4
KEY INFORMATION TECHNOLOGY RELATED POLICIES Claude J. Christensen Director Office of Information Resources Management

KEY INFORMATION TECHNOLOGY RELATED POLICIES

Embed Size (px)

DESCRIPTION

KEY INFORMATION TECHNOLOGY RELATED POLICIES. Claude J. Christensen Director Office of Information Resources Management. Key Federal IT Policies. Clinger-Cohen (aka Information Technology Management Reform Act – ITMRA) THE federal legislation guiding information technology activities. - PowerPoint PPT Presentation

Citation preview

Page 1: KEY INFORMATION TECHNOLOGY RELATED POLICIES

KEY INFORMATION TECHNOLOGY RELATED

POLICIES

Claude J. Christensen

DirectorOffice of Information Resources Management

Page 2: KEY INFORMATION TECHNOLOGY RELATED POLICIES

Key Federal IT PoliciesClinger-Cohen (aka Information Technology Management Reform Act – ITMRA)

THE federal legislation guiding information technology activities.Established Agency CIO position.

Paperwork Reduction Act (PWRA)Requires systematic reduction of paper based government transactions and annual Information Collection Budget reporting.

Government Paperwork Elimination Act (GPEA)Requires on-line availability of most government information and services by October 2003

Government Performance and Results Act (GPRA)Integrates IT budgeting, planning, and program performanceRequires development and inclusion of performance metrics.

Page 3: KEY INFORMATION TECHNOLOGY RELATED POLICIES

Key Federal IT Policies (continued)

Government Information Security Reporting Act (GISRA)Integrates IT security program planning, reporting, and budgeting.

Requires inclusion of risk management planning in agency IT programs.

Health Insurance Portability and Accountability Act – (HIPAA -1996)

Mandates health care record privacy, security, and electronic transaction restrictions.

Transaction compliance required by 10/16/02.

Privacy compliance required by 4/14/03.

Page 4: KEY INFORMATION TECHNOLOGY RELATED POLICIES

Key Peace Corps IT PoliciesManual Section (MS) 542

Establishes and regulates IT Security Program policies and procedures.

Database Development PolicyGuides development and support of enterprise and local business application and database systems.

Appropriate Use PolicyEstablishes policy for appropriate use of Agency IT resources.

IT “TIPS” SheetsProcedural guides for how to do IT stuff…

All of the above (and more) available on the Intranet