CPIT Aoraki Communications and Operations Management
|
|
|
- Alban Manning
- 10 years ago
- Views:
Transcription
1 This security standard refers t CPIT, which is the current legal name fr the new rganisatin established 1 January 2016 bringing tgether CPIT and Araki Plytechnic. Knwn as CPIT Araki the new rganisatin will trade under this name until rebranded during CPIT Araki Cmmunicatins and Operatins Management Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121b Principles Infrmatin Cmmunicatin Technlgy Divisin Security Plicy Security Standard, aligned with Security Standards Guidelines and Prcedures AS/NZS ISO/IEC 27001: 2006 fr Infrmatin Security Management
2 Cntents 1 INTRODUCTION ICT OPERATIONAL PRACTICES AND PROCESSES Operatinal Prcedures Change Management Standards Patch Management Standards Capacity Management Security Mnitring Standards Backup and Recvery Standard COMMUNICATION STANDARD AND INFORMATION EXCHANGE Standards Internet Standards APPENDIX CPIT Enterprise Data Cmmunicatins and Operatins Security Standard Page 2 f 14
3 Cmmunicatins and Operatins Management Security Standard Purpse: This standard defines the recmmended security practices fr Cmmunicatins and Operatins Management. This standard s bjective is t define the standards t be fllwed fr the crrect and secure peratin f ICT services. This standard and guideline applies t all ICT assets and services prvided acrss CPIT sites. Authrised By: Dcument Owner ICT Directr Infrastructure Manager Date f Issue: 15 March 2012 Review date: Nvember 2014 Versin: 2.3 References: This dcument shuld be read in cnjunctin with the ICT Security Plicy. In additin it shuld be read in cnjunctin with the fllwing ICT Security Standards: 1. ICT Asset and Media Management Standard 2. Human Resurces ICT Security Standard 3. Physical and Envirnmental Security Standard 4. Access Cntrl Security Standard 5. Infrmatin Systems Acquisitin, Develpment and Maintenance Security Standard Cmmunicatins and Operatins Security Standard Page 3 f 14
4 1 INTRODUCTION ICT equipment supprts the academic prcesses and prvides critical functinality t students and staff. It is essential that the ICT assets that prvide these services are well managed and prtected thrugh the apprpriate adptin f security standards and prcesses that fllw recmmended ICT best practices. Standards and prcesses are required fr Infrmatin Cmmunicatin Technlgy (ICT) t minimise the risk f systems failure, safeguard the integrity f the institutin s sftware and data and maintain the integrity and availability f infrmatin services. The bjective f this security standard is t define the recmmended prcess fr the ICT divisin t fllw t prevent interruptins t business activities and ensure the crrect and secure peratin f cmputer facilities. The standard includes references t IT best practices, including Infrmatin Technlgy Infrastructure Library (ITIL) as this is regarded as the leading best practice fr IT peratins. The fllwing standards are detailed within this standard: Operatinal Prcedures Change Management Patch Management Capacity Management Security Mnitring Backup & Recvery Infrmatin Exchange Rules f Use Standards are t be fllwed during the preparatin f dcumentatin and prcedures t ensure the crrect and secure peratin f ICT secure facilities. Standards fr intrducing change int the Institutin t mitigate any risks impacting prductin services. Standards t update ICT services and mitigate the risk f a security vulnerability r change impacting services. Standards t fllw t prepare the ICT envirnment and minimise the risk f system verlad and services nt being available t meet the required perfrmance. Standards t mnitr ICT services t reduce the risk f a service failing r a security incident, impacting n the services at CPIT. In additin this includes standards fr Security Audits t regularly review the level f security prvided t the Institutin. Standards t maintain suitable backup and recvery services t ensure the availability f ICT services at the Institutin. Acceptable and unacceptable infrmatin exchange thrugh and nline services t ensure apprpriate standards are fllwed t safeguard infrmatin integrity and cnfidentiality. Standards fr accessing and using the Internet including sftware dwnlading, inapprpriate sites and services that are nt permitted when using the Internet. Cmmunicatins and Operatins Security Standard Page 4 f 14
5 2 ICT OPERATIONAL PRACTICES AND PROCESSES It is widely published that a high prprtin f security incidents ccur due t pr IT practices and administrative errrs. It is imprtant that the services and systems within ICT are managed and fllw apprpriate IT best practices such as thse defined within ITIL. ITIL defines the service management prcesses t maintain a fcus n service delivery, availability f ICT services and the integrity f infrmatin. The purpse f this sectin is t define the key elements f ITIL that the Institutin are utilising, fr the management f ICT systems and services. 