautions to take for Children’s Privacy Protection
NCIS: Sailors, Marines, Civilians Beware of Card-Cracking Scams
Telework Tips from the National Cyber Security Alliance
NAVWAR Enterprise Delivers Innovative Solutions for Increased Readiness in Support of COVID-19 Relief Efforts
NSWC Philadelphia Division Utilizes War Games to Connect with Fleet and Warfighter
Corps’ satellite communication system exceeding performance expectations
DCNO for Information Warfare and Fleet Cyber Command/10th Fleet Update Effective Use of Remote Work Options
Electromagnetic Interference in a Home Office Environment
FTC Says Big Jump in Coronavirus-related Fraud
Navy Collaboration Tools Available
Norfolk Naval Shipyard receives full Authorization to Operate IT systems through March 2023
Onward Press to Risk Management Framework Authorization
Ready for the Fight – Newest Information Warfare WTI Level 4s Graduate
Save the Date: DON IT Conference, East Coast 2020, Rescheduled for Nov. 4-6
Teleworking & Ensuring Cybersecurity at Home
The 2020 United States Census – Is my Personal Information Safe?
The COVID-19 Impact on Modernize, Innovate and Defend
Contingency Operations Program and GPS III SV02 Receives Operational Acceptance from USSF
National Strategy for 5G Security
NIST Seeks Comments for Managing the Security of Mobile Devices
DoD Cyber Crime Center Asks: Who Wants to Work With a Hacker?
NIST Issues ‘Approaches for Federal Agencies to Use the Cybersecurity Framework’
NIST Helps Build Vital Accurate Measurement Infrastructure for 5G Communications
NIST Telework Security Basics
Prevent Eavesdropping — Secure Information during Virtual Meetings
The kids are home—what are they doing? U.S. Army says social media platforms offer children exciting, frightening encounters
NIST Seeks Comments for Final Draft of SP 800-53 Rev 5: Security and Privacy Controls for Information Systems and Organizations
The Legacy of Women in American Cryptology: Part 2
View the DON CIO Keynote Luncheon Speech at WEST Conference
DoD's Cyber Strategy of Past Year Outlined Before Congress
The Legacy of Women in American Cryptology: Part 1
DISA is Piloting Systems Security Analyst No-cost Courses in the National Capital Region Open to all DoD Personnel
NIST requests comments on SP 800-133 Rev 2, Recommendation for Cryptographic Key Generation
MyNavy Portal Introduces ZipServe
NGA brings intelligence products closer to action in Middle East
Vice Adm. Norton shares DISA’s commitment for 2020
NSWC Corona to Discuss Expanding the Advantage in Great Power Competition at WEST 2020
Information Warfare Pavilion to Address Opportunities and Challenges in an Era of Great Power Competition at WEST 2020
Defense Department Adopts Ethical Principles for Artificial Intelligence
Fleet Familiarization Seminar Educates Fleet Operators, Increases Fleet Readiness
Navy’s Global Deployer App Updated, New Language and Cultural Data Added
NIWC Atlantic Enterprise Service Desk Renews Help Desk Institute Certification
NUWC Division Newport’s Underwater Sound Reference Division named Designated Institute by National Institute of Standards and Technology
Heading to RSA: NSA Brings Innovative Ideas to Cybersecurity Industry
Fitting 19th Century Technology into 21st Century Warfighting
Government Agencies Warn of Coronavirus Scams
Fleet Cyber Command calls for officer, enlisted, and DON civilian applications for FY20 Navy Cyber Competition Team
NSF’s newest solar telescope to play critical role in better understanding sun, space weather
NIST’s National Cybersecurity Center of Excellence releases two draft practice guides to protect data integrity
Protecting Wideband RF Systems in Congested Electromagnetic Environments
IARPA Announces Launch of the Molecular Information Storage Program
Building Secure Microservices-Based Applications Using Service-Mesh Architecture
A Very Important Patch
Assessing and Developing Information Security Continuous Monitoring Programs
DHS Issues Warning of Possible Cyber Attacks
‘No Change’ Champions
Aaron Weis, Special Assistant to SECNAV for IM and DON CIO Discusses Quick-Wins and Long-Term Plans
Christopher Cleary, DON Information Security Officer Says Systems Survivability, Key to Lethality
Congratulations to the 2020 DON IM/IT Excellence Award Winners
Defend the DoDIN: DISA Issues Telework Do’s and Don’ts
DON Advises Active Duty Military and National Guard Members to Take Advantage of Free Electronic Credit Monitoring Services
