Return to site

Privatus 5 1 2 – Automated Privacy Protection Act

broken image


'Section 552a(p)(1)(A)(ii)(II) of title 5, United States Code, as amended by section 2 probably means section 7201(b)(1) of Pub. 101–508, shall not apply to a program referred to in paragraph (1), (2), or (4) of section 1137(b) of the Social Security Act (42 U.S.C. 1320b–7), until the earlier of—. It explains the data protection regime that applies to those authorities when processing personal data for law enforcement purposes. Mate translate – translator 4 1 0. It covers part 3 of the Data Protection Act 2018 (DPA 2018), which implements an EU Directive (Directive 2016/680) and is separate from the GDPR regime.

You may need a PDF reader to view some of the files on this page. See EPA's About PDF page to learn more.

Laws and Guidance

United States Code

  • The Privacy Act of 1974, 5 U.S.C. § 552a, as amended
  • The Freedom of Information Act, 5 U.S.C. § 552, as amended
  • Children's Online Privacy Protection Act of 1998 (PDF)(2 pp, 125 K), 15 U.S.C. § 6501, et seq.
  • Computer Matching and Privacy Protection Act of 1988, 11.3.39, as amended
  • Federal Information Security Modernization Act (FISMA) of 2014 (PDF)(16 pp, 62 K)

Code of Federal Regulations

  • EPA Privacy Act Regulations (PDF)(10 pp, 207 K), Federal Register: January 4, 2006 (Volume 71, Number 2)

Privatus 5 1 2 – Automated Privacy Protection Act Florida

FISMA Reporting Guidance

  • M-16-03, Fiscal Year 2015-2016 Guidance on Federal Information Security and Privacy Management Requirements (October 30, 2015)
  • M-15-01, Fiscal Year 2014-2015 Guidance on Improving Federal Information Security and Privacy Management Practices (October 3, 2014)
  • M-14-04, Fiscal Year 2013 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management (November 18, 2013)
  • M-12-20, FY 2012 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management (September 27, 2012)
  • M-11-33, FY 2011 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management (September 14,2011)
  • M-10-15, FY 2010 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management (April 21, 2010)
  • M-09-29, FY 2009 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management (August 20, 2009)
  • M-08-21, FY 2008 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management (July 14, 2008)
  • M-08-09, New FISMA Privacy Reporting Requirements for FY 2008 (January 18, 2008)
  • M-07-19, FY 2007 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management (July 25, 2007)
  • Management of Federal Information Resources, OMB Circular No. A-130
  • Guidance on Inter-Agency Sharing of Personal Data - Protecting Personal Privacy, OMB Memorandum M-01-05
  • OMB Memorandum, Recommendations for Identity Theft Related Data Breach Notifications (September 20, 2006)
  • M-03-22, OMB Guidance for Implementing the Privacy Provisions of the E-Government Act of 2002 (September 26, 2003)

Office of Management and Budget Memorandum How to add or remove text message spying.

  • M-16-24, Role and Designation of Senior Agency Officials for Privacy (Sep 15, 2016)
  • M-15-13, Policy to Require Secure Connections across Federal Websites and Web Services (June 8, 2015)
  • M-14-03, Enhancing the Security of Federal Information and Information Systems (November 18, 2013)
  • M-13-20, Protecting Privacy while Reducing Improper Payments with the Do Not Pay Initiative (August 16, 2013)
  • M-12-11, Reducing Improper Payments through the 'Do Not Pay List' (April 12, 2012)
  • M-11-27, Implementing the Telework Enhancement Act of 2010: Security Guidelines (July 15, 2011)
  • M-11-20, Implementing Telework Enhancement Act of 2010 IT Purchasing Requirements (April 28, 2011)
  • M-11-02, FY 2010 Sharing Data While Protecting Privacy (November 3, 2010)
  • M-10-23, FY 2010 Guidance for Agency Use of Third-Party Websites and Application (June 25, 2010)
  • M-10-22, FY 2010 Guidance for Online Use of Web Measurement and Customization Technologies (June 25, 2010)
  • M-08-01, HSPD-12 Implementation Status (October 23, 2007)
  • M-07-16, Safeguarding Against and Responding to the Breach of Personally Identifiable Information (May 22, 2007)
  • M-06-19, Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency Information Technology Investments (July 12, 2006)
  • M-06-16, Protection of Sensitive Agency Information (June 23, 2006)
  • M-06-15, Safeguarding Personally Identifiable Information (May 22, 2006)
  • M-05-08, Designation of Senior Agency Officials for Privacy (February 11, 2005)
  • M-01-05, Guidance on Inter-Agency Sharing of Personal Data - Protecting Personal Privacy (December 20, 2000)
  • M-00-13, Privacy Policies and Data Collection of Federal Web Sites (June 22, 2000)
  • M-99-18, Privacy Policies on Federal Web Sites (June 2, 1999)

FIPS 140-2

Date Published:May 25, 2001 (Change Notice 2, 12/3/2002)

Superseded By:FIPS 140-3 (03/22/2019)
Supersedes:FIPS 140-2 (10/10/2001)

Planning Note (3/22/2019):Testing of cryptographic modules against FIPS 140-2 will end on September 22, 2021. https://ameblo.jp/277inesac-kihw/entry-12649462578.html. See FIPS 140-3 Development for more details.

Author(s)

National Institute of Standards and Technology

Abstract

Protection

This Federal Information Processing Standard (140-2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module, include specification; ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self-tests; design assurance; and mitigation of other attacks.

This Federal Information Processing Standard (140-2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure. See full abstract

This Federal Information Processing Standard (140-2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module, include specification; ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self-tests; design assurance; and mitigation of other attacks.

2017

This Federal Information Processing Standard (140-2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module, include specification; ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self-tests; design assurance; and mitigation of other attacks.

This Federal Information Processing Standard (140-2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure. See full abstract

This Federal Information Processing Standard (140-2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module, include specification; ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self-tests; design assurance; and mitigation of other attacks.


Hide full abstract

Keywords

cryptographic module; FIPS 140-2; computer security; validation Control Families

Powerphotos 1 2 2. https://downqfiles598.weebly.com/how-to-leave-guild-wow-classic.html. Identification and Authentication; System and Communications Protection; System and Information Integrity

Documentation

Publication:
FIPS 140-2 (DOI)
Local Download

Supplemental Material:
Annex A: Approved Security Functions (pdf)
Annex B: Approved Protection Profiles (pdf)
Annex C: Approved Random Number Generators (pdf)
Annex D: Approved Key Establishment Techniques (pdf)
FIPS 140-2 (EPUB) (txt)
Comments on FIPS 140-1 (Oct. 1998) (pdf)

Document History:
12/03/02: FIPS 140-2 (Final)

Topics

Security and Privacy
acquisition; audit & accountability; cryptography; identity & access management; planning; testing & validation

Privatus 5 1 2 – Automated Privacy Protection Act Requirements

Laws and Regulations
Federal Information Security Modernization Act





broken image