2.1 Operatinal Prcedures It is essential that ICT staff prepare detailed perating prcedures n the secure and safe peratin f ICT secure facilities. These prcedures need t be maintained, ICT staff made accuntable fr reviewing and available t ICT staff. The peratinal prcedures recmmended are listed in the checklist belw: Ref Operatinal Prcedure Accuntable fr prcedure 1 ICT Services Start-Up and Clse-dwn Infrastructure Manager and Infrmatin Systems Manager 2 Backup and Recvery Prcesses (See sectin 2.6) 3 Supprt Cntracts and emergency pints f cntact 4 ICT Services netwrk verview and system dependencies (t be used in the event f a system utage) 5 Patch management Prcess fr releasing and rll-back fr patches (See sectin 2.3) Infrastructure Manager and Service Desk Manager Service Desk Manager / ICT Directr Infrastructure Manager and Infrmatin Systems Manager Infrastructure Manager and Supprt Centre Manager Review Cycle Annually 6 mnthly Annually 6 mnthly Annually These peratinal prcedures need t be available t all staff and thrugh the change management practice any changes are t be recrded and as apprpriate authrised. 2.2 Change Management Standards ICT systems need t be updated and patched regularly t imprve functinality and t address security vulnerabilities. As ICT services are intrduced t supprt grwth and t prvide new functinality, these changes need t be tested, reviewed and applied thrugh a Change Management Practice. A Change Management Practice can cver all types f change including: emergency fixes t respnd t security vulnerability, changes t current ICT prcesses, changes t perating prcedures r upgrades t new versins f hardware and sftware. The bjective f the change management prcess is t ensure that changes are applied crrectly and d nt cmprmise the security f an ICT system r result in a service being unavailable. Please refer t the ICT Divisin Change Management Dcumentatin fr further infrmatin n the prcess and standards. Cmmunicatins and Operatins Security Standard Page 5 f 14
6 2.3 Patch Management Standards Patching f sftware r hardware is an inevitable part f ICT peratins. The quantity f systems t patch and maintain has been increasing in respnse t a grwing number f security vulnerabilities and an increase in the number f systems managed by rganisatins. Patch management is integrated with change management and the apprval f updates shuld be integrated within the Change Management prcess. The unfrtunate reality abut security vulnerabilities is that after yu apply a patch tday anther ne will be required tmrrw. T address the threats a Patch Management Practice needs t be defined which details the prcess t fllw t ensure vulnerabilities are addressed, in a timely and cntrlled manner. The fllwing standards are t be fllwed t define the Patch Management Prcess: Autmated detectin and release f patches when desktp r laptp cmputers cnnect t the netwrk and use ICT services. This standard des nt apply fr thse cnnectins that are passed directly thrugh t the internet with n direct access t the institutins ICT services (e.g. nn-cpit laptps that cnnect directly t the Internet (Guest/Public Access): When jining the netwrk they must be scanned fr missing security patches. This includes cmputers that are cnnecting thrugh all cmmunicatins channels. If patches are missing, which have been apprved fr distributin, the missing patches are t be installed autmatically n CPIT wned equipment. The user shuld nt be allwed t stp r delay the installatin f patches. Autmated services (like Windws Update Service) can be used t streamline this prcess. Fr servers a planned netwrk brwn-ut perid will be necessary fr servers t be patched; this will require cnfrmance with the Change Management Standard. Mnitring, assessing and incrprating patches within the change management prcess: If a new patch is released it must be assessed fr relevance t the CPIT s ICT services and the severity that the patch addresses. If the patch is deemed critical r urgent then a fast track prcess thrugh the emergency change management prcess needs t be fllwed t test the patch and release it t the prductin envirnment. If the patch is deemed imprtant r the severity f the vulnerability is a lw risk at the Institutin a standard change management prcess is t be fllwed. The Zer Day Attack Zer day attacks ccur when the vulnerability is explited befre the sftware develper has written the patch. This increases the imprtance that any urgent r critical vulnerabilities are identified and a rbust patch management practice starts immediately. Whilst the zer day attack is a threat delaying urgent patches significantly increases the risk. Assessing the patch shuld include: assess the impact n the prductin envirnment (ideally in a test envirnment that replicates the prductin envirnment), a sample set f cmputers and then fllw the release management prcess. T supprt bth prcesses a rll-back and backup prcess must be agreed. As part f the sftware selectin prcess the Patch Management Practice shuld be evaluated and integrated int the current practices. The rll back prcess must be tested regularly t ensure that ICT staff are familiar with the prcess fr remving a security patch. Cmmunicatins and Operatins Security Standard Page 6 f 14