DON IT Conference Schedule Now Available
Interview with Mike Galbraith, DON Chief Digital Innovation Officer Discusses Vision for Enterprise-wide Data Model
MCTSSA improves shipboard communication for Marines
Message to the DON Community from Aaron D. Weis, DON CIO
Modernize, Innovate, Defend
NAVIFOR Oversees Navy's Space Cadre
NCIS: Sailors, Marines, Civilians Beware of Tax Scams
Spaceforce.mil officially launched
NIST Releases Data to Help Measure Accuracy of Biometric Identification
NIST’s Light-Sensing Camera May Help Detect Extraterrestrial Life, Dark Matter
Start a conversation about cybersecurity
New ‘lifesaving’ biometric system identifies friend from foe
NSWC Corona’s Data Analytics Enables Navy to Dominate the Threat
MyNavy Family app Introduces Improved Services
Software Vulnerability Management
DC3 Cyber Training Academy
Low-Tech War Games Inform High-Tech Decisions
National Maritime Intelligence-Integration Office Participates in "Our Ocean Conference" in Norway
Office of Naval Research Global Opens New Location in Melbourne, Australia
Defense Innovation Board Recommends AI Ethical Guidelines
DISA Director Vice Adm. Nancy Norton Shares Drumbeat Update
October-December 2019 InfoDOMAIN Celebrates 10-year Anniversary of Information Warfare
Space Development Agency Gets First Permanent Director
NGA’s Notice to Mariners Celebrating 150 Years of Service
DoD Releases 2019 Military Intelligence Program Budget Aligned with National Defense Strategy
Transformational Change Comes to DoD Acquisition Policy
The Need for a Cybersecurity Paradigm Shift
Attention Developers: NIST to Host Open Security Controls Assessment Language Workshops
Cybersecurity: More than a Buzzword
Air Force Observes National Cybersecurity Awareness Month
NIST Invites Comments on Draft Recommendation for Cryptographic Key Management
Seven Steps to Reducing Your Cybersecurity Risk
NIST Offers First Look at the Lightweight Cryptography Standardization Process
Prevent Cyber-enabled Crime: Security Tips from the FBI
Joint Center Launches Online Market for Tactical Communication Devices
NIST Releases Cybersecurity Framework Implementations Guide for small, medium-sized manufacturers
DON IM/IT Excellence Awards Nominations Extended to Dec. 13
National Cybersecurity Awareness Month: #BeCyberSmart
NAVFAC works to cyber-secure shore IT infrastructure with FRCS Standardization
Navy Information Warfare Then and Now: From the Civil War to Midway to 21st Century Great Power Competition
Newly Restructured DON CIO Provides Organizational Unity for IT and Cybersecurity
Rear Adm. Lorin Selby shares insights from HACKtheMACHINE series
The Threat from Within
New Defense School to Certify Security Cooperation Workforce
Assume Networks Are Compromised, DoD Official Urges
Cyber domain links communication, improves Pacific Region readiness
NIWC Atlantic Employee Wins Cyber Award for Contributions to National Security
Cyber teams deploying to safeguard national security
DoD Program Aims to Deter Insiders from Harmful Acts
NAVWAR Fosters Innovative Thinking at ‘Hack the Machine’ 2019
NIST Asks for Feedback on Draft Privacy Framework, Designed to Work with its Cybersecurity Framework
Cyber Strategy Embodies Lethality, Reform, Partnerships
Intelligence Communications System Gets Tech Refresh
Cyber Ops to Gain Speed, Accuracy from AI
Intelligence Agencies Launch National Insider Threat Awareness Month
Military Must Be Ready to Confront Hybrid Threats, Intel Official Says
Navy IT Trains, Prepares IW Professionals to Protect, Defend America
Navy Chief Saves Life through Social Media
DISA’s assured identity initiative featured on NBC News
DoD SAFE Now Available for File Transfer
FTC Imposes $5 Billion Penalty and Sweeping New Privacy Restrictions on Facebook
Equifax to Pay $575 Million as Part of Settlement with FTC, CFPB, and States Related to 2017 Data Breach
Lunar maps paved way for moon exploration
NIST’s Quantum Logic Clock Returns to Top Performance
Understanding Emerging Blockchain Identity Management Systems
Automating the Software Sustainment Loop
Cyber Flag exercise focuses on partnerships
Guideline for Using Cryptographic Standards in the Federal Government—Cryptographic Mechanisms
DoD Secure Access File Exchange Authorized for Large File Transfer
Dr. Ray A. Letteer, Deputy Branch Head, Compliance Branch, Cybersecurity Section
Lost or Stolen Credit, ATM, and Debit Cards – What’s My Liability?
