OFFICE OF CHIEF COUNSEL OPERATION R.E.D. GUIDANCE

Size: px
Start display at page:

Download "OFFICE OF CHIEF COUNSEL OPERATION R.E.D. GUIDANCE"

Transcription

1 OFFICE OF CHIEF COUNSEL OPERATION R.E.D. GUIDANCE Operation R.E.D. is a two-month Chief Counsel event the goal of which is to refresh employees awareness of existing policies and procedures regarding safeguarding of sensitive information. During this event, employees are given time to: Review their electronic files and paper holdings for sensitive information that is required to be secured; Encrypt (electronic) and/or safeguard (paper) all sensitive information for which they have a continued business need to keep in their possession; Decide whether information that they no longer have a continued business need to keep should be archived or destroyed. Operation R.E.D. your possessions for PII and SBU information PII and SBU information you have a continued business need to keep in your possession to archive or properly destroy PII and SBU information you no longer need in your possession PII is Personally Identifiable Information SBU is Sensitive But Unclassified Information CCDM (1) states that, Employees are responsible for the protection and proper disposition of all information, documents and property in their possession and control. They must make every effort to protect information, documents and other property entrusted to their care and prevent unauthorized entry into areas where information, documents and property are located. Similarly, IRM (1) states that, The protection of information is of vital concern to the Service. Every effort must be made to ensure that all documents are provided protection commensurate with the information therein all Service personnel must take care to ensure they recognize information which requires protection regardless of the media on which that information is contained. What information needs to be protected? As part of its vital mission to the United States, IRS and Chief Counsel employees are entrusted with a tremendous amount of sensitive information, including Sensitive But Unclassified (SBU) information and Personally Identifiable Information (PII). Protecting this information is vital to maintaining the public trust that encourages voluntary compliance with the tax law and enables the IRS and Chief Counsel to conduct business effectively. 1

2 Sensitive But Unclassified (SBU) Information CCDM (1) defines SBU information as any information considered sensitive or critical due to the risk and magnitude of loss or harm that could result from unintentional or deliberate disclosure, alteration or destruction. SBU information includes: Tax data (i.e., returns and return information) subject to the disclosure provisions of section 6103 of the Internal Revenue Code Law enforcement information Proprietary information (e.g., contracts, solicitations) Mission-critical information Individually Identifiable Information subject to the Privacy Act (5 U.S.C. 552a) SBU also includes other statutorily protected information, such as grand jury information subject to Rule 6(e) of the Federal Rules of Criminal Procedure and tax convention information subject to section 6105 of the Internal Revenue Code. See IRM for a more comprehensive definition of SBU information. Personally Identifiable Information (PII) is sensitive information that, either alone or in combination with other information, may be used to uniquely identify, contact or locate a person. Unauthorized disclosure of PII places individuals at serious risk for identity theft and invasion of privacy. Some examples of PII are: Names Addresses addresses Telephone numbers Social Security numbers Bank account numbers Date and place of birth Mother s maiden name Biometric data (height, weight, eye color, fingerprints, etc.) See IRM , for a more comprehensive definition of PII. SBU information and PII require similar protections. Even where existing guidance referenced below refers only to PII or only to SBU, such guidance applies with equal force to the other category of information. REVIEW Chief Counsel employees maintain SBU/PII in a variety of forms in records stored on network drives (e.g., the G: drive), computer hard drives (e.g., records created and stored on the employee s desktop (the C: or D: drive) or on the employee s laptop when the employee is not connected to the network), in messages and Calendar appointments maintained in Microsoft Office Outlook, in information stored on removable media (e.g., CD-ROMs, flash drives or diskettes), and in paper records. During Operation R.E.D., employees are being asked to review both their electronic files and paper holdings to ensure that they are 2

3 only in possession of SBU/PII that they have a need to know (i.e., a continuing business need to keep in their possession). Need to know Under the Privacy Act of 1974 (5 U.S.C. 552a) and Internal Revenue Code 6103, an employee should only have access to sensitive information if that employee s official duties require access to that information. When an employee no longer has an ongoing need to retain sensitive information (e.g., upon issuance of advice, upon notice of final judicial disposition of the litigation, upon publication of the final regulations or other item of published guidance), the employee must ensure that all documentation is included in the case file. The case file should then be closed in accordance with case closing procedures set forth in CCDM , , or There may, however, be instances when an employee does have a need to retain a case file after his or her office s involvement in the matter is complete. In such instances, the assignment/file should be closed in CASE-MIS and then charged out from the location where closed files are maintained in the employee s facility (so that the office knows where the closed file is located). When the employee no longer has a need to retain the closed file, the file must be promptly returned to the closed files facility. Generally, once the file is closed, the employee should not continue to retain PII or SBU information on his/her computer s hard drive, on removable media, or in paper records otherwise readily available to them, unless immediate access is necessary to the performance of the employee s official duties. ENCRYPT/SAFEGUARDS Once employees have completely reviewed their inventories of SBU/PII, they must follow the proper procedures for safeguarding information that they have a continuing business need to maintain in their immediate possession. Safeguarding Electronic Data Employees should store all electronic records containing SBU/PII on the Chief Counsel network, the G: drive. IRM requires that all SBU/PII that is processed, stored, or transmitted by computer equipment (such as laptops and memory storage devices), outside of IRS facilities, be encrypted. 1) Laptops Laptops are automatically encrypted with the WinMagic s SecureDoc Disk Encryption to protect the contents of the hard drive when the computer is at rest (turned off or rebooted). If the computer is lost or stolen, unauthorized users will not be able to access any data on the hard drive. 3

