Data classification for cloud readiness

Size: px
Start display at page:

Download "Data classification for cloud readiness"

Transcription

1 Data classificatin fr clud readiness Micrsft Trustwrthy Cmputing Trustwrthy Cmputing Data classificatin fr clud readiness

2 Legal disclaimer This dcument is fr infrmatinal purpses nly. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This dcument is prvided as-is. Infrmatin and views expressed in this dcument, including URL and ther Internet website references, may change withut ntice. Yu bear the risk f using it. Micrsft and Windws Azure are either registered trademarks r trademarks f Micrsft Crpratin in the United States and/r ther cuntries. Cpyright 2014 Micrsft Crpratin. All rights reserved. The names f actual cmpanies and prducts mentined herein may be the trademarks f their respective wners. Acknwledgments Authrs Frank Simrjay Cntributrs and Reviewers Kellie Ann Chainier Kurt Dillard Chris Hale (LCA) Carlene Heath Greg Lenti Michael Mattmiller Jim Pinter Shnt Miller (LCA) Sian Suthers Tim Rains Steve Wacker Trustwrthy Cmputing Data classificatin fr clud readiness

3 Intrductin Data classificatin prvides ne f the mst basic ways fr rganizatins t determine and assign relative values t the data they pssess. The prcess f data classificatin allws rganizatins t categrize their stred data by sensitivity and business impact in rder t determine the risks assciated with the data. After the prcess is cmpleted, rganizatins can manage their data in ways that reflect its value t them instead f treating all data the same way. Data classificatin is a cnscius, thughtful apprach that enables rganizatins t realize ptimizatins that might nt be pssible when all data is assigned the same value. Data classificatin has been used fr decades t help large rganizatins such as Micrsft, gvernments, and military entities manage the integrity f their data. This paper prvides readers with an intrductin t the fundamentals f data classificatin and highlights its value, specifically in the cntext f clud cmputing. Organizatins that are assessing clud cmputing fr future use r rganizatins that are currently using clud services and seeking ways t ptimize data management will benefit mst frm this paper. Althugh risk assessments are smetimes used by rganizatins as a starting pint fr data classificatin effrts, this paper des nt discuss a prcess fr a frmal risk assessment. Organizatins are strngly encuraged t cnsider identified risks that are specific t their business when develping a data classificatin prcess. Wh shuld read this paper This paper is primarily intended fr cnsultants, security specialists, systems architects, and IT prfessinals wh are respnsible fr planning applicatin r infrastructure develpment and deplyment fr their rganizatins. These rles include the fllwing cmmn jb descriptins: Senir executives, business analysts, and business decisin makers (BDMs) wh have critical business bjectives and requirements that need IT supprt Architects and planners wh are respnsible fr driving the architecture effrts fr their rganizatins Cnsultants and partner rganizatins wh need knwledge transfer tls fr their custmers and partners Trustwrthy Cmputing Data classificatin fr clud readiness 1

4 Data classificatin fundamentals Successful data classificatin in an rganizatin requires brad awareness f the rganizatin s needs and a thrugh understanding f where the rganizatin s data assets reside. Data exists in ne f three basic states: at rest, in prcess, and in transit. All three states require unique technical slutins fr data classificatin, but the applied principles f data classificatin shuld be the same fr each. Data that is classified as cnfidential needs t stay cnfidential when at rest, in prcess, and in transit. Data can als be either structured r unstructured. Typical classificatin prcesses fr the structured data fund in databases and spreadsheets are less cmplex and time-cnsuming t manage than thse fr unstructured data such as dcuments, surce cde, and . Generally, rganizatins will have mre unstructured data than structured data. Regardless f whether data is structured r unstructured, it is imprtant fr rganizatins t manage data sensitivity. When prperly implemented, data classificatin helps ensure that sensitive r cnfidential data assets are managed with greater versight than data assets that are cnsidered public r free t distribute. Cntrlling access t data Authenticatin and authrizatin are ften cnfused with each ther and their rles misunderstd. In reality they are quite different, as shwn in the fllwing figure. Authenticatin Authenticatin typically cnsists f at least tw parts: a username r user ID t identify a user and a tken, such as a passwrd, t cnfirm that the username credential is valid. The prcess des nt prvide the authenticated user with access t any items r services; it verifies that the user is wh they say they are. Trustwrthy Cmputing Data classificatin fr clud readiness 2

5 Authrizatin Authrizatin is the prcess f prviding an authenticated user the ability t access an applicatin, data set, data file, r sme ther bject. Assigning authenticated users the rights t use, mdify, r delete items that they can access requires attentin t data classificatin. Successful authrizatin requires implementatin f a mechanism t validate individual users needs t access files and infrmatin based n a cmbinatin f rle, security plicy, and risk plicy cnsideratins. Fr example, data frm specific line-f-business (LOB) applicatins might nt need t be accessed by all emplyees, and nly a small subset f emplyees will likely need access t human resurces (HR) files. But fr rganizatins t cntrl wh can access data, as well as when and hw, an effective system fr authenticating users must be in place. Rles and respnsibilities in clud cmputing Authrizatin requires an essential understanding f the rles and respnsibilities f rganizatins, clud prviders, and custmers. Clud prviders must have peratinal practices in place t prevent unauthrized access t custmer data; it s als imprtant t nte that any cmpliance requirements a custmer rganizatin has must als be supprted by the prvider. Althugh clud prviders can help manage risks, custmers need t ensure that data classificatin management and enfrcement is prperly implemented t prvide the apprpriate level f data management services. Data classificatin respnsibilities will vary based n which clud service mdel is in place, as shwn in the fllwing figure. The three primary clud service mdels are infrastructure as a service (IaaS), platfrm as a service (PaaS), and sftware as a service (SaaS). Implementatin f data classificatin mechanisms will als vary based n the reliance n and expectatins f the clud prvider. Trustwrthy Cmputing Data classificatin fr clud readiness 3

