System/Service Type Function Data Maintenance Retention Period
|
|
|
- Shauna Shepherd
- 10 years ago
- Views:
Transcription
1 /Service Type Function Data Maintenance Retention Period Active Directory Windows directory management for C&IT and select University departments. Maintained [1] Replication being implemented Fall 2012 in lieu of backups. Ad Astra (Room Scheduling) Provides automated room scheduling for classrooms and events. Maintained [1] Ad Astra (Room Scheduling) Ad Astra (Room Scheduling) AppWorx (Job Scheduler) Application data Contains administrative systems job scheduling information. Maintained [1] AppWorx (Job Scheduler) AppWorx (Job Scheduler) Banner Administrative The integrated ERP system managing data for the Human Resources, Finance, Alumni/Advancement, Student, and Financial Aid applications in the University. Maintained [1] Banner Application Logs BANSECR logs Violation log for Banner processes managed by Banner Security. Stored as part of the Banner Database. Maintained [1] Banner Application Logs Logfile - Grade Changes, Term information, holds Insertion, Update, and Deletion information about selected data on these topics. Stored as part of the Banner Database. Maintained [1] Banner Imaging To manage electronic documents stored in association with the Banner ERP system. Banner Workflow -- Prod Stores the metadata to implement business practices in work flows. Stored as part of the Banner Database. n/a Banner Workflow -- Prod Banner Workflow -- Prod Course management and learning system that 2 separate Web server logs, and 1 log contains data entered by faculty, students, and staff that lives in Database categorized by course or organization. All courses statistics in the live table are kept for 6 and orgs that ever had a Blackboard presence months, in the stats table for 2 years. continue to be preserved. Web server logs are kept for 3 months. 45 days onsite, 2 months remote Blackboard Learning Management Blackboard Learning Management
2 Blackboard Learning Management Broadcast Messaging Service for , text, and IM messaging to all WSU faculty, staff, and students, for emergency, academic, and administrative communications. Maintained [1] C&IT Change Management Application C&IT tool for tracking changes to major systems. Maintained [1] C&IT tool for tracking Help Desk and other support requests. This system has been replaced by TechSolutions for Help Desk usage. It is sill being CallTracker used by various departments around campus. Maintained [1] Cashiering A system, hosted by the vendor IDC that handles inperson and Web payment cashiering transac-tions. There are interfaces to and from the Banner ERP system. Cisco Network Admission Control (was Clean Access) Server used to screen computers in WSU Resid-ence Halls & apartments for patching, malware, etc. Maintained [1] 200K records (roughly 30 days) Coeus that maintains information about research grant, from requesting to budget. Will no longer be a C&IT Maintained database after 10/1/2013 Maintained [1] Coeus Listener Logs Research Maintained Coeus Research Maintained Cognos Application Server Cognos Detail Activities Log Request for Cognos Services including the requesters ID, Report Name, and error messages. 2 months Cognos Application Server Cognos Application Server Dadmin -- Directory Administration Tool C&IT tool for administering WSU Access IDs. Dadmin actions are recorded in several places. Every Dadmin action done since the release of Dadmin has been logged. There are currently no plans to truncate this log. 45 days onsite, 2 months remote Manages IP vulnerabilities and Recording Rights Echelon Warnings Maintained [1] FMLA Source A system, hosted by the vendor that handles FMLA requests. is fed by information from the Banner ERP system. Maintained [1] Rolling log determined by FTP Server (for non-anonymous logins) available storage. C&IT tool for making software available. Maintained [1] 45 days onsite, 2 months remote Housing Management -- This is that contains housing eligibility and per-forms housing recruitment and applications. It also maintains housing accounts for occupants. a local WSU system Interfaces from Banner to Housing. Maintained [1] LDAP Rolling log determined by size (currently 105MB; lasts about 30 minutes) Current access management system. Maintained [1] 45 days onsite, 2 months remote
