Discuss two examples of social justice movements related to your issue.

HHPH 382: Social Justice Final Project

 

Topic: Environmental health threats to children due to poverty level, race & immigration status

 

1. Write your paper using the following guidelines. Must Use credible resources : (must use your book, and at least one peer-reviewed article)

 

 

i. Why is this topic a Public Health Issue?

1. Be sure to give “evidence” of this as it relates to your target population

 

ii. Why is this topic a Social Justice Issue?

1. Be sure to give “evidence” and examples of this as it relates to your target population

 

iii. Discuss at least two specific social injustices related to your topic and how these affect the health of your target population.

 

iv. Discuss two examples of social justice movements related to your issue.

Training PowerPoint

Record Retention Training Projects

Larry Ratliff

April 12, 2021

1

 

Background on Record Retention Project

 

‹#›

3

 

Identify Types of FRTIB Training

Identify Validity of a Training Record

Update Ops Center Training and Data Spreadsheet

Sending Proactive Email Notifications

Enter Training Completion Certificates

Learning Objective

Researching for those 5 Training Certificates

Where you able to find all five trainings?

Where did you search?

Was it difficult?

Lets review your certificates you save.

Was it difficult to find?

Did you remember what courses you have taken?

 

‹#›

Certificates are saved on Training Team/FRTIB Security Records/Record Retention Training Folder

Was it difficult to find? Where did you search?

Review the 5 FRTIB Security Trainings on the next slide.

 

4

Identify Types of Training

Training Name Description Frequency Completion Certificate Requirements
FRTIB Rules of Behavior Agreement between FRTIB and employee on expectations and rules for accessing any TSP IT system. Annually Digital Signature using the certificate from a PIV Signature using a stylus or finger on a touch screen. Wet signature that is scanned in. A real wet signature.
Cyber Security Awareness Simulates security threats through games and scenarios to provide awareness on how to deal with cyber security threats Annually Digital Signature using the certificate from a PIV Signature using a stylus or finger on a touch screen. Wet signature that is scanned in. A real wet signature.
Privacy Awareness Identifies privacy responsibilities for federal employees Annually Completion Certificate
Records Management Fundamentals Presents rules of how to manage documents while working with any stored document, by security level. Annually Completion Certificate or Screenshot of completion in ELMS
Controlled, Unclassified Information Provides the definition of CUI, identification of how it should be marked, methods to safeguard against unauthorized access, and provide reference for how it should be shared and protected. Bi-annually Completion Certificate or Screenshot of completion in ELMS

 

‹#›

 

5

Identify Validity of a Training Record

Employees full Name Date Location Certificate Type Signature
FRTIB Rules of Behavior Required Required FRTIB Town center (TSP) 6 Page contract Digital or Wet ink on page 6
Cyber Security Awareness DOD website Certificate or ELMS Screenshot Digital or Wet ink
Privacy Awareness DHS Website/ELMS Certificate NA
Records Management Fundamentals ELMS Certificate or ELMS Screenshot NA
Controlled, Unclassified Information ELMS Certificate or ELMS Screenshot NA

Valid Completion Certificate:

Requirements for a valid record:

Name of training on document

Employee’s full name

Completion Date (upon completing the entire course)

Signature (ROB & CSA)

 

 

 

 

 

 

‹#›

Requirements for a valid record are:

Name of training on document

Employee’s full name

Completion Date (upon completing the entire course)

Signature for (ROB & CSA)

 

6

Practice Reviewing Certificates & Determined Validity

 

‹#›

Lets take a look at some certificates and determined the validity of the certificates

Certificates located in C:\Users\larry.ratliff\Desktop\Record Retention Training Documents\Identify Validity FRTIB Training Certificates

 

 

7

Updating Ops Center Training & Data Spreadsheet

You need to have access to the Shared Drive (\\fo-filesrv)

Let’s map your drive

Use the document “ How to Map a Network Drive” to help you.

 

 

After you’ve Map your drive

 

Use this path to open up the folder on the shared drive.

F:\Operations Center\2021 Awareness Ops\_Training Records Sheet

Note: Do not access any other files or folder on this drive unless given permission.

