RESOURCE AND PATIENT MANAGEMENT SYSTEM. Drug Accountability (PSA) GUI Invoice Upload Program Installation and Configuration Guide
|
|
|
- Marjorie Wright
- 10 years ago
- Views:
Transcription
1 RESOURCE AND PATIENT MANAGEMENT SYSTEM Drug Accountability (PSA) GUI Invoice Upload Program Installation and Configuration Guide Version 1.0 Office of Information Technology (OIT) Division of Information Resource Management Albuquerque, New Mexico
2 Table of Contents 1.0 Introduction GUI Invoice Upload Program Configure XWB Listener Starter Start the TCP Listener To Edit the Port Use XWB MENU The GUI Invoice Upload Program...3 Appendix A:...5 Contact Information ii Table of Contents
3 Preface The purpose of this document is to provide the user with information about installation and configuration of the PSA Graphical User Interface Invoice Upload Program. iii Preface
4 1.0 Introduction This manual provides the information necessary for installing and configuring the Graphical User Interface (GUI) Invoice Upload program for Inventory Management (namespace: PSA) in the Resource and Patient Management System (RPMS). 1 Introduction
5 2.0 GUI Invoice Upload Program The GUI Invoice Upload Program was released as part of APSP Configure XWB Listener Starter The recommended port for this is set within the range of for production servers. Use caution if you want to change this port. If desired, replace with another port in this range in the step below. Edit Option Schedule Option Name: XWB LISTENER STARTER Menu Text: Start All RPC Broker Listeners TASK ID: QUEUED TO RUN AT WHAT TIME: DEVICE FOR QUEUED JOB OUTPUT: QUEUED TO RUN ON VOLUME SET: RESCHEDULING FREQUENCY: TASK PARAMETERS: SPECIAL QUEUEING: Startup Persistent Exit Save Next Page Refresh Enter a command or '^' followed by a caption to jump to a specific field. COMMAND: Press <PF1>H for help Insert Figure 2-1: Configuring the XWB Listener Starter 1. Set SPECIAL QUEUEING: to Startup Persistent. 2. Use the Down Arrow to navigate to COMMAND. 3. At the COMMAND prompt, type SAVE, and then Exit. 2.2 Start the TCP Listener Select IHS Kernel Option: tm Taskman Management Schedule/Unschedule Options One-time Option Queue Taskman Management Utilities... List Tasks Dequeue Tasks GUI Invoice Upload Program 2
6 Requeue Tasks Delete Tasks Print Options that are Scheduled to run Cleanup Task List Print Options Recommended for Queueing Select Taskman Management Option: one-time Option Queue You can only select OPTION's that have the SCHEDULING RECOMMENDED field set to YES or STARTUP. Select OPTION NAME: XWB LISTENER STARTER Start All RPC Broker Listeners Does this option need a DEVICE? NO// Enter Particular Volume set if needed: Requested Start Time: NOW// Figure 2-2: Starting the TCP Listener To Edit the Port Use XWB MENU Choose RPC Listener Edit. Select OPTION NAME: XWB MENU RPC Broker Management Menu RPC Listener Edit Start All RPC Broker Listeners Stop All RPC Broker Listeners Clear XWB Log Files Debug Parameter Edit View XWB Log Select RPC Broker Management Menu Option: RPC Listener Edit Select RPC BROKER SITE PARAMETERS DOMAIN NAME:? Answer with RPC BROKER SITE PARAMETERS DOMAIN NAME, or STATUS: DEMO.IHS.GOV Select RPC BROKER SITE PARAMETERS DOMAIN NAME: DEMO.IHS.GOV Select BOX-VOLUME PAIR: DEHR:CACHE// BOX-VOLUME PAIR: DEHR:CACHE// Select PORT: 12500// PORT: 12500// STATUS: RUNNING// TYPE OF LISTENER: New Style// CONTROLLED BY LISTENER STARTER: YES// Figure 2-3: Choosing RPC Listener Edit 2.3 The GUI Invoice Upload Program Included in the release of APSP 1010 is the PSA_MCKESSON_UPLOAD.exe file. This program will enable the user to upload the McKesson invoice into RPMS. 1. Copy the PSA_MCKESSON_UPLOAD.exe file onto the client personal computer (PC). Then create a shortcut on the All Users desktop. GUI Invoice Upload Program 3
7 2. Refer to the User Manual for instructions for setting the Internet Protocol (IP) address and port number in the GUI Invoice Upload program. 3. Provide the RPMS server IP address and port number from Section to pharmacy staff that will be using the GUI Invoice Upload program. GUI Invoice Upload Program 4
8 Appendix A: The Resource and Patient Management (RPMS) system is a United States Department of Health and Human Services (HHS), Indian Health Service (IHS) information system that is FOR OFFICIAL USE ONLY. The RPMS system is subject to monitoring; therefore, no expectation of privacy shall be assumed. Individuals found performing unauthorized activities are subject to disciplinary action including criminal prosecution. All users (Contractors and IHS Employees) of RPMS will be provided a copy of the Rules of Behavior (RoB) and must acknowledge that they have received and read them prior to being granted access to a RPMS system, in accordance IHS policy. For a listing of general ROB for all users, see the most recent edition of IHS General User Security Handbook (SOP 06-11a). For a listing of system administrators/managers rules, see the most recent edition of the IHS Technical and Managerial Handbook (SOP 06-11b). Both documents are available at this IHS Web site: The ROB listed in the following sections are specific to RPMS. A.1 All RPMS Users In addition to these rules, each application may include additional RoBs that may be defined within the documentation of that application (e.g., Dental, Pharmacy). A.1.1 Access Only use data for which you have been granted authorization. Only give information to personnel who have access authority and have a need to know. Always verify a caller s identification and job purpose with your supervisor or the entity provided as employer before providing any type of information system access, sensitive information, or nonpublic agency information. Be aware that personal use of information resources is authorized on a limited basis within the provisions Indian Health Manual Part 8, Information Resources Management, Chapter 6, Limited Personal Use of Information Technology Resources. not Retrieve information for someone who does not have authority to access the information. 5
