PERSONALLY IDENTIFIABLE INFORMATION (Pin BREACH NOTIFICATION CONTROLS
|
|
|
- Barbra Warren
- 10 years ago
- Views:
Transcription
1 ClOP CHAPTER PERSONALLY IDENTIFIABLE INFORMATION (Pin BREACH NOTIFICATION CONTROLS TABLE OF CONTENTS SECTION #.1 SECTION #.2 SECTION #.3 SECTION #.4 SECTION #.5 SECTION #.6 SECTION #.7 SECTION #.8 SECTION #.9 SECTION #.10 SECTION #.11 PURPOSE... 1 BACKGROUND... 2 SCOPE AND APPLICABILITy... 2 POLICY... 3 ROLES AND RESPONSIBILITIES... 3 DATES... 5 CANCELLATIONS... 6 COMPLIANCE... 6 WAIVERS... 6 AUDIT PROCEDURES... 7 APPROVAL... 7 APPENDICES APPENDIX A Section #.1 PII BREACH HIGH LEVEL RESPONSE PROCESS Purpose #.1.1 This directive establishes uniform U.S. Department of Transportation (DOT) policies, high level process flows, roles, and responsibilities to respond appropriately to situations that involve the unauthorized dissemination of Personally Identifiable Information (PII). in order to mitigate the risk of harm (including identity theft) should a PI! Breach occur. #.1.2 It is DOT's intent to be compliant with all applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance concerning PI! Breach notification requirements. #.1.3 This directive complies with Office of Management and Budget (OMB) Memorandum (OMB M-07-16), Safeguarding Against and Responding to the Breach of Personally Identifiable Information (PII) and OMB Memorandum regarding "Recommendations for Identity Theft Related Data Breach Notification," issued on September 20, DOT Order
2 Section #.2 Background #.2.1 The loss of.ell can result in substantial harm, embarrassment, and inconvenience to individuals and may lead to identity theft or other fraudulent use of the information. Because Federal agencies maintain significant amounts of information concerning individuals, we have a special duty to protect that information from loss and misuse. #.2.2 OMB M requires every executive branch agency to develop and implement a PII Breach notification policy. The following six elements are addressed in this directive and appendices: Whether PII Breach notification is required; Timeliness of notification; Source of notification; Content of notification; Means of providing notification; and Who receives notification. #.2.3 To ensure coverage and implementation of the OMB requirement, each agency is required by OMB to establish an agency response team. In DOT, the response team includes the Program/Project Manager of the program experiencing the PII Breach, the DOT CIO (who is also the Senior Agency Official for Privacy (SAOP)), as well as representatives from DOT's public affairs office, legislative affairs office, general counsel's office, and the management office that includes budget and procurement functions. Section #.3 Scope and Applicability #.3.1 This directive applies to all DOT organizations, employees, contract personnel, and authorized users, except the public, that collect, receive, transmit, or otherwise maintain.ell in electronic or hardcopy format. #.3.2 This directive also applies to all information systems development, operation, maintenance, infrastructure computing resources, and network connectivity at all levels of sensitivity, whether owned and operated by DOT, or operated on behalf of DOT. #.3.3 In addition, information systems undergoing internal and external assessment, security test and evaluation, and Certification and Accreditation are subject to this directive. DOT Order
3 Section #.4 Policy #.4.1 All DOT organizations, employees, contract personnel, and authorized users, except the public, that collect, receive, transmit, or otherwise maintain.e!! in electronic or hardcopy format shall report a suspected or confirmed PI! Breach in accordance with the PII Breach High Level Response Process in Appendix A. Additionally, a suspected or confirmed PI! Breach shall be reported to U.S. CERT by the Cyber Security Management Center (CSMC) within one hour of detection. #.4.2 This directive incorporates the!:l! and Sensitive Personally Identifiable Information (SPI!) exposure incident response guidance and procedures contained in the DOT Information Technology and Information Assurance Policy (latest revision) Implementation of DOT's Protection of Sensitive Personally Identifiable Information (SPII), Section VI. Policy, paragraphs 17 and 18. Additionally, this directive supplements the.e!! incident reporting and response procedures outlined in DOT Information Technology and Information Assurance Policy #034, Reporting Cyber Security Incidents and SPI! Exposure. Section #.5 Roles and Responsibilities #.5.1 The Office of the Chief Information Officer (OCIO) shall serve as the Office of Primary Responsibility (OPR) for this chapter. The OCIO is responsible for this directive as explained in DOT Order #.5.2 The DOT Chief Information Officer (CIO) shall: # Enforce the provisions of this directive. # Make the final PII Breach notification decision. # Brief the Deputy Secretary of Transportation on every confirmed PI! Breach. #.5.3 The DOT Chief Information Security Officer (eiso) is responsible for: # Coordinating communication between the DOT Privacy Officer and the DOT CIO regarding every confirmed PI! Breach. #.5.4 The DOT Privacy Officer shall: # Conduct an initial assessment of the suspected or confirmed PI! Breach based on the information provided by the Cyber Security Management Center (CSMC) and the reporting OA Information System Security Officer (lsso)/lnformation System DOT Order
