Best Practices in Internet Voting
|
|
|
- Phillip Howard Woods
- 10 years ago
- Views:
Transcription
1 Best Practices in Internet Vting Jrdi Puiggalí, Jesús Chóliz, Sandra Guasch Scytl Secure Electrnic Vting Tuset 20, 1-7, Barcelna, Spain I. Intrductin Nw a day, gvernments are using alternative vting channels such as pstal, fax, r electrnic vting t allw vters t cast their vtes remtely. Fr instance, in USA, the Unifrmed and Overseas Citizens Absentee Vting Act (UOCAVA) [1] and Military and Overseas Vter Empwerment (MOVE) Act [2] are fcused n prviding t military and verseas vters means t exercise their right t vte remtely. When chsing a specific scheme fr remte vting, it is imprtant t evaluate the security f the system by taking int accunt its security risks. The security measures implemented by the system must be identified and their effectiveness n mitigating these risks evaluated. Mrever, it must be ensured that these security measures are designed and implemented prperly, evaluating if the measures prperly address the security issues. If they are nt implemented in a prper way, the security level prvided drps dramatically. Fr instance, the fact that a vting platfrm is using a cryptgraphic mechanism des nt ensure that this is prperly implemented. This paper is fcused n evaluating Internet Remte Vting security measures that can be applied t mitigate the risks f remte vting. This can be used as reference when evaluating the best practices applied when designing and implementing these security measures. T evaluate their effectiveness, we used pstal vting as reference. The paper is rganized as fllws: in sectin II we intrduce sme basic security risks f remte vting, in sectin III, sme security cnsideratins used when implementing security measures in an Internet Remte Vting scheme are presented; in sectin IV we evaluate hw the security measures effectively mitigate the intrduced security risks using pstal vting as reference, and the paper cncludes in sectin V. II. Security Risks f Remte Vting In this sectin, we define general security risks f remte vting withut cnsidering a specific vting channel. They idea is t use them as reference fr cmparing different remte vting channels independently f the technlgy used by the channel. The risks that we will use as reference are: Unauthrized vters casting vtes: nneligible vters culd try t cast a vte fr a specific electin. The vting channel must prvide a rbust way t remtely identify vters. Vter impersnatin: a vter r an attacker culd try t cast a vte n behalf anther persn. The vting channel must prvide a rbust way t detect any impersnatin attempt. Ballt stuffing: an attacker can try t add in the ballt bx vtes frm vters that did nt participate in the vting prcess. The vting channel must prevent the acceptance f vtes that have nt been cast by their intended vters. Vter privacy cmprmise: an attacker culd break the vter privacy, identifying the vter with her vting ptins and, thereby, breaking the vte secrecy. The vting system must ensure that the vter s intent remains secret during the vting and cunting phases. Vter cercin and vte buying: ne persn r rganizatin culd buy r frce a vter t vte fr specific vting ptins. The vting channel must prevent a vter frm prving t a third party in an irrefutable way her vting intent. Vte mdificatin: vte cntents culd be mdified t change the electin results. The vting system must detect any manipulatin f valid cast vtes. Vte deletin: an attacker culd try t delete valid vtes frm the ballt bx. The ballt bx must be prtected against unauthrized changes. Publicatin f nn-authrized intermediate results: the intermediate results culd be disclsed befre the electin is clsed, influencing thse vters that have nt exercised their right t vte yet. The vting system has t preserve the secrecy f the cast vtes until the tally prcess t prevent any partial results disclsures. Vter distrust: a vter des nt have any means fr verifying the crrect receptin and cunt f her vte. Therefre, the vter culd have a negative feeling abut the vting prcess. The vting platfrm must allw the vter t check if the vte has been crrectly received at its destinatin, and if it has been present in the tallying prcess.
2 Electin byctt-denial f service: an attacker culd disrupt the availability f the vting channel by perfrming a denial f service attack. The vting platfrm must detect the eventual cngestin f the electin services in rder t react against them as sn as pssible, e.g. by using cntingency channels. Inaccurate auditability: nt enugh electin traceability r easy t tamper with audit data may allw attackers t hide any unauthrized behavir. The vting channel shuld prvide means t implement an accurate audit prcess and t detect any manipulatin f the audit data. III. Security cnsideratins when implementing security measures in Internet Remte Vting schemes When evaluating an Internet Vting platfrm, it is imprtant t evaluate the efficiency f the measures implemented t manage the security risks. In this sectin we will intrduce sme security methds implemented in vting platfrms and evaluate their efficiency n achieving the security bjectives demanded in a secure electin. These measures will be used in this paper t evaluate the risk mitigatin f remte vting platfrms. Authenticatin methds: ne imprtant issue in Internet vting is hw vter identity can be prved in a remte way. A usual apprach cnsists n prviding a username and a passwrd t the vter at the time f registratin, and request fr them at the time f casting the vte, t ensure the identity f the vter. Fllwing this apprach, the username / passwrd values have t be stred in the vting server in rder t verify the identity f the vter. Therefre, in case an external attacker gains access t it, these credentials culd be stlen frm r mdified in this server, in rder t impersnate valid vters. Mrever, these credentials are vulnerable t eavesdrpping attacks that intercept the passwrds when submitted. Alternative prpsals cnsist n using strng authenticatin methds, such as netime passwrds r digital certificates. One-time passwrds prevent the re-use f intercepted credentials, since the authenticatin infrmatin sent (passwrd) changes each time the vter is authenticated. The mst rbust slutin fr vter authenticatin is the use f digital certificates, since it prvides, in additin t access authenticatin, data authenticatin: by digitally signing her vte, the vter can demnstrate that she is the wner f a specific vte. When this apprach is used, the vte is encrypted befre being signed. Otherwise, the digital signature culd be used t crrelate vters with vtes. In case vters d nt have digital certificates (e.g. an electrnic ID card), a key raming mechanism can be used t prvide digital certificates t vters when casting their vtes. The digital certificate wuld be prtected by a PIN r passwrd knwn by the vter. This passwrd is nt stred in a remte database and therefre cannt be accessed t impersnate the vter. Vte encryptin: in an e-vting platfrm, vtes are vulnerable t eavesdrpping practices during their transmissin and strage. Therefre, vte encryptin at the time f vte casting is f paramunt imprtance t preserve vte secrecy. Sme vting platfrms implement vte encryptin at the netwrk transmissin level, using SSL cnnectins between the vter PC and the vting server. Hwever, SSL encryptin falls shrt t prtect end-t-end vter privacy, since the vte is nt encrypted when leaving the transmissin channel: the vte is received at the vting server in clear text. Therefre, any attacker that gains access t the server system culd access t the clear-text vte infrmatin and break the vter privacy. T slve this issue, it is strngly recmmended t use data level encryptin f vtes, such as encrypting the vtes using an electin public key. That way, any attack at vting server level will nt cmprmise vter privacy, since vtes leaving the vting channel are still encrypted. The prtectin f the electin private key is further discussed in a later sectin. Vte integrity: cast vtes are vulnerable frm being tampered with by attackers that gain access t the vting system. As mentined in previusly sectins, an efficient apprach t prevent vte manipulatin after casting a vte is t digitally sign it after encryptin. Alternatively, vtes can be prtected by applying a cryptgraphic MAC functin (e.g., an HMAC functin) and send this value as an integrity prf f the vte. Hwever, this measure has sme security risks, since the key used t calculate the MAC functin must be als knwn by the vting server t validate the vte integrity. Therefre, an attacker wh gained access t the vting server culd generate valid integrity prfs f mdified vtes. Digital signatures issued by vters d nt have this prblem. Mrever, digital signatures can be used fr bth integrity verificatin and identificatin purpses. In additin t digital signatures, advanced cryptgraphic techniques, such as zer-knwledge prfs f rigin [3], can be used t ensure that the encrypted vte has been recrded as cast by the vter. The digital signatures and zer-knwledge prfs can
3 be stred jintly with the vtes in the digital ballt bx, in rder t ensure their integrity until the mment f vte decryptin Prtectin f the electin private key: as mentined befre, the electin private key is aimed t prtect vters privacy and intermediate results secrecy. Usually, asymmetric encryptin algrithms are used: vtes are encrypted using a public key, and they can nly be decrypted using the crrespnding private key. T prevent that an individual persn culd decrypt the vtes, this key must be prtected using a separatin f duties apprach. A recmmended practice cnsists n splitting the key in several shares using threshld cryptgraphy algrithms, and t give ne share t each Electral Bard member. That way, a minimum number f Electral Bard members must cllabrate t recver the electin private key and decrypt the vtes. It is f paramunt imprtance t use a threshld scheme t prevent that the lss f ne share culd prevent the decryptin f the vtes. Annymizing vtes befre decryptin: mst vting platfrms directly decrypt the vtes at the end f the electin. Hwever, if the decryptin is dne straight frward, it culd be pssible t crrelate clear text vtes with encrypted nes and, therefre, t riginal vters. It is critical t break the crrelatin between clear text vtes frm the riginal casting rder. The mst efficient methds are based n Mixnets, where vtes are shuffled and decrypted/encrypted several times befre btaining the vte cntents; and the hmmrphic tally, where the electin result is btained withut decrypting the individual vtes, but decrypting the result f perating the encrypted vtes. Other methds (such as randmizing vtes while stred) culd nt fully guarantee that there is n link between vtes and vting rder. Individual and Universal verificatin methds: ne f the majr cncerns f remte vting in general is the lack f means fr the vter t verify the crrect receptin and cunt f her vte. The intrductin f remte electrnic vting can prvide t the vters sme means t individually verify the vting prcess, prviding mre cnfidence and detecting pssible attacks. The verificatin prcess can be split in tw methds: cast as intended and cunted as cast verificatin. The cast as intended verificatin cnsists n ensuring that the vte received by the vting server cntains the vting ptins riginally selected by the vter. Fr instance, it can be used t detect if the vter cmputer has any malware that is changing her vting ptins befre encryptin. One way t perfrm this verificatin cnsists n calculating special cdes (cmmnly called Return Cdes) using the encrypted vte received at the vting server, and returning them t the vter. The vter will in turn use a special Vting Card issued fr the electin t verify that the received Return Cdes are thse assigned t the vting ptins she has chsen. Since the Return Cdes are calculated using a secret key nly knwn by the vting server, an attacker cannt deliver frged Return Cdes t the vter withut being detected. The cunted as cast verificatin cnsists n ensuring that the vte cast by the vter is included in the final tally. This verificatin detects manipulatin r deletin f cast vtes. One methd t ensure that the vte has reached the cunting phase is t deliver t the vter a receipt with a randm identifier. If this randm identifier can nly be retrieved frm the encrypted and tallied vtes, a vter can then verify that her vte has been included in the tally. It is f paramunt imprtance that these randm identifiers cannt be crrelated with clear text vtes. Otherwise, the Vting Receipt culd be used fr vte buying r cercin practices. This measure must be cmplemented with the universal verificatin f the decryptin prcess. Universal verificatin shuld allw auditrs and bservers t verify in an irrefutable way that the decrypted vtes represent the cntents f the encrypted nes. In ther wrds, that the decryptin prcess did nt manipulate the results. This can be achieved using advance cryptgraphic techniques. Traceability and Auditability: traceability is essential fr an Internet vting platfrm: lgs r prfs generated by the different mdules can be used t detect and react against real-time attacks r malfunctins, as well as ensuring the reliability f the electin results. All the sensitive peratins perfrmed in