Download Free Information Security Additional Actions Needed To Fully Implement Reform Legislation Book in PDF and EPUB Free Download. You can read online Information Security Additional Actions Needed To Fully Implement Reform Legislation and write the review.

In March, we testified before your subcommittee on the federal governments first-year efforts to implement legislative provisions for Government Information Security Reform (the reform provisions).1 In brief, we reported that initial implementation of the reform provisions is a significant step in improving federal agencies information security programs and addressing their serious, pervasive information security weaknesses, and has resulted in agency benefits and important actions by the administration to address information security.
The SSN was created in 1936 to track workers' earnings and eligibility for Social Security (SS) benefits. Since that time, the SSN has been used for many non-SS purposes, and private sector use of the SSN has grown. This has raised concern over how this personal info. is being used and protected, esp. with the growth in electronic record keep. and the explosion of info. over the Internet, combined with a rise in identity theft. This report studied: the extent and nature of Fed., state, and county gov't. agencies' use of SSNs; the actions gov't. agencies take to safeguard SSNs from improper use; the extent and nature of Fed., state, and county governments' use of SSNs when they are in public records (PR); and the options available to safeguard SSNs when they are in PR.