World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Information Security Program Information Security Program Policy December 15, 2004

By Havekost, Charles

Click here to view

Book Id: WPLBN0000160699
Format Type: PDF eBook
File Size: 0.3 MB
Reproduction Date: 2008
Full Text

Title: Information Security Program Information Security Program Policy December 15, 2004  
Author: Havekost, Charles
Volume:
Language: English
Subject: Government publications, Legislation., Government Printing Office (U.S.)
Collections: Government Library Collection
Historic
Publication Date:
Publisher: Government Printing Office

Citation

APA MLA Chicago

Havekost, C. (n.d.). Information Security Program Information Security Program Policy December 15, 2004. Retrieved from http://worldebooklibrary.com/


Excerpt
Excerpt: Disclaimer: This document is for official use only and is intended for use by the United States Department of Health and Human Services (HHS), including all of its Operating Divisions (OPDIV) and Staff Divisions (STAFFDIV). Throughout the HHS Information Security Program Policy the terminology, “the Department” or “Departmental” includes all HHS, OPDIV, and STAFFDIV personnel, contractors, and other authorized users. Therefore, the term “Departmental system” includes any information system HHS, an OPDIV, or STAFFDIV uses to store, process, or transmit data.

Table of Contents
Table of Contents Effective Date/Implementation..................................................................... i Table of Contents .........................................................................................iii Preface........................................................................................................vii Document Change History..........................................................................viii 1. Introduction....................................................................................... 1 1.1 Scope and Applicability .................................................................. 1 1.2 Authorities................................................................................... 2 2. Overview............................................................................................ 3 2.1 Document Organization ................................................................. 3 2.2 Roles and Responsibilities .............................................................. 4 2.2.1 Secretary of HHS .................................................................... 4 2.2.2 Department Leadership............................................................ 5 2.2.2.1 HHS CIO ........................................................................ 5 2.2.2.2 OPDIV Heads .................................................................. 6 2.2.2.3 Deputy Assistant Secretary for Finance ............................... 6 2.2.2.4 Assistant Secretary for Administration and Management........ 7 2.2.2.5 Deputy Assistant Secretary for Human Resources................. 7 2.2.3 Information Security Leadership................................................ 7 2.2.3.1 HHS CISO ...................................................................... 7 2.2.3.2 OPDIV CIOs .................................................................... 8 2.2.3.3 OPDIV CISOs .................................................................. 9 2.2.3.4 OPDIV ISSOs .................................................................. 9 2.2.3.5 CIO Council ...................................................................10 2.2.3.6 CISO Working Group.......................................................10 2.2.4 Information Security Roles ......................................................11 2.2.4.1 Designated Approving Authority........................................11 2.2.4.2 Certification Authority .....................................................11 2.2.4.3 Program Executives ........................................................12 2.2.4.4 Critical Infrastructure Protection Coordinator ......................12 2.2.4.5 Contingency Planning Coordinator.....................................12 2.2.4.6 System Owners ..............................................................12 2.2.4.7 Data Owners..................................................................13 2.2.4.8 System/Network Administrators........................................14 2.2.4.9 Contracting Officers ........................................................14 2.2.4.10 Personnel Officers .........................................................14 2.2.4.11 Supervisors..................................................................14 2.2.4.12 Users and Employees ....................................................15 2.2.5 Department Security Council ...................................................16 2.2.5.1 Information Technology Investment Review Board ..............16 3. Management Policies ....................................................................... 17 3.1 Capital Planning and Investment....................................................17 3.2 Contractors and Outsourced Operations ..........................................17 3.3 Security Performance Measures and Metrics.....................................17

 

Click To View

Additional Books


  • A Middle English Vocabulary. Designed fo... (by )
  • Report Upon the Present Condition of Aff... (by )
  • What's Wrong with the World (by )
  • General Management : Treasury Employees ... (by )
  • United States Department of State Patter... (by )
  • American Terrorism Study : Patterns of B... (by )
  • All Necessary Means : Employing Cia Oper... (by )
  • Sisters of Glass (by )
  • Military Transformation: Intelligence, S... (by )
  • Information Security Risk Assessment Pra... (by )
  • Crs Report for Congress Received through... (by )
  • The Global War on Terrorism (by )
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.