Preview

CAC And The Importance Of PII

Good Essays
Open Document
Open Document
537 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CAC And The Importance Of PII
The CAC and the importance of PII

The department of defense starting using the Common Access Card or CAC in the spring of 2001. The CAC is used to enable physical access to building, installations, and controlled spaces, and is used to securely access unclassified information systems and applications that link the Department's computer networks. It also allows users to log on to their computer, encrypt e-mail, or digitally sign documents. Which if that that was not enough to insure the fact that it needs to constantly accountable for the CAC holds various forms of PII. The CAC contains a soldier’s first, middle, and last names, person designator code, rank, Social Security Number, Geneva Convention Category, date of birth, organ donor

You May Also Find These Documents Helpful

  • Powerful Essays

    MFH OPORD

    • 2221 Words
    • 11 Pages

    Not Used. b. Concept of Operations. When tasked by the Army Casualty Assistance Center (CAC) the Army Reserve (AR) provides MFH support for eligible deceased Soldiers. Upon receiving a tasking from the Army CAC, the AR forms either a nine-Soldier or two-Soldier detail based on the deceased Soldier's eligibility. This duty is both an honor and privilege to perform.…

    • 2221 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The Federal Acquisition Regulation (FAR), issued by the Department of Defense, guides the content of military contracts. Federal government organizations other than the military and intelligence agencies must follow the Federal Information Security Management Act of 2002. Federal Information Processing Standards (FIPS) 200, "Minimum Security Requirements for Federal Information and Information Systems," defines the minimum security requirements that information systems must meet. While the military does not have to follow FISMA, they do enact the security policies contained in the act. The military also implements the security controls found in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems; and NIST SP 800-53, Recommended Security Controls for Federal Information Systems and Organizations. NIST SP 800-53, Appendix F, contains the Security Control Catalog. There is currently no specific law directing the information security policy content for defense contractors. However, Congress is proposing to make the policies in FISMA and the security controls in NIST SP 800-53 applicable to contractors that are awarded military contracts. Information Assurance Implementation, DoD Instruction 8500.2, states the computer network security controls required to be implemented in military computer networks (Enclosure 4, Attachments 1 thru 5). The other references noted in this paper give broad…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    CMGT582 Wk2 IA

    • 1133 Words
    • 4 Pages

    The U.S. Department of Defense (DoD) Information Security policy is managed by the Defense Information Systems Agency. DISA, one of five Combat Support Agencies designated by the Secretary of Defensei, administers “command and control (C2)” functions, information sharing effectiveness, and global operational information infrastructure projects, while providing support to force warfighters, national-level leaders, and coalition friendly forces across a wide range of undertakings. DISA’s perception is to “provide information superiority in defense of the United States.”…

    • 1133 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Unit 4222-307 Answers

    • 767 Words
    • 4 Pages

    The Information Security Policy creates a framework to protect the Council’s information, whether electronic or paper based from any form of threat, including both internal, and external, deliberate or accidental. It ensures that any data or information held is protected from unauthorised access and that its integrity and confidentiality is maintained.…

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    mandatory and discretionary access control policies. ACM Transactions on Information and System Security, Vol. 3, No. 2.…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    O'Brien's The Things They Carried describes the many different things soldiers carried during the war. Of course they would carry items they would need to survive but not only that, they would also carry personal items. Some of the things the soldiers would carry were a little odd but would mean something to them. Ranging from Henry Dobbins' girlfriend's pantyhose to Mitchell Sanders' condoms, the unit was filled with bizarre articles that held sentimental feeling. Lieutenant Jimmy Cross, however, restricted his personal belongings to pictures and letters from Martha.…

    • 709 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    In t fid en tia l ity The CIA Triad Co n y rit eg Availability NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Best Essays

    George Tenet CIA

    • 3296 Words
    • 14 Pages

    The Central Intelligence Agency (CIA) is an independent United States Government agency who are responsible for providing national security intelligence to senior United States policymakers (CIA,2007). Since the 1960 's and World War II, foreign intelligence has been important to the United States since the days of President George Washington, that such efforts have been coordinated on a government-wide level. The Central Intelligence Agency Act was passed in 1949, which supplemented the 1947 Act, granting the Agency more powers. The agency was permitted to use confidential fiscal and administrative procedures and was exempted from many of the usual limitations on expenditures. Thus, allowing funds to now be accounted in budgets of other departments and then transferred to the Agency without restrictions, while ensuring the secrecy of the CIA’s budget, which is an important consideration in covert operations. The Act created a Director of Central Intelligence (DCI) as head of the Intelligence Community, head of the CIA, and principal…

    • 3296 Words
    • 14 Pages
    Best Essays
  • Good Essays

    In my document I will be describing the purpose of the AICPA Code of Professional Conduct and why it is considered the foundation of ethical reasoning in accounting. As well as answer the following questions: What do you think are the three most important principles of the AICPA Code of Professional Conduct? And, why are those three the most important?…

    • 708 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Officials said roughly 15 lost or stolen cac cards are replaced each day and one-third of them are for repeat offenders. While the statistic may not trigger alarms, it is a cause for concern among base officials. After all, only 5 percent of lost cards are found and turned in.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    CAUTI In Healthcare

    • 1514 Words
    • 7 Pages

    CAUTI is a serious infection that can be avoided. It is a healthcare associated infection that is obtained while a patient is receiving care and treatment in a hospital. The patient is being treated for another illness, however will start needing treatment for an unnecessary urinary tract infection due to foley catheter use. CAUTI is one of the top 10 leading causes of death that can be absolutely prevented. This type of infection is one of the most common in the acute care setting. Many people in the United States are diagnosed with a community acquired urinary tract infection, (CAUTI) while they are in the hospital. This acute illness affects people in so many ways; the various symptoms someone can experience are: the constant blood tests…

    • 1514 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Your Common Access Card, otherwise known as a CAC card, is an important piece of identification that should always be carried around with you especially on and around military bases and facilities. The CAC card has many functions and information that is all personal to you as a military member or Department of Defense worker.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The Things They Carried

    • 1105 Words
    • 5 Pages

    The things they were required to carry depended on the mission, job title, as well as standard necessities. "Lieutenant Jimmy Cross carried a compass, maps, code books, binoculars, a .45 caliber pistol, as well as a strobe light." The…

    • 1105 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Aaa Triad

    • 455 Words
    • 2 Pages

    Authentication is how you verify a user’s identity through the use of a shared secret (like a password), a key, or biometric measure (like a fingerprint). Again, at my work we use this as well to determine who can enter our building. When you check on board, you take your military ID and have your common access card (CAC) put in a machine which puts an access control in it allowing you to the building. Then you pick a password to type in so it will let you enter the building. Since we deal with top secret material on our top floor we only allow certain personnel in. This is a great security measure, so if someone that would want to enter our building and steal secret material they won’t be able to enter the building because their ID would not work in the door.…

    • 455 Words
    • 2 Pages
    Good Essays