HomeAbout UsTraining

Privacy Responsibilities and Training Links

Privacy is a personal and fundamental right protected by the Constitution of the United States. Protecting individuals from unwarranted invasion of their personal privacy is the overriding purpose of the Privacy Act of 1974. It is the law that we collect, maintain, use or disseminate records with identifiable personal information only for necessary and lawful purposes.


Privacy Position Descriptions and Responsibilities

Privacy Monitors/Managers are responsible for:
  • Administering the program within their organization
  • Supplying training resources
  •  Reviewing and coordinating on all Publications and forms generated at their level for adherence to the Privacy Act
  •  Staffing denial recommendations
  • Compiling reports and reviewing system notices

System Managers are responsible for:
  •  Managing, safeguarding, and evaluating their systems of records
  • Providing training resources to assure proper operation and maintenance of their system(s)
  • Preparing public notices and report for new or changed systems

Local System Managers are responsible for:
  •  Answering Privacy Act requests
  • Keeping accurate records of all reportable disclosures
  • Compiling annual report data

Legal offices are responsible for:
  •  Reviewing and coordinating all recommendations for denial/partial denial

Additional Training

Identifying and Safeguarding Personally Identifiable Information
(PII)


Portable Electronic Devices / Removable Storage Media
Date 03/11 - Ver 2.0
In this presentation, Department of Defense (DoD) information systems users will learn about significant security risks associated with portable electronic devices (PEDs), and removable storage media. Users will also learn which types of PEDs and removable storage media are of greatest concern to the DoD. Removable storage media is clearly defined, and users will gain a better understanding of exactly what portable electronic devices are. New restrictions on the use of PEDs and removable storage media are introduced, and users will learn what must be done to mitigate the security risks to DoD data, to include DoD policy regarding data encryption, stored on these devices. Users will have an opportunity to test their knowledge of DoD policy relating to storage and processing DoD Information using PEDs. (20 min.)

Phishing
Date 04/08 - Ver 1.0
This interactive training explains what phishing is and provides examples of the different types of phishing. It also provides guidelines to help individuals recognize phishing attempts so that appropriate actions may be taken to avoid these attacks and their consequences. It explains that phishing is a serious, high-tech scam and that system users are the best line of defense against phishing. Further, it illustrates why users should always be on the look out for phishing attempts even from people from within their organization. (15 min)

Additional Training (Cont)

Social Networking
Date 03/11 - Ver 1.0

This interactive presentation provides an introduction to social networking for Department of Defense (DoD) information system users. The presentation acknowledges the positive aspects of social networking, but also familiarizes users with some of the risks associated with social networking services, especially as military, civilian, or contractor members of the DoD. Particular emphasis is placed on the guidance for and limitations on personal use of social networking on DoD information systems. Practical experience is used to assist users with making informed choices on issues encountered when creating an online profile on a fictional social networking service. This training concludes with a brief summary of the dos and don'ts of social networking for DoD members, particularly on government computers. The information in this product can also benefit user's friends and family members. (0.5 hr)

Information Assurance Awareness Shorts
Date 01/09 - Ver 3.0

This product contains specific information related toIA topics.

For additional questions regarding Defense Information Systems Agency (DISA) training, please clickhere.

Other Sites

Point of Contacts

Air Force Privacy, Civil Liberties, Information Collection and AF Section 508 Compliance Office's
1800 Air Force Pentagon
Washington, DC 20330-1800

Point of  Contact:


AF PrivacyCivil Liberties, and Information Collections Offices
William Feeney: Email: William.s.feeney@us.af.mil

Org Box: DAF.privacy@us.af.mil