6 Althugh custmers are respnsible fr classifying their data, clud prviders shuld make written cmmitments t custmers abut hw they will secure and maintain the privacy f the custmer data stred within their clud. These cmmitments shuld include infrmatin abut privacy and security practices, data use limitatins, and regulatry cmpliance. In additin, clud prviders shuld make certificatins and audit reprts that demnstrate cmpliance with standards such as the Internatinal Organizatin fr Standardizatin (ISO) and cntrls such as the American Institute f CPAs Service Organizatin Cntrls (SOC1 and SOC2) available s custmers can verify the effectiveness f their clud prvider s practices. Having this infrmatin will help custmers understand whether the clud prvider supprts the data prtectin requirements mandated by their data classificatin. Custmers shuld nt migrate data t a clud prvider that cannt address their data prtectin needs. IaaS prviders. Frm a data classificatin perspective, IaaS prvider requirements are limited t ensuring that the virtual envirnment can accmmdate data classificatin capabilities and custmer cmpliance requirements. IaaS prviders have a smaller rle in data classificatin because they nly need t ensure that custmer data addresses cmpliance requirements. Trustwrthy Cmputing Data classificatin fr clud readiness 4

7 Hwever, prviders must still ensure that their virtual envirnments address data classificatin requirements in additin t securing their data centers. PaaS prviders. Respnsibilities may be mixed, because the platfrm culd be used in a layered apprach t prvide security fr a classificatin tl. PaaS prviders may be respnsible fr authenticatin and pssibly sme authrizatin rules, and must prvide security and data classificatin capabilities t their applicatin layer. Much like IaaS prviders, PaaS prviders need t ensure that their platfrm cmplies with any relevant data classificatin requirements. SaaS prviders will frequently be cnsidered as part f an authrizatin chain, and will need t ensure that the data stred in the SaaS applicatin can be cntrlled by classificatin type. SaaS applicatins can be used fr LOB applicatins, and by their very nature need t prvide the means t authenticate and authrize data that is used and stred. Cmpliance cnsideratins In additin, rganizatins that are cnsidering clud slutins and need t cmply with regulatry requirements can benefit by wrking with clud prviders that cmply with regulatins such as FedRAMP, U.S. HIPAA, EU Data Prtectin Directive, and thers listed in Appendix 1. Hwever, t achieve cmpliance, such rganizatins need t remain aware f their classificatin bligatins and be able t manage the classificatin f data that they stre in the clud. Fr example, the Clud Security Alliance identifies the fllwing data classificatin cntrl requirement in its Clud Cntrl Matrix: The Clud Security Alliance s Clud Cntrl Matrix questin n Data Gvernance Classificatin (CCM DG-02 CCM DSI-03) Data Gvernance Classificatin (cntrl) frm the CCM states that: Data, and bjects cntaining data, need t be assigned a classificatin based n data type, jurisdictin f rigin, jurisdictin dmiciled, cntext, legal cnstraints, cntractual cnstraints, value, sensitivity, criticality t the rganizatin and third party bligatin fr retentin and preventin f unauthrized disclsure r misuse. Trustwrthy Cmputing Data classificatin fr clud readiness 5

8 Classificatin prcess Many rganizatins that understand the need fr data classificatin and want t implement it face a basic challenge: where t begin? One effective and simple way t implement data classificatin is t use the PLAN, DO, CHECK, ACT mdel frm MOF. The fllwing figure charts the tasks that are required t successfully implement data classificatin in this mdel. 1. PLAN. Identify data assets, a data custdian t deply the classificatin prgram, and develp prtectin prfiles. 2. DO. After data classificatin plicies are agreed upn, deply the prgram and implement enfrcement technlgies as needed fr cnfidential data. 3. CHECK. Check and validate reprts t ensure that the tls and methds being used are effectively addressing the classificatin plicies. 4. ACT. Review the status f data access and review files and data that require revisin using a reclassificatin and revisin methdlgy t adpt changes and t address new risks. Trustwrthy Cmputing Data classificatin fr clud readiness 6

