Laserfiche WebLink
Security Violations may include the following: <br /> <br /> <br />Disclosure of private data <br /> <br />Attempts to access unauthorized data <br /> <br />Sharing of User IDs and passwords <br /> <br />Upon discovery of a possible improper disclosure of EIV information or another security <br />violation by a SAHA Employee or any other person, the individual making the observation or <br />receiving the information should contact their immediate supervisor or the EIV Security <br />Officer(s). If the incident is reported to a supervisor, the supervisor must immediately inform the <br />EIV Security Officer. The EIV Security Officer(s) will document all improper disclosures in <br />writing on a security disclosure form providing details including who was involved what was <br />disclosed, how the disclosure occurred, and where it occurred. <br /> <br />The following contacts will be made: <br /> <br /> <br />The EIV Security Officer(s) will contact and provide the written documentation of the <br />security violation. The Security Officer(s) is responsible for informing the Housing & <br />Neighborhood Development Manager of any security breaches. <br /> <br />The Housing & Neighborhood Development Manager or her designee will provide the <br />HUD Field Office Public Housing Director with the written documentation; and, <br /> <br />The HUD Field Office Public Housing Director, upon receipt of the documentation, will <br />make a determination regarding the referral and provision of the written documentation to <br />the Headquarters EIV Coordinator and/or EIV Security Officer(s) for further review and <br />follow-up action. <br /> <br />Appendix 1. Safeguards Provided by the Privacy Act <br /> <br />The Privacy Act provides safeguards for individuals against invasion of privacy by requiring <br />Federal agencies, except as otherwise provided by law or regulation to: <br /> <br /> <br />1.Permit individuals to know what records pertaining to them are collected, maintained, <br />used or disseminated; <br /> <br />2.Allow individuals to prevent records pertaining to them, obtained for a particular purpose <br />from being used or made available for another purpose without their consent; <br /> <br />3.Permit individuals to gain access to information pertaining to them, obtain a copy of all <br />or any portions thereof, and correct or amend such records; <br /> <br />4.Collect, maintain, use or disseminate personally identifiable information in a manner that <br />ensure the information is current and accurate, and that adequate safeguards are provided <br />to prevent misuses of such information; <br /> <br />5.Permit exemption from the requirements of the Act only where an important public <br />policy need exists as determined by specific statutory authority; and <br /> <br />6.Be subject to a civil suit for any damages that occur as a result of action that violates any <br />rights under this Act. <br /> <br />7 <br />Exhibit 2 <br /> <br />