Confidential communication (71 - 78 of 78 items)
Computer Security: Status of Compliance With the Computer Security Act of 1987
IMTEC-88-61BR: Published: Sep 22, 1988. Publicly Released: Sep 22, 1988.
Pursuant to a congressional request, GAO reviewed whether federal agencies complied with provisions of the Computer Security Act of 1987, specifically whether, by July 8, 1988: (1) the Office of Personnel Management (OPM) had issued regulations prescribing the procedures and scope of training for federal civilian employees; and (2) federal agencies had identified which computer systems contained s...
Status of Compliance With the Computer Security Act of 1987
T-IMTEC-88-8: Published: Sep 22, 1988. Publicly Released: Sep 22, 1988.
In response to a congressional request, GAO discussed federal agencies' compliance with Computer Security Act of 1987 requirements to: (1) establish training programs; and (2) identify computer systems that contain sensitive information. GAO found that: (1) 74 of the 89 agencies identified all of their sensitive systems; (2) six agencies had not yet identified all of their sensitive systems; and (...
The Computer Security Act of 1987--H.R. 145
T-IMTEC-87-2: Published: Feb 25, 1987. Publicly Released: Feb 25, 1987.
GAO discussed legislation which would provide for the security and privacy of sensitive information in federal computer systems through the: (1) development of computer security standards, research, and training; and (2) establishment of security plans by operators of federal computer systems that store and transmit sensitive information. GAO found that: (1) much of the underlying purpose of H.R....
Tax Information Safeguard Activity Annual Report
GGD-85-71: Published: Aug 23, 1985. Publicly Released: Aug 23, 1985.
GAO reviewed the Internal Revenue Service's (IRS) tax information safeguard activities for the calendar year ended December 31, 1984, to assess: (1) significant changes in safeguard procedures or authorized access to tax return information; (2) any changes or enhancements to physical and computer security measures used to safeguard tax information; and (3) the results of internal inspections condu...
Central Agencies' Compliance With OMB Circular A-71, Transmittal Memorandum No. 1
LCD-80-56-I: Published: Apr 30, 1980. Publicly Released: May 2, 1980.
GAO summarized actions taken by the Office of Management and Budget (OMB) in its leadership role relating to agencies' automated systems security programs and actions taken by key central agencies to comply with the requirements of OMB Circular A-71, transmittal memorandum No. 1, entitled "Security of Federal Automated Information Systems."A task team's evaluations of agencies' plans showed that s...
Followup on Computer Security at the Social Security Administration
HRD-79-114: Published: Sep 4, 1979. Publicly Released: Sep 4, 1979.
A followup review was made of the management of computer security at the Social Security Administration (SSA) headquarters.GAO found several management problems in computer security at the SSA headquarters leading to possible misuses, abuse, or destruction of social security beneficiary records. SSA provides limited safeguards to protect both automated beneficiary records and documents supporting...
Privacy Protection and Technology
095385: Feb 13, 1979
Large data banks of personal information exist in various Government agencies, and only the current inability to centrally obtain this information precludes the use of Government sources to establish comprehensive individual dossiers. The first attempt to centralize Government-held computerized information in the mid-1960's met with concern over the potential for a large concentration of data whic...
Multilevel Computer Security Requirements of the World Wide Military Command and Control System (WWMCCS)
LCD-78-106: Published: Apr 5, 1978. Publicly Released: Apr 5, 1978.
The World Wide Military Command and Control System (WWMCCS) is a composite of military command facilities, communications, warning systems, and computers located throughout the world to support military command and control activities. A followup review was conducted to determine whether the multilevel computer security requirements of WWMCCS were being properly provided for by the Department of De...