9 Select a terminlgy mdel that addresses yur needs Several types f prcesses exist fr classifying data, including manual prcesses, lcatin-based prcesses that classify data based n a user s r system s lcatin, applicatin-based prcesses such as database-specific classificatin, and autmated prcesses used by varius technlgies, sme f which are described in the Prtecting cnfidential data sectin later in this paper. This paper intrduces tw generalized terminlgy mdels that are based n well-used and industry-respected mdels. These terminlgy mdels, bth f which prvide three levels f classificatin sensitivity, are shwn in the fllwing table. Nte: When classifying a file r resurce that cmbines data that wuld typically be classified at differing levels, the highest level f classificatin present shuld establish the verall classificatin. Fr example, a file cntaining sensitive and restricted data shuld be classified as restricted. Sensitivity Terminlgy mdel 1 Terminlgy mdel 2 High Cnfidential Restricted Medium Fr internal use nly Sensitive Lw Public Unrestricted Cnfidential (restricted). Infrmatin that is classified as cnfidential r restricted includes data that can be catastrphic t ne r mre individuals and/r rganizatins if cmprmised r lst. Such infrmatin is frequently prvided n a need t knw basis and might include: Persnal data, including persnally identifiable infrmatin such as Scial Security r natinal identificatin numbers, passprt numbers, credit card numbers, driver's license numbers, medical recrds, and health insurance plicy ID numbers. Financial recrds, including financial accunt numbers such as checking r investment accunt numbers. Business material, such as dcuments r data that is unique r specific intellectual prperty. Legal data, including ptential attrney-privileged material. Authenticatin data, including private cryptgraphy keys, username passwrd pairs, r ther identificatin sequences such as private bimetric key files. Data that is classified as cnfidential frequently has regulatry and cmpliance requirements fr data handling. Specifics f sme f these requirements are listed in Appendix 1. Fr internal use nly (sensitive). Infrmatin that is classified as being f medium sensitivity includes files and data that wuld nt have a severe impact n an individual and/r rganizatin if lst r destryed. Such infrmatin might include: Trustwrthy Cmputing Data classificatin fr clud readiness 7

10 , mst f which can be deleted r distributed withut causing a crisis (excluding mailbxes r frm individuals wh are identified in the cnfidential classificatin). Dcuments and files that d nt include cnfidential data. Generally, this classificatin includes anything that is nt cnfidential. This classificatin can include mst business data, because mst files that are managed r used day-t-day can be classified as sensitive. With the exceptin f data that is made public r is cnfidential, all data within a business rganizatin can be classified as sensitive by default. Public (unrestricted). Infrmatin that is classified as public includes data and files that are nt critical t business needs r peratins. This classificatin can als include data that has deliberately been released t the public fr their use, such as marketing material r press annuncements. In additin, this classificatin can include data such as spam messages stred by an service. Define data wnership It s imprtant t establish a clear custdial chain f wnership fr all data assets. The fllwing table identifies different data wnership rles in data classificatin effrts and their respective rights. Nte: This table des nt prvide an exhaustive list f rles and rights, but merely a representative sample. Rle Create Mdify/delete Delegate Read Archive/restre Owner X X X X X Custdian X Administratr User* X X X *Users may be granted additinal rights such as edit and delete by a custdian. The data asset wner is the riginal creatr f the data, wh can delegate wnership and assign a custdian. When a file is created, the wner shuld be able t assign a classificatin, which means that they have a respnsibility t understand what needs t be classified as cnfidential based n their rganizatin s plicies. All f a data asset wner s data can be aut-classified as fr internal use nly (sensitive) unless they are respnsible fr wning r creating cnfidential (restricted) data types. Frequently, the wner s rle will change after the data is classified. Fr example, the wner might create a database f classified infrmatin and relinquish their rights t the data custdian. Trustwrthy Cmputing Data classificatin fr clud readiness 8

11 Nte regarding persnal data: Data asset wners ften use a mixture f services, devices, and media, sme f which are persnal and sme f which belng t the rganizatin. A clear rganizatinal plicy can help ensure that usage f devices such as laptps and smart devices is in accrdance with data classificatin guidelines. The data asset custdian is assigned by the asset wner (r their delegate) t manage the asset accrding t agreements with the asset wner r in accrdance with applicable plicy requirements. Ideally, the custdian rle can be implemented in an autmated system. An asset custdian ensures that necessary access cntrls are prvided and is respnsible fr managing and prtecting assets delegated t their care. The respnsibilities f the asset custdian culd include: Prtecting the asset in accrdance with the asset wner s directin r in agreement with the asset wner Ensuring that classificatin plicies are cmplied with Infrming asset wners f any changes t agreed-upn cntrls and/r prtectin prcedures prir t thse changes taking effect Reprting t the asset wner abut changes t r remval f the asset custdian s respnsibilities An administratr represents a user wh is respnsible fr ensuring that integrity is maintained, but they are nt a data asset wner, custdian, r user. In fact, many administratr rles prvide data cntainer management services withut having access t the data. The administratr rle includes backup and restratin f the data, maintaining recrds f the assets, and chsing, acquiring, and perating the devices and strage that huse the assets. The asset user includes anyne wh is granted access t data r a file. Access assignment is ften delegated by the wner t the asset custdian. Implementatin Management cnsideratins apply t all classificatin methdlgies. These cnsideratins need t include details abut wh, what, where, when, and why a data asset wuld be used, accessed, changed, r deleted. All asset management must be dne with an understanding f hw an rganizatin views its risks, but a simple methdlgy can be applied as defined in the data classificatin prcess. Additinal cnsideratins fr data classificatin include the intrductin f new applicatins and tls, and managing change after a classificatin methd is implemented. Reclassificatin Reclassifying r changing the classificatin state f a data asset needs t be dne when a user r system determines that the data asset s imprtance r risk prfile has changed. This effrt is imprtant fr ensuring that the classificatin status cntinues t be current and valid. Mst Trustwrthy Cmputing Data classificatin fr clud readiness 9

