Top 20 Security Program
Action Items for Transit Agencies
18. Access to security sensitive documents is
controlled.
|
Guide for Developing
Security Plans for Information Technology
Systems
Federal Computer Security Program,
National Institute of Standards and
Technology
December 1998
This in-depth document contains guidelines
to protect information technology and
physical security resources in the form of
management controls and operational controls.
It includes information on the organization,
procedures and oversight necessary to ensure
that only legitimate users of the information
system or physical facility obtain sensitive
information which may affect security or
emergency preparedness.
|
DOC
|
Interim Sensitive Security
Information (SSI) Policies and Procedure for Safeguarding
and Control
Transportation Security Administration
November 2002This document specifies the
requirements that must be implemented immediately by all
employees and contractors covered under paragraph 3 of this
document to mark, store, control, transmit, destroy, and
manage the release or withholding of Sensitive Security
Information (SSI). This policy covers SSI in every form in
which it is stored, including paper, electronic, magnetic,
and other media. This policy contains the minimum standards
for employees and contractors to mark, store, control,
transmit, and destroy SSI.
|
DOC |
|