ISMF Standard 141 Endpoint Protection. OCIO/S4.6 Government standard on cyber security

Size: px
Start display at page:

Download "ISMF Standard 141 Endpoint Protection. OCIO/S4.6 Government standard on cyber security"

Transcription

1 ISMF Standard 141 OCIO/S4.6 Gvernment standard n cyber security Prepared by: Office f the Chief Infrmatin Officer Versin: v1.0 Date: 12 September 2014

2 GOVERNMENT STANDARD ON CYBER SECURITY OCIO/S4.6 Cnfidentiality: Public Versin: 1.0 Status: Final Audience: Cmpliance: Creatr: Mandate/Authrity: Original Authrisatin Date: Last Updated and Apprved: Issued: Primary Cntact: SA Gvernment Agencies; Suppliers t SA Gvernment Mandatry Office f the Chief Infrmatin Officer Security and Risk Steering Cmmittee 01 August August September 2014 Nt Applicable Security and Risk Assurance, Office f the Chief Infrmatin Officer, Tel: +61 (8) Cverage: The Suth Australian public authrities required t adhere t this standard are defined in OCIO/F4.1 Gvernment framewrk n cyber security Infrmatin Security Management Framewrk [ISMF]. This standard is intended fr use by Suth Australian Gvernment agencies and suppliers t Gvernment whse cntractual bligatins require them t cmply with this dcument. Reliance upn this plicy r standard by any ther persn is entirely at their wn risk and the Crwn in the right f Suth Australia disclaims all respnsibility r liability t the extent permissible by law fr any such reliance. T attribute this material, cite the Office f the Chief Infrmatin Officer, Gvernment f Suth Australia, ISMF Standard 141. This wrk is licensed under a Creative Cmmns Attributin 3.0 Australia Licence Cpyright Suth Australian Gvernment, Disclaimer OCIO/S4.6 versin 1.0 Page 2 f 10

3 DOCUMENT TERMINOLOGY AND CONVENTIONS The terms that are used in this dcument are t be interpreted as described in Internet Engineering Task Frce (IETF) RFC 2119 entitled Key wrds fr use in RFCs t Indicate Requirement Levels 1. The RFC 2119 definitins are summarised in the table belw. Term Descriptin MUST This wrd, r the terms "REQUIRED" r "SHALL", means that the definitin is an abslute requirement f the specificatin. MUST NOT This phrase, r the phrase SHALL NOT, means that is an abslute prhibitin f the specificatin. SHOULD This wrd, r the adjective "RECOMMENDED", means that there may exist valid reasns in particular circumstances t ignre a particular item, but the full implicatins must be understd and carefully weighed befre chsing a different curse. SHOULD NOT This phrase, r the phrase "NOT RECOMMENDED" means that there may exist valid reasns in particular circumstances when the particular behaviur is acceptable r even useful, but the full implicatins shuld be understd and the case carefully weighed befre implementing any behaviur described with this label. MAY This wrd, r the adjective OPTIONAL, means that an item is truly ptinal. 1 OCIO/S4.6 versin 1.0 Page 3 f 10

4 DOCUMENT CONTROL Dcument lcatin Q:\SecurityRiskAssurance\Plicy Develpment Sub-prgram\Plicy and Standards\ISMF\ISMFv3.2\ Electrnic recrds management infrmatin File Flder Number: OCIO08/0073/0003 Dcument Number: Authr(s) Jasn Caley Anthny Stevens Functin / rle Principal Plicy Adviser, Security and Risk Assurance Senir Analyst, Security and Risk Assurance Release details Versin Date Initial release accmpanying issue f ISMF v September 2014 Distributed t Versin Date Published t September 2014 CLASSIFICATION Cnfidentiality Descriptin Circulatin limit PUBLIC-I2-A1 N harm culd be caused t an rganisatin r individual and n unfair advantage culd be given t any entity and n vilatin wuld ccur t smebdy s right t privacy. Integrity 2 with lw availability requirements. Unrestricted access. OCIO/S4.6 versin 1.0 Page 4 f 10