NAVWAR Enterprise Launches Artificial Intelligence Prize Challenge; $150,000 Total Cash Prizes Offered
Program Executive Officer for PEO EIS Ruth A. Youngs Lew
Before Connecting an IoT Device, Read the New NIST Report for Cybersecurity Advice
From Cloud First to Cloud Smart
Global City Teams Challenge Smart and Secure City Expo Convenes July 10-12 in Washington, D.C.
NGA announces 10 winners in MagQuest Phase 1
Cyber Actors Fake 'Secure' Websites in Phishing Campaigns
Naval Oceanography is Adapting, Embracing the New
Best Practices for Key Management Organizations
Marines evaluate biometric systems in tactical environment via Identity Intelligence Analytics Cell
DISA provides Public Key Infrastructure security for the mobile environment
When you want more than a job, you want a mission
DISA continues to explore alternative authentication processes
Improving Sailor data across all networks
President Issues New Executive Order to Strengthen America’s Cybersecurity Workforce
Navy to Showcase Innovative Information Warfare Capabilities at the Navy Information Warfare Pavilion at Sea-Air-Space 2019
NIST Requests Information on Artificial Intelligence Technical Standards and Tools
Navy Warfare Centers Harnessing Data to Expand the Advantage and Dominate the Threat
Ready, Aim, Fire: Hypersonics, Directed Energy, Lasers
NIST Tool Enables More Comprehensive Tests on High-Risk Software
Footprints in the data
Shanahan: Next Big War May Be Won or Lost in Space
NIWC Atlantic Celebrates 50th Small Business Engagement with Industry
National Counterintelligence and Security Center Launches National Supply Chain Integrity Month
DoD Announces FY2019 University Research Funding Seeking Novel Approaches to a Complex Set of Military Challenges
Marine Corps Innovation Symposium
Data, Web, and Artificial Intelligence: Navy’s Next Frontier
DON IT Conference, East Coast 2019 Schedule Updated, Registration Closed
Enterprise Software Agreements
Joint Tech Exercise Helps Fight the Naval Force Forward
Protect your privacy from risks associated with mobile device apps
Register Now for the USN - USMC Spectrum Summit East 2019
Air Force hub uncovers insider threats
Marine Corps enhances forensics capability to make gathering data simple in austere environments
Marion Frieswyk, First Female Intelligence Cartographer
CIWT Det. Fort Gordon Instructors Continue to Prepare Sailors for Advancement
DoD Announces FY2018 Minerva Research Initiative Awards
DoD Releases FY20 Military Intelligence Top-Line Budget
If you think you know everything about identity theft prevention — think again
NIST Announces 2019 Opportunities for Small Businesses
Wreckage of USS Wasp CV-7 discovered in Coral Sea
Department of the Navy Fiscal Year 20 Budget
DISA prepares warfighters for future multi-domain conflicts
Electronic Warriors Test Electronic Warfare Planning and Management Tool
DARPA Issues RIF Seeking Tools Depicting Subterranean Worlds in 3D
DISA flexes combat support skills in Pacific Sentry exercise
Going Digital: MyNavy Portal Introduces Advancement Dashboard for Enlisted Sailors
Air Force experiments with commercially provided IT services at eight bases
NIST Threshold Cryptography Workshop 2019 Live Webcast
Is it really the IRS calling?
