Financial institutions on dod installations Such information is also known as personally identifiable information (i.e., information which can be used to distinguish or trace an individual's identity, such as their name, social security number, date and place of birth, mother's maiden name, biometric records, including any other personal information which is linked or linkable to a specified individual). Authoritative Guidance This DoD FMR volume is issued by authority of DoD Instruction 7000.14, DoD Financial Management Policy and Procedures; and.
Mil/dpap/ccap/cc/jcchb/Files/Topical/Paying_Agent/policy/. Context can be very important when determining whether a PII breach is considered hh or low risk with regards to the potential for individual harm or identity theft. DoD Financial Management Regulation Volume 5, Chapter 2 Ë October 2008 SUMMARY OF. U. S. Government Accountability Office Policy and Procedures Manual.
Mil/pubs/dr/12 chapter.pdf For purposes of determining whether individual notifications would be required if there were a PII breach or whether a PIA was required for an IT system that collects PII, PII elements are categorized as sensitive PII (i.e., if this information was lost or compromised it could potentially result in harm or identity theft) or non-sensitive PII, also known as Internal Government Operations or business related PII, (i.e., the risk of harm or identity theft associated with the loss or compromise would be minimal to non-existent). Manual SAMM, 3 October 2003, Financial Management Regulation 7000.14-R, Volume 15, Security Assistance Policy and Procedures, 18 March 1993.
Financial Audit The Department of Defense's Fiscal Year 2004. The following information is provided to help you better understand what constitutes personally identifiable information (PII). Financial Audit Manual FAM section 1001, entitled "Management Representations." DOD's fiscal year 2004 management representation letter did not.
Ustranscom.mil/dtr/dtr_references.pdf It also attempts to explain what PII elements are considered "sensitive" and "non-sensitive" and the roll these categories play when reporting a loss or compromise of PII (i.e., a breach) or determining when a Privacy Impact Assessment (PIA) is required for an information technology system. Manual 37-100-15, Financial Management, The Army Structure Fiscal Year 2015 Defense Logistics Manual, 4000.25, Defense Logistics Management System.
Dod financial management policy manual:
Rating: 96 / 100
Overall: 90 Rates