Information Technology (IT) Security Guidelines for External Companies

Size: px
Start display at page:

Download "Information Technology (IT) Security Guidelines for External Companies"

Transcription

1 Information Technology (IT) Security Guidelines for External Companies Document History: Version Name Org.-Unit Date Comments 1.1 Froehlich, Hafner Audi I/GO VW K-DOK

2 Table of Contents: 1. Goal Scope Organizational security Asset classification and control Personnel security Physical and environmental security Communications and operations management Protection against malicious software Information back-up Media handling and security Exchanges of information and software Security of media in transit Security of electronic mail/internet security Other forms of information exchange Access control Access control policy User responsibilities Network access control Operating system access control Compliance Responsibilities...8 Appendix:...9 Page 2 of 10

3 1. Goal These IT Security Guidelines summarize the IT Security Regulations for External Companies applicable for the usage of information and communication devices (personal computers, workstations etc. as well as mobile computers e. g. notebooks, PDAs or mobile phones). These guidelines are for business management of the external companies, their employees as well as their vicarious agents (below called contractor). These serve to protect confidentiality, integrity and availability of information as well as to uphold the rights and interests of the ordering party and all natural and legal entities, who maintain business relationships with or work for the group company. 2. Scope These guidelines extend to the AUDI AG and are to be applied throughout the whole Audi Group, if necessary with concrete IT regulations. 3. Organizational security All persons under the scope of the company must comply with the respective valid IT security regulations without exception. Group company specific regulations (see Appendix, point 1) are applicable with regard to the use of company provided hardware and software. Group company specific regulations (see Appendix, point 2) are applicable with regard to the connection of communication devices to the internal network. The opening of a communication device and alteration of the hardware (e. g. installation or de-installation of hard disks, diskette drives, memory modules) as well as the manual alteration of the security settings (e. g. browser settings), is only permitted for the responsible units (see Appendix, point 3). Only authorized programs may be used or changed, unless authorized by responsible units (see Appendix, point 3). The procurement and installation of the provided hardware and software may only be conducted in cooperation with the responsible units (see Appendix, point 4). Group company specific regulations (see Appendix, point 5) are applicable for storage, other processing and use of personal data, as well as data underlying secrecy restrictions. The use of communication devices and data from the ordering party by contractors requires the expressed permission by the ordering party. The ordering party may stop the usage at any time. The circle of authorized contractors must be defined by the ordering party or his/her representative and is to be kept as small as possible. Contractors are to oblige for non-disclosure as defined by the valid non-disclosure agreement by the business management of the external companies. The ordering party may look at the agreements at any time. The distribution of data from the ordering party entrusted to third parties is expressly forbidden, unless agreed to in writing by the ordering party. Entrusted data may only be saved and stored temporarily and are to be destroyed/deleted or returned immediately after completion of the assignment. Page 3 of 10

4 4. Asset classification and control Information must be protected according to its sensitivity. For this, classification is necessary. Following levels of confidentiality are defined for this (see Appendix, point 6): Public (e. g. press releases) Internal (e. g. telephone lists) Confidential (e. g. production planning) Secret (e. g. cycle plans, prototypes) The classification is to be conducted by the creator, as instructed by the company. For this, a strict measure is to be used. Printed or electronic information is to be labeled according to the classification above (see Appendix, point 6). The creator is responsible for labeling information. Labeled Information is only allowed to be passed on with the same labeling. If information is unlabeled, then it has to be treated as Internal. Access to information may only be granted to the respective authorized circle of people (see Appendix, point 6). Confidential and secret information requires a higher protection than internal information. As far as technically possible confidential information is to be securely encrypted for electronic distribution (using the ordering parties authorized cryptographic technology). In principal, secret information must be securely encrypted for electronic distribution and storage. Confidential or secret information that are no longer required must be securely deleted or physically destroyed. 5. Personnel security The infringement or the suspected infringement against the IT Security Regulations is to be reported immediately to the ordering party. This is also valid for IT security weaknesses of systems or individual functions and to IT security relevant malfunctions. 6. Physical and environmental security The provided hardware is to be treated appropriately and to be protected against loss or unauthorized manipulation. The manufacturers instructions for device protection are to be followed. Communication devices, which store or process confidential or secret data, are principally to be installed so that unauthorized individuals will not be able to have access to the information stored on the devices. Internal communication devices are to be carried with off company sites only by permission of the ordering party. 7. Communications and operations management 7.1. Protection against malicious software Communication devices, systems and data media are to be checked by the specific user via a current virus scanner, frequently and upon suspicion of infection by malicious software (e. g. computer virus, Trojan horse). Page 4 of 10

5 Before files are distributed electronically (e. g. in the intranet/internet, on network drives) they are to be checked by the provider for malicious software, to prevent the distribution of malicious software. Communication devices suspected of infection are not to be used further. The responsible system support staff responsible must be informed immediately. The removal of malicious software on communication devices of the ordering party must only to be undertaken under the system support or respectively trained employees or Key users Information back-up Data should be principally saved on the allocated network drives and not on the local hard disk, as a central and automatic data back-up is only assured for the network. The user himself/herself is responsible for back-up of data stored on local data media (e. g. hard disks or diskettes) Media handling and security Data media (e. g. CDs, diskettes, tapes, hard disks) are to be protected during operation, processing, transportation and storage against loss, damage and accidental usage as well as against unauthorized access. When not being used, written data media which contains confidential of secret data must be kept locked (e. g. cabinet or drawer which can be locked). These media are to be labeled and catalogued. Data media that are no longer needed are to be disposed of securely after all information has been assured to be removed. Hard disks and other fixed installed data media are to be disposed of by the responsible units (see Appendix, point 3). The distribution of data must remain restricted to the minimum required to fulfill the contractual tasks. Distribution lists and lists of authorized recipients are to be reviewed at regular intervals Exchanges of information and software Security of media in transit It is to be ensured that all necessary and appropriate measures are taken (e. g. encryption) to protect information from being seen, modified and deleted by unauthorized persons also during transport (including family members and friends). The group company specific regulations of Appendix, point 7 applies during transport of IT equipment and data media off company sites Security of electronic mail/internet security The use of the internet is seen as especially insecure area with regard to the confidentiality of data and virus protection, this therefore also applies to communications. The risks of use are largely that it is possible easily to intercept, modify, copy or send data anonymously or with false identity. s and their attachments must be checked for malicious software by current virus scanner before being handled for the first time. The transmission of confidential or secret data via the internet is only permitted in a securely encrypted form. For this the currently utilized encryption software of the company is to be used. The assessment of whether such data is present is to be conducted by the user in line with binding instructions of his/her ordering party. The evaluation should be a strict one. The creation, distribution and the sending of chain letters is forbidden. Page 5 of 10

6 Other forms of information exchange During all conversations of confidential or secret information, including telephone conversations, one must ensure that they are not overheard unauthorized by overleaf persons. External facsimile numbers and addresses are to be taken from the current communication directories or to be requested from the recipient, so as to avoid wrong transmission of data. Secret data may only by principle be transmitted via facsimile in a securely encrypted form. Before transmission of confidential or secret data via facsimile the transmission has to be announced by a telephone call to the communication partner. After the facsimile transmission the receipt of the fax has to be confirmed by a telephone call. A modem for analog or digital (e. g. ISDN, WAP, GPRS) services (below called modem) may only used/operated after coordination with the responsible units (see Appendix, point 8). Unconditional requirement before installing a modem is to adhere to the following security measures: The communication device must not be operated unattended. To start a program to initialize the modem must not be automated but only used when required. During direct data exchange with another communication device only the specifically intended data in the specific folder may be provided for the communication partner. The communication device must be turned off when not needed. The use/operation of a modem at IT systems which are connected with the internal network is forbidden. The use of private modems or those not purchased via the responsible units (see Appendix, point 7) is forbidden. 8. Access control 8.1. Access control policy All users and external contractors are only permitted beside public data to get access to the data which they need to fulfill their defined scope of work. Further data is to be approved in writing by the information owner. The principle of need to know only applies in general. User group IDs are forbidden by principle, unless the user ID starts only applications with their own user administration or which allow only read-only access User responsibilities The use of another individual s user identity is principally forbidden. The distribution of identifications medias (e. g. smartcards, secureid-cards) is forbidden. The following minimum requirements for the password definition are to be followed: A minimum of 6-digit combination of letters and numbers/special characters is to be used. Especially no trivial combinations (e. g. AAAAAA ) or aspects of the personal details, (e. g. names, car registration numbers, birthday, words out of local or English language dictionaries) must be used. Secure passwords can be e. g. an easily remembered term, which has been altered at least at one place by a number/special character. The following minimum requirements for the PIN (PINs are passwords for identifications medias (e. g. secureid-cards)) definition are to be followed: A minimum of 4-digit combination of numbers for secureid-cards as well as a minimum of 5-digit combination of numbers for other medias (e. g. smartcards) is to be used. Especially no trivial combinations (e. g ) or aspects of the personal details (e. g. birthday) must be used. Page 6 of 10

7 The following minimum requirements in the use of passwords or PINs (below called passwords) are to be followed: The distribution of a password is principally not permitted. Saving under programmed function keys is not permitted. A storing of passwords in user files is only permitted in securely encrypted form. The password must be changed principally after the initial use and then at least every 100 days. Passwords for applications in private area are not to be used for company applications (e. g. private internet access must not equal to the company internet access). The password is to be changed immediately, if suspected that other know it. The spying of passwords is not permitted. During the entry on the keyboard and the display on the monitor and printer the spying is to be prohibited. If passwords must be written down, they are then to be placed in a sealed envelope signed by the contractor and deposited in a suitable place (protected from unauthorized access (e. g. safe)) and they are to be updated after each change of the password. The individuals entitled to open the envelope are to be noted in writing on the envelope. Should it be necessary in particular exceptional cases to use the sealed password (e. g. in case of sickness), then this is to be conducted by two individuals ( 4-eye-principle ). Every opening is to be documented and the user concerned is to be informed. After each opening the password is to be changed and to be written down again immediately by the contractor Network access control An internal communication device which is connected to the internal network must not allow a concurrent data exchange to another network Operating system access control When leaving the system during operation (e. g. break, meeting) the user must activate a system lock (e. g. password protected screen saver). Contractors which use their multi functional card for the login to systems have to remove the card when leaving the system. When the work has been completed at the communication device (exception: workstations and network printers), then a correct system shut down should principally be carried out and the system including monitor and all directly attached communication devices (e. g. printer) should be turned off. Processes requiring a long time, which are not to be interrupted, are principally to be protected by a password protected screen saver or a similar working mechanism. 9. Compliance The use of non-licensed software (pirate copies) is forbidden in line with valid legal requirements. License software is subject to legal requirements to protect copyrights (e. g. defines copying of software, apart from back-up creation and archiving, as an infringement of the copyright). Copyright infringement can lead to legal action, which may involve criminal proceedings as well as claims for damages (see Appendix, point 9). License software may only be used for the agreed use and only following the existing regulations and the license agreement with the vendor. The respective national legal regulations for data protection (see Appendix, point 10) are to be complied with. Contractors must be bound to legal regulations for data protection by management of the external company (see Appendix point 10) in principle. The particular responsible units are to be notified immediately by the particular user of user identifications or access rights, which are no longer required, so that these may be deleted. Page 7 of 10

8 Identification medias (e. g. smartcards, secureid-cards) that are no longer required are to be returned immediately to the responsible units. 10. Responsibilities These guidelines are to be followed and complied with by all contractors. Breaches of these guidelines will be individually assessed and may lead to prosecution under prevailing company and legal regulations and agreements. Page 8 of 10

9 Appendix: History: Version Name Org.-Unit Date Comments 1.1 Fröhlich I/GO Every contractor is responsible that information, programs and communication devices are only used in a correct manner and in accordance to assigned tasks and in the company s interests. The use of company owned software and data on private communication devices is not permitted. 2. The connection of communication devices to the internal network is principally only permitted, when these have been provided by AUDI AG, Volkswagen AG or a company, in which AUDI AG, Volkswagen AG or a group company has a majority holding. 3. Responsibility: System Planning and/or User Service, IT-Shop. 4. Responsibility: System Planning and/or User Service, IT-Shop. 5. Storage, other processing, transfer and use of personal data as well as the transport on data medias is not permitted. Exemptions require the permission of the responsible personnel direction. In principle, communication devices and data media, on which personal, confidential or secret data are stored, may only leave the AUDI AG site in an encrypted form. 6. The following conditions apply for the individual confidentiality levels: Public Definition: Example: Labeling: Distribution: Copying: Storage: Destruction: Internal Definition: Example: Labeling: Distribution: Copying: Storage: Destruction: Confidential Definition: Examples: Labeling: Distribution: Information subject to no restrictions and e. g. published in newspapers by the company. Press releases. Public. Labeling may only be carried out by authorized areas e. g. public relations. No restrictions. No restrictions. No restrictions. No restrictions. Information that may only be published inside the company and not intended for the general public. Telephone lists, intranet information. None (or Internal ). Only to authorized persons. Only inside the scope of duty or area of application. Protect against unauthorized inspection. Orderly disposal (e. g. by reliable deletion of the electronic media). Information, the knowledge of which by authorized individuals could threaten the achievement of product and project objectives and therefore may only be made accessible to a limited authorized circle. Production planning, budget plans, quality data, audit reports. Confidential. Labeling on the first page of the document or on the mobile media. Only to authorized persons in encrypted form 1), for voice media unauthorized listening and interception to be prevented. Page 9 of 10

10 Copying: Storage: Destruction: Secret Definition: Examples: Labeling: Distribution: Copying: Storage: Destruction: Only inside the scope of duty or area of application, in addition it requires the approval of the ordering party. Encrypted 1) Storage and protection from unauthorized access. No longer required data media and information must be reliably deleted by overwriting or physically destroyed. Information, knowledge of which by unauthorized individuals could threaten the achievement of company objectives sustainably and must therefore be subject to an extremely restrictive distribution list and strict controls. Strategic plans, new developments, cycle plans, documents for the Board, start-up curves, prototypes. Secret. Labeling on every page of the document or on the mobile media. Additionally on every page the note page x of y has to be marked. Only to authorized persons in encrypted and signed form. Use of voice media to be avoided if possible and/or prevent unauthorized listening or interception by electronic attachments. Not permitted in principle. If necessary, only with the permission of the data owner (publisher). Encrypted filing and protected against unauthorized access. No longer required data media and information must be reliably deleted by being written over or physically destroyed. 1) As far as is technically possible using an encryption technology approved by the ordering party. 7. The transport of communication devices and data media off company sites is only permitted with the corresponding EDV-Gerätebegleitbuch (No ) or Transport-/Versandschein (No ). Exemptions require the approval of Information and Data Protection and the site security services. 8. Responsibility: System Planning and/or User Service, IT-Shop after approval by IT Security Organization. 9. Copyright of the Federal Republic of Germany (only binding on companies in Germany): 97. UrhG claim to omission and damages. Who violates the copyright or another after this law protected law illegally, can be taken up by the violated on removal of the impairment, with repetition danger on omission and if to the violator s intention or negligence is a burden also on damages. At place of the damages the violated can require the delivery of the profit which the violator has achieved by the violation of the law and bill lapping about this profit UrhG unauthorized utilization of works protected by copyright. Who reproduces a work or a treatment or transformation of a work in others than the legally admitted cases without consent of the legitimate, spreads or returns publicly, it is punished with term imprisonment up to three years or with fine. The attempt is liable to penalty. 10. Data protection in the Federal Republic of Germany (only binding on companies in Germany): In the Federal Republic of Germany the respective legal regulations of data protection are to be adhered. Page 10 of 10

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

BERKELEY COLLEGE DATA SECURITY POLICY

BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data

More information

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information

More information

DEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE

DEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE 2 of 10 2.5 Failure to comply with this policy, in whole or in part, if grounds for disciplinary actions, up to and including discharge. ADMINISTRATIVE CONTROL 3.1 The CIO Bureau s Information Technology

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE TITLE: COMPUTER USE POLICY PAGE 1 OF 5 EFFECTIVE DATE: 07/2001 REVIEW DATES: 02/2003, 09/2006 REVISION DATES: 03/2005, 03/2008 DISTRIBUTION: All Departments PURPOSE APPROVED BY: Signatures on File Chief

More information

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology

More information

Information Security Policy

Information Security Policy Information Security Policy Version August 23, 2010 1 of 8 Table of Contents Introduction Ethics and Acceptable Use Policies Usage Policy Disciplinary Action Protect Stored Data Restrict Access to Data

More information

NC DPH: Computer Security Basic Awareness Training

NC DPH: Computer Security Basic Awareness Training NC DPH: Computer Security Basic Awareness Training Introduction and Training Objective Our roles in the Division of Public Health (DPH) require us to utilize our computer resources in a manner that protects

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

Policy Rules for Business Partners of Siemens

Policy Rules for Business Partners of Siemens Information Security Policy Rules for Business Partners of Siemens Basic rules regulating access to Siemens-internal information and systems Policy Rules for business Partners of Siemens Edition P-RBP-2007-02-05-E

More information

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3 Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between

Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"

More information

How To Protect The Time System From Being Hacked

How To Protect The Time System From Being Hacked WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer

More information

EASTERN OKLAHOMA STATE COLLEGE ACCEPTING AND HANDLING CREDIT AND DEBIT CARD PAYMENTS POLICIES AND PROCEDURES

EASTERN OKLAHOMA STATE COLLEGE ACCEPTING AND HANDLING CREDIT AND DEBIT CARD PAYMENTS POLICIES AND PROCEDURES EASTERN OKLAHOMA STATE COLLEGE ACCEPTING AND HANDLING CREDIT AND DEBIT CARD PAYMENTS POLICIES AND PROCEDURES This document describes Eastern Oklahoma State College s policy and procedures for the proper

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007

Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users

Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency

More information

Valdosta State University. Information Resources Acceptable Use Policy

Valdosta State University. Information Resources Acceptable Use Policy Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder

More information

TECHNOLOGY ACCEPTABLE USE POLICY

TECHNOLOGY ACCEPTABLE USE POLICY Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and

More information

Introduction. General Use

Introduction. General Use Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy 1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines

More information

How To Protect A Hampden County Hmis From Being Hacked

How To Protect A Hampden County Hmis From Being Hacked Hampden County HMIS Springfield Office of Housing SECURITY PLAN Security Officers The Springfield Office of Housing has designated an HMIS Security Officer whose duties include: Review of the Security

More information

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services Bureau

More information

Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY

Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Terms and Conditions of Use - Connectivity to MAGNET

Terms and Conditions of Use - Connectivity to MAGNET I, as the Client, declare to have read and accepted the terms and conditions set out below for the use of the network connectivity to the Malta Government Network (MAGNET) provided by the Malta Information

More information

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer: Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011

More information

How To Monitor The Internet In Idaho

How To Monitor The Internet In Idaho Idaho Technology Authority (ITA) ENTERPRISE POLICY P1000 GENERAL POLICIES Category: P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING CONTENTS: I. Authority II. Abstract III. Definitions IV. Policy

More information

FDOH Information and Privacy Awareness Training Learner Course Guide

FDOH Information and Privacy Awareness Training Learner Course Guide Florida Department of Health FDOH Information and Privacy Awareness Training Learner Course Guide To protect, promote & improve the health of all people in Florida through integrated state, county, & community

More information

About this Tool Information Security for Residents...