4 When the employee s laptop is connected to the Chief Counsel network (the G: drive), all files should be saved to the network directory. When the employee s laptop is not connected to the network, the employee must save all files to the Encrypted File System (EFS) protected data folder (see item 3, below). When the employee s laptop is later reconnected to the network, the employee must move the information that had been stored in the EFS protected data folder to the G: drive, which will automatically decrypt the information. Detailed information on how employees may access their EFS protected folder may be found in item 3), below. 2) Information saved to removable media All Chief Counsel workstations, both desktops and laptops, are installed with Guardian Edge Removable Storage (GERS) software. GERS will automatically encrypt any files saved to removable media such as floppy diskettes, CDs, flash/thumb drives, and USB-attached hard drives. GERS will also decrypt GERS-encrypted files that employees receive from other Chief Counsel or IRS offices. Employees who save information to removable media for their own use may access that information without any password, as long as they are accessing the information on a Chief Counsel system. Although there is the ability to read GERS-encrypted files on non- Chief Counsel computers, employees are prohibited from doing so on their home/ personal computers. Employees may share information saved to removable media by providing the recipient with the password used to encrypt the file. Employees who need to save information to removable media without encryption, (e.g., training materials created for use at an off-site seminar) should contact their Administrative Officer or Office Manager in order to produce the unencrypted removable media. Files containing SBU/PII may only be saved to government-approved removable media. SBU/PII may never be placed on non-government owned or approved media. 3) Computer hard drives When circumstances require employees to store information on their computer s hard drive (e.g., the network is down or employees are using their laptops in a location where they cannot connect to the network), the employees must temporarily store the information in the EFS protected folder. All Chief Counsel employees have an EFS protected data folder on their computer s local D: drive. The EFS protected data folder is located as follows: D:\users\[Your Username]. For example, a Chief Counsel employee with the user name, noclxyz, will find the EFS protected data folder in the following location: D:\users\noclxlz. 4

5 When employees save records to their EFS protected data folder, it will be automatically encrypted. No login or password is needed. The employee can open an encrypted file, save the file, or delete the file, just the same as if the file were not encrypted. If the employee wants to copy an encrypted file to a non-encrypted folder, such as moving an encrypted Word file from the D:\Users\[Your Username] folder to the Documents folder, the file maintains its encrypted status. This is true as long as employees keep the file or folder on their computer s local hard drive (C: or D: drive). If an employee attempts to move or copy a file from the employee s EFS protected data folder to the network drive (G: drive), the employee will be prompted as follows: By selecting Ignore or Ignore All, the unencrypted file is moved or copied to the G: drive. 4) Microsoft Office Outlook Use of Microsoft Office Outlook raises two key issues with respect to data security: a) messages sent within Chief Counsel using Microsoft Office Outlook are protected; no further encryption is required. b) messages sent to IRS addresses must be encrypted using Secure Messaging (S/MIME) whenever the text of the message (or any attachments thereto) contains SBU/PII. Information on enrolling in and using Secure Messaging may be found by clicking on the Microsoft Office Outlook Settings Update at: NOTE: SBU/PII can never be included in the subject lines of messages because subject lines cannot be encrypted. c) messages containing SBU/PII sent externally may be transmitted solely to those entities with whom Chief Counsel enters into an information sharing agreement. For example, the IRS Office of Cybersecurity and the U.S. Department of Justice (DOJ) Tax Division have entered into an agreement that allows for Chief Counsel attorneys and DOJ Tax Division counterparts to transmit information containing SBU/PII in WinZip9-encrypted attachments to messages. The Chief Counsel attorney must 5

