TITLE

Privacy Act of 1974; System of Records

AUTHOR(S)
Siegel, Aaron
PUB. DATE
May 2012
SOURCE
Federal Register (National Archives & Records Service, Office of;5/18/2012, Vol. 77 Issue 97, p29616
SOURCE TYPE
Government Documents
DOC. TYPE
Article
ABSTRACT
The article presents information on a notice issued by the U.S. Department of Defense regarding the addition of a new system of records "Defense Industrial Base (DIB) Cyber Security/Information Assurance Records" in its inventory of record systems in accordance with the Privacy Act of 1974. This proposed action will be effective from June 18, 2012.
ACCESSION #
76112052

 

Related Articles

  • Privacy Act of 1974; System of Records. Siegel, Aaron // Federal Register (National Archives & Records Service, Office of;5/18/2012, Vol. 77 Issue 97, p29615 

    The article presents information on a notice issued by the U.S. Defense Intelligence Agency of the Department of Defense regarding the amendment of a system of records in its existing inventory of record systems in accordance with the Privacy Act of 1974. This proposed action will be effective...

  • Privacy Act of 1974; System of Records. Siegel, Aaron // Federal Register (National Archives & Records Service, Office of;10/5/2011, Vol. 76 Issue 193, p61675 

    The article provides details of a proposal from the U.S. Office of the Secretary of Defense to add a system of records to its inventory of record systems subject to the Privacy Act of 1974, as amended. As mentioned, categories of records, student record files, demographic data are included. The...

  • Privacy Act of 1974; System of Records. Siegel, Aaron // Federal Register (National Archives & Records Service, Office of;10/5/2011, Vol. 76 Issue 193, p61680 

    The article provides information on a proposal from the U.S. Department of the Army, the U.S. Department of Defense to add a system of records in its inventory of record System subject to the Privacy Act of 1974. As stated, Standardized Student Records systems are included, also authority of the...

  • Revising DoD 5015.2, the de facto RM Software Standard. Swartz, Nikki // Information Management Journal;Jul/Aug2008, Vol. 42 Issue 4, p26 

    The article reports that the U.S. Department of Defense (DoD) has updated its voluntary records management standard to include interoperability requirements for records management applications (RMA). The DoD 5015.2-STD Design Criteria Standard for Electronic Records Management Software...

  • Sneakers attack. Stanglin, Douglas; Kaplan, David E.; Pasternak, Douglas; Brownstein, Ronald; Cohen, Gary; Walsh, Kenneth T.; Lord, Mary // U.S. News & World Report;02/23/98, Vol. 124 Issue 7, p15 

    Reports the attempts to break in to Pentagon computers. Efforts to gain logistical information pertaining to deployments in Iraq; Possible involvement of Iraq; Possible result of an annual computer game named King of the Hill.

  • Pentagon flunks cyber defense. Mann, Paul // Aviation Week & Space Technology;4/12/1999, Vol. 150 Issue 15, p69 

    Focuses on the need for the United States Defense Department to improve the security systems of its computers. Findings of the national Research Council investigating the breakdowns in the nation's nuclear weapons laboratories; Recommendation for the creation of a high-level agency to provide...

  • LEADING BY EXAMPLE. Harris, Shane // Government Executive;Feb2003, Vol. 35 Issue 2, p64 

    Focuses on computer security arrangements of the U.S. Dept. of Defense. Flaws in the security system; Strategies for improving security of the U.S. Social Security Administration; Plans of the U.S. government to force private companies to improve security systems.

  • Privacy Requires Security, Not Abstinence. Garfinkel, Simson // Technology Review;Jul/Aug2009, Vol. 112 Issue 4, p64 

    The article discusses the issue concerning the importance of data privacy in the U.S. It cites the attacks involving the stealing of more than 45 million credit-card numbers as well as the security issues surrounding online networking sites including Facebook. It also examines the role of...

  • Take My Privacy, Please. Pogue, David // Macworld;Dec2000, Vol. 17 Issue 12, p192 

    Discusses the issue of unauthorized collection of personal data. Disadvantages of data collection.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics