IM Aware Session March 12, Panel Members

Size: px
Start display at page:

Download "IM Aware Session Email March 12, 2015. Panel Members"

Transcription

1 IM Aware Session March 12, 2015 Panel Members Linda Borys - RIM Program Support Manager, Service Alberta. - With Information Management Branch for over 20 years. - Has been the Alberta Records Management Committee (ARMC) Secretary for about 10 years. - Provides guidance on the enterprise records management program. - Supports the enterprise applications used to manage Records Retention and Disposition. Schedules, and the movement of inactive records from storage to disposition. Ken Lummis - Manager of IT Security Policy. Responsible for Information Technology Security Policy for the Government of Alberta. - Security side of phishing. GoA IT Security have produced tip sheets on phishing and social engineering. Phishing goes beyond the theft of information; criminals are now using phishing s to encrypt files which have caused downtime for the GoA in being able to access its information. Lori Lindquist - Strategic IMT Initiative Program Manager and Information Security Officer, Corporate Human Resources. - Lori Lindquist has 16 years of IT experience with the Government of Alberta primarily with Public Affairs Bureau and Executive Council. - She is knowledgeable regarding the policy and guidelines for acceptable and unacceptable activities regarding (Use of Government of Alberta Internet and Policy) and social media. - As a Ministry Information Security Officer, she is responsible for managing security related risks and issues regarding GoA usage.

2 Topic 1: From your perspective, what is the biggest obstacle for ? What piece of advice would you give to overcome that obstacle? Lori: Users are our biggest challenge. - Their ability to circumvent all rules creates a difficult environment to manage s from a CHR perspective. The separation between business and personal use can become complex; learning what can and can t be done with GoA (i.e. whether they can be used for personal use, or whether they are FOIPable) is important. It s also important to note that they are GoA assets, and as such we have a commitment to the GoA to be professional; if the accounts are not used in a professional manner, the Department has the ability (and the right) to monitor the accounts and follow up with disciplinary actions. - Becoming familiar with rules and regulations, such as social media rules and restrictions and any policies, is very important. Learning the rules is essential (i.e. be aware of copyright infringement, social media rules, and restrictions, or policies). - The Internet and Usage Policy outlines acceptable and unacceptable activities. - The Social Media Policy Ken: Security measures are our biggest challenge. - There are all sorts of malware, phishing scams, and ransomware. Filtering becomes very important. - Users are our first line of defence. All of our systems are reactive. Testing of staff awareness is important. Linda: Managing information is our biggest challenge. - The volume of s in our system is part of a bigger, more problematic picture, which is the lack of retention policy. Most of our s are transient, and can be deleted; only s that document a business decision must be kept. - We need rules and regulations on retention.

3 Topic 2: Speak to the evolving environment and the evolving tools to mitigate risks. Lori: From a user perspective, managing identity will be essential to mitigate risks. We can use tools to define access and level of permissions. - Policy tools. - Knowing responsibilities. - Using responsibly. Ken: We must use the functionality we have, such as the preview pane. - Tip sheets and educational tools are available. - Presentations are available this can provide clarity on who to contact regarding security. - Learning about integrity and accountability. Linda: We must use training to mitigate risk around s. - Auto classification is coming and will help separate business s from personal. - Integration of recordkeeping practices with different platforms will highlight the records component. - Automate classification and retention schedules.

4 Additional Questions: 1. What are the rules regarding Facebook and personal s (personal usage on Government s?) Ken: Facebook can be a source of malware. There is a risk of encryption and we should try to avoid using these webpages on government computers. Use your personal smart phone instead. 2. In the event of a phishing incident, what is the process that takes place? Lori: Send the phishing as an attachment to the GoA Service Desk, MISO, or notify your designated support team. Blocking the phishing site is first priority and letting everyone know is important. Ken: The security alerts process is a 30 minute window. They get notification, look at it (what s it doing, who it affects, what impact it will have), notify everyone, and then they fix it. 3. Is there a way to set a mandatory desktop training on awareness (i.e. desktop cleaning day?) Linda: Not yet. 4. When is autoclassification integration coming? Linda: We have tools, but whether they are good enough hasn t been determined yet. In Microsoft office, there is autoclassification functionality, but there are issues with retention. 5. Where can I find basic rules for is there a website? Linda: The information management website contains a managing Information Management at Work ecourse. There are no enterprise standards for s just yet; this will entail collaboration between many groups. 6. Are s records and do they have retention schedules? Linda: The what is information question falls into the same category as , it needs policy to deal with it. The decision on what to keep/who keeps it-we must ask the same question of all media.

