Laserfiche WebLink
Security Violations may include the following: <br />• Disclosure of private data <br />• Attempts to access unauthorized data <br />~ Sharing of User IDs and passwords <br />Upon discovery of a possible improper disclosure of EIV information or another security <br />violation by a SARA Employee or any other person, the individual making the observation or <br />receiving the information should contact their immediate supervisor or the EIV Security <br />Officers}. If the incident is reported to a supervisor, the supervisor must immediately inform the <br />EIV Security Officer. The EN Security Officers} will document all improper disclosures in <br />writing an a security disclosure form providing details including who was involved what was <br />disclosed, how the disclosure occurred, and where it occurred. <br />The following contacts will 6e made: <br />• The EIV Security Officers} will contact and provide the written documentation of the <br />security violation. The Security Officers} is responsible for informing the Housing & <br />Neighborhood Development Manager of any security breaches. <br />• The Housing & Neighborhood Development Manager or her designee will provide the <br />HUD Field Office Public Housing Director with the written documentation; and, <br />• The HUD Field Office Public Housing Director, upon receipt of the documentation, will <br />make a determination regarding the referral and provision of the written documentation to <br />the Headquarters EN Coordinator and/or EN Security Officers} for further review and <br />follow-up action. <br />Appendix 1. Safeguards Provided by the Privacy Act <br />The Privacy Aet provides safeguards for individuals against invasion of privacy by requiring <br />Federal agencies, except as otherwise provided by law or regulation to: <br />1. Permit individuals to know what records pertaining to them are collected, maintained, <br />used or disseminated; <br />2. Allow individuals to prevent records pertaining to them, obtained for a particular purpose <br />from being used or made available for another purpose without their consent; <br />3. Permit individuals to gain access to information pertaining to them, obtain a copy of all <br />or any portions thereof, and correct or amend such records; <br />~. Collect, maintain, use or disseminate personally identifiable information in a manner that <br />ensure the information is current and accurate, and that adequate safeguards are provided <br />to prevent misuses of such information; <br />5. Permit exemption-from the requirements of the Act only where an important public <br />policy need exists as determined by specific statutory authority; and <br />6. Be subject to a civil suit for any damages that occur as a result of action that violates any <br />individual's rights under this Act. <br />7 <br />Exhibit 2 <br />