Training Materials and Resources
Privacy Briefs:
- February 2014 DON CIO IT PII Brief
- May 2012 DON CIO PIA Workshop Brief
- May 2012 Identity Theft Brief
- May 2012 Social Security Number Reduction Brief
- Digitally Signing and Encrypting Email Containing PII Brief
- PII-Brochure
Training:
- Annual Privacy and PII Awareness Training
- PII Annual Training Certificate
- PII Refresher Training Scenarios
- ALNAV 070/07: DON PII Annual Training Policy
- GENADMIN DTG 181905Z DEC 08: DON PII Training Requirement
- Privacy Act Training
Privacy Placards and Posters:
- No PII Placard
- Generic PII poster
- Hard Drive Disposal poster
- Identity Theft PII poster
- Laptop Theft poster
- U.S. Marine Corps PII poster
- U.S. Navy PII poster
Safeguarding PII:
- DON Users Guide to Personally Identifiable Information
- How to Remove Your PII From Public Websites
- "No PII" Placard for Use on Dumpsters and Recycle Bins
- UNSECNAV memo dated Feb. 10, 2010: "Safeguarding Personally Identifiable Information"
- NAVADMIN 125/10: "Safeguarding Personally Identifiable Information"
- DTG 031648Z Oct 11: "Acceptable Use Policy for DON IT Resources"
- Customize Your Email to Make Signing/Encrypting Messages Easier
- Safe Access File Exchange
- DON Digital Signature and Encryption Policy for Emails Containing PII
- Privacy Act Data Cover Sheet
- Unauthorized Disclosures of Classified Information or Controlled Unclassified Information on DoD Information Systems
Privacy Tips:
- Take Action If Your Personal Information Is Compromised
- For Military Personnel, Identity Protection is a Must
- Protect Your Identity During Tax Season
- Don't Get Caught by Spear Phishing
- Which Paper Shredder Should I Use?
- The DoD Identification Number as PII
- Encrypting Email Containing PII
- DON Digital Signature and Encryption Policy for Emails Containing PII
- Steps For Military Personnel to Take to Defend Against ID Theft
- Rules for Handling PII by DON Contractor Support Personnel
- SSNs to be Removed from Government ID Cards
- Elements of a Good Privacy Program (Part Two)
- Elements of a Good Privacy Program
- Recall Rosters are Source of PII Breaches
- Top 10 PII Lessons Learned
- Protecting PII on Removable Storage Devices
- Compliance Spot Checks Key to Successful Privacy Program
- PII and Records Management
- Copier/Printer May Present Information Security Risks
- Using Shredders Versus Shredded Services
- Protect Your Personal Information: It's Valuable
- Defending Cell Phones and PDAs Against Attack
- Reducing the Use of SSNs is Key to Securing PII
- Reduce PII Loss by Proper Disposal/Sanitization of Unclass Equipment
- Action Steps for Identity Theft Victims
- What You Should Know About Identity Theft
- Privacy Must be Considered When Using Web 2.0 Tools
- Safeguarding PII on the Command Shared Drive
- Why Peer-to-Peer File Sharing Is Not a Good Idea
- Don't Get Caught by Phishing
- Secure Those Laptops
- Use Caution With Wi-Fi
