Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
DHS shares privacy expertise in new handbook
Tuesday - 7/6/2010, 6:46pm EDT
Federal News Radio
Agencies now can have a look at the way the Department of Homeland Security does privacy.
DHS says the document "not only describes the wide-ranging activities of the [Privacy] Office, but also explains how the office works to build a privacy culture at DHS."
DHS says it hopes the guide will help others understand its privacy program, which it describes as "one of the leading . . . programs within the federal government."
The Chief Information Officer's Council published DHS's privacy handbook last week on its site in an effort to share it with a broader community.
The guidebook outlines the numerous strategies DHS employs to minimize its impacts on citizens' privacy, such as frequent certifications to ensure that all personally identifiable information (PII) is secure and "accurate, relevant, timely, complete and reduced to the minimum necessary."
"Privacy and information security are closely linked, and strong practices in one area typically support the other," the document states.
The department's efforts also include mandatory trainings on privacy for all employees and contractors. DHS has also made multiple additional training sessions available to instill workers with what they call a "culture of privacy."
In addition to privacy protection policies, the guidebook also spells out the department's response to complaints of privacy breaches. DHS has a dedicated Complaint Tracking System (CTS) that documents "the name of the complainant, type of complaint, and other pertinent data" for each individual grievance. Complaints are then categorized, reviewed and acted upon when necessary.
The tracking systems is completely self-contained and accessible only by DHS's Privacy Office, according to DHS's Privacy Impact Assessment of the system. The PIA states that access to the system must go through an approved encryption scheme, and remote access is strictly-monitored.
"Privacy considerations are woven directly into business processes throughout the department," DHS says. This ensures that "privacy is integrated into decision making from the very beginning."
Rachel Stevens is an intern with Federal News Radio.
(Copyright 2010 by FederalNewsRadio.com. All Rights Reserved.)