Last edited by Aragar
Sunday, April 19, 2020 | History

2 edition of Status of compliance with the Computer Security act of 1987 found in the catalog.

Status of compliance with the Computer Security act of 1987

Howard Rhile

Status of compliance with the Computer Security act of 1987

statement of Howard G. Rhile, Associate Director, Information Management and Technology Division, before the Subcommittee on Transportation, Aviation, and Materials, Committee on Space, Science and Technology, House of Representatives.

by Howard Rhile

  • 328 Want to read
  • 25 Currently reading

Published by U.S. General Accounting Office in [Washington, D.C.?] .
Written in English

    Subjects:
  • Electronic data processing departments -- Security measures.

  • Edition Notes

    SeriesTestimony -- T-IMTEC-88-8., Testimony -- GAO/T-IMTEC-88-8.
    ContributionsUnited States. General Accounting Office.
    The Physical Object
    Pagination5 p. ;
    ID Numbers
    Open LibraryOL17835409M

    The purpose of this Bulletin is to provide guidance to Federal agencies on computer security planning activities required by the Computer Security Act of It requires Federal agencies to identify each computer system that contains sensitive information and to prepare and implement a plan for the security and privacy of these systems. • To highlight the potential risks of non-compliance (e.g., lawsuits, fines, sanctions, etc.) and discuss common misconceptions about information security and privacy laws. • To provide two real-world examples of how these principles can be put into action, including specific steps to mitigate risk and satisfy compliance obligations: 1. The Computer Security Act of also amended the Federal Property and Administrative Services Act of , requiring the National Bureau of Standards to distribute standards and guidelines pertaining to federal computer systems, making such standards compulsory and binding to the extent to which the secretary determines necessary to improve the efficiency of operation or security and privacy.


Share this book
You might also like
general at Works & Housing

general at Works & Housing

The Central connection

The Central connection

Sources of Japanese history

Sources of Japanese history

English and American philosophy since 1800

English and American philosophy since 1800

Report to the Congress

Report to the Congress

Lent

Lent

Dorning in England and America

Dorning in England and America

Eating, sleeping & living

Eating, sleeping & living

Glossary of geographical and topographical terms and of words of frequent occurrence in the composition of such terms and of place-names

Glossary of geographical and topographical terms and of words of frequent occurrence in the composition of such terms and of place-names

The ordeal

The ordeal

Status of compliance with the Computer Security act of 1987 by Howard Rhile Download PDF EPUB FB2

The Computer Security Act ofPublic Law No. (H.R. ), (Jan. 8, ), was a United States federal law enacted in It was intended to improve the security and privacy of sensitive information in federal computer systems and to establish minimally acceptable security practices for Enacted by: the th United States Congress.

Pursuant to a congressional request, GAO reviewed whether federal agencies complied with provisions of the Computer Security Act ofspecifically whether, by July 8, (1) the Office of Personnel Management (OPM) had issued regulations prescribing the procedures and scope of training for federal civilian employees; and (2) federal agencies had identified which computer systems.

In response to a congressional request, GAO discussed federal agencies' compliance with Computer Security Act of requirements to: (1) establish training programs; and (2) identify computer systems that contain sensitive information.

Get this from a library. Computer security: status of compliance with the Computer Security Act of briefing report to congressional requesters. [United States. General Accounting Office.;].

Computer Security: Status of Compliance with the Computer Security Act of Imtecbr (Paperback) - Common [Created by U S Government Accountability Office (Created by U S Government Accountability Office (G] on inovelpapery.icu *FREE* shipping on qualifying offers.

The U.S. Government Accountability Office (GAO) is an independent agency that works for Congress. Passed House amended (06/22/) (Measure passed House, amended) Computer Security Act of - Directs the National Bureau of Standards to establish a computer standards program for Federal computer systems, including guidelines for the security of such systems.

Sets forth authorities of the Bureau in implementing such standards. Computer Security Act of Report [United States] on inovelpapery.icu *FREE* shipping on qualifying inovelpapery.icu: United States. COMPUTER SECURITY ACT OF Public Law th Congress.

An Act To provide for a computer standards program within the National Bureau of Standards, to provide for Government-wide computer security, and to provide for the training in security matters of persons who are involved in the management, operation, and use of Federal computer systems, and for other purposes.

Oct 10,  · The Computer Security Act ofPublic Law No. (H.R. ), (Jan. 8, ), was a United States federal law enacted in It was intended to improve the security and privacy of sensitive information in federal computer systems and to establish minimally acceptable security practices for such systems.

Computer Security Act of Inthe U.S. Congress, led by Rep. Jack Brooks, enacted a law reaffirming that the National Institute for Standards and Technology (NIST), a division of the Department of Commerce, was responsible for the security of unclassified, non. CSA - Computer Security Act of Looking for abbreviations of CSA.

It is Computer Security Act of Computer Security Act of listed as CSA. CSA: Conservation Status Assessment (various locations) CSA: Computer Security Inspection and Compliance Program. CRS Report for Congress Received through the CRS Web Order Code RL Computer Security: A Summary of and compliance with, security standards and guidelines, developed by the National Building upon the Computer Security Act of (P.L.

), th e Paperwork Reduction Act of (P.L. ), and. Addresses data collection by credit, insurance and employment agencies, gives individuals the right to see information maintained about them and restricts who may access credit files to only those with a court order or the written permission of the individual whose credit is being checked.

The act also reset the date of expiration written into the law as a so-called sunset clause for certain wiretaps under the Foreign Intelligence Surveillance Act of (FISA), and revised many of the criminal penalties and procedures associated with criminal and terrorist activities.3 Another key law is the Computer Security Act of Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions Congressional Research Service 2 • The Counterfeit Access Device and Computer Fraud and Abuse Act of prohibits various attacks on federal computer systems and on those used by banks and in.

The Computer Security Act Of Public Law is also k nown as the Computer Security Act of The purpose as described in the law is to improve the se curity and privacy of sensitive information in Federal Computer Sy stems. [11] This law basically requires ev ery government computer system that contains sensitive.

Computer Security - Legal Compliance - In this section we will explain some important compliances that are around the technology industry. Nowadays technology compliance is becoming more important be. 2 September DD/PTS C/ISG Computer Security Act of Wayne/Susan: Office of Security-7 v 1 4 9 SEPo 19x-'r I need to know your concerns.

Also share them with Office of Congressional Affairs. Distribution: Orig: DD/PTS; C/ISG D/Sec 11 - OS Registry as REQISTU.

The United States Code is meant to be an organized, logical compilation of the laws passed by Congress. At its top level, it divides the world of legislation into fifty topically-organized Titles, and each Title is further subdivided into any number of logical subtopics.

Computer Security Act synonyms, Computer Security Act pronunciation, Computer Security Act translation, English dictionary definition of Computer Security Act.

The protection of information and information systems against unauthorized access or modification. Sep 18,  · Aug 5, S. (th). A bill to require Inspectors General and the Comptroller General of the United States to submit reports on the use of logical access controls and other security practices to safeguard classified and personally identifiable information on Federal computer systems, and for other purposes.

In inovelpapery.icu, a database of bills in the U.S. Congress. Implementation of the Computer Security Act: hearing before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, House of Representatives, One Hundredth Congress, second session, September 22, Talk:Computer Security Act of Jump to navigation Jump to search.

WikiProject Law (Rated Stub-class) This article is within the scope of WikiProject Law. Computer Security Act (). The Computer Security Act of is the first major United States government effort to legislate protection and defense for unclassified information in governmentrelated computer systems.

The act mandates the National Bureau of Standards to develop and implement procedures that improve the security and privacy of sensitive material and creates a means for. • The Computer Security Act of gave the National Institute of Standards and Technology (NIST) responsibility for developing security standards for federal computer systems, except the national security systems3 that are used for defense and intelligence missions, and gave responsibility to.

