1 POLICY STATEMENT Commonwealth of Pennsylvania Department of Corrections Policy Subject: Policy Number: Computer Forensic Investigations (CFI) Date of Issue: Authority: Effective Date: August 28, 2009 Signature on File September 4, 2009 I. AUTHORITY Jeffrey A. Beard, Ph.D. The Authority of the Secretary of Corrections to direct the operation of the Department of Corrections is established by Sections 201, 206, 506, and 901-B of the Administrative Code of 1929, 71 P.S. 61, 66, 186, and 310-1, Act of April 9, 1929, P.L. 177, No. 175, as amended. II. APPLICABILITY This policy is applicable to all facilities operated under the jurisdiction of, or conducting business with the Department of Corrections. III. POLICY It is the policy of the Department to ensure the use of computers and any other devices capable of storing and transmitting electronic data are in compliance with Department policies, rules, regulations, and applicable laws and statutes of the Commonwealth of Pennsylvania and the United States. IV. PROCEDURES All applicable procedures are contained in the procedures manual that accompanies this policy document.
2 2.4.1, Computer Forensic Investigations (CFI) Policy Page 2 V. SUSPENSION DURING AN EMERGENCY In an emergency or extended disruption of normal facility operation, the Secretary/designee may suspend any provision or section of this policy for a specific period. VI. RIGHTS UNDER THIS POLICY This policy does not create rights in any person nor should it be interpreted or applied in such a manner as to abridge the rights of any individual. This policy should be interpreted to have sufficient flexibility to be consistent with law and to permit the accomplishment of the purpose(s) of the policies of the Department of Corrections. VII. RELEASE OF INFORMATION AND DISSEMINATION OF POLICY A. Release of Information 1. Policy This policy document is public information and may be released upon request. 2. Confidential Procedures (if applicable) Confidential procedures for this document, if any, are not public information and may not be released in its entirety or in part, without the approval of the Secretary of Corrections/designee. Confidential procedures may be released to any Department of Corrections employee on an as needed basis. B. Distribution of Policy 1. General Distribution The Department of Corrections policy and procedures shall be distributed to the members of the Central Office Executive Staff, all Facility Managers, and Community Corrections Regional Directors on a routine basis. Distribution of confidential procedures to other individuals and/or agencies is subject to the approval of the Secretary of Corrections/designee. 2. Distribution to Staff It is the responsibility of those individuals receiving policies and procedures, as indicated in the General Distribution section above, to ensure that each employee expected or required to perform the necessary procedures/duties is issued a copy of the policy and procedures either in hard copy or via , whichever is most appropriate.
3 2.4.1, Computer Forensic Investigations (CFI) Policy Page 3 VIII. SUPERSEDED POLICY AND CROSS REFERENCE A. Superseded Policy 1. Department Policy 2.4.1, Computer Forensic Investigations, issued November 17, 2006, by Secretary Jeffrey A. Beard, Ph.D. 2. Facility Policy and Procedures This document supersedes all facility policy and procedures on this subject. B. Cross Reference(s) 1. Administrative Manuals 2. ACA Standards a. Administration of Correctional Agencies: None b. Adult Correctional Institutions: None c. Adult Community Residential Services: None d. Correctional Training Academies: None
4 PROCEDURES MANUAL Commonwealth of Pennsylvania Department of Corrections Policy Subject: Policy Number: Computer Forensic Investigations (CFI) Date of Issue: Authority: Effective Date: August 28, 2009 Signature on File September 4, 2009 Jeffrey A. Beard, Ph.D. Release of Information: Policy Document: This policy document is public information and may be released upon request. Procedures Manual: Confidential procedures for this document, if any, are not public information and may not be released in its entirety or in part, without the approval of the Secretary of Corrections/designee. Confidential procedures may be released to any Department of Corrections employee on an as needed basis.
5 2.4.1, Computer Forensic Investigations (CFI) Policy Table of Contents Section 1 General Procedures A. Investigation Authorization Requests and Approvals B. Shutdown of User Workstation Section 2 Responsibilities A. Central Office B. Facility Section 3 Evidence Control A. Identification and Marking of Evidence B. Recording of Evidence C. Evidence Accountability D. CFU Evidence Log E. Storage of Evidence Attachments (By Section) Section 3 Evidence Control CFU Evidence Log...Attachment 3-A
6 2.4.1, Computer Forensic Investigations (CFI) Procedures Manual Section 1 General Procedures Section 1 General Procedures A. Investigation Authorization Requests and Approvals 1. The following Department personnel are authorized to approve/direct an investigation which involves the introduction of or confiscation of cellular phones, the use/misuse of computers and any other related devices capable of storing and transmitting electronic data: a. Secretary/designee; b. Executive Deputy Secretary/designee; and c. Regional Deputy Secretary(ies)/designee. 2. An investigation request can be submitted by , letter, and/or fax. 3. If the investigation request is approved, the request shall be forwarded to the Director of the Office of Professional Responsibility (OPR). 4. The Facility Manager/designee and/or Bureau Director shall make his/her investigation request through his/her respective Deputy Secretary. B. Shutdown of User Workstation 1. When the OPR investigator is on-site and prepared to take custody of the user s workstation and at the request of the Director of OPR, the Network Administrator will issue a Shutdown command to the workstation. This will close all running applications and log the user off. 2. If the computer will not shutdown remotely and the user is not cooperative in logging off, then the investigator should pull the power plug on the workstation. 3. To disable and/or capture , the OPR Director shall make the request in writing to the Deputy Secretary for Human Resources and Management, Office of Administration. 1-1
7 CONFIDENTIAL 2.4.1, Computer Forensic Investigations Section 2 Responsibilities This section is confidential and not for public dissemination.
8 CONFIDENTIAL 2.4.1, Computer Forensic Investigations Section 3 Evidence Control This section is confidential and not for public dissemination.
9 2.4.1, Computer Forensic Investigations (CFI) Procedures Manual Glossary of Terms Application Administrator A person assigned to perform restricted functions for specific computer applications/systems, such as assigning users, creating backup files, loading or restoring data from CD-ROMs or other media. Application Administrator Password A confidential alphanumeric code used to logon to a computer or system to perform restricted functions for specific computer applications/systems, such as assigning users, creating backup files, loading, or restoring data from CD-ROMS or other media. Automation Coordinator Person designated by his/her facility and approved/trained by the Bureau of Information Technology to perform tasks outlined in this policy. Basic Input Output System (BIOS) Initial instruction set used during the startup of a computer system. Cellular Telephone a long-range electronic device used for mobile voice or data communication over a network of base stations known as cell sites. Central Office Managers Central Office Bureau, Office Directors, and Division Chiefs. Computers Shall include, but is not limited to, microchips, desktop computers, lap top computers, notebook computers, portable computers, palmtop computers (PDA), minicomputers, mainframe computers, and any other devices that store electronic data (e.g., cellular phones, Blackberries, etc.) Computer Crime Any act(s) or conduct that constitutes a violation of the Pennsylvania Crimes Code, including Chapter 76, Computer Offenses, applicable Federal Laws, Department policies, Rules and Regulations, and related laws and statutes that involve the possession, control, and use of a computer and/or other related electronic communications devices. Computer Forensics The scientific examination and analysis of data held on, or retrieved from, computer storage media in such a way that the integrity of the information can be used as evidence in a court of law. Computer Forensic Investigations (CFI) A scientific investigation involving acquiring, preserving, retrieving, and presenting data that has been processed electronically and stored on computer media. Computer Forensic Unit (CFU) An investigative unit employed by the Department with specialized training responsible for the recovery, analysis, and subsequent presentation of electronic evidence to a court of law. Compact Disk (CD) The storage of digital data in machine-readable form, accessible with a laser-based reader. CDs are 4-3/4 in diameter.
10 2.4.1, Computer Forensic Investigations (CFI) Procedures Manual Glossary of Terms Computer Disc Read Only Memory (CD-ROM) A data storage system using CDs. Computer Inventory The Department s official central inventory of information technology equipment and software as maintained by the Bureau of Information Technology. Confidential Information Information that is protected from disclosure by law, is treated or designated by law as confidential, specifically has been designated as confidential by the Department or another agency of the Commonwealth, as well as information the disclosure of which could threaten the security of the Department or any Departmental facility, facilitate an escape or create a danger to a member of the staff, a contractor, the public, or inmates. Copyright Legally enforceable ownership rights in published intellectual property, such as software. The copyright-holder for a piece of intellectual property possesses the exclusive rights to reproduce and distribute the intellectual property and power to grant the rights of reproduction and distribution to others. Complementary Metal Oxide Semiconductor (CMOS) Storage area for the initial instruction set used during the startup of a computer system. Data Communications Network A telecommunications medium and associated components responsible for the transportation of computer information from one location to another. Desktop Computer Desktop or tower configuration microcomputers used by employees, inmates, contractors, and individuals within the Department. Document Password A password used to restrict access to a single document. Electronic mail sent or received by Department employees. Employees Full-time, part-time limited term wage, intern, or contracted staff employed by the Department, as well as volunteers and visitors. Electronic Devices All Commonwealth owned/controlled computer equipment that has a storage device or persistent memory, including but not limited to, desktop computers, laptops, servers, personal data assistants (PDAs), printers, routers, switches, firewall hardware. Electronic Media All media on which electronic data can be stored, including but not limited to, hard drives, magnetic tapes, diskettes, CDs, DVDs, and USB storage devices. Floppy Disk A thin, flexible plastic disk which has been coated with iron oxide, capable of storing computer data as a magnetic pattern.
11 2.4.1, Computer Forensic Investigations (CFI) Procedures Manual Glossary of Terms Forensic Examiner An investigator with specialized training responsible for the recovery, analysis, and subsequent presentation of electronic evidence to a court of law. Full Access User A user who, in addition to having the capabilities of sending and receiving within the Department s system, has access to Internet or Outside . Hard Drive A mass storage device for digital data. Internet The worldwide network of networks that are connected to each other and provide unique identification of all computing resources connected. Internet Browsing Software Software used to locate and examine information accessible on the Internet. Internet Connection A PC that has the ability to connect to the Internet. Internet or Outside that travels over the Internet between the Department s system and the system of another state agency or private company. Any message sent to or received from someone outside the Department is referred to as either Internet or Outside . Limited Access User This user has the capability to send and receive only within the PA State Government System (CWOPA Global Address List). Microcomputer Programmable desktop or portable (handheld, laptop, palmtop, etc.) computers each of which may have its own microprocessor, operating system, and application software. These units can function in a stand-alone mode, as part of a Local Area Network (LAN), and/or as a terminal emulation device connected to a mainframe computer. A microcomputer may also include a display screen, integral data storage, communication, and document scanners are also considered a part of the microcomputer. Operating Systems Program that runs other programs. They perform basic tasks, such as responding to input, displaying output, organizing files and directories, and they work devices such as disk drives and printers. Windows NT and Windows 2000 are examples of operating systems. Password An alphanumeric code used to log onto a computer or system to access its services, files, and programs. Use of a password is intended to limit the persons who can access certain functions or information. Peripherals A general term for any of the external devices (mouse, keyboard, CD- ROM, scanner, etc.) attached to information technology equipment.
12 2.4.1, Computer Forensic Investigations (CFI) Procedures Manual Glossary of Terms Personal Password A password used in conjunction with a person s own User-ID to provide access to computer systems. Screensavers Programs designed to automatically place graphics, pictures, etc. on a computer monitor in place of applications or data when it detects that a computer has not actively been used for a certain period of time. Also included are programs designed, for amusement purposes, to place images or animated characters on a screen either in place of or along with applications or data. Secure Area An area in which inmates are not assigned to work and which is always locked when staff members are absent. Secured Perimeter Barrier that defines the inner-compound of a correctional facility. Secure Storage A locking desk, file cabinet or similar non-portable storage. Staff Any employee of the Commonwealth of Pennsylvania or any person working under contract with the Commonwealth. Subject Computer/Media The computer or media that is being examined. System Administrator Password A confidential alphanumeric code used to logon to a computer or system to access restricted functions such as operating system and network configuration settings. User-ID A unique identifier (user name) used to identify a person who logs onto a computer. Generally, User-Ids are not confidential. Virus A program that is designed to copy itself, attach itself to other programs, and spread onto other computers and then to perform functions which annoy the user, interrupt normal computer operations, destroy files or access/copy information without authorization. Viruses are often unintentionally downloaded from web sites or passed via floppy disks or through attachments to . Workstation A microcomputer connected to a network for the purpose of using network resources.
POLICY STATEMENT Commonwealth of Pennsylvania Department of Corrections Policy Subject: Policy Number: Inmate Cable Television Service DC-ADM 002 Date of Issue: Authority: Effective Date: July 20, 2009
Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect
Below are SAMPLE interrogatories and requests for production that are meant to be complementary (i.e., any devices or electronic files that are identified in answer to an interrogatory or interrogatories
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,
SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices 8-27-2015 4-007.1 Supersedes 4-007 Page Of 1 5 Responsible Authority Vice Provost for Information
Form 1221-2 (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release 1-1741 Date MANUAL TRANSMITTAL SHEET 06/19/2012 Subject: 1268-1 Information Technology Configuration Management
PERSONAL COMPUTERS 1 2 Personal computer a desktop computer a laptop a tablet PC or a handheld PC Software applications for personal computers include word processing spreadsheets databases web browsers
essential concepts lesson 1 An Overview of the Computer System This lesson includes the following sections: The Computer System Defined Hardware: The Nuts and Bolts of the Machine Software: Bringing the
Mobile Working and Remote Access Policy Version 1.0 Date: 20 July 2009 Document History Version History 1.0 20 July 2009 Approved for publication by the IS Board after E&FC approval in June 2009 Title:
Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers
ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
2 of 10 2.5 Failure to comply with this policy, in whole or in part, if grounds for disciplinary actions, up to and including discharge. ADMINISTRATIVE CONTROL 3.1 The CIO Bureau s Information Technology
Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 10.01 REVISED TOTAL PAGES Mar. 30, 2014 9 Division Computer Systems I. Definitions A. Executable File A program or file that automatically
Computer Security Policy (Interim) Updated May, 2001 Department of Information Systems & Telecommunications Table of Contents 1. SCOPE...1 2. OVERVIEW...1 3. RESPONSIBILITIES...3 4. PHYSICAL SECURITY...4
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
USFSP Network Security Guidelines Table of Contents I. Access to Data II. Workstations and Personal Computers A. Computer Viruses B. Software C. Hardware D. Storage Media III. Local Area Networks (LANs)
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
Chapter 1 Introduction to Computers Chapter 1 Objectives Recognize the importance of computer literacy Define the term, computer Identify the components of a computer Discuss the advantages and disadvantages
VIRGINIA ASSOCIATION OF COMMUNITY SERVICES BOARDS HIPAA READINESS STEERING COMMITTEE HIPAA CHECKLIST FOR INFORMATION TECHNOLOGY AND COMPUTER SYSTEMS SECURITY AREA OF CONCERN QUESTIONS Workstations Software/Hardware
Chapter 1 CD-ROM stands for: a. Compact Disk Random Only Memory b. Compact Disk Read Only Memory c. Computer Device Read Only Memory d. Computer Disk Random Online Memory Control Unit (CU) is the a. Main
YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Health Insurance Portability and Accountability Act State HIPAA Security Policy State of Connecticut Release 2.0 November 30 th, 2004 Table of Contents Executive Summary... 1 Policy Definitions... 3 1.
File Management and File Storage http://training.usask.ca Information Technology Services Division Table of Contents File Management at the University of Saskatchewan...3 Introduction...3 Creating Files
Storage and Backup No matter how well you treat your system, no matter how much care you take, you cannot guarantee that your data will be safe if it exists in only one place. The risks are much greater
ADMINISTRATIVE OFFICE OF THE COURTS STATE OF NEW JERSEY PHILIP S. CARCHMAN, J.A.D. ACTING ADMINISTRATIVE DIRECTOR OF THE COURTS RICHARD J. HUGHES JUSTICE COMPLEX PO BOX 037 TRENTON, NEW JERSEY 08625 [Questions
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions
ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been
Service with Excellence & Integrity Arkansas Department of Community Correction Two Union National Plaza Building 105 West Capitol, 2 nd Floor Little Rock, Arkansas 72201-5731 (501) 682-9510 Fax: (501)
Best Practices in Configuration Management for Security or It s 11 O Clock Do You Know Where Your Routers Are? If instituted properly, configuration management offers a straightforward and relatively inexpensive
Network Security for End Users in Health Care Virginia Health Information Technology Regional Extension Center is funded by grant #90RC0022/01 from the Office of the National Coordinator for Health Information
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
Information Systems Security Policy Northeast Alabama Community College Center for Information Assurance Northeast Alabama Community College 138 AL Hwy 35, Rainsville, AL 35986 (256) 228-6001 1 5/22/2014
PERSONAL COMPUTER SECURITY April 2001 TABLE OF CONTENTS 1 INTRODUCTION... 1 1.1 PC INFORMATION SECURITY OVERVIEW... 1 1.2 EXCLUSIONS... 1 1.3 COMMENTS AND SUGGESTIONS... 1 2 PC INFORMATION SECURITY RESPONSIBILITIES...
