Data Breach Essentials

Size: px
Start display at page:

Download "Data Breach Essentials"

Transcription

1 BDO KNOWLEDGE WEBINAR SERIES Data Breach Essentials June 2014 BDO USA, LLP, a Delaware limited liability partnership, is the U.S. member of BDO International Limited, a UK company limited by guarantee, and forms part of the international BDO network of independent member firms. BDO USA, LLP, a Delaware limited liability partnership, is the U.S. member of BDO International Limited, a UK company limited by guarantee, and forms part of the international BDO network of independent member firms. Page 1 CPE AND SUPPORT CPE Participation Requirements To receive CPE credit for this webcast: You ll need to actively participate throughout the program. Be responsive to at least 75% of the participation pop-ups. Certificate of Attendance: If you are logged in the entire time and respond to all participation pop-ups, you will be able to print your certificate from the Participation section at the end of the webcast. If you log out before printing your certificate: BDO USA professionals CPE will automatically be issued in CPE Tracking & Reporting at the end of every week. A copy of your certificate will be sent after you have been issued credit. Clients and Contacts and all other individual participants You will be ed instructions on how to access your certificate. Page 2 1

2 CPE AND SUPPORT (CONTINUED) Group Participation To receive credit: Sign-in sheets must list a Proctor name and CPA license number. Clients and contacts sign-in sheets to cpe@bdo.com within 24 hours of the webcast. BDO USA professionals Submit your sign-in sheets using a General Training & Development Request in BDO Service Now found at: BDOWorld > Applications & Resources > BDO Service Now > Click Service Catalog in the left menu, then under Training & Development, Make a Request. Alliance Firm Members Should proctor their own group participants. This process is detailed in the LearnLive Participant Guide, which can be found by searching LearnLive Participant Guide on the Alliance Portal. Call LearnLive Support below for questions. International Firm Members Unfortunately, we cannot currently support group CPE for International Firms. Those wanting CPE must register and log in on their own computer. Handouts: Handouts, including group CPE sign-in sheets, may be accessed from the Handouts tab at the bottom of your screen Q&A: Submit all questions using the Q&A feature on the lower right corner of the screen. At the end of the presentation, the presenter(s) will review and answer all questions submitted. Technical Support: If you should have technical issues, please contact LearnLive: Click on the Live Chat icon under the Support tab, OR Call: Page 3 LEARNING OBJECTIVES Upon completion of this course participants will be able to: Apply the key elements required to prepare for and respond to a data breach Recognize certain data breach indicators, including but not limited to internal threats, external threats and other risk factors Identify activities necessary to determine the extent of a data breach and methodologies to contain the breach Identify appropriate personnel, both internally and externally, to involve in the cyber investigation and notification processes Recognize methods that allow for monitoring and detection of potential future breach events Page 4 2

3 PRESENTERS Dean Irwin, Principal, BDO USA, LLP Amy Rojik, Director BDO USA, LLP Rick Sanders, Attorney, Aaron & Sanders, PLLC Karen Schuler, Managing Director, BDO USA, LLP Greg Shrader, Information Technology Executive Page 5 AGENDA Data Breaches in the Headlines Managing Data Environments Creating an Environment that Promotes Strong Internal Controls Developing Unified Threat Management System and Protocols to Recognize Threats Elements of a Cyber Investigation and Incident Response Ability to Respond Elements of a Cyber Investigation Victim Notification Requirements and Reporting Monitoring and Preventative Steps Page 6 3

4 DATA BREACHES IN THE HEADLINES Selected losses greater than 30,000 records Page 7 Source: Information is Beautiful.net MANAGING DATA ENVIRONMENTS Page 8 4

5 DEVELOPING UNIFIED THREAT MANAGEMENT SYSTEM AND PROTOCOLS TO RECOGNIZE THREATS Setting Tone Establish Risk Committee Risk Policies and Procedures Identify the data and (IT) Systems Page 9 CREATING AN ENVIRONMENT THAT PROMOTES STRONG INTERNAL CONTROLS Safeguarding of assets Customer Data is an Asset! Controls over customer data Authorizations/access Adequacy of controls being maintained by third party outsourcers Continuous monitoring Real-time/Manual Performing regular assessments on up-to-date software Offer regularly scheduled training Documentation Page 10 5

6 ELEMENTS OF A CYBER INVESTIGATION AND INCIDENT RESPONSE Page 11 WHAT, WHEN AND HOW DID THIS HAPPEN? YOUR ABILITY TO RESPOND IS CRITICAL Incidents may be the result of one or more factors Response plans are critical don t wait until something happens Forming a response team can save you time and money Response teams may include your personnel, attorneys, outside consultants that specialize in cyber investigations and incident response Potential Causes of a Breach Page 12 6