 

 

 

‹#›

Make these sentences animated by the numbers. But show the picture from the start

8

Updating Ops Center Training & Data Spreadsheet

Days until training expires Training Status column Action required Training Email Column
<40 Expiring Soon No Compliant
<32 Less than 32 days Yes 1st email sent
<15 Less than 15 days Yes 2nd email sent
<10 Less than 10 days Yes 3rd email sent
<1 Past Due Notify Security Group Past Due

Review Records Retention Spreadsheet for upcoming expirations

Located on the “fo-filesrv” shared drive..

What to do on the Record Retention sheet?

Review RR spreadsheet using the chart below.

Expirations update automatically happen each day.

You will only enter completion dates & update email status on the spreadsheet

 

 

 

 

‹#›

Review Records Retention Spreadsheet for upcoming expirations

Located on the “fo-filesrv” shared drive.

Note: Do not access any other files or folder on this drive unless given permission.

What to do on the Record Retention sheet

Expirations update automatically each day

You will only enter completion dates & update email status on the spreadsheet

9

Sending Proactive Email Notifications

Step # Who Type Description Option Go To
1 Training Team Start
2. Training Team Process Review RR Spreadsheet for upcoming expirations 3
3. Training Team Decision What is the training status? Compliant 2
Expiring Soon 4
Less than 32 days 6
Less than 15 days 7
Less than 10 days 8
Past Due 9
Not Received 11
4 Training Team Decision Is another training in less than 45 days status? Yes 5
No 2
5 Training Team Process Include “expiring soon” training in 1st email notification 6
6 Training Team Subprocess Send 1st email notice to employee and supervisor 2
7 Training Team Subprocess Send 2nd email notice to employee and supervisor 2
8 Training Team Subprocess Send 3rd email notice to employee, supervisor and Security Group 2
9 Training Team Process Notify Security Group of out of compliance 10
10. Security Group End
11. Training Team Process Send request for completion certificates to hiring manager 2

 

‹#›

Makes each slide come in animated by the numbers

10

Sending Proactive Email Notifications

 

‹#›

Enter Training Completion Certificates

Step # Who Type Description Option Go To
1 Employee Start
2 Employee Process Send certificate to Training Team 3
3 TT/ FRTIB Documentation Folder Process Download file to FRTIB Shared Drive folder for specific training 4
4 Training Team Process Rename file “[Last name, First name] [Training Acronym] [Year]” 5
5 Training team Decision Is file a PDF? No 6
Yes 7
6 Training team/Snagit Process Convert to PDF using Snagit 7
7 Training Team Decision Is the certificate valid? Yes 8
No 13
8 TT / Spreadsheet Process Enter completion date in Record Retention spreadsheet 9
9 Training Team Process Change Training email status to “Compliant” 10
11 Training Team Process Move certificate to Recorded folder 12
12 Training Team End
13 Training Team Process Rename file as “INVALID [Last name, First name] [Training Acronym] [Year]” 14
15 TT/FRTIB Documentation Folder Process Move file to invalid folder 16
16 Training Team Process Notify employee/supervisor the certificate is invalid 17
17 Employee Process Corrects and re-sends certificate 18
18 Training Team Process Remove invalid file from folder 3

 

‹#›

13

Resources

14

Add Content to Slide

June 2020 – December 2021

 

Federal Retirement Thrift Investment Board’s Rules of Behavior for Accessing IT Systems

July 2020 Update 1

All data contained on information systems in support of the Federal Retirement Thrift Investment Board (FRTIB or Agency) is owned by the FRTIB. User activity may be monitored, intercepted, recorded, read, copied, captured, or disclosed by authorized FRTIB personnel. FRTIB may give law enforcement officials any potential evidence of crime, fraud, or employee misconduct found on FRTIB information systems. Furthermore, law enforcement officials may be authorized to access and collect evidence from these systems. USE OF THIS SYSTEM BY ANY USER, AUTHORIZED OR UNAUTHORIZED, CONSTITUTES EXPRESS CONSENT TO MONITORING.

