Search Data.gov
Found 85 dataset(s) matching "Agency IT Policy Archive".
-
Archive of U.S. Department of Education (ED) information technology (IT) policy documents--including "Information Technology Investment Management (ITIM) Directive" (OCIO 3-108), "Lifecycle...
-
A listing of SSA general IT policies as required by element G1 from the Common Baseline for IT Management in OMB memorandum M-15-14.
-
Policy & Guidance relating to Department of Justice Information Technology Practices and Management
-
A compressed zip file containing all of GSA's public IT policy documents, posted publicly at gsa.gov]/digitalstrategy/policyarchive.zip and identified in the agency public data listing as “Agency...
-
CIO defines IT processes and policies. The CIO defines the development processes, milestones, review gates, and the overall policies for all capital planning, enterprise architecture, and project...
-
This database table contains the current target list of the X-ray Multi-Mirror Newton (XMM-Newton) mission including those in (i) the routine calibration plan, (ii) the Guaranteed Time Observation...
-
Most foster children are not living with their fathers at the time they are removed from their homes. While in foster care these children may experience even less contact with their nonresident...
-
The Freedom of Information Act (FOIA) requires FOIA reading Rooms contain four distinct categories of records. The four categories of Reading Room records are: 1) final opinions and orders made in...
-
CMAQ v5.5 Annual 2023 Gridded Predictions Across the US and Canada Data contact: Havala Pye, ORCID: 0000-0002-2014-2140 This dataset provides daily predictions of ozone and fine particle (PM2.5)...
-
Neglect is a common form of child maltreatment and is a frequently occurring reason for family separation to foster care. The Neglect and Prevention Policies Data aggregates policy information...
-
Since the Administration for Children and Families is an awarding agency of the Department of Health and Human Services (HHS), ACF recipients must review and follow the HHS Grants Policy Statement...
-
Conducted by NCCAN and mandated by Congress, this study was the first large scale effort to assemble information, based on standardized definitions, about the scope and character of recognized...
-
This study examines the incidence of substantiated maltreatment among children with cognitive, physical, emotional or learning disabilities, with specific attention given to the relationship...
-
How we access information and use technology is rapidly changing. With so many ways to access an ever increasing amount of information, it is becoming increasingly difficult for information...
-
The State Child Welfare Data Linkages (SCW) Descriptive Study aims to provide novel information regarding connected (linked or integrated) state data that may be leveraged to improve the ongoing...
-
It is estimated that over a million young people run away or become homeless each year. These youth face increasingly complex issues, including substance abuse, physical and sexual abuse, and...
-
The 3rd National Online Victimization Study (NJOV-3) is the third wave of a longitudinal study. Wave 1 (NJOV-1) pertained to arrests for technology-facilitated crimes (e.g., sex offenders using...
-
It is estimated that over a million young people run away or become homeless each year. These youth face increasingly complex issues, including substance abuse, physical and sexual abuse, and...