...Table of Contents Another Manufactured Crisis: What’s Next in the Fiscal Showdown………1 Federal Pay……………………………………………………………….…..…..4 Federal Employees’ Health Benefits Program……………………………….15 Official Time for Federal Employee Union Representatives………….........22 Arbitrary Cuts in Civil Servants………………………………………………..26 Sourcing: Complying with the Law……………………………………….......31 Capping Taxpayer-Funded Service Contractor Compensation……………43 Transportation Security Administration and TSOs…………………………..46 Domestic Partnership Benefits……………………………..………………….49 Employment Non-Discrimination Act……………………………………..…..55 Paid Parental Leave………………………………………………..…………..57 One America, Many Voices Act………………………………………….…....60 Department of Veterans Affairs…………………………………..……………62 Department of Defense……………………………...……….………………...71 Federal Prisons………………………………………………………………….90 Social Security Administration ……………………………………….…...…103 National Guard/Reserve Technicians ………………………...……….……108 D.C. Workers’ Issues …………………...……………………………..…..…117 Equal Employment Opportunity Commission. ……………………..……...120 Another Manufactured Crisis: What’s Next in the Fiscal Showdown? Background At the beginning of January, President Obama signed a tax deal that restored higher Clinton-era rates to those making over $450,000, and funded an extension of unemployment insurance benefits to the long-term unemployed, extended for another year the $240 monthly transit subsidy, but did not extend the 2% payroll tax holiday...
Words: 54164 - Pages: 217
...Accountability Office GAO February 2009 GAO-09-232G FEDERAL INFORMATION SYSTEM CONTROLS AUDIT MANUAL (FISCAM) This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. United States Government Accountability Office Washington, DC 20548 February 2009 TO AUDIT OFFICIALS, CIOS, AND OTHERS INTERESTED IN FEDERAL AND OTHER GOVERNMENTAL INFORMATION SYSTEM CONTROLS AUDITING AND REPORTING This letter transmits the revised Government Accountability Office (GAO) Federal Information System Controls Audit Manual (FISCAM). The FISCAM presents a methodology for performing information system (IS) control 1 audits of federal and other governmental entities in accordance with professional standards, and was originally issued in January 1999. We have updated the FISCAM for significant changes affecting IS audits. This revised FISCAM reflects consideration of public comments received from professional accounting and auditing organizations, independent public accounting firms, state and local audit organizations, and interested individuals on the FISCAM Exposure Draft issued on July 31, 2008 (GAO-08-1029G). GAO would like to thank...
Words: 174530 - Pages: 699
...affected individuals. This law, implemented in July 2003, was the first of its kind in the nation. State data security breach notification laws require companies and other entities that have lost data to notify affected consumers. As of January 2007, 35 states have enacted legislation requiring companies or state agencies to disclose security breaches involving personal information. Congress is considering legislation to address personal data security breaches, following a series of high-profile data security breaches at major financial services firms, data brokers (including ChoicePoint and LexisNexis), and universities. In the past three years, multiple measures have been introduced, but to date, none have been enacted. This report will be updated regularly. Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Data Security Breaches in Federal Agencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Data Security Breaches: Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
Words: 18803 - Pages: 76
...Manager: Don Mansfield, (619) 524-5474 a. Phone: (619) 524-5474 b. E-mail: donald.mansfield@dau.mil Performance Learning Director (HQ DAU): James W. Malloy, Jr. a. Phone: (703) 805-4365 b. E-mail: james.malloy@dau.mil F. Course Description: FAR Fundamentals (CON 090) is a resident Defense Acquisition Workforce Improvement Act (DAWIA) Level I contracting course for newly hired GS-1102 contracting personnel. This course is four (4) weeks in length and provides foundational knowledge of the Federal Acquisition Regulation (FAR) System. Specifically, the course provides immersion training into the FAR; Defense Federal Acquisition Regulation Supplement (DFARS); the DFARS Procedures, Guidance, and Information (PGI); and Department of Defense (DoD) class deviations from...
Words: 16256 - Pages: 66
...www.GetPedia.com National Institute of Standards and Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Words: 93588 - Pages: 375
...Acknowledgments ix Acknowledgments This book owes a great deal to the mental energy of several generations of scholars. As an undergraduate at the University of Cape Town, Francis Wilson made me aware of the importance of migrant labour and Robin Hallett inspired me, and a generation of students, to study the African past. At the School of Oriental and African Studies in London I was fortunate enough to have David Birmingham as a thesis supervisor. I hope that some of his knowledge and understanding of Lusophone Africa has found its way into this book. I owe an equal debt to Shula Marks who, over the years, has provided me with criticism and inspiration. In the United States I learnt a great deal from ]eanne Penvenne, Marcia Wright and, especially, Leroy Vail. In Switzerland I benefitted from the friendship and assistance of Laurent Monier of the IUED in Geneva, Francois Iecquier of the University of Lausanne and Mariette Ouwerhand of the dépurtement évangélrlyue (the former Swiss Mission). In South Africa, Patricia Davison of the South African Museum introduced me to material culture and made me aware of the richness of difference; the late Monica Wilson taught me the fundamentals of anthropology and Andrew Spiegel and Robert Thornton struggled to keep me abreast of changes in the discipline; Sue Newton-King and Nigel Penn brought shafts of light from the eighteenthcentury to bear on early industrialism. Charles van Onselen laid a major part of the intellectual foundations on...
