CII/SSI Policy Guide
|
|
|
- Philomena Lucas
- 9 years ago
- Views:
Transcription
1 CII/SSI Policy Guide For Employees, Vendors, Contractors or other Persons Accessing VDOT s CII/SSI An Accompanying Guide to CII/SSI Policy Version 6.0, March 2006 (Interim Revision November, 2009) Interim Revision November, 2009 CII/SSI Guide, Version 6.0, March 9, 2006 Page 1
2 Table of Contents I. PURPOSE...3 II. GUIDELINES FOR DESIGNATING AND MARKING VDOT INFORMATION AS CII/SSI...3 Designating CII/SSI... 3 Marking CII/SSI... 3 Marking Maritime Related SSI... 4 III. GUIDELINES FOR HANDLING, STORING AND REPRODUCING CII/SSI...4 IV. GUIDELINES FOR RELEASING DOCUMENTS DESIGNATED AS CII/SSI...4 V. SAMPLE DOCUMENTS...5 Frequently Asked Questions... 6 Quick Reference to Identifying CII/SSI... 8 CII/SSI Designation Decision Flowchart... 9 Multi-Purpose Non-Disclosure Agreement TE: The Multi-Purpose Non-Disclosure Agreement form included in this document is a sample form and should not be used as the actual form. The actual Multi-Purpose Non-Disclosure Agreement form may be downloaded from the Inside VDOT Forms page. CII/SSI Guide, Version 6.0, March 9, 2006 Page 2
3 I. Purpose CII/SSI Guide This Guide will provide general guidance the user/originator can use to designate CII/SSI in your sections and develop specific procedures for handling, marking, disseminating, releasing and destroying CII/SSI. You will also find samples of the forms that should be used in the aforementioned processes. Critical infrastructure is a system or asset so vital that its incapacity or destruction would have a debilitating impact on security, economic security, public health or safety. Critical infrastructure information (CII) is the designation used by VDOT to identify information that is not appropriate for public release without a need-to-know. Sensitive security information (SSI) is the designation used to identify information related to maritime critical infrastructure that is not appropriate for public release without a need-to-know. A page containing Frequently Asked Questions has been included in this Guide for your reference. If you have questions that are not answered in this guide, you may submit your questions to your contract manager. VDOT employees may submit questions via , to [email protected]. II. Guidelines for Designating and Marking VDOT Information as CII/SSI Designating CII/SSI Each Manager should perform a review of the documents in his/her custody to determine if the document contains CII/SSI and ensure proper markings are affixed. Additionally each vendor/contractor should review documents created in connection with the VDOT contract to ensure CII/SSI is properly marked and handled. This Guide contains a CII/SSI Designation Decision Process flowchart and Quick Reference document to provide you with the necessary tools in determining proper CII/SSI designation. Marking CII/SSI Once a document has been designated as CII/SSI, it should be marked according to the following: It is the responsibility of the document originator; VDOT employee or contractor/vendor to make sure that CII/SSI contained within the document is identified and marked, whether it has been previously marked or not. However, if you are the person handling a document which you feel contains CII/SSI and the document has not been properly marked; please refer the document back to the originator for designation and proper marking. The marking shown below (frame and format optional) should be placed appropriately on all pages or sections containing CII material. It should be located either at the top or bottom of the page consistently throughout the document. The format and arrangement of the words may be modified to accommodate different situations but the wording should remain consistent. Appropriate font color needs to be utilized to ensure the markings are readily visible. Restricted Critical Infrastructure Information CII/SSI Guide, Version 6.0, March 9, 2006 Page 3
4 CII/SSI Guide Marking Maritime Related SSI Documents designated as SSI should be marked at the top of every page in the document and at the following locations in the document: The outside of any front cover, The outside of any back cover, Any binder cover or folder (front and back) Any title page The marking at the top of the page should be: Sensitive Security Information The marking at the bottom of each page of the document should be: WARNING: This record contains Sensitive Security Information that is controlled under 49 CFR parts 15 and No part of this record may be disclosed to persons without a need-to-know, as defined in 49 CFR parts 15 and 1520, except with the written permission of the Administrator of the Transportation Security Administration or the Secretary of Transportation. Unauthorized release may result in civil penalty or other action. For U.S. government agencies, public disclosure is governed by 5 U.S.C. 552 and 49 CFR parts 15 and III. Guidelines for Handling, Storing and Reproducing CII/SSI CII/SSI shall be protected at all times, either by appropriate storage or having it under the personal observation and control of a person authorized to receive it. Each person who works with protected CII/SSI is personally responsible for taking proper precautions to ensure that unauthorized persons do not gain access to it. During working hours, reasonable steps shall be taken to minimize the risks of access to CII/SSI by unauthorized personnel. After working hours, CII/SSI shall be stored in a secure container, such as a locked desk, file cabinet or facility where contract security is provided. CII/SSI shall be transmitted only by VDOT courier, US first class, express, certified or registered mail, or through secure electronic means. CII/SSI in electronic format should be released in a protected format such as a locked PDF or password protected WORD document. Material containing CII/SSI shall be disposed of by any method that prevents unauthorized retrieval and in accordance with established records retention policy. Documents or materials containing CII/SSI may be reproduced to the minimum extent necessary to carry out official duties provided that the reproduced material is marked and protected in the same manner as the original material. IV. Guidelines for releasing documents designated as CII/SSI Before CII/SSI can be released the following criteria need to be met; The requestor has a need-to-know the information, CII/SSI Guide, Version 6.0, March 9, 2006 Page 4
5 CII/SSI Guide The requestor has been cleared for access to CII/SSI material through VDOT s Criminal History Records Check process as required in DPM: 1-25, And the requestor completes and signs a Non Disclosure Agreement Form (NDA). If the requestor does not have a need-to-know, refuses to sign the NDA form or does not meet the requirements outlined in DPM 1-25 do not release the information to them. If the requestor takes issue with this decision contact the contract manager if the request is contract related. For contract managers or if the request is not contract related please submit questions to [email protected]. When non-disclosure agreements are completed for VDOT employees the signed non-disclosure agreements should be returned to the Human Resource Department to be filed in the employee s personnel folder. Contractor or Vendor NDA forms are to be maintained by the VDOT Contract Officer and should be filed with the procurement documents. When NDA forms are completed to release CII/SSI to a non employee, contractor or vendor the NDA form shall be maintained by the releasing custodian of the CII/SSI. A sample Non-disclosure agreement has been included for your reference. V. Sample Documents This Guide contains the following Sample Forms: Frequently Asked Questions Quick Reference to Identifying CII/SSI Non-Disclosure Agreement CII/SSI Designation Decision Process flowchart CII/SSI Guide, Version 6.0, March 9, 2006 Page 5
6 CII/SSI Guide Frequently Asked Questions 1. What is CII? Critical infrastructure information (CII) is the designation used by VDOT to identify information that is not appropriate for public release without a need-to-know. 2. What is SSI? Sensitive security information (SSI) is the designation used to identify information related to maritime critical infrastructure that is not appropriate for public release without a need-to-know. 3. What is need-to-know? The legitimate requirement of a person or organization to know, access, or possess sensitive or classified information that is critical to the performance of an authorized, assigned mission (i.e. a VDOT related project). The necessity for access to, or knowledge or possession of, specific information required to carry out official duties. The information is intended for use only by individuals who require the information in the course of performing their job function. 4. What is Public Knowledge? Information about which knowledge or use is accessible to the general public if there has been no deliberate attempt to keep it hidden or secret. Knowledge that is available to anyone. Something might be considered public knowledge if it could be seen in a public area versus being located in a locked or non-public area. In some instances, the object itself may be public knowledge but it s location or use in that specific instance is not (e.g., an electrical panel in a reception area is recognizable and not hidden but, if the panel is locked, what the various circuit breakers control is not public knowledge). For example, if a circuit breaker box is located in the lobby of a building, the location of that box would not be CII/SSI. However, the identification of the circuits/devices controlled by the breakers in the box might be CII/SS depending on the function of the devices controlled by the individual breakers (Security Systems, Alarm Systems, etc.). If the box is located in a locked room in an area not normally open to the public, it could be considered CII/SSI. 5. Who has to do the review and marking? It is the responsibility of the document creator to review the document for potential CII/SSI information and to mark the document accordingly. If a document recipient receives a document which contains CII/SSI information the recipient should forward the document back to the creator for proper marking. 6. Can A/E firms mark CII/SSI as the plans/specs are developed? The Contract Officer should inform the A/E firm at the time the contract is awarded that the project contains CII/SSI and the firm s responsibilities for marking information. As such, plans/specification must be marked accordingly as they are developed. A/E firms, or any other outside entity, who work as agents of VDOT must mark the CII/SSI in accordance with the Policy. 7. Can Vendors or Contractors release CII/SSI information to third parties? Vendors and Contractors can release CII/SSI to business partners or sub-contractors in connection with work performed under the terms of the contract only if a need-to-know has been established. The Vendor or Contractor will notify the VDOT Contract Officer who will ensure the Non Disclosure Agreement form is completed and the protocols outlined in DPM 1-25 are followed prior to the release of the CII/SSI. 8. What about solicitations that involve information and site-visits that contain/show CII/SSI? The current approach to handling CII/SSI in public advertisements: Do not include CII/SSI in the public advertisement. The current approach to handling CII/SSI in pre-bid meetings: Require pre-registration for a mandatory pre-bid conference. Obtain signed non-disclosure agreements and verify identity with photo-id of all participants prior to allowing entry into the pre-bid meeting. CII/SSI Guide, Version 6.0, March 9, 2006 Page 6
7 CII/SSI Guide Sanitize CII/SSI material to work being solicited and to the extent needed to prepare a formal bid. Monitor pre-bid meeting and conduct site visits at the time of the pre-bid. Collect and account for all CII/SSI material after pre-bid meeting (no take away documents) Limit access and photography to that which is necessary to prepare a formal bid. Note: By following the guidance above, access to the CII/SSI material is restricted and therefore no Criminal History Records Check is required as indicated in DPM If the guidance above is not followed, or if the extent of the project requires the contractors or vendors to leave the pre-bid meeting with the CII/SSI material then the access becomes unrestricted and a Criminal History Records Check is required as indicated in DPM CII/SSI Guide, Version 6.0, March 9, 2006 Page 7
8 CII/SSI Guide Quick Reference to Identifying CII/SSI Information identified as either Critical Infrastructure Information or Sensitive Security Information (CII/SSI) should be marked as specified in the CII/SSI Policy. Points to consider when determining what constitutes CII/SSI What impact could the information have if it was inadvertently transferred to an unintended audience? Does the information provide details concerning security procedures and capabilities? Could someone use the information to target personnel, facilities or operations? How could someone intent on causing harm misuse the information? Could the use of this information be dangerous if combined with other publicly available information? Look at the material from an adversary s point of view. Answer the following: Is the information customarily public knowledge? (Information that is accessible to the general public if there has been no deliberate attempt to keep it hidden or secret.) Does the general public have a need-to-know? (Access to, or knowledge or possession of, specific information required to carry out official duties ) (Note: Contractors should be considered employees, not general public.) If yes to either, then it is not CII/SSI, otherwise continue. If the item under consideration shows describes or is itself listed below, it might be CII/SSI. 1 Documentation or other information that describes the design, function, operation or access control features of any security system, manual or automated, used to control access to or use of any automated data processing or telecommunications system. Y/N 2 Plans and information to prevent or respond to terrorist activity, the disclosure of which would jeopardize the safety of any person, including: Critical infrastructure sector or Operational, procedural, transportation, and structural components tactical planning or training manuals Vulnerability assessments Staff meeting minutes or other records Engineering or architectural records or portions of, that reveals the location or operation of: Security equipment and systems Elevator equipment and systems Ventilation equipment and systems Fire protection equipment and systems Emergency equipment and systems Electrical equipment and systems Utility equipment and systems Telecommunications equipment and systems 3 Information (including drawings, manuals, or other records) which reveals: Surveillance techniques Alarm or security systems or technologies Personnel deployments¹ Operational and transportation plans or protocols 4 Information concerning threats against transportation. ¹ Only as it relates to security operations. (E.g. Staffing levels in critical operational areas such as Smart Traffic Centers, Control Rooms, Guard schedules, number present and location, etc.) CII/SSI Guide, Version 6.0, March 9, 2006 Page 8
9 Start CII/SSI Designation Decision Flowchart Is the information readily accessible to the general public and considered public information? YES Owner Should Not Designate Information as CII/SSI Does the general public have a need-to-know in order to carry out official duties? YES Does information describe the design, function, operation or access control features of any security system used to control access to or use of any automated data processing or telecommunications system? Does information describe threats against transportation or plans developed to respond to terrorist activity? See Code of Virginia See Code of Virginia See Code of Virginia YES Does information (e.g., drawings, manuals, or other records) reveal surveillance techniques, personnel deployments, security systems or operational and transportation plans? Does the information contain engineering or architectural records that reveal the location or operation of Critical Infrastructure? See Code of Virginia YES Reference: Code of Virginia CII/SSI Guide, Version 6.0, March 9, 2006 Page 9 Owner Should Designate Information as CII/SSI
10 Critical Infrastructure Information/Sensitive Security Information (CII/SSI) Multi-Purpose Non-Disclosure Agreement Retain a copy of both the front and back sides of this form for future reference VDOT requires CII/SSI be protected and not disclosed to unauthorized persons. PART A: To Be Completed By Individual VDOT or Company Employee I agree with the following as a condition of being granted access to CII/SSI: CII/SSI, which is valuable and sensitive, is protected by law and by strict VDOT policies. The intent of these laws and policies is to assure that CII/SSI will remain confidential - that is, it will be used only as necessary to accomplish VDOT s mission. Disclosure of CII/SSI in any manner that permits interception by unauthorized persons could compromise safety and security and is prohibited. CII/SSI may be released only to persons with a need-to-know. I might have access to this information in various formats including but not limited to documents and drawings, physical structures, and computer based systems. I have no right or ownership interest in any VDOT CII/SSI. VDOT may at any time revoke my authorization allowing access to CII/SSI. Willful violation of this agreement may subject me to discipline which might include, but is not limited to, removal from current VDOT projects; exclusion from further VDOT related work; and legal liability. My obligations with respect to the confidentiality and security of all CII/SSI disclosed to me shall survive the termination of any agreement or relationship with VDOT. My execution of this agreement shall not nullify or affect in any manner any other agreement, non-disclosure or otherwise, which I have executed or may execute with VDOT or the Commonwealth of Virginia. I am obligated to protect this information from unauthorized disclosure in accordance with the terms of this agreement. I will only use CII/SSI that I obtain to perform my legitimate VDOT related duties. I will conduct myself in a strict conformance to applicable laws and VDOT policies governing CII/SSI. I will safeguard the confidentiality of all CII/SSI at all times. I will be responsible for my misuse or my wrongful disclosure of CII/SSI. Each provision of this agreement is severable. If any administrative or judicial tribunal should find any provision of this agreement to be unenforceable, all other provisions shall remain in full force and effect. I make this agreement in good faith, without mental reservation or purpose of evasion. Printed Name Date VDOT District/Division OR Company Name Phone Number Company Address Signature PART B: To Be Completed By Company Agent Only: In addition to the provisions above, I certify: All employees of this company involved with this VDOT project, regardless of location, who will have access to CII/SSI, myself included, will complete Part A of the Critical Infrastructure Information/Sensitive Security Information Multi-Purpose Non-Disclosure Agreement. The Agreement will be signed by me and accepted by VDOT prior to being granted access to CII/SSI. We will only access CII/SSI for which we have a need-to-know. Signature of Authorized Agent (Not required for VDOT employees) We will safeguard the confidentiality of all CII/SSI at all times. We will conduct ourselves in strict conformance to applicable laws and VDOT policies governing CII/SSI. Obligations with respect to the confidentiality and security of all CII/SSI disclosed to us shall survive the termination of any agreement or relationship with VDOT. Authorized Company Agent: Signature of Authorized Agent Printed Name Date Title Company Name Phone Number Company Address VDOT Contract Name and Number CII/SSI Guide, Version 6.0, March 9, 2006 Page 10
11 Critical Infrastructure Information/Sensitive Security Information (CII/SSI) Multi-Purpose Non-Disclosure Agreement Back Page Retain a copy of both the front and back sides of this form for future reference. Handling CII/SSI You are responsible for safeguarding Critical Infrastructure Information/Sensitive Security Information (CII/SSI) in your custody or under your control. The extent of protection afforded CII/SSI shall be sufficient to reasonably foreclose the possibility of its loss or compromise. The terms of this clause (Handling CII/SSI), including this paragraph, must be included in any dissemination of any document, in whole or in part, that contains CII/SSI. Protection - CII/SSI shall be protected at all times, either by appropriate storage or having it under the personal observation and control of a person authorized to receive it. Each person who works with protected CII/SSI is personally responsible for taking proper precautions to ensure that unauthorized persons do not gain access to it. Use and Storage - During working hours, reasonable steps shall be taken to minimize the risks of access to CII/SSI by unauthorized personnel. After working hours, CII/SSI shall be secured in a secure container, such as a locked desk, file cabinet or facility where contract security is provided. Reproduction - Documents or material containing CII/SSI may be reproduced to the minimum extent necessary consistent with the need to carry out official duties provided that the reproduced material is marked and protected in the same manner as the original material. Disposal - Material containing CII/SSI shall be disposed of by any method that prevents unauthorized retrieval (e.g. shredding, burning, returning to original source, etc.). Transmission - CII/SSI shall be transmitted only by VDOT courier, US first class, express, certified or registered mail, or through secure electronic means. CII/SSI Guide, Version 6.0, March 9, 2006 Page 11
Please read and execute the attached Los Angeles World Airports (LAWA) Non-Disclosure Agreement (NDA).
INSTRUCTIONS FOR COMPLETING THE LOS ANGELES WORLD AIRPORTS NON-DISCLOSURE AGREEMENT Please read and execute the attached Los Angeles World Airports (LAWA) Non-Disclosure Agreement (NDA). The LAWA NDA must
College of DuPage Information Technology. Information Security Plan
College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY
Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
Order. Directive Number: IM 10-3. Stephen E. Barber Chief Management Officer
Pension Benefit Guaranty Corporation Order Subject: Protecting Sensitive Information Directive Number: IM 10-3 Effective Date: 4/23/08 Originator: OGC Stephen E. Barber Chief Management Officer 1. PURPOSE:
Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00
Client Advisory October 2009 Data Security Law MGL Chapter 93H and 201 CMR 17.00 For a discussion of these and other issues, please visit the update on our website at /law. To receive mailings via email,
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
Town of Essex Comprehensive Public Records and Technology Policy
Town of Essex Comprehensive Public Records and Technology Policy Introduction: Public records and the use of technology are inextricably linked in our modern age. As such, this policy covers both topics,
ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information
NAMI EASTSIDE - 13 POLICY: Privacy and Security of Protected Health Information (HIPAA Policies and Procedures) DATE APPROVED: Pending INTENT: (At present, none of the activities that NAMI Eastside provides
SAMPLE BUSINESS ASSOCIATE AGREEMENT
SAMPLE BUSINESS ASSOCIATE AGREEMENT THIS AGREEMENT IS TO BE USED ONLY AS A SAMPLE IN DEVELOPING YOUR OWN BUSINESS ASSOCIATE AGREEMENT. ANYONE USING THIS DOCUMENT AS GUIDANCE SHOULD DO SO ONLY IN CONSULT
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,
Information Security Policy
Information Security Policy Contents Version: 1 Contents... 1 Introduction... 2 Anti-Virus Software... 3 Media Classification... 4 Media Handling... 5 Media Retention... 6 Media Disposal... 7 Service Providers...
VENDOR / CONTRACTOR. Privacy Basics
VENDOR / CONTRACTOR Privacy Basics Introduction Premera s mission is to provide our customers with peace of mind about their healthcare. This requires that everyone who works with or for Premera (the Company
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
Terms and Conditions Relating to Protected Health Information ( City PHI Terms ) Revised and Effective as of September 23, 2013
Terms and Conditions Relating to Protected Health Information ( City PHI Terms ) Revised and Effective as of September 23, 2013 The City of Philadelphia is a Covered Entity as defined in the regulations
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
Approved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)
Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act) The GLB Act training packet is part of the Information Security Awareness Training that must be completed by employees. Please visit
HIPAA Employee Training Guide. Revision Date: April 11, 2015
HIPAA Employee Training Guide Revision Date: April 11, 2015 What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 (also known as Kennedy- Kassebaum Act ). HIPAA regulations address
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University
Department of Commerce Office of Security. Initial Information Security Briefing
Department of Commerce Office of Security Initial Information Security Briefing Security Clearance A security clearance is a determination of trust, which makes you eligible for access to classified information.
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
KRS Chapter 61. Personal Information Security and Breach Investigations
KRS Chapter 61 Personal Information Security and Breach Investigations.931 Definitions for KRS 61.931 to 61.934. (Effective January 1, 2015).932 Personal information security and breach investigation procedures
AITKIN COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT. Aitkin County
AITKIN COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT Aitkin County Adopted by the Aitkin County Board of Commissioners July 28, 2015 To the extent that the Minnesota Government
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
Appendix : Business Associate Agreement
I. Authority: Pursuant to 45 C.F.R. 164.502(e), the Indian Health Service (IHS), as a covered entity, is required to enter into an agreement with a business associate, as defined by 45 C.F.R. 160.103,
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
DEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
HIPAA: Bigger and More Annoying
HIPAA: Bigger and More Annoying Instructor: Laney Kay, JD Contact information: 4640 Hunting Hound Lane Marietta, GA 30062 (770) 312-6257 (770) 998-9204 (fax) [email protected] www.laneykay.com OFFICIAL
Cross-Sound Cable Company, LLC Procedure for Disclosure of Critical Energy Infrastructure Information
Cross-Sound Cable Company, LLC Procedure for Disclosure of Critical Energy Infrastructure Information 1. FERC Order No. 890 requires that Cross-Sound Cable Company, LLC ( CSC LLC ) establish disclosure
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
Information Security Classification
i Information Management Information Security Classification February 2005 Produced by Information Management Branch Government and Program Support Services Division Alberta Government Services 3 rd Floor,
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
BUSINESS ASSOCIATE AGREEMENT ( BAA )
BUSINESS ASSOCIATE AGREEMENT ( BAA ) Pursuant to the terms and conditions specified in Exhibit B of the Agreement (as defined in Section 1.1 below) between EMC (as defined in the Agreement) and Subcontractor
NATO SECURITY BRIEFING NATO/ATOMAL SECURITY BRIEFING
NATO SECURITY BRIEFING FOREWORD This sample security briefing contains the minimum elements of information that must be provided to individuals upon initial indoctrination for access to NATO classified
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT (this Agreement ) is made effective as of the day of 2014 (the Effective Date ), by and between Sarasota County Public Hospital District,
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Valdosta Technical College. Information Security Plan
Valdosta Technical College Information Security 4.4.2 VTC Information Security Description: The Gramm-Leach-Bliley Act requires financial institutions as defined by the Federal Trade Commision to protect
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
HIPAA Awareness Training
New York State Office of Mental Health Bureau of Education and Workforce Development HIPAA Awareness Training This training material was prepared for internal use by the New York State Office of Mental
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
University Healthcare Physicians Compliance and Privacy Policy
Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS PURPOSE The purpose of establishing this policy is to ensure Virginia Union University s compliance with the Family Educational Rights and Privacy Act
M E M O R A N D U M. Definitions
M E M O R A N D U M DATE: November 10, 2011 TO: FROM: RE: Krevolin & Horst, LLC HIPAA Obligations of Business Associates In connection with the launch of your hosted application service focused on practice
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
Information Security: Roles, Responsibilities, and Data Classification. Technology Services 1/4/2013
Information Security: Roles, Responsibilities, and Data Classification Technology Services 1/4/2013 Roles, Responsibilities, and Data Classification The purpose of this session is to: Establish that all
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) by and between (hereinafter known as Covered Entity ) and Office Ally, LLC. (hereinafter known as Business Associate ), and
CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006)
CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006) WHAT IS THE PURPOSE OF RECORDS MANAGEMENT? 1. To implement a cost-effective Department-wide program that provides for adequate and proper documentation
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.
Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Federal Trade Commission Privacy Impact Assessment
Federal Trade Commission Privacy Impact Assessment for the: W120023 ONLINE FAX SERVICE December 2012 1 System Overview The Federal Trade Commission (FTC, Commission or the agency) is an independent federal
A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1
A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1 Policy and Procedure Templates Reflects modifications published in the Federal Register
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ) is by and between ( Covered Entity )and CONEX Med Pro Systems ( Business Associate ). This Agreement has been attached to,
FDOH Information and Privacy Awareness Training Learner Course Guide
Florida Department of Health FDOH Information and Privacy Awareness Training Learner Course Guide To protect, promote & improve the health of all people in Florida through integrated state, county, & community
How To Protect The Time System From Being Hacked
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
FirstCarolinaCare Insurance Company Business Associate Agreement
FirstCarolinaCare Insurance Company Business Associate Agreement THIS BUSINESS ASSOCIATE AGREEMENT ("Agreement"), is made and entered into as of, 20 (the "Effective Date") between FirstCarolinaCare Insurance
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Use & Disclosure of Protected Health Information by Business Associates
Applicability: Policy Title: Policy Number: Use & Disclosure of Protected Health Information by Business Associates PP-12 Superseded Policy(ies) or Entity Policy: N/A Date Established: January 31, 2003
The Ministry of Information & Communication Technology MICT
The Ministry of Information & Communication Technology MICT Document Reference: ISGSN2012-10-01-Ver 1.0 Published Date: March 2014 1 P a g e Table of Contents Table of Contents... 2 Definitions... 3 1.
Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy
Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)
Louisiana State University System
PM-36: Attachment 4 Business Associate Contract Addendum On this day of, 20, the undersigned, [Name of Covered Entity] ("Covered Entity") and [Name of Business Associate] ("Business Associate") have entered
Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services
Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...
HSHS BUSINESS ASSOCIATE AGREEMENT BACKGROUND AND RECITALS
HSHS BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement, ( Agreement ) is entered into on the date(s) set forth below by and between Hospital Sisters Health System on its own behalf and
This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.
Department of Homeland Security Management Directives System MD Number: 11043 Issue Date: 09/17/2004 SENSITIVE COMPARTMENTED INFORMATION PROGRAM MANAGEMENT I. Purpose This directive establishes Department
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
DATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
