Do Not Include Sensitive Security Information
FAA websites will not contain the following types of sensitive information, unless there is a compelling reason:
- Classified records
- Internal personnel rules and procedures
- Sensitive unclassified information marked
- For Official Use Only
- Sensitive Security Information
- By other agencies, for example, Sensitive But Unclassified (SBU), Limited Official Use (LOU), Official Use Only (OUO)
- Trade secret and proprietary information
- Information protected by an international treaty
- Export controlled information
- Procurement sensitive information, for example,
- Source evaluation information
- Technical proposals and seller quotes
- Negotiating positions
- Personal information about FAA staff, this would include all items covered by the Privacy Act of 1974, including
- Home addresses and phone numbers
- Social Security Numbers (SSNs)
- Detailed biographical information that could be used for social engineering
- Information on family members
- Schedules of FAA executives and their exact location including whether they are on or off the property
- Information on preparation of hazardous materials or toxins
- Sensitive information about homeland security, for example,
- Protected Critical Infrastructure Information (PCII)
- Sensitive Homeland Security Information (SHSI)
- Investigative records
- FAA enforcement actions
- Medical records and information about individuals
- Sensitive legal information, for example
- Deliberative process information
- Attorney work product information
- Attorney-client information
- Financial records not approved for public release
- Information on our physical security and information security procedures
- Information on FAA identification, credentials, and badges, including pictures of badges and credentials
- Information about our network and information system infrastructure, for example,
- Passwords or pass phrases
- Address ranges
- Naming conventions
- Access numbers
- Network configurations and designs
- Operating system information used on specific servers, for example, vendor, product, and version
- Internet Protocol Addresses
- Telephone numbers for dial-up computer connections
- IT system capabilities or limits
- System security plans, risk analyzes, system vulnerabilities, procedures, and control methods
- System compromise information
- System security auditing logs
- Information that specifies or implies physical security or information security vulnerabilities
- Plans, maps, diagrams, aerial photographs, and architectural plans of FAA facilities
- Information on disaster recovery or continuity of operations plans except as needed to inform the public of their roles and actions during and after disasters
- Details on emergency response procedures, for example,
- Contingency plans
- Air traffic procedures for handling emergencies, such as, hijackings
- Evacuation routes
- Personnel responsible for emergency response
- Copyrighted material without the written permission of the owner
- Privacy or security policies pointing out the types of security measures in place to the degree that they may be useful to an attacker.
If you have questions, please contact your Web Liaison.