the vting platfrm mdules have t be registered in lgs, taking care f nt registering infrmatin that can cmprmise vters privacy. In rder t prevent an attacker frm deleting r mdifying these lgs (t hide any attack), they can be cryptgraphically prtected, in such a way that a specific lg cannt be deleted withut detectin. Als, critical prcesses such as vte decryptin shuld be designed t prvide cryptgraphic prfs f crrect perfrmance, s an auditr can verify that the electin results actually crrespnd t the values f the vtes cast by the vters. It is recmmended the use advanced cryptgraphic techniques t audit the crrect perfrmance f these prcesses. Therefre, bth auditrs and vters can participate in the audit
4 prcess (universal verifiability), increasing als the vter cnfidence. IV. Risk Mitigatin in Remte Vting Depending n the apprach used fr implementing a remte electrnic vting platfrm, security risks are managed in mst efficient way. Therefre, the analysis n hw these risks are prperly mitigated is f paramunt imprtance when taking a decisin f implementing a remte electrnic vting prcess. Several studies and reprts discussing the risks and cuntermeasures f specific schemes fr remte vting have been presented [4], [5], highlighting the main differences between pstal vting, fax vting, e- mail vting and Internet vting. Hwever, these analyses are mainly fcused n cmparing hw the risks are managed by the different remte vting channels. In this sectin, we cmpare hw different remte electrnic vting platfrm appraches manage the security risks present in remte vting. T this end, we will use as reference the security risks intrduced at the beginning f this paper. In additin, t evaluate the risk mitigatin efficiency f each apprach, we will use as reference hw similar risks are addressed in pstal vting. Unauthrized vters casting vtes, vter impersnatin and ballt stuffing. Internet Vting with strng authenticatin: Mitigatin Level: High. Vters are prtected frm reply attacks and nly vtes digitally signed by valid vters are accepted. Internet Vting with passwrd-based authenticatin: Mitigatin Level: Lw. Vters are vulnerable t credential stealing attacks. Ballt stuffing is pssible. Pstal Vting: Mitigatin Level: Lw. Vter handwritten signatures are difficult t validate r nt always validated. Ballt stuffing is pssible. Vter privacy cmprmise. Internet Vting with data-level encryptin: Mitigatin Level: High. Vtes are encrypted befre being cast. Cryptgraphic measures can be implemented t break any cnnectin between vte and vter (such as vte shuffling prcesses befre decryptin). Internet Vting with netwrk-level encryptin (SSL): Mitigatin Level: Lw. Vtes are nly prtected during their transmissin and cntents culd be accessed at vting server. Pstal Vting: Mitigatin Level: Medium. Vtes are stred in envelpes cntaining the names f the vters. Vtes can be intercepted t access t their cntents befre they are received by electin fficials. Vter cercin and vte buying. Internet Vting with multiple-vting: Mitigatin Level: Medium. If a vter is cerced, she can cast a new vte later. Internet Vting with kisk: Mitigatin Level: High. Vte is cast in a cntrlled envirnment as traditinal electins. Pstal Vting: Mitigatin Level: Lw. Vters can shw the selected vting ptins t third parties befre casting their vtes. Vte mdificatin. Internet Vting with vter digital signatures: Mitigatin Level: High. Only valid vters can digitally sign vtes. Internet Vting with server digital signatures: Mitigatin Level: Medium. Vtes can be manipulated befre being digitally signed by the server. Internet Vting with MAC digital signatures: Mitigatin Level: Lw. Integrity prfs can be frged in case f getting access t the vting server. Pstal Vting: Mitigatin Level: Lw. There is n way t detect that the cast vte has been mdified. Vte deletin. Internet Vting with cryptgraphic vting receipts: Mitigatin Level: High. Vting receipts allw vters t detect the eliminatin f their vtes. Internet Vting with standard vting receipts: Mitigatin Level: Lw. Vting receipts nly allw vters t knw that the server received the vte. Pstal Vting: Mitigatin Level: Lw. It is pssible t eliminate r delay valid vtes withut detectin. Publicatin f nn-authrized intermediate results. Internet Vting with data-level encryptin: Mitigatin Level: High. Only the Electral Bard members can decrypt the vtes at the end f the electin. Secret sharing techniques can be used t ensure separatin f duties when decrypting. Internet Vting with netwrk-level encryptin (SSL): Mitigatin Level: Lw.