6 separately provide the password that will allow the DOJ attorney to open the file, either telephonically or by fax. Chief Counsel employees may not send SBU/PII data by to taxpayers, taxpayer representatives, or other non-chief Counsel/IRS party, even if the other party uses encryption software. See IRM (7), Standards for Using . Employees should contact their immediate supervisor if they have questions concerning the sending of messages containing SBU/PII. d) Information entered into the Microsoft Office Outlook Calendar cannot be encrypted; therefore, Calendar entries must not contain SBU/PII. Employees should use subject matter descriptions (e.g., summons matter) in lieu of taxpayer names when sending Calendar invitations or entering their own Calendar appointments into Microsoft Office Outlook. However, if the subject of a Calendar entry is a docketed case, the case name alone may be included. Employees should send an encrypted to meeting/conference call invitees if additional SBU/PII is needed as background to the appointment. Attached is the most recent IRS guidance on the use of the Microsoft Office Outlook Calendar. IG- PII On Outlook Calendar Final_10310 The Encryption Aids File icon located on every Chief Counsel workstation contains stepby-step guidance for the various methods of encryption available to Chief Counsel employees. Detailed information on computer security and encryption may also be found on the Chief Counsel home page in the Useful Information section by clicking on the Computer Security link: Safeguarding Paper Records 1) Records located at IRS facilities Employees should use measures appropriate to the circumstances to protect information containing SBU/PII left on desks or workstations, or in conference or other work rooms, when they are not present during the workday, in order to prevent unauthorized access. IRS and Chief Counsel security rules for protecting paper records containing SBU/PII require that when the records are not in the custody of an authorized Counsel employee that the records are to be stored in a file cabinet, desk drawer, overhead storage bin, credenza, or similar locked compartment. The records may also be stored in a room or area with physical access control measures affording adequate protection and preventing unauthorized access by the public, visitors, or other persons without a need-to-know. Examples of acceptable access control measures include, but are not limited to, a key-locked room, or a restricted-access work area controlled by a cipher lock or card reader. 6

7 2) Records located off-site There may be certain circumstances where an employee may have a legitimate need to store records containing SBU/PII in a location other than a secured IRS facility. Such circumstances include, but are not limited to, Flexiplace arrangements, situations where the employee is on business travel, and the transmittal of records via mail or other carrier service. Flexiplace Employees working under Flexiplace agreements are required to secure records containing SBU/PII in the same manner that they would be required to secure those same records at an IRS facility. Travel Employees on business-related travel or otherwise transporting SBU/PII should follow the policies for protecting SBU/PII while outside of IRS offices found in IRM and IRM requires that SBU/PII transmitted from one location to another must be afforded adequate safeguards. Employees who hand carry information containing SBU/PII in connection with business trips or during the course of their daily activities should keep that information with them, to the extent possible. If circumstances require that the employee leave SBU/PII information in a vehicle, the employee must lock the information in the vehicle s trunk. If the vehicle does not have a trunk, the employee should conceal the information from plain view and secure the information in some manner. In any case, the vehicle must be locked if SBU/PII is left unattended, even if only for a short period of time. Hotel and motel rooms are usually not good locations in which to secure SBU/PII; however, if SBU/PII must be left in a hotel or motel room, the employee should maintain the SBU/PII in a locked briefcase and conceal the briefcase, to the extent possible. Records stored off-site IRM details the requirements for protecting SBU/PII that is necessarily stored off-site. Transmission of records via mail or carrier When transmitting SBU/PII in paper or removable media format from one IRS facility to another by mail or other carrier service, employees are required to do so in a manner that ensures that the information does not become misplaced or disclosed to unauthorized personnel. Chief Counsel has adopted IRS-recommended shipping guidelines that have enhanced security of SBU/PII during shipment. These practices are as follows: Double wrap or double box all materials Place address labels on both inside and outside packages Ship via United Parcel Service (UPS) Monitor the package during shipment using the basic tracking number provided by UPS and confirm receipt 7

8 Please refer to specific requirements for shipping returns and return information, which are outlined in IRM In addition, employees must follow the recordkeeping requirements of IRM , Recordkeeping and Accounting for Disclosures. DECIDE (to Archive or Destroy) After employees have reviewed their complete inventories of SBU/PII, they must decide whether they are required to archive certain files/media in accordance with the Record Control Schedules published in IRM , or whether they are permitted to destroy the information. The Record Control Schedules found in IRM pertain specifically to Chief Counsel files and records. In addition, CCDM provide detailed information concerning Chief Counsel s file maintenance, retention and storage requirements. Adhering to these schedules is vital to ensuring the Service s compliance with statutory requirements for the maintenance of federal records. Preservation/Archiving of Records IRM , Types of Records and Their Life Cycle, provides an overview of the types or records maintained by the IRS and Chief Counsel. Records are classified as either temporary or permanent. The majority of records maintained by Chief Counsel employees are temporary records. Temporary records are subject to the specific retention and destruction time lines found in IRM Over the next two months, Operation R.E.D. will require Chief Counsel employees to undertake serious file maintenance activities. During this two-month period, employees are to ensure that all documentation, as set forth in CCDM and , is properly organized and maintained in case files, especially traffic. When the matter to which the case file relates is resolved, then the case file should be submitted promptly for closing. If, after researching the IRM and CCDM, employees require further assistance on Chief Counsel policies and procedures pertaining to records management, they should contact their immediate supervisor, or their local Area or HQ Records Manager, as appropriate. Where the Records Control Schedules require employees to preserve electronic data, they must do so in accordance with IRM , Managing Electronic Records. This section applies to all electronically stored information, including messages and Microsoft Office Word, PowerPoint, and Excel records. Paper Records and Removable Media The procedures for retiring records to the Federal Records Center and the National Archives are contained in IRM and IRM , respectively. Employees should note that there are specific shipping procedures contained in those sections that differ from the routine shipping procedures for return and return information. 8

9 Destruction of Temporary Records Electronic Stored Information (ESI) Chief Counsel employees have an obligation to preserve and retain all relevant ESI within their control, as well as paper files, whenever civil litigation is reasonably anticipated or has commenced. This obligation exists regardless of whether the legal action is brought against or on behalf of the agency. When litigation is ongoing or is reasonably anticipated, a litigation hold on relevant or potentially relevant ESI must be established and any steps taken in this regard must be fully documented. The obligations under the litigation hold to search, identify, preserve, and isolate ESI related to specific, predictable, and identifiable litigation supersedes all records management policies that would otherwise result in the alteration or destruction of ESI. As highlighted in Chief Counsel Notice CC , ESI has always been subject to discovery. The Federal Rules of Civil Procedure, as amended, however, focuses attention on the existence and availability of ESI and formalizes a uniform discovery process for dealing with ESI. ESI is defined broadly in the amended rules to account for both present technology as well as the development of future technology. Generally, ESI includes, but is not limited to, all and attachments; word processing, spreadsheet, graphic and presentation files; image and text files; and other information stored on hard drives or removable media (e.g., laptops and portable thumb drives). ESI also includes metadata, databases, instant messages, transaction logs, audio and video files, voic , webpages, computer logs, text messages, and backup and archived material. Preservation of ESI means that the information is not to be altered, destroyed, or removed from its existing location until such time that it has been isolated and preserved for purposes of the litigation. This means that Chief Counsel employees must also ensure that all retention schedules related to relevant ESI are suspended in order that the ESI not be destroyed after the initial notification is received. Employees should work closely with IT personnel to assist in this process, especially with regard to preservation of metadata and in recognition that they may be required to produce the ESI in its native format. Issues concerning ESI should be coordinated with the Office of the Associate Chief Counsel (Procedure & Administration), Branch 6 or 7. When, in accordance with the appropriate Records Control Schedule, Chief Counsel employees are no longer required to retain or archive information containing SBU/PII, they should destroy the information in accordance with the following guidelines. NOTE: As previously stated, there should be no destruction of records, including electronically stored information, involving litigation that is anticipated, pending, or ongoing. 9

10 Destruction of Electronically Stored Records When the life cycle of an electronically stored record containing SBU/PII is complete (e.g., the employee no longer has an ongoing business reason to maintain the information, the applicable Records Control Schedule authorizes destruction, and there is no litigation hold on the information), the employee must delete the information from all locations where it may be stored. That means that the employee must delete the information from the network drive (the G: drive), the computer hard drive, and any removable media on which the information is electronically stored. Destruction of Paper Records When the life cycle of a paper record is complete, the record must be destroyed in accordance with the policies found in IRM and CCDM Generally, the employee s office will have a system in place to destroy paper records via burning or shredding. Disposal during Operation R.E.D. will follow established office-specific procedures. Sanitization of Removable Media (CD-ROMs, diskettes, etc.) If employees review of their electronically stored information reveals unencrypted PII and SBU stored on removable media and employees have a continuing business need to maintain the information, the employees must move the information to the network drive (G: drive). Employees must then secure any removable media containing unencrypted electronic PII and SBU in a locked cabinet or locked desk until the sanitization procedures identified in IRM are implemented. For purposes of Operation R.E.D., Chief Counsel employees should contact their local IT personnel to determine whether removable media should be sanitized or destroyed. If the local IT personnel are not equipped to sanitize or dispose of removable media, employees must secure any unneeded removable media on which PII/SBU is stored in locked containers. See IRM (2). Descriptions of the types of containers appropriate for this purpose may be found in IRM

REVISION: This directive supersedes TSA MD 3700.4, Handling Sensitive Personally Identifiable Information, dated March 13, 2008.

REVISION: This directive supersedes TSA MD 3700.4, Handling Sensitive Personally Identifiable Information, dated March 13, 2008. OFFICE OF THE SPECIAL COUNSELOR Privacy TSA MANAGEMENT DIRECTIVE No. 3700.4 To enhance mission performance, TSA is committed to promoting a culture founded on its values of Integrity, Innovation and Team

More information

Order. Directive Number: IM 10-3. Stephen E. Barber Chief Management Officer

Order. Directive Number: IM 10-3. Stephen E. Barber Chief Management Officer Pension Benefit Guaranty Corporation Order Subject: Protecting Sensitive Information Directive Number: IM 10-3 Effective Date: 4/23/08 Originator: OGC Stephen E. Barber Chief Management Officer 1. PURPOSE:

More information

Approved By: Agency Name Management

Approved By: Agency Name Management Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the

More information

Preservation and Production of Electronic Records

Preservation and Production of Electronic Records Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces

More information

Introduction to The Privacy Act

Introduction to The Privacy Act Introduction to The Privacy Act Defense Privacy and Civil Liberties Office dpclo.defense.gov 1 Introduction The Privacy Act (5 U.S.C. 552a, as amended) can generally be characterized as an omnibus Code

More information

Montclair State University. HIPAA Security Policy

Montclair State University. HIPAA Security Policy Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

WHAT TO DO WHEN YOU RECEIVE A LITIGATION HOLD NOTICE. A Guide for University Faculty, Staff, and Others

WHAT TO DO WHEN YOU RECEIVE A LITIGATION HOLD NOTICE. A Guide for University Faculty, Staff, and Others WHAT TO DO WHEN YOU RECEIVE A LITIGATION HOLD NOTICE A Guide for University Faculty, Staff, and Others What is a Litigation Hold Notice? Notice from an authorized UW department (Attorney General s Office,

More information

Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines

Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines (This document supersedes the document previously entitled MCFD Contractor Records Guidelines) Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines November

More information

Chapter 2.82 - RECORDS MANAGEMENT Sections:

Chapter 2.82 - RECORDS MANAGEMENT Sections: Chapter 82 - RECORDS MANAGEMENT Sections: 8010 - Government records findings Recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake

More information

Electronic Records Management Guidelines

Electronic Records Management Guidelines Electronic Records Management Guidelines Contents Section 1: Authority... 1 Section 2: Purpose and Scope... 1 Section 3: Records Custodian Responsibilities... 2 Section 4: Information Systems that produce,

More information

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014 Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology

More information

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) University of California, Merced Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) Responsible Officials: Executive Vice Chancellor and Provost Vice Chancellor

More information

CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006)

CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006) CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006) WHAT IS THE PURPOSE OF RECORDS MANAGEMENT? 1. To implement a cost-effective Department-wide program that provides for adequate and proper documentation

More information

LEGAL HOLD OBLIGATIONS FOR DISTRICT EMPLOYEES

LEGAL HOLD OBLIGATIONS FOR DISTRICT EMPLOYEES LEGAL HOLD OBLIGATIONS FOR DISTRICT EMPLOYEES INSERT YOUR NAME HERE Place logo or logotype here, Otherwise delete this text box. AGENDA.. Federal Rules of Civil Procedure What is a legal hold? What are

More information

Career Connection, Inc. Data Privacy. Bringing Talent Together With Opportunity

Career Connection, Inc. Data Privacy. Bringing Talent Together With Opportunity Career Connection, Inc. Data Privacy Objectives This course is intended for CCI employees. The course gives guidance on data privacy concepts and describes how data privacy is relevant when delivering

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

BERKELEY COLLEGE DATA SECURITY POLICY

BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data

More information

Electronic Discovery and Disclosure:

Electronic Discovery and Disclosure: Electronic Discovery and Disclosure: Managing & Producing Electronic Information Washington State Office of the Attorney General 1 Overview of Presentation EDD (Electronic Discovery and Disclosure) ESI

More information

Litigation Hold Notices & Electronic Discovery A R E S O U R C E F O R W S U E M P L OY E E S

Litigation Hold Notices & Electronic Discovery A R E S O U R C E F O R W S U E M P L OY E E S Litigation Hold Notices & Electronic Discovery A R E S O U R C E F O R W S U E M P L OY E E S What is a Litigation Hold Notice? Notice from an authorized department (e.g., Attorney General s Office Torts

More information

PACIFIC EXPLORATION & PRODUCTION CORPORATION (the Corporation )

PACIFIC EXPLORATION & PRODUCTION CORPORATION (the Corporation ) PRIVACY POLICY (Initially adopted by the Board of Directors on November 16, 2007) PACIFIC EXPLORATION & PRODUCTION CORPORATION (the Corporation ) The Corporation is committed to controlling the collection,

More information

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 jmadeja@buchananassociates.com Each business is required by Massachusetts law

More information

Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY

Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

FRONTIER REGIONAL/UNION#38 SCHOOL DISTRICTS. Records Retention Policy for Electronic Correspondence

FRONTIER REGIONAL/UNION#38 SCHOOL DISTRICTS. Records Retention Policy for Electronic Correspondence EH I. Introduction FRONTIER REGIONAL/UNION#38 SCHOOL DISTRICTS Records Retention Policy for Electronic Correspondence All business conducted by government agencies are subject to the Public Records law

More information

2.82.010 Government records findings--recognition of public policy.

2.82.010 Government records findings--recognition of public policy. Chapter 2.82 RECORDS MANAGEMENT 2.82.010 Government records findings--recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake County

More information

8.03 Health Insurance Portability and Accountability Act (HIPAA)

8.03 Health Insurance Portability and Accountability Act (HIPAA) Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of

More information

Information Security Policy

Information Security Policy Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED

More information

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as required by HIPAA. 1. Definitions. a. Business Associate, as used in this Contract, means the

More information

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution. Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR

More information

SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS

SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS SHP-570A 1/14 SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS The goal of this document is to provide adequate security and integrity for criminal history record information (CHRI)

More information

Policy Scope: The policy applies across the Division to all DPH workgroups who maintain, use, have access to, or come into contact with IIHI.

