Today s Presenters: Doug Blenman Jr. Steven Doggart. How to Comply with FBI CJIS Security Policy

Size: px
Start display at page:

Download "Today s Presenters: Doug Blenman Jr. Steven Doggart. How to Comply with FBI CJIS Security Policy"

Transcription

1 Today s Presenters: Doug Blenman Jr. Steven Doggart How to Comply with FBI CJIS Security Policy

2 Before we get started Introductions: Doug Blenman Jr. Public Safety Product Manager Steven Doggart Sr. Software Developer Goals for this webinar: Overview of compliancy challenges Outline Versions and key CJIS Security Policies Preview some upcoming CJIS Security Policy changes Demonstrate how IDN Security helps you to comply Questions and Answers Final Housekeeping Items: Special word of thanks to Robert Turner of CommSys This PowerPoint & the recording of this session will be made available via our website afterwards.

3 FBI CJIS Security Policies Complying can be very challenging and complex: Requires a team effort & coordination with IT staffs Hardware & software providers VPN s to manage Network providers Administration Continual training Complex passwords Plus constantly changing: Technologies Networks Rules

4 CJIS Policy Versions Where to find the current version: Release 5.1-7/13/ pages Google FBI CJIS Security Policy PDF Version - bottom of the page Upcoming Version: Advisory Policy Board (APB) Meeting took place June 5-6, 2013 in Portsmouth, VA Potential major changes may be pending as a result Release 5.2 is pending (this fall?)

5 Important v5.1 Policies Standard Authentication (Password) Agencies shall follow the secure password attributes, below, to authenticate an individual s unique ID. Passwords shall: 1. Be a minimum length of eight (8) characters on all systems. 2. Not be a dictionary word or proper name. 3. Not be the same as the user ID. 4. Expire within a maximum of 90 calendar days. 5. Not be identical to the previous ten (10) passwords. 6. Not be transmitted in the clear outside the secure location. 7. Not be displayed when entered.

6 v5.1 continued Advanced Authentication Advanced Authentication (AA) provides for additional security to the typical user identification and authentication of login ID and password, such as: biometric systems, user-based public key infrastructure (PKI), smart cards, software tokens, hardware tokens, paper (inert) tokens, or Risk-based Authentication that includes a software token element comprised of a number of factors, such as network information, user information, positive device identification (i.e. device forensics, user pattern analysis and user binding), user profiling, and high-risk challenge/response questions Physical Access Control The agency shall control all physical access points (except for those areas within the facility officially designated as publicly accessible) and shall verify individual access authorizations before granting access.

7 CJIS Policy Update Highlights of the June 5-6, 2013 Meetings: 1. Advanced Authentication (AA) was overhauled Agency issued equipment may end up being considered exempt Mobile Device Management (MDM) will be required 2. The decision about cruisers being considered secure environments was reversed so long as the laptops are FIXED within the vehicle (meaning it is not removable by an officer). 3. A new document was introduced (NIST Rev. 4 which was publicly issued on May 7, 2013) & stands to have long-reaching effects on the approaches and requirements. Reminder - these changes aren t policy yet!!!

8 ID Networks Software This newer version of our security system that we re about to demonstrate has already been integrated into all of our product lines. We are in the process of scheduling or delivering this version to all customers at this time. Anyone using the latest version of our CAD or Mobile software already has it. Please check with your account or project manager for more information if there are any questions. There are many new parts to the security subsystem, but we re only going to be touching on the ones that help you to comply with the CJIS Security Policies. For additional information about additional parts, please contact your project or account managers. We are committed to using right partners, like CommSys and NetMotion, so that we can bring together the right blend of expertise and technology. Now, let s turn it over to Steve for a live demonstration of some of these settings.