5 Closing Remarks: Lori: Think before you click! Take a step back and consider what you re doing. Linda: Think after you click! Consider what you should keep and what you should get rid of. Organize your s. Take the Managing Information at Work ecourse. Ken: Think I am the first line of defence! Think about security.

Strategy for Email Management in Canadian Jurisdictions

Strategy for Email Management in Canadian Jurisdictions Strategy for Email Management in Canadian Jurisdictions Email is a fundamental part of doing business today, and the management of email has become a critical issue across all jurisdictions. All governments

More information

Polar Help Desk 4.1. User s Guide

Polar Help Desk 4.1. User s Guide Polar Help Desk 4.1 User s Guide Copyright (legal information) Copyright Polar 1995-2005. All rights reserved. The information contained in this document is proprietary to Polar and may not be used or

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption! Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption Thisdocumentcontainsthenecessarystepstoencryptthecontentsofaharddrive usingbitlockerandwindows7. Thefollowinginstructionsarederivedfromdocumentationat:

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

CJIS Online Security Awareness Training. TAC Guide

CJIS Online Security Awareness Training. TAC Guide CJIS Online Security Awareness Training TAC Guide 2015 Preface Welcome to the new CJIS Security Awareness Training software available to Texas agencies to help meet current CJIS Security Policy requirements

More information

Directory of Personal Information Banks. Collection Tool Instructions

Directory of Personal Information Banks. Collection Tool Instructions Directory of Personal Information Banks Collection Tool Instructions March 2008 1) INSTRUCTIONS ON HOW TO USE THE COLLECTION TOOL On the Main Menu screen click on the Instructions button to read the instructions

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager. London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate

More information

Encrypted Email Users Guide. Revised 6/8/2015

Encrypted Email Users Guide. Revised 6/8/2015 Encrypted Email Users Guide Revised 6/8/2015 Contents Encrypted email service overview Registering, activating and maintaining an account Online Help Accessing the encrypted email portal screens Downloading

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable

More information

Know the Risks. Protect Yourself. Protect Your Business.

Know the Risks. Protect Yourself. Protect Your Business. Protect while you connect. Know the Risks. Protect Yourself. Protect Your Business. GETCYBERSAFE TIPS FOR S MALL AND MEDIUM BUSINESSES If you re like most small or medium businesses in Canada, the Internet

More information

Network Security for End Users in Health Care

Network Security for End Users in Health Care Network Security for End Users in Health Care Virginia Health Information Technology Regional Extension Center is funded by grant #90RC0022/01 from the Office of the National Coordinator for Health Information

More information

MOBILE DEVICE SECURITY POLICY

MOBILE DEVICE SECURITY POLICY State of Illinois Department of Central Management Services MOBILE DEVICE SECURITY Effective: October 01, 2009 State of Illinois Department of Central Management Services Bureau of Communication and Computer

More information

PaperClip. em4 Cloud Client. Setup Guide

PaperClip. em4 Cloud Client. Setup Guide PaperClip em4 Cloud Client Setup Guide Copyright Information Copyright 2014, PaperClip Inc. - The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Inc. All brand and product

More information

Information Management

Information Management G i Information Management Information Management Planning March 2005 Produced by Information Management Branch Open Government Service Alberta 3 rd Floor, Commerce Place 10155 102 Street Edmonton, Alberta,

More information

HOW TO SAVE AND FILE LOTUS NOTES EMAILS

HOW TO SAVE AND FILE LOTUS NOTES EMAILS Email messages that are university records should be filed and retained with other records to which they relate. Saving emails to a unit s shared drive is an effective way to extract them from the email

