Identify and capture the steps required to safeguard proprietary and privacy related information. Detail the processes and procedures needed to prevent unauthorized access to or release of information. Address how to meet federal, state, local, and tribal laws regarding privacy.
- Intellectual property management and handling
- Authentication process for accessing ISAO information
- Protections for ISAO members and third parties when information is shared with the U.S. Government