Confidential communication (41 - 45 of 45 items)
Computer Security: Status of Compliance With the Computer Security Act of 1987
IMTEC-88-61BR: Published: Sep 22, 1988. Publicly Released: Sep 22, 1988.
Pursuant to a congressional request, GAO reviewed whether federal agencies complied with provisions of the Computer Security Act of 1987, specifically whether, by July 8, 1988: (1) the Office of Personnel Management (OPM) had issued regulations prescribing the procedures and scope of training for federal civilian employees; and (2) federal agencies had identified which computer systems contained s...
Status of Compliance With the Computer Security Act of 1987
T-IMTEC-88-8: Published: Sep 22, 1988. Publicly Released: Sep 22, 1988.
In response to a congressional request, GAO discussed federal agencies' compliance with Computer Security Act of 1987 requirements to: (1) establish training programs; and (2) identify computer systems that contain sensitive information. GAO found that: (1) 74 of the 89 agencies identified all of their sensitive systems; (2) six agencies had not yet identified all of their sensitive systems; and (...
The Computer Security Act of 1987--H.R. 145
T-IMTEC-87-2: Published: Feb 25, 1987. Publicly Released: Feb 25, 1987.
GAO discussed legislation which would provide for the security and privacy of sensitive information in federal computer systems through the: (1) development of computer security standards, research, and training; and (2) establishment of security plans by operators of federal computer systems that store and transmit sensitive information. GAO found that: (1) much of the underlying purpose of H.R....
Followup on Computer Security at the Social Security Administration
HRD-79-114: Published: Sep 4, 1979. Publicly Released: Sep 4, 1979.
A followup review was made of the management of computer security at the Social Security Administration (SSA) headquarters.GAO found several management problems in computer security at the SSA headquarters leading to possible misuses, abuse, or destruction of social security beneficiary records. SSA provides limited safeguards to protect both automated beneficiary records and documents supporting...
Privacy Protection and Technology
095385: Feb 13, 1979
Large data banks of personal information exist in various Government agencies, and only the current inability to centrally obtain this information precludes the use of Government sources to establish comprehensive individual dossiers. The first attempt to centralize Government-held computerized information in the mid-1960's met with concern over the potential for a large concentration of data whic...