Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
9 11 Commission Report — Part 3
Page 67
67 / 81
New Records Control Schedule
In March 2004, we announced a new proposed records control schedule for FBI investigative,
analytical. and administrative case files. The control schedule is the legal authority governing
the length of tme that FBi investigative and administrative case records are kept before they
are destroyed or transferred to the NARA. The schedule was developed in partnership with
NARA as part of their Targeted Assistance Program. The proposed schedule ts subject to
public notice and comment before it can be formally approved, and will soan be published in
the Federal Register. Tne schedule is an important milestone in our efforts to modernize our
records management process, replacing authorities that have been out of date for more than
a dozen years.
Improving Efficiency
Re-engineering efforts are improving productivity and efficiency in our recards management.
For example, we established a Service Request Center to coordinate Freedom. of Information
Act and the. Privacy Act (FOIPA) requests. The backlog of pending FOIPA requests has
dropped 40 percent, from 2,650 in October 2002 to 1,600 today, and pending FOIPA appeals
have dropped 67 percent, from 780 to 257. We also improved the efficiency of our Name
Check Program, In late 2001, with new visa screening requirements, we were overwhelmed
by the Increase in names to be checked. To address the resulting backlog, we developed and
Implemented an internal tracking system, modified our software to provide detailed metrics,
and increased the personnel by 65 percent. The backlog was all but eliminated.
Security Management
The FBI has built, and continues to improve, a comprehensive and centralized security
program. On December 3, 2001, we created the Security Division headed by an Assistant Director.
Since then, the Security Division has consolidated personnel security, physical security, and
information security functions that were previously distributed across diverse FBI activities. The
Division has put in place the following initiatives, among cthers:
information Assurance Plan
The FBI developed a comprehensive information assurance plan, modeled on the best practices
of the Inteiligence Community, and considerably enhanced the security of its information
systems, For example, the new Trilogy network provides a high level of security and new
capabiltties, such as the ability to track unauthorized access to files. A key part of this program
is the involvement of security experts in the development of the FBI's IT infrastructure to ensure
that information assurance is part of the FBl’s iT architecture.
In summer of 2002, we created the Information Assurance Section within the Security Division.
We have since tripied the size of its Accreditation Unit, which conducts security risk assessrnents
of IT systems from the planning and procurement stages, through the operation and eventual
de-commissioning of each system. IT systems are certified and accredited if they meet federal
information security standards. In fall of 2001, oniy 20 of the FBI's IT systems were accredited.
Today, more than 100 have been accredited, improving our security and facilitating information
sharing with other federal agencies.
ESC Dpoc. #5 61 a 000000400
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
investigation
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic