(ISC) 2 s Global Online Resource Guide for Today s Information Security Professional. Content Submission Criteria

Size: px
Start display at page:

Download "(ISC) 2 s Global Online Resource Guide for Today s Information Security Professional. Content Submission Criteria"

Transcription

1 (ISC) 2 s Global Online Resource Guide for Today s Information Security Professional Content Submission Criteria Thank you for your interest in the (ISC) 2 Global Online Resource Guide for Today s Information Security Professional. All editorial data listed in the guide is carefully vetted by our editorial team in order to ensure that only the most relevant information is included. When considering data for submission to the guide, please use the recommendations outlined in this Content Submission Criteria Reference Document. If you adhere to the following guidelines, your submission will likely be accepted for inclusion. The Editorial Team reserves the right to accept or decline content submissions if deemed inappropriate or unacceptable for any reason. In the event that your submission is declined, please refer to the Reasons for Declined Submission on page 7 for possible reasons. (ISC) 2 s Global Online Resource Guide editorial content includes 5 categories. Details to each section can be found on the following pages: o Educational Resources 1 o Events 2 o Publications 3 o Online Resources 4 o Associations/Organizations 6 Data in each content category is specifically described below, and includes a sample listing that outlines both mandatory and optional information fields. Educational Resources: The Resource Guide includes accredited educational institutions that provide undergraduate and/or graduate courses that support the continuing professional development of the information security workforce. Most institutions offer a number of courses to information security (INFOSEC) and information technology (IT) students, and several grant degrees in these disciplines. Trade schools and other institutions that offer system management or other technical training and certification may be included if it is an organized program that is not tied to one vendor product or product line. (For example, do not include Microsoft University Online ) The Websites provided should help the prospective student locate the information on INFOSEC and IT programs readily. Therefore, please provide the link to the program, curriculum or department that offers the relevant coursework. Links to the home page of large institutions or universities will not meet this requirement. Simon Fraser University School of Computing Science Burnaby, British Columbia, Canada [Institution Name] [Department or School focused on INFOSEC] [City, State/Province, Country Physical Location] [URL to Website that includes information security program at the educational institution] 1

2 Mandatory Content for Educational Resources: Institution Name Location [Region, Country, and City] Website link Optional/Recommended Content Additions (if available): Name of Dept. or School within institution focused on Information Security education Unaccredited institutions or those not recognized by the national academic community Vendor-owned or operated educational training programs or training centers that focus on one product or vendor product line One-time courses to be held by regional or national associations or organizations (conferences can be included in the events section below) Online learning programs that are NOT associated with an accredited academic institution (college, university, or registered trade school) Events: Online submissions for this section should include trade shows, conferences, organized user group meetings, and other publicly advertised gatherings that support the information security community. Most events are open to the public; some charge a fee for attendance while others do not. Some events may require membership in professional organizations, such as many IEEE functions. Many events are produced by media companies that also publish one or several periodicals for this community, and these should be considered for inclusion in your submission Information Assurance Workshop [Event Name] February 7-10, 2005 [Event Dates] Marriott Philadelphia Downtown [Event Venue/Site] Philadelphia, Pennsylvania, USA [Location, including City, State/Province, and Country] [URL/Website for specific event or event producer] EXPO COMM Mexico 2005 February 8-11, 2005 Centro Banamex Mexico City, Mexico Mandatory Content for Event Resources: Event Name Event Dates [If exact dates are not known, month only for the event will suffice] Geographic Location [Including City, State/Province, and Country] Venue [Hotel, Convention Center, or other Physical location for conference/trade show] Website link [For specific event or event producer] Optional/Recommended Content Additions (if Available): Event Theme or Tagline 2

3 Vendor-hosted events that are focused on sales of specific products and services offered to the information security community. These marketing events for one or several vendors should not be considered in this collection of professional events. For example, a seminar hosted by Symantec about new security strategies, however worthwhile, should not be included in this listing. Events that have not yet determined dates, location, or content these can be added as details are defined later in the year and reviewed for appropriateness Closed events that are not accessible to INFOSEC professionals. Events that require membership in a professional organization or fee to attend are acceptable, but we do not wish to publish events that most of our audience cannot consider attending. Publications: Publications should be focused on information technology and information security, and must be published on a regular basis. One-time publications or those produced by vendors to support sales should not be included. Online submissions may include PRINT and ONLINE publications, including daily, weekly, monthly or quarterly periodicals. Academic monographs published on an established schedule also may be considered, as long as the publication schedule is regular, rather than ad hoc. If a publication is offered in only one language that is not English, please specify the available language of the publication, or if it is available in English and other languages, that also is helpful. Computerworld [Publication Name] [Website Link for specific publication or publisher] Mandatory Content for Publications: Choose the proper location [Region] Publication Name Website Link for specific publication or publisher Optional/Recommended Content Additions: Publication Subtitle Language Publications online or in print versions that are not issued on a regular basis, set schedule, or other industry norm. Periodic newsletters should be carefully considered before including them in this listing of professional publications. Publications that do not address INFOSEC issues, technology, or education for the target audience in some significant way Vendor publications that focus on a specific company s products, employees, seminars, etc. 3

4 Online Resources: Online submissions in this section can cover a broad range of topics, tools, and other reference materials available to users online. The Websites provided must be available to the public and cannot require password or other encrypted access. The objective of this section is to make the information security professional community and those who support it aware of the vast array of valuable resources online to support everything from education, to research, to improving security operations in diverse enterprises. Note of caution on Website length: Do not include URLs/Website links that are of unusual length or complexity. If a Website link exceeds one line, it should not be submitted, as it is considered too complex for reader ease of use or reference. Online resources included in the Resource Guide are categorized into several groups. Please provide your online submissions with an indication of WHICH category applies to each online resource recommended for inclusion in the guide. The five categories for Online Resources are listed below along with samples for each. 1) Government Online Resources (sorted by country name) Many government Websites provide helpful information of use to security professionals. These resources may include reference materials and services, including security standards, best practices, and national cyber security policies and guidelines. The following samples show how government agencies may be listed. The overall objective is to give the Resource Guide user a quick idea of what is available, who offers the information, and how to access it. U.S. Government Sites: U.S. Department of Homeland Security [Government Agency Name] [Public access Website] The U.S. Computer Emergency Readiness Team [Government Sub-Department Name] The National Cyber Security Response System [Purpose or Information Available] [Public access Website] 2) Organizational Security Resources Online A range of organizations provide resources online to INFOSEC professionals. These sites can be used to locate membership opportunities, review technical reports and white papers, and browse discussion of current issues of interest to the security community. (Many of these resources use the.org designation) IEEE Computer Society Technical Committee on Security and Privacy International Information Systems Security Certification Consortium (ISC) 2 4

5 World Wide Web Consortium, W3C Security Resources No vendors are to be included in this section. 3) Educational Resources Online These selected educational organizations have assembled tools and online resource libraries for information security professionals. Through these sites, users can identify available academic programs, review current academic research, review INFOSEC glossaries, and track security incidents and reporting. Many of these Websites feature link libraries to additional valuable resources. American Association of Community Colleges Association of Universities and Colleges in Canada 4) For Consumers, Families, and Educators A number of Websites provide guidance to consumer, parents, children, and educators to ensure they employ and teach best practices and safe access to online information. These sites include significant, practical reference materials and online security guidance for these groups. CyberSmart! School Program Educational Technology Clearinghouse Internet Safety Student Sites Federal Bureau of Investigation (FBI) A Parent s Guide to Internet Safety (English and Spanish versions) 5) Industry Portals Resources Online Online portals provide an efficient means of sharing voluminous information about information security concerns, alerts, lessons learned, and strategies for risk mitigation. A number of organizations and independent security professionals host Websites that include discussion of the latest security updates, warnings, glossaries, and other valuable reference material for INFOSEC professionals and the security community at large. Do not include links to private vendor sites, with the exception of product- or service- neutral information that is provided on corporate sites. Where a vendor site includes a helpful list of useful links, definitions, relevant article on a security topic, or other broadly useful, unbiased content, it may be considered for this Industry Portals section. The Association for Computing Machinery Portal Linux Security Information 5

6 SearchSecurity.com Links Mandatory Content for Online Resources: Choose the proper category for your submission. Choose the proper location [Region and Country] Web Link Title [What is offered at the link provided and by who] Website link [Must be publicly accessible] Optional/Recommended Content Additions (if available): Website Subtitle Language Vendor Websites that include only company and product specific information Excessively long or complex Website references (see note above) Links to sites that are not publicly available without a password or other encryption Website links that have not been tested for accuracy, relevance, and currency Associations/Organizations: This guide should include associations and organizations that are considered a professional resource to the information security community. All of these groups offer some type of INFOSEC education and information as part of their annual agendas, meetings, and publications, and many offer opportunities for individual membership, professional networking, access to custom research, and special events. AFCEA International Fairfax, Virginia USA [Organization Name] [Website for organization/association] [including city, state/province, and country] OASIS (Organization for the Advancement of Structured Information Standards) Billerica, Massachusetts Mandatory Content for Online Resources: Organization/Association name Organization Website City, state/province, and country Vendor user groups that are focused on promoting specific hardware, software, or services of one or selected firms Organizations whose sole purpose is to serve one vendor or a limited vendor population Organizations or associations who are closed or are not accepting future memberships for INFOSEC professionals 6

7 Reasons for Declined Submission The Editorial Team reserves the right to accept or decline content submissions if deemed inappropriate or unacceptable for any reason. In the event that your submission is declined, please reference the possible reasons for decline listed below or review the editorial content criteria for each section as detailed in this document. Possible reasons for a declined submission: - The listing does not address information security issues, technology or education for the target audience in a significant way. - The listing/modification is too vendor specific. The guide does not include listings specific to vendor user groups that are focused on promoting specific hardware, software or services of one or selected firms. - The listing/modification is too specific to one industry or location (i.e. a security software event or a local chapter meeting). - The listing URL is overly complex, broken and/or required a password for entry. - The listing does not have an ongoing life cycle (i.e. one-time academic courses or publications). - The listing organization offers a closed membership or is not accepting future memberships for information security professionals. - The listing/modification contains inappropriate language. - The listing is already in the guide. To submit content for consideration or to update an existing listing, simply go to and register as a contributor. Once registered, you will be able to submit content according to the provided content categories. Your submission will then be vetted by the Resource Guide Editorial Team and be 1) posted for inclusion or 2) declined. Please note that our Editorial Team will notify you should your listing be declined for any reason. You will then have the opportunity to make the appropriate edits to the listing and resubmit for consideration. Again, thank you for taking the time to submit your listing/modification. We rely on your input to update our content and would encourage you to submit any listing that qualifies based on the criteria. 7

United States Department of State Privacy Impact Assessment Risk Analysis and Management

United States Department of State Privacy Impact Assessment Risk Analysis and Management United States Department of State Privacy Impact Assessment Risk Analysis and Management Bureau of Administration 1. Contact Information Risk Analysis and Management (RAM) PIA Department of State Privacy

More information

The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States

The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States National Cyber Security Alliance Microsoft Corporation Zogby/463 May 2011 Methodology Zogby/463 surveyed a statistically

More information

Using Microsoft SharePoint for Project Management

Using Microsoft SharePoint for Project Management ASPE IT Training Using Microsoft SharePoint for Project Management A WHITE PAPER PRESENTED BY ASPE www.aspe-it.com 877-800-5221 Using Microsoft SharePoint for Project Management A modern Project Management

More information

Global Business Travel Association. Vice President of Sales, Media Division Position Profile July 2012

Global Business Travel Association. Vice President of Sales, Media Division Position Profile July 2012 Global Business Travel Association Vice President of Sales, Media Division Position Profile July 2012 This profile provides information about the Global Business Travel Association (GBTA) and the position

More information

N o 1 October 2004 Edited by Claudio Balducelli membership@tiems.org

N o 1 October 2004 Edited by Claudio Balducelli membership@tiems.org TIEMS MEMBERS NEWSLETTER N o 1 October 2004 Edited by Claudio Balducelli membership@tiems.org Why a Newsletter? A periodic newsletter for the members of a society generates more awareness about the works

More information

IT Security Management 100 Success Secrets

IT Security Management 100 Success Secrets IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management

More information

Using the Internet to Disseminate Information

Using the Internet to Disseminate Information Using the Internet to Disseminate Information The Internet has become an indispensable tool.... The ability to disseminate and promote one s work and research is an important component of managing and

More information

Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities.

Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities. Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities. i n t r o d u c t i o n Identity thieves are smarter and more organized than ever before, claiming over 8.1 million

More information

Change Management. Service Excellence Suite. Users Guide. Service Management and Service-now

Change Management. Service Excellence Suite. Users Guide. Service Management and Service-now Change Management Users Guide Service Management and Service-now Service Excellence Suite Table of Contents Introduction... 3 Overview and Objectives... 4 Overview... 4 Objectives... 4 Primary Benefits

More information

Bell Code for Business to Consumer Electronic Commerce

Bell Code for Business to Consumer Electronic Commerce Bell Code for Business to Consumer Electronic Commerce Scope and Application: The Code covers retail transactions with consumers on Bell Company web sites, including the Bell World/Espace Bell sites operated

More information

COURSE REVIEW AND APPROVAL PROCESS (STATE AND FEDERAL SPONSORED COURSES)

COURSE REVIEW AND APPROVAL PROCESS (STATE AND FEDERAL SPONSORED COURSES) Federal Emergency Management Agency National Preparedness Directorate National Training Education, and Exercises National Training and Education Division COURSE REVIEW AND APPROVAL PROCESS (STATE AND FEDERAL

More information

Data Registry Workshop Report

Data Registry Workshop Report Data Registry Workshop Report Background A Joint Working Group on Data Sharing and Archiving (JWG), representing major professional societies that publish ecology, evolution, and organismal biology journals,

More information

Welcome to Log on to Learn

Welcome to Log on to Learn Welcome to Log on to Learn You ve just begun membership of the premier web based software training service. You will now enjoy access to everything that Log on to Learn has to offer. This short guide will

More information

ISO 27000 Information Security Management Systems Professional

ISO 27000 Information Security Management Systems Professional ISO 27000 Information Security Management Systems Professional Professional Certifications Sample Questions Sample Questions 1. A single framework of business continuity plans should be maintained to ensure

More information

Oregon Secretary of State Security Awareness Program Strategic Plan Recommendation

Oregon Secretary of State Security Awareness Program Strategic Plan Recommendation Oregon Secretary of State Security Awareness Program Prepared by: Information Systems Division On: July 31, 2008 - Focused on Security. Dedicated to Success. - Revised 9/4/2008 4:30 PM Document History...

More information

Each month 29,000 + call center professionals are online visiting our communities searching for industry knowledge.

Each month 29,000 + call center professionals are online visiting our communities searching for industry knowledge. Each month 29,000 + call center professionals are online visiting our communities searching for industry knowledge. Let us introduce them to your company when they need your specific product or service.

More information

De La Salle University Information Technology Center. Microsoft Windows SharePoint Services and SharePoint Portal Server 2003 READER / CONTRIBUTOR

De La Salle University Information Technology Center. Microsoft Windows SharePoint Services and SharePoint Portal Server 2003 READER / CONTRIBUTOR De La Salle University Information Technology Center Microsoft Windows SharePoint Services and SharePoint Portal Server 2003 READER / CONTRIBUTOR User s Guide Microsoft Windows SharePoint Services and

More information

WHITE PAPER. 7 Keys to. successful. Organizational Change Management. Why Your CRM Program Needs Change Management and Tips for Getting Started

WHITE PAPER. 7 Keys to. successful. Organizational Change Management. Why Your CRM Program Needs Change Management and Tips for Getting Started 7 Keys to successful Organizational Change Management Why Your CRM Program Needs Change Management and Tips for Getting Started CONTENTS 2 Executive Summary 3 7 Keys to a Comprehensive Change Management

More information

Verification of Compliance with Accreditation-Relevant Federal Regulations

Verification of Compliance with Accreditation-Relevant Federal Regulations Verification of Compliance with Accreditation-Relevant Federal Regulations Implementation for 2015 Middle States Commission on Higher Education Verification of Compliance with Accreditation-Relevant Federal

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

IEEE Continuing Education Programs

IEEE Continuing Education Programs IEEE Continuing Education Programs Policy & CEU Process Manual Continuing Education Programs IEEE Educational Activities 445 Hoes Lane Piscataway, NJ 08854, USA December 2011 v1.0 1. Introduction... 1

More information

INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY

INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY Note: This section can be taught by the technology teacher or classroom teachers with support from the librarian. Contents: 1. Introduction and Essential

More information

ESTRO PRIVACY AND DATA SECURITY NOTICE

ESTRO PRIVACY AND DATA SECURITY NOTICE ESTRO PRIVACY AND DATA SECURITY NOTICE This Data Privacy and Security Policy is a dynamic document, which will reflect our continuing vigilance to properly handle and secure information that we are trusted

More information

Managing Vendors on Procurement Management Portal

Managing Vendors on Procurement Management Portal Managing Vendors on Procurement Management Portal Contents 1.0 Vendor registration... 4 1.1 Temporary Registration.... 4 1.2 Registration Verification... 5 1.3 Terms and Conditions... 5 1.4 Full Registration

More information

Nikkei BP Consulting - A Review

Nikkei BP Consulting - A Review Nikkei BP Consulting is a solution provider which supports clients marketing and public relations activities. It is fully owned by Nikkei BP, the magazine publisher of Nikkei Group. Measure performance

More information

Protecting Saskatchewan data the USA Patriot Act

Protecting Saskatchewan data the USA Patriot Act Protecting Saskatchewan data the USA Patriot Act Main points... 404 Introduction... 405 Standing Committee on Public Accounts motion... 405 Our response to the motion... 405 ITO, its service provider,

More information

Verification of Compliance with Accreditation-Relevant Federal Regulations

Verification of Compliance with Accreditation-Relevant Federal Regulations Verification of Compliance with Accreditation-Relevant Federal Regulations Implementation for 2016 Middle States Commission on Higher Education Verification of Compliance with Accreditation-Relevant Federal

More information

An Information Assurance and Security Curriculum Implementation

An Information Assurance and Security Curriculum Implementation Issues in Informing Science and Information Technology Volume 3, 2006 An Information Assurance and Security Curriculum Implementation Samuel P. Liles and Reza Kamali Purdue University Calumet, Hammond,

More information

Identiv Channel Alliance Network Program Guide

Identiv Channel Alliance Network Program Guide Trust Your World Identiv Channel Alliance Network Program Guide Welcome to the Identiv Channel Alliance Network (ICAN) Program Guide, where you will find a comprehensive set of sales resources and marketing

More information

Encrypted Email Users Guide. Revised 6/8/2015

Encrypted Email Users Guide. Revised 6/8/2015 Encrypted Email Users Guide Revised 6/8/2015 Contents Encrypted email service overview Registering, activating and maintaining an account Online Help Accessing the encrypted email portal screens Downloading

More information

Verizon Wireless Field Force Manager Device User Guide

Verizon Wireless Field Force Manager Device User Guide Verizon Wireless Field Force Manager Device User Guide Verizon Wireless Field Force Manager Device User Guide Table of Contents General Information...4 System requirements...4 Privacy and mobility...4

More information

Graduate Program Policies and Procedures

Graduate Program Policies and Procedures The University of British Columbia Department of Physics & Astronomy Graduate Program Policies and Procedures May 2007 Table of Contents 1 Introduction 4 2 Programs 4 3 Admissions 4 3.1 Eligibility 4 3.2

More information

Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students

Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students AUP Sections 1. Acceptable Use 2. Privileges 3. Internet Access 4. Procedures & Caveats 5. Netiquette

More information

Getting Started Manual: Authors

Getting Started Manual: Authors PaperPlaza and PaperCept Conference Manuscript Management and Registration Systems Getting Started Manual: Authors PaperCept, Inc. (Revised October 5, 2011) Getting Started Manual: Authors Contents 1.

More information

NORTH TEXAS NURSING RESOURCE CENTER. Operations Manual for the Centralized Clinical Placement System and the Centralized Faculty Resource Center

NORTH TEXAS NURSING RESOURCE CENTER. Operations Manual for the Centralized Clinical Placement System and the Centralized Faculty Resource Center NORTH TEXAS NURSING RESOURCE CENTER Operations Manual for the Centralized Clinical Placement System and the Centralized Faculty Resource Center Version: December 2010 North Texas Nursing Resource Center

More information

GUIDANCE ON ADMINISTRATIVE COSTS FOR FEDERAL AWARDS

GUIDANCE ON ADMINISTRATIVE COSTS FOR FEDERAL AWARDS GUIDANCE ON ADMINISTRATIVE COSTS FOR FEDERAL AWARDS This document includes definitions and examples of expenditure types that would typically be considered unallowable direct charges to federal awards

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

Data Governance Update. BOE workshop January 30, 2014

Data Governance Update. BOE workshop January 30, 2014 Data Governance Update BOE workshop January 30, 2014 IT Leadership Brett Miller, Chief Technology Officer Dave Reid, Director Enterprise Application Architecture Chris Paschke, Manager Information Security

More information

STATISTICAL COMMISSION and Working Paper No. 3 ECONOMIC COMMISSION FOR EUROPE CONFERENCE OF EUROPEAN STATISTICIANS

STATISTICAL COMMISSION and Working Paper No. 3 ECONOMIC COMMISSION FOR EUROPE CONFERENCE OF EUROPEAN STATISTICIANS STATISTICAL COMMISSION and Working Paper No. 3 ECONOMIC COMMISSION FOR EUROPE English only CONFERENCE OF EUROPEAN STATISTICIANS Work Session on Geographical Information Systems (Ottawa, Canada, 5-7 October

More information

PROJECT COST MANAGEMENT

PROJECT COST MANAGEMENT 7 PROJECT COST MANAGEMENT Project Cost Management includes the processes required to ensure that the project is completed within the approved budget. Figure 7 1 provides an overview of the following major

More information

How To Ensure Health Information Is Protected

How To Ensure Health Information Is Protected pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health

More information

Populating a Data Quality Scorecard with Relevant Metrics WHITE PAPER

Populating a Data Quality Scorecard with Relevant Metrics WHITE PAPER Populating a Data Quality Scorecard with Relevant Metrics WHITE PAPER SAS White Paper Table of Contents Introduction.... 1 Useful vs. So-What Metrics... 2 The So-What Metric.... 2 Defining Relevant Metrics...

More information

Cybersecurity Education

Cybersecurity Education Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014 Where we are now! Symantec: In a world of increased cybersecurity

More information

Annual Conference Marketing Opportunities Sponsor Advertise Exhibit

Annual Conference Marketing Opportunities Sponsor Advertise Exhibit Annual Conference Marketing Opportunities Sponsor Advertise Exhibit June 10 13, 2015 The Hyatt Regency Atlanta, GA, USA Sponsor Company/Organization Information Company/Organization Name: Contact Person

More information

Application for Online Course Inclusion in the Pennsylvania Online Course Catalog

Application for Online Course Inclusion in the Pennsylvania Online Course Catalog Application for Online Course Inclusion in the Pennsylvania Online Course Catalog Applicant Information Applicant Name: Address: Telephone: Fax: Website: Primary Contact Name: Title/Role: Telephone: Fax:

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

ASSIGNMENT 7: YOUR MARKETING/PR PLAN AND ONLINE THOUGHT LEADERSHIP

ASSIGNMENT 7: YOUR MARKETING/PR PLAN AND ONLINE THOUGHT LEADERSHIP ASSIGNMENT 7: YOUR MARKETING/PR PLAN AND ONLINE THOUGHT LEADERSHIP Read the following assignment. Then read Chapters 11 and 12 in your textbook. Be sure to complete Self-Check 7 to measure your progress.

More information

Purchasing Card Cardholder Handbook

Purchasing Card Cardholder Handbook Purchasing Card Cardholder Handbook Purchasing Card Program 2500 University Drive NW Calgary, Alberta, CANADA T2N 1N4 Telephone: (403) 220-5611 Email: cardhelp@ucalgary.ca Web: http://www.ucalgary.ca/finance

More information

Xerox Mobile Print Cloud

Xerox Mobile Print Cloud September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United

More information

Content Management Policy: Legal Aid NSW website and intranet

Content Management Policy: Legal Aid NSW website and intranet Content Management Policy: Legal Aid NSW website and intranet Department: Author: Responsible Manager: Effective Date: 24/02/2010 Version: 1.3 Strategic Planning & Policy Sean O Hagan, Web Content Manager

More information

6. Duties and Responsibilities of Committees and Liaisons

6. Duties and Responsibilities of Committees and Liaisons 6. Duties and Responsibilities of Committees and Liaisons The committee chairs work in conjunction with the President to select committee members considering experience, ethnicity, sector interests and

More information

Best Practices for Log File Management (Compliance, Security, Troubleshooting)

Best Practices for Log File Management (Compliance, Security, Troubleshooting) Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers

More information

Web-Based Educational Resources for Learning and Online Teaching 1

Web-Based Educational Resources for Learning and Online Teaching 1 Web-Based Educational Resources for Learning and Online Teaching 1 Web-Based Educational Resources for Learning and Online Teaching in Higher Education: The MERLOT Project Emrah Orhun Professor Computer

More information

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness

More information

Investigational Testing Requirements

Investigational Testing Requirements Investigational Testing Requirements Life Sciences Council British Columbia NRC Industry Research Assistance Program Vancouver, October 29, 2007 Mary-Jane Bell, Ph.D. Medical Devices Bureau (MDB) Therapeutic

More information

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM Chandramohan Muniraman, Meledath Damodaran, Amanda Ryan University of Houston-Victoria Abstract As in any information management system security

More information

Career Paths in Information Security v6.0

Career Paths in Information Security v6.0 Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to

More information

what your business needs to do about the new HIPAA rules

what your business needs to do about the new HIPAA rules what your business needs to do about the new HIPAA rules Whether you are an employer that provides health insurance for your employees, a business in the growing health care industry, or a hospital or

More information

Legislative Council Panel on Information Technology and Broadcasting. Hacking and Virus Activities and Preventive Measures

Legislative Council Panel on Information Technology and Broadcasting. Hacking and Virus Activities and Preventive Measures For discussion on 12 June 2000 Legislative Council Panel on Information Technology and Broadcasting Hacking and Virus Activities and Preventive Measures Purpose This paper briefs Members on the common

More information

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification

More information

Profile of IEEE Consultants, 2004 Prepared by R.H. Gauger, P.E. December 2004

Profile of IEEE Consultants, 2004 Prepared by R.H. Gauger, P.E. December 2004 Profile of IEEE Consultants, 24 Prepared by R.H. Gauger, P.E. December 24 Introduction to a Consultant s Profile As a consultant is preparing a proposal or negotiating a contract, one of the ongoing concerns

More information

Circulation Glossary Verified s glossary of commonly used terms.

Circulation Glossary Verified s glossary of commonly used terms. Circulation Glossary Verified s glossary of commonly used terms. Accuracy of Claimed Circulation: A measure of the consistency of a publication s Target (free rack/bulk) distribution records and Verified

More information

PROPOSED BACHELOR OF SCIENCE DEGREE IN COMPUTER ENGINEERING

PROPOSED BACHELOR OF SCIENCE DEGREE IN COMPUTER ENGINEERING Shepherd University Board of Governors Meeting of April 13, 2006 Agenda Item No. 3 PROPOSED BACHELOR OF SCIENCE DEGREE IN COMPUTER ENGINEERING A new Bachelor of Science Degree in Computer Engineering is

More information

USE OF THE WORD UNIVERSITY

USE OF THE WORD UNIVERSITY CRITERIA AND GUIDELINES FOR ALL PRIVATE POST-SECONDARY INSTITUTIONS AND OUT-OF-PROVINCE PUBLIC POST-SECONDARY INSTITUTIONS Table of Contents USE OF THE WORD UNIVERSITY A. Use of the Word University Use

More information

CLOUD COMPUTING AND PRIVACY CURRENT PRACTICES IN FAIRFAX COUNTY PUBLIC SCHOOLS

CLOUD COMPUTING AND PRIVACY CURRENT PRACTICES IN FAIRFAX COUNTY PUBLIC SCHOOLS CLOUD COMPUTING AND PRIVACY CURRENT PRACTICES IN FAIRFAX COUNTY PUBLIC SCHOOLS JCOTS Committee Meeting November 18, 2014 Jim Siegl Technology Architect Fairfax County Public Schools AGENDA Cloud Computing

More information

Cyber Security Best Practices

Cyber Security Best Practices Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters

More information

Managing your community bank s ACH and demand draft risk By George F. Thomas

Managing your community bank s ACH and demand draft risk By George F. Thomas Payment Protocols Managing your community bank s ACH and demand draft risk By George F. Thomas Would anyone in their right mind attempt to drive a car blindfolded? Well, the answer would be an emphatic

More information

GUIDELINES FOR DEVELOPING A SHAREPOINT REQUEST FOR PROPOSAL. by Jill Schubmehl, Evan Callender, and Chris Stafford

GUIDELINES FOR DEVELOPING A SHAREPOINT REQUEST FOR PROPOSAL. by Jill Schubmehl, Evan Callender, and Chris Stafford GUIDELINES FOR DEVELOPING A SHAREPOINT REQUEST FOR PROPOSAL by Jill Schubmehl, Evan Callender, and Chris Stafford Writing a Request for Proposal (RFP) for a planned Microsoft Office SharePoint Server 2007

More information

Preparing a Direct Marketing Campaign

Preparing a Direct Marketing Campaign Preparing a Direct Marketing Campaign by BNET Editorial Tags: advertisement, direct marketing, sales, direct mail Direct marketing works best when it is aimed at a very specific audience that cannot be

More information

Programme Specifications

Programme Specifications Programme Specifications ADVANCED DIPLOMA IN ENGLISH LITERATURE 1 Awarding body University of Cambridge 2 Teaching institution University of Cambridge Institute of Continuing Education * 3 Accreditation

More information

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

ACADEMIC AFFAIRS COUNCIL ****************************************************************************** ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 10.A.1 DATE: June 27, 2007 ****************************************************************************** SUBJECT: New Program DSU Minor in Computer Forensics DSU

More information

1 of 18 2/14/2014 11:33 AM

1 of 18 2/14/2014 11:33 AM 1 of 18 2/14/2014 11:33 AM ATHABASCA UNIVERSITY. CANADA'S OPEN UNIVERSITY. Welcome, You have 1 incomplete application. Please click on the one that you want to edit. Then open the "Welcome" message for

More information

Volunteering Database User Guide

Volunteering Database User Guide Volunteering Database User Guide v1.1 10/2014 Contents Page 1. Contents 2. Introduction 3. Getting ready to use the Volunteering Database 4. Registering for an ECAS account 8. Logging in to the Volunteering

More information

Commission on Colleges Southern Association of Colleges and Schools. Best Practices For Electronically Offered Degree and Certificate Programs

Commission on Colleges Southern Association of Colleges and Schools. Best Practices For Electronically Offered Degree and Certificate Programs Commission on Colleges Southern Association of Colleges and Schools Best Practices For Overview to the Best Practices These Best Practices are divided into five separate components, each of which addresses

More information

Information Technology Policy

Information Technology Policy ITP Number ITP-SEC024 Category Security Contact RA-ITCentral@pa.gov Information Technology Policy IT Security Incident Policy Effective Date August 2, 2012 Supersedes Scheduled Review Annual 1. Purpose

More information

2015 ADVERTISING KIT

2015 ADVERTISING KIT 2015 ADVERTISING KIT The mission of the American Society of Anesthesiologists is to advance the practice and secure the future of anesthesiology through advocacy, education and research. More than 51,000

More information

INDEX PRIVACY POLICY...2

INDEX PRIVACY POLICY...2 INDEX PRIVACY POLICY...2 WHAT PERSONAL INFORMATION DOES RENTINGCARZ GATHER FROM ME AND HOW IS THIS INFORMATION USED?...2 MAKING A PURCHASE...2 NEWSLETTERS...2 ONLINE SURVEYS...2 PROMOTIONS & SWEEPSTAKES...3

More information

U.S. DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT. Issued: September 6, 2002

U.S. DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT. Issued: September 6, 2002 U.S. DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT ADMINISTRATION Special Attention of: Transmittal for Handbook No: 3260.1 Issued: September 6, 2002 1. This Transmits: HUD Handbook 3260.1, Enterprise Data

More information

An on-line reporting, education and information management system.

An on-line reporting, education and information management system. Reviewer Guide An on-line reporting, education and information management system. 1 Basic Architecture of the Healthcare SafetyZone Portal The Healthcare SafetyZone Portal is designed to be an integrating

More information

National Association of College and University Attorneys. The Benefi ts of Membership

National Association of College and University Attorneys. The Benefi ts of Membership National Association of College and University Attorneys The Benefi ts of Membership What is NACUA? The National Association of College and University Attorneys is the leading higher education law organization

More information

What Makes An Online Service Effective For Student Outreach Programs? A White Paper from

What Makes An Online Service Effective For Student Outreach Programs? A White Paper from What Makes An Online Service Effective For Student Outreach Programs? A White Paper from November 2005 Many student loan organizations, colleges, post-secondary education departments, and studentfocused

More information

SOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs

SOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs SOUTH DAKOTA BOARD OF REGENTS Committee on Academic and Student Affairs AGENDA ITEM: III A (1) DATE: June 10-11, 2015 ****************************************************************************** SUBJECT:

More information

Graduate Program Policies and Procedures

Graduate Program Policies and Procedures The University of British Columbia Department of Physics & Astronomy Graduate Program Policies and Procedures Sept 2011 Table of Contents 1. Introduction!... 4 2. Programs!... 4 3. Admissions!... 4 3.1.

More information

Auditing emerging cyber threats and IT controls

Auditing emerging cyber threats and IT controls Auditing emerging cyber threats and IT controls Robert Baldi Director of IT Audit, ACI Worldwide Warren Fish Manager of IT Audit, ACI Worldwide Competency The trouble with competence is that it is always

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Apollo ACC PCI Registry Export Basics

Apollo ACC PCI Registry Export Basics Training Apollo ACC PCI Registry Export Basics Barbara O Brien Product Education Trainer Registry Export Assistance Clinical Content Contact the Registry Software Questions LUMEDX Support 1.800.966.0669

More information

Meditterra. Trade Advisory Services. www.meditterra.com. economy. International Trade Guide. Meditterra Trade Advisory Services 1-201-875-7502

Meditterra. Trade Advisory Services. www.meditterra.com. economy. International Trade Guide. Meditterra Trade Advisory Services 1-201-875-7502 Meditterra Trade Advisory Services www.meditterra.com economy International Trade Guide Meditterra Trade Advisory Services 1-201-875-7502 International Trade Guide Table of Contents Getting Started Exporting

More information

Procedures for Data Collection and Reporting. Virginia Department of Education

Procedures for Data Collection and Reporting. Virginia Department of Education Virginia Department of Education December 1999 TABLE OF CONTENTS Introduction...1 1. Management of Data Collection and Reporting...2 2. Designing the Data Collection Instrument...3 4. Data Preparation

More information

Topic: Proposed Oversight Structure for Teen Programming Database/Site

Topic: Proposed Oversight Structure for Teen Programming Database/Site Item # 11 YALSA Executive Committee Meeting via Conference Call April 17, 2015 Topic: Background: Action Required: Proposed Oversight Structure for Teen Programming Database/Site In the spring of 2015

More information

Minnesota Health Insurance Exchange (MNHIX)

Minnesota Health Insurance Exchange (MNHIX) Minnesota Health Insurance Exchange (MNHIX) 1.2 Plan September 21st, 2012 Version: FINAL v.1.0 11/9/2012 2:58 PM Page 1 of 87 T A B L E O F C O N T E N T S 1 Introduction to the Plan... 12 2 Integration

More information

Common Rules Courses leading to the Awarding of a Professional Doctorate (Research) Doctor of

Common Rules Courses leading to the Awarding of a Professional Doctorate (Research) Doctor of Common Rules Courses leading to the Awarding of a Professional Doctorate (Research) Doctor of Version: 3.00 Approved: Council Date: 20 June 2008 Administered: Governance Next Review: June 2011 COMMON RULES

More information

3 Texas Community Colleges to Grant Bachelor s Degrees

3 Texas Community Colleges to Grant Bachelor s Degrees An International Organization for the Community College Baccalaureate Degree Vol. 4 No. 2 Fall 2003 Laurie McDowell, Editor IN THIS ISSUE Baccalaureate Teacher Education Program... 2 Essay Contest... 4

More information

Digital Book World Community Sponsor Media Guide. www.digitalbookworld.com

Digital Book World Community Sponsor Media Guide. www.digitalbookworld.com DIGITAL BOOK WORLD CONFERENCE + EXPO Digital Book World Community Sponsor Media Guide www.digitalbookworld.com Digital Book World is the leading online information source for the ebook and digital publishing

More information

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information

More information

Email Policy. Purpose

Email Policy. Purpose Email Policy St. John Fisher College requires the use of email by the campus community to share information and knowledge in support of the Collegeʹs mission and to conduct the Collegeʹs business. To this

More information

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014.

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. The Rohit Group of Companies ( Rohit Group, Company, our, we ) understands

More information

Department of State SharePoint Server PIA

Department of State SharePoint Server PIA 1. Contact Information A/GIS/IPS Director Department of State SharePoint Server PIA Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information

More information

Online Bookkeeping and Accounting

Online Bookkeeping and Accounting Online Bookkeeping and Accounting Online bookkeeping and accounting services use broadband and high speed internet connections to provide businesses and individuals with anywhere anytime access to software

More information

Integrity We are above reproach in everything we do.

Integrity We are above reproach in everything we do. Identity Theft Protection Program Compliance with FTC Red Flags Rule Approved by AHC Organizational Committee on: May 26 th, 2009 Electronic Copy Available on AHC s OIP Web Site Integrity We are above

More information

REQUEST FOR PROPOSALS: WEB INFRASTRUCTURE DEVELOPER SERVICES

REQUEST FOR PROPOSALS: WEB INFRASTRUCTURE DEVELOPER SERVICES REQUEST FOR PROPOSALS: WEB INFRASTRUCTURE DEVELOPER SERVICES The Community Economic Development Assistance Corporation (CEDAC) is seeking Web Infrastructure Developer services to develop and implement

More information