More information

Perspectives on Cybersecurity in Healthcare June 2015

Perspectives on Cybersecurity in Healthcare June 2015 SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright

More information

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains Information Security Advisor December 2015 Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains +GAMES Spot the insider & Human firewall Filtering EXerCISE Good

More information

IT Security Standard: Patch Management

IT Security Standard: Patch Management IT Security Standard: Patch Management Introduction This standard defines specific procedural and configuration elements needed to implement the Bellevue College policy # 5250: Information Technology (IT)

More information

- Training. Getting Started with Outlook 2003. Information Technology Services - Training The University of Texas at Austin

- Training. Getting Started with Outlook 2003. Information Technology Services - Training The University of Texas at Austin - Training Getting Started with Outlook 2003 Information Technology Services - Training The University of Texas at Austin http://www.utexas.edu/its/training 2007 Information Technology Services The University

More information

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

Data Protection Policy. Information Security Review Group. Version Date Author Notes on Revisions

Data Protection Policy. Information Security Review Group. Version Date Author Notes on Revisions Document Control Table Document Title: Author(s) (name, job title and Division): Version Number: Document Status: Date Approved: Approved By: Effective Date: Date of Next Review: Superseded Version: Data

More information

WEBTIME CLEARING HOUSE Version 7.1.4

WEBTIME CLEARING HOUSE Version 7.1.4 WEBTIME CLEARING HOUSE Version 7.1.4 Computer Arts, Inc. has created a module in Payroll to manage and track daily time to comply with reporting requirements for the Affordable Care Act. The Webtime Clearing

More information

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1 P a g e 1 Internet Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to accessing and navigating the internet (a.k.a. the world wide web or the web ). Throughout the class,

More information

Fleet Maintenance Software

Fleet Maintenance Software Fleet Maintenance Software Welcome Thank you for taking time to review FleetWise VB Maintenance Management Made Simple. This guide is intended to provide a quick overview of installing the software and

More information

EMPLOYEE TRAINING MANAGER USER MANUAL

EMPLOYEE TRAINING MANAGER USER MANUAL EMPLOYEE TRAINING MANAGER USER MANUAL Smart Company Software This document describes how to use Employee Training Manager, a desktop software application that allows you to track your employees or personnel

More information

ADMINISTRATORS SERIES PRIVACY AND SECURITY AT UF. Cheryl Granto Information Security Manager, UFIT Information Security

ADMINISTRATORS SERIES PRIVACY AND SECURITY AT UF. Cheryl Granto Information Security Manager, UFIT Information Security ADMINISTRATORS SERIES PRIVACY AND SECURITY AT UF Susan Blair Chief Privacy Officer Cheryl Granto Information Security Manager, UFIT Information Security RULES OF THE ROAD Information Highway Danger Zones

More information

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves

More information

ReadySpace Limited Unit J, 16/F Reason Group Tower, 403-413 Castle PeakRoad, Kwai Chung, N.T.

ReadySpace Limited Unit J, 16/F Reason Group Tower, 403-413 Castle PeakRoad, Kwai Chung, N.T. Reputation and Blacklist Monitoring Basic Professional Business Enterprise Reputation Monitoring Blacklist Monitoring Standard Malware Detection Scan for known Malware Scan for known viruses All pages

More information

Think Before You Click. UH Information Security Team

Think Before You Click. UH Information Security Team Think Before You Click UH Information Security Team Who Are We? UH Information Security Team Jodi Ito - Information Security Officer Deanna Pasternak & Taylor Summers Information Security Specialists INFOSEC@HAWAII.EDU

More information

IBM Tivoli Asset Management for IT

IBM Tivoli Asset Management for IT Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs of IT assets with a single product installation that tracks and manages hardware, software and related

More information

ShareNet. Maintenance Software

ShareNet. Maintenance Software Solutions Data Sheet ShareNet Track Equipment. Manage Maintenance. Report on Costs. The Novo ShareNet Cloud Platform is a powerful web and mobile application that can be used as a Solution to efficiently

More information

Information Security Awareness Training. Course Outline. Provides a brief orientation to the topics covered in the module.