Policy Scope: The policy applies across the Division to all DPH workgroups who maintain, use, have access to, or come into contact with IIHI. Title: DPH Current Effective Date: September 22, 2003 Original Effective Date: April 14, 2003 Revision History: April 22, 2004 May 1, 2011 January, 2014 Purpose The purpose of the Division of Public Health

More information

ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA

ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA PURPOSE PURPOSE This document provides guidance to offices about protecting sensitive customer and company information. The protection of Non-public Personal

More information

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008 AUBURN WATER SYSTEM Identity Theft Prevention Program Effective October 20, 2008 I. PROGRAM ADOPTION Auburn Water System developed this Identity Theft Prevention Program ("Program") pursuant to the Federal

More information

BRIDGEVALLEY COMMUNITY & TECHNICAL COLLEGE OPERATING POLICY

BRIDGEVALLEY COMMUNITY & TECHNICAL COLLEGE OPERATING POLICY BRIDGEVALLEY COMMUNITY & TECHNICAL COLLEGE OPERATING POLICY Effective Date Subject Number Page April 1, 2014 PROTECTING PERSONALLY IDENTIFIABLE INFORMATION (PII) B-OP-17-14 1 of 7 Supersedes/Supplements:

More information

HIPAA Training for Hospice Staff and Volunteers

HIPAA Training for Hospice Staff and Volunteers HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior

More information

University of Louisiana System

University of Louisiana System Policy Number: M-17 University of Louisiana System Title: RECORDS RETENTION & Effective Date: OCTOBER 10, 2012 Cancellation: None Chapter: Miscellaneous Policy and Procedures Memorandum Each institution

More information

RECORD RETENTION AND DESTRUCTION POLICY

RECORD RETENTION AND DESTRUCTION POLICY RECORD RETENTION AND DESTRUCTION POLICY 1. PURPOSE: The purpose of this Record Retention and Destruction Policy ( The Policy ) is to ensure that The Minerals, Metals & Materials Society (the Society )

More information

Justice Management Division

Justice Management Division Justice Management Division Privacy Impact Assessment for the Justice Unified Telecommunications Network (JUTNet) Voice Services System Issued by: Arthur E. Gary, General Counsel and Senior Component Official

More information

Electronic Records Management Guidelines

Electronic Records Management Guidelines Electronic Records Management Guidelines I. Objectives The employees of the Fort Bend Independent School District (the District ) routinely create, use, and manage information electronically in their daily

More information

Section 28.1 Purpose. Section 28.2 Background. DOT Order 1351.28 Records Management. CIOP Chapter 1351.28 RECORDS MANAGEMENT

Section 28.1 Purpose. Section 28.2 Background. DOT Order 1351.28 Records Management. CIOP Chapter 1351.28 RECORDS MANAGEMENT CIOP Chapter 1351.28 RECORDS MANAGEMENT TABLE OF CONTENTS Section 28.1 Purpose... 1 Section 28.2 Background... 1 Section 28.3 Scope and Applicability... 2 Section 28.4 Definitions... 4 Section 28.5 Policy...

More information

HIPAA Training for Staff and Volunteers

HIPAA Training for Staff and Volunteers HIPAA Training for Staff and Volunteers Objectives Explain the purpose of the HIPAA privacy, security and breach notification regulations Name three patient privacy rights Discuss what you can do to help

More information

STATE OF WYOMING Electronic Mail Policy

STATE OF WYOMING Electronic Mail Policy Introduction: STATE OF WYOMING Electronic Mail Policy Pursuant to Executive Order 1999-4 dated the 23rd of December, 1999 Electronic mail (e-mail) enables the user to send and receive messages, make appointments,

More information

Policies and Procedures for Electronic Protected Health Information (ephi) and Personally Identifiable Information (PII)

Policies and Procedures for Electronic Protected Health Information (ephi) and Personally Identifiable Information (PII) Policies and Procedures for Electronic Protected Health Information (ephi) and Personally Identifiable Information (PII) Effective Date: April 10, 2012 Prepared by: Joe Raschke (IT) Table of Contents Purpose

More information

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information

More information

Subject: U.S. Department of Housing and Urban Development (HUD) Privacy Protection Guidance for Third Parties

Subject: U.S. Department of Housing and Urban Development (HUD) Privacy Protection Guidance for Third Parties U.S. Department of Housing and Urban Development Office of Public and Indian Housing SPECIAL ATTENTION OF: NOTICE PIH-2014-10 Directors of HUD Regional and Field Offices of Public Housing; Issued: April

More information

CITY OF ANDERSON ELECTRONIC RECORD RETENTION POLICY

CITY OF ANDERSON ELECTRONIC RECORD RETENTION POLICY CITY OF ANDERSON ELECTRONIC RECORD RETENTION POLICY Electronic records include all documents, applications, databases, spreadsheets, email and other materials created on a computer. I. Records Management

