Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.
10 4 Keys for Success Sharing information freely when requested is standard operating procedure for state DOTsâthis culture reflects the publicâs need to access information related to project planning, environmental evaluation, and design. Consequently, many states have not yet developed mechanisms to identify, differentiate, and protect sensitive information from that which should and must be made available for public review. Some documents that once seemed appropriate for public use can now be used for potentially deadly pur- poses, threatening the lives of DOT employees and the citizens they serve. The fol- lowing should be noted for success: ⢠Threats to sensitive information may come in the form of (a) official requests for data or documents, or (b) as disclosure of information by disgruntled employees or theft. ⢠All state DOTs are encouraged (1) to establish and use comprehensive sensitive information management policies tailored to their needs and (2) to provide peri- odic training on these policies to all employees. ⢠To ensure optimal efficiency and effectiveness, information should be protected at a level commensurate with the risk posed by its possible misuse. ⢠Sensitive information management policies should include (1) approaches for identifying sensitive information and (2) management strategies for controlling access to sensitive information. ⢠Management policies should provide balance between the need to control access to some information and the role of information sharing in public accountability/ bureaucratic efficiency. ⢠State DOTs should follow consistent, objective, and documented practices that apply to all information.