7 WHAT, WHEN AND HOW DID THIS HAPPEN? THE ELEMENTS OF A CYBER INVESTIGATION Identification Containment Eradication Recovery Lessons Learned Location of the incident How was it discovered? Other areas compromised? Scope of the impact Have sources been identified? Business impact Short-term containment (is problem isolated / are systems isolated?) System-backup (evidence collection, imaging) Long-term containment (system off-line) Re-image and update patches, harden system(s) Removal of malware and artifacts from system(s) When can system(s) come back online? Have systems been prepared to thwart future attacks? What testing, monitoring solutions are going to be used for future? How can we prevent this in the future? Incident Report Who? What? Why? How? Where? When? Prevention CYBER INVESTIGATION Page 13 VICTIM NOTIFICATION REQUIREMENTS AND REPORTING All data breach statutes require the custodian of consumer data to notify the consumer if the consumer s personal information has been subject to a breach, but they vary markedly along several axes: 1. How broadly personal information is defined. Does it include information beyond SSN, DLN & financial info? 2. What triggers the duty to notify? Mere access? Something more? 3. Whether there are exceptions to the duty to notify. 4. How quickly notification must be given. 5. Who, if anyone, must be notified in addition to the affected consumer, such as the attorney general or consumer protection agency. 6. The effect, if any, of encryption. 7. What must be included in the notification? 8. How notification must be given? 9. Whether there are private causes of action for failure to given notice and/or failure to protect data. 10. Whether the statute also protects hard documents? Page 14 7

8 RESOURCES The National Conference of State Legislatures maintains links to every state s data protection statutes: The law firm of Baker Hostetler maintains a constantly updated data privacy blog and other resources: Page 15 MONITORING AND PREVENTATIVE STEPS Page 16 8

9 DETERRING FUTURE DATA BREACHES Identification and measurement of risk Security initiatives (and ROI) Executive participation/oversight Education Communication Plan Page 17 SUMMARY: NEXT STEPS Recognize data breach indicators internal/external Identify activities necessary to determine the extent of a data breach and methodologies to contain the breach Identify appropriate personnel, both internally and externally, to involve in the cyber investigation and notification processes Recognize methods that allow for monitoring and detection of potential future breach events Page 18 9

10 ADDITIONAL WEBINARS BDO Knowledge Webinar Archives: Managing Risk in Cyberspace BDO Knowledge Upcoming Webinars: Technical Update Q July 9, 10 and 11 Revenue Recognition: Overview of ASU July 14 and 15 Page 19 Page 19 BDO BOARD REFLECTIONS Additional resources accessible via the BDO Board Reflections: Recent BDO Publications: Cybersecurity Its Impact on the External Audit and Other Recent Developments Cybersecurity A Board Primer For a complete listing of publications, refer to: Page 20 Page 20 10

11 EVALUATION We continually try and improve our programming and appreciate constructive feedback. Following the program, we will be sending out a thank you that contains a link to a brief evaluation. Thank you in advance for your participation! Page 21 CONCLUSION THANK YOU FOR YOUR PARTICIPATION! Certificate Availability If you participated the entire time and responded to at least 75% of the polling questions, click the Participation tab to access the print certificate button. Group Participation Reminder to receive credit: Sign-in sheets must list a Proctor name and CPA license number. Clients and Contacts sign-in sheets to bdoevents@bdo.com within 24 hours of the webcast. BDO USA professionals Submit your sign-in sheets using BDO Service Now. Alliance Firm Members Should proctor their own group participants. This process is detailed in the LearnLive Participant Guide on Alliance Portal > Resource Center. Call LearnLive Support for questions International Firm Members - Unfortunately, we cannot currently support group CPE for International Firms. Those requesting CPE must have registered and participated from their own computer. Please exit the interface by clicking the red X in the upper right hand corner of your screen. Page 22 11

Performance Review Documentation for Duke University Employees

Performance Review Documentation for Duke University Employees Performance Review Documentation for Duke University Employees At Duke, annual reviews are required. Mid-Year reviews may also be required by the department. Below are the steps in the performance management

More information

IT Service Desk Manual Ver. 2.0. Document Prepared By: IT Department. Page 1 of 12

IT Service Desk Manual Ver. 2.0. Document Prepared By: IT Department. Page 1 of 12 Document Prepared By: Page 1 of 12 INDEX 1. Introduction. 3 2. Home Page..... 4 2.1 My Request Summary..... 4 2.2 Announcement....... 5 2.3 Submit your Request...... 5 2.4 Report a Problem...... 6 2.5

More information

BDO KNOWLEDGE Tax Webinar Series High Growth & Start-Up Companies: What You Need about the R&D Tax Credit from Day 1 Page 1

BDO KNOWLEDGE Tax Webinar Series High Growth & Start-Up Companies: What You Need about the R&D Tax Credit from Day 1 Page 1 BDO USA, LLP, a Delaware limited liability partnership, is the U.S. member of BDO International Limited, a UK company limited by guarantee, and forms part of the international BDO network of independent

More information

cyber liability insurance.

cyber liability insurance. 1 of 8 4/23/2016 2:49 PM (http://www.xtelligentmedia.com) Become a member Login HealthITSecurity /) Home /) News /news) Features /features) HIPAA and Compliance /topic/hipaa) EHR Security /topic/ehr-security)

More information

Florida Courts E-Filing Portal. E-service User Guide

Florida Courts E-Filing Portal. E-service User Guide Table of Contents Overview... 3 E-service Features... 3 Pre-Populated E-service Lists... 3 Incorporating E-service to the Filing Process... 3 Screen Location for Service List... 4 E-File Service List Page...

More information

Logging In: Auditing Cybersecurity in an Unsecure World

Logging In: Auditing Cybersecurity in an Unsecure World About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that

More information

Quick Reference Guide for MyTrack.com Project Tracking Website Your Project is On TRACK!

Quick Reference Guide for MyTrack.com Project Tracking Website Your Project is On TRACK! Quick Reference Guide for MyTrack.com Project Tracking Website Your Project is On TRACK! We believe you deserve to know the status of all details related to your project 24x7. The Track Group uses our

More information

Cognos 10 Getting Started with Internet Explorer and Windows 7

Cognos 10 Getting Started with Internet Explorer and Windows 7 Browser/Windows Settings There are several Internet Explorer browser settings required for running reports in Cognos. This document will describe specifically how to set those in Internet Explorer 9 and

More information

Guide for Instructors A how-to guide on managing accommodation information for students with disabilities.

Guide for Instructors A how-to guide on managing accommodation information for students with disabilities. Guide for Instructors A how-to guide on managing accommodation information for students with disabilities. Contents Clockwork Guide for Instructors... 1 Instructor Portal... 2 Accessing Accommodation Letters...

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

WebsiteAlive Operator Panel. A WebsiteAlive How-To Guide

WebsiteAlive Operator Panel. A WebsiteAlive How-To Guide WebsiteAlive Operator Panel A WebsiteAlive How-To Guide TM WebsiteAlive Operator Panel A WebsiteAlive How-To Guide This document will help you familiarize yourself with the WebsiteAlive Operator Panel

More information

Patient Portal Users Guide

Patient Portal Users Guide e-mds Solution Series Patient Portal Users Guide Version 7.0 How to Use the Patient Portal CHARTING THE FUTURE OF HEALTHCARE e-mds 9900 Spectrum Drive. Austin, TX 78717 Phone 512.257.5200 Fax 512.335.4375

More information

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned

More information

TBR System Office Performance Management Employee s Guide

TBR System Office Performance Management Employee s Guide TBR System Office Performance Management Employee s Guide A Step-By-Step Employee Guide for completing performance evaluations in the PeopleAdmin Performance Management Suite PeopleAdmin 7.0 is a multi-functional

More information

HOW TO ACCESS AND USE GET HELP

HOW TO ACCESS AND USE GET HELP ASK HR INSTRUCTION GUIDE HOW TO ACCESS AND USE GET HELP TO SEARCH THE ON-LINE HUMAN RESOURCES KNOWLEDGE BASE OF INFORMATION GET HELP FROM MDC MAIN PAGE Human Resources is now utilizing the College s on-line

More information

Google Docs, Sheets, and Slides: Share and collaborate

Google Docs, Sheets, and Slides: Share and collaborate Google Docs, Sheets, and Slides: Share and collaborate Once you've created your document, you can share it with others. Collaborators can then edit the same document at the same time you'll always have

More information

1 CoverMyMeds User s Guide User s Guide

1 CoverMyMeds User s Guide User s Guide 1 CoverMyMeds User s Guide User s Guide 2 CoverMyMeds User s Guide TABLE OF CONTENTS Overview 3 Starting a Request 3 Using a Key 4 Completing the Request 5 Address Books 5 Required and Important Tags 5

More information

Unanet User Guide: Timesheets & Expenses Getting Started Submitting Timesheets Submitting Expenses Contacts & Support

Unanet User Guide: Timesheets & Expenses Getting Started Submitting Timesheets Submitting Expenses Contacts & Support Unanet User Guide: Timesheets & Expenses Getting Started Submitting Timesheets Submitting Expenses Contacts & Support 395 West Passaic Street Rochelle Park New Jersey 07662 www.insys.com Getting Started

More information

What You Need to Know About CELDT Security Forms

What You Need to Know About CELDT Security Forms TITLE: NUMBER: ISSUER: CELDT Training for Principals and Coordinators and Electronic Submission of Test Security Forms for 2015-16 Cynthia Lim, Executive Director Office of Data and Accountability ROUTING

More information

Thank you for visiting the Online Course Proposal Web Tutorial for new and existing courses for Brown University Faculty and Staff.