9 Password Settings

10 2 Factor Login Screen

11 Require Tokens

12 Creating New Tokens

13 Assigning Tokens

14 Login Attempts

15 Wrap Up Any questions about today s presentation?

16 Thank you for attending! Doug Blenman Jr. (440) Steven Doggart (800)

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels

More information

NC CJIN Governing Board. 13 October, 2011. George A. White

NC CJIN Governing Board. 13 October, 2011. George A. White Advanced Authentication NC CJIN Governing Board 13 October, 2011 George A. White FBI CJIS ISO Brief Policy History Two year development Fully vetted by all state representation Criminal and civil Requirements

More information

Advanced Authentication Methods Determining the Best Fit for Your Agency. Strong Authentication. Simplified.

Advanced Authentication Methods Determining the Best Fit for Your Agency. Strong Authentication. Simplified. Advanced Authentication Methods Determining the Best Fit for Your Agency Strong Authentication. Simplified. Agenda About 2FA CJIS Security Policy 5.1 Advanced Authentication Encryption, Secure Connectivity

More information

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. Alan Ferretti CJIS Information Security Officer Texas Department of Public Safety CJIS Security Policy version 5.2: On 8/9/2013

More information

CA Technologies Solutions for Criminal Justice Information Security Compliance

CA Technologies Solutions for Criminal Justice Information Security Compliance WHITE PAPER OCTOBER 2014 CA Technologies Solutions for Criminal Justice Information Security Compliance William Harrod Advisor, Public Sector Cyber-Security Strategy 2 WHITE PAPER: SOLUTIONS FOR CRIMINAL

More information

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2. Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions

More information

Kroger Supplier Information Management System (SIM) Training Documentation

Kroger Supplier Information Management System (SIM) Training Documentation Kroger Supplier Information Management System (SIM) Training Documentation Introduction All Kroger suppliers are required to register in Kroger s new Supplier Information Management (SIM) system. The SIM

More information

How Do I Sign Up? For more information call (866)-337-9011 or contact us at webmaster@newpeoplesbank.com

How Do I Sign Up? For more information call (866)-337-9011 or contact us at webmaster@newpeoplesbank.com How Do I Sign Up? Simply visit our website at www.newpeoplesbank.com and click on the Register link underneath Online Banking. Once there, you will submit a form via our secure servers to our Online Banking

More information

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement

More information

4/22/2013. Applications Update

4/22/2013. Applications Update 4/22/2013 Applications Update There are two paths we are pursuing for apps 1. Focus on V.5 app store by working with application developers and stakeholders to showcase existing apps by vertical ( law

More information

How To Protect The Time System From Being Hacked

How To Protect The Time System From Being Hacked WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer

More information

Meeting CJIS Advanced Authentication

Meeting CJIS Advanced Authentication Meeting CJIS Advanced Authentication using User Certificate and Strong Key Protection Presented by: Carlos Leon, Network Manager City of Palm Beach Gardens Meeting CJIS Requirements CJIS security policy

More information

ADM:49 DPS POLICY MANUAL Page 1 of 5

ADM:49 DPS POLICY MANUAL Page 1 of 5 DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The

More information

CJIS Online Overview. CJIS Security Awareness Training & Testing Software

CJIS Online Overview. CJIS Security Awareness Training & Testing Software CJIS Online Overview CJIS Security Awareness Training & Testing Software Navigating the CJIS Online site Working with the CJIS Online system: Logging in as a Local Agency Admin Setting up user accounts

More information

Business ebanking - User Sign On & Set Up

Business ebanking - User Sign On & Set Up About Sign On Business ebanking has two authentication methods that reduce the risk of online identity theft: secure token authentication and out-of-band authentication. The authentication method companies

More information

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

Arkansas Department of Information Systems Arkansas Department of Finance and Administration Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state

More information

Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2

Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2 Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2 Created: May 22, 2008 Updated: April 23, 2009 The RSA Web Express web express web site automates functions required to deploy hardware