Information Security Awareness Training. Course Outline. Provides a brief orientation to the topics covered in the module. Information Security Awareness Training Course Outline Module 1 Information security risks 1. explain what information security means. 2. define the four aspects of information security. 3. understand

More information

Information Services. Protecting information. It s everyone s responsibility

Information Services. Protecting information. It s everyone s responsibility Information Services Protecting information It s everyone s responsibility Protecting information >> Contents >> Contents Introduction - we are all responsible for protecting information 03 The golden

More information

ITIL A guide to Event Management

ITIL A guide to Event Management ITIL A guide to Event Management An event can be defined as any detectable or discernable occurrence that has significance for the management of the IT Infrastructure of the delivery of IT service and

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Understand Backup and Recovery Methods

Understand Backup and Recovery Methods Understand Backup and Recovery Methods Lesson Overview Understand backup and recovery methods. In this lesson, you will explore: Backup management Backup options Recovery methods Backup Management Windows

More information

Virtual Phone System User Guide v4.7

Virtual Phone System User Guide v4.7 Virtual Phone System User Guide v4.7 169 Saxony Road, Suite 212 Encinitas, CA 92024 Phone & Fax: (800) 477-1477 Welcome! Thank you for choosing FreedomVoice. This User Guide is designed to help you understand

More information

DIIMS Frequently Asked Questions

DIIMS Frequently Asked Questions General 1. What is DIIMS, and why do we need to use it? DIIMS (Digital Integrated Information Management System) is a corporate GNWT wide solution that enables the GNWT to gain better access and control

More information

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually.

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. April 23, 2014 Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. What is it? Electronic Protected Health Information There are 18 specific

More information

Email Expanded Header: Viewing in Microsoft Outlook

Email Expanded Header: Viewing in Microsoft Outlook Email Expanded Header: Viewing in Microsoft Outlook Figure 1: Default Shown Header in an Outlook 2003 E-mail Message The Internet header of an e-mail message can have twenty lines or more showing all kinds

More information

Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students

Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students AUP Sections 1. Acceptable Use 2. Privileges 3. Internet Access 4. Procedures & Caveats 5. Netiquette

More information

Mailbox control panel. User guide

Mailbox control panel. User guide Mailbox control panel User guide Close this window Mailbox control panel user guide Mailbox control panels enable you to configure your settings for a specific mailbox with ease, with features ranging

More information

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 jmadeja@buchananassociates.com Each business is required by Massachusetts law

More information

Data Protection Breach Management Policy

Data Protection Breach Management Policy Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/

More information

ExchangeDefender. Understanding the tool that can save and secure your business

ExchangeDefender. Understanding the tool that can save and secure your business ExchangeDefender Understanding the tool that can save and secure your business OVERVIEW The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting.

More information

MINISTRY MOBILIZER. Paperless Risk Management Solution. Client Manual

MINISTRY MOBILIZER. Paperless Risk Management Solution. Client Manual MINISTRY MOBILIZER Paperless Risk Management Solution Client Manual April 2015 Ministry Mobilizer Paperless Risk Management Solution Ministry Mobilizer requires no technical expertise. If you can use the

More information

Copyright and Disclaimer

Copyright and Disclaimer Copyright and Disclaimer This User Guide is Copyright BlueCamroo Inc. 2008 2012. Copying and reproduction of this Guide or parts hereof for the exclusive purpose of informing, training or assisting any

More information

M i m o s a A r c h i v e S o f t w a r e ~ S e a r c h i n g f o r m e s s a g e s. Outline. Introduction to Mimosa Archive

M i m o s a A r c h i v e S o f t w a r e ~ S e a r c h i n g f o r m e s s a g e s. Outline. Introduction to Mimosa Archive Outline Introduction to Mimosa Archive... 1 What to expect... 2 Why are we using this program?... 2 Webmail... 2 Search methods... 3 Quick Search... 3 Browse... 4 View messages... 6 Restore messages...