Thank you for visiting the Online Course Proposal Web Tutorial for new and existing courses for Brown University Faculty and Staff. Thank you for visiting the Online Course Proposal Web Tutorial for new and existing courses for Brown University Faculty and Staff. 1 To access Self Service Banner, you will need to login to https://selfservice.brown.edu

More information

Directory and Messaging Services Enterprise Secure Mail Services

Directory and Messaging Services Enterprise Secure Mail Services Title: Directory and Messaging Services Enterprise Secure Mail Services Enterprise Secure Mail Services for End Users Attention: Receivers of Secure Mail Retrieval of Secure Mail by the Recipient Once

More information

Welcome to Empower. 2014 Software AG. All rights reserved.

Welcome to Empower. 2014 Software AG. All rights reserved. Welcome to Empower 2014 Software AG. All rights reserved. Objectives Introduction to Software AG s support tools Empower Empower is our customer self-service portal for obtaining product information, searching

More information

Address Book. Store all of your contacts in your online Address Book.

Address Book. Store all of your contacts in your online Address Book. Contents Address Book 4 Anonymous Call Rejection 5 Call Block 5 Call Forward 6-7 Call Logs 7 Call Return 7 Call Waiting 8 Caller ID 9 Do Not Disturb 10 Find Me 11 Outbound Caller ID Block 9 Selective Call

More information

USER GUIDE BroadData Conferencing Reservationless Audio Conferencing - Online Call Manager

USER GUIDE BroadData Conferencing Reservationless Audio Conferencing - Online Call Manager USER GUIDE BroadData Conferencing Reservationless Audio Conferencing - Online Call Manager Online Call Manager adds the power of the Internet to your audio meeting. It turns your meeting into an integrated

More information

Getting Started. Getting Started. www.clickmeeting.com

Getting Started. Getting Started. www.clickmeeting.com Getting Started www.clickmeeting.com 1 Introduction ClickMeeting is a web-based videoconferencing platform where you can conduct on-demand meetings, webinars and presentations without spending a dime on

More information

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work National Cyber Security Awareness Month Week Two: Creating a Culture of Cybersecurity at Work Webinar Recording and Evaluation Survey This webinar is being recorded and will be made available online to

More information

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar April 25, 2013 Welcome to the NICCS Webinar! Thank you for joining us today. During this presentation, you will: Learn about the

More information

AKCess Pro Server Acknowledge Alerts & Sensor Status Manual

AKCess Pro Server Acknowledge Alerts & Sensor Status Manual www.akcp.com AKCess Pro Server Acknowledge Alerts & Sensor Status Manual Copyright 2015, AKCP Co., Ltd. Table of Contents Introduction... 3 The example SEC configuration... 4 Acknowledging sensor alerts...

More information

Client Portal Training

Client Portal Training Client Portal Training Signing In 1. Go to http://www.csus.edu/irt/projects and click on Team Dynamix Client or from your browser, go to https://csus.teamdynamix.com 2. Click on SIGN-IN located in the

More information

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s 1 Agenda Data Security Trends Root causes of Cyber Attacks How can we fix this? Secure Infrastructure Security Practices

More information

Quick Start Guide to Logging in to Online Banking

Quick Start Guide to Logging in to Online Banking Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s

More information

Working with the FBI

Working with the FBI Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement

More information

Client Email Search. Searching For Clients With or Without Email Addresses

Client Email Search. Searching For Clients With or Without Email Addresses Client Email Search Searching For Clients With or Without Email Addresses The Client Marketing section of STX helps you to create marketing sets to find active clients with or without valid email addresses

More information

PRELIMINARY MEETING PREPARATION For the best quality and experience during your WebEx Meeting, you should have the following:

PRELIMINARY MEETING PREPARATION For the best quality and experience during your WebEx Meeting, you should have the following: HOSTING AN NJIT WEBEX MEETING PRELIMINARY MEETING PREPARATION For the best quality and experience during your WebEx Meeting, you should have the following: Technical Needs: A headset/mic combo unit (preferably

More information

HAIKU LMS PARENT MANUAL

HAIKU LMS PARENT MANUAL PORTLEDGE SCHOOL 2014-15 HAIKU LMS PARENT MANUAL FOR PORTLEDGE S LOWER, MIDDLE AND UPPER SCHOOLS About Haiku All Portledge students now have access to our new Learning Management System (LMS), Haiku. This

More information

Academic Senate Data Management System

Academic Senate Data Management System Academic Senate Data Management System User s Guide for Committee Members 9/22/2015 The Academic Senate uses the Data Management System (DMS) for managing, sharing, and archiving council and committee

More information

1. Enter the patient s email address in one of the following areas: a. Under Patient tab (see below) or b. Under Info tab under Other

1. Enter the patient s email address in one of the following areas: a. Under Patient tab (see below) or b. Under Info tab under Other Patient Messaging with Ingage Patient Portal Secure messaging will now be handled through Ingage patient. The provider will be able to send a message from Clinician and the patient will be able to view

More information

Please let us know if you need anything. Our customer service number is 1-866-311-5900. We re always happy to help.

