Overview

Overview

Copyright(c), 1995 - Management Analytics - All Rights Reserved


Security of IT systems, as described in OMB Circular A-130, requires the protection of automated systems and information while associated with any automated processing activity, and the assurance that the systems do exactly what they are supposed to do and nothing more. IT security requires management controls to ensure authorized access to the information in the systems and proper handling of input, processing, and output.

The implementation of an effective IT security program within the Department begins with the establishment of the organizational IT security structure and the assignment of broad responsibilities.

Individuals appointed to positions with IT security responsibilities are accountable for compliance with all DOC or federal laws, regulations and policies related to the assigned responsibilities.