9 Access, research, or change any user account, file, directory, table, or record not required to perform their official duties. Store sensitive files on a PC hard drive, or portable devices or media, if access to the PC or files cannot be physically or technically limited. Exceed their authorized access limits in RPMS by changing information or searching databases beyond the responsibilities of their jobs or by divulging information to anyone not authorized to know that information. A.1.2 Information Accessibility RPMS shall restrict access to information based on the type and identity of the user. However, regardless of the type of user, access shall be restricted to the minimum level necessary to perform the job. Access only those documents they created and those other documents to which they have a valid need-to-know and to which they have specifically granted access through an RPMS application based on their menus (job roles), keys, and FileMan access codes. Some users may be afforded additional privileges based on the functions they perform, such as system administrator or application administrator. Acquire a written preauthorization in accordance with IHS policies and procedures prior to interconnection to or transferring data from RPMS. A.1.3 Accountability Behave in an ethical, technically proficient, informed, and trustworthy manner. Log out of the system whenever they leave the vicinity of their personal computers (PCs). Be alert to threats and vulnerabilities in the security of the system. Report all security incidents to their local Information System Security Officer (ISSO) Differentiate tasks and functions to ensure that no one person has sole access to or control over important resources. Protect all sensitive data entrusted to them as part of their government employment. Abide by all Department and Agency policies and procedures and guidelines related to ethics, conduct, behavior, and information technology (IT) information processes. 6
10 A.1.4 A.1.5 A.1.6 Confidentiality Be aware of the sensitivity of electronic and hard copy information, and protect it accordingly. Store hard copy reports/storage media containing confidential information in a locked room or cabinet. Erase sensitive data on storage media prior to reusing or disposing of the media. Protect all RPMS terminals from public viewing at all times. Abide by all Health Insurance Portability and Accountability Act (HIPAA) regulations to ensure patient confidentiality. not Allow confidential information to remain on the PC screen when someone who is not authorized to that data is in the vicinity. Store sensitive files on a portable device or media without encrypting. Integrity Protect their systems against viruses and similar malicious programs. Observe all software license agreements. Follow industry standard procedures for maintaining and managing RPMS hardware, operating system software, application software, and/or database software and database tables. Comply with all copyright regulations and license agreements associated with RPMS software. not Violate federal copyright laws. Install or use unauthorized software within the system libraries or folders. Use freeware, shareware, or public domain software on/with the system without their manager s written permission and without scanning it for viruses first. System Logon Have a unique User Identification/Account name and password. 7
11 Be granted access based on authenticating the account name and password entered. Be locked out of an account after five successive failed login attempts within a specified time period (e.g., one hour). A.1.7 Passwords Change passwords a minimum of every 90 days. Create passwords with a minimum of eight characters. If the system allows, use a combination of alpha-numeric characters for passwords, with at least one uppercase letter, one lower case letter, and one number. It is recommended, if possible, that a special character also be used in the password. Change vendor-supplied passwords immediately. Protect passwords by committing them to memory or store them in a safe place (do not store passwords in login scripts or batch files). Change passwords immediately if password has been seen, guessed, or otherwise compromised, and report the compromise or suspected compromise to their ISSO. Keep user identifications (IDs) and passwords confidential. not Use common words found in any dictionary as a password. Use obvious readable passwords or passwords that incorporate personal data elements (e.g., user s name, date of birth, address, telephone number, or social security number; names of children or spouses; favorite band, sports team, or automobile; or other personal attributes). Share passwords/ids with anyone or accept the use of another s password/id, even if offered. Reuse passwords. A new password must contain no more than five characters per eight characters from the previous password. Post passwords. Keep a password list in an obvious place, such as under keyboards, in desk drawers, or in any other location where it might be disclosed. Give a password out over the phone. 8