Please let us know if you need anything. Our customer service number is 1-866-311-5900. We re always happy to help. Dear Valued Customer, We are proud to welcome you to the EvenLink s Crystal Clear Digital Phone service. Our network reliability, customer support and value pricing are a great combination. We appreciate

More information

Schools CPD Online General User Guide Contents

Schools CPD Online General User Guide Contents Schools CPD Online General User Guide Contents New user?...2 Access the Site...6 Managing your account in My CPD...8 Searching for events...14 Making a Booking on an Event...20 Tracking events you are

More information

Cyber Security Risks for Banking Institutions.

Cyber Security Risks for Banking Institutions. Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions

More information

Voice Mail - Web PhoneManager (WPM) Rev. 8/4/15

Voice Mail - Web PhoneManager (WPM) Rev. 8/4/15 Voice Mail - Web PhoneManager (WPM) Rev. 8/4/15 Web PhoneManager allows subscribers to manage their messages, mailbox recordings, and mailbox settings over the Internet. Important Notes: WPM is available

More information

DOT/TSI Online Training Center Student User Guide

DOT/TSI Online Training Center Student User Guide DEPARTMENT OF TRANSPORTATION DEPARTMENT OF TRANSPORTATION U NITE D STATES O F A M E RIC A U NITE D STATES O F A M ERIC A DOT/TSI Online Training Center Student User Guide (P-CD-DOTTSI-382-081605) User

More information

Contents. Note: Feature commands and/or functionality may vary dependent on the telephone equipment you choose to use with this product.

Contents. Note: Feature commands and/or functionality may vary dependent on the telephone equipment you choose to use with this product. Contents Address Book 4 Anonymous Call Rejection 5 Call Block 5 Call Forward 6-7 Call Hold 7 Call Log 8 Call Return 8 Call Waiting 9 Caller ID 10 Outbound Caller ID Block 10 Outbound Caller ID Deactivation

More information

CYBERSECURITY & EXPECTATIONS FOR INDEPENDENT GROCERS

CYBERSECURITY & EXPECTATIONS FOR INDEPENDENT GROCERS October 21, 2015 CYBERSECURITY & EXPECTATIONS FOR INDEPENDENT GROCERS Cerone F. Cy Sturdivant Managing Consultant csturdivant@bkd.com 1 TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls

More information

Anonymous Call Rejection

Anonymous Call Rejection Contents Anonymous Call Rejection 4 Call Block 5 Call Forward 6-7 Call Return 8 Call Waiting 9 Caller ID 10-11 Do Not Disturb 12 Find Me 13 Selective Call Forwarding 14 Speed Dial 15 Three-Way Calling

More information

Brief. The BakerHostetler Data Security Incident Response Report 2015

Brief. The BakerHostetler Data Security Incident Response Report 2015 Brief The BakerHostetler Data Security Incident Response Report 2015 The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 the year of the

More information

Business Procedures: Send Secure Emails Created: 02-25-2014 Updated: 04-15-2014

Business Procedures: Send Secure Emails Created: 02-25-2014 Updated: 04-15-2014 Business Procedures: Send Secure Emails Created: 02-25-2014 Updated: 04-15-2014 Page 1 of 10 Overview From time to time it is necessary to be able to share confidential information with school districts

More information

Cloud Web Portal User Guide Version 2.0

Cloud Web Portal User Guide Version 2.0 Cloud Web Portal User Guide Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)

More information

Online Registration Instructions

Online Registration Instructions Online Registration Instructions 1. Open Internet Explorer and browse to my.nyack.edu 2. Click on Check Email icon and login to the MyNyackSSO page shown below using the login information you were assigned

More information

Wentworth Institute of Technology Performance Management Employee s Guide

Wentworth Institute of Technology Performance Management Employee s Guide Wentworth Institute of Technology Performance Management Employee s Guide A Step-By-Step Employee Guide for completing performance evaluations in the PeopleAdmin Performance Management Suite PeopleAdmin

More information

Drive. Etobicoke-Mimico Watershed Coalition

Drive. Etobicoke-Mimico Watershed Coalition Drive Etobicoke-Mimico Watershed Coalition (Adapted from Google Drive for Academics available at https://docs.google.com/document/d/1hvbqob26dkpeimv6srdgwvpupuo5ntvojqjxorq0n20/edit?pli=1) Table of Contents

More information

TRANS-VIDEO PHONE SERVICE

TRANS-VIDEO PHONE SERVICE TRANS-VIDEO PHONE SERVICE FEATURE GUIDE telephone number username password Manage your account online at: www.trans-video.net/voice.html CONTENTS Address Book Anonymous Call Rejection Call Block Call Logs

More information

Accessing The Doctors Clinic Physician Connect

Accessing The Doctors Clinic Physician Connect Accessing The Doctors Clinic Physician Connect The Doctors Clinic s commitment to excellence in patient care presents healthcare providers in our community access to electronic health records. Here s how:

More information

ACCESSING SINGLE NUMBER SERVICE FROM THE WEB PORTAL (FOR PHONE ADMINISTRATION SEE PAGE 6)

ACCESSING SINGLE NUMBER SERVICE FROM THE WEB PORTAL (FOR PHONE ADMINISTRATION SEE PAGE 6) Page 1 F o r A s s i s t a n c e C a l l 6 0 5. 5 9 4. 3 4 1 1 ACCESSING SINGLE NUMBER SERVICE FROM THE WEB PORTAL (FOR PHONE ADMINISTRATION SEE PAGE 6) After logging into the Web Portal, click on the

More information

AUDIT TAX SYSTEMS ADVISORY

AUDIT TAX SYSTEMS ADVISORY AUDIT TAX SYSTEMS ADVISORY Presented by: Jim Rumph Introduction JIM RUMPH, CISA Systems Manager Jim is a graduate of the University of Georgia with a Bachelor of Business Administration in Accounting and

More information

Features & Instructions Guide For Your New VoIP Services

Features & Instructions Guide For Your New VoIP Services Features & Instructions Guide For Your New VoIP Services Coast Communications 349 Damon Rd NE Ocean Shores, WA 98569 Phone: 360-289-2252 Fax: 360-289-2750 Email: sales@coastaccess.com WELCOME This Guide

More information

Online Services through My Direct Care www.mydirectcare.com

Online Services through My Direct Care www.mydirectcare.com Online Services through My Direct Care www.mydirectcare.com WEB PORTAL Employers and Employees associated with Consumer Direct have access to online services available through a secure website www.mydirectcare.com.

More information

Add Title. Electronic Services Verification Instructions

Add Title. Electronic Services Verification Instructions Add Title Electronic Services Verification Instructions Electronic Services Verification Instructions Access CHAMPS Enter Daily Tasks What to do if the Client is Not in the Home Log services for Multiple

More information

Messages Tab. Overview: The Messages Tab. Inbox: Viewing and Replying to Messages. Composing New Messages. Archiving Messages

Messages Tab. Overview: The Messages Tab. Inbox: Viewing and Replying to Messages. Composing New Messages. Archiving Messages Messages Tab Overview: The Messages Tab Inbox: Viewing and Replying to Messages Composing New Messages Archiving Messages 1 Overview: The Message Center The Message Center will be the central forum for

More information

Welcome to Today s NACUBO Webcast. Our program will begin shortly with a brief introduction on how to use the desktop interface.

Welcome to Today s NACUBO Webcast. Our program will begin shortly with a brief introduction on how to use the desktop interface. Welcome to Today s NACUBO Webcast Our program will begin shortly with a brief introduction on how to use the desktop interface. Desktop Interface Media Player Element Display Element Toolbar Quick Question

More information

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright

More information

LexisNexis Emerging Issues Analysis

LexisNexis Emerging Issues Analysis 2012 Emerging Issues 6204 Research Solutions February 2012 Click here for more Emerging Issues Analyses related to this Area of Law. On October 13, 2011, the Division of Corporate Finance of the Securities

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

Data Breach Response Planning: Laying the Right Foundation

Data Breach Response Planning: Laying the Right Foundation Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA

More information

FILING REPRESENTATIVES TRAINING ONLINE COURSE SCHEDULING USER GUIDE

FILING REPRESENTATIVES TRAINING ONLINE COURSE SCHEDULING USER GUIDE FILING REPRESENTATIVES TRAINING ONLINE COURSE SCHEDULING USER GUIDE October 18, 2013 Online Course Scheduling User Guide Page 1 of 28 TABLE OF CONTENT 1 ABOUT THIS DOCUMENT... 3 2 REGISTRATION... 4 2.1

More information

Privacy Rights Clearing House

Privacy Rights Clearing House 10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights

More information

Click to edit Master title style

Click to edit Master title style EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity

More information

Bb Collaborate Online Rooms Faculty Support Guide

Bb Collaborate Online Rooms Faculty Support Guide Bb Collaborate Online Rooms Faculty Support Guide D2L Services West Chester University of Pennsylvania www.wcupa.edu/d2l 610-436-3350, option 2 Anderson Hall d2l@wcupa.edu D2L v10.5 BB Collaborate 12.6.4

More information

eopf Release E Administrator Training Manual

eopf Release E Administrator Training Manual eopf Release E Administrator Training Manual i The United States Office Of Personnel Management eopf Administrator Training Manual for eopf v5 eopf Version 4.1, July 2007, March 2008, March 2009; eopf

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Creating a WebEx Event in the OnPoint LMS

Creating a WebEx Event in the OnPoint LMS Creating a WebEx Event in the OnPoint LMS Overview: New functionality is now available in the OnPoint LMS that ties WebEx webinar event creation, registration and tracking to the Event functionality in

More information

Sage Estimating. Release Notes Version 13.1

Sage Estimating. Release Notes Version 13.1 Sage Estimating Release Notes Version 13.1 Table of Contents Version 13.1 1 Release Overview 3 Software Changes, Resolved Issues, and Known Issues 3 Support and Assistance 4 Estimating Product Release

More information

University Performance Management Tool (for Managers)

University Performance Management Tool (for Managers) If you took the Guide to Managing at Duke Program you learned about the performance management process now it is time to learn the SAP tool for managing performance. Below are the steps in the performance

More information

Best Practices for Protecting Sensitive Data in an Oracle Applications Environment. Presented by: Jeffrey T. Hare, CPA CISA CIA

Best Practices for Protecting Sensitive Data in an Oracle Applications Environment. Presented by: Jeffrey T. Hare, CPA CISA CIA Best Practices for Protecting Sensitive Data in an Oracle Applications Environment Presented by: Jeffrey T. Hare, CPA CISA CIA Webinar Logistics Hide and unhide the Webinar control panel by clicking on

More information

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013 Welcome to ChiroCare s Fourth Annual Fall Business Summit October 3, 2013 HIPAA Compliance Regulatory Overview & Implementation Tips for Providers Agenda Green packet Overview of general HIPAA terms and

More information

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4 State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes

More information

Tips for Net Meeting and UNRI Webcast Presenters Using Microsoft Live Meeting

Tips for Net Meeting and UNRI Webcast Presenters Using Microsoft Live Meeting USDA Forest Service, Northern Research Station, Amherst, MA 01003 www.unri.org Tips for Net Meeting and UNRI Webcast Presenters Includes the following preparation tools:? Webcasting to a Large Group? Informal

More information

Document Services Online Customer Guide

Document Services Online Customer Guide Document Services Online Customer Guide Logging in... 3 Registering an Account... 3 Navigating DSO... 4 Basic Orders... 5 Getting Started... 5 Attaching Files & Print Options... 7 Advanced Print Options

More information

Your Agency Just Had a Privacy Breach Now What?

Your Agency Just Had a Privacy Breach Now What? 1 Your Agency Just Had a Privacy Breach Now What? Kathleen Claffie U.S. Customs and Border Protection What is a Breach The loss of control, compromise, unauthorized disclosure, unauthorized acquisition,

More information

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced

More information

Probationary Teacher... 2. Continuing Teacher... 2. Summary of Instrument changes from School Year 2012-2013... 2

Probationary Teacher... 2. Continuing Teacher... 2. Summary of Instrument changes from School Year 2012-2013... 2 CONTENTS Evaluation Plan Overview 2013-2014... 2 Probationary Teacher... 2 Continuing Teacher... 2 Summary of Instrument changes from School Year 2012-2013... 2 Accessing the Performance Review System...

More information

Skype for Business User Guide

Skype for Business User Guide Skype for Business User Guide Contents Accessing Skype for Business... 2 Starting Skype for Business for the first time... 2 Subsequent access to Skype for Business... 3 Customising Skype for Business

More information

Customizing Confirmation Text and Emails for Donation Forms

Customizing Confirmation Text and Emails for Donation Forms Customizing Confirmation Text and Emails for Donation Forms You have complete control over the look & feel and text used in your donation confirmation emails. Each form in Sphere generates its own confirmation

More information

U.S. Online Banking & Bill Pay Frequently Asked Questions

U.S. Online Banking & Bill Pay Frequently Asked Questions U.S. Online Banking & Bill Pay Frequently Asked Questions How do I enroll in estatements? Choosing estatements is a smart, safe and environmentally-friendly way to receive and manage your monthly account

More information

AUDITVIEW USER INSTRUCTIONS

AUDITVIEW USER INSTRUCTIONS The AuditGard AuditView software allows the Manager to view, save, and print the audit records. The AuditGard lock maintains the last 512 lock events in non-volatile memory. Accessing the audit records

More information

www.pwc.com Current Accounting and Reporting Developments Webcast Series Third Quarter 2015

www.pwc.com Current Accounting and Reporting Developments Webcast Series Third Quarter 2015 www.pwc.com Current Accounting and Reporting Developments Webcast Series Third Quarter 2015 Welcome Beth Paul Accounting Services Group Team Leader Paula Loop Center for Board Governance and Investor Resource

More information

1. Introduction. 2. Reporting a Fault, Ask a Question or Make a Suggestion. 3. Accessing Go To Assist. 4. The Knowledge Catalog.

1. Introduction. 2. Reporting a Fault, Ask a Question or Make a Suggestion. 3. Accessing Go To Assist. 4. The Knowledge Catalog. 1/6 How does the Support System Work? 1. Introduction. 2. Reporting a Fault, Ask a Question or Make a Suggestion. 3. Accessing Go To Assist. 4. The Knowledge Catalog. 1. Introduction: The Support System

More information

Tuskegee University Performance Management Philosophy and Key Components Performance management is an ongoing, continuous process of communicating

Tuskegee University Performance Management Philosophy and Key Components Performance management is an ongoing, continuous process of communicating Tuskegee University Performance Management Philosophy and Key Components Performance management is an ongoing, continuous process of communicating and clarifying job responsibilities, priorities and performance

More information

WebEx Virtual Office Hours

WebEx Virtual Office Hours WebEx Virtual Office Hours During your virtual office hours, you can display, discuss, and review content and concepts with your students. You can also make a student presenter and view, discuss and comment

More information

Help Desk Web User Guide

Help Desk Web User Guide Help Desk Web User Guide 1 P age Contents Create an Incident... 3 Classifying Category... 3 Describe Incident Request... 3 Add Attachments to the Request... 4 Requests... 4 Request List View... 5 Modes

More information

Protecting the Information of Clients, Donors, the Organization, Oh MY! Stacey Keegan November 14, 2012

Protecting the Information of Clients, Donors, the Organization, Oh MY! Stacey Keegan November 14, 2012 Protecting the Information of Clients, Donors, the Organization, Oh MY! Stacey Keegan November 14, 2012 Mission of Pro Bono Partnership of Atlanta: To maximize the impact of pro bono engagement by connecting

More information

Identity Finder Quick Start Guide for Windows

Identity Finder Quick Start Guide for Windows Identity Finder Quick Start Guide for Windows Maintained by University IT Security and Policy Revised date: 10/30/2013 Identity Finder assists in the discovery and removal of Personally Identifiable Information

More information

Certification Candidate Handbook

Certification Candidate Handbook Certification Candidate Handbook The Certification Candidate Management System (CCMS) User Guide details the process from beginning to end, program requirements, what to expect at the testing center, how

More information

Current Developments Concerning Cybersecurity. ICI General Membership Meeting Legal Forum Jillian Bosmann and Nancy O Hara Thursday, May 19, 2016

Current Developments Concerning Cybersecurity. ICI General Membership Meeting Legal Forum Jillian Bosmann and Nancy O Hara Thursday, May 19, 2016 Current Developments Concerning Cybersecurity ICI General Membership Meeting Legal Forum Jillian Bosmann and Nancy O Hara Thursday, May 19, 2016 AGENDA Why is Cybersecurity Important? Top Cybersecurity

More information

v6 Preferences Webinar

v6 Preferences Webinar v6 Preferences Webinar A. Kinds of Preferences System Preferences Alexandria 6.0.2 Webinar Course 1 User Preferences Machine Preferences Currently, the only preference group available as a Machine Preference

More information

Perform this procedure when you need to add a recurring payment option, or when you need to change or withdraw it.

Perform this procedure when you need to add a recurring payment option, or when you need to change or withdraw it. Purpose Use this procedure to add, change, or remove recurring payments. Trigger Perform this procedure when you need to add a recurring payment option, or when you need to change or withdraw it. Prerequisites

More information

Integrated Warning System

Integrated Warning System AtHoc Integrated Warning System Welcome to the Fort Bragg Mass Warning and Notification System This emergency mass notification system provides the Fort Bragg with an effective and reliable Mass Warning

More information

Plan of Attack 5 Step Plan

Plan of Attack 5 Step Plan Plan of Attack 5 Step Plan Naming those Digital Assets Practicing Digital Doomsday Training + Policies and Procedures Technology Tuning Security in the Supply Chain Next Steps Sample Plan 0 to 30 Days

More information

Miscellaneous IT Equipment Florida Contract # 250-WSCA-10-ACS

Miscellaneous IT Equipment Florida Contract # 250-WSCA-10-ACS Miscellaneous IT Equipment Florida Contract # 250-WSCA-10-ACS March 27, 2013 Webinar 10:30 11:30 Today s Presenters Colin Barton, Division of State Purchasing Contract Manager Andrea Jenkins, Dell On-line

More information

Inventory Management and Reporting Instructions

Inventory Management and Reporting Instructions Step 1. TxDOT Policy and Procedures Coordinator: Create and Submit Inventory Management Document b. Under ; click ; then click for Inventory Management for (Organization). c. Click I AGREE to create on

More information