5 Intermediate results culd be btained frm clear-text vtes received in the vting server. Pstal Vting: Mitigatin Level: Medium. Vtes culd be intercepted during transprtatin. Vter distrust. Internet Vting with cryptgraphic verificatin methds: Mitigatin Level: High. The use f individual and universal verificatin methds, allws vters and auditrs t verify the crrect behavir f the vting platfrm. Internet Vting withut verificatin methds: Mitigatin Level: Lw. Vters have t trust the vting platfrm, since they have n evidence f the crrect recrding and cunting f their vtes. Pstal Vting: Mitigatin Level: Lw. There is n guarantee that the vte is received and cunted by Electin Officials. Electin byctt-denial f service. Internet Vting: Mitigatin Level: Medium. Despite remte e-vting is vulnerable t DS attacks, the advantage is that vters and electin managers can detect this behavir and apply crrective measures t reduce the impact (e.g., vte using an alternative channel r server). Pstal Vting: Mitigatin Level: Medium. DS attacks (e.g., delivery delays) are impssible t detect and, therefre, are mre effective than previus nes. The difference is that these are mre difficult t implement. Inaccurate auditability. Internet Vting with cryptgraphic audit means: Mitigatin Level: High. The use f individual and universal audit means facilitates t audit the real behavir f the vting platfrm. Using immutable lgs ensures that audit prcesses are based n reliable audit data. Internet Vting with standard audit means: Mitigatin Level: Lw. Audit prcess is based n standard lg infrmatin that culd be tampered with. Pstal Vting: Mitigatin Level: Lw. Audit means nly cver part f the vting channel. cnsidered when evaluating the security f an e- vting platfrm. T shw the impact f sme f these measures, we evaluated hw they can mitigate sme f the security risks f remte vting. In this evaluatin we als cnsidered the efficiency f Internet vting platfrms implementing mre standard security measures and als pstal vting. The main cnclusin is that the use f cryptgraphic mechanisms des nt always increase the security f the vting platfrm if they are nt prperly implemented. References [1] UOCAVA law nline: [2] MOVE Act is Subtitle H f H.R. 2647: [3] Jakbssn, M. A practical mix. In K. Nyberg, editr, EUROCRYPT '98, pages Springer-Verlag, LNCS N [4] Puiggalí, J. and Mrales-Rcha, V Remte vting schemes: a cmparative analysis. In Prceedings f the 1st internatinal Cnference n E-Vting and Identity (Bchum, Germany, Octber 04-05, 2007). A. Alkassar and M. Vlkamer, Eds. Lecture Ntes In Cmputer Science. Springer-Verlag, Berlin, Heidelberg, [5] Regenscheid, A. and Hastings, N A Threat Analysis n UOCAVA Vting Systems. NIST. V. Cnclusins In this paper, we have presented the security risks f a remte vting platfrm, and intrduced sme recmmendatins f security measures that must be
GUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
Ensuring end-to-end protection of video integrity
White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring
Key Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
Personal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
HIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
Data Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au
RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS Best practices IT security refers t the bdy f techniques and best practices t prtect yur cmputers and yur interests in the use f IT services, such as nline
ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide
ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: [email protected],
Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3
EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.
THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM
THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant
This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.
Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an
IMT Standards. Standard number A000014. GoA IMT Standards. Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical
IMT Standards IMT Standards Oversight Cmmittee Gvernment f Alberta Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical Standard number A000014 Electrnic Signature Metadata
BackupAssist SQL Add-on
WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system
The ad hoc reporting feature provides a user the ability to generate reports on many of the data items contained in the categories.
