Title: |
Security for Information Technology |
Publication date: |
1/2/2012 |
Effective date: |
3/20/2007 |
BRIEF
Policy Summary
This policy describes security responsibilities and requirements for Laboratory Information Technology (IT). This includes responsibilities and requirements for:
- Individuals and supervisors
- Certain roles such as system administrator, Web server owner, and application developer
- Divisions, including division security liaisons
- The Computer Protection Program (CPP)
Who Should Read This Policy
- Employees and affiliates who use or manage Laboratory IT or Laboratory Information
- Employees with additional security responsibilities for Laboratory IT, such as computer security liaisons or members of the CPP
To Read the Full Policy, Go To:
Contact Information
Information Technology Policy Manager
Information Technology Division
[email protected]
End Brief
Title: |
Security for Information Technology |
Publication date: |
1/2/2012 |
Effective date: |
3/20/2007 |
POLICY
To read the full policy, go to:
Contact Information
Information Technology Policy Manager
Information Technology Division
[email protected]
Revision History
Date |
Revision |
By whom |
Revision Description |
Section(s) affected |
Change Type |
1/2/2012 |
0 |
J. Bonaguro |
Rewrite for wiki |
All |
Minor |
Remove this text after wiki tabs are set. End Policy.
DOCUMENT INFORMATION
Title: |
Security for Information Technology |
Document number |
10.01.002.000 |
Revision number |
0 |
Publication date: |
1/2/2012 |
Effective date: |
3/20/2007 |
Next review date: |
12/1/2014 |
Policy Area: |
Information Technology |
RPM Section (home) |
Information Management |
RPM Section (cross-reference) |
Sections 9.01 and 9.02 |
Functional Division |
Information Technology |
Prior reference information (optional) |
RPM Sections 9.01 and 9.02 |
Source Requirements Documents
- DOE O 205.1A, Department of Energy Cyber Security Management, CRD
- DOE O 205.1B, Department of Energy Cyber Security Management, CRD
- DOE P 205.1, Departmental Cyber Security Management Policy
- UCOP IS-3, Electronic Information Security
Implementing Documents
Document number |
Title |
Type |
|
|
|
Remove this text after wiki tabs are set. End Document Info.
ADDITIONAL INFORMATION
Title: |
Security for Information Technology |
|
Document number |
10.01.002.000 |
|
Revision number |
0 |
|
Publication date: |
1/2/2012 |
|
Effective date: |
3/20/2007 |
|
Next review date: |
12/1/2014 |
|
Policy Area: |
Information Technology |
|
RPM Section (home) |
Information Management |
|
RPM Section (cross-reference) |
Sections 9.01 and 9.02 |
|
Functional Division |
Information Technology |
|
Author name/contact info |
J. Bonaguro |
|
|
|
|
Revision 0 publication date |
1/2/2012 |
|
Retirement date |
n/a |
|
Prior reference information (optional) |
RPM Sections 9.01 and 9.02 |
|
|
|
|
Inputs from more than one Functional Area? |
No |
|
List additional Functional Areas & contacts |
|
|
|
|
|
Inputs from more than one Policy Area? |
No |
|
List additional Policy Areas & contacts |
|
|
|
|
|
30-day notification needed? |
No |
|
30-day start date |
n/a |
|
30-day end date |
n/a |
|
|
|
|
LDAP protected? |
No |
|
|
|
|
Need TABL reminders? |
No |
|
Frequency |
n/a |
|
Brief reminder text: |
n/a |
|
|
|
|
Approval Sheet for this revision received (date) |
|
]]></ac:plain-text-body></ac:structured-macro> |
Key labels/tags:
- Information Technology, Information Management
New terms that need to be added to Glossary/Acronym list:
None
Implementing Documents restricted to department/functional use
(optional – these will be used for tracing between requirements and associated documents)
Document number |
Title |
|
|
|
|
Side bars:
Side bar 1 location (cite by Policy Section # - for example: Section D.2.a)
Sidebar 1 text:
Sidebar 2 location
Sidebar 2 text:
Sidebar 3 location
Sidebar 3 text:
Remove this text after establishing wiki tabs End Additional Information