Viewable by the world
Group Access to RPM
Can VIEW the space: rpm2-editors ,  rpm2-admins ,  confluence-users ,  anonymous ,  confluence-administrators , 
Can EDIT the space: rpm2-editors ,  confluence-administrators ,  rpm2-admins , 
Can ADMINISTER the space: confluence-administrators , 

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Wiki Markup
{dojo-tabs:theme=tundra}
{dojo-tab:title=Brief|selected=true}

|Title:|Security for Information Technology|
|Publication date:|

...

Title:

...

Security for Information Technology

...

Publication date:

1/2/2012

...

|
|Effective date:

...

|3/20/2007

...

BRIEF

Policy Summary

...

|
h2.BRIEF
h3.Policy Summary
This policy describes security responsibilities and requirements for Laboratory Information Technology (IT). This includes responsibilities and requirements for:

...


* Individuals and supervisors

...


* Certain roles such as system administrator, Web server owner, and application developer

...


* Divisions, including division security liaisons

...


* The Computer Protection Program (CPP)

...



h3.Who Should Read This Policy

...


* Employees and affiliates who use or manage Laboratory IT or Laboratory Information

...


* Employees with additional security responsibilities for Laboratory IT, such as computer security liaisons or members of the CPP

...



h3.To Read the Full Policy, Go To

...

:
* [http://www.lbl.gov/Workplace/RPM/R9.01.html|http://www.lbl.gov/Workplace/RPM/R9.01.html

...

] 
* [http://www.lbl.gov/Workplace/RPM/R9.02.html|http://www.lbl.gov/Workplace/RPM/R9.02.html

...

]

h3.Contact Information

...


Information Technology Policy Manager

...


Information Technology

...

Title:

...

Security for Information Technology

...

Publication date:

 Division
[[email protected]|mailto:[email protected]]

{dojo-tab}
{dojo-tab:title=Policy}

|Title: |Security for Information Technology|
|Publication date: |1/2/2012

...

|
|Effective date:

...

 |3/20/2007

...

POLICY

To read the full policy, go to:

|
h2.POLICY
To read the full policy, go to: 
* [http://www.lbl.gov/Workplace/RPM/R9.01.html|http://www.lbl.gov/Workplace/RPM/R9.01.html

...

] 
* [http://www.lbl.gov/Workplace/RPM/R9.02.html|http://www.lbl.gov/Workplace/RPM/R9.02.html

...

]

h3.Contact Information

...


Information Technology Policy Manager

...


Information Technology

...

 Division
[[email protected]|mailto:[email protected]

...

]
h3.Revision History

...

Date

...

Revision

...

By whom

...

Revision Description


|*Date*|*Revision*|*By whom*|*Revision Description*|*Section(s) affected

...

*|*Change Type

...

*|
|1/2/2012

...

|0

...

|J. Bonaguro

...

|Rewrite for wiki

...

|All

...

Minor

...

DOCUMENT INFORMATION

...

Title:

...

Security for Information Technology

...

Document number

|Minor|

{dojo-tab}
{dojo-tab:title=Document Information}

h2.DOCUMENT INFORMATION
|Title: |Security for Information Technology|
|Document number|10.01.002.000

...

|
|Revision number

...

|0

...

|
|Publication date:

...

 |1/2/2012

...

|
|Effective date:

...

 |3/20/2007

...

|
|Next review date:

...

|12/1/2014

...

 |
|Policy Area:

...

|Information Technology

...

|
|RPM Section (home)

...

|Information Management

...

|
|RPM Section (cross-reference)

...

|Sections 9.01 and 9.02

...

|
|Functional Division

...

|Information Technology

...

|
|Prior reference information (optional)

...

|RPM Sections 9.01 and 9.02

...

|
h3.Source Requirements Documents

...


* DOE O 205.1A, _Department of Energy Cyber Security Management{_}, CRD

...


* DOE O 205.1B, _Department of Energy Cyber Security Management{_}, CRD

...


* DOE P 205.1, _Departmental Cyber Security Management Policy

...

_ 
* UCOP IS-3, _Electronic Information Security

...

_

h3.Implementing Documents

...

 
|*Document number

...

Title

...

Type

...

 

...

 

...

 

...

ADDITIONAL INFORMATION

...

Title:

...

Security for Information Technology

...

Document number

*|*Title*|*Type*|
| | | |

{dojo-tab}
{builder-show:group=rpm2-admins}
{dojo-tab:title=Additional Information}

h2.ADDITIONAL INFORMATION
|Title: |Security for Information Technology|
|Document number|10.01.002.000

...

|
|Revision number

...

|0

...

|
|Publication date:

...

 |1/2/2012

...

|
|Effective date:

...

 |3/20/2007

...

|
|Next review date:

...

|12/1/2014

...

|
|Policy Area:

...

|Information Technology

...

|
|RPM Section (home)

...

|Information Management

...

|
|RPM Section (cross-reference)

...

|Sections 9.01 and 9.02

...

|
|Functional Division

...

 |Information Technology

...

|
|Author name/contact info

...

|J.

...

 

...

 

...

Revision 0 publication date

 Bonaguro|
| | |
|Revision 0 publication date|1/2/2012

...

|
|Retirement date

...

|n/a

...

|
|Prior reference information (optional)

...

|RPM Sections 9.01 and 9.02

...

 

...

 

...

Inputs from more than one Functional Area?

...

No

...

List additional Functional Areas & contacts

...

 

...

 

...

 

...

Inputs from more than one Policy Area?

...

No

...

List additional Policy Areas & contacts

...

 

...

 

...

 

...

30-day notification needed?

...

No

...

30-day start date

...

n/a

...

30-day end date

...

n/a

...

 

...

 

...

LDAP protected?

...

No

...

 

...

 

...

Need TABL reminders?

...

No

...

Frequency

...

n/a

...

Brief reminder text:

...

n/a

...

 

...

 

...

Approval Sheet for this revision received (date)
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="0cf2f748-3a77-4054-b71b-1a21fd9379c0"><ac:plain-text-body><![CDATA[[Note: author is responsible}

...

 

...

]]></ac:plain-text-body></ac:structured-macro>

Key labels/tags:

  • Information Technology, Information Management

New terms that need to be added to Glossary/Acronym list:

None

Implementing Documents restricted to department/functional use

(optional – these will be used for tracing between requirements and associated documents)

Document number

Title

 

 

 

 

...

|
| | |
|Inputs from more than one Functional Area?|No|
|List additional Functional Areas & contacts| |
| | |
|Inputs from more than one Policy Area?|No|
|List additional Policy Areas & contacts| |
| | |
|30-day notification needed?|No|
|30-day start date|n/a|
|30-day end date|n/a|
| | |
|LDAP protected?|No|
| | |
|Need TABL reminders?|No|
|Frequency|n/a|
|Brief reminder text:|n/a|
| | |
|Approval Sheet for this revision received (date)  \\
\[Note: author is responsible\}| |
h3.Key labels/tags:
* Information Technology, Information Management

h3.New terms that need to be added to Glossary/Acronym list:
None
h3.Implementing Documents restricted to department/functional use 
(optional – these will be used for tracing between requirements and associated documents)
|Document number|Title|
| | |
| | |

*Side bars:* 
Side bar 1 location (cite by Policy Section # - for example: Section D.2.a)
Sidebar 1 text:
Sidebar 2 location
Sidebar 2 text:
Sidebar 3 location
Sidebar 3 text:

{dojo-tab}
{builder-show}
{dojo-tabs}