Goal of the Computer Security Act of Legislate protection and defense for unclassified information in government related computer systems Mandated that the National Bureau of Standards develop and implement procedures to improve the security and privacy of sensitive material along with minimum acceptable security practices.

Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised.

The book is divided into five parts. Part I covers the important elements of computer security and case histories of. Computers & Security, 7 () The Computer Security Act of G. Will Milor Congressman Glickman (D, Kansas) introduced HRthe Computer Security Act ofin the House of Representatives on January 6, On January 7,one year later, President Reagan signed it Cited by: 1.

This entry is part of a series of information security compliance articles. In subsequent articles we will discuss the specific regulations and their precise applications, at length. These regulations include HIPAA or the Health Insurance Portability and Accountability Act, The Sarbanes Oxley Act, Federal Information Security Management Act of (FISMA), Family Educational Rights and.

The first legislation to regulate the development of computer encryption was the Computer Security Act ofwhich sustained the link between cryptography and national security that had tightened since the code-breaking days of the Second World War.

The Computer Security Act. The Computer Security Act of provides for improving the security and privacy of sensitive information in federal computer systems. "Security" is, of course, different than "privacy." The security measures in any system are what enable it. The Computer Fraud and Abuse Act of (CFA Act) landmark in the fight against cybercrime: the first law to address crime in which the computer is the ‘subject’ The cornerstone of many computer-related federal laws and enforcement efforts.

Looking for Computer Security Act of. Find out information about Computer Security Act of The first step in improving the security and privacy of information contained in federal computer systems.

Signed January 8, by President Reagan, the Explanation of Computer Security Act of Some play it completely by the book, documenting the organization’s compliance according to each provision of every nuanced regulation.

Other companies have more of an informal approach to information security compliance by striving to stay within the boundaries of regulations.

Problems with Your Information Security Compliance Policy. Many organizations address a compliance initiative with a “consultant-and-checklist” approach. A vendor's consultants set up shop onsite and the team runs through checklists to make sure that all controls are.

Computer Security Enhancement Act of - Amends the National Institute of Standards and Technology Act to require the National Institute of Standards and Technology, in fulfilling its responsibilities under the computer standards program, to: (1) upon request from the private sector, assist in establishing voluntary interoperable standards.

With this Act, Congress created the Securities and Exchange Commission. The Act empowers the SEC with broad authority over all aspects of the securities industry.

This includes the power to register, regulate, and oversee brokerage firms, transfer agents, and clearing agencies as well as the nation's securities self regulatory organizations (SROs).

Appendix B Federal Information Security and the Computer Security Act | ried out by the National Bureau of Standards (now NIST).

NBS established its program in computer and communications security inunder authority of the Brooks Act; the agency was already devel-oping performance standards for government computers. Under the Computer Security Act ofNBS was designated as responsible for developing technical, management, physical security, and administrative standards and guidelines for the cost-effective security and privacy of sensitive unclassified information processed in Federal computers.

The Laws and Regulations category includes executive documents (e.g., Executive Orders, OMB memoranda, Presidential Directives), laws (acts of Congress and other statutes), regulations and other directives.

NIST, itself, is not a regulatory agency. However, many of NIST's cybersecurity efforts and publications have been created in response to various laws and regulations from other agencies.

ANTAM's Director of Finance, Dimas Wikan Pramudhito said: 'The CSA Award is an appreciation of the Company's growth solid and positive performance.INFORMATION SECURITY AND LEGAL COMPLIANCE: Common Misconceptions About Information Security Compliance 8 Finding Common Threads in Compliance Laws and Regulations 9 Addressing Information Security in it loses its status and value as a trade secret.

Almost every business has at least some trade secrets.INFORMATION SECURITY AND PRIVACY ADVISORY BOARD _____ ESTABLISHED BY THE COMPUTER SECURITY ACT OF [Amended by the Federal Information Security Management Act of And the Federal Information Security Modernization Act of ] October 28, Dr.

Willie E. May The Honorable Shaun Donovan.