Part 1. Organization, Finance, and Management
Chapter 4. Resource Guide for Managers
Section 6. Managers Security Handbook
1.4.6 Managers Security Handbook
Manual Transmittal
December 27, 2023
Purpose
(1) This obsoletes Internal Revenue ManualIRM 1.4.6, Resource Guide for Managers, Managers Security Handbook.
Material Changes
(1) Facilities Management and Security Services is obsoleting this IRM. Multiple business units have published IRMs with information related to a manager’s responsibilities. Obsoleting this IRM will ensure all personnel have current and accurate information. Managers and employees should refer to the originating IRMs for current information and the correct context. For information on:
Limited Area Access, see IRM 10.2.18, Physical Access Control (PAC)
Determining Need, see IRM 10.2.18, Physical Access Control (PAC)
Protection of Personnel, Information, Facility and Property, see IRM 10.2.14, Methods of Providing Protection
Minimum Protection Standards (MPS), see IRM 10.2.14, Methods of Providing Protection. Note: BUs now determine what will be protected.
Space Planning, see National Workspace Standards
Security Areas/Perimeters, see IRM 10.2.14, Methods of Providing Protection
Controlled Areas, see IRM 10.2.18, Physical Access Control (PAC)
Key and Combination Control, see IRM 10.2.14, Methods of Providing Protection and IRM 10.9.1, Classified National Security Information (CNSI)
Information Protection, refer to IRMs listed under Part 11, Chapter 3, Disclosure of Official Information, and IRM 10.5.1, Privacy and Information Protection, Privacy Policy
Privacy Act Information, see 10.5.4, Privacy and Information Protection, Incident Management Program
Informant Information, refer to IRMs listed under Part 25, Chapter 2, Information and Whistleblower Awards
National Security Information, see IRM 10.9.1, Classified National Security Information (CNSI)
Sensitive But Unclassified (SBU) Information, see IRM 10.5.8, Sensitive But Unclassified (SBU) Data Policy: Protecting SBU in Non-Production Environments
Records and Documents, see IRM 1.15.1, Records and Information Management, The Records and Information Management Program
Mail, see IRM 10.5.1 Privacy and Information Protection, Privacy Policy, and IRM 1.22.5, Mail and Transportation Management, Mail Operations
Protection at Taxpayer’s Site, see IRM 10.5.1, Privacy and Information Protection, Privacy Policy,
Protection Outside of IRS Offices, see IRM 10.5.1 Privacy and Information Protection, Privacy Policy
Transmission, see IRM 10.5.1 Privacy and Information Protection, Privacy Policy
Disposition and Destruction, see IRM 1.15.2, Records and Information Management, Types of Records and Their Life Cycles
Clean Desk Policy, see IRM 10.5.1 Privacy and Information Protection, Privacy Policy
Security Awareness, see IRM 10.2.14 Methods of Providing Protection
Protection During Office Moves, see IRM 10.5.1 Privacy and Information Protection, Privacy Policy
Emergency Planning, see IRM 10.2.9, Occupant Emergency Planning
Reporting Incidents, see IRM 10.2.8, Incident Reporting
Occupant Emergency Plans, see IRM 10.2.9 Occupant Emergency Plans
Continuity Plan, see IRM 10.6.1, Continuity Operation, Overview of Continuity Planning and IRM 1.15.2, Records and Information Management, Types of Records and Their Life Cycles
Identification Media, see IRM 10.2.5, Identification Media and IRM 10.2.6, Pocket Commissions
Photo ID Cards, see IRM 10.2.5, Identification Media
Issuance of Non-Photo ID Cards, see IRM 10.2.18, Physical Access Control (PAC)
Pocket Commissions, see IRM 10.2.6 Pocket Commissions
ID Media for Pseudonym Holders, see IRM 10.2.6, Pocket Commissions,IRM 10.2.5 Identification Media, and 10.5.7, Privacy and Information Protection, Use of Pseudonyms by IRS Employees
Facility Access, see IRM 10.2.18, Physical Access Control (PAC)
Facility Unescorted Access, see IRM 10.2.18, Physical Access Control (PAC)
Facility Escorted Access, see IRM 10.2.18, Physical Access Control (PAC)
Facility Access Cards, see IRM 10.2.5, Identification Media
Functional Reviews: The policy requirement for functional reviews, as well as Form 12149 “Functional Security Reviews” is rescinded, but BU’s are encouraged to develop their own reviews or data collection instruments to assess policy implementation and compliance.
After Hours Review: The policy requirement for functional reviews, as well as Form 12149 “Functional Security Reviews” is rescinded, but BU’s are encouraged to develop their own reviews or data collection instruments to assess policy implementation and compliance.
Contractor Site Surveys and Reviews, see IRM 10.8.1, Information Technology (IT) Security, Policy and Guidance
Recertification, IRM 10.8.1, Information Technology (IT) Security, Policy and Guidance and Publication 4812, Contractor Security Controls
Effect on Other Documents
This obsoletes IRM 1.4.6, Managers Security Handbook, dated May 4, 2020.
Audience
Servicewide
Effective Date
(12-27-2023)
Richard L. Rodriguez
Chief
Facilities Management and Security Services