12 cntent that is nt classified manually can be classified autmatically r based n usage by a data custdian r data wner. Manual data reclassificatin. Ideally, this effrt wuld ensure that the details f a change are captured and audited. The mst likely reasn fr manual reclassificatin wuld be fr reasns f sensitivity, r fr recrds kept in paper frmat, r a requirement t review data that was riginally misclassified. Because this paper cnsiders data classificatin and mving data t the clud, manual reclassificatin effrts wuld require attentin n a case-by-case basis and a risk management review wuld be ideal t address classificatin requirements. Generally, such an effrt wuld cnsider the rganizatin s plicy abut what needs t be classified, the default classificatin state (all data and files being sensitive but nt cnfidential), and take exceptins fr high-risk data. Autmatic data reclassificatin uses the same general rule as manual classificatin. The exceptin is that autmated slutins can ensure that rules are fllwed and applied as needed. Data classificatin can be dne as part f a data classificatin enfrcement plicy, which can be enfrced when data is stred, in use, and in transit using authrizatin technlgy. Applicatin-based. Using certain applicatins by default sets a classificatin level. Fr example, data frm custmer relatinship management (CRM) sftware, HR, and health recrd management tls is cnfidential by default. Lcatin-based. Data lcatin can help identify data sensitivity. Fr example, data that is stred by an HR r financial department is mre likely t be cnfidential in nature. Data retentin, recvery, and dispsal Data recvery and dispsal, like data reclassificatin, is an essential aspect f managing data assets. The principles fr data recvery and dispsal wuld be defined by a data retentin plicy and enfrced in the same manner as data reclassificatin; such an effrt wuld be perfrmed by the custdian and administratr rles as a cllabrative task. Failure t have a data retentin plicy culd mean data lss r failure t cmply with regulatry and legal discvery requirements. Mst rganizatins that d nt have a clearly defined data retentin plicy tend t use a default keep everything retentin plicy. Hwever, such a retentin plicy has additinal risks in clud services scenaris. Fr example, a data retentin plicy fr clud service prviders can be cnsidered as fr the duratin f the subscriptin (as lng as the service is paid fr, the data is retained). Such a pay-fr-retentin agreement may nt address crprate r regulatry retentin plicies. Defining a plicy fr cnfidential data can ensure that data is stred and remved based n best practices. In additin, an archival plicy can be created t frmalize an understanding abut what data shuld be dispsed f and when. Trustwrthy Cmputing Data classificatin fr clud readiness 10

13 Data retentin plicy shuld address the required regulatry and cmpliance requirements, as well as crprate legal retentin requirements. Classified data might prvke questins abut retentin duratin and exceptins fr data that has been stred with a prvider; such questins are mre likely fr data that has nt been classified crrectly. Trustwrthy Cmputing Data classificatin fr clud readiness 11

14 Prtecting cnfidential data After data is classified, finding and implementing ways t prtect cnfidential data becmes an integral part f any data prtectin deplyment strategy. Prtecting cnfidential data requires additinal attentin t hw data is stred and transmitted in cnventinal architectures as well as in the clud. This sectin prvides basic infrmatin abut sme technlgies that can autmate enfrcement effrts t help prtect data that has been classified as cnfidential. As the fllwing figure shws, these technlgies can be deplyed as n-premises r cludbased slutins r in a hybrid fashin, with sme f them deplyed n-premises and sme in the clud. (Sme technlgies, such as encryptin and rights management, als extend t user devices.) Rights management sftware One slutin fr preventing data lss is rights management sftware. Unlike appraches that attempt t interrupt the flw f infrmatin at exit pints in an rganizatin, rights management sftware wrks at deep levels within data strage technlgies. Dcuments are Trustwrthy Cmputing Data classificatin fr clud readiness 12

15 encrypted, and cntrl ver wh can decrypt them uses access cntrls that are defined in an authenticatin cntrl slutin such as a directry service. Sme f the benefits f rights management sftware include: Safeguarded sensitive infrmatin. Users can prtect their data directly using rights management-enabled applicatins. N additinal steps are required authring dcuments, sending , and publishing data ffer a cnsistent data prtectin experience. Prtectin travels with the data. Custmers remain in cntrl f wh has access t their data, whether in the clud, existing IT infrastructure, r at the user s desktp. Organizatins can chse t encrypt their data and restrict access accrding t their business requirements. Default infrmatin prtectin plicies. Administratrs and users can use standard plicies fr many cmmn business scenaris, such as "Cmpany Cnfidential Read Only" and "D Nt Frward." A rich set f usage rights are supprted such as read, cpy, print, save, edit, and frward t allw flexibility in defining custm usage rights. Mre infrmatin abut using rights management slutins in Micrsft envirnments is available in the fllwing links: The Desktp Files Data Lss Preventin with Enterprise Rights Management in TechNet magazine The Infrmatin Rights Management page n TechNet This Windws Azure Active Directry Rights blg pst This Micrsft Rights Management blg pst Encryptin gateways Encryptin gateways perate in their wn layers t prvide encryptin services by reruting all access t clud-based data. This apprach shuld nt be cnfused with that f a virtual private netwrk (VPN); encryptin gateways are designed t prvide a transparent layer t clud-based slutins. Encryptin gateways can prvide a means t manage and secure data that has been classified as cnfidential by encrypting the data in transit as well as data at rest. Encryptin gateways are placed int the data flw between user devices and applicatin data centers t prvide encryptin/decryptin services. These slutins, like VPNs, are predminantly n-premises slutins. They are designed t prvide a third party with cntrl ver encryptin keys, which helps reduce the risk f placing bth the data and key management with ne prvider. Such slutins are designed, much like encryptin, t wrk seamlessly and transparently between users and the service. Trustwrthy Cmputing Data classificatin fr clud readiness 13