More information

REPORTING CENTRAL EXTERNAL USER GUIDE FEDERAL RESERVE SYSTEM

REPORTING CENTRAL EXTERNAL USER GUIDE FEDERAL RESERVE SYSTEM REPORTING CENTRAL EXTERNAL USER GUIDE FEDERAL RESERVE SYSTEM February 2016 Version 3.1 Table of Contents I. Overview.... Page 3 II. Accessing and Logging Into Reporting Central..... Pages 4-5 III. Reporting

More information

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer Arcot Systems, Inc. Securing Digital Identities FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer Today s Agenda Background Who is Arcot Systems? What is an ArcotID? Why use

More information

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Business Banking Customer Login Experience for Enhanced Login Security

Business Banking Customer Login Experience for Enhanced Login Security Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification

More information

Technical Panel of Nebraska - 30-Day Comments Period

Technical Panel of Nebraska - 30-Day Comments Period Technical Panel of the Nebraska Information Technology Commission Standards and Guidelines Draft Document 30-Day Comment Period Title: Data Security Standard [NOTE (August 10, 2007): The posting of this

More information

Multi-Factor Authentication Job Aide

Multi-Factor Authentication Job Aide To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please

More information

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Audio: This overview module contains an introduction, five lessons, and a conclusion. Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules

More information

Personal Training. Chapter 27. FrontDesk v4.1.25. PT Specific Program Options. Contract Templates. Set Member s Secure Check In Password

Personal Training. Chapter 27. FrontDesk v4.1.25. PT Specific Program Options. Contract Templates. Set Member s Secure Check In Password Chapter 27 Personal Training FrontDesk v4.1.25 PT Specific Program Options Empl oyees Contract Templates Personal Training Window in Contract Wizard Contract Manager / Personal Training Information Clear

More information

IRS TAX RETURN TRANSCRIPT. Step-by-Step Instructions for Getting your IRS Transcript Online

IRS TAX RETURN TRANSCRIPT. Step-by-Step Instructions for Getting your IRS Transcript Online IRS TAX RETURN TRANSCRIPT Step-by-Step Instructions for Getting your IRS Transcript Online If IRS data is requested, students and parents who are ineligible to use the IRS data retrieval tool through the

More information

Welcome to Business Internet Banking

Welcome to Business Internet Banking Welcome to Business Internet Banking Member FDIC Table of Contents Logging On to Business Internet Banking. 3 Viewing Balances. 6 Viewing Transaction Information. 7 Issuing Stop Payments. 9 Viewing estatements.

More information

Online Services User Guide

Online Services User Guide Online Services User Guide Welcome to online banking! Whether you re online or using a mobile device, access your accounts whenever and wherever it s convenient for you. Log In: BankMidwest.com Online

More information

Quick Start User Guide

Quick Start User Guide The global standard for esignature Quick Start User Guide Using Templates Overview This guide provides an overview of how to use a template when creating and sending an envelope. Templates help streamline

More information

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.

More information

Wasabi Hands On Lab Journal Exercise HO1

Wasabi Hands On Lab Journal Exercise HO1 Exercise HO1 This lab will give you practical experience in creating a Clerical/Adjustment journal using information from a Detailed Listing Report to correct an object code used in error. You will also

More information

STUDENT PORTAL - TURNITIN

STUDENT PORTAL - TURNITIN Online STUDENT PORTAL - TURNITIN Student Manual Ver. 5 London School of Commerce & School of Business and Law IT Department 2012 1 What is new in STUDENT PORTAL? www.lsclondon.co.uk/student/studentmanual.pdf

More information

Provider OnLine. Log-In Guide

Provider OnLine. Log-In Guide Provider OnLine Log-In Guide Table of Contents 1 LOG-IN ACCESS... 3 1.1 ENTERING THE USER ID AND PASSWORD... 4 1.2 OVERVIEW AND PURPOSE OF TRICIPHER... 5 1.2.1 Log-in for Users Who Are Active, But Not

More information

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

Security First Bank Consumer Online Banking Information Sheet, Access Agreement and Disclosures

