Tax Notes logo

1.4.6. Managers Security Handbook

1.4.6 Managers Security Handbook

Manual Transmittal

December 27, 2023

Purpose

(1) This obsoletes Internal Revenue ManualIRM 1.4.6, Resource Guide for Managers, Managers Security Handbook.

Material Changes

(1) Facilities Management and Security Services is obsoleting this IRM. Multiple business units have published IRMs with information related to a manager’s responsibilities. Obsoleting this IRM will ensure all personnel have current and accurate information. Managers and employees should refer to the originating IRMs for current information and the correct context. For information on:

  1. Limited Area Access, see IRM 10.2.18, Physical Access Control (PAC)

  2. Determining Need, see IRM 10.2.18, Physical Access Control (PAC)

  3. Protection of Personnel, Information, Facility and Property, see IRM 10.2.14, Methods of Providing Protection

  4. Minimum Protection Standards (MPS), see IRM 10.2.14, Methods of Providing Protection. Note: BUs now determine what will be protected.

  5. Space Planning, see National Workspace Standards

  6. Security Areas/Perimeters, see IRM 10.2.14, Methods of Providing Protection

  7. Controlled Areas, see IRM 10.2.18, Physical Access Control (PAC)

  8. Key and Combination Control, see IRM 10.2.14, Methods of Providing Protection and IRM 10.9.1, Classified National Security Information (CNSI)

  9. Information Protection, refer to IRMs listed under Part 11, Chapter 3, Disclosure of Official Information, and IRM 10.5.1, Privacy and Information Protection, Privacy Policy

  10. Privacy Act Information, see 10.5.4, Privacy and Information Protection, Incident Management Program

  11. Informant Information, refer to IRMs listed under Part 25, Chapter 2, Information and Whistleblower Awards

  12. National Security Information, see IRM 10.9.1, Classified National Security Information (CNSI)

  13. Sensitive But Unclassified (SBU) Information, see IRM 10.5.8, Sensitive But Unclassified (SBU) Data Policy: Protecting SBU in Non-Production Environments

  14. Records and Documents, see IRM 1.15.1, Records and Information Management, The Records and Information Management Program

  15. Mail, see IRM 10.5.1 Privacy and Information Protection, Privacy Policy, and IRM 1.22.5, Mail and Transportation Management, Mail Operations

  16. Protection at Taxpayer’s Site, see IRM 10.5.1, Privacy and Information Protection, Privacy Policy,

  17. Protection Outside of IRS Offices, see IRM 10.5.1 Privacy and Information Protection, Privacy Policy

  18. Transmission, see IRM 10.5.1 Privacy and Information Protection, Privacy Policy

  19. Disposition and Destruction, see IRM 1.15.2, Records and Information Management, Types of Records and Their Life Cycles

  20. Clean Desk Policy, see IRM 10.5.1 Privacy and Information Protection, Privacy Policy

  21. Security Awareness, see IRM 10.2.14 Methods of Providing Protection

  22. Protection During Office Moves, see IRM 10.5.1 Privacy and Information Protection, Privacy Policy

  23. Emergency Planning, see IRM 10.2.9, Occupant Emergency Planning

  24. Reporting Incidents, see IRM 10.2.8, Incident Reporting

  25. Occupant Emergency Plans, see IRM 10.2.9 Occupant Emergency Plans

  26. Continuity Plan, see IRM 10.6.1, Continuity Operation, Overview of Continuity Planning and IRM 1.15.2, Records and Information Management, Types of Records and Their Life Cycles

  27. Identification Media, see IRM 10.2.5, Identification Media and IRM 10.2.6, Pocket Commissions

  28. Photo ID Cards, see IRM 10.2.5, Identification Media

  29. Issuance of Non-Photo ID Cards, see IRM 10.2.18, Physical Access Control (PAC)

  30. Pocket Commissions, see IRM 10.2.6 Pocket Commissions

  31. ID Media for Pseudonym Holders, see IRM 10.2.6, Pocket Commissions,IRM 10.2.5 Identification Media, and 10.5.7, Privacy and Information Protection, Use of Pseudonyms by IRS Employees

  32. Facility Access, see IRM 10.2.18, Physical Access Control (PAC)

  33. Facility Unescorted Access, see IRM 10.2.18, Physical Access Control (PAC)

  34. Facility Escorted Access, see IRM 10.2.18, Physical Access Control (PAC)

  35. Facility Access Cards, see IRM 10.2.5, Identification Media

  36. Functional Reviews: The policy requirement for functional reviews, as well as Form 12149 “Functional Security Reviews” is rescinded, but BU’s are encouraged to develop their own reviews or data collection instruments to assess policy implementation and compliance.

  37. After Hours Review: The policy requirement for functional reviews, as well as Form 12149 “Functional Security Reviews” is rescinded, but BU’s are encouraged to develop their own reviews or data collection instruments to assess policy implementation and compliance.

  38. Contractor Site Surveys and Reviews, see IRM 10.8.1, Information Technology (IT) Security, Policy and Guidance

  39. Recertification, IRM 10.8.1, Information Technology (IT) Security, Policy and Guidance and Publication 4812, Contractor Security Controls

Effect on Other Documents

This obsoletes IRM 1.4.6, Managers Security Handbook, dated May 4, 2020.

Audience

Servicewide

Effective Date

(12-27-2023)

Richard L. Rodriguez
Chief
Facilities Management and Security Services

OBSOLETE

(1) OBSOLETE

This data was captured by Tax Analysts from the IRS website on January 18, 2024.
Copy RID