3 Lecture Capture (Echo 360) Rolling log determined by available storage. A system to record, store, and retrieve classroom lectures. Maintained [1] Local 45 days - remote 2 months Meru (RADIUS?) Server that manages authentication for access to campus WiFi. See Data Maintenance No data stored One Card that contains eligibility and enrollment infor-mation for WSU s multi-purpose identification and debit card. Also maintains data such as cash balance associated with a One Card. Interfaces from Banner to One Card and from One Card to Banner. Maintained [1, 3] Online Hiring (People Admin) A system, hosted by the vendor that handles job postings and applications. There are interfaces to the ODS reporting system. Maintained [1] Operational Data Store (ODS) and Enterprise Data Warehouse (EDW) Where WSU s reporting data, mostly coming from Banner, is extracted and maintained for administrative reporting purposes. Maintained [1] Parking Parking is the system that contains parking enroll-ment information. Maintained [1] Pipeline/Luminis Wayne State University s internal portal. Rolling log determined by size (currently 10MB) Local 45 days, remote 2 months Pipeline/Luminis Wayne State University s internal portal. Temporary Files: 6 hrs Pipeline/Luminis Pipeline/Luminis All Views Group Database: 1 week N/A Unused Databases: 4 weeks Identity History: 30 days Local 45 days, remote 2 months Attacker History: 30 days Asset Profile: 30 days Device Log Data: 30 days Researchers Dashboard Portal that provides researchers with access to grants administration data from Banner, Coeus and Banner Imaging. No data stored Web Server logs for 6 months Salesforce A vendor-hosted CRM system for tracking customer contacts with students and staff. is fed by information from the Banner ERP system. Maintained [1] Vendor-managed application backups urity/ (WSU does not provide backup services.) Software Clearinghouse -- now Magento??? Space Management ARCHIBUS / CFI C&IT service for providing licensed software to authorized users. The actual purchasing system is handled offsite. A system, hosted by vendor s the implementation partner CFI to maintain usage and architectural data for buildings and rooms in the University. Maintained [1] Rolling log determined by size (currently 105MB; lasts about Local 45 days - remote 2 months Vendor-managed application (WSU does not provide backup services.)
4 STARS provides student advising support. Maintained [1]? TALX A system, hosted by the vendor TALX that handles employment verification, unemployment and I9. There are interfaces to and from the Banner ERP system. Maintained [1] Tech Solutions (Footprints) IT Service Management system used by C&IT and the School of Medicine Maintained [1] Indefinite at this time. Time and Attendance, WorkForce A system, hosted by the vendor Workforce to manage a subset of FP&M employees (custodial) time and attendance. There are interfaces to and from the Banner ERP system. Maintained [1] Travel Wayne / Concur A system, hosted by the vendor Concur that handles travel requests. There are interfaces to the Banner ERP system. Maintained [1] Voic for recording messages left on University telephones. Maintained [1]. New messages are purged in 30 days. Deleted messages are purged in 15 days. Saved messages are purged in 23 days. VPN (Virtual Private Network) Server for secure offsite access. N/A 30 days Wayne Connect Wayne State University s communication and collaboration system. Maintained [1,3,4]. Deleted if user down-loads to desktop with POP. 1 month provided by vendor (WSU does not provide backup services.) WayneBuy - SciQuest A system, hosted by the vendor SciQuest that handles purchasing requests. There are interfaces to and from the Banner ERP system. Maintained [1] WaynePM - Halogen A system, hosted by the vendor Halogen, that handles performance appraisal data. There are interfaces to and from the Banner ERP system. Maintained [1] Windstar The system does tax reporting for employees that are not US citizens and not permanent residents. There are interfaces between Banner and Windstar. Maintained [1] WSU Blog Facility Blog server. Maintained [1,2] Local 45 days - remote 2 months Appworx Store data for the Banner ERP application. Store data for numerous home grown applications generally associated with the Banner ERP systems. recover Astra Store data for home grown applications
5 recover Blackboard Store Data for the Production Job Scheduler recover Store Data for the Production Batch Report viewing Coeus system recover Store Data for the Production Incident and Problem Footprints mgmt. system recover
6 Luminis Store Data for the Production Portal recover ODS/EDW Store operational and Strategic Reporting Data recover Store Data for the Production Research OIM Management recover Store Data for the Production Classroom SEC scheduling
7 Smarti SPRD WSU1 / Banner recover Store Data for the Production Security Management recover Store Data for the Production Oracle Identity Management recover Store Data for the Production Course Management recover
Strategic Plan for Technology 2015-2020
Florida Gulf Coast University Strategic Plan for Technology 2015-2020 Information Resource Committee I. Overview of the Process Information Resource Committee In the Fall of 2014, the Planning and Budget
North Florida Community College
North Florida Community College Technology Plan Table of Contents Executive Summary... 3 Technology Vision... 5 Annual Initiatives... 6 2010 Data Center Expansions... 6 The Next 3 Years... 6 Technology
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
RFP BOR-1511 Federated Identity Services - Response to Questions / Answers
Q # 1 RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Under Technical Requirements the following requirement is listed: 2. The solution is cloud-based softwareas-a-service, requiring
District Information Technology Service Catalog
Coast Community College District - District Information Technology - IT Portfolio and 9-6-2013 to use the same contact information as follows: District Office [email protected] or extension 84618;
Version: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
Electronic Data Retention and Preservation Policy 1
1 Purpose and Scope The purpose of this policy is to: Identify the types of College-related electronic information, including the location of the information; Identify what departments or individuals are
Information Technology Services technology immersion for new employees
Information Technology Services technology immersion for new employees Technology Immersion At CWRU The ITS Mission: To provide for the information technology needs of the campus community We re always
MiVoice Business Product Category. MiVoice Business System Administration. MiVoice Business Moves, Adds, and Changes Self Study
MiVoice Business Product Category MiVoice Business Moves, Adds, and Changes Self Study (formerly MCD 3300 ICP Basic System Administration Self Study) (Note: This course is also bundled at no cost with
Entrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
FTP Use. Internal NPS FTP site instructions using Internet Explorer:
FTP Use File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers
Administrative Systems Services
Administrative Systems Services Banner ERP: Email/Calendar services Application Data Support Windows System Administration Unix/Linux System Administration Database Hosting, System Administration, Application
Strategic Plan. for the. Department of Information Technology 2008-2012
Strategic Plan for the Department of Information Technology 2008-2012 Submitted by Frank Williams Director, Information Technology October 20, 2008 Strategic Plan Information Technology 2008-2012 Information
MiVoice Business Product Category. MiVoice Business System Administration. MiVoice Business Moves, Adds, and Changes Self Study
MiVoice Business Product Category MiVoice Business Moves, Adds, and Changes Self Study (formerly MCD 3300 ICP Basic System Administration Self Study) (Note: This course is also bundled at no cost with
3.11 System Administration
3.11 The functional area is intended to contribute to the overall flexibility, efficiency, and security required for operating and maintaining the system. Depending on the architecture of the system, system
Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment
Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost
Effective Use of Security Event Correlation
Effective Use of Security Event Correlation Mark G. Clancy Chief Information Security Officer The Depository Trust & Clearing Corporation DTCC Non-Confidential (White) About DTCC DTCC provides custody
Using YSU Password Self-Service
Using YSU Password Self-Service Using YSU Password Self-Service Password Self-Service Web Interface Required Items: YSU (MyYSU) Directory account, Web browser This guide will assist you with using the
Administering the Web Server (IIS) Role of Windows Server
Course 10972A: Administering the Web Server (IIS) Role of Windows Server Course Details Course Outline Module 1: Overview and Installing Internet Information Services In this module students will learn
District IT Service Catalog
2015 16 District IT Catalog District IT Catalog This Catalog provides a listing of each service offered by District IT. Each described service includes a service level agreement (SLA) and how a particular
OFFSITE BACKUP & RESTORE USER/ ADMINISTRATOR GUIDE
OFFSITE BACKUP & RESTORE USER/ ADMINISTRATOR GUIDE Offsite Backup & Restore\User/Admin Guide\Updated on 3/15/2006. Version 1.1 1 Offsite Backup & Restore Offsite Backup & Restore is a client-server application
WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0
WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
NETWORK SECURITY GUIDELINES
NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus
White Paper. Support for the HIPAA Security Rule PowerScribe 360
White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as
Computer Visions Course Outline
www.compvisions.com 16 Corporate Woods Blvd. Albany, NY 12211 Computer Visions Course Outline Get What You Want We offer highly customizable group training courses: desktop applications, web development,
2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business
Enabling Small Business Success 2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business 2008 All Covered Inc. www.allcovered.com Contents EXECUTIVE SUMMARY... 3 RECOMMENDATIONS...
Summary of Current ITMP Projects by Status. Summary of All ITMP Projects by Status (136 current plus 18 new initiatives)
Attachment "A" Summary of Current ITMP Projects by Status Percent of Projects by Status Type Abreviation No. of Projects 27% Ongoing O 36 35% Complete Com 47 6% Project Started PS 8 7% Budgeted B 10 15%
General Overview Portal Administration
COMSCENTRE ONE TOUCH CONTROL General Overview Portal Administration Version 2.0 Date: September 2014 TABLE OF CONTENTS 1 General... 3 1.1 Prerequisites... 3 1.2 Logging into the OTC... 3 2 Accounts...
Backup with synchronization/ replication
Backup with synchronization/ replication Peer-to-peer synchronization and replication software can augment and simplify existing data backup and retrieval systems. BY PAUL MARSALA May, 2001 According to
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
Core Data Service 2015 IT Domain Definition Change Overview
Core Data Service 2015 IT Domain Definition Change Overview Administration and Management of IT Administration of central IT organization CIO or CTO position Institutional IT planning Financial planning
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Backing Up and Restoring Data
Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application
How To Deploy Cisco Jabber For Windows 2.5.1 On A Server Or A Network (For A Non-Profit) For A Corporate Network (A.Net) For Free (For Non Profit) For An Enterprise) Or
Deployment Models Cisco Jabber for Windows provides two deployment models, on-premises or cloud-based. Learn about each deployment model and review the available options for on-premises and cloud-based
ManageEngine Desktop Central. Mobile Device Management User Guide
ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems
Mapping EventTracker Reports and Alerts To The SANS 20 Critical Controls Consensus Audit Guidelines v3.1 Prism Microsystems, October 2012
Mapping EventTracker Reports and Alerts To The SANS 20 Critical Controls Consensus Audit Guidelines v3.1 Prism Microsystems, October 2012 Consensus Audit Guidelines Control 1 - Inventory of Authorized
Georgia Tech Active Directory Policy
Georgia Tech Active Directory Policy Policy No: None Rev 1.1 Last Revised: April 18, 2005 Effective Date: 02/27/2004 Last Review Date: April 2005 Next Review Date: April 2006 Status Draft Under Review
Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Introduction to Network Discovery and Identity
The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity
Essex County College INFORMATION TECHNOLOGY MASTER PLAN 2009-2012
Essex County College INFORMATION TECHNOLOGY MASTER PLAN 2009-2012 TABLE OF CONTENTS Introduction... 3 Guiding Principles... 4 Alignment... 5 Projected Annual Costs... 6 Goals and Objectives... 7 Page 2
IIT Cognos Financial Reporting Dashboard User Guide
IIT Cognos Financial Reporting Dashboard User Guide Updated 12/17/09 Table of Contents 1. INTRODUCTION TO THE COGNOS FINANCIAL REPORTING DASHBOARD... 2 2. ABOUT COGNOS... 3 2.1. Logging Into Cognos...
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
Cybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
Office of Information Technology Service Catalog FY2015
Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Table of Contents Accounts & Passwords... 3 Administrative... 4 Business Tools and Services...
Features of AnyShare
of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
McAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
Northwestern University Dell Kace Patch Management
Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.
Office of Information Technology Resources Handbook for NSC Employees
NEVADA STATE COLLEGE Office of Information Technology Resources Handbook for NSC Employees Becoming Familiar with NSC s IT Resources and Policies Office of Information Technology Summer 2012 Table of Contents
Measuring IT Staff Time at Georgia State University
EDUCAUSE Center for Applied Research Research Bulletin Volume 2008, Issue 4 February 19, 2008 Measuring IT Staff Time at Georgia State University Randall Alberts, Georgia State University Karen D. Oates,
ClockWork Enterprise 5
ClockWork Enterprise 5 Technical Overview rev 5.1 Table of Contents Overview... 3 Database Requirements... 4 Database Storage Requirements... 4 Sql Server Authentication and Permissions... 5 ClockWork
Request for Resume (RFR) CATS II Master Contract. Section 1 General Information R00B4400024
RFR Number: (Reference BPO Number) Functional Area (Enter One Only) Section 1 General Information R00B4400024 Functional Area 10 - IT Management Consulting Services Position Title/s or Service Type/s (Short
Managed Antivirus Quick Start Guide
Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION
REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION SD003 V2.3 Issue Date 02 July 2014 1) SERVICE OVERVIEW The Managed Backup Service (MBS) is a streamlined alternative to traditional backup and restore
OpManager MSP Edition
OpManager MSP Edition Product Overview (6.5) June 2007 Agenda MSP Edition Architecture And Features About OpManager MSP Demo (https://mspdemo.opmanager.com) MSP Edition Architecture And Features Scalable
Introduction to Computing @ WSU
Introduction to Computing @ WSU Table of Contents 1 - Information Technology (IT) Security... 2 Information to Remember... 2 2 - Malware... 2 Information to Remember... 3 3 - Firewalls... 3 Information
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
IT Infrastructure for High Availability E-Services. John S. Camp, CIO Wayne State University Detroit, MI 48202
IT Infrastructure for High Availability E-Services E John S. Camp, CIO Wayne State University Detroit, MI 48202 Copyright Statement John S. Camp 2003. This work is the intellectual property of the author.
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Technology Solutions for NERC CIP Compliance June 25, 2015
Technology Solutions for NERC CIP Compliance June 25, 2015 2 Encari s Focus is providing NERC CIP Compliance Products and Services for Generation and Transmission Utilities, Municipalities and Cooperatives
Functional Requirements for Digital Asset Management Project version 3.0 11/30/2006
/30/2006 2 3 4 5 6 7 8 9 0 2 3 4 5 6 7 8 9 20 2 22 23 24 25 26 27 28 29 30 3 32 33 34 35 36 37 38 39 = required; 2 = optional; 3 = not required functional requirements Discovery tools available to end-users:
Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools
White Paper Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools Introduction The modern workforce is on the hunt for tools that help them get stuff done. When the technology
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Strategic Plan FY 2014-2016
Strategic Plan FY 2014-2016 CONTENTS SUMMARY 3 ACADEMIC SERVICES 4 DATA MANAGEMENT & REPORTING 6 COMMUNICATIONS & COLLABORATION 7 IT SERVICES 8 INFRASTRUCTURE 9 SECURITY 10 BRAND BUILDING 11 INITIATION
How To Use Quantum Rbs Inc. Small Business Backup
Small Business Backup & Recovery (File Servers, Peer-to-Peer, Laptops, Desktops) Smart Features: Continuous Backup Anywhere Access to Backed Up Data Simple Rate Plan Secure Bank Grade Encryption Open Files
H.I.P.A.A. Compliance Made Easy Products and Services
H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 [email protected] 877-232-9191 Dear Health Care Professional,
Office of Information Technology Service Catalog FY2015
Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Table of Contents Accounts & Passwords... 3 Administrative... 4 Business Tools and Services...
CRM For Internal Services Copyright 2011, Saudi Aramco. All rights reserved.
CRM For Internal Services Copyright 2011, Saudi Aramco. All rights reserved. Akram Rabah May, 2011 Agenda Starting Point Services Solution Objectives External Services Internal Services Internal Services
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
How To Set Up Dataprotect
How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Download and Install the Citrix Receiver for Mac/Linux
Download and Install the Citrix Receiver for Mac/Linux NOTE: WOW can only be used with Internet Explorer for Windows. To accommodate WOW customers using Mac or Linux computers, a Citrix solution was developed
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
Payment Card Industry Data Security Standard
Payment Card Industry Data Security Standard Introduction Purpose Audience Implications Sensitive Digital Data Management In an effort to protect credit card information from unauthorized access, disclosure
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
