Chapter 2: Postal Operations
N. Technology
  link to the previous page link to the next page

Because the Postal Service, its suppliers, and its customers rely upon information technology to conduct business for and with the Postal Service, we are dedicated to a cornerstone strategy of enhancing technology security. With over 50 externally-facing systems and over 127 million hits to per year, our security efforts help ensure that our electronic communications merit the public trust earned by the Postal Service. To protect its resources, personnel, and customers, the Postal Service developed a more robust intrusion protection capability, deployed an initial sensor set to key points in the Postal Service infrastructure, and added still another layer of protection.

The Postal Service recognizes that its employees and contractors are the first layer of defense in information technology security. To minimize our internal technological vulnerabilities, we established an internal information security website and reading room to increase awareness of the necessity for security precautions; initiated a new risk-based process for the certification and accreditation of postal applications; identified critical systems that require updated, tested business continuity and contingency plans; and, published compliance policies and operating procedures to minimize security vulnerabilities.

link to the previous page  link to the next page

Chapter 2 Table of Contents

A.  Public Perceptions, Customer
     Outreach and Mailer Liaison

B.  Product Development

C.  International Mail

D.  Mail Volume and Service

E.  Mail Distribution

F.  Delivery Unit Operations

G.  Stamp Services

H.  Licensing Program

I.  Commercial Sales

J.  Retail Programs:
     Building the Core

K.  Pricing and Classification

L.  Marketing Technology and
     Channel Management

M. The Internet:
     Transforming the Way We Connect
      with Our Customers

N.  Technology

O.  Operations Planning

P.  Financial Management