11 This chapter includes infrmatin regarding custmized reprts that users can create using data entered int the CA prgram, including: Explanatin f Accessing List Screen Creating a New Ad Hc Reprt Running
In addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
Watlington and Chalgrove GP Practice - Patient Satisfaction Survey 2011
Watlingtn and Chalgrve GP - Patient Satisfactin Survey 2011 Backgrund During ne week in Nvember last year patients attending either the Chalgrve r the Watlingtn surgeries were asked t cmplete a survey
The Ohio Board of Regents Credit When It s Due process identifies students who
Credit When It s Due/ Reverse Transfer FAQ fr students Ohi is participating in a natinal grant initiative, Credit When It s Due, designed t implement reverse-transfer, which is a prcess t award assciate
Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
Emulated Single-Sign-On in LISTSERV Rev: 15 Jan 2010
Emulated Single-Sign-On in LISTSERV Rev: 15 Jan 2010 0. Nte that frm LISTSERV versin 15.5, LISTSERV supprts using an external LDAP directry (r Windws Active Directry) fr lgin authenticatin in additin t
VCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS
APPENDIX A FORM ADV (Paper Versin) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS Frm ADV: General Instructins Read these instructins carefully befre
POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015
A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY
Data Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK
Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs
Process for Responding to Privacy Breaches
Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident
Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013
Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies
BRILL s Editorial Manager (EM) Manual for Authors Table of Contents
BRILL s Editrial Manager (EM) Manual fr Authrs Table f Cntents Intrductin... 2 1. Getting Started: Creating an Accunt... 2 2. Lgging int EM... 3 3. Changing Yur Access Cdes and Cntact Infrmatin... 3 3.1
System Business Continuity Classification
Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required
Simple and Efficient Contract Signing Protocol
Simple and Efficient Cntract Signing Prtcl Abdullah M. Alaraj Infrmatin Technlgy Department Cllege f Cmputer, Qassim University Saudi Arabia Abstract In this paper, a new cntract signing is prpsed based
COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
CDC UNIFIED PROCESS PRACTICES GUIDE
Dcument Purpse The purpse f this dcument is t prvide guidance n the practice f Risk Management and t describe the practice verview, requirements, best practices, activities, and key terms related t these
The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future
The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents
Best Practice - Pentaho BA for High Availability
Best Practice - Pentah BA fr High Availability This page intentinally left blank. Cntents Overview... 1 Pentah Server High Availability Intrductin... 2 Prerequisites... 3 Pint Each Server t Same Database
Presentation: The Demise of SAS 70 - What s Next?
Presentatin: The Demise f SAS 70 - What s Next? September 15, 2011 1 Presenters: Jeffrey Ziplw - Partner BlumShapir Jennifer Gerasimv Senir Manager Delitte. SAS 70 Backgrund and Overview Purpse f a SAS
Frequently Asked Questions About I-9 Compliance
Frequently Asked Questins Abut I-9 Cmpliance What is required t verify wrk authrizatin? The basic requirement t verify wrk authrizatin is the Frm I-9. This frm is available n the HR website: http://www.fit.edu/hr/dcuments/frms/i-9.pdf
IN-HOUSE OR OUTSOURCED BILLING
IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability
Using PayPal Website Payments Pro UK with ProductCart
Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...
Plus500CY Ltd. Statement on Privacy and Cookie Policy
Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and
Disk Redundancy (RAID)
A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.
ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation
ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is
CSAT Account Management
CSAT Accunt Management User Guide March 2011 Versin 2.1 U.S. Department f Hmeland Security 1 CSAT Accunt Management User Guide Table f Cntents 1. Overview... 1 1.1 CSAT User Rles... 1 1.2 When t Update
March 1, 2012. VIA E-mail to [email protected]
March 1, 2012 VIA E-mail t [email protected] Ms. Leah Andersn Directr, Financial Sectr Divisin Department f Finance L Esplanade Laurier 20 th Flr, East Twer 140 O Cnnr Street Ottawa, ON K1A 0G5 Dear Ms.
DisplayNote Technologies Limited Data Protection Policy July 2014
DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f
Municipal Advisor Registration
FACT SHEET Municipal Advisr Registratin SEC Open Meeting Sept. 18, 2013 The Securities and Exchange Cmmissin tday will cnsider whether t adpt a rule that wuld establish a permanent registratin regime fr
expertise hp services valupack consulting description security review service for Linux
expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS
Dodd-Frank Report on Seller Financing
Ddd-Frank Reprt n Seller Financing December 10, 2013 Published by Glbal Publishing Inc. 9799 Old St. Augustine Rd. Jacksnville, FL 32257 p. 904-262-0491 f. 904-262-1464 [email protected]
Using PayPal Website Payments Pro with ProductCart
Using PayPal Website Payments Pr with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 3 What is Website Payments Pr?... 3 Website Payments Pr and Website Payments Standard...
