الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات

Size: px
Start display at page:

Download "الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات"

Transcription

1 - البحرين الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات

2 Agenda The problem Traditional Methods Case Study Recommendation

3 The problem

4 What is E-waste??? Electronic waste or e-waste is the rapidly expanding volume of obsolete computers, printers, fax machines, mobiles, TVs, photo copies other electronic devices Guaranteed Recycling Xperts Slide 4

5 How Much E-waste Is There? e-waste is a recent phenomenon 130 million cell phones discarded in the US in million PCs become obsolete every year in the US Environmental Production Association estimate 1.9 million tons of e-waste landfilled in 2000 (EXCLUDING electric appliances) 3 5% of material in landfills growing 3 times the rate of other waste million computers/tvs waiting in e-waste purgatory Guaranteed Recycling Xperts Slide 5

6 Where your Data is Stored? Hard Drives & Disks (ATA, USB, Zip disks, SCSI Drives, Magnetic Tapes, Floppies) CDs & DVDs cell phones, Blackberrys and other PDA Routers Copy Machines & Fax Machines

7 Private Data final destination Ref. Richard Troia i-recycle

8 Personal Record Personal Info Payment Info (e.g. Credit Card, Bank Account..etc.) Passwords Personal Correspondences Mission critical information Intellectual property Licensed software Personal Preferences/Behavior Other Personal Info (Pictures, family details, relations, medial info..etc.)

9 Business Records Today, 90 to 95% of all business records are stored in e-format & Paper represents <10% of all Business Records A single gigabyte of electronic storage has the capacity to store up to 75,000 typewritten sheets of papers. After 2 to 3 years of computer or BlackBerry use, it is easy to lose track of what information is stored and where it is located.

10 Theft of Sensitive Information 2003 MIT Student Study: 158 used hard drives 129 still worked 69 had recoverable files 49 contained credit card, medical records & personal correspondence 1 contained ATM transaction info. One of the top areas for dumping e-waste is Africa The number one area of the world for identity theft is AFRICA! Slide 10

11 Traditional Methods

12 The Benefits of Recycling the HD HDD is commonly known as Hard Disk Drive The primary device for storing all your data. One of the most expensive components in a computer (made up mostly of aluminum and other non-biodegradable materials). Provide us with highly reusable materials & protect the environment. Saving a portion of the cost associated with the laborious process by which the whole unit is assembled including the treatment of platters in order to attain a mirror finish.

13 HD recycling Barrier What happens when your info fall in the wrong hand Utilize this info (Marketing, Competitors) Identity Theft Crimes (e.g. blackmail, financial transaction)

14 Is it easy to destroy files Ways to Try to Erase Hard Drive Data Is the Data Truly Gone? Simply Delete the File Empty the Recycle Bin Format the Hard Drive Repartition the Hard Drive Installing a new operating system You need more than this!!!

15 Physical destruction Smash it with a hammer and use a hacksaw (Disintegrate & Pulverize). Grind it to dust (Incinerate). Burn it with acid. Shred Effective, if done correctly (100% destruction in 30 seconds) Makes drive inoperable Time consuming, Flying debris Can t be recycled (Not environmentally friendly) Shredders are costly and not widely available

16 Software Destruction Meaningless pattern of 0 s and 1 s convenient, and permanent Maybe inaccurate Can t be used if media is damaged Need another hard drive to run the software Consume Cost, time and resources (days or weeks for few hundreds HD)

17 Degaussing Strong electromagnetic field destroys data Machine expensive Not guaranteed to penetrate shield Hard drive cannot be reused

18 Still Recovery is possible Data Recovery Software EnCase Forensic ToolKit Examiner Many other specific use tools Data Recovery Hardware Adapters Write-blockers

19 Case Study

20 Glamorgan University Study A recent study by Glamorgan University (source: Time Online website) revealed more that 50% of 111 hard drives purchased contained personal and confidential information. Over 87% of those drives were bought from ebay. This may raises an international concern. While this is beneficial for the legitimated user, there is risk handling over our personal data to terrorists, and corrupt organizations, not to mention the risk of being blackmailed or threatened