I understand and acknowledge:

1. Policies and Procedures: a. Federal Employees: I will abide by all Agency policies and procedures. b. Contractor Employees: I will abide by the Agency policies and procedures

applicable to me in connection with the services provided to the Agency under the scope of my employer’s contract. The Agency will provide me with access to all applicable policies and procedures.

2. I HAVE NO REASONABLE EXPECTATION OF PRIVACY while using any information system that processes, transmits, or stores FRTIB data.

3. I understand and acknowledge monitoring includes, but is not limited to the review of: a. Audit logs of any IT device used to support FRTIB; b. Access and use of the Internet while on the FRTIB network; c. Electronic communication activity; or d. Any device used to process FRTIB data (regardless of device ownership).

4. I shall successfully complete FRTIB Cyber Security Awareness training and Privacy Awareness training at the time of onboard and on an annual basis. I shall also complete any additional information technology, security, records management, and privacy training as required. If any required training is not completed, access to FRTIB information systems will be suspended.

5. I may have access to Controlled Unclassified Information (CUI) depending on my job duties. I shall protect the confidentiality1, integrity2, and availability3 of FRTIB information in a manner consistent with its sensitivity.

6. I will use FRTIB information only in connection with the performance of my official duties. I will not disclose FRTIB information to unauthorized persons. I will not use non- FRTIB email, social media accounts (e.g., Outlook, Instagram, Gmail, Twitter, Facebook), or other external resources to conduct FRTIB business, thereby ensuring that official business is never confused with personal business.

7. I will encrypt all CUI using an Agency approved tool that is:

1 NISTIR 7298, Revision 2 “Glossary of Key Information Security Terms” defines confidentiality as “The property that sensitive information is not disclosed to unauthorized individuals, entities, or processes.” 2 NISTIR 7298, Revision2 “Glossary of Key Information Security Terms” defines integrity as “The property that sensitive data has not been modified or deleted in an unauthorized and undetected manner.” 3 NISTIR 7298, Revision 2 “Glossary of Key Information Security Terms” defines availability as “The property of being accessible and useable upon demand by an authorized entity.”

 

 

Federal Retirement Thrift Investment Board’s Rules of Behavior for Accessing IT Systems

July 2020 Update 2

a. Downloaded from FRTIB information systems onto a FRTIB authorized portable storage device;

b. Downloaded to any FRTIB authorized device; or c. Emailed to any entity external to the FRTIB organization (to non -“TSP.GOV” or

“FRTIB.GOV” email address.) 8. I will only access CUI when I am authorized to do so. I will only access the minimal

amount of CUI needed, and I will delete my copy of CUI data downloaded from FRTIB information systems immediately when its official use is no longer required.

9. I will protect my passwords and/or authentication tokens from disclosure and loss at all times. I will utilize the Agency provided password manager and I will never reveal my passwords, write them down, or store them in clear-text. I will not construct my password from obvious personal data (e.g., social security number, telephone numbers, relative’s names, pet’s name).

10. I will only create passwords that are unrelated to any existing password and I will not reuse a password from any other account, system, website, or application.

11. I am accountable for all actions taken under my User ID. I will not allow others to use my User ID and I will not access other users’ accounts. I will not attempt to access accounts or data that are not expressly authorized to me.

12. When logged on, I will lock my workstation and remove my PIV (Personal Identity Verification) card prior to leaving my workstation. All activity occurring when the workstation is active is the responsibility of the logged-on user.

13. I will not install, use, or reproduce unauthorized or illegally obtained software. Privately- owned software is prohibited from being used. FRTIB employees and contractors are only permitted to use FRTIB-approved applications and software. Employees and contractors must go through the Service Desk or ServiceNow to request applications and software.

14. I shall not connect unauthorized devices to FRTIB information systems under any circumstance. Examples include, but are not limited to: personal external hard drives, personal phones, unauthorized flash/thumb drives, networked cameras, or microphones.

15. Changes in my employment status or changes in my job responsibilities may require my access to be modified or terminated.

16. I am using a CUI system. I am NEVER authorized to originate, process, and/or store classified information on an unclassified system.