Overview of the Final Requirements for Meaningful Use - 2015 through 2017
Overview f the Final Requirements fr Meaningful Use - 2015 thrugh 2017 On Oct. 6, 2015, the Centers fr Medicare & Medicaid Services (CMS) issued a final rule utlining the requirements fr eligible prfessinal
CHECKING ACCOUNTS AND ATM TRANSACTIONS
1 Grades 6-8 Lessn 1 CHECKING ACCOUNTS AND ATM TRANSACTIONS Tpic t Teach: This lessn is intended fr middle schl students in sixth thrugh eighth grades during a frty minute time perid. The lessn teaches
A Model for Automatic Preventive Maintenance Scheduling and Application Database Software
Prceedings f the 2010 Internatinal Cnference n Industrial Engineering and Operatins Management Dhaka, Bangladesh, January 9 10, 2010 A Mdel fr Autmatic Preventive Maintenance Scheduling and Applicatin
How to put together a Workforce Development Fund (WDF) claim 2015/16
Index Page 2 Hw t put tgether a Wrkfrce Develpment Fund (WDF) claim 2015/16 Intrductin What eligibility criteria d my establishment/s need t meet? Natinal Minimum Data Set fr Scial Care (NMDS-SC) and WDF
Session 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
Special Tax Notice Regarding 403(b) (TSA) Distributions
Special Tax Ntice Regarding 403(b) (TSA) Distributins P.O. Bx 7893 Madisn, WI 53707-7893 1-800-279-4030 Fax: (608) 237-2529 The IRS requires us t prvide yu with a cpy f the Explanatin f Direct Rllver,
EA-POL-015 Enterprise Architecture - Encryption Policy
Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:
Licensing Windows Server 2012 R2 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents
Data Analytics for Campaigns Assignment 1: Jan 6 th, 2015 Due: Jan 13 th, 2015
Data Analytics fr Campaigns Assignment 1: Jan 6 th, 2015 Due: Jan 13 th, 2015 These are sample questins frm a hiring exam that was develped fr OFA 2012 Analytics team. Plan n spending n mre than 4 hurs
:: EMAIL ADMIN HELP AT A GLANCE Contents
:: EMAIL ADMIN HELP AT A GLANCE Cntents Email Admin Dmain Inf... 2 POP Accunts... 3 Edit POP Accunts... 4 Search Accunts... 5 Frwards... 6 Spam Cntrl... 7 CatchAll... 8 EMAIL ADMIN HELP AT A GLANCE ::
HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
Connecting to Email: Live@edu
Cnnecting t Email: Live@edu Minimum Requirements fr Yur Cmputer We strngly recmmend yu upgrade t Office 2010 (Service Pack 1) befre the upgrade. This versin is knwn t prvide a better service and t eliminate
TaskCentre v4.5 Send Message (SMTP) Tool White Paper
TaskCentre v4.5 Send Message (SMTP) Tl White Paper Dcument Number: PD500-03-17-1_0-WP Orbis Sftware Limited 2010 Table f Cntents COPYRIGHT 1 TRADEMARKS 1 INTRODUCTION 2 Overview 2 FEATURES 2 GLOBAL CONFIGURATION
How to deploy IVE Active-Active and Active-Passive clusters
Hw t deply IVE Active-Active and Active-Passive clusters Overview Juniper Netscreen SA and SM series appliances supprt Active/Passive r Active/Active cnfiguratins acrss a LAN r a WAN t prvide high availability,