21 Space Shuttle Columbia Hard Drive: How NASA Data was recovered after Crash

22 Timeline of Events February 1, 2003 Space shuttle Columbia disaster September 26, 2003 Ontrack Data recovery receives 3 drives recovered from debris September 29, 2003 Ontrack completes recovery of one of the disks April 17, 2008 Physical Review E publishes results of the experiment

23 Hard Drive Condition Looked like a cracked hunk of metal when it arrived for recovery. Every piece of plastic melted All chips burned and loose. Dirty and charred elements in the casing Everything but the platters were unusable.

24 Engineers worked to cut away protective top cover to get access to hard disk assembly

25 Engineers then opened the top cover of the hard disk

26 Engineers had to remove melted plastic from media and corroded, melted head assembly to remove each hard drive platter

27 Recovery Details Platters were intact, but dirty. Cleaned the platters with special chemicals. Placed in a new enclosure Replaced the damage with minor adjustment Used custom software for data transfer that includes sophisticated error handling and calculations. Recovered 99% of the data on the drive.

28 Solution

29 ATA principles of proper data destruction A Absolute: With permission to destroy a record, destroy it in a way that it can never possibly be recovered under any conditions, including forensic data recovery techniques. T Timely: Accumulation of data storage devices is a dangerous practice and should be minimized and all destruction events should take place on a scheduled basis avoiding ad hoc destruction activity that can lead to legal challenges as to the timing of the destruction event. A- Auditability: Must be able to prove that destruction activity is routine and done in good faith.

30 Monitoring & Control of Recycling firms Provide assurance Assurance Independent Audit Firms Expert Confidence Obtain confidence Proof experience Transparency Solid & Transparent work environment make someone responsible Accountability Measurability clearly defined policy

31 Consequences of Non-compliance Loss of Public Trust Loss of Business Legal Fines Cost of Mitigation

32 Market Practice Individual Promises (DELL, HP, IBM, Nokia and others) Independent Authorities (e.g. NIST - National Institute of Standards and Technology) Other legislation such as Health Insurance Portability and Accountability Act. Sarbanes-Oxley Act. Gramm-Leach-Bliley Act. (financial industry). Family Educational Rights and Privacy Act (for educational institutions). Fair and Accurate Credit Transactions Act.

33 Certifying Bodies e-stewards Initiative (e-stewards.org) The e-stewards Initiative is a project of the Basel Action Network (BAN), which is a 501(c)3 non-profit, charitable organization of the United States, based in Seattle, Washington. It is against the backdrop of the growing e-waste crisis that the e-stewards Initiative was born. Without appropriate national and international legislation or enforcement in place in many regions, it is unfortunately left up to individual citizens, corporations, universities, cities all of us to figure out how to prevent the toxic materials in electronics from continuing to cause long term harm to human health and the environment, particularly in countries with developing economies. The National Association For Information Destruction (NAID) offers a highly respected secure data destruction certification program, which helps companies to find qualified providers of secure data destruction. NAID's mission is to promote the information destruction industry and the standards and ethics of its member companies. NAID AAA Certification For Secure Data Destruction

34 Sanitization Methods Clear use software or hardware products to overwrite storage space on the media with non-sensitive data. Purge Degaussing is exposing the magnetic media to a strong magnetic field in order to disrupt the recorded magnetic domains. Destroy Disintegration, Pulverization, Melting, and Incineration Shredding.

35 NIST GUIDELINES FOR MEDIA SANITIZATION

36 Other Guidelines

37 Middle East Status No Certifying Body

38 Many Thanks

Media Disposition and Sanitation Procedure

Media Disposition and Sanitation Procedure Media Disposition and Sanitation Procedure Revision History Version Date Editor Nature of Change 1.0 11/14/06 Kelly Matt Initial Release Table of Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope...

More information

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail. Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20

More information

Destruction and Disposal of Sensitive Data

Destruction and Disposal of Sensitive Data Destruction and Disposal of Sensitive Data Good Practice Guidelines Version: 3.0 Date: March 2015 1 Copyright 2015, Health and Social Care Information Centre. Contents 1. Introduction 3 1.2 Aims and Objectives

More information

Building an ITAD Program:

Building an ITAD Program: Building an ITAD Program: What Your Company Needs To Know By: Integrated Communications & Technologies Contents 3 4 6 7 8 9 Introduction Understanding The Concepts of IT Asset Disposition Evaluating by

More information

Best Practices for Responsible Disposal of Tape Media

Best Practices for Responsible Disposal of Tape Media Best Practices for Responsible Disposal of Tape Media The Environmental and Economic Benefits of Recycling vs. Destruction White Paper The Data Media Source San Jose, CA Data Media Source 2006 For use

More information

Space Shuttle Columbia Hard Drive: How NASA Data was Recovered After Crash

Space Shuttle Columbia Hard Drive: How NASA Data was Recovered After Crash October 1, 2008 Space Shuttle Columbia Hard Drive: How NASA Data was Recovered After Crash Jeff Pederson Manager of Data Recovery Operations 2008 Kroll Ontrack Inc. www.ontrackdatarecovery.com Agenda Timeline

More information

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE IT ASSET DISPOSITION Technology is introduced to business workflows to increase productivity and boost earnings. When the time comes to remove off-lease and end-oflife IT assets, shouldn t those goals

More information

Office Equipment Disposal Policy

Office Equipment Disposal Policy Office Equipment Disposal Policy R ISK MANAGEMENT HANDOUTS OF L AWYERS MUTUAL LAWYERS MUTUAL LIABILITY INSURANCE COMPANY OF NORTH CAROLINA 5020 Weston Parkway, Suite 200, Cary, North Carolina 27513 Post

More information

The nation s largest privately held records and information management company

The nation s largest privately held records and information management company The nation s largest privately held records and information management company Our mission is clear: to lead the records and information management industry by providing our clients the very best service.

More information

Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization

Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization TECHNICAL REFERENCE DOCUMENT Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization Recommendations Key Points: of the National Real world compliance

More information

Samsung WEEE Management Policy (US and Canada)

Samsung WEEE Management Policy (US and Canada) Samsung WEEE Management Policy (US and Canada) 1. Purpose These requirements aim to minimize environmental impacts caused by all Electronic Waste generated by Samsung's US and Canadian operations and programs,

More information

NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12. Issue Date: 15 December 2014 Revised:

NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12. Issue Date: 15 December 2014 Revised: NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12 Issue Date: 15 December 2014 Revised: NSA/CSS STORAGE DEVICE SANITIZATION MANUAL PURPOSE AND SCOPE This manual provides guidance

More information

Information Technology Services Guidelines

Information Technology Services Guidelines Page 1 of 10 Table of Contents 1 Purpose... 2 2 Entities Affected by These Guidelines... 2 3 Definitions... 3 4 Guidelines... 5 4.1 Electronic Sanitization and Destruction... 5 4.2 When is Sanitization

More information

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate

More information

The guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files.

The guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files. Best Practice in Disposing of Records For whom is this guidance intended? This guidance is intended for all University staff that need to dispose of records, on an occasional or regular basis. It is likely

More information

State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number:

State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number: State of Vermont Digital Media and Hardware Disposal Standard Date: Approved by: Policy Number: 1.0 INTRODUCTION... 3 1.1 Authority... 3 1.2 Scope and Purpose:... 3 2.0 STANDARD... 3 2.1 Preface... 3 2.2

More information

A Guide to Minimizing the Risk of IT Asset Disposition

A Guide to Minimizing the Risk of IT Asset Disposition A Guide to Minimizing the Risk of IT Asset Disposition Who is concerned about risk? They may not think about it terms of risk, but almost everyone at your organization is worried about the chinks in its

More information

HIPAA Training for Hospice Staff and Volunteers

HIPAA Training for Hospice Staff and Volunteers HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you

