Chief Information Officer Handbooks
2400.1 - Information Resources Management (IRM) Policies
Transmittal - Change 11 PDF Transmittal - Change 10 PDF Transmittal - Change 9 PDF Transmittal - Change 8 Transmittal - Change 7 Transmittal TABLE OF CONTENTS CHAPTER 1: OVERVIEW OF INFORMATION RESOURCES MANAGEMENT (IRM) CHAPTER 2: INFORMATION MANAGEMENT POLICIES CHAPTER 3: INFORMATION SYSTEMS POLICIES CHAPTER 4: INFORMATION TECHNOLOGY POLICIES CHAPTER 5: INFORMATION COLLECTION AND DISPOSITION POLICIES CHAPTER 7: ELECTRONIC MAIL POLICY CHAPTER 8: LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT CHAPTER 9: INFORMATION TECHNOLOGY INVESTMENT MANAGEMENT (ITIM) CHAPTER 10: INFORMATION COLLECTION UNDER THE PAPERWORK REDUCTION ACT (PRA) CHAPTER 11: WIRELESS DEVICE MANAGEMENT POLICY - Appendix - Rules of Behavior for Connecting Mobile IT Personal Device to HUD Resources
APPENDIX 1: GLOSSARY APPENDIX 2: MAJOR FEDERAL IRM LEGISLATION APPENDIX 3: HUD IRM GUIDES AND HANDBOOKS APPENDIX 4: MAJOR FEDERAL ORGANIZATIONS WITH IRM AUTHORITY APPENDIX 5: Cost Accounting, Cost Recovery, and Interagency Sharing APPENDIX 6: LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT 2400.13 - Word Processing and Microcomputer Technology Policies and Procedures
Transmittal PDF TABLE OF CONTENTS PDF CHAPTER 1: INTRODUCTION PDF CHAPTER 2: STANDARDIZATION OF OIS EQUIPMENT AND SOFTWARE PDF CHAPTER 3: FUNDING FOR OFFICE INFORMATION SYSTEMS PDF CHAPTER 4: ACQUISITION OF OFFICE INFORMATION SYSTEMS PDF CHAPTER 5: IMPLEMENTATION OF OFFICE INFORMATION SYSTEMS PDF CHAPTER 6: INVENTORY OF OIS EQUIPMENT AND APPLICATIONS PDF CHAPTER 7: MICROCOMPUTER APPLICATIONS PDF CHAPTER 8: DOCUMENTATION OF MICROCOMPUTER APPLICATIONS PDF CHAPTER 9: SECURITY PDF CHAPTER 10: RECORDS MANAGEMENT PDF CHAPTER 11: MICROCOMPUTER POST-IMPLEMENTATION EVALUATIONS PDF CHAPTER 12: OIS COMMUNICATIONS PDF APPENDIX 1: JUSTIFICATION FOR OFFICE INFORMATION SYSTEMS PDF APPENDIX 2: ORGANIZATIONAL PLANNING CONSIDERATIONS PDF - 2400.15 - HUD ADP Documentation Standards
- 2400.24 - ADP Security Program (This Handbook has been replaced by handbook 2400.25)
2400.25 - Information Technology Security Policy
- 2400.45 - Vulnerability Disclosure Policy
- Transmittal
- Full Handbook (PDF)
- Full Handbook (Online)
- 3150.1 - Breach Notification Policy and Response Plan Rev 1.0
- 3250.1 - HUD Business Process Improvement
- 3251.1 - Secure Configuration Management Policy
- 3252.1 - Software Configuration Management Policy
- 3253.1 - Change Management Policy
- 3254.1 - Enterprise Patch Management Policy
- 3255.1 - Enterprise Architecture Policy
3256.1 - Information Technology Asset Management Policy
- 3260.1 - Enterprise Data Management (EDM) Policy
3262.1 - Software Acquisition Capability Maturity Model Policy
TRANSMITTAL PDF TABLE OF CONTENTS PDF CHAPTER 1: HUD SOFTWARE ACQUISITION PLANNING SUB-POLICY PDF CHAPTER 2: SOFTWARE ACQUISITION PLANNING SUB-POLICY PDF CHAPTER 3: SOLICITATION SUB-POLICY PDF CHAPTER 4: REQUIREMENTS DEVELOPMENT AND MANAGEMENT SUB-POLICY PDF CHAPTER 5: PROJECT MANAGEMENT SUB-POLICY PDF CHAPTER 6: CONTRACT TRACKING AND OVERSIGHT SUB-POLICY PDF CHAPTER 7: EVALUATION SUB-POLICY PDF CHAPTER 8: TRANSITION TO SUPPORT SUB-POLICY PDF - 3300.1 - Total Information Quality Management
- 3400.1 - HUD Policy for IT Management Framework
- 3410.1 - HUD Policy For IT Project Planning and Management (PPM)
- 3415.1 - HUD Policy for Information Technology Governance
3417.1 - Web Applications Policy
- 3420.1 - The policy is superseded by the HUD IT Capital Planning and Investment Control Process Guide, published in 2020 (HUD Only).
3425.1 - HUD Policy for Information Technology Strategic Planning
- 3430.1 - HUD Policy for Agile Methodology, Rev 1
3435.1 - HUD OCIO Risk Management Policy
3440.1 - HUD OCIO TechStat Policy
3500.1 - HUD Source Code Policy