12 A.1.8 A.1.9 Backups Plan for contingencies such as physical disasters, loss of processing, and disclosure of information by preparing alternate work strategies and system recovery mechanisms. Make backups of systems and files on a regular, defined basis. If possible, store backups away from the system in a secure environment. Reporting Contact and inform their ISSO that they have identified an IT security incident and begin the reporting process by providing an IT Incident Reporting Form regarding this incident. Report security incidents as detailed in the IHS Incident Handling Guide (SOP 05-03). not Assume that someone else has already reported an incident. The risk of an incident going unreported far outweighs the possibility that an incident gets reported more than once. A.1.10 Session Timeouts RPMS system implements system-based timeouts that back users out of a prompt after no more than 5 minutes of inactivity. Utilize a screen saver with password protection set to suspend operations at no greater than 10 minutes of inactivity. This will prevent inappropriate access and viewing of any material displayed on the screen after some period of inactivity. A.1.11 Hardware Avoid placing system equipment near obvious environmental hazards (e.g., water pipes). Keep an inventory of all system equipment. Keep records of maintenance/repairs performed on system equipment. 9
13 not Eat or drink near system equipment. A.1.12 Awareness Participate in organization-wide security training as required. Read and adhere to security information pertaining to system hardware and software. Take the annual information security awareness. Read all applicable RPMS manuals for the applications used in their jobs. A.1.13 Remote Access Each subscriber organization establishes its own policies for determining which employees may work at home or in other remote workplace locations. Any remote work arrangement should include policies that Are in writing. Provide authentication of the remote user through the use of ID and password or other acceptable technical means. Outline the work requirements and the security safeguards and procedures the employee is expected to follow. Ensure adequate storage of files, removal, and nonrecovery of temporary files created in processing sensitive data, virus protection, and intrusion detection, and provide physical security for government equipment and sensitive data. Establish mechanisms to back up data created and/or stored at alternate work locations. Remote Remotely access RPMS through a virtual private network (VPN) whenever possible. Use of direct dial in access must be justified and approved in writing and its use secured in accordance with industry best practices or government procedures. Remote not Disable any encryption established for network, internet, and Web browser communications. 10
14 A.2 RPMS Developers RPMS developers shall Always be mindful of protecting the confidentiality, availability, and integrity of RPMS when writing or revising code. Always follow the IHS RPMS Programming Standards and Conventions (SAC) when developing for RPMS. Only access information or code within the namespaces for which they have been assigned as part of their duties. Remember that all RPMS code is the property of the U.S. Government, not the developer. Not access live production systems without obtaining appropriate written access, and shall only retain that access for the shortest period possible to accomplish the task that requires the access. Observe separation of duties policies and procedures to the fullest extent possible. Document or comment all changes to any RPMS software at the time the change or update is made. Documentation shall include the programmer s initials, date of change, and reason for the change. Use checksums or other integrity mechanism when releasing their certified applications to assure the integrity of the routines within their RPMS applications. Follow industry best standards for systems they are assigned to develop or maintain, and abide by all Department and Agency policies and procedures. Document and implement security processes whenever available. RPMS developers shall not Write any code that adversely impacts RPMS, such as backdoor access, Easter eggs, time bombs, or any other malicious code or make inappropriate comments within the code, manuals, or help frames. Grant any user or system administrator access to RPMS unless proper documentation is provided. Release any sensitive agency or patient information. A.3 Privileged Users Personnel who have significant access to processes and data in RPMS, such as, system security administrators, systems administrators, and database administrators, have added responsibilities to ensure the secure operation of RPMS. Privileged 11