4 Security Manager (lssm) and OA Privacy Officer to determine if additional information or the activation of the Breach Assessment and Response Team (BART) is required. # Lead the BART and brief the DOT CIO and DOT elso as required and notify external parties as appropriate. # Ensure remedies are carried out (such as obtaining credit monitoring services) for parties impacted by the PI! Breach and remediation efforts are monitored. # Evaluate this directive annually to ensure Department-wide adherence and effectiveness and that it reflects the agency's needs; and conduct testing of this policy annually. # Provide training to the BART and DOT employees and contractors to ensure their understanding of this directive. #.5.5 The Breach Assessment and Response Team (BART) shall: # Review each suspected or confirmed incident, assessing the risk of the.e!! Breach, and determine the appropriate actions to be taken to notify external parties (if necessary) and to remedy the PI! Breach. #.5.6 The General Counsel shall: # Serve as a member of the BART, providing legal advice and guidance to the BART, and coordinate communications with external parties such as Congress, the Department of Homeland Security (DHS), and the media. #.5.7 DOT Information Assurance and Privacy Management Office (IAPMO) shall: # Perform random validation and verification of this directive during quarterly scheduled compliance reviews. #.5.8 The Information System Security Officers (ISSOs) and Information System Security Managers (ISSMs) (or their designees) shall: # Report each suspected or confirmed PI! Breach within their OA to the CSMC immediately upon becoming aware of the incident and coordinate with the OA Privacy Officer to gather all pertinent information in support of the DOT Privacy Officer's initial assessment. # Advise the person reporting the suspected or confirmed PI! Breach on procedures to preserve evidence. #.5.9 The OA Privacy Officer shall: DOT Order
5 # Lead and coordinate the gathering of all pertinent information, at the OA level, in support of the DOT Privacy Officer's initial assessment of a suspected or confirmed PII Breach. #.5.10 Program/Project Managers of the affected OAs shall: # Join the BART when their respective program is affected by a PII Breach and provide input into any disciplinary actions for employees within their assigned offices. #.5.11 Employees, contractors, and authorized users, except the public, of DOT systems shall: # Safeguard Ell wherever it resides as identified in the DOT Information Technology and Information Assurance Policy Number (revision 1): Implementation of DOT's Protection of Sensitive Personally Identifiable Information (SPill, and immediately report each suspected or confirmed PII Breach to their OA ISSO/ISSM. #.5.12 The Cyber Security Management Center (CSMC) shall: # Report each suspected or confirmed a PII Breach to US-CERT within 1 hour of discovery or detection, according to the responsibilities outlined in the DOT Information Technology and Information Assurance Policy #034, Reporting Cyber Security Incidents and SPI! Exposure, dated December 31, Section #.6 Dates #.6.1 This chapter is effective the date it is signed and shall be reviewed annually by the OPR. #.6.2 Quarterly, ClOP roles and personnel assignments published in the CIOpedia shall be reviewed and updated by the OPR. #.6.3 Quarterly, the DOT Information Assurance and Privacy Management Office (IAPMO) shall conduct scheduled compliance reviews and perform random validation and verification. #.6.4 Annually, BART testing and training shall be conducted by the DOT Privacy Officer. DOT Order
6 Section #.7 Cancellations #.7.1 This directive further supersedes and cancels all earlier communications specific to this topic. Section #.8 Compliance #.8.1 Compliance with the policies and procedures contained in this chapter and its appendices is mandatory for all organizations, employees, contract personnel, and authorized users, except the public, that collect, receive, transmit, or otherwise maintain.ell in electronic or hardcopy format. #.8.2 Potential consequences for failure to comply with the provisions of this directive are administered in accordance with the Privacy Act of 1974, 5 U.S.C. 552a. # Any individual who knowingly and willfully requests or obtains any Privacy Act record concerning an individual from an agency under false pretenses may be guilty of a misdemeanor and fined not more than $5,000 in accordance with the Privacy Act of 1974,5 U.S.C. 552a. # Any DOT employee or contractor with possession of or access to.ell who willfully discloses the material in any manner to any person or agency not entitled to receive it may be guilty of a misdemeanor and fined not more than $5,000, in accordance with the Privacy Act of 1974,5 U.S.C. 552a. # Employees and contractors may be subject to written reprimand, suspension, or removal under the following situations: Knowingly failing to implement and maintain information security controls required for the protection of.ell and.e..u. systems regardless of whether such action results in the loss of control or unauthorized disclosure of.e..u.. Failing to report any known or suspected loss of control over or unauthorized disclosure of.ell. For managers, failing to adequately instruct, train, or supervise employees in their responsibilities. Section #.9 Waivers #.9.1 Requests for exceptions to this policy shall be provided in writing to the DOT cia. The DOT cia shall provide a written waiver or justification for denial. DOT Order
7 #.9.2 Appeals shall be addressed in writing to the DOT Deputy Secretary. Section #.10 Audit Procedures #.10.1 DOT Information Assurance and Privacy Management Office (IAPMO) shall perform random validation and verification during quarterly scheduled compliance reviews. Additionally BART testing and training will be conducted at a minimum annually. Section #.11 Approval Date DOT Order
8 A APPENDIX A: PII BREACH HIGH LEVEL RESPONSE PROCESS 1. Pllincident 2. Containment, 3. Post-Incident Detection and Eradication, and Activity Analysis Recovery FIGURE 1: PII BREACH HIGH LEVEL RESPONSE FLOW 1. Pllincident Detection and Analysis 1.1 Detection Immediately upon the detection of the loss, compromise, or unauthorized use of suspected or confirmed.e!!, DOT employees and contractors shall immediately contact their OA ISSO/ISSM and provide as much information as possible to the OA ISSO/ISSM; such as the nature of the suspected or confirmed PI! Breach, the type of.e!! breached, the date, time, location, the identity of personnel the.e!! pertained to and any additional pertinent information. The OA ISSO/ISSM shall report the suspected or confirmed PI! Breach immediately to DOT's CSMC using the "Report an IT Security and Privacy Incident" form which is available at or telephonically at , Option 1. The CSMC shall immediately notify US-CERT upon notification from the OA ISSO/ISSM. After reporting the suspected or confirmed PII Breach to the CSMC, the OA ISSO/ISSM shall immediately notify the DOT CISO, DOT Privacy Officer, the OA CIO, and the OA Privacy Officer about the suspected or confirmed PI! Breach. The OA ISSO/ISSM shall provide to the reporting individual instruction and direction on securing DOT.E!! data and DOT Information Technology (IT) resource that contains.e!! data to control the impact of the suspected or confirmed PI! Breach. 1.2 Analysis The DOT Privacy Officer shall immediately conduct an initial diagnosis to determine if sufficient information exists to determine if an actual PI! Breach occurred. If insufficient information exists, then the DOT Privacy Officer in coordination with the OA ISSO/ISSM and OA Privacy Officer will conduct an interview with the person reporting the suspected or breached.e!!. If the interview yields sufficient information that an actual PI! Breach did not occur then the DOT Privacy Officer will report the findings to the DOT CIO and DOT CISO. The OA ISSO/ISSM and OA Privacy Officer will contact the CSMC and close the incident ticket. If the interview yields sufficient information to make a determination that a PI! Breach did occur or that additional information is required, then the DOT Privacy Officer will notify the DOT CISO and DOT CIO and activate the BART and begin the Risk Assessment Process. DOT Order A 1
9 A 1.3 Risk Assessment Process To determine whether and to what extent notification is required beyond US-CERT, the risk of harm caused by the PII Breach shall be assessed along with the level of risk. To assess the risk of harm, the BART shall consider the following factors: A. Nature of the data elements breached: The nature of the data elements compromised is a key factor to consider in determining when and how notification should be provided to affected individuals. Special consideration should be given to E!! that can be used to steal an individual's identity. B. Number of individuals affected: The number of individuals affected by the E!! Breach may impact the method of notification, but should not determine if notification of affected individuals is required. C. Likelihood the information is accessible and usable: The likelihood that E!! will be or has been used by unauthorized individuals. The risk assessment shall consider any safeguards in place to protect the data, such as encryption of data, hard drives, and mobile devices. D. Likelihood the breach may lead to harm: The likelihood a breach may result in harm depends on the manner of the actual or suspected breach, the dissemination of the data, and the type(s) of data involved in the incident. E. Ability of DOT to mitigate the risk of harm: The risk assessment shall consider actions the DOT can take to mitigate the risk of harm to affected individuals. The ability to mitigate risk and monitor for misuse and suspicious behavior impacts the individuals whose information may have been breached. 2. Containment, Eradication, and Recovery Upon completion of the risk assessment the DOT Privacy Officer shall conclude one of the following: A. No PI! Breach Occurred. This will conclude the investigation and the reporting OA ISSO/ISSM shall notify the CSMC to close the incident ticket. B. Internal PI! Breach Occurred. Unauthorized access (intentional or unintentional) of E!! by a DOT employee or contractor occurred, however, the E!! was not released outside of DOT. The BART will prepare a Plan of Action and Milestones (POA&M) and Notification Plan to address risks as result of the PI! Breach. C. External PI! Breach Occurred. Unauthorized access (intentional or DOT Order A 2
10 DOT Order A 2.1 POA&M unintentional) of.e!! by a DOT employee, contractor, or unauthorized non DOT employee or contractor occurred and the.e!! was released outside of DOT. The BART will prepare a Plan of Action and Milestones (POA&M) and Notification Plan to address risks as result of the breach. The BART shall develop a list of POA&Ms to address any risks as result of the breach. The BART shall also review the system-level closed and open POA&Ms and the risk assessment of the affected system to determine if there were any findings associated with the PI! Breach and what milestones were completed relating to the breach. The POA&Ms shall include plans for affected individuals, services offered by DOT (e.g., credit monitoring services), projected costs, and estimated timelines. The DOT Privacy Officer shall delegate actions to responsible parties, but shall be responsible for monitoring the completion of the actions as identified in the POA&Ms. 2.2 Notification Plan The BART shall develop a formal Notification Plan to manage communications between the affected individuals and external stakeholders, i.e. law enforcement, credit card companies, local and state government. The Notification Plan shall address who will receive notifications, who will communicate the notification, the overall message (e.g., what happened, what data was breached, method(s) of notification, such as written notice, press release, etc.), and actions DOT will take or has taken to mitigate the risks for affected individuals (such as preventive measures or safeguards taken or to be taken to prevent similar incidents). In addition, the Notification shall comply with the guidelines set forth in OMB Memorandum M Attachment 3 Section B. Once the BART has developed the Notification Plan, the DOT Privacy Officer shall brief the DOT CIO and obtain approval to proceed. 2.3 Notices to those Affected After identifying the level of risk and the steps taken to limit that risk, the BART will make a determination regarding notice to parties put at risk by the PI! Breach. This determination of notice will be made following OMB's Recommendations for Identity Theft Related Data Security Breach Notification and OMB M-07-16, Attachment 3, External Breach Notification If the decision is made to offer credit monitoring services, the BART will identify the appropriate agency official who should make contact with the affected parties. When appropriate, contact will be made both orally (telephone call) and in writing (follow-up letter). The BART will forward boilerplate identity theft notification letter(s) to the appropriate agency official for completion and processing. The boilerplate letter will describe the incident that occurred, a description of the types of personal information that were involved in the breach, a brief description of the steps the agency is taking to DOT Order A 3
11 A investigate the PI! Breach and limit the risk, steps that the individuals can take to protect themselves and reduce risk of identity theft, and information on how to obtain the Government-provided credit monitoring services If the decision is made to notify affected parties but not offer credit monitoring services, the BART will identify the appropriate agency official who shall make contact with the affected parties and forward boilerplate identity theft notification letter(s) to this individual for completion and processing. The boilerplate letter shall conform to the format identified above, without the offer of credit monitoring services. A significant factor to consider in determining whether to offer credit monitoring services is the cost to the Government of doing so Determinations and follow-up actions regarding notification will be made in a timely manner, so that those affected may take protective steps as quickly as possible, but without compounding harm from the initial incident through premature announcement based on incomplete facts If it is determined that external notification of the PI! Breach is warranted, the BART will post information about the PI! Breach and notification in a clearly identifiable location on the home page of DOT's external website. The posting will include a link to Frequently Asked Questions and other talking points to assist the public's understanding of the PI! Breach notification process As necessary, the BART will identify resources to handle any follow-up inquiries. If the breach involves a very large number of affected individuals, the BART may consider acquiring services through GSA "USA Services" to quickly put in place a Fedlnfo call center staffed by trained personnel. DOT may delay any required public announcement of the incident to allow time for implementation of appropriate follow-up resources. 3. Post-Incident Activity 3.1 The DOT Privacy Officer shall be responsible for coordinating the execution of the POA&Ms and Notification Plan. The DOT Privacy Officer shall provide regular status updates to the DOT CIO, DOT CISO, and BART. 3.2 A post-incident review with the BART and senior management from the affected OA shall be conducted. The objective of review will be to identify the root cause of the PI! Breach, analyze the DOT response, and identify improvements to the DOT's privacy safeguards. The OA Privacy Officer will review the Privacy Impact Assessment (PIA) and Systems of Records Notice (SORN) of the exploited system, if appropriate, and determine whether these documents need to be updated. DOT Order A 4
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference
Your Agency Just Had a Privacy Breach Now What?
1 Your Agency Just Had a Privacy Breach Now What? Kathleen Claffie U.S. Customs and Border Protection What is a Breach The loss of control, compromise, unauthorized disclosure, unauthorized acquisition,
Privacy Incident Handling Guidance
Privacy Incident Handling Guidance Revised January 26, 2012 Basis for Privacy Incident Handling Guidance The following procedures establish governing policies and procedures for Privacy Incident handling
DEPARTMENT OF THE INTERIOR. Privacy Impact Assessment Guide. Departmental Privacy Office Office of the Chief Information Officer
DEPARTMENT OF THE INTERIOR Privacy Impact Assessment Guide Departmental Privacy Office Office of the Chief Information Officer September 30, 2014 Table of Contents INTRODUCTION... 1 Section 1.0 - What
Department of Veterans Affairs VA Handbook 6500. Information Security Program
Department of Veterans Affairs VA Handbook 6500 Washington, DC 20420 Transmittal Sheet September 18, 2007 Information Security Program 1. REASON FOR ISSUE: To provide specific procedures and establish
Section 37.1 Purpose... 1. Section 37.2 Background... 3. Section 37.3 Scope and Applicability... 4. Section 37.4 Policy... 5
CIOP CHAPTER 37 Departmental Cybersecurity Policy TABLE OF CONTENTS Section 37.1 Purpose... 1 Section 37.2 Background... 3 Section 37.3 Scope and Applicability... 4 Section 37.4 Policy... 5 Section 37.5
Personally Identifiable Information (PII) Breach Response Policy
Information Technology Requirement Personally Identifiable Information (PII) Breach Response Policy NITR-1382-1 Version Date: 20071213 Effective Date: 20071221 Expiration Date: 20091221 Responsible Office:
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
U.S. DEPARTMENT OF TRANSPORTATION FEDERAL AVIATION ADMINISTRATION. National Policy
CHANGE U.S. DEPARTMENT OF TRANSPORTATION FEDERAL AVIATION ADMINISTRATION National Policy ORDER 1280.1B CHG1 Effective Date: 08/16/2011 SUBJ: Protecting Personally Identifiable Information (Pll) 1. Purpose.
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT 1. DEFINITIONS: 1.1 Undefined Terms: Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms defined by the Health Insurance Portability
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015
Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...
DHS SharePoint and Collaboration Sites
for the March 22, 2011 Robert Morningstar Information Systems Security Manager DHS Office of the Chief Information Officer/Enterprise Service Delivery Office (202) 447-0467 Reviewing Official Mary Ellen
Privacy Impact Assessment
Technology, Planning, Architecture, & E-Government Version: 1.1 Date: April 14, 2011 Prepared for: USDA OCIO TPA&E Privacy Impact Assessment for the April 14, 2011 Contact Point Charles McClam Deputy Chief
COMPLIANCE ALERT 10-12
HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment
Department of Homeland Security Web Portals
for the Department of Homeland Security Web Portals June 15, 2009 Contact Point Mary Ellen Callahan Chief Privacy Officer Department of Homeland Security (703) 235-0780 Page 2 Abstract Many Department
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT THIS HIPAA BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into effective the day of, 20 ( Effective Date ), by and between the Regents of the University of Michigan,
Department of Homeland Security
Implementation Status of EINSTEIN 3 Accelerated OIG-14-52 March 2014 Washington, DC 20528 / www.oig.dhs.gov March 24, 2014 MEMORANDUM FOR: FROM: SUBJECT: Bobbie Stempfley Acting Assistant Secretary Office
INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies
United States Government Accountability Office Report to Congressional Requesters June 2014 INFORMATION SECURITY Additional Oversight Needed to Improve Programs at Small Agencies GAO-14-344 June 2014 INFORMATION
ANNUAL PRIVACY REPORT
THE CHIEF PRIVACY AND CIVIL LIBERTIES OFFICER AND THE OFFICE OF PRIVACY AND CIVIL LIBERTIES ANNUAL PRIVACY REPORT JANUARY 1, 2012-SEPTEMBER 30, 2013 United States Department of Justice Message from the
Privacy Impact Assessment
AUGUST 16, 2013 Privacy Impact Assessment CIVIL PENALTY FUND AND BUREAU-ADMINISTERED REDRESS PROGRAM Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220
ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles and Responsibilities
Policy Title: Information Security Roles Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles Approval Date: 05/28/2014 Revised Responsible Office:
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section
ADMINISTRATIVE REGULATION EFFECTIVE DATE: 1/1/2016
Page 1 of 9 CITY OF CHESAPEAKE, VIRGINIA NUMBER: 2.62 ADMINISTRATIVE REGULATION EFFECTIVE DATE: 1/1/2016 SUPERCEDES: N/A SUBJECT: HUMAN RESOURCES DEPARTMENT CITY OF CHESAPEAKE EMPLOYEE/RETIREE GROUP HEALTH
STANDARD ADMINISTRATIVE PROCEDURE
STANDARD ADMINISTRATIVE PROCEDURE 16.99.99.M0.26 Investigation and Response to Breach of Unsecured Protected Health Information (HITECH) Approved October 27, 2014 Next scheduled review: October 27, 2019
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5400.16 February 12, 2009 ASD(NII)/DoD CIO SUBJECT: DoD Privacy Impact Assessment (PIA) Guidance References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes
PRIVACY IMPACT ASSESSMENT (PIA) GUIDE
U.S. Securities and Exchange Commission Office of Information Technology Alexandria, VA PRIVACY IMPACT ASSESSMENT (PIA) GUIDE Revised January 2007 Privacy Office Office of Information Technology PRIVACY
Report No. D-2011-6-008
Hotline Review June 28, 2011 Hotline Complaint Regarding a Defense Contract Audit Agency Employee Conducting Private For-Profit Tax Business Activity on Government Time and Using Government Equipment Report
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon
This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02788, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
Privacy Impact Assessment. For. Non-GFE for Remote Access. Date: May 26, 2015. Point of Contact and Author: Michael Gray michael.gray@ed.
For Non-GFE for Remote Access Date: May 26, 2015 Point of Contact and Author: Michael Gray [email protected] System Owner: Allen Hill [email protected] Office of the Chief Information Officer (OCIO)
Use & Disclosure of Protected Health Information by Business Associates
Applicability: Policy Title: Policy Number: Use & Disclosure of Protected Health Information by Business Associates PP-12 Superseded Policy(ies) or Entity Policy: N/A Date Established: January 31, 2003
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
Information Security and Privacy Policy Handbook
Information Security and Privacy Policy Handbook This document implements OPM s Information Security and Privacy Policy requirements for the protection of information and information systems. Chief Information
Privacy Impact Assessment (PIA) Waiver Review System (WRS) Version 03.06.01.01. Last Updated: December 2, 2013
United States Department of State (PIA) Waiver Review System (WRS) Version 03.06.01.01 Last Updated: December 2, 2013 Bureau of Administration 1. Contact Information Department of State Privacy Coordinator
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT 1. The terms and conditions of this document entitled Business Associate Agreement ( Business Associate Agreement ), shall be attached to and incorporated by reference in the
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT ( Agreement ) is entered into by and between (the Covered Entity ), and Iowa State Association of Counties (the Business Associate ). RECITALS
Encryption Security Standard
Virginia Commonwealth University Information Security Standard Title: Encryption Security Standard Scope: Approval February 22, 2012 This document provides the encryption requirements for all data generated,
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
INFORMATION PROCEDURE
INFORMATION PROCEDURE Information Security - Privacy Procedures Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY PRIVACY PROCEDURES 1. PURPOSE
APPENDIX B DEFINITIONS
APPENDIX B DEFINITIONS This Appendix defines terms that are used in the Agreement and other Appendices. Any capitalized term used in the Agreement that is not defined here has the meaning provided in 45
University Healthcare Physicians Compliance and Privacy Policy
Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of
SECURITY WEAKNESSES IN DOT S COMMON OPERATING ENVIRONMENT EXPOSE ITS SYSTEMS AND DATA TO COMPROMISE
FOR OFFICIAL USE ONLY SECURITY WEAKNESSES IN DOT S COMMON OPERATING ENVIRONMENT EXPOSE ITS SYSTEMS AND DATA TO COMPROMISE Department of Transportation Report No. FI-2013-123 Date Issued: September 10,
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
Audit of the Department of State Information Security Program
UNITED STATES DEPARTMENT OF STATE AND THE BROADCASTING BOARD OF GOVERNORS OFFICE OF INSPECTOR GENERAL AUD-IT-15-17 Office of Audits October 2014 Audit of the Department of State Information Security Program
Information Technology Policy
ITP Number ITP-SEC024 Category Security Contact [email protected] Information Technology Policy IT Security Incident Policy Effective Date August 2, 2012 Supersedes Scheduled Review Annual 1. Purpose
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
SaaS. Business Associate Agreement
SaaS Business Associate Agreement This Business Associate Agreement ( BA Agreement ) becomes effective pursuant to the terms of Section 5 of the End User Service Agreement ( EUSA ) between Customer ( Covered
Privacy Impact Assessment
Privacy Impact Assessment For: Education Investigative Tracking System (EDITS) Date: April 10, 2013 Point of Contact: Hui Yang System Owner: Wanda A. Scott Author: William Hamel Office of Inspector General
Section 28.1 Purpose. Section 28.2 Background. DOT Order 1351.28 Records Management. CIOP Chapter 1351.28 RECORDS MANAGEMENT
CIOP Chapter 1351.28 RECORDS MANAGEMENT TABLE OF CONTENTS Section 28.1 Purpose... 1 Section 28.2 Background... 1 Section 28.3 Scope and Applicability... 2 Section 28.4 Definitions... 4 Section 28.5 Policy...
INFORMATION EXCHANGE AGREEMENT BETWEEN THE SOCIAL SECURITY ADMINISTRATION AND THE STATE OF [NAME OF STATE], [NAME OF STATE AGENCY]
2012 MODEL STC AGREEMENT INFORMATION EXCHANGE AGREEMENT BETWEEN THE SOCIAL SECURITY ADMINISTRATION AND THE STATE OF [NAME OF STATE], [NAME OF STATE AGENCY] AS THE STATE TRANSMISSION/TRANSFER COMPONENT
Safeguarding Against and Responding to the Breach of Personally Identifiable Information
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 DEPUTY DIRECTOR FOR MANAGEMENT M-07-16 May 22, 2007 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES
Appendix A: Rules of Behavior for VA Employees
Appendix A: Rules of Behavior for VA Employees Department of Veterans Affairs (VA) National Rules of Behavior 1 Background a) Section 5723(b)(12) of title 38, United States Code, requires the Assistant
Exhibit 2. Business Associate Addendum
Exhibit 2 Business Associate Addendum This Business Associate Addendum ( Addendum ) governs the use and disclosure of Protected Health Information by EOHHS when functioning as a Business Associate in performing
CIOP CHAPTER 1351.40 Common Operating Environment (COE) Services Management Policy TABLE OF CONTENTS. Section 40.1. Purpose
CIOP CHAPTER 1351.40 Common Operating Environment (COE) Services Management Policy TABLE OF CONTENTS Section 40.1. Purpose... 1 Section 40.2. Background... 2 Section 40.3. Scope and Applicability... 3
Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee
Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies Privacy Committee Web 2.0/Cloud Computing Subcommittee August 2010 Introduction Good privacy practices are a key
FirstCarolinaCare Insurance Company Business Associate Agreement
FirstCarolinaCare Insurance Company Business Associate Agreement THIS BUSINESS ASSOCIATE AGREEMENT ("Agreement"), is made and entered into as of, 20 (the "Effective Date") between FirstCarolinaCare Insurance
BUSINESS ASSOCIATE AGREEMENT TERMS
BUSINESS ASSOCIATE AGREEMENT TERMS This Addendum ( Addendum ) is incorporated into and made part of the Agreement between SIGNATURE HEALTHCARE CORPORATION ("Covered Entity ) and ( Business Associate"),
DEPARTMENTAL DIRECTIVE
ADMINISTRATIVE COMMUNICATIONS SYSTEM U.S. DEPARTMENT OF EDUCATION DEPARTMENTAL DIRECTIVE OM:5-101 Page 1 of 17 (07/16/2010) Distribution: All Department of Education employees Approved by: /s/ Winona H.
BUSINESS ASSOCIATE AGREEMENT
COLUMBIA AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) is entered into as of ( Effective Date ) by and between The Trustees of Columbia University in the City of
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN. Stewart C. Miller & Co., Inc. (Business Associate) AND
HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN Stewart C. Miller & Co., Inc. (Business Associate) AND City of West Lafayette Flexible Spending Plan (Covered Entity) TABLE OF CONTENTS
ClOP CHAPTER 1351.39. Departmental Information Technology Governance Policy TABLE OF CONTENTS. Section 39.1
ClOP CHAPTER 1351.39 Departmental Information Technology Governance Policy TABLE OF CONTENTS Section 39.1 Purpose... 1 Section 39.2 Section 39.3 Section 39.4 Section 39.5 Section 39.6 Section 39.7 Section
SAMPLE BUSINESS ASSOCIATE AGREEMENT
SAMPLE BUSINESS ASSOCIATE AGREEMENT This is a draft business associate agreement based on the template provided by HHS. It is not intended to be used as is and you should only use the agreement after you
SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281. SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh
SYSTEM OF RECORDS NO.: OCIO/QN.01 SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281 SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh Street, SW, Washington
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Agreement ( Agreement ) is made and entered into this day of [Month], [Year] by and between [Business Name] ( Covered Entity ), [Type of Entity], whose business address
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
Utica College. Information Security Plan
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
This Instruction implements Department of Homeland Security (DHS) Directive 110-01, Privacy Policy for Operational Use of Social Media.
I. Purpose Department of Homeland Security DHS Directives System Instruction Number: 110-01-001 Revision Number: 00 Issue Date: 6/8/2012 PRIVACY POLICY FOR OPERATIONAL USE OF SOCIAL MEDIA This Instruction
BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION
BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION This Agreement governs the provision of Protected Health Information ("PHI") (as defined in 45 C.F.R.
INFORMATION EXCHANGE AGREEMENT BETWEEN THE SOCIAL SECURITY ADMINISTRATION (SSA) AND THE [NAME OF STATE] (STATE)
INFORMATION EXCHANGE AGREEMENT BETWEEN THE SOCIAL SECURITY ADMINISTRATION (SSA) AND THE [NAME OF STATE] (STATE) A. PURPOSE: The purpose of this Information Exchange Agreement ( IEA ) is to establish terms,
Significant Revisions to OMB Circular A-127. Section Revision to A-127 Purpose of Revision Section 1. Purpose
Significant Revisions to OMB Circular A-127 Section Revision to A-127 Purpose of Revision Section 1. Purpose Section 5. Definitions Section 6. Policy Section 7. Service Provider Requirements Section 8.
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) by and between (hereinafter known as Covered Entity ) and Office Ally, LLC. (hereinafter known as Business Associate ), and
Department of Veterans Affairs VA HANDBOOK 6500.6 CONTRACT SECURITY
Department of Veterans Affairs VA HANDBOOK 6500.6 Washington, DC 20420 Transmittal Sheet MARCH 12, 2010 CONTRACT SECURITY 1. REASON FOR ISSUE: This Handbook establishes the procedures to implement security
