answersLogoWhite

0


Best Answer

US Computer Emergency Response Team (CERT). WLG

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: If a mobile computing device containing Personally Identifiable Information PII is lost or stolen you must notify?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Fred loses his mobile computing device containing personally identifiable information pii how long does he have to notify the us computer emergency response team cert?

24 hours


What if your mobile computing device containing PII is lost you must inform the following agencies within the specified time period except?

The answer depends upon what nation you reside within; each country has differing laws concerning the disposition and handling of PII (personally identifiable information.) In the US private citizens are NOT required to notify authorities but it is always a good idea to contact financial institutions. In the US you can also contact the FBI if you are concerned about Identity Theft.


Information technology plus information infrastructure plus computing resources?

what is computing resources in information technology.


What is grid computing versus cloud computing?

Grid computing is when you store information on other computers on the same network. Cloud computing is when you store information or data online, and not on the device.


What is the difference between information and computing?

Information can be defined as meaningful data. Computing can be the process of doing something with the data to produce information.


Where can I get a cloud computing business?

It should not be difficult to obtain information about the cloud computing business. The following provides additional information: blog.opengroup.org/.../introducing-our-new-book-cloud-computing


If your mobile computing device containing PII is lost you must inform the agencies within the specified time period?

If your mobile computing device containing PII is lost, you must inform the following agencies within the specified time period except:


Who should you contact if If your mobile computing device owned by the DOD and containing personally identifiable Information is lost?

According to DoD 5400.11-R, May 14, 2007: C10.6.1. When a loss, theft, or compromise of information occurs (See Chapter 1 of this regulation) the breach shall be reported to: C10.6.1.1. The United States Computer Emergency Readiness Team (US CERT) within one hour of discovering that a breach of personally identifiable information has occurred. Components shall establish procedures to ensure that US CERT reporting is accomplished in accordance with the guidance set forth at www.us-cert.gov. The underlying incident that led to the loss or suspected loss of PII (e.g., computer incident, theft, loss of material, etc.) shall continue to be reported in accordance with established procedures (e.g., to designated computer Network Defense (CND) Service Providers, Chairman of the Joint Chiefs of Staff Manual 6510.01), law enforcement authorities, the chain of command, etc). C10.6.1.2. The Senior Component Official for Privacy (Reference (a)) within 24 hours of discovering that a breach of personally identifiable information has occurred. The Senior Component Official for Privacy, or their designee, shall notify the Defense Privacy Office of the breach within 48 hours upon being notified that a loss, theft, or compromise has occurred. In addition, most DoD entities have local policies requiring you to report the loss of the device to your supervisor and local security office.


What is the basic unit of information in computing and telecommunications?

The basic unit of information in computing and telecommunications in called the octet, otherwise known as a 8 bit byte.


Figuring Out Information on Cloud Computing Wiki?

When someone is looking for cloud computing Wiki information, they are looking to find out what cloud computing actually is on the Wikipedia page for this subject. People can find out the history of cloud computing, as well as how it works in the most basic sense as a computer networking strategy.


What is a cloud computing article about?

Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers.


What is expansion of unics?

UNiplexed Information and Computing Service