17. This agreement shall not nullify or affect in any manner any other confidentiality or nondisclosure agreement which I have executed or may execute with FRTIB.

18. I shall never attempt to tamper with, circumvent, or otherwise impede the security of any FRTIB system. I shall never install or utilize any tools designed to assist in doing the same.

19. I am not authorized to post organizational data to social media or social networking sites. Only authorized users with cleared content by the Office of External Affairs, the Office of Resource Management, or the Office of Communications and Education may post to social media or social networking sites as required to support the organizational mission. Personal use of social media while on work time or equipment must be limited with minimal cost to the government (see “Limited Personal Use” Policy) and must not interfere with my duties and responsibilities. I must seek approval from the Office of General Counsel prior to using or referencing my formal position when writing in a

 

 

Federal Retirement Thrift Investment Board’s Rules of Behavior for Accessing IT Systems

July 2020 Update 3

nonofficial capacity. I will never use my FRTIB e-mail address to register on social networks, blogs, or other online tools utilized for personal use and that any misconduct committed on social media that has a nexus to my position at FRTIB may result in appropriate discipline, up to and including removal from Federal service. As an employee of the Federal Government, when using social medial tools, whether on behalf of FRTIB or on my own time, I am bound by the Standards of Ethical Conduct for Employees of the Executive Branch, 5 C.F.R. Part 2635 and the Hatch Act (5 U.S.C. §§ 7321-7326).

20. I will immediately report a potential incident4, password compromise, anomaly in system performance, or suspicious activity to IncidentResponse@tsp.gov.

21. I shall not take any government-furnished equipment (including, but not limited to an FRTIB-issued laptop or phone) outside the United States or the territories of the United States without prior written approval from the Chief Technology Officer or designee.

22. Users are prohibited from sharing any FRTIB passwords with any other person or entity. 23. Viewing of pornographic or other offensive content is strictly prohibited on FRTIB

furnished equipment and networks. 24. I shall promptly report lost, stolen or misplaced Government Furnished Equipment (e.g.,

laptop, phone, PIV card) to the FRTIB Service Desk, IT Asset Management Team and my supervisor (or Contracting Officer Representative if applicable). Users may be financially liable for lost, stolen or misplaced Government Furnished Equipment5.

25. Any user who does not comply with or violates these rules may be subject to appropriate administrative action, including suspension or cancellation of system privileges and/or disciplinary action up to and including removal from the Federal service. Under some circumstances, noncompliance or violation of these rules may result in criminal prosecution. FRTIB will enforce the use of appropriate penalties against any user who fails to comply or violates IT Security Management policies.

Remote Access FRTIB Rules of Behavior for Remote Access apply to remote access connections used to do work on behalf of FRTIB, including reading or sending email and viewing Intranet web resources. Remote access implementations that are covered include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc. These rules of behavior apply to all users which include FRTIB staff, contractors, vendors, and agents with remote access privileges to FRTIB’s network.

1. The user is responsible for ensuring that their remote access connection is given the same security considerations as the user’s on-site connection when connecting to FRTIB. For example, if an individual is processing sensitive (e.g., For Official Use Only, Controlled Unclassified Information) information via remote access, the individual will ensure unauthorized individuals cannot view the content. The user is responsible for ensuring unauthorized users do not access the FRTIB network, do not perform illegal activities, and do not use the access for outside business interests. The user bears responsibility for

4 NISTIR 7298, Revision 2 “Glossary of Key Information Security Terms” defines incident as “An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.” 5 OTS.501 IT Asset Management Procedures, Section 4.6 Lost and Stolen Assets

 

 

Federal Retirement Thrift Investment Board’s Rules of Behavior for Accessing IT Systems

July 2020 Update 4

The Importance Of Reading Books

A book is the brain gym, it trains the brain, nourishes curiosity, and discovers new knowledge. It is just an adventure journey. Now, scroll back and say when you have read a decent book?

It all begins at school’s grassroots level, where young minds are introduced into books that teach them fundamentals such as alphabets, special sounds and letters. It’s not long until you read words and gravitate complete phrases after some time, and you understand everything from reading posters to the nuanced literature with the magic of time and few turned pages.

