+++ to secure your transactions use the
Bitcoin Mixer Service
+++
HOME
POLICY & GUIDANCE
NEWS
FAQS
RSS FEEDS
Trending
Privacy
DADMS/DITPR-DON
Cybersecurity
FOIA
BROWSE ALL TOPICS
Audit Readiness of IT Systems (3)
DIACAP (8)
Information Assurance (49)
NMCI (29)
Awards (46)
DON Enterprise Architecture (33)
Information Sharing (40)
Open Source (2)
Business Case Analysis (11)
Enterprise Licensing Agreements (13)
IT Asset Management (14)
Performance Measurement (1)
CIO Authorities (71)
Enterprise Services (27)
IT Efficiencies (99)
Personal Electronic Device (14)
Civil Liberties (22)
Enterprise Software Initiative (35)
IT Expenditure Approval Authority (12)
Printing and Imaging (Copiers/MFDs) (18)
Clinger-Cohen Act Compliance (12)
FISMA (5)
IT Governance (35)
Privacy (265)
Cloud Computing (31)
Forms/Reports (11)
IT Infrastructure (12)
Public Key Infrastructure (10)
Common Access Card (6)
Freedom of Information Act (27)
IT Investment Management (52)
Records Management (33)
Cybersecurity (240)
Functional Area Manager (6)
IT Portfolio Management (1)
Section 508 (9)
Cyberspace/IT Workforce (39)
GIG Standards (12)
Knowledge Management (31)
Social Media (29)
DADMS/DITPR-DON (26)
Governance (12)
Naval Enterprise Networks (32)
Spectrum (80)
Data at Rest (5)
Green IT (6)
Naval Networking Environment (9)
Telecommunications (67)
Data Center Consolidation (35)
Identity Management (93)
NGEN (21)
Wireless (71)
Data Strategy (16)
IM/IT Strategy (31)
TAGS:
Related Policy
DON Privacy Program
Update to DoD CIO Memorandum on Commercial Public Key Infrastructure Certificates on Public-Facing DoD Websites
DoD Privacy Impact Assessment Guidance
Processing of Electronic Storage Media for Disposal
DON Privacy Impact Assessment Guidance
View More
DON Policy Updates for Use of NIPRNET Public Key Infrastructure Software Certificates
Safeguarding Personally Identifiable Information from Unauthorized Disclosure
Safeguarding Personally Identifiable Information
DoD-Wide Digital Signature Interoperability
DoD Implementation Guide for Transitional PIV II SP 800-73 v1
National Industrial Security Program Operating Manual
DON Information Assurance Manual
DON Privacy Impact Assessment Format Guidance
DON Public Key Infrastructure Implementation Guidance
Related News
Changes to CAC Certificates
Privacy Tips
PII Breach Articles from CHIPS Magazine
DoD to Cease Issuance of Software PKI Certificates to FVEY Partner Nations
DON to Migrate to Use of Stronger Cryptographic Algorithms
View More
DoD Memo on PIV-I Credentials Released
DON Electronic Signature Policy Released
DON Current and Future PKI and PKE Activities
Identity Management Operations to Improve Cybersecurity
Compliance Spot Checks Key to Successful Privacy Program
Theft of Storage Media Containing PII
Copier/Printer May Present Information Security Risks
Protect Your Personal Information: It's Valuable
Defending Cell Phones and PDAs Against Attack
Reducing the Use of SSNs is Key to Securing PII
Insider Threat
Reduce PII Loss by Proper Disposal/Sanitization of Unclass Equipment
What You Should Know About Identity Theft
Related CHIPS Magazine
NIST Releases Data to Help Measure Accuracy of Biometric Identification
New ‘lifesaving’ biometric system identifies friend from foe
DC3 Cyber Training Academy
Identity Management & Access Control in Multiclouds Workshop and Conference
DISA Director Vice Adm. Nancy Norton Shares Drumbeat Update
View More
The Need for a Cybersecurity Paradigm Shift
Air Force Observes National Cybersecurity Awareness Month
NIST Invites Comments on Draft Recommendation for Cryptographic Key Management
The Threat from Within
Assume Networks Are Compromised, DoD Official Urges
DoD Program Aims to Deter Insiders from Harmful Acts
DISA’s assured identity initiative featured on NBC News
DoD Secure Access File Exchange achieves Initial Operating Capability
Army Developing New Wearable Authentication for Secure Network Access
Securing Web Transactions: TLS Server Certificate Management
Understanding Emerging Blockchain Identity Management Systems
Dr. Ray A. Letteer, Deputy Branch Head, Compliance Branch, Cybersecurity Section
Program Executive Officer for PEO EIS Ruth A. Youngs Lew
Best Practices for Key Management Organizations
Marines evaluate biometric systems in tactical environment via Identity Intelligence Analytics Cell
DISA provides Public Key Infrastructure security for the mobile environment
DISA continues to explore alternative authentication processes
Navy to Showcase Innovative Information Warfare Capabilities at the Navy Information Warfare Pavilion at Sea-Air-Space 2019
Purebred: DISA’s modern mobile security solution
DON IT Conference, East Coast 2019 Schedule Updated, Registration Closed
NIST Issues Two Cryptography Key Management Updates
NIST Threshold Cryptography Workshop 2019 Live Webcast
NIST Announces Attribute Considerations for Access Control Systems
NIST Reveals 26 Algorithms Advancing to the Post-Quantum Crypto ‘Semifinals’
Reminder from DON OCIO: Users Must Make Changes to CAC Certificates
DISA increases Mission Partner Engagement Forum frequency
DoD Implements Changes to Website CAC Logon
Fleet Cyber Command Official Discusses Command Cyber Operational Readiness Inspections at WEST 2019
Quantum Information Science: Making the Leap
Register Now For DON IT Conference, West Coast 2019
The Navy Insider Threat Program
DISA awards OTA for National Background Investigation System
Latest Drumbeat with Vice Adm. Nancy A. Norton
DISA showcases feds’ new security clearance application
DISA makes strides toward Common Access Card replacement
History and Cyber Warfare for the Non-technician
Risk Management Framework update strengthens critical infrastructure and privacy protections
CYBERCOM Now a Combatant Command, Nakasone Replaces Rogers
Naval Computer and Telecommunications Station San Diego holds Change of Command Ceremony
NAVSUP BSC, Navy Business Intelligence Services
DON IT East Conference: Learn from the Experts
Download CHIPS Magazine Mobile App!
How We Need to Prepare for a Global Cyber Pandemic
Related Resources
Inventory of DON Systems With Completed Privacy Impact Assessments
The NEW PIA "Gouge"
Privacy Frequently Asked Questions
PII Breach Reporting Resources
Privacy Training and Compliance Resources
View More
Privacy Impact Assessment Resources
Take the DON Privacy Quiz!
Privacy Briefs
Personally Identifiable Information Posters
2014 PII Brief
Privacy Recommended Reading List
2012 Identity Theft Brief
OMB Information Collection Number
Privacy Information and Resources
Potential Consequences for Failing to Safeguard PII