Menu Search Account

LegiStorm

Get LegiStorm App Visit Product Demo Website
» Get LegiStorm App
» Get LegiStorm Pro Free Demo

GAO Reports by subject "Computer security policies"

Full-text search of 52,072 reports from the Government Accountability Office
From To
Reset

Search Results:

Date Report No. Title
Date June 30, 1993 Report No. IMTEC-93-35R Title

Justice and Law Enforcement: Justice Software Management

* GAO United States General Accounting Office Washington, D.C. 20548 Information Technology Management Division and B-253782 June30,1993 The Honorable Jack Brooks Chairman, Committee on the Judiciary House of Representatives Dear Mr. Chairman: 111ll lllllllllll 149659 This letter responds to your October 8, 1992, request and subsequent discussions with your staff that we review the use of copyrigh...
Date Oct. 26, 1983 Report No. 122730 Title

Science, Space, and Technology: Computer Security in the Federal Government

U. S. GENERAL ACCOUNTING OFFICE WASHINGTON, D.C. 20548 FOR RELEASE ON DELIVERY EXPECTED AT 9:30 A.M., EST WEDNESDAY, OCTOBER 26, 1983 STATEMENT OF WARREN G. REED DIRECTOR INFORMATION MANAGEMENTAND TECHNOLOGY DIVISION BEFORE THE SUBCOMMITTEE ON OVERSIGHT OF GOVERNMENTMANAGEMENT COMMITTEE ON GOVERNMENTAL AFFAIRS UNITED STATES SENATE ON COMPUTER SECURITY IN THE FEDERAL GOVERNMENT Mr. Chairman and Mem...
Date April 30, 1980 Report No. LCD-80-56-I Title

Information Management: Central Agencies' Compliance With OMB Circular A-71, Transmittal Memorandum No. 1

LOGISTICS AND COMMUNICATIONS DIVISION APRIL 30,198O B-198551 The Honorable Richardson Preyer Subcommittee on Government Chairman, Information and Individual Rights Operations Committee on Government House of Representatives Dear Mr. Chairman: Compliance With OMB Central Agencies' Memorandum Circular A-71, Transmittal No. J (LCD-80-56-I) 1 requested us to perform a Your December 21, 1979, letter fo...
Date Jan. 23, 1979 Report No. LCD-78-123 Title

Information Management: Automated Systems Security--Federal Agencies Should Strengthen Safeguards Over Personal and Other Sensitive Data

6f6L 'Ei &7.1-8L-a31 wauwedap pue AwaGe 40 Aiy!q!suodsaJ aql s! ua4.aeu.I asayi 6uy3ajjo3 aeqx paaj6e seq ia6pna pue wxua6eue~ 40 my40 ayl $uJaiu! J!aqi *sa3JnosaJ i!pne asn Alayi3a44a lou ‘.p!p-- pue :spJepueas 40 nearna leuo!ieN aqz Aq p!Aojd awe -pin6 le3!uq3ai ayr 40 a liz xuenpe aye1 iou pip uo!ie!mdde 40 y3el @nojqI-!spJenfia~es 40 uoll3aps ~~LLJOUO~ JOT sanbym 1uautafkweLu ys!~ Aoldura pu...
Date Sept. 28, 1977 Report No. 094676 Title

Information Management: Security of Computer Systems

* . / CITED STATES GENERALACCOUNTINGOFFICE WASBINGTON, D. C. 20548 --- -.---- FOR RELEASE ON DELIVERY STATEMENTOF DONALD L. SCANTLEBURY, DIRECTOR FINANCIAL AND GENERAL MANAGEMENT STUDIES DIVISION BEFORE THE P COMMITTEE ON BANKING, FINANCE AND URBAN AFFAIRS SUBCOMMITTEE CONSUMER ON AFFAIRS /o ApI is HOUSEOF REPRESENTATIVES . . .. CONCERNING LSECURITY OF COMPU;PER TKE SYSTEMS 7 MR. CHAIRMAN AND MEMB...