Read more about Are agencies required to submit the Designation Letter by January 31st of each year, or when the designee changes?

Are agencies required to submit the Designation Letter by January 31st of each year, or when the designee changes? Yes. This is very important to provide the California Information Security Office (CISO) with the names and contact information for individuals... Read MoreRead more about Are agencies required to submit the Designation Letter by January 31st of each year, or when the designee changes?

Read more about What authority does the Office of Information Security have for issuing policy and directing state agencies on information security and privacy matters?

What authority does the Office of Information Security have for issuing policy and directing state agencies on information security and privacy matters? Government Code Section 11549.3 charges the Office of Information Security with responsibility for, among other... Read MoreRead more about What authority does the Office of Information Security have for issuing policy and directing state agencies on information security and privacy matters?

Read more about How does an agency/consumer contact the Office of Information Security?

How does an agency/consumer contact the Office of Information Security?Agencies can contact the Office of Information Security at security@state.ca.gov or by calling our main line at (916) 245-2583. Back to Information Security... Read MoreRead more about How does an agency/consumer contact the Office of Information Security?

Read more about Who is the audience for Business Security Requirements Information?

Who is the audience for Business Security Requirements Information? The following audience may use this information in crafting their own technical requirements for their projects. Business Users, Senior Management Staff, Executive Officials Security Professionals... Read MoreRead more about Who is the audience for Business Security Requirements Information?

Read more about Where do we start building Business Security Requirements?

Where do we start building Business Security Requirements? The process starts by engaging business leaders and other stakeholders early in the project development cycle. The following steps will help you in building Business Security Requirements: Step 1 – Initial... Read MoreRead more about Where do we start building Business Security Requirements?