Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this
2Activity
×

Table Of Contents

PART I – WHAT WE WANT THE ISE TO BE
Chapter 1 – Introduction
1.1 Purpose and Scope
1.2 Definitions
1.2.1 Terrorism Information
1.2.2 Information Sharing Environment
1.3 Background
1.4 Today’s ISE
1.5 Overview of the Future ISE
Chapter 2 – Information Sharing Strategy, Roles, and Needs
2.1 Information Sharing Strategy
2.2 Organizational Roles, Missions, and Responsibilities
2.3 Information Sharing Needs of ISE Participants
2.3.1 Federal Department and Agency Needs
2.3.2 State, Local, and Tribal Government Needs
2.3.3 Private Sector Organization Needs
2.3.4 Foreign Partner Needs
2.3.5 Information Privacy and Civil Liberties Needs
Chapter 3 – ISE Operational Concept
3.1 Introduction
3.2 The Information Sharing Environment
3.2.1 The Current (“As-Is”) Environment
3.2.2 The Future (“To-Be”) Environment
3.3 Federal Level Elements and Functions
3.3.1 The National Counterterrorism Center
3.3.2 Federal Departments and Agencies
3.3.3 Interagency Threat Assessment and Coordination Group
3.4 State, Local, and Tribal Level Elements and Functions
3.4.1 State and Major Urban Area Fusion Centers
3.5 Information Sharing Evaluation Environments
3.6 Cross-Domain Sharing
PART II – HOW WE INTEND TO STRUCTURE THE ISE
Chapter 4 – ISE Implementation Overview
4.1 Two-Phase Implementation Approach
4.2 ISE Governance
4.2.1 General
4.2.2 The Program Manager
4.2.3 The Information Sharing Council
4.2.4 ISC Subcommittees and Working Groups
4.2.5 HSC and NSC Decision Process
4.2.6 Privacy and Civil Liberties Oversight Board
Chapter 5 – ISE Operational Capabilities
5.1 Introduction
5.1.1 ISE Enabling Policy and Business Processes
5.1.2 Overarching ISE Capabilities
5.1.3 Two-Phased Approach
5.2 Alerts and Notifications
5.2.1 Implementation Actions
5.3 Easier User Access
5.3.1 Access Control
5.3.2 Implementation Actions
5.4 Information Discovery and Search
5.4.1 Enterprise Search
5.4.2 Implementation Actions
5.5 Security
5.5.1 ISE Security Requirements
5.5.2 Common IT Security Framework
5.5.3 Cross-Domain Solutions
5.5.4 Implementation Actions
5.6 Collaboration
5.6.1 Implementation Actions
5.7 Electronic Directory Services
5.7.1 Blue Pages
5.7.2 Yellow Pages
5.7.3 Green Pages
5.7.4 White Pages
5.7.5 Implementation Actions
Chapter 6 – Architecture and Standards
6.1 Introduction
6.2 ISE Enterprise Architecture Framework and Profile
6.2.1 IRTPA and Presidential Memorandum Requirements
6.2.2 Presidential Memorandum Observations and Recommendations
6.2.3 ISEEA Framework
6.2.4 FEA-ISE Profile
6.2.5 Implementation Actions
6.3 ISE Standards
6.3.1 Review of Presidential Guideline 1 Developments
6.3.2 Background of IIP Task 1.1 Findings and Observations
6.3.3 Progress to Date
6.3.4 Department and Agency Functional Standards Implementation
6.3.5 Implementation Actions
Chapter 7 – Sharing with Partners Outside the Federal Government
7.1 State, Local, and Tribal Governments
7.1.1 Implementing the Framework
7.1.2 Implementation Actions
7.2 Private Sector
7.3 Foreign Partners
PART III – MAJOR CHALLENGES
Chapter 8 – Promoting a Culture of Information Sharing
8.1 Promoting a Culture of Information Sharing
8.2 ISE Training Plan
8.2.1 “Core” Training
8.2.2 Department and Agency Specific Training
9.2 ISE Information Privacy Guidelines
9.3 Implementation Actions
10.2 Sensitive But Unclassified Information
10.2.1 Specific Implementation Action
Chapter 11 – ISE Enabling Activities
11.1 ISE Performance Management
11.1.1 Progress to Date
11.1.2 Next Steps
11.1.3 Performance Management Report
11.2 ISE Planning, Programming, and Budgeting
11.2.1 Progress to Date
11.2.2 Next Steps
PART IV – CONCLUSIONS AND RECOMMENDATIONS
Chapter 12 – Managing ISE Implementation
12.1 Managing ISE Policy, Business Processes, and Technology
12.1.1 ISE Policy and Business Process Management
12.1.2 ISE Technology Management
12.2 ISE Technical Project Management
12.2.1 Overall Roles and Responsibilities
Figure 12.2-1. ISE Technical Project Management
12.3 Monitoring ISE Implementation
Chapter 13 – ISE Expansion and Future Management Structure
13.1 Introduction
13.2 Expansion of ISE beyond Terrorism Information
13.3 Future ISE Management Structure
Chapter 14 – Additional PM Recommendations and Summary of Actions
14.1 Additional PM Recommendations
14.1.1 Synchronize ISE Performance Report with ISE Implementation Phases
14.1.2 Delegation of Authority
14.2 Summary of ISE Implementation Actions
APPENDICES
Appendix 1 – IRTPA Requirements Compliance
Appendix 3 – Presidential Memorandum of December 16, 2005
Appendix 4 – Definitions
Appendix 5 – Acronyms
0 of .
Results for:
No results containing your search query
P. 1
ise-impplan-200611_0

ise-impplan-200611_0

Ratings: (0)|Views: 3,666|Likes:
Published by arrowkeeper

More info:

Published by: arrowkeeper on Aug 29, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

08/29/2011

pdf

text

original

You're Reading a Free Preview
Pages 4 to 110 are not shown in this preview.
You're Reading a Free Preview
Pages 114 to 116 are not shown in this preview.
You're Reading a Free Preview
Pages 120 to 127 are not shown in this preview.
You're Reading a Free Preview
Pages 131 to 176 are not shown in this preview.
You're Reading a Free Preview
Pages 180 to 186 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->