National Academies Press: OpenBook

Guidance for Transportation Agencies on Managing Sensitive Information (2005)

Chapter: Section 2 - Identifying Sensitive Information

« Previous: Section 1 - Establishing a Sensitive Information Management Policy,
Page 3
Suggested Citation:"Section 2 - Identifying Sensitive Information." National Academies of Sciences, Engineering, and Medicine. 2005. Guidance for Transportation Agencies on Managing Sensitive Information. Washington, DC: The National Academies Press. doi: 10.17226/23417.
×
Page 3
Page 4
Suggested Citation:"Section 2 - Identifying Sensitive Information." National Academies of Sciences, Engineering, and Medicine. 2005. Guidance for Transportation Agencies on Managing Sensitive Information. Washington, DC: The National Academies Press. doi: 10.17226/23417.
×
Page 4

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

32 Identifying Sensitive Information DOTs generate thousands of electronic and paper documents every year. Most infor- mation produced by DOTs requires no protection. For example, project-related docu- ments for a simple guardrail installation or road-widening project would likely not require any sort of special management. Agencies should be sensitive to the fact that arbitrary and unnecessary restrictions on non-sensitive information increase bureau- cracy and may jeopardize legitimate efforts to protect sensitive information. A subset of DOTs’ documents, however, can potentially be misused by someone intending to cause harm to the transportation system, its users, its employees, or the general public. Access to this information should be controlled. WHAT KINDS OF SENSITIVE INFORMATION DO DOTS HAVE? For most DOTs, information is likely to be considered sensitive if it is useful for (1) selecting a target for an attack and/or (2) planning and executing an attack. Infor- mation commonly found in DOTs that may meet these criteria include the following:  Vulnerability/Countermeasure/RiskAssessment Reports. These data provide de- tailed information about the vulnerability of a state’s transportation infrastructure to terrorist attack; such data are used in planning for protection against future attacks. Most state DOTs have conducted such assessments in the wake of the terrorist attacks of September 11, 2001; and, as AASHTO publishes further guidance on this topic and the federal government develops new rules, many states are likely to continue prepar- ing new or revised reports.  Emergency Response Plans. These materials provide detailed information about state DOT protocols for responding to and recovery from a range of disasters, including terrorist attacks. Most DOTs are reviewing and updating their emergency response plans to address terrorism. The plans contain sensitive information that could be used by ter- rorists in planning attacks that injure emergency responders or disrupt their efforts.  Other Sensitive Information. Visual and textual architectural and engineering data are vital to understanding the core operations and structural components of transporta- tion infrastructure. This information may include information such as building or struc- ture plans, schematic drawings and diagrams, security system plans, and threat analy- ses related to the design or security of critical infrastructure—all of which may be of interest to terrorists and could be dangerously misused by someone intending to cause harm to the system or its users, employees, or the general public. Such documents are

created and retained for many reasons, including use as emergency reference during the construction and reconstruction of transportation infrastructure. As part of these processes, design documents are often copied and distributed for use by architects, con- tractors, subcontractors, inspectors, third-party reviewers, and others—all of whom need access to blueprints, engineering schematics, and other technical documents to be able to safely and effectively fulfill their responsibilities. HOW CAN DOTS DETERMINE WHICH INFORMATION TO PROTECT? To help ensure the information protection efforts they undertake are effective, effi- cient, and defensible, DOTs should use consistent, objective, and documented proce- dures for identifying sensitive documents. These procedures should be applicable under all circumstances. Scrutinizing all information based on a general set of questions can be an effective tool for ensuring consistent decision making. States may wish to con- sider the following questions as they develop their own decision-making tools: • Could this information be used to aid in selecting a target for an attack, and/or for planning and executing an attack? • Is this information available from other sources (e.g., via the internet or a simple visual inspection of a facility)? • Is this information regularly distributed outside the agency? • Will disclosure of this information create potential for loss of life or economic harm? • Does this information reveal any security features or vulnerabilities? • Is this information critical to continuity of operations at the DOT? • Does the agency keep track of the number of existing copies of the document and the locations of these copies? • Does this information require special software or other devices to be read and understood? How readily available is the software? • Can the information be sanitized to remove sensitive information? Transportation agencies are encouraged to tailor their general list of questions to meet their own needs. 4

Next: Section 3 - Controlling Access to Sensitive Information »
Guidance for Transportation Agencies on Managing Sensitive Information Get This Book
×
 Guidance for Transportation Agencies on Managing Sensitive Information
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

TRB’s National Cooperative Highway Research Program (NCHRP) Report 525: Surface Transportation Security, Volume 5: Guidance for Transportation Agencies on Managing Sensitive Information provides basic information on identifying and controlling access to sensitive information.

NCHRP Report 525: Surface Transportation Security is a series in which relevant information is assembled into single, concise volumes—each pertaining to a specific security problem and closely related issues. The volumes focus on the concerns that transportation agencies are addressing when developing programs in response to the terrorist attacks of September 11, 2001, and the anthrax attacks that followed. Future volumes of the report will be issued as they are completed.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!