5 TABLE OF CONTENTS 1. AUTHORITY CONTEXT Backgrund Histry SCOPE TERMS AND ABBREVIATIONS Terms IMPLEMENTATION ISMF Standard Business Cntrls REFERENCES AND LINKS...10 OCIO/S4.6 versin 1.0 Page 5 f 10

6 1. AUTHORITY This dcument states the standard f the Gvernment f Suth Australia with respect t endpint prtectin. Implementatin f this standard supprts the bjectives f ISMF Plicy Statement 18. Plicy Statement 18 Respnsible Parties shall undertake an active rle in prtecting infrmatin assets frm expsure t malicius sftware and scripts including but nt limited t: implementing cntrls t prevent and restrict the prliferatin f virus and trjan sftware, educating persnnel in the risks assciated with the use and/r intrductin f unauthrised sftware prducts, and, where apprpriate, intrducing custm cntrls t detect r prevent its intrductin. 2. CONTEXT 2.1. Backgrund Dependence n infrmatin systems and services means agencies are mre vulnerable t security threats. The intercnnecting f public and private netwrks and sharing f infrmatin resurces increases the difficulty f achieving access cntrl. Reliance n technical means alne t prvide cmprehensive security is unrealistic it needs t be supprted by apprpriate management f Infrmatin Assets. Generally, the weakest pint in any infrmatin system is where the perating envirnment is accessible t users typically via an endpint. Prtecting these endpints requires a cmbinatin f technlgy cntrls (bth hardware and sftware), cmprehensive plicies which utline users respnsibilities, and nging educatin t ensure users (and Business Owners) are aware f the risks, and the threats Histry This standard has n direct predecessrs. It is an evlutin and replacement f the frmer Threat Prtectin Standard (OCIO/S6.8.1 Technlgy Threat Prtectin Infrastructure Threat Prtectin Sftware Standard). Shifting technlgy emphasis frm centralised cmputing and traditinal client-server desktp envirnments t mbile devices (e.g. tablets, smartphnes, prtable PCs) has led t a requirement t cnsider endpints in a variety f situatins. This standard brings t the fre a number f prtectin measures which are derived frm and described within the ISO/IEC cde f practice. OCIO/S4.6 versin 1.0 Page 6 f 10

7 3. SCOPE This standard encmpasses all Gvernment f Suth Australia data and infrmatin. The ISMF and all security Bulletins, Ntificatins and standards issued under it shall apply, unless therwise advised, t all bdies that are: Suth Australian Gvernment public sectr agencies (as defined in the Public Sectr Act 2009), that is, administrative units, bdies crprate, statutry authrities, and instrumentalities f the Crwn. Public sectr agencies are herein referred t as Agencies ; OR Suppliers t the Suth Australian Gvernment r its Agencies that have cntractual cnditins which require cmpliance t the ISMF as described in sectin 2.1 f the ISMF The ISMF and all security Bulletins, Ntificatins and standards issued under it shall apply t: All infrmatin prcessed, stred r cmmunicated by ICT equipment, where that infrmatin is either: Official Infrmatin f the Suth Australian Gvernment r its Agencies; r Infrmatin f which the Suth Australian Gvernment r any f its Agencies has custdy 2 Infrmatin as described abve which Suppliers that have cntractual cnditins that require cmpliance t the ISMF as described in sectin 2.1 f the ISMF hld n behalf f the Suth Australian Gvernment r any its Agencies Anything that acts upn an ICT asset, including creating, cntrlling, validating, and therwise managing the ICT asset thrughut the lifecycle f the asset. 4. TERMS AND ABBREVIATIONS 4.1. Terms Respnsible Party is used in tw cntexts within the ISMF. These are: An Agency the internal t gvernment bdy that retains ultimate respnsibility fr all aspects cvered by the Infrmatin Security Management Framewrk [ISMF] as it relates t a particular agency and its infrmatin assets. A Supplier an external t gvernment entity that is typically respnsible fr cmpliance with the ISMF by way f a cntractual agreement that cntains clauses requiring security f Agency infrmatin and the regulatin f access t an Agency s infrmatin assets. The term Supplier shall be read as Suppliers wh are subject t cntractual cnditins that require them t cmply with the ISMF unless anther intentin is apparent. 2 Nte the definitin f custdy in the ISMF differs frm State Recrds interpretatin. OCIO/S4.6 versin 1.0 Page 7 f 10

