Page History
Title: | Security for Information Technology |
Publication date: | 1/2/2012 |
Effective date: | 3/20/2007 |
BRIEF
Policy Summary
This policy describes security responsibilities and requirements for Laboratory Information Technology (IT). This includes responsibilities and requirements for:
- Individuals and supervisors
- Certain roles such as system administrator, Web server owner, and application developer
- Divisions, including division security liaisons
- The Computer Protection Program (CPP)
Who Should Read This Policy
- Employees and affiliates who use or manage Laboratory IT or Laboratory Information
- Employees with additional security responsibilities for Laboratory IT, such as computer security liaisons or members of the CPP
To Read the Full Policy, Go To:
Contact Information
Information Technology Policy Manager
Information Technology Division
[email protected]
End Brief
Title: | Security for Information Technology |
Publication date: | 1/2/2012 |
Effective date: | 3/20/2007 |
POLICY
To read the full policy, go to:
Contact Information
Information Technology Policy Manager
Information Technology Division
[email protected]
Revision History
Date | Revision | By whom | Revision Description | Section(s) affected | Change Type |
1/2/2012 | 0 | J. Bonaguro | Rewrite for wiki | All | Minor |
Remove this text after wiki tabs are set. End Policy.
DOCUMENT INFORMATION
Title: | Security for Information Technology |
Document number | 10.01.002.000 |
Revision number | 0 |
Publication date: | 1/2/2012 |
Effective date: | 3/20/2007 |
Next review date: | 12/1/2014 |
Policy Area: | Information Technology |
RPM Section (home) | Information Management |
RPM Section (cross-reference) | Sections 9.01 and 9.02 |
Functional Division | Information Technology |
Prior reference information (optional) | RPM Sections 9.01 and 9.02 |
Source Requirements Documents
- DOE O 205.1A, Department of Energy Cyber Security Management, CRD
- DOE O 205.1B, Department of Energy Cyber Security Management, CRD
- DOE P 205.1, Departmental Cyber Security Management Policy
- UCOP IS-3, Electronic Information Security
Implementing Documents
Document number | Title | Type |
|
|
|
Remove this text after wiki tabs are set. End Document Info.
ADDITIONAL INFORMATION
Title: | Security for Information Technology | |
Document number | 10.01.002.000 | |
Revision number | 0 | |
Publication date: | 1/2/2012 | |
Effective date: | 3/20/2007 | |
Next review date: | 12/1/2014 | |
Policy Area: | Information Technology | |
RPM Section (home) | Information Management | |
RPM Section (cross-reference) | Sections 9.01 and 9.02 | |
Functional Division | Information Technology | |
Author name/contact info | J. Bonaguro | |
|
| |
Revision 0 publication date | 1/2/2012 | |
Retirement date | n/a | |
Prior reference information (optional) | RPM Sections 9.01 and 9.02 | |
|
| |
Inputs from more than one Functional Area? | No | |
List additional Functional Areas & contacts |
| |
|
| |
Inputs from more than one Policy Area? | No | |
List additional Policy Areas & contacts |
| |
|
| |
30-day notification needed? | No | |
30-day start date | n/a | |
30-day end date | n/a | |
|
| |
LDAP protected? | No | |
|
| |
Need TABL reminders? | No | |
Frequency | n/a | |
Brief reminder text: | n/a | |
|
| |
Approval Sheet for this revision received (date) |
| ]]></ac:plain-text-body></ac:structured-macro> |
Key labels/tags:
- Information Technology, Information Management
New terms that need to be added to Glossary/Acronym list:
None
Implementing Documents restricted to department/functional use
(optional – these will be used for tracing between requirements and associated documents)
Document number | Title |
|
|
|
|
Side bars:
Side bar 1 location (cite by Policy Section # - for example: Section D.2.a)
Sidebar 1 text:
Sidebar 2 location
Sidebar 2 text:
Sidebar 3 location
Sidebar 3 text:
Remove this text after establishing wiki tabs End Additional Information