A Computer Glossary For the New York Farm Viability Institute Computer Training Courses 2006 GLOSSARY This Glossary is primarily applicable to DOS- and Windows-based machines and applications. Address:
Microsoft Windows Client Security Policy Version 2.1 POL 033 Ownership Policy Owner: Information Security Manager Revision History Next Review Date: 2 nd April 2015 Approvals This document requires the
OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
About this Tool Information Security for Residents... Purpose: Provide materials to inform and educate Residents in order to reach compliance regarding information security. Audience: New Residents Information
General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information The following rules of behavior apply to all Department of Homeland Security
University of Cincinnati Limited HIPAA Glossary ephi System A system that creates accesses, transmits or receives: 1) primary source ephi, 2) ephi critical for treatment, payment or health care operations
Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft
St. Johns River State College 3.11 Technology 3.11.1 Account Management Computer accounts are the means used to grant access to SJR STATE Information Resources. These accounts provide a means of providing
Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali firstname.lastname@example.org 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers
Tukwila School District #406 Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080 Computer and Phone Support Handbook Revised: July 2009 Table of Contents Network Systems Department
July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform
HMIS SECURITY PLAN of the PHILADELPHIA CONTINUUM OF CARE This plan describes the standards for the security of all data contained in the Philadelphia Continuum of Care Homeless Management Information System
FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY Authority: Category: Applies to: Chancellor, Fayetteville State University University-wide Faculty, Staff, and Students History: Approved on
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
Guidelines on the way of developing the instruction specifying the method of managing the computer system used for personal data processing, with particular consideration of the information security requirements.
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as required by HIPAA. 1. Definitions. a. Business Associate, as used in this Contract, means the
Technology Assessment Checklist for Small Businesses A quick way to help your small-business customers get the best technology. Today's small-business owners want reliable technology that helps them do
Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Computer Connected to
TECHNICAL SECURITY AND DATA BACKUP POLICY PURPOSE Effective technical security depends not only on technical measures, but also on appropriate policies and procedures and on good user education and training.
Information Systems Security Policy University of South Alabama Computer Services Center University of South Alabama 5840 USA Drive South 251-460- 6161 5/19/2014 Outline 1 Introduction... 2 Data Retrieval
PINE BLUFF POLICE DEPARTMENT POLICY/PROCEDURES MANUAL SUBJECT: Computer Security CHAPTER: ADMINISTRATION & PERSONNEL ISSUED By: Chief of Police John Howell POLICY NUMBER 118 ISSUE DATE 02/19/2008 EFFECTIVE
Technical Data Cloning Utility for Rockwell Automation Industrial Computers Topic Page About the Cloning Utility 2 Recovery Partition Considerations 2 Prepare to Boot from the Accessories CD 3 Start the
Philadelphia University School of Business Administration INFO-101 Information Systems Prof London Chap-02, Hardware and Software Hardware Components Central processing unit (CPU) Arithmetic/logic unit
Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
CAYUGA COUNTY POLICY MANUAL Section 11 Subject: Electronic messaging and internet 1 Effective Date: 5/25/10; Res. 255-10 Supersedes Policy of: November 28, 2000 Name of Policy: County Computer Hardware-Software
Unit 21: Installing, Configuring and Administering Microsoft Windows Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Perform and troubleshoot an attended
Ohio Supercomputer Center Portable Security Computing No: Effective: OSC-09 05/27/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
Network Documentation Checklist Don Krause, Creator of NetworkDNA This list has been created to provide the most elaborate overview of elements in a network that should be documented. Network Documentation
ICT Acceptable Use Policy Document Management Document Disclaimer This document is issued only for the purpose for which it is supplied. Document Owner This document is produced and owned by Staffordshire
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
POOLING PROVISIONS The E-Discovery Process A publication of Nevada Public Agency Insurance Pool The e- discovery process the search of electronic records for use as legal evidence can cost thousands of
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong