National Academies Press: OpenBook

Guidance for Transportation Agencies on Managing Sensitive Information (2005)

Chapter: Section 4 - Keys for Success

« Previous: Section 3 - Controlling Access to Sensitive Information
Page 10
Suggested Citation:"Section 4 - Keys for Success." National Academies of Sciences, Engineering, and Medicine. 2005. Guidance for Transportation Agencies on Managing Sensitive Information. Washington, DC: The National Academies Press. doi: 10.17226/23417.
×
Page 10

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

10 4 Keys for Success Sharing information freely when requested is standard operating procedure for state DOTs—this culture reflects the public’s need to access information related to project planning, environmental evaluation, and design. Consequently, many states have not yet developed mechanisms to identify, differentiate, and protect sensitive information from that which should and must be made available for public review. Some documents that once seemed appropriate for public use can now be used for potentially deadly pur- poses, threatening the lives of DOT employees and the citizens they serve. The fol- lowing should be noted for success: • Threats to sensitive information may come in the form of (a) official requests for data or documents, or (b) as disclosure of information by disgruntled employees or theft. • All state DOTs are encouraged (1) to establish and use comprehensive sensitive information management policies tailored to their needs and (2) to provide peri- odic training on these policies to all employees. • To ensure optimal efficiency and effectiveness, information should be protected at a level commensurate with the risk posed by its possible misuse. • Sensitive information management policies should include (1) approaches for identifying sensitive information and (2) management strategies for controlling access to sensitive information. • Management policies should provide balance between the need to control access to some information and the role of information sharing in public accountability/ bureaucratic efficiency. • State DOTs should follow consistent, objective, and documented practices that apply to all information.

Next: Appendix A - Florida DOT s Exempt Documents and Security System Plan Request Form »
Guidance for Transportation Agencies on Managing Sensitive Information Get This Book
×
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

TRB’s National Cooperative Highway Research Program (NCHRP) Report 525: Surface Transportation Security, Volume 5: Guidance for Transportation Agencies on Managing Sensitive Information provides basic information on identifying and controlling access to sensitive information.

NCHRP Report 525: Surface Transportation Security is a series in which relevant information is assembled into single, concise volumes—each pertaining to a specific security problem and closely related issues. The volumes focus on the concerns that transportation agencies are addressing when developing programs in response to the terrorist attacks of September 11, 2001, and the anthrax attacks that followed. Future volumes of the report will be issued as they are completed.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!