Marine Corps seeks ideas, information for Optical Communication Transmission System
NSA releases Ghidra Software Reverse Engineering Tool
Join NSA @ RSA
DARPA Takes the Next Step in Quantum Information Processing
NSA Says New Software Helps to Mitigate Supply Chain Management Risk
DISA makes improvements to Joint Regional Security Stacks
MCTSSA briefs industry leaders during partnership event
NIST Celebrates Fifth Anniversary of Popular Cybersecurity Framework
DoD Signal/Communications/Cyber Warrant Officer Knowledge Transfer Event Announced
SPAWAR Fosters Innovation, Industry Engagement at WEST 2019
Services improve interoperability through common data standards
Navy admiral takes helm at NGA
Defending Against Adversarial Artificial Intelligence
Navy Commands to Convene in Information Warfare Pavilion at WEST 2019; Demonstrate Critical Teamwork in the Information Domain
Nominations Extended to Feb 15 for 2019 USN-USMC Electromagnetic Spectrum Workforce Excellence Awards
Let’s talk about IoT device security
Building Trusted Human-Machine Partnerships
SPAWAR Improves Speed and Quality of Communications for Warfighters at Sea
NIST Reveals 26 Algorithms Advancing to the Post-Quantum Crypto ‘Semifinals’
FCC/C10F Celebrates Nine Years of Operations
Naval Oceanography Honors First Hall of Fame Inductees, Dedicates New Supercomputers
New Strategy Encourages Innovation, Better Intel Sharing
NIWDC, CIWT Leaders Ensure Readiness, Lethality through IW Training
ODNI Releases 2019 National Intelligence Strategy
Related Resources
Inventory of DON Systems With Completed Privacy Impact Assessments
Safeguarding PII
The NEW PIA "Gouge"
Privacy Frequently Asked Questions
Rules for Handling PII by DON Contractor Support Personnel
View More
PII Breach Reporting Resources
Privacy Training and Compliance Resources
Privacy Impact Assessment Resources
Take the DON Privacy Quiz!
SSN Reduction Plan Resources
Privacy Briefs
Personally Identifiable Information Posters
2014 PII Brief
Privacy Act/FOIA Interface
Privacy Act System of Records Notices
Justification For The Use Of The SSN
Privacy Resources
Privacy Resources for Military Members and Their Families
Publically Accessible Website Privacy Resources (including Official DON Social Networking Sites)
How to Find Your DoD ID Number
Recommended Facebook Privacy Settings
SSN Reduction Frequently Asked Questions
How and When to Write a Privacy Act Statement
Privacy Act Resources
Fair Information Practices
Guidelines for Establishing a New Privacy Act System of Records Notice
Identifying Privacy Act Systems of Records You May Be Using
How to Obtain Military Personnel, Health, and Award Records
Privacy Act Exemptions
Sample Checklist for Conducting Privacy Act Assessment/Staff Visits
DoD Privacy Program Resources
How to Make a Privacy Act Request
Instructions for Using WinZip to Encrypt Files
PEO EIS Portal Procedures for Safeguarding PII
Privacy Act Desk Reference Guide
Privacy-Related OMB Memoranda
Disclosure Accounting Form (OPNAV 5211/9 (MAR 1992))
General Purpose Privacy Act Statement (OPNAV FORM 5211/12)
Methods for Hard Drive/Disk Destruction
Acceptable Use Criteria for Systems Collecting SSNs
Privacy Recommended Reading List
2012 Identity Theft Brief
OMB Information Collection Number
Privacy Information and Resources
Potential Consequences for Failing to Safeguard PII