More information

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,

More information

The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015

The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015 The Department of Health and Human Services Privacy Awareness Training Fiscal Year 2015 Course Objectives At the end of the course, you will be able to: Define privacy and explain its importance. Identify

More information

The E-Discovery Process

The E-Discovery Process POOLING PROVISIONS The E-Discovery Process A publication of Nevada Public Agency Insurance Pool The e- discovery process the search of electronic records for use as legal evidence can cost thousands of

More information

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed

More information

Privacy Impact Assessment Of the. Office of Inspector General Information Technology Infrastructure Systems

Privacy Impact Assessment Of the. Office of Inspector General Information Technology Infrastructure Systems Privacy Impact Assessment Of the Office of Inspector General Information Technology Infrastructure Systems Program or application name: Office of Inspector General Information Technology Infrastructure

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

Were there other system changes not listed above? No 3. Check the current ELC (Enterprise Life Cycle) Milestones (select all that apply)

Were there other system changes not listed above? No 3. Check the current ELC (Enterprise Life Cycle) Milestones (select all that apply) Date of Approval: October 9, 2015 PIA ID Number: 1448 A. SYSTEM DESCRIPTION 1. Enter the full name and acronym for the system, project, application and/or database. AIMS Centralized Information System,

More information

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Electronic Information Security and Data Backup Procedures Date Adopted: 4/13/2012 Date Revised: Date Reviewed: References: Health Insurance Portability

More information

National Archives and Records Administration

National Archives and Records Administration National Archives and Records Administration NARA 1608 August 6, 2009 SUBJECT: Protection of Personally Identifiable Information (PII) 1608.1 What is the purpose of this directive? This directive: a. Defines

More information

SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon

SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02788, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE

More information

2014 Core Training 1

2014 Core Training 1 2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System

More information

SUMMARY: The Defense Health Agency proposes to alter an. existing system of records, EDTMA 02, entitled "Medical/Dental

SUMMARY: The Defense Health Agency proposes to alter an. existing system of records, EDTMA 02, entitled Medical/Dental This document is scheduled to be published in the Federal Register on 10/27/2015 and available online at http://federalregister.gov/a/2015-27229, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE

More information

Department of Veterans Affairs VA Directive 6311 VA E-DISCOVERY

Department of Veterans Affairs VA Directive 6311 VA E-DISCOVERY Department of Veterans Affairs VA Directive 6311 Washington, DC 20420 Transmittal Sheet June 15, 2012 VA E-DISCOVERY 1. REASON FOR ISSUE: To establish policy concerning the care and handling of documents

More information

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act) Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act) The GLB Act training packet is part of the Information Security Awareness Training that must be completed by employees. Please visit

More information

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,

More information

How To Manage Records And Information Management In Alberta

How To Manage Records And Information Management In Alberta 8. RECORDS AND INFORMATION MANAGEMENT Overview This chapter is intended to help public bodies understand how good records and information management practices assist in the effective administration of

More information

California State University, Sacramento INFORMATION SECURITY PROGRAM

California State University, Sacramento INFORMATION SECURITY PROGRAM California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...

More information

ARTICLE 14 INFORMATION PRIVACY AND SECURITY PROVISIONS

ARTICLE 14 INFORMATION PRIVACY AND SECURITY PROVISIONS A. This Article is intended to protect the privacy and security of specified County information that Contractor may receive, access, or transmit, under this Agreement. The County information covered under

More information

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT Office of Employee Benefits Administrative Manual PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT 150 EFFECTIVE DATE: AUGUST 1, 2009 REVISION DATE: PURPOSE: Ensure that the Office of Employee Benefits

More information

5 FAM 440 ELECTRONIC RECORDS, FACSIMILE RECORDS, AND ELECTRONIC MAIL RECORDS

5 FAM 440 ELECTRONIC RECORDS, FACSIMILE RECORDS, AND ELECTRONIC MAIL RECORDS 5 FAM 440 ELECTRONIC RECORDS, FACSIMILE RECORDS, AND ELECTRONIC MAIL RECORDS (CT:IM-158; 12-29-2014) (Office of Origin: A/GIS/IPS) NOTE: In October, 2014, the Department issued an interim directive superseding

More information

Records Management Policy. EPA Classification No.: CIO 2155.3 CIO Approval Date: 02/10/2015. CIO Transmittal No.: 15-005 Review Date: 02/10/2018

Records Management Policy. EPA Classification No.: CIO 2155.3 CIO Approval Date: 02/10/2015. CIO Transmittal No.: 15-005 Review Date: 02/10/2018 INFORMATION POLICY Records Management Policy Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 Records Management Policy 1. PURPOSE To advance a focus on overall

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

28042 Federal Register / Vol. 75, No. 96 / Wednesday, May 19, 2010 / Notices

28042 Federal Register / Vol. 75, No. 96 / Wednesday, May 19, 2010 / Notices 28042 Federal Register / Vol. 75, No. 96 / Wednesday, May 19, 2010 / Notices the records are part of an on-going investigation in which case they may be retained until completion of the investigation.