8 When a Supplier has cntracted with the State, the prvisins f the ISMF will apply t the Supplier either: under the terms f a Purchasing Agreement fr whle f Gvernment cntracts and assciated Custmer Agreements; r by way f an individual cntract with an Agency whereby the Agency has specified the parts f its Infrmatin Security Management System [ISMS] fr which cmpliance is sught. It shuld be nted that Agency Chief Executives retain ultimate accuntability fr all security matters within their agencies. The applicatin f the ISMF t a Supplier via a cntract with the State r Agency shall nt abslve the Agency frm these bligatins and respnsibilities. Respnsible Parties includes bth Agencies and Suppliers wh are subject t cntractual cnditins that require them t cmply with the ISMF. Where any ambiguity arises between these entities in relatin t adherence t the ISMF, the Agency Cntrls implemented in the Custmer Agreement shall prevail (i.e. The Agency remains the default party and the Custmer Agreement is used as the vehicle fr setting the scpe and requirements fr the Supplier t cmply with either the entirety f the ISMF r part(s) theref. The Custmer Agreement may als intrduce additinal Agency-specific cntrls and plicies that the Supplier must cmply with). Business Owner represents the persn r grup that is ultimately respnsible fr an infrmatin asset. This persn r grup is distinct frm an infrmatin custdian, wh may take respnsibility fr the nging management f the infrmatin (such as a CIO r system administratr). Individual business units shuld wn business critical infrmatin, rather than infrmatin technlgy r infrmatin security departments (they are custdians, nt wners). The manager f the business unit respnsible fr the creatin f any infrmatin and / r the business unit directly impacted by the lss f the infrmatin is usually the Business Owner. A Business Owner r grup f Business Owners must be identified fr each infrmatin asset. Endpint means any device that is the final interface at the edge f a netwrk and directly used, managed r accessed by a persn r persns. These devices may include desktp PCs, laptps, tablets, smartphnes, pint f sale terminals, thin-client terminals, etc. refers t the security measures implemented fr user accessible devices at the edge f a netwrk that may cntain, r prvide access t, infrmatin fr an end user. OCIO/S4.6 versin 1.0 Page 8 f 10

9 5. IMPLEMENTATION 5.1. ISMF Standard 141 Agencies must establish and maintain security measures that ensure prprtinate prtectin f Endpint devices relative t the cnfidentiality, integrity and availability classificatin f infrmatin being accessed r prcessed n such devices Business Cntrls The fllwing general guidance applies regardless f the classificatin levels f the infrmatin assets: S141.1 Respnsible Parties shall deply and maintain apprpriate anti-virus/anti-malware slutins encmpassing Endpint devices (ISMF Standards 54 and 55) S141.2 Respnsible Parties shall maintain the perating system and installed applicatins with relevant patches as prvided by the manufacturer (ISMF Standard 121, Cntrl S134.3) S141.3 Respnsible Parties shuld establish prcedures fr the granting and revcatin f administrative privileges while discuraging their use unless explicitly required (ISMF Standard 78) S141.4 Agencies shuld cnsider implementing applicatin whitelisting, t prevent the use f applicatins that are nt sanctined by the business, have nt been adequately tested r are nt required by the user t perfrm their duties (Cntrl S54.1) S141.5 Agencies shuld remve r therwise disable nn-essential sftware and functinality that are nt required by the user (e.g. autrun, IPv6). Such measures shuld als take int accunt brwser and web navigatin plug-ins. (e.g. Java, Shckwave, Flash etc.) (ISMF Standard 54) S141.6 Agencies shall establish specific cntrls t prevent unauthrised access t mbility devices (ISMF Standard 101) S141.7 Respnsible Parties shuld cnsider additinal cntrls fr unattended equipment (ISMF Standard 82) S141.8 Respnsible Parties shall implement sessin/inactivity timeuts n all Endpint devices (ISMF Standard 97). Additinal cntrls based n DLMs and prtective markings CLASSIFICATION ADDITIONAL CONTROLS [P] Prtected [SC] Sensitive: Cabinet [I4] Integrity 4 S141.9 Endpint devices must nt be cnnected t public internet WiFi htspts (irrespective f whether they are free r fr fee services). S Endpint devices must nt be cnnected t Internet Kisks and ther generally accessible public facilities. OCIO/S4.6 versin 1.0 Page 9 f 10

10 6. REFERENCES AND LINKS ISMF Guideline 18 - Endpint prtectin (incl. smartphnes and prtable devices) OCIO/F4.1 Gvernment f Suth Australia Infrmatin Security Management Framewrk [ISMF] Gvernment f Suth Australia Prtective Security Management Framewrk [PSMF] issued as Premier and Cabinet Circular N. 30 AS/NZS ISO/IEC 27002:2006 Infrmatin Technlgy Security techniques Cde f Practice fr Infrmatin Security Management Applicatin Whitelisting Explained, Australian Signals Directrate, Australian Gvernment, Canberra. This wrk is licensed under a Creative Cmmns Attributin 3.0 Australia Licence Cpyright Suth Australian Gvernment, Disclaimer

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

CHANGE MANAGEMENT STANDARD

CHANGE MANAGEMENT STANDARD The electrnic versin is current, r when printed and stamped with the green cntrlled dcument stamp. All ther cpies are uncntrlled. DOCUMENT INFORMATION Descriptin Dcument Owner This standard utlines the

More information

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t

More information

LINCOLNSHIRE POLICE Policy Document

LINCOLNSHIRE POLICE Policy Document LINCOLNSHIRE POLICE Plicy Dcument 1. POLICY IDENTIFICATION PAGE POLICY TITLE: ICT CHANGE & RELEASE MANAGEMENT POLICY POLICY REFERENCE NO: PD 186 POLICY OWNERSHIP: ACPO Cmmissining Officer: Prtfli / Business-area

More information

Privacy and Security Training Policy (PS.Pol.051)

Privacy and Security Training Policy (PS.Pol.051) Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Business Continuity Management Policy

Business Continuity Management Policy Business Cntinuity Management Plicy Versin: 1.0 Last Amendment: Apprved by: Library Cuncil f New Suth Wales Plicy wner/spnsr: Directr, Operatins and Chief Financial Officer Plicy Cntact Officer: Senir

More information

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles

More information

Human Resources Policy pol-020

Human Resources Policy pol-020 Human Resurces Plicy pl-020 Versin: 2.00 Last amendment: Jul 2014 Next Review: Jul 2017 Apprved By: Cuncil Date: 04 May 2005 Cntact Officer: Directr, Office f Human Resurce Services INTRODUCTION The University

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

Issuing of qualifications and statement of attainment Policy and Procedures Version: 3.0 Last Modified: 1 March 2015

Issuing of qualifications and statement of attainment Policy and Procedures Version: 3.0 Last Modified: 1 March 2015 Issuing f qualificatins and statement f attainment Plicy and Prcedures Versin: 3.0 Last Mdified: 1 March 2015 Purpse ANC issues AQF certificatin dcumentatin nly t a learner whm it has assessed as meeting

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013 Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,

More information

Employee Benefits Liability Policy

Employee Benefits Liability Policy Plicy 10/3084 part 3 Emplyee Benefits Liability Plicy Summary Publicatin Date March 2015 Review Date March 2016 Related Legislatin/Applicable Sectin f Legislatin Related Plicies, Prcedures, Guidelines,

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

Issuing of qualifications and statement of attainment Policy and Procedures Version: 5.0 Last Modified: 12 February 2015

Issuing of qualifications and statement of attainment Policy and Procedures Version: 5.0 Last Modified: 12 February 2015 Issuing f qualificatins and statement f attainment Plicy and Prcedures Versin: 5.0 Last Mdified: 12 February 2015 Purpse Duke Cllege issues AQF certificatin dcumentatin nly t a learner whm it has assessed

More information

Information & Communications Technology ICT Security Compliance Guide (Student)