16 Data lss preventin Data lss (smetimes referred t as data leakage) is an imprtant cnsideratin, and the preventin f external data lss via malicius and accidental insiders is paramunt fr many rganizatins. Data lss preventin (DLP) technlgies can help ensure that slutins such as services d nt transmit data that has been classified as cnfidential. Organizatins can take advantage f DLP features in existing prducts t help prevent data lss. Such features use plicies that can be easily created frm scratch r by using a template supplied by the sftware prvider. DLP technlgies can perfrm deep cntent analysis thrugh keywrd matches, dictinary matches, regular expressin evaluatin, and ther cntent examinatin t detect cntent that vilates rganizatinal DLP plicies. Fr example, DLP can help prevent the lss f the fllwing types f data: Scial Security and natinal identificatin numbers Banking infrmatin Credit card numbers IP addresses Sme DLP technlgies als prvide the ability t verride the DLP cnfiguratin (fr example, if an rganizatin needs t transmit Scial Security number infrmatin t a payrll prcessr). In additin, it s pssible t cnfigure DLP s that users are ntified befre they even attempt t send sensitive infrmatin that shuld nt be transmitted. A technical verview f the DLP features in Micrsft Exchange Server 2013 and Exchange Online is available n the Data Lss Preventin page n Micrsft TechNet. Cnclusin Generally, the tpic f data classificatin des nt generate as much interest as ther, mre exciting technlgy tpics. Hwever, data classificatin can yield significant benefits, such as cmpliance efficiencies, imprved ways t manage the rganizatin s resurces, and facilitatin f migratin t the clud. Althugh data classificatin effrts can be cmplex undertakings and require risk assessment fr successful implementatin, quicker and simpler effrts can als yield benefits. Any data classificatin effrt shuld endeavr t understand the needs f the rganizatin and be aware hw data is stred, prcessing capabilities, and hw data is transmitted thrughut the rganizatin. Trustwrthy Cmputing Data classificatin fr clud readiness 14

17 It s imprtant fr management t supprt data classificatin effrts, and fr IT t be invlved as well. The cncept f classificatin may seem primarily t be an auditing functin, but many technlgy slutins are available that can reduce the amunt f effrt that is required t successfully implement a data classificatin mdel. It s als wrth nting that data classificatin rules that pertain t data retentin must be addressed when mving t the clud, and that clud slutins can help mitigate risk. Sme data prtectin technlgies such as encryptin, rights management, and data lss preventin slutins have mved t the clud and can help mitigate clud risks. Althugh this paper did nt specifically discuss hybrid envirnments, a mixture f n-premises and clud-based data classificatin technlgies can help effectively reduce risk fr rganizatins f any size by prviding mre cntrl abut where data is stred, which gives custmers the ptin t keep highly sensitive data n-premises and under a different set f cntrls than data stred in the clud. Indeed, hybrid envirnments are likely t be the way f the future, and the key t effective data management may well depend n effective data classificatin. Trustwrthy Cmputing Data classificatin fr clud readiness 15

18 Appendix 1: Data classificatin regulatins, cmpliance requirements, and standards The fllwing table identifies sample cntrl bjective definitins. This list is nt cmplete r authritative, and shuld nly be used as a discussin pint t cnsider when mving services t a clud slutin. US regulatin, requirement, r standard NIST SP R3 Natinal Institute f Standards and Technlgy PCI DSS v2.0 Payment Card Industry Data Security Standard NERC CIP Nrth American Electric Reliability Crpratin Critical Infrastructure Prtectin FedRAMP Federal Risk and Authrizatin Management Prgram AICPA SOC2 American Institute f CPAs Service Organizatin Cntrls Cntrl details RA-2 Security Categrizatin AC-4 Infrmatin Flw Enfrcement Classify media s the sensitivity f the data can be determined Destry media when it is n lnger needed fr business r legal reasns Develp usage plicies fr critical technlgies (fr example, remte-access technlgies, wireless technlgies, remvable electrnic media, laptps, tablets, persnal data/digital assistants (PDAs), usage and Internet usage) and define prper use f these technlgies. CIP R4 - R5 - Respnsible Entities have minimum security management cntrls in place t prtect Critical Cyber Assets. RA-2 Security Categrizatin AC-4 Infrmatin Flw Enfrcement (S3.8.0) Prcedures exist t classify data in accrdance with classificatin plicies and peridically mnitr and update such classificatins as necessary. (C3.14.0) Prcedures exist t prvide that system data are classified in accrdance with the defined cnfidentiality and related security plicies. Trustwrthy Cmputing Data classificatin fr clud readiness 16

19 Internatinal regulatin, requirement, r standard ENISA IAF Eurpean Unin Agency fr Netwrk and Infrmatin Security Infrmatin Assurance Framewrk ISO/IEC Internatinal Organizatin fr Standardizatin / Internatinal Electrtechnical Cmmissin Cntrl details 6.05.(c) Asset management - classificatin, segmentatin Emplyees bliged t adhere t regulatins n infrmatin security, data prtectin, adequate handling f custmer data A Classificatin guidelines Trustwrthy Cmputing Data classificatin fr clud readiness 17

