Effectively Integrating IT Security into the Acquisition Process
Part 5 of 5
Remember all Department of Commerce employees are
responsible for IT security. Acquisition initiators,
program managers and contracting professionals are
primarily responsible for ensuring that IT security
is considered during the procurement process and
each phase of the system life cycle.
In the links section of this course you will find a
link to the course handbook. In the handbook you
will find a concise summary of the information
presented in this course. Also, additional details
for each topic have been included in the document.
Please print out the handbook and use it as a
reference for current and future IT acquisitions.
In order to receive credit for this course you must
complete an evaluation form clicking on the
Evaluation link in the Links section of this course.
Once you click the Evaluation link click, you will
be taken to the Department’s Balanced Scorecard
website. Click on the link that says IT Security
In Acquisition Course. A survey will appear on the
screen. Once you complete the questions, click
the submit and close button. This will prompt the
system to record your completion of the course.
Once again, thank you for completing the Department
of Commerce Effectively Integrating IT Security into
the Acquisition Process training course.
Print Course Materials
Email for your notes:
Type your notes here.
Click Send only after
the module has concluded.
Copyright © 1999—2004. All Rights Reserved.