Information & Communications Technology ICT Security Compliance Guide (Student) Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT Suth Australia Plice POSITION INFORMATION DOCUMENT Stream: Career Grup: Discipline: Classificatin: Service: Branch: Psitin Title: Administrative Services Cnsultancy and Infrmatin AO ASO-6 Infrmatin Systems

More information

IMT Standards. Standard number A000014. GoA IMT Standards. Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical

IMT Standards. Standard number A000014. GoA IMT Standards. Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical IMT Standards IMT Standards Oversight Cmmittee Gvernment f Alberta Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical Standard number A000014 Electrnic Signature Metadata

More information

Change Management Process For [Project Name]

Change Management Process For [Project Name] Management Prcess Fr [Prject Name] i 1 Intrductin The is fllwed during the Executin phase f the Prject Management Life Cycle, nce the prject has been frmally defined and planned. 1.1 What is a Management

More information

Change Management Process

Change Management Process Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses

More information

UBC Incident Response Plan V1.5

UBC Incident Response Plan V1.5 UBC Incident Respnse Plan V1.5 Cntents 1. Ratinale... 2 2. Objective... 2 3. Applicatin... 2 4. Reprting a Cmputer Security Incident... 2 5. Managing the Security Incident... 2 5.1. All Incidents... 2

More information

SaaS Listing CA Cloud Service Management

SaaS Listing CA Cloud Service Management SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters

More information

Professional indemnity insurance arrangements for enrolled nurses, registered nurses and nurse practitioners

Professional indemnity insurance arrangements for enrolled nurses, registered nurses and nurse practitioners Guideline August 2013 Prfessinal indemnity insurance arrangements fr enrlled nurses, registered nurses and nurse practitiners Intrductin This guideline has been develped by the Nursing and Midwifery Bard

More information

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Audit Cmmittee Charter St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Versin 2.0, 22 February 2016 Apprver Bard f Directrs St Andrew

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Zimbra Professional Services Portfolio, Purchasing Guide & Price List

Zimbra Professional Services Portfolio, Purchasing Guide & Price List In- Tuitin Netwrks Ltd Zimbra Prfessinal Services Prtfli, Purchasing Guide & Price List This dcument prvides an verview f In- Tuitin Netwrks Limited s range f Zimbra Prfessinal Services available n the

More information

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act

More information

AUDIT AND RISK COMMITTEE TERMS OF REFERENCE

AUDIT AND RISK COMMITTEE TERMS OF REFERENCE AUDIT AND RISK COMMITTEE TERMS OF REFERENCE 1. TITLE OF COMMITTEE Audit and Risk Cmmittee 2. ESTABLISHMENT The Audit and Risk Cmmittee is established under Part 3 Sectin 19(1) f the Charles Darwin University

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Gvernment f Newfundland and Labradr Office f the Chief Infrmatin Officer Infrmatin Management Branch GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Guideline (Definitin): OCIO Guidelines derive frm

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

How To Ensure Your Health Care Is Safe

How To Ensure Your Health Care Is Safe Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

Outsourcing arrangements

Outsourcing arrangements Rules Ntice Guidance Nte Dealer Member Rules Please distribute internally t: Internal Audit Legal and Cmpliance Operatins Regulatry Accunting Senir Management Cntacts: Luis Piergeti Vice President, Financial

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information

Electronic and Information Resources Accessibility Compliance Plan

Electronic and Information Resources Accessibility Compliance Plan Electrnic and Infrmatin Resurces Accessibility Cmpliance Plan Intrductin The University f Nrth Texas at Dallas (UNTD) is cmmitted t prviding a wrk envirnment that affrds equal access and pprtunity t therwise

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Schools and Preschools Financial Management Policy

Schools and Preschools Financial Management Policy Plicy 10/3084 part 3 Schls and Preschls Financial Management Plicy Summary Publicatin Date May 2015 Review Date December 2016 Related Legislatin/Applicable Sectin f Legislatin Related Plicies, Prcedures,

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Sources of Federal Government and Employee Information

Sources of Federal Government and Employee Information Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities

More information

Introduction to Mindjet MindManager Server

Introduction to Mindjet MindManager Server Intrductin t Mindjet MindManager Server Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 mindjet.cm 2013 Mindjet. All Rights

More information

10 th May 2010. Dear Peter, Re: Audit Quality in Australia: A Strategic Review

10 th May 2010. Dear Peter, Re: Audit Quality in Australia: A Strategic Review 10 th May 2010 Mr. Peter Levy Audit Quality Strategic Review Crpratins and Financial Services Divisin The Treasury Langtn Crescent PARKES ACT 2600 Dear Peter, Re: Audit Quality in Australia: A Strategic

More information

Chief Finance and Operations Officer IfM Education and Consultancy Services (IfM ECS)

Chief Finance and Operations Officer IfM Education and Consultancy Services (IfM ECS) Chief Finance and Operatins Officer IfM Educatin and Cnsultancy Services (IfM ECS) Rle Summary IfM ECS disseminates the research and educatin utputs f the University f Cambridge Institute fr Manufacturing

More information

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010 OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity

More information

Projects Director Report Guidelines. IPMA Level A

Projects Director Report Guidelines. IPMA Level A Prjects Directr Reprt Guidelines IPMA Level A Cntents 1. GENERAL PROVISIONS.. 2 2. PROJECT PORTFOLIO / PROGRAMME DESCRIPTION...2 3. PROJECTS DIRECTOR REPORT 5 4. ANNEXES..7 Authr Classificatin Status Electrnic

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

Helicopter Landing Sites Planning, Implementation and Management

Helicopter Landing Sites Planning, Implementation and Management Directive # QH-HSD-039:2013 Effective Date: 01 July 2013 Review Date: 01 July 2016 Supersedes: Nil Landing Sites Planning, Implementatin and Management Purpse The purpse f this Health Service Directive

More information

RATIONALE TERMS OF REFERENCE FOR THE QUALITY COMMITTEE UNDER THE EXCELLENT CARE FOR ALL ACT. Authority

RATIONALE TERMS OF REFERENCE FOR THE QUALITY COMMITTEE UNDER THE EXCELLENT CARE FOR ALL ACT. Authority RATIONALE With the intrductin f the Excellent Care fr All Act, hspital bards must nw have a quality cmmittee that reprts t the bard. The template prvides sample terms f references fr rganizatins t adapt

More information

1.2 Supporting References For information relating to the Company Hardware Request project, see the SharePoint web site.

1.2 Supporting References For information relating to the Company Hardware Request project, see the SharePoint web site. Hardware Request System Visin 1 Intrductin 1.1 Dcument Purpse and Scpe This dcument utlines the visin fr the Hardware Request system. The purpses f this dcument are t: Identify and agree n the prblems

More information

Better Practice Guide Financial Considerations for Government use of Cloud Computing

Better Practice Guide Financial Considerations for Government use of Cloud Computing Better Practice Guide Financial Cnsideratins fr Gvernment use f Clud Cmputing Nvember 2011 Intrductin Many Australian Gvernment agencies are in the prcess f cnsidering the adptin f clud-based slutins.

More information

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012 Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.

More information

Directives to LHINs in respect of Reporting Requirements under the BPSAA. Issued By Minister of Health and Long-Term Care

Directives to LHINs in respect of Reporting Requirements under the BPSAA. Issued By Minister of Health and Long-Term Care Directives t LHINs in respect f Reprting Requirements under the BPSAA Issued By Minister f Health and Lng-Term Care Effective April 1, 2011 Table f Cntents 1. BACKGROUND... 2 2. REPORT ON THE USE OF CONSULTANTS...

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

NSW Government. Software Asset Management Standard. Version 1.0. October 2014

NSW Government. Software Asset Management Standard. Version 1.0. October 2014 NSW Gvernment Sftware Asset Management Standard Versin 1.0 Octber 2014 [email protected] ICT Services Office f Finance & Services Level 23, McKell Building 2-24 Rawsn Place SYDNEY NSW 2000 Sftware

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

URM 11g Implementation Tips, Tricks & Gotchas ALAN MACKENTHUN FISHBOWL SOLUTIONS, INC.

URM 11g Implementation Tips, Tricks & Gotchas ALAN MACKENTHUN FISHBOWL SOLUTIONS, INC. URM 11g Implementatin Tips, Tricks & Gtchas ALAN MACKENTHUN FISHBOWL SOLUTIONS, INC. i Fishbwl Slutins Ntice The infrmatin cntained in this dcument represents the current view f Fishbwl Slutins, Inc. n

More information

Implementing an electronic document and records management system using SharePoint 7

Implementing an electronic document and records management system using SharePoint 7 Reprt title Agenda item Implementing an electrnic dcument and recrds management system using SharePint 7 Meeting Finance, Prcurement & Prperty Cmmittee 16 June 2008 Date Reprt by Dcument Number Head f

More information

EA-POL-015 Enterprise Architecture - Encryption Policy

EA-POL-015 Enterprise Architecture - Encryption Policy Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:

More information

Risk Management Policy AGL Energy Limited

Risk Management Policy AGL Energy Limited Risk Management Plicy AGL Energy Limited AUGUST 2014 Table f Cntents 1. Abut this Dcument... 2 2. Plicy Statement... 2 3. Purpse... 2 4. AGL Risk Cntext... 3 5. Scpe... 3 6. Objectives... 3 7. Accuntabilities...

More information

Network Security Trends in the Era of Cloud and Mobile Computing

Network Security Trends in the Era of Cloud and Mobile Computing Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager

More information

Training - Quality Manual

Training - Quality Manual Training - Quality Manual 1 st Octber 2010 Babcck Internatinal Grup PLC www.babcck.c.uk/training Key Cntacts... Errr! Bkmark nt defined. Authrities...2 Intrductin t Babcck Internatinal Grup...3 Meeting

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

Symantec User Authentication Service Level Agreement

Symantec User Authentication Service Level Agreement Symantec User Authenticatin Service Level Agreement Overview and Scpe This Symantec User Authenticatin service level agreement ( SLA ) applies t Symantec User Authenticatin prducts/services, such as Managed

More information

australian nursing federation

australian nursing federation australian nursing federatin Submissin t the public cnsultatin n the Nursing and Midwifery Bard f Australia draft Guidelines fr prfessinal indemnity insurance arrangements fr nurses and nurse practitiners

More information

Duty Statement Manager The Early Years at Seymour (TEYS)

Duty Statement Manager The Early Years at Seymour (TEYS) Duty Statement Manager The Early Years at Seymur (TEYS) Psitin Title Respnsible T Time Fractin Status Salary and Cnditins Psitin Purpse: Manager The Early Years at Seymur (TEYS) Business Manager and Head

More information

E-Business Strategies For a Cmpany s Bard

E-Business Strategies For a Cmpany s Bard DATATEC LIMITED BOARD CHARTER / TERMS OF REFERENCE 1. CONSTITUTION The primary bjective f the Cmpany s Bard Charter is t set ut the rle and respnsibilities f the Bard f Directrs ( the Bard ) as well as

More information

Cyber Security: Simulation Platform

Cyber Security: Simulation Platform Service Overview The Symantec Cyber Security: Simulatin Platfrm is a Web hsted Service with immersive and hands-n access t cyber exercises fr ffensive (red team) events, inspired by real-life security

More information

Equal Pay Audit 2014 Summary

Equal Pay Audit 2014 Summary Equal Pay Audit 2014 Summary Abut the dcument The fllwing summary is an abridged versin f Ofcm s equal pay audit 2014. In the full versin f the reprt we set ut ur key findings, cmment n any issues arising

More information

Internal Audit Charter and operating standards

Internal Audit Charter and operating standards Internal Audit Charter and perating standards 2 1 verview This dcument sets ut the basis fr internal audit: (i) the Internal Audit charter, which establishes the framewrk fr Internal Audit; and (ii) hw

More information

Audit Committee Charter

Audit Committee Charter Audit Cmmittee Charter Membership The Audit Cmmittee (the "Cmmittee") f the Bard f Directrs (the "Bard") f Philip Mrris Internatinal Inc. (the "Cmpany") shall cnsist f at least three directrs all f whm

More information