20 Appendix 2: Glssary f terms Archive and recvery. As discussed in this paper, the lng-term strage f data and its retrieval when it needs t be returned t service. Archival and recvery methds must cnfrm t the retentin mdel that is used. Authenticatin. A prcess that cnfirms that a user (identified by a username r user ID) is valid thrugh use f a tken r passwrd. This prcess verifies that the user is wh they say they are. Authrizatin. A prcess that prvides an authenticated user with the ability t access an applicatin, data set, data file, r sme ther bject. Clud. The NIST Definitin f Clud Cmputing (PDF) states: Clud cmputing is a mdel fr enabling ubiquitus, cnvenient, n-demand netwrk access t a shared pl f cnfigurable cmputing resurces (e.g., netwrks, servers, strage, applicatins, and services) that can be rapidly prvisined and released with minimal management effrt r service prvider interactin. This clud mdel is cmpsed f five essential characteristics, three service mdels, and fur deplyment mdels. Clud Security Alliance. The Clud Security Alliance (CSA) is a nt-fr-prfit rganizatin with a missin t prmte the use f best practices fr prviding security assurance within clud cmputing, and t prvide educatin n the uses f clud cmputing t help secure all ther frms f cmputing. The Clud Security Alliance is led by a brad calitin f industry practitiners, crpratins, assciatins, and ther key stakehlders. Clud Cntrl Matrix. The Clud Security Alliance Clud Cntrls Matrix (CCM) is specifically designed t prvide fundamental security principles t guide clud vendrs and t assist prspective clud custmers in assessing the verall security risk f a clud prvider. As a framewrk, the CSA CCM prvides rganizatins with essential structure, detail, and clarity with regard t infrmatin security as it relates t the clud industry. Data dispsal. As discussed in this paper, the plicies, timeframes, and methds fr secure dispsal f data. Dispsal plicy may require the destructin f data using strng deletin methds r shredding f disks. Data dispsal plicies require the same care as data retentin plicies. Mre infrmatin is available at Trustwrthy Cmputing Data classificatin fr clud readiness 18

21 Data retentin. As discussed in this paper, the plicies, timeframes, and methds fr string, archiving, and retrieving data. Data retentin plicy shuld reflect the data classificatin mdel and data retentin rules that apply t the data that is being retained. Fr example, highly sensitive data may be retained fr a lnger perids than data that is less sensitive. Mre infrmatin is available at Separatin f duty. As discussed in this paper, the divisin f respnsibilities in an IT envirnment that helps ensure that n ne persn can use IT resurces fr their persnal benefit r cause IT-related utcmes that are detrimental t the rganizatin. One f the mst cmmn ways t achieve separatin f duty is t use a rle-based access cntrl system fr authrizatin. Mre infrmatin is available at Spam. Any kind f unwanted nline cmmunicatin. The mst cmmn frm f spam is unwanted , but text message spam, instant message spam (smetimes knwn as spam), and scial netwrking spam als exist. Sme spam is annying but harmless, but smetimes spam is used in identity theft r ther types f fraud. Structured data. Data that is typically human readable and able t be indexed by machine. This data type incudes databases and spreadsheets. Mre infrmatin is available at Tken. An item that is used t authenticate a username r user ID. A tken can be smething a user pssesses, such as a card key, smething that is bimetrics-based, such as a fingerprint, retinal scan, r vice print, r smething that is knwn, such as a passwrd. Mre infrmatin is available at Unstructured data. Data that is nt human readable and is difficult t index. This data type includes surce cde, binaries, and dcuments, and can include such things as because the data is typically randmly managed. Trustwrthy Cmputing Data classificatin fr clud readiness 19

22 Trustwrthy Cmputing Data classificatin fr clud readiness

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

Chapter 7 Business Continuity and Risk Management

Chapter 7 Business Continuity and Risk Management Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity

More information

Presentation: The Demise of SAS 70 - What s Next?

Presentation: The Demise of SAS 70 - What s Next? Presentatin: The Demise f SAS 70 - What s Next? September 15, 2011 1 Presenters: Jeffrey Ziplw - Partner BlumShapir Jennifer Gerasimv Senir Manager Delitte. SAS 70 Backgrund and Overview Purpse f a SAS

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information

Change Management Process

Change Management Process Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

BYOD and Cloud Computing

BYOD and Cloud Computing BYOD and Clud Cmputing AIIM First Canadian Chapter May 22, 2014 Susan Nickle, Lndn Health Sciences Centre Chuck Rthman, Wrtzmans Sheila Taylr, Erg Infrmatin Management Cnsulting Clud cmputing Agenda What

More information

Network Security Trends in the Era of Cloud and Mobile Computing

Network Security Trends in the Era of Cloud and Mobile Computing Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt

More information

RSA SecurID Software Token Security Best Practices Guide. Version 3

RSA SecurID Software Token Security Best Practices Guide. Version 3 RSA SecurID Sftware Tken Security Best Practices Guide Versin 3 Cntact Infrmatin G t the RSA crprate web site fr reginal Custmer Supprt telephne and fax numbers: www.rsa.cm. Trademarks RSA, the RSA Lg

More information

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

Licensing Windows Server 2012 R2 for use with virtualization technologies

Licensing Windows Server 2012 R2 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents

More information

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

How To Ensure Your Health Care Is Safe

How To Ensure Your Health Care Is Safe Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

IMT Standards. Standard number A000014. GoA IMT Standards. Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical

IMT Standards. Standard number A000014. GoA IMT Standards. Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical IMT Standards IMT Standards Oversight Cmmittee Gvernment f Alberta Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical Standard number A000014 Electrnic Signature Metadata

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act

More information

Licensing Windows Server 2012 for use with virtualization technologies

Licensing Windows Server 2012 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This

More information

Business Continuity Management Systems Foundation Training Course

Business Continuity Management Systems Foundation Training Course Certificatin criteria fr Business Cntinuity Management Systems Fundatin Training Curse CONTENTS 1. INTRODUCTION 2. LEARNING OBJECTIVES 3. ENABLING OBJECTIVES KNOWLEDGE & SKILLS 4. TRAINING METHODS 5. COURSE

More information

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel

More information

Creating an Ethical Culture and Protecting Your Bottom Line:

Creating an Ethical Culture and Protecting Your Bottom Line: Creating an Ethical Culture and Prtecting Yur Bttm Line: Best Practices fr Crprate Cdes f Cnduct Nte: The infrmatin belw and all infrmatin n this website is nt meant t be taken as legal advice. Please

More information

Vendor Management. Federal Deposit Insurance Corporation Division of Risk Management Supervision Atlanta Regional Office.

Vendor Management. Federal Deposit Insurance Corporation Division of Risk Management Supervision Atlanta Regional Office. Vendr Management Federal Depsit Insurance Crpratin Divisin f Risk Management Supervisin Atlanta Reginal Office June 18, 2014 1 Agenda Intrductin Vendr Management Overview Regulatry Expectatins Bard and

More information

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles

More information

Corporate Standards for data quality and the collation of data for external presentation

Corporate Standards for data quality and the collation of data for external presentation The University f Kent Crprate Standards fr data quality and the cllatin f data fr external presentatin This paper intrduces a set f standards with the aim f safeguarding the University s psitin in published

More information

Ensuring end-to-end protection of video integrity

Ensuring end-to-end protection of video integrity White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring

More information

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013 Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,

More information

HEAL-Link Federation Higher Education & Research. Exhibit 2. Technical Specifications & Attribute Specifications

HEAL-Link Federation Higher Education & Research. Exhibit 2. Technical Specifications & Attribute Specifications HEAL-Link Federatin Higher Educatin & Research Exhibit 2 Technical Specificatins & Attribute Specificatins Trust Relatinship Trust relatinship amng the federatin, federatin members and federatin partners

More information

The ADVANTAGE of Cloud Based Computing:

The ADVANTAGE of Cloud Based Computing: The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has

More information

Introduction to Mindjet MindManager Server

Introduction to Mindjet MindManager Server Intrductin t Mindjet MindManager Server Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 mindjet.cm 2013 Mindjet. All Rights

More information

System Business Continuity Classification

System Business Continuity Classification Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

Professional Leaders/Specialists

Professional Leaders/Specialists Psitin Prfile Psitin Lcatin Reprting t Jb family Band BI/Infrmatin Manager Wellingtn Prfessinal Leaders/Specialists Band I Date February 2013 1. POSITION PURPOSE The purpse f this psitin is t: Lead and

More information

MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016

MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 The Manitba Securities Cmmissin (the Cmmissin) is a divisin f the Manitba Financial Services Agency (MFSA). The ther divisin is the Financial Institutins

More information

Integrating With incontact dbprovider & Screen Pops

Integrating With incontact dbprovider & Screen Pops Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint

More information

POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES

POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES M. PĘCIŁŁO Central Institute fr Labur Prtectin ul. Czerniakwska

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT Suth Australia Plice POSITION INFORMATION DOCUMENT Stream: Career Grup: Discipline: Classificatin: Service: Branch: Psitin Title: Administrative Services Cnsultancy and Infrmatin AO ASO-6 Infrmatin Systems

More information

ITIL V3 Planning, Protection and Optimization (PPO) Certification Program - 5 Days

ITIL V3 Planning, Protection and Optimization (PPO) Certification Program - 5 Days ITIL V3 Planning, Prtectin and Optimizatin (PPO) Certificatin Prgram - 5 Days Prgram Overview The ITIL Intermediate Qualificatin: Planning, Prtectin and Optimizatin (PPO) Certificate is a free-standing

More information

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

Organisational self-migration guide an overview V1-5 April 2014

Organisational self-migration guide an overview V1-5 April 2014 Organisatinal self-migratin guide an verview V1-5 April 2014 Cpyright 2013, Health and Scial Care Infrmatin Centre. 1 Self Migratin t NHSmail an verview fr rganisatins Cntents Intrductin 3 1. Initial preparatins

More information

New York Institute of Technology Faculty and Staff Email Retention Policy

New York Institute of Technology Faculty and Staff Email Retention Policy New Yrk Institute f Technlgy Faculty and Staff Email Retentin Plicy Nvember 2013 I. PURPOSE As electrnic mail (email) has becme the primary frm f cmmunicatin at NYIT and thrughut the wrld, the vlume f

More information

White Paper. SharePoint and the Consumerization of IT: Considerations for BYOD Success. Authors: Aseem Pandit and Prateek Bhargava

White Paper. SharePoint and the Consumerization of IT: Considerations for BYOD Success. Authors: Aseem Pandit and Prateek Bhargava White Paper SharePint and the Cnsumerizatin f IT: Cnsideratins fr BYOD Success Authrs: Aseem Pandit and Prateek Bhargava The Evlutin f IT Cnsumerizatin & BYOD BYOD refers t the plicy f permitting emplyees

More information

Password Reset for Remote Users

Password Reset for Remote Users 1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

EA-POL-015 Enterprise Architecture - Encryption Policy

EA-POL-015 Enterprise Architecture - Encryption Policy Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

Build the cloud OpenStack Installation & Configuration Integration with existing tools and processes Cloud Migration

Build the cloud OpenStack Installation & Configuration Integration with existing tools and processes Cloud Migration Slutin Brief OpenStack Services OVERVIEW OnX understands clud adptin challenges f glbal enterprise cmpanies and helps Enterprises adpt OpenStack slutins thrugh targeted services. We ffer vertical industry

More information

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...

