|
2. INFORMATION TECHNOLOGY SECURITY
Because the Postal Service, its suppliers, and its customers rely upon information technology to conduct business for and with the Postal Service, we are dedicated to a cornerstone strategy of enhancing technology security. With over 50 externally-facing systems and over 127 million hits to www.usps.com per year, our security efforts help ensure that our electronic communications merit the public trust earned by the Postal Service. To protect its resources, personnel, and customers, the Postal Service developed a more robust intrusion protection capability, deployed an initial sensor set to key points in the Postal Service infrastructure, and added still another layer of protection.
The Postal Service recognizes that its employees and contractors are the first layer of defense in information technology security. To minimize our internal technological vulnerabilities, we established an internal information security website and reading room to increase awareness of the necessity for security precautions; initiated a new risk-based process for the certification and accreditation of postal applications; identified critical systems that require updated, tested business continuity and contingency plans; and, published compliance policies and operating procedures to minimize security vulnerabilities.
|
|
A. Public Perceptions, Customer Outreach and Mailer Liaison
B. Product Development
C. International Mail
D. Mail Volume and Service Performance
E. Mail Distribution
F. Delivery Unit Operations
G. Stamp Services
H. Licensing Program
I. Commercial Sales
J. Retail Programs: Building the Core
K. Pricing and Classification
L. Marketing Technology and Channel Management
M. The Internet: Transforming the Way We Connect with Our Customers
N. Technology
O. Operations Planning
P. Financial Management
|