The key question is: why do people need books? Is it to comprehend those strange letters and examine them throughout their lives?

The fundamental truth is that the building blocks for people to properly connect and learn and that books are. But the advantages of reading books go beyond the imagination.

Books improve one’s understanding of the universe. Reading books is a very important aspect in the development of human thinking, about which there are many articles https://www.apppicker.com/developernews/38214/6-Top-Apps-for-Book-Learning  discussing the importance of books in human development. A passionate reader can uncover many mysteries and life solutions and can help make a good decision on any sort of life condition. Four of the main advantages of reading books are below.

Books develop skills in conversation

Books contribute greatly to better conversation and a person’s language. It allows the reader to learn stronger language skills that further develop the fluency in language that helps to easily convey or communicate ideas.

1.Educate Us Books

Books are the most knowledge-hungry mates. It helps to learn other cultures significantly and understands the past of things. Knowledge in new languages definitely encourages a person to improve his or her life and move on. There are books from history to problem solvers from cooking to biography. There are several genres.

Literature Maintain a healthy brain Books are regarded as the brain’s closest allies. The brain can practice and empower itself. This is like a gym. The blood pressure is stimulated in the brain and helps to maintain conditions such as dementia and Alzheimer’s. The more you learn the more the brain remains fit. It also contributes to emotional function and significantly improves memory. It helps also to improve the individual’s intellectual capacity.

2.Books Reduce Anxiety and Stress

The worst enemy of a balanced mind is stress and anxiety. It is really hard to deal with them in modern times. Lifestyle, job and social pressure help to increase tension substantially. Under these cases, books on science fiction, romantic novels and even autobiographies should definitely be looked at, besides the fact that the books are an outstanding stressor. You will definitely drive the doctor away with an unlimited number of books in these genres.

3.Motivating and inspiring books

Books are regarded as one of the most inspiring outlets. There are enough books showing human heroics even in the worst condition on the market. This books on heroism come with both fictitious and real life protagonists. These books help people to be confident and optimistic about their life. They encourage and inspire people.

4.Stimulating Books Creativity

Books are the best to travel through the realm of dreams and reach new levels of imagination. By reading, creativity and an open mind can be enkindled into new possibilities. One surely can fly, learn, foresee and make this novel a possibility with thousands of books around. Global scientists have attributed space technology books with inspiring the exposure of the universe’s technological mystery.

5.Importance of reading in improving the critical and analysis

Reading books is highly useful for the improvement of criticism and analysis. Most information is continuously handled by the brain during book reading. For instance, whether a person reads a mystery novel or a book, the brain will continually excel to devise the result of events. The brain can attempt to relate the puzzles and make sense of the narrative during this process. This continuous processing increases the capacity to solve problems and analyze the brain.

6.Enhances the capacity of writing

In addition to the countless health advantages, reading books contribute considerably to the development of an individual’s overall personality. Writers recognize in particular that reading is vital to their work. And those who write as an entertainment often claim that reading significantly enhances the overall capacity.

Describe at least three aspects of this movie that make it engaging and memorable.

Everyone is familiar with watching movies. With the abundance of streaming services and wireless devices, watching movies are more accessible than ever before. No matter how much or how little you watch movies, there are always those that stand out above the rest. Sometimes, it is because of a favorite actor. Other times, it is the story told, or feelings evoked. This assignment invites you to think more deeply about one of your favorite movies.

Instructions: Choose your favorite movie of all time (Black Panther) and write a 1-2 page analysis. Address the following:

  1. Describe the unique features of your chosen movie.
  2. Identify the genre of your chosen movie (film noir, romantic comedy, the screen musical, the western, horror, suspense, thriller, documentary, fictionalized biography, comedy, drama, etc.).
  3. Explain what you like and/or dislike about the genre.
  4. Analyze what makes your chosen movie a good representation of the genre. Use descriptive language and include at least two examples.
  5. Describe at least three aspects of this movie that make it engaging and memorable.

Your assignment should be written in APA format and should include in-text citations and a reference page.