Publications
July 19, 2023: URLs for CSRC publication details pages have changed. Legacy URLs should automatically redirect to the new URLs. However, links to the actual publications have NOT changed (e.g., DOIs and PDFs on nvlpubs.nist.gov). Please send inquiries to
csrc-inquiry@nist.gov. [12:20 pm ET - If you received "Page Not Found" errors recently, please retry accessing those files. File synchronization should now be complete.]
Withdrawn on November 18, 1998.
Computer Security Guidelines for Implementing the Privacy Act of 1974
Documentation
Date Published: May 30, 1975
Author(s)
National Bureau of Standards
This publication provides guidelines for use by Federal ADP organizations in implementing the computer security safeguards necessary for compliance with Public Law 93-579, the Privacy Act of 1974. A wide variety of technical and related procedural safeguards are described. These fall into three broad categories: Physical security, in¬ formation management practices, and computer system/network security controls. As each organization processing personal data has unique characteristics, specific organizations should draw upon the material provided in order to select a well-balanced combination of safeguards which meets their particular requirements.
This publication provides guidelines for use by Federal ADP organizations in implementing the computer security safeguards necessary for compliance with Public Law 93-579, the Privacy Act of 1974. A wide variety of technical and related procedural safeguards are described. These fall into three...
See full abstract
This publication provides guidelines for use by Federal ADP organizations in implementing the computer security safeguards necessary for compliance with Public Law 93-579, the Privacy Act of 1974. A wide variety of technical and related procedural safeguards are described. These fall into three broad categories: Physical security, in¬ formation management practices, and computer system/network security controls. As each organization processing personal data has unique characteristics, specific organizations should draw upon the material provided in order to select a well-balanced combination of safeguards which meets their particular requirements.
Hide full abstract
Keywords
access controls; ADP security; computer security; Federal Information Processing Standards; information management; personal data; physical security; privacy risk assessment
Control Families
None selected