More information

Practical tips for managing e mail

Practical tips for managing e mail E MAIL MANAGEMENT E mail messages both sent and received that provide evidence of a government transaction are considered public records. Agencies and locality Records Officers must ensure that e mail

More information

CMS IT - Requirements For Electronic Storage

CMS IT - Requirements For Electronic Storage Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for Disk Space Storage Management August 2004 Document Number: CMS-CIO-POL-INF02-01

More information

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with

More information

Records Management Policy

Records Management Policy Records Management Policy Business Records exist in a variety of forms, including physical and electronic form. The foundation produces, receives, stores and destroys a large number of Business Records

More information

Other terms are defined in the Providence Privacy and Security Glossary

Other terms are defined in the Providence Privacy and Security Glossary Subject: Device and Media Controls Department: Enterprise Security Executive Sponsor: EVP/COO Approved by: Rod Hochman, MD - President/CEO Policy Number: New Date: Revised 10/11/2013 Reviewed Policy Owner:

More information

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security

More information

GREATER TEXAS FEDERAL CREDIT UNION RECORDS PRESERVATION PROGRAM

GREATER TEXAS FEDERAL CREDIT UNION RECORDS PRESERVATION PROGRAM Approved: September 17, 2002 Purpose of Program: GREATER TEXAS FEDERAL CREDIT UNION RECORDS PRESERVATION PROGRAM In accordance with the National Credit Union Administration ( NCUA ) Rules and Regulations

More information

PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs

PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs The Identity Theft and Fraud Protection Act (Act No. 190) allows for the collection, use

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

Information Security Plan effective March 1, 2010

Information Security Plan effective March 1, 2010 Information Security Plan effective March 1, 2010 Section Coverage pages I. Objective 1 II. Purpose 1 III. Action Plans 1 IV. Action Steps 1-5 Internal threats 3 External threats 3-4 Addenda A. Document

More information

E-Discovery Toolkit for Educational Institutions

E-Discovery Toolkit for Educational Institutions E-Discovery Toolkit for Educational Institutions The e-discovery process the search of electronic records for use as legal evidence can cost educational institutions thousands of dollars and hours. The

More information

United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008

United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008 United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008 I. Introduction United Cerebral Palsy of Greater Chicago ( UCP ) recognizes that

More information

Encryption Security Standard

Encryption Security Standard Virginia Commonwealth University Information Security Standard Title: Encryption Security Standard Scope: Approval February 22, 2012 This document provides the encryption requirements for all data generated,

More information

Appendix H: End User Rules of Behavior

Appendix H: End User Rules of Behavior Appendix H: End User Rules of Behavior 1. Introduction The Office of Management and Budget (OMB) has established the requirement for formally documented Rules of Behavior as set forth in OMB Circular A-130.

More information

Critical Data Guide. A guide to handling critical information at Indiana University

Critical Data Guide. A guide to handling critical information at Indiana University Critical Data Guide A guide to handling critical information at Indiana University What is critical information? IU defines critical information as sensitive data requiring the highest level of protection.

More information

Department of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE

Department of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE Department of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE I. Purpose This directive establishes Department of Homeland Security (DHS) policy

More information

Taking care of what s important to you

Taking care of what s important to you A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten

More information

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues Doing Business in Oregon Under the Oregon Consumer Identity Theft Protection Act and Related Privacy Risks Privacy Data Loss www.breachblog.com Presented by: Mike Porter March 10, 2009 2 Privacy Data Loss

More information

County Identity Theft Prevention Program

County Identity Theft Prevention Program INTRODUCTION CHAPTER OSCEOLA COUNTY IDENTITY THEFT PREVENTION PROGRAM The Osceola County Board of County Commissioners is committed to protecting consumers who do business with Osceola County, and as such

More information

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user

More information

Excerpted from Federal Register: Sept. 9, 2014 (Volume 79, Number 174)

Excerpted from Federal Register: Sept. 9, 2014 (Volume 79, Number 174) PBGC-13: Debt Collection Excerpted from Federal Register: Sept. 9, 2014 (Volume 79, Number 174) General Routine Uses System Name: Debt Collection -- PBGC. Security Classification: None. System Location:

More information

01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)

01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) 01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) Authority: Board of Trustees History: Effective May 1, 2009 (approved initially April 24, 2009) Source of Authority: Related Links: Responsible Office:

More information

UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY

UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY DOC. T99-061 Passed by the BoT 8/4/99 UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY The President of the University shall adopt guidelines to require that each campus

More information

The University of North Carolina at Charlotte Identity Theft Prevention Program

The University of North Carolina at Charlotte Identity Theft Prevention Program The University of North Carolina at Charlotte Identity Theft Prevention Program Program Adoption As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule ( Rule ),

More information