Words: 178350 - Pages: 714
...National Institute of Standards and Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made...
Words: 93564 - Pages: 375
..."CHII"IURENGA II 1896 - 1897: A REVISIONIST STUDY THESIS Submitted in Fulfilment of the Requirements for the Degree of MASTER OF ARTS of Rhodes University I by MARK PHILLIP MALCOLM HORN January 1986 The following typog~aphical co~~ections attention since submission of this thesis. have come to my p.i line 8, "Phillip" should ~ead Philip. p.vi, li.ne 11, "Risings" should ~ead Rising. p.Vll, line 12, "~esponce" should ~ead ~esponse. p.3, line 17, "wa~f-io~" should read warriors. p.5, line 4, "96" should read 1896. p .. 8, line 3, IILomangLlndi should read LomagLlndi. p.9, line 2, " (inve~ted comma) missing after "role". p.19, line 9, "triatises" should read treatises. p.28, line 18, "analysis" should ~ead analyses. p.30, line 10, "the and" should ~ead "and the". p.42, line 28, "Histo~ians" should ~ead Histo~ian's. p.47, line 13, "Lomangundi" should ~ead Lomagundi. p.48, line 12, ~ sign missing befo~e the figu~e of 121 000. p.52, line 5, 1. ~5ign missing before the figure of 3. p.55, line 1, ~ sign missing befo~e the figu~es 10 to 60. p.55, line 3, -£ sign missing befo~e the figu~e of 100. p.56, lines 7 - 10, quote to be indented. p.b2, li.ne 1tJ, "dela" should be separated out to read "de la". p.tI4, line 4, "assisthim" should be sepa~ated out to ~ead "assist him"~· p.b"?, line 11, "inte~nicine" should t-ead intet-necine. p.83, line 17, "Ma~ch 1895" should ~ead Ma~ch 1894. p.89, line 5, "faction" should ~ead fl~action. p.95, line 29, fn. 12, "lNA" should ~ead NAZ...
Words: 104376 - Pages: 418
...CORE CONCEPTS OF Accounting Information Systems Twelfth Edition Mark G. Simkin, Ph.D. Professor Department of Accounting and Information Systems University of Nevada Jacob M. Rose, Ph.D. Professor Department of Accounting and Finance University of New Hampshire Carolyn Strand Norman, Ph.D., CPA Professor Department of Accounting Virginia Commonwealth University JOHN WILEY & SONS, INC. VICE PRESIDENT & PUBLISHER SENIOR ACQUISITIONS EDITOR PROJECT EDITOR ASSOCIATE EDITOR SENIOR EDITORIAL ASSISTANT PRODUCTION MANAGER PRODUCTION EDITOR MARKETING MANAGER CREATIVE DIRECTOR SENIOR DESIGNER PRODUCTION MANAGEMENT SERVICES SENIOR ILLUSTRATION EDITOR PHOTO EDITOR MEDIA EDITOR COVER PHOTO George Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the...
Words: 241803 - Pages: 968
...22000 ESSENTIAL WORDS FOR IELTS AND TOEFL Cũng có 1 chút kinh nghiệm về kỳ thi IELTS, nên hôm nay chia sẻ cùng mọi người. Muốn đạt điểm cao ở kỳ thi IELTS, có 1 điểm rất quan trọng mà Bear nghĩ ai cũng biết: LUYỆN TẬP THƯỜNG XUYÊN. Tuy nhiên, cũng có 1 điểm cực kỳ quan trọng mà đa số thường không chú trọng lắm. Đó là phần từ vựng dạng ACADEMIC (học thuật). Nên để đạt điểm cao trong kỳ thi IELTS, ôn luyện từ trong quyển 22.000 từ THI TOEFL/IELTS của Harold Levine là cực kỳ cần thiết. Mỗi ngày chỉ cần học 3 từ, thì lượng từ vựng của bạn sẽ tăng đáng kể. Số từ vựng này giúp bạn trong cả 4 phần thi LISTENING / SPEAKING / READING / WRITING. Ví dụ: Nếu bạn dùng từ: SIMULTANEOUSLY thay cho từ AT THE SAME TIME, hay PORTABLE thay cho từ EASY TO CARRY hay MITIGATE thay cho từ LESSEN … trong phần WRITING và SPEAKING thì điểm của bạn sẽ cao chót vót không ngờ luôn đấy. Chưa kể, nhất là trong phần READING, những từ trong quyển sách này xuất hiện nhiều lắm, và cả LISTENING nữa chứ. Sự lợi hại của quyển sách này, chắc chắn chỉ khi nào học rồi, bạn mới thấy rõ. Quyển này (nhà xuất bản TPHCM) đã hết bán rồi. Nên nếu bạn nào cần phôtô thì liên lạc Uyên Uyên: UyenUyen@englishtime.us Tuy nhiên mỗi tuần Bear vẫn sẽ post lên đây 20 từ trong quyển sách đó, để nếu bạn nào ở xa, vẫn có thể học được. Đương nhiên mỗi người có 1 cách học riêng và trí nhớ khác nhau. Có người nhìn qua là nhớ liền, có người nhìn hoài vẫn không nhớ, nên Bear suggest...
Words: 78840 - Pages: 316