More information

Hard drives dumped; information isn't DON'T BE SMUG IN THINKING PERSONAL DATA HAS BEEN ERASED By Larry Magid Special to the Mercury News

Hard drives dumped; information isn't DON'T BE SMUG IN THINKING PERSONAL DATA HAS BEEN ERASED By Larry Magid Special to the Mercury News Erase Your Hard Drive Permanently erase files, emails, & Data from hard drive. Guaranteed! O&O DiskRecovery V3.0 Data Recovery for Windows with DeepScan function - Free Trial Delete porn history files

More information

DATA SECURITY DATA RECOVERY DATA ERASING COMPUTER FORENSICS

DATA SECURITY DATA RECOVERY DATA ERASING COMPUTER FORENSICS DATA SECURITY DATA RECOVERY DATA ERASING COMPUTER FORENSICS Data Recovery Center EPOS Data Recovery Center offers a unique set of solutions and services in the field of data recovery and information EPOS

More information

Get rid of it Securely to keep it Private

Get rid of it Securely to keep it Private Get rid of it Securely to keep it Private Best Practices for the Secure Destruction of Personal Health Information Information and Privacy Commissioner, National Association for Information Destruction,

More information

Secure Mobile Shredding and. Solutions

Secure Mobile Shredding and. Solutions Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled

More information

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1) Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)

More information

Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates

Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates Introduction and Summary Secure erase SE is defined in the ATA specification

More information

http://www.guardianedge.com/

http://www.guardianedge.com/ Full Disk Encryption & IT Asset Disposition: Protecting Data During the PC Disposal Process A GuardianEdge White Paper 4/7/2006 The information contained in this document represents the current view of

More information

8/28/2015. How to Manage Records. Overview. Learning Objectives. Do you have? Does your office look like this?

8/28/2015. How to Manage Records. Overview. Learning Objectives. Do you have? Does your office look like this? How to Manage Records Records Management Services State of Michigan Overview Common Recordkeeping Problems Risk Management Keeping Records Storing Records Destroying Records Getting Organized Learning

More information

Managing Records: Retention, Destruction and Disposal

Managing Records: Retention, Destruction and Disposal Managing Records: Retention, Destruction and Disposal Presentation by Jennifer L. Cox, J.D. Cox & Osowiecki, LLC Hartford, CT April 10, 2014 Today s Program Identify the universe of records involved Distinguish

More information

Local Government Cyber Security:

Local Government Cyber Security: Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and

More information

University of Wisconsin-Madison Policy and Procedure

University of Wisconsin-Madison Policy and Procedure Page 1 of 6 I. Policy UW-Madison strives to ensure the privacy and security of all patient/clients protected health information in the maintenance, retention, and eventual destruction/disposal of such

More information

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:

More information

Challenges and Solutions for Effective SSD Data Erasure

Challenges and Solutions for Effective SSD Data Erasure Challenges and Solutions for Effective SSD Data Erasure Blancco White Paper Published 8 October 2013 First Edition Table of contents Introduction...3 The Simplicity And Complexity Of SSDs...4 Traditional

More information

Business details. Monday Friday. 10:00am 6:00pm. Saturday 10:00am 5:00pm. Telephone: 020 8315 0005. Email: [email protected].

Business details. Monday Friday. 10:00am 6:00pm. Saturday 10:00am 5:00pm. Telephone: 020 8315 0005. Email: info@pcrepairstore.co. Business details Services and price list 2010 Monday Friday 10:00am 6:00pm Saturday 10:00am 5:00pm We offer professional IT services for home and business users at a cost effective price. We have a team

More information

Protecting. Personal Information A Business Guide. Division of Finance and Corporate Securities

Protecting. Personal Information A Business Guide. Division of Finance and Corporate Securities Protecting Personal Information A Business Guide Division of Finance and Corporate Securities Oregon Identity Theft Protection Act Collecting, keeping, and sharing personal data is essential to all types

More information

Course: Information Security Management in e-governance

Course: Information Security Management in e-governance Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security

More information

UNCLASSIFIED. This page intentionally left blank. UNCLASSIFIED. Clearing And Declassifying Electronic Data Storage Devices (ITSG-06) ii July 2006

UNCLASSIFIED. This page intentionally left blank. UNCLASSIFIED. Clearing And Declassifying Electronic Data Storage Devices (ITSG-06) ii July 2006 This page intentionally left blank. ii July 2006 Foreword The Clearing and Declassifying Electronic Data Storage Devices (ITSG-06) is an publication, issued under the authority of the Chief, Communications

More information

Solid-State Drives with Self-Encryption: Solidly Secure

Solid-State Drives with Self-Encryption: Solidly Secure Solid-State Drives with Self-Encryption: Solidly Secure 09/22/2011 Michael Willett Storage Security Strategist SAMSUNG SOLID STATE DRIVES Solid-State Drives SSD ADVANTAGES SOLID STATE DRIVES Save $$ on

More information

Guidance on Personal Data Erasure and Anonymisation 1

Guidance on Personal Data Erasure and Anonymisation 1 Guidance on Personal Data Erasure and Anonymisation Introduction Data users engaged in the collection, holding, processing or use of personal data must carefully consider how to erase such personal data

More information

IT Trading UK Ltd Computer & IT Equipment Disposal Specialists

IT Trading UK Ltd Computer & IT Equipment Disposal Specialists IT Trading UK Ltd Computer & IT Equipment Disposal Specialists Unit 4A Scott's Close, Downton Business Centre, Downton, Salisbury, Wiltshire, SP5 3RA Tel: 01725 513403 Fax: 01725 513714 Email: [email protected]

More information

Here are my slides from lecture, along with my notes about each slide.

Here are my slides from lecture, along with my notes about each slide. Chapter 3: Storage Here are my slides from lecture, along with my notes about each slide. NOTE: You are expected to attend all class meetings. Please be in the room when class begins and be ready to participate

More information

Recycling Old Mobile Phones

Recycling Old Mobile Phones Schools Mobile Phone Recycling Program Lesson Background This lesson plan has been designed using the Australia Curriculum to engage students from Middle and Upper Primary (Years 3 to 6), with extension

More information

How to implement a Recycling Policy and begin the journey towards Zero Waste

How to implement a Recycling Policy and begin the journey towards Zero Waste How to implement a Recycling Policy and begin the journey towards Zero Waste CONTENTS: Objective and Timeline Gain Management Support Selecting a Recycling Coordinator Research Select Recyclers Set up

More information

ECONOMY 10-15 WORKING DAYS STANDARD 3-8 WORKING DAYS

ECONOMY 10-15 WORKING DAYS STANDARD 3-8 WORKING DAYS TecLeo DATARECOVERYLAB H ELPING Y OU LO O K AFTER YO U R DATA V.A.T. REG. NO. 4410173209 20 Uitzicht Office Park, 5 Bellingham Street, Centurion, 0157 DATA RECOVERY Data Recovery & Data Destruction Price

More information

Student Guide. [email protected]

Student Guide. informationsecurity.training@dss.mil Short: Disposal and Destruction of Classified Information Objective POC Estimated completion time Identify the who, what, when, why, and how concerning disposal and destruction of classified information

More information

Backup and Recovery Plan For Small Businesses

Backup and Recovery Plan For Small Businesses Backup and Recovery Plan For Small Businesses Disclaimer: This article is intended to serve as an informational reference source. While the information is based on sound principles for backup and recovery,

More information

Document Management Plan Preparation Guidelines

Document Management Plan Preparation Guidelines Document Management Plan Preparation Guidelines TABLE OF CONTENTS 1. Purpose of Document 1 2. Definition of Document Management 1 3. Objectives of Document Management 1 4. Terms, Acronyms and Abbreviations

More information

The Health and Environmental Impacts of e-waste

The Health and Environmental Impacts of e-waste The Health and Environmental Impacts of e-waste Presenter: Susanne Dittke Chemical Engineer/Environmental Consultant Tel: 0027-21-7069829 Email:[email protected] Skype: envirosense www.envirosensecc.co.za

More information

Securing Data on Portable Media. www.roxio.com

Securing Data on Portable Media. www.roxio.com Securing Data on Portable Media www.roxio.com Contents 2 Contents 3 Introduction 4 1 The Importance of Data Security 5 2 Roxio Secure 5 Security Means Strong Encryption 6 Policy Control of Encryption 7

More information

Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia

Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia Protecting MIT Data T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia State Laws & Regulations General Laws, Chapter 93H: Massachusetts Data Breach Law, outlines when to notify (2007) 201 CMR 17.00:

More information

Auslogics BoostSpeed 5 Manual

Auslogics BoostSpeed 5 Manual Page 1 Auslogics BoostSpeed 5 Manual [ Installing and using Auslogics BoostSpeed 5 ] Page 2 Table of Contents What Is Auslogics BoostSpeed?... 3 Features... 3 Compare Editions... 4 Installing the Program...

More information

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as required by HIPAA. 1. Definitions. a. Business Associate, as used in this Contract, means the

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

PGP Desktop Email Quick Start Guide version 9.6

PGP Desktop Email Quick Start Guide version 9.6 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Hands-On How-To Computer Forensics Training

Hands-On How-To Computer Forensics Training j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE

More information

Storing and securing your data

Storing and securing your data Storing and securing your data Research Data Management Support Services UK Data Service University of Essex April 2014 Overview Looking after research data for the longer-term and protecting them from

More information

IWR Integrated Waste Recycling. Integrated System for treatment and recycling of Municipal Solid Waste

IWR Integrated Waste Recycling. Integrated System for treatment and recycling of Municipal Solid Waste IWR Integrated Waste Recycling Integrated System for treatment and recycling of Municipal Solid Waste 1 1. Introduction IWR is an integrated system, realised by different Italian companies, manufacturers

More information

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW

More information

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Allow AMI to unlock the value in your redundant IT equipment by extending the lifecycle of your

More information

Guide to good practice: micro data handling and security

Guide to good practice: micro data handling and security The work is licensed under the Creative Commons Attribution-Non-Commercial-Share Alike 2.0 UK: England and Wales Licence. To view a copy of this licence, visit creativecommons.org/licenses/by-nc-sa/2.0/uk/

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

Disaster Recovery Planning Save Your Business

Disaster Recovery Planning Save Your Business Disaster Recovery Planning Save Your Business Your business at risk! Your company is at risk for failure in the event of disaster Your data is at risk for costly loss Your revenue is at risk with lack

More information

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer: Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011

More information

STANDARD 3-8 WORKING DAYS

STANDARD 3-8 WORKING DAYS TecLeo DATARECOVERYLAB HELPING Y OU LO O K AFTER YO U R DATA V.A.T. REG. NO. 4410173209 20 Uitzicht Office Park, 5 Bellingham Street, Centurion, 0157 Price List DATA RECOVERY Deloud (Pty) Ltd Data Recovery

More information

Data storage, collaboration, backup, transfer and encryption

Data storage, collaboration, backup, transfer and encryption Data storage, collaboration, backup, transfer and encryption Scott Summers UK Data Archive Practical research data management 19 April 2016 Overview Looking after research data for the longer-term and

More information

Shredding. Security. Recycling

Shredding. Security. Recycling Shredding Security Recycling WHO WE ARE PHS Datashred has the knowledge, capability and experience to ensure the safe and secure disposal of your confidential material. Trusted by over a third of FTSE

More information

Information Technology Acceptable Usage Policy

Information Technology Acceptable Usage Policy Information Technology Acceptable Usage Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly

More information

Tutorial on Disk Drive Data Sanitization. Summary. Introduction. Table of Contents

Tutorial on Disk Drive Data Sanitization. Summary. Introduction. Table of Contents Tutorial on Disk Drive Data Sanitization Gordon Hughes, UCSD CMRR ([email protected]) Tom Coughlin, Coughlin Associates ([email protected]) Summary Summary: user data is left on disk drives removed from

More information

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result

More information