More information

Using Microsoft Office 2013: Outlook. Gerry Kruyer

Using Microsoft Office 2013: Outlook. Gerry Kruyer Using Microsoft Office 2013: Outlook Table of Contents Outlook 2013 Ribbon... 4 Viewing Inbox... 4 Folders... 4 Home Tab... 5 Background Colour and Themes... 5 Inbox... 6 Reading Pane... 6 Turn off/on

More information

Lync Quick Start Guide for MAC OS

Lync Quick Start Guide for MAC OS Microsoft Lync is a unified communications platform that works ideally in a Windows Operating System, but is also feature- rich using a MAC OS. The purpose of this guide is to cover highlights of Lync

More information

Medical Information Breaches: Are Your Records Safe?

Medical Information Breaches: Are Your Records Safe? Medical Information Breaches: Are Your Records Safe? Learning Objectives At the conclusion of this presentation the learner will be able to: Recognize the growing risk of data breaches Assess the potential

More information

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology

More information

CUSTOMER SECURITY AWARENESS: A Key Defense Against Corporate Account Takeover & Cyber Fraud

CUSTOMER SECURITY AWARENESS: A Key Defense Against Corporate Account Takeover & Cyber Fraud CUSTOMER SECURITY AWARENESS: A Key Defense Against Corporate Account Takeover & Cyber Fraud Presented by Tom Garcia President / CEO InfoSight, Inc. 2014 InfoSight What we ll cover today 1. The MFA & NACHA

More information

High Peak CVS Disciplinary Policy and Procedure

High Peak CVS Disciplinary Policy and Procedure High Peak CVS Disciplinary Policy and Procedure The effectiveness and credibility of HIGH PEAK CVS and its employees is dependent to a large extent on the ability to achieve and preserve high standards

More information

E-Mail Policy. Government of Newfoundland and Labrador (GNL)

E-Mail Policy. Government of Newfoundland and Labrador (GNL) Document Title: E-Mail Policy Document Type: Policy No. Of Pages 6 Scope: Government of Newfoundland and Labrador (GNL) Trim # DOC15481/2009 Revision ( # ) 26 Treasury Board Approval ( # ) TBM2009-298

More information

Managing e-records without an EDRMS. Linda Daniels-Lewis Senior IM Consultant Systemscope

Managing e-records without an EDRMS. Linda Daniels-Lewis Senior IM Consultant Systemscope Managing e-records without an EDRMS Linda Daniels-Lewis Senior IM Consultant Systemscope Outline The e-record What s involved in managing e-records? Where do we start? How do we classify? How do we proceed?

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Identity Finder Quick Start Guide for Windows

Identity Finder Quick Start Guide for Windows Identity Finder Quick Start Guide for Windows Maintained by University IT Security and Policy Revised date: 10/30/2013 Identity Finder assists in the discovery and removal of Personally Identifiable Information

More information

Guidelines. London School of Economics & Political Science. Remote Access and Mobile Working Guidelines. Information Management and Technology

Guidelines. London School of Economics & Political Science. Remote Access and Mobile Working Guidelines. Information Management and Technology London School of Economics & Political Science Information Management and Technology Guidelines Remote Access and Mobile Working Guidelines Jethro Perkins Information Security Manager Summary This document

More information

Outlook 2010 Desk Reference Guide

Outlook 2010 Desk Reference Guide Outlook 2010 Desk Reference Guide Version 1.0 Developed by OR/WA IRM Please remember to print back-to-back. July 12, 2011 Microsoft Outlook 2010 This document has been developed by OR/WA IRM staff to provide

More information

Service Desk Edition

Service Desk Edition Service Desk Edition isupport - Overview isupport helps you to perform functions such as creating and managing incidents, entering and searching for knowledge entries and FAQs, tracking assets, customers,

More information

Service Level Agreement for Microsoft Online Services

Service Level Agreement for Microsoft Online Services Service Level Agreement for Effective: September 1, 2011 1. Introduction. This Service Level Agreement for (this SLA ) is provided in connection with, and is a part of, Customer s agreement with Bell for