15 Verify that any user requesting access to any RPMS system has completed the appropriate access request forms. Ensure that government personnel and contractor personnel understand and comply with license requirements. End users, supervisors, and functional managers are ultimately responsible for this compliance. Advise the system owner on matters concerning information technology security. Assist the system owner in developing security plans, risk assessments, and supporting documentation for the certification and accreditation process. Ensure that any changes to RPMS that affect contingency and disaster recovery plans are conveyed to the person responsible for maintaining continuity of operations plans. Ensure that adequate physical and administrative safeguards are operational within their areas of responsibility and that access to information and data is restricted to authorized personnel on a need-to-know basis. Verify that users have received appropriate security training before allowing access to RPMS. Implement applicable security access procedures and mechanisms, incorporate appropriate levels of system auditing, and review audit logs. Document and investigate known or suspected security incidents or violations and report them to the ISSO, Chief Information Security Officer (CISO), and systems owner. Protect the supervisor, superuser, or system administrator passwords. Avoid instances where the same individual has responsibility for several functions (i.e., transaction entry and transaction approval). Watch for unscheduled, unusual, and unauthorized programs. Help train system users on the appropriate use and security of the system. Establish protective controls to ensure the accountability, integrity, confidentiality, and availability of the system. Replace passwords when a compromise is suspected. Delete user accounts as quickly as possible from the time that the user is no longer authorized system. Passwords forgotten by their owner should be replaced, not reissued. Terminate user accounts when a user transfers or has been terminated. If the user has authority to grant authorizations to others, review these other authorizations. Retrieve any devices used to gain access to the system or equipment. Cancel logon IDs and passwords, and delete or reassign related active and backup files. Use a suspend program to prevent an unauthorized user from logging on with the current user's ID if the system is left on and unattended. 12
16 Verify the identity of the user when resetting passwords. This can be done either in person or having the user answer a question that can be compared to one in the administrator s database. Shall follow industry best standards for systems they are assigned to, and abide by all Department and Agency policies and procedures. Privileged not Access any files, records, systems, etc., that are not explicitly needed to perform their duties. Grant any user or system administrator access to RPMS unless proper documentation is provided. Release any sensitive agency or patient information. 13
17 Contact Information If you have any questions or comments regarding this distribution, please contact the OIT Help Desk (IHS). Phone: (505) or (888) (toll free) Fax: (505) Web: Contact Information
Practice Management Application Suite
RESOURCE AND PATIENT MANAGEMENT SYSTEM Practice Management Application Suite (BPRM) Version 3.0 Office of Information Technology Division of Information Technology Table of Contents 1.0 Introduction...1
IHS Emergency Department Dashboard
RESOURCE AND PATIENT MANAGEMENT SYSTEM IHS Emergency Department Dashboard (BEDD) Version 1.0 Office of Information Technology Division of Information Resource Management Albuquerque, New Mexico Document
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Clinical Scheduling for Windows
RESOURCE AND PATIENT MANAGEMENT SYSTEM Clinical Scheduling for Windows (BSDX) Version 3.0 Office of Information Technology (OIT) Albuquerque, New Mexico Preface Security This manual contains the installation
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
IHS USER SECURITY AUDIT
RESOURCE AND PATIENT MANAGEMENT SYSTEM IHS USER SECURITY AUDIT (BUSA) Version 1.0 Office of Information Technology Division of Information Technology Albuquerque, New Mexico Table of Contents 1.0 Release
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
IHS Emergency Department Dashboard
RESOURCE AND PATIENT MANAGEMENT SYSTEM IHS Emergency Department Dashboard (BEDD) Version 1.0 Office of Information Technology Division of Information Resource Management Albuquerque, New Mexico Table of
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)
Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative
Information Systems Security Assessment
Physical Security Information Systems Security Assessment 1. Is the server protected from environmental damage (fire, water, etc.)? Ideal Answer: YES. All servers must be housed in such a way as to protect
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
Network Protection and Information Security Policy
Network Protection and Information Security Policy Purpose... 1 Scope... 1 Policy... 1 Responsibilities... 1 System Access Control... 2 System Privileges... 4 Establishment Of Access Paths... 6 Computer
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
IT ACCESS CONTROL POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Appendix A: Rules of Behavior for VA Employees