Security First Bank Consumer Online Banking Information Sheet, Access Agreement and Disclosures Security First Bank Consumer Online Banking Information Sheet, Access Agreement and Disclosures Welcome to Online Banking with Security First. This Online Banking Agreement and Disclosure (Agreement) discusses

More information

IT Information Packet

IT Information Packet IT Information Packet Welcome to the University of Mount Olive! Beginning college is an exciting time where you will be experiencing many new things in a short amount of time. We understand that technology

More information

Wires. z Go to https://www.bellbanks.com z From the Secure login to drop-down, select Business Online Banking z Enter Username and Password

Wires. z Go to https://www.bellbanks.com z From the Secure login to drop-down, select Business Online Banking z Enter Username and Password Wires This tab allows you to perform all the necessary functions to create and submit domestic and international wires online. For companies utilizing the online wire function, all business online banking

More information

Reference Document. SedonaOnline Support

Reference Document. SedonaOnline Support Document Overview This document is being provided to explain how to request a SedonaOnline password and how to use SedonaOnline to submit and view Support Tickets. Our company utilizes the SedonaOffice

More information

Avaya Credential Management System User Guide

Avaya Credential Management System User Guide Avaya Credential Management System User Guide This guide provides background information and instructions on how to use the Avaya Credential Management System (CMS). Table of Contents 1. The Avaya Credential

More information

TRAINING GUIDE. TRAVEL AND EXPENSE CARD US Bank Access OnLine

TRAINING GUIDE. TRAVEL AND EXPENSE CARD US Bank Access OnLine TRAINING GUIDE TRAVEL AND EXPENSE CARD US Bank Access OnLine Prepared by: Procurement Services October 2015 Table of Contents Introduction... 2 Logging on to Access Online... 2 Menus Available for Cardholders...

More information

VPN Network Access. Principles and Restrictions

VPN Network Access. Principles and Restrictions BBG VPN WINDOWS CLIENT INSTALLATION PROCEDURES Page 1 of 11 Principles and Restrictions VPN Network Access High Speed access via broadband Internet connections is available for the Agency network resources

More information

How to login with the RSA Token?

How to login with the RSA Token? How to login with the RSA Token? How does the RSA Token work? To log on to your online trading account, you need to enter your existing username and password as usual, followed by the unique security code

More information

THANK YOU FOR YOUR BUSINESS.

THANK YOU FOR YOUR BUSINESS. THANK YOU FOR YOUR BUSINESS. Our goal is to provide you excellent customer support and service. And, TDECU Insurance's 24/7 Online Access is another example of our ongoing efforts to provide you the highest

More information

Member FAQ. General Information: Security:

Member FAQ. General Information: Security: General Information: Security: Why did you change Robins Federal Online Banking? Great question! We listened to an overwhelming response from you, our members that we needed to make these changes. We are

More information

e-governance Password Management Guidelines Draft 0.1

e-governance Password Management Guidelines Draft 0.1 e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.

More information

OpenID & Strong Authentication

OpenID & Strong Authentication OpenID & Strong Authentication CTST 2009: Emerging Technology D14: Smart Cards, Tokens & Digital Identity May 5, 2009 Brian Kelly Vice President TrustBearer Labs Simplify Multi-factor authentication can

More information

User Manual. Firm Bank Manager (includes instructions for employees and firms) U.S Network of Virtual Enterprises Bank. for

User Manual. Firm Bank Manager (includes instructions for employees and firms) U.S Network of Virtual Enterprises Bank. for U.S Network of Virtual Enterprises Bank User Manual for Firm Bank Manager (includes instructions for employees and firms) US Network Bank User Manual Bank Manager Page 1 of 8 FOR FIRM BANK MANAGER LOGIN

More information

Sam Houston State University Procurement Card Program

Sam Houston State University Procurement Card Program Sam Houston State University Procurement Card Program Citi Card GCMS On-Line Cardholder Reference Guide COMMERCIAL CARD ADMINISTRATOR: KATHY ROBERTS OFFICE PHONE: 936-294-1991 OFFICE FAX: 936-294-1997

More information

USER GUIDE: INTERNET BANKING. Version 2.0

USER GUIDE: INTERNET BANKING. Version 2.0 USER GUIDE: INTERNET BANKING Version 2.0 About Internet Banking (IBank) Guaranty Trust Bank Internet Banking, is a secure online system designed to make our banking service readily available to our customers.

More information

Learning Management System. Department Administrator User Guide. March 24, 2015

Learning Management System. Department Administrator User Guide. March 24, 2015 Learning Management System Department Administrator User Guide March 24, 2015 Table of Contents Glossary... 0 Overview... 1 Accessing Learn@Work... 1 Logging In... 1 Navigating the Home Page... 1 Featured

More information

D&B SafeTransPort Tutorial YOUR MANAGED FILE TRANSFER SOLUTION FOR SECURE FILE TRANSFERS WITH D&B

D&B SafeTransPort Tutorial YOUR MANAGED FILE TRANSFER SOLUTION FOR SECURE FILE TRANSFERS WITH D&B Tutorial YOUR MANAGED FILE TRANSFER SOLUTION FOR SECURE FILE TRANSFERS WITH D&B Overview Overview Topics Covered overview, features and benefits Account activation and password maintenance Using the User

More information

NASA PIV smartcards at Headquarters Frequently Asked Questions (FAQ s)

NASA PIV smartcards at Headquarters Frequently Asked Questions (FAQ s) Frequently Asked Questions (FAQ s) November, 2013 This list of FAQs is a subset of a larger list derived by the Agency. This list is tailored to meet the needs of users at Headquarters. If you do not find

More information

Sage 100 ERP (MAS90 / MAS200) How to Set up Security in Sage 100 ERP

Sage 100 ERP (MAS90 / MAS200) How to Set up Security in Sage 100 ERP Sage 100 ERP (MAS90 / MAS200) How to Set up Security in Sage 100 ERP In order to access Sage 100 ERP, a person must be given a user id in Sage 100. The User ID is then assigned a Role which grants the

More information

Digital Signatures on iqmis User Access Request Form

Digital Signatures on iqmis User Access Request Form Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,

More information

Blackboard Collaborate Session

Blackboard Collaborate Session Blackboard Collaborate Session What is Blackboard Collaborate? Wimba was purchased by Blackboard and has been merged with Elluminate Live! into a new platform called Blackboard Collaborate. Wimba is now

More information

U.S. Online Banking & Bill Pay Frequently Asked Questions

U.S. Online Banking & Bill Pay Frequently Asked Questions U.S. Online Banking & Bill Pay Frequently Asked Questions How do I enroll in estatements? Choosing estatements is a smart, safe and environmentally-friendly way to receive and manage your monthly account

More information

Choosing estatements is a smart, safe and environmentally-friendly way to receive and manage your monthly account information.

Choosing estatements is a smart, safe and environmentally-friendly way to receive and manage your monthly account information. U.S. Online Banking Frequently Asked Questions How do I enroll in estatements? Choosing estatements is a smart, safe and environmentally-friendly way to receive and manage your monthly account information.

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)

More information

Alan Ferretti CJIS Information Security Officer

Alan Ferretti CJIS Information Security Officer Alan Ferretti CJIS Information Security Officer AGENDA What is CJIS? What is the APB? What is new in the latest version of the CJIS Security Policy? Advanced Authentication change Mobile policy for Tablets

More information

Oracle WebCenter Content

Oracle WebCenter Content Oracle WebCenter Content 21 CFR Part 11 Certification Kim Hutchings US Data Management Phone: 888-231-0816 Email: khutchings@usdatamanagement.com Introduction In May 2011, US Data Management (USDM) was

More information

NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?

NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II? NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with

More information

Massachusetts Identity Theft/ Data Security Regulations

Massachusetts Identity Theft/ Data Security Regulations Massachusetts Identity Theft/ Data Security Regulations Effective March 1, 2010 Are You Ready? SPECIAL REPORT All We Do Is Work. Workplace Law. In four time zones and 45 major locations coast to coast.

More information

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security

More information

Payment Plan Questions & Answers

Payment Plan Questions & Answers Table of Contents What is a tuition/monthly payment plan?... 2 Who is ECSI and what do they do?... 2 How do I sign up for a tuition/monthly payment plan?... 2 How can I enroll in a tuition/monthly payment

More information

CoSign for 21CFR Part 11 Compliance

CoSign for 21CFR Part 11 Compliance CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed

More information

RSA SecurID Software Token Security Best Practices Guide

RSA SecurID Software Token Security Best Practices Guide RSA SecurID Software Token Security Best Practices Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA, the RSA

More information

Business Issues in the implementation of Digital signatures

Business Issues in the implementation of Digital signatures Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous

More information

SYSTEM REQUIREMENTS...

SYSTEM REQUIREMENTS... Contents INTRODUCTION... 1 BillQuick Online Setup Checklist... 3 SYSTEM REQUIREMENTS... 4 Hardware Requirements... 4 Software Requirements... 4 START-UP... 5 BILLQUICK ONLINE ACCOUNT... 5 BILLQUICK ONLINE

More information

TIB 2.0 Administration Functions Overview

TIB 2.0 Administration Functions Overview TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR

More information

What s it all about? SAFE-BioPharma Association

What s it all about? SAFE-BioPharma Association What s it all about? SAFE-BioPharma Association Topics! ONC HIT Standards Committee! ASTM Standards 2 SAFE-BioPharma Association ONC HIT Standards Committee! Oct 21 st meeting Security & Privacy Consumer

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure. Payment Card Industry Security Standards Over the past years, a series of new rules and regulations regarding consumer safety and identify theft have been enacted by both the government and the PCI Security

More information

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

Nuclear Regulatory Commission Computer Security Office Computer Security Standard Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-2105 Remote Access Security Standard Revision Number: 1.0 Effective

More information

How to Resolve Login Errors with Business Objects XI

How to Resolve Login Errors with Business Objects XI How to Resolve Login Errors with Business Objects XI 1. In Internet Explorer, navigate to https://reports.case.edu 2. Ensure that User name is set to your Case network ID (i.e. krm33) 3. Ensure that Password

More information

North Carolina Community Colleges Business Intelligence Reporting System

North Carolina Community Colleges Business Intelligence Reporting System North Carolina Community Colleges Business Intelligence Reporting System College User Manual Accessing Reporting System Contact Info To log in to Business Intelligence system: https://bi.nccommunitycolleges.edu

More information

CJIS Online Security Awareness Training. Vendor Guide

CJIS Online Security Awareness Training. Vendor Guide CJIS Online Security Awareness Training Vendor Guide 2015 Preface Welcome to the new CJIS Security Awareness Training software available to Texas vendors and support staff to help meet current CJIS Security

More information

Remote Access Securing Your Employees Out of the Office

Remote Access Securing Your Employees Out of the Office Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction

More information

21 CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES 21.11.2013. 21 CFR Part 11 Compliance PLA 2.1

21 CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES 21.11.2013. 21 CFR Part 11 Compliance PLA 2.1 21 CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Compliance of PLA 2.1 21.11.2013 21 CFR Part 11 Compliance PLA 2.1 SEC. 11.2 IMPLEMENTATION. (a) For records required to be maintained but not submitted

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement Please read this Agreement carefully before accessing or using Morgan Federal Bank s Online Banking Services. By accessing or using these Services, you agree to be bound by the

More information

Advanced Authentication

Advanced Authentication Architecture Overview Authasas Advanced Authentication Strong Authenticating to Novell edirectory using Domain Services for Windows November, 2011 Authasas Advanced Authentication Asterweg 19D12 1031 HL

More information

OWA/2-Factor Authentication VPN FAQ. Outlook Web Access (OWA) QUESTIONS

OWA/2-Factor Authentication VPN FAQ. Outlook Web Access (OWA) QUESTIONS Outlook Web Access (OWA) QUESTIONS Q1. With OWA and ActiveSync going away, how does an employee/contractor access Outlook (email, calendar and contacts)? A1. An employee must use their government/contractor

More information

Create your portal account, and connect to your medical records.

Create your portal account, and connect to your medical records. Create your portal account, and connect to your medical records. Follow these steps if you have not received an email invitation to register. Any questions, please email us at patientportal@raleighmedicalgroup.com

More information

WESD Online Class Registration New User Guide

WESD Online Class Registration New User Guide GoSignMeUp Website WESD Online Class Registration New User Guide Powered by: 1 Ver 3 08-27-10 WESD Online Class Registration New User Guide 2009 Washington Elementary School District, 4650 W Sweetwater

More information

Center for Educational Performance and Information (CEPI) Single Sign-On (SSO) User Guide

Center for Educational Performance and Information (CEPI) Single Sign-On (SSO) User Guide Center for Educational Performance and Information (CEPI) Single Sign-On (SSO) User Guide Questions? Contact CEPI Customer Support Email: CEPI@michigan.gov Phone: 517-335-0505 x3 Contents Contents... 2

More information

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü

More information

Mobilization Tracking Information System (MTIS) Agency Contact User Manual

Mobilization Tracking Information System (MTIS) Agency Contact User Manual Mobilization Tracking Information System (MTIS) Agency Contact User Manual Commonwealth of Office of Information Technology Kentucky 1 Table of Contents 1 Table of Contents... 2 2 Mobilization Tracking

More information

Entrust IdentityGuard

Entrust IdentityGuard +1-888-437-9783 sales@identisys.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's

More information

Print4 Solutions fully comply with all HIPAA regulations

Print4 Solutions fully comply with all HIPAA regulations HIPAA Compliance Print4 Solutions fully comply with all HIPAA regulations Print4 solutions do not access, store, process, monitor, or manage any patient information. Print4 manages and optimize printer

More information

PASSWORD MANAGEMENT POLICY OCIO-6012-09 TABLE OF CONTENTS

PASSWORD MANAGEMENT POLICY OCIO-6012-09 TABLE OF CONTENTS OFFICE OF THE CHIEF INFORMATION OFFICER PASSWORD MANAGEMENT POLICY OCIO-6012-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY

More information

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

DocuSign Quick Start Guide. Using Templates. Overview. Table of Contents

DocuSign Quick Start Guide. Using Templates. Overview. Table of Contents DocuSign Quick Start Guide Using Templates Overview This guide provides an overview of how to use a template when creating and sending an envelope. Templates help streamline the sending process when you

More information

RSA SecurID TOKEN User Guide for Initial Setup and Use Secure Access to Andes Petroleum E-mail from Internet

RSA SecurID TOKEN User Guide for Initial Setup and Use Secure Access to Andes Petroleum E-mail from Internet GLOSSARY RSA SecurID TOKEN User Guide for Initial Setup and Use Secure Access to Andes Petroleum E-mail from Internet This guide applies, if you ve assigned a RSA SecureID TOKEN. For more information or

More information

WHITE PAPER: MASSACHUSETTS DATA SECURITY REGULATIONS

WHITE PAPER: MASSACHUSETTS DATA SECURITY REGULATIONS WHITE PAPER: MASSACHUSETTS DATA SECURITY REGULATIONS Introduction Massachusetts regulations set forth minimum requirements for both the protection of personal information and the electronic storage or

More information

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014 Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology

More information

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security

More information

Ginnie Mae Enterprise Portal (GMEP) User Registration for Custodian ONLY

Ginnie Mae Enterprise Portal (GMEP) User Registration for Custodian ONLY Ginnie Mae Enterprise Portal (GMEP) User Registration for Custodian ONLY Instructions (1) Complete the information in the boxes below please print. (2) Select the requested roles(s). (3) Read the User

More information