More information

A. Early Case Assessment

A. Early Case Assessment Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering

More information

Better Practice Guide Financial Considerations for Government use of Cloud Computing

Better Practice Guide Financial Considerations for Government use of Cloud Computing Better Practice Guide Financial Cnsideratins fr Gvernment use f Clud Cmputing Nvember 2011 Intrductin Many Australian Gvernment agencies are in the prcess f cnsidering the adptin f clud-based slutins.

More information

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position Psitin Title I.T Prject Officer Classificatin Higher Educatin Wrker, Level 7 Respnsible t The Psitin I.T Manager The psitin assists with the cmpletin f varius IT prjects intended t enable the nging administratin

More information

National Australia Bank Limited Group Disclosure & External Communications Policy

National Australia Bank Limited Group Disclosure & External Communications Policy Natinal Australia Bank Limited Grup Disclsure & External Cmmunicatins Plicy Grup Disclsure & External Cmmunicatins Plicy Page 2 f 7 Grup Disclsure & External Cmmunicatins Plicy ( the Plicy ) 1. Overview

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

MigrationWiz HIPAA Compliant Migration. Focus on data migration, not regulation. BitTitan Global Headquarters: 3933 Lake Washington Blvd NE Suite 200

MigrationWiz HIPAA Compliant Migration. Focus on data migration, not regulation. BitTitan Global Headquarters: 3933 Lake Washington Blvd NE Suite 200 MigratinWiz HIPAA Cmpliant Migratin Fcus n data migratin, nt regulatin. BitTitan Glbal Headquarters: 3933 Lake Washingtn Blvd NE Suite 200 Table f Cntents Kirkland, WA 98033 www.bittitan.cm sales@bittitan.cm

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

Internal Audit Charter and operating standards

Internal Audit Charter and operating standards Internal Audit Charter and perating standards 2 1 verview This dcument sets ut the basis fr internal audit: (i) the Internal Audit charter, which establishes the framewrk fr Internal Audit; and (ii) hw

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. Statement of Thomas F. O Brien. Vice President & Chief Information Officer

UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. Statement of Thomas F. O Brien. Vice President & Chief Information Officer UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION Revised Critical Infrastructure Prtectin Reliability Standards Dcket N. RM15-14-000 Statement f Thmas F. O Brien Vice President & Chief Infrmatin

More information

PCI DSS Cloud Computing Guidelines

PCI DSS Cloud Computing Guidelines Standard: PCI Data Security Standard (PCI DSS) Versin: 2.0 Date: February 2013 Authr: Clud Special Interest Grup PCI Security Standards Cuncil Infrmatin Supplement: PCI DSS Clud Cmputing Guidelines Table

More information

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012 Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

Process of Setting up a New Merchant Account

Process of Setting up a New Merchant Account Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am

More information

ITIL Release Control & Validation (RCV) Certification Program - 5 Days

ITIL Release Control & Validation (RCV) Certification Program - 5 Days ITIL Release Cntrl & Validatin (RCV) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management

More information

URM 11g Implementation Tips, Tricks & Gotchas ALAN MACKENTHUN FISHBOWL SOLUTIONS, INC.

URM 11g Implementation Tips, Tricks & Gotchas ALAN MACKENTHUN FISHBOWL SOLUTIONS, INC. URM 11g Implementatin Tips, Tricks & Gtchas ALAN MACKENTHUN FISHBOWL SOLUTIONS, INC. i Fishbwl Slutins Ntice The infrmatin cntained in this dcument represents the current view f Fishbwl Slutins, Inc. n

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

Managing Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite

Managing Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite Managing Access and Help Prtect Crprate Email Data n Mbile Devices with Enterprise Mbile Suite Last updated: 7/15/15 Balancing prductivity and security Emplyees want t be able t use their wn devices t

More information

System Business Continuity Classification

System Business Continuity Classification System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality

More information

SMART Active Directory Migrator 9.0.2. Requirements

SMART Active Directory Migrator 9.0.2. Requirements SMART Active Directry Migratr 9.0.2 January 2016 Table f Cntents... 3 SMART Active Directry Migratr Basic Installatin... 3 Wrkstatin and Member Server System... 5 Netwrking... 5 SSL Certificate... 6 Service

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling

More information

Mobile Deployment Guide For Apple ios

Mobile Deployment Guide For Apple ios Fr Apple ios Cpyright This dcument is prtected by the United States cpyright laws, and is prprietary t Zscaler Inc. Cpying, reprducing, integrating, translating, mdifying, enhancing, recrding by any infrmatin

More information

CMS Eligibility Requirements Checklist for MSSP ACO Participation

CMS Eligibility Requirements Checklist for MSSP ACO Participation ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.

More information