Appendix A: Rules of Behavior for VA Employees Department of Veterans Affairs (VA) National Rules of Behavior 1 Background a) Section 5723(b)(12) of title 38, United States Code, requires the Assistant
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
Lisbon School District 15 Newent Road Lisbon, CT 06351
Pur pose The purpose of this policy is to establish direction, procedures, requirements, and responsibilities to ensure the appropriate protection of the Lisbon Public Schools computer and telecommunication
Information Security Policy
Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER
RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Identification and Authentication on FCC Computer Systems
FCC Computer Security TABLE OF CONTENTS Desk Reference 1 INTRODUCTION...1 Identification and Authentication on FCC Computer Systems 1.1 PURPOSE...1 1.2 BACKGROUND...1 1.3 SCOPE...2 1.4 AUTHORITY...2 2
General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information
General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information The following rules of behavior apply to all Department of Homeland Security
SECURITY RULE POLICIES AND PROCEDURES
County of Sacramento Health Insurance Portability and Accountability Act (HIPAA) SECURITY RULE POLICIES AND PROCEDURES Issued: February 1, 2005 Effective: April 14, 2005 Revised: January 1, 2010 HIPAA
ICT USER ACCOUNT MANAGEMENT POLICY
ICT USER ACCOUNT MANAGEMENT POLICY Version Control Version Date Author(s) Details 1.1 23/03/2015 Yaw New Policy ICT User Account Management Policy 2 Contents 1. Preamble... 4 2. Terms and definitions...
Information Systems Access Policy
Information Systems Access Policy I. PURPOSE The purpose of this policy is to maintain an adequate level of security to protect data and information systems from unauthorized access. This
CAPITAL UNIVERSITY PASSWORD POLICY
1.0 Overview Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of Capital University's
HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Cyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Information Security
Information Security Table of Contents Statement of Confidentiality and Responsibility... 2 Policy and Regulation... 2 Protect Our Information... 3 Protect Your Account... 4 To Change Your Password...
RESOURCE AND PATIENT MANAGEMENT SYSTEM. Basic Site Manager. Announcement and Agenda. October 2012
RESOURCE AND PATIENT MANAGEMENT SYSTEM Basic Site Manager Office of Information Technology (OIT) Albuquerque, New Mexico Table of Contents Table of Contents...i 1.0 General Information...1 1.1 Purpose
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
How To Protect A Hampden County Hmis From Being Hacked
Hampden County HMIS Springfield Office of Housing SECURITY PLAN Security Officers The Springfield Office of Housing has designated an HMIS Security Officer whose duties include: Review of the Security
Personal Health Record
RESOURCE AND PATIENT MANAGEMENT SYSTEM Personal Health Record (BPHR) Personal Health Record Web Portal Administrator Manual Version 2.0 Office of Information Technology (OIT) Division of Information Resource
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-
Musina Local Municipality Information and Communication Technology User Account Management Policy -Draft- Version Control Version Date Author(s) Details V1.0 June2013 Perry Eccleston Draft Policy Page
Remote Access Agreement
Purpose: The purpose of this agreement is to define standards, procedures, and restrictions for connecting to Wayne Public Schools internal network(s) from external hosts (e.g., your home computer) via
Information Security Code of Conduct
Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security
GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS
Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
A Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2
CITY OF BOULDER *** POLICIES AND PROCEDURES
CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of
University of Wisconsin-Madison Policy and Procedure
Page 1 of 14 I. Policy II. A. The, the units of the UW-Madison Health Care Component and each individual or unit within UW-Madison that is a Business Associate of a covered entity (hereafter collectively
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
PERSONAL COMPUTER SECURITY
PERSONAL COMPUTER SECURITY April 2001 TABLE OF CONTENTS 1 INTRODUCTION... 1 1.1 PC INFORMATION SECURITY OVERVIEW... 1 1.2 EXCLUSIONS... 1 1.3 COMMENTS AND SUGGESTIONS... 1 2 PC INFORMATION SECURITY RESPONSIBILITIES...
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
ScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
HIPAA 101: Privacy and Security Basics
HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually
Standard Operating Procedure Information Security Compliance Requirements under the cabig Program
Page 1 of 9 Pages Standard Operating Procedure Information Security Compliance Requirements under the cabig Program This cover sheet controls the layout and components of the entire document. Issued Date:
HIPAA Privacy & Security Rules
HIPAA Privacy & Security Rules HITECH Act Applicability If you are part of any of the HIPAA Affected Areas, this training is required under the IU HIPAA Privacy and Security Compliance Plan pursuant to
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