About this Tool Information Security for Residents... About this Tool Information Security for Residents... Purpose: Provide materials to inform and educate Residents in order to reach compliance regarding information security. Audience: New Residents Information

More information

Approved By: Agency Name Management

Approved By: Agency Name Management Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

Annual Continuing Education (ACE) (Print version) Information Privacy and I.T. Security and Compliance

Annual Continuing Education (ACE) (Print version) Information Privacy and I.T. Security and Compliance Annual Continuing Education (ACE) (Print version) Information Privacy and I.T. Security and Compliance Information Privacy and IT Security & Compliance The information in this module in addition to the

More information

HIPAA Privacy & Security Health Insurance Portability and Accountability Act

HIPAA Privacy & Security Health Insurance Portability and Accountability Act HIPAA Privacy & Security Health Insurance Portability and Accountability Act ASSOCIATE EDUCATION St. Elizabeth Medical Center Origin and Purpose of HIPAA In 2003, Congress enacted new rules that would

More information

Appendix H: End User Rules of Behavior

Appendix H: End User Rules of Behavior Appendix H: End User Rules of Behavior 1. Introduction The Office of Management and Budget (OMB) has established the requirement for formally documented Rules of Behavior as set forth in OMB Circular A-130.

More information

Cordova Telephone Cooperative/Cordova Wireless Communications. Internet Service Agreement

Cordova Telephone Cooperative/Cordova Wireless Communications. Internet Service Agreement Cordova Telephone Cooperative/Cordova Wireless Communications This agreement governs the terms and conditions under which Cordova Telephone Cooperative, Inc., operating under the service mark ctcak.net;

More information

PCI Data Security and Classification Standards Summary

PCI Data Security and Classification Standards Summary PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

Data Protection Policy.

Data Protection Policy. Data Protection Policy. Data Protection Policy Foreword 2 Foreword Ladies and Gentlemen, In the information age, we offer customers the means to be always connected, even in their cars. This requires data

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

YOUR AGENCY EMS Computer, Software, Network, and Internet Policy with Appropriateness of Use Guidelines

YOUR AGENCY EMS Computer, Software, Network, and Internet Policy with Appropriateness of Use Guidelines YOUR AGENCY EMS Computer, Software, Network, and Internet Policy with Appropriateness of Use Guidelines Date of Revision: January 2000 Date of Issue: February 2000 Approval Authority: Issued under the

More information

DIOCESE OF DALLAS. Computer Internet Policy

DIOCESE OF DALLAS. Computer Internet Policy DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

PINE BLUFF POLICE DEPARTMENT POLICY/PROCEDURES MANUAL

PINE BLUFF POLICE DEPARTMENT POLICY/PROCEDURES MANUAL PINE BLUFF POLICE DEPARTMENT POLICY/PROCEDURES MANUAL SUBJECT: Computer Security CHAPTER: ADMINISTRATION & PERSONNEL ISSUED By: Chief of Police John Howell POLICY NUMBER 118 ISSUE DATE 02/19/2008 EFFECTIVE

More information

Internet Acceptable Use and Software Installation Policy

Internet Acceptable Use and Software Installation Policy Internet Acceptable Use and Software Installation Policy Internet access is available to all team members of the Regional Office Education for Bond, Fayette, and Effingham Counties #3 (ROE) and its divisions.

More information

2) applied methods and means of authorisation and procedures connected with their management and use;

2) applied methods and means of authorisation and procedures connected with their management and use; Guidelines on the way of developing the instruction specifying the method of managing the computer system used for personal data processing, with particular consideration of the information security requirements.

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Caldwell Community College and Technical Institute

Caldwell Community College and Technical Institute Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative

More information

Computer Security Policy (Interim)

Computer Security Policy (Interim) Computer Security Policy (Interim) Updated May, 2001 Department of Information Systems & Telecommunications Table of Contents 1. SCOPE...1 2. OVERVIEW...1 3. RESPONSIBILITIES...3 4. PHYSICAL SECURITY...4

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014 Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology

More information

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator POLICIES AND PROCEDURES NEW JERSEY EARLY INTERVENTION SYSTEM No: NJEIS-17 Subject: Computers & Electronic Records Effective Date: May 1, 2011 Responsible Party: Part C Coordinator I. Purpose To protect

More information

TERMS AND CONDITIONS OF USE

TERMS AND CONDITIONS OF USE Company info Fondazione Prada Largo Isarco 2, 20139 Milan, Italy VAT no. and taxpayer s code no. 08963760965 telephone +39.02.56662611 fax +39.02.56662601 email: amministrazione@fondazioneprada.org TERMS

More information

Explanatory Notes Data Protection

Explanatory Notes Data Protection Explanatory Notes Data Protection Information booklet for staff members GDD Gesellschaft für Datenschutz und Datensicherheit e. V. Bibliographic Information of the German Library The German Library records

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION

CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION 1.0 Purpose and Scope of Policy It is the policy of the City of Waukesha (City) to respect all computer

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers.

a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers. CAYUGA COUNTY POLICY MANUAL Section 11 Subject: Electronic messaging and internet 1 Effective Date: 5/25/10; Res. 255-10 Supersedes Policy of: November 28, 2000 Name of Policy: County Computer Hardware-Software

More information

Information Security Policy. Chapter 12. Asset Management

Information Security Policy. Chapter 12. Asset Management Information Security Policy Chapter 12 Asset Management Author: Policy & Strategy Team Version: 0.5 Date: April 2008 Version 0.5 Page 1 of 7 Document Control Information Document ID Document title Sefton

More information

Privacy & Security Standards to Protect Patient Information

Privacy & Security Standards to Protect Patient Information Privacy & Security Standards to Protect Patient Information Health Insurance Portability & Accountability Act (HIPAA) 12/16/10 Topics An An Introduction to to HIPAA HIPAA Patient Rights Rights Routine

More information

5. Users of ITS are the persons described above under Policy Application of the diocese of Springfield in Illinois.

5. Users of ITS are the persons described above under Policy Application of the diocese of Springfield in Illinois. Diocese of Springfield in Illinois Section I General Statement 1. Information Technology Systems (ITS), when properly used, provide timely communication and technological support to help fulfill the mission

More information

Information Security Policy. Policy and Procedures

Information Security Policy. Policy and Procedures Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable

More information

Network Security Policy

Network Security Policy KILMARNOCK COLLEGE Network Security Policy Policy Number: KC/QM/048 Date of First Issue: October 2009 Revision Number: 3 Date of Last Review: October 2011 Date of Approval \ Issue May 2012 Responsibility

More information

Healthcare Compliance Solutions

Healthcare Compliance Solutions Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and

More information

Sample Policies for Internet Use, Email and Computer Screensavers

Sample Policies for Internet Use, Email and Computer Screensavers Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies

More information

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific

More information

Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up.

Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up. TERMS OF SERVICE: Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up. The following Terms and Conditions are applicable to all individual users / corporate clients who use, sign-up and pay-for

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

Riverside Community College District Policy No. 3720 General Institution

Riverside Community College District Policy No. 3720 General Institution Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall

More information

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Odessa College Use of Computer Resources Policy Policy Date: November 2010 Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational

More information

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues Doing Business in Oregon Under the Oregon Consumer Identity Theft Protection Act and Related Privacy Risks Privacy Data Loss www.breachblog.com Presented by: Mike Porter March 10, 2009 2 Privacy Data Loss

More information

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

section 15 Computers, Email, Internet, and Communications

section 15 Computers, Email, Internet, and Communications section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property

More information

St. Johns River State College

St. Johns River State College St. Johns River State College 3.11 Technology 3.11.1 Account Management Computer accounts are the means used to grant access to SJR STATE Information Resources. These accounts provide a means of providing

More information

How To Protect Data At Northeast Alabama Community College

How To Protect Data At Northeast Alabama Community College Information Systems Security Policy Northeast Alabama Community College Center for Information Assurance Northeast Alabama Community College 138 AL Hwy 35, Rainsville, AL 35986 (256) 228-6001 1 5/22/2014

More information

Software as a Service (SaaS) Contract. I. Subject matter of the Contract. II. Software provision

Software as a Service (SaaS) Contract. I. Subject matter of the Contract. II. Software provision Software as a Service (SaaS) Contract By completing the registration form (ordering bexio), you shall become subject to the following General Terms and Conditions ("General Terms and Conditions"). I. Subject

More information