[NASA Logo]

NASA Procedures and Guidelines

This Document is Obsolete and Is No Longer Used.
Check the NODIS Library to access the current version:
http://nodis3.gsfc.nasa.gov


NPR 2810.1A
Eff. Date: May 16, 2006
Cancellation Date:

Security of Information Technology (Revalidated with Change 1, dated May 19, 2011)

| TOC | ChangeHistory | Preface | Chapter1 | Chapter2 | Chapter3 | Chapter4 | AppendixA | AppendixB | AppendixC | AppendixD | AppendixE | ALL |


Appendix E: References

E.1 40 U.S.C. § 11101, et seq., Chapter 808 of Pub. L 104-208, the Clinger-Cohen Act of 1996

E.2 44 U.S.C. § 3535, Federal Information Security Management Act (FISMA) of 2002

E.3 FIPS 200, Minimum Security Requirements for Federal Information and Information Systems, 2006

E.4 OMB Circular A-11, Preparation, Submission and Execution of the Budget, July 2004

E.5 OMB Circular A-130, Appendix III, Security of Federal Automated Information Resources, November 2000

E.6 OMB Memorandum M-00-13, Privacy Policies, and Data Collection on Federal Web Sites, June 22, 2000

E.7 OMB Memorandum M-03-19, Reporting Instructions for the Federal Information Security Management Act and Updated Guidance on Quarterly IT Security Reporting, August 2003

E.8 OMB Memorandum M-03-22, OMB Guidance for Implementing the Privacy Provisions of the E-Government Act of 2002, September 2003

E.9 OMB Memorandum M-04-04, E-Authentication Guidance for Federal Agencies, December 2003

E.10 OMB Memorandum M-05-24, Implementation of Homeland Security Presidential Directive (HSPD) 12—

E.11 OMB Memorandum M-06-16, Protection of Sensitive Agency Information, June 2006

E.12 OMB Memorandum M-06-20, FY 2006 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management, July 2006

E.13 OMB Memorandum M-07-16, Safeguarding Against and Responding to the Breach of Personally Identifiable Information, May 2007

E.14 OMB Memorandum M-08-21, FY 2008 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management, July 2008

E.15 National Telecommunications and Information System Security (NTISS) 1, National Policy on Application of Communications Security to U.S. Civil and Commercial Space Systems, June 17, 1982

E.16 NTISS 100, National Policy on Application of Communications Security to Command Destruct Systems, February 17, 1988

E.17 Homeland Security Presidential Directive 7 (HSPD-7), Critical Infrastructure Identification, Prioritization, and Protection, December 2003

E.18 GAO-09-232G, Federal Information System Controls Audit Manual (FISCAM)

E.19 NPD 1382.17, NASA Privacy Policy

E.20 NPD 1440.6, NASA Records Management

E.21 NPD 1600.2, NASA Security Policy

E.22 NPD 7100.8, Protection of Human Research Subjects

E.23 NPD 7120.4, NASA Engineering and Program/Project Management Policy

E.24 NPR 1660.1, Counterintelligence (CI)/Counterterrorism (CT) Procedural Requirement

E.25 NPR 2190.1, NASA Export Control Program

E.26 NPR 2800.1, Managing Information Technology

E.27 NPR 2830.1, NASA Enterprise Architecture Procedures

E.28 NPR 7100.1, Protection of Human Research Subjects

E.29 NPR 7120.5, NASA Space Flight Program and Project Management Requirements

E.30 NPR 7120.6, Lessons Learned Process

E.31 NPR 7150.2, NASA Software Engineering Requirements



| TOC | ChangeHistory | Preface | Chapter1 | Chapter2 | Chapter3 | Chapter4 | AppendixA | AppendixB | AppendixC | AppendixD | AppendixE | ALL |
 
| NODIS Library | Legal Policies(2000s) | Search |

DISTRIBUTION:
NODIS


This Document is Obsolete and Is No Longer Used.
Check the NODIS Library to access the current version:
http://nodis3.gsfc.nasa.gov