More information

Your security is our priority

Your security is our priority Your security is our priority Welcome to our Cash Management newsletter for businesses. You will find valuable information about how to limit your company s risk for fraud. We offer a wide variety of products

More information

E-MAIL DEFENDER SERVICES

E-MAIL DEFENDER SERVICES E-MAIL DEFENDER SERVICES Email Defender User Guide 2015-02-12 What does E-Mail Defender do? Anti-Virus testing to eliminate known and suspected viruses. Blacklist services check distributed lists for fingerprints

More information

HIPAA ephi Security Guidance for Researchers

HIPAA ephi Security Guidance for Researchers What is ephi? ephi stands for Electronic Protected Health Information (PHI). It is any PHI that is stored, accessed, transmitted or received electronically. 1 PHI under HIPAA means any information that

More information

Dell Active Administrator 8.0

Dell Active Administrator 8.0 What s new in Dell Active Administrator 8.0 January 2016 Dell Active Administrator 8.0 is the upcoming release of Dell Software's complete solution for managing Microsoft Active Directory security auditing,

More information

Getting Started Guide - Desktop

Getting Started Guide - Desktop Getting Started Guide - Desktop 1. Sign Up PERSONAL OPENTEXT CORE ACCOUNT To get started sharing and collaborating on your files from a Mac or Windows browser, you ll need to sign up for your OpenText

More information

WHITE PAPER. CRM Evolved. Introducing the Era of Intelligent Engagement

WHITE PAPER. CRM Evolved. Introducing the Era of Intelligent Engagement WHITE PAPER CRM Evolved Introducing the Era of Intelligent Engagement November 2015 CRM Evolved Introduction Digital Transformation, a key focus of successful organizations, proves itself a business imperative,

More information

Mail Merge. Course Description. Objectives: Design a Main Document. Design a Data Source. Directories. Merge the Main Document with the Data

Mail Merge. Course Description. Objectives: Design a Main Document. Design a Data Source. Directories. Merge the Main Document with the Data Mail Merge Course Description The Mail Merge feature allows you to combine items from a data source into a document. This allows you to create form letters, mailing labels, envelopes, etc. You also have

More information

Division of Student Affairs Email Quota Practices / Guidelines

Division of Student Affairs Email Quota Practices / Guidelines Division of Student Affairs Email Quota Practices / Guidelines Table of Contents Quota Rules:... 1 Mailbox Organization:... 2 Mailbox Folders... 2 Mailbox Rules... 2 Mailbox Size Monitoring:... 3 Using

More information

STUDENT S INFORMATION SECURITY GUIDE

STUDENT S INFORMATION SECURITY GUIDE STUDENT S INFORMATION SECURITY GUIDE April 2013 Table of contents Information security is important - also for you...1 Use strong passwords and keep them safe...2 E-mail use...3 Beware of phishing and

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

anomaly, thus reported to our central servers.

anomaly, thus reported to our central servers. Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

Abila Grant Management. Document Management

Abila Grant Management. Document Management Abila Grant Management This is a publication of Abila, Inc. Version 2014 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names

More information

CJIS Online Security Awareness Training. Vendor Guide

CJIS Online Security Awareness Training. Vendor Guide CJIS Online Security Awareness Training Vendor Guide 2015 Preface Welcome to the new CJIS Security Awareness Training software available to Texas vendors and support staff to help meet current CJIS Security

More information

ITIL A guide to event management

ITIL A guide to event management ITIL A guide to event management Event management process information Why have event management? An event can be defined as any detectable or discernable occurrence that has significance for the management

More information

Cyber Security Incident Reporting Scheme

Cyber Security Incident Reporting Scheme OCIO/G4.12a ISMF Guideline 12a Cyber Security Incident Reporting Scheme BACKGROUND Reporting cyber security incidents is a source of intelligence information that assists in the development of a greater

More information

CÚRAM. Government of Alberta. Privacy Impact Assessment. Final Report. March 2009

CÚRAM. Government of Alberta. Privacy Impact Assessment. Final Report. March 2009 Government of Alberta Final Report Submitted by: Information and Privacy Office Employment and Immigration Table of Contents 1. Background...1 2. Purpose of This Review...2 3. Managing Access and System

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

[Company Name] HIPAA Security Awareness and Workforce Training Program Manual

[Company Name] HIPAA Security Awareness and Workforce Training Program Manual [Company Name] HIPAA Security Awareness and Workforce Training Program Manual The Importance of Security Awareness Training 4 Data Security Breaches 5 What is Information Security? 6 Roles and Responsibilities

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

OCS Student / Parent Laptop Agreement

OCS Student / Parent Laptop Agreement OCS Student / Parent Laptop Agreement Terms and Conditions of Use By signing this form, the student and the student s parent/guardian certify that they have thoroughly read, understand, and accept the

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

2016-2017 Fulbright Distinguished Awards in Teaching Program Overview of Online Application Process

2016-2017 Fulbright Distinguished Awards in Teaching Program Overview of Online Application Process 2016-2017 Fulbright Distinguished Awards in Teaching Program Overview of Online Application Process * Slide change * Welcome. This is an overview of the 2016-2017 Fulbright Distinguished Awards in Teaching

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent

More information

Polar Help Desk 4.1. Administration Guide

Polar Help Desk 4.1. Administration Guide Polar Help Desk 4.1 Administration Guide Copyright (legal information) Copyright Polar 1995-2005. All rights reserved. The information contained in this document is proprietary to Polar and may not be

More information

Service Level Agreement for Microsoft Online Services

Service Level Agreement for Microsoft Online Services Service Level Agreement for Microsoft Online Services Last updated on: July 1, 2014 1. Introduction. This Service Level Agreement for Microsoft Online Services (this SLA ) is made by Microsoft in connection

More information

Help Desk Web User Guide

Help Desk Web User Guide Help Desk Web User Guide 1 P age Contents Create an Incident... 3 Classifying Category... 3 Describe Incident Request... 3 Add Attachments to the Request... 4 Requests... 4 Request List View... 5 Modes

More information

Outlook Agent. For the latest version of this document please go to: http://www.exchangedefender.com/docs. v 1.0 May 16,2011 Audience: Staff

Outlook Agent. For the latest version of this document please go to: http://www.exchangedefender.com/docs. v 1.0 May 16,2011 Audience: Staff Outlook Agent For the latest version of this document please go to: http://www.exchangedefender.com/docs v 1.0 May 16,2011 Audience: Staff Table of Contents ExchangeDefender Overview 3 ExchangeDefender

More information

Non-Profit Records Management Tool Kit

Non-Profit Records Management Tool Kit Non-Profit Records Management Tool Kit January 2013 Contents Introduction.... 3 Generally Accepted Record Keeping Principles.... 4 What is a Record?.... 5 File Maintenance.... 6 Classifying a Record.....8

More information

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m. Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m. Topics: Explain why it is important for firms of all sizes to address cybersecurity risk. Demonstrate awareness

More information

Introduction... 2. Purpose... 2 Scope... 2 Icons... 2. Tasks and ehealth Processes... 3. Incident Management... 3 Change Management...

Introduction... 2. Purpose... 2 Scope... 2 Icons... 2. Tasks and ehealth Processes... 3. Incident Management... 3 Change Management... Version 1.5 Modified: 01/21/2013 Table of Contents Remedy Tasks Introduction... 2 Purpose... 2 Scope... 2 Icons... 2 Tasks and ehealth Processes... 3 Incident Management... 3 Change Management... 3 Overview

More information

Salesforce CRM Content Implementation Guide

Salesforce CRM Content Implementation Guide Salesforce CRM Content Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

Extending SharePoint for Real-time Collaboration: Five Business Use Cases and Enhancement Opportunities

Extending SharePoint for Real-time Collaboration: Five Business Use Cases and Enhancement Opportunities Extending SharePoint for Real-time Collaboration: Five Business Use Cases and Enhancement Opportunities Published: December 2012 Evolving SharePoint for Real-time Collaboration: Contents Section Executive

More information