2. When logging is used, which severity level indicates that a device is unusable?
Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages
HP Connected Backup Online Help. Version 8.7.1 04 October 2012
HP Cnnected Backup Online Help Versin 8.7.1 04 Octber 2012 Legal Ntices Warranty The nly warranties fr Hewlett-Packard prducts and services are set frth in the express statements accmpanying such prducts
User Guide Version 3.9
User Guide Versin 3.9 Page 2 f 22 Summary Cntents 1 INTRODUCTION... 3 1.1 2 CREATE A NEW ACCOUNT... 4 2.1 2.2 3 NAVIGATION... 3 CREATE AN EMAIL ACCOUNT... 4 CREATE AN ALIAS ACCOUNT... 6 MODIFYING AN EXISTING
FINRA Regulation Filing Application Batch Submissions
FINRA Regulatin Filing Applicatin Batch Submissins Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 FTP Access t FINRA... 2 FTP Accunt n FINRA s
Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall
Implementing iflder Server in the DMZ with iflder Data inside the Firewall Nvell Cl Slutins AppNte www.nvell.cm/clslutins JULY 2004 OBJECTIVES The bjectives f this dcumentatin are as fllws: T cnfigure
Enterprise Security Management CIS 259
Enterprise Security Management CIS 259 Prerequisites CIS 175 Descriptin This curse is designed t cver the managerial aspects f cmputer security and risk management fr enterprises. The student will attain
System Business Continuity Classification
System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality
First Global Data Corp.
First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First
Service Desk Self Service Overview
Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service
Telelink 6. Installation Manual
Telelink 6 Installatin Manual Table f cntents 1. SYSTEM REQUIREMENTS... 3 1.1. Hardware Requirements... 3 1.2. Sftware Requirements... 3 1.2.1. Platfrm... 3 1.2.1.1. Supprted Operating Systems... 3 1.2.1.2.
WHITEPAPER SERIES. [email protected] 610.717.0413 www.metavistech.com
WHITEPAPER SERIES Shredded Strage in SharePint 2013 What des Shredded Strage mean, hw much des it actually save and hw t take advantage f it in SharePint 2013. What is Shredded Strage? Shredded Strage
Online Banking Agreement
Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet
Preventing Identity Theft
Preventing Identity Theft Each year, millins f Americans have their identity stlen. ENG Lending wants yu t have the infrmatin yu need t prtect yurself against identity theft. While there are n guarantees
Travel Insurance. Is your insurance company listening to you? Handbook on
Is yur insurance cmpany listening t yu? If yur cmplaints have nt been addressed by yur insurance cmpany, please cntact t register yur cmplaints and track their status r yu may email us at [email protected]
Welcome to Microsoft Access Basics Tutorial
Welcme t Micrsft Access Basics Tutrial After studying this tutrial yu will learn what Micrsft Access is and why yu might use it, sme imprtant Access terminlgy, and hw t create and manage tables within
Tipsheet: Sending Out Mass Emails in ApplyYourself
GEORGETOWN GRADUATE SCHOOL Tipsheet: Sending Out Mass Emails in ApplyYurself In ApplyYurself (AY), it is very simple and easy t send a mass email t all f yur prspects, applicants, r students with applicatins
NSW FAIR TRADING. Real Estate Fraud Prevention Guidelines
NSW FAIR TRADING Real Estate Fraud Preventin Guidelines Real Estate Fraud Preventin Guidelines Cntents 1. Intrductin..... 2 2. Backgrund.. 2 3. The Law.. 2 4. Cmmissiner s Guidance.... 3 5. Prescribed
ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor
ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library
URM 11g Implementation Tips, Tricks & Gotchas ALAN MACKENTHUN FISHBOWL SOLUTIONS, INC.
URM 11g Implementatin Tips, Tricks & Gtchas ALAN MACKENTHUN FISHBOWL SOLUTIONS, INC. i Fishbwl Slutins Ntice The infrmatin cntained in this dcument represents the current view f Fishbwl Slutins, Inc. n
SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010
OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity
Integrating With incontact dbprovider & Screen Pops
Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint
RSA SecurID Software Token Security Best Practices Guide. Version 3
RSA SecurID Sftware Tken Security Best Practices Guide Versin 3 Cntact Infrmatin G t the RSA crprate web site fr reginal Custmer Supprt telephne and fax numbers: www.rsa.cm. Trademarks RSA, the RSA Lg
MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER
MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER This Audit Cmmittee Charter has been amended as f July 17, 2015. The Audit Cmmittee shall review and reassess this Charter annually and recmmend