7 Only authrised system administratin staff are permitted t release patches nce frmal apprval (r emergency apprval) has been made as part f the Change Management Prcess. ICT staff shuld register with Security Advisry Services (fr example t receive an early indicatin f security vulnerabilities. 2.4 Capacity Management The ICT resurces shuld be mnitred, tuned and prjectins made f future capacity requirements t ensure services are available and meet expectatins fr staff and students. The bjective is t cmplete advance planning and preparatin t minimise the risk f a systems failure. The fllwing standards apply: Fr each new and current ICT service the capacity requirements shuld be identified. This includes determining if ICT services have the capacity t meet high demands during peaks in user activity, fr example: student enrlment. ICT services need t be mnitred t identify trends in capacity that may impact n system perfrmance at a later date. ICT shuld engage with the institutin s apprpriate Senir Staff members t identify ptential future demands; recmmend this activity is cmpleted annually. ICT need t prepare technlgy radmaps t identify when replacement sftware and hardware will be available t meet rganisatinal demand fr ICT services. Particular attentin given t sftware r hardware that has a lng prcurement time. It is acknwledged that academics are respnsible fr determining the requirements fr IT sftware used t deliver training and curses. 2.5 Security Mnitring Standards ICT systems need t be mnitred cntinuusly and reviewed t assess perfrmance, reduce the likelihd f system verlad and detect ptential r actual malicius intrusin. This includes capturing and recrding security event details which can be used t detect unauthrised activity r can be used as part f a security incident investigatin. The fllwing standards are recmmended fr mnitring the security and health f ICT systems: Security related event lgging shuld be enabled at all times and prtected frm deliberate r accidental verwriting. A centralised mnitring slutin may be used t capture ICT systems perfrmance and security metrics. This system shuld: Be capable and scaled t retain infrmatin lng enugh t meet legal and regulatry requirements. Be restricted t thse individuals wh require access and nt enabled s security lgs can be verwritten (allwing netwrk penetratin t be hidden). Reprt exceptins and plt lng term perfrmance r metrics ver a perid f time. This will allw detectin f lng running vulnerability scanning, peridic passwrd cracking attempts and reprt n security attacks and any increases bth in general terms and targeting f specific services. ICT staff wh are respnsible fr the mnitring r security scanning must be familiar with the prcess f reviewing and interpreting security lgs, either lcally n cmputers r thrugh a centralised system. Cmmunicatins and Operatins Security Standard Page 7 f 14
8 Practive system mnitring may be cnducted by apprved ICT staff t assess the current perating envirnment and identify any security risks. System mnitring activities shuld include the fllwing checks at the frequency indicated: Ref Security Scans Frequency 1 Scanning f ICT hst systems t assess any knwn vulnerabilities (cmmercial and pen surce tls are available t perfrm scans autmatically). Bi-mnthly 2 Scanning fr unauthrised wireless netwrks. 6 mnths 3 Scanning the ICT netwrk fr unauthrised activity (scanning f services) and unauthrised ICT equipment. 4 Security Infrmatin Event Management (SIEM) Detectin f unauthrised changes t high risk services thrugh integrity mnitring systems. (this is typically implemented n services that are directly facing internet cnnectins r within a security cntrlled envirnment like the DMZ) Bi-mnthly Implement a standard reprt and exceptin reprt Server audits recrding user activities, exceptins and infrmatin security events need t be cnfigured fr ICT services that are critical. Other security mnitring and practive audits shuld be decided n a case by case basis. This may include: Cnducting external penetratin testing t review external access and security visibility acrss the internet. Implementing services like Intrusin Preventin and Intrusin Detectin t prvide an early warning f a security incident. Security audit cllectin and assessment tls are available t assist with the autmatin f this prcess but staff will still need t assess security reprts r lgs files. 2.6 Backup and Recvery Standard Backup and Recvery standards will ensure that business data and sftware is recverable fllwing an unscheduled cmputer utage r media failure. It is essential that apprpriate standards are fllwed t maintain the availability f ICT services at CPIT. Backup and Recvery falls within the wider business cntinuity and disaster recvery requirements. N single standard can be defined t cver all ICT data surces; rather the standard will differ dependent upn the acceptable time t recver data in the event f lss r crruptin f the riginal data. Different standards are required fr data that is critical t the peratin f CPIT business. Nevertheless, it is essential t maintain the integrity and availability f ICT services that an ver arching backup and recvery standard is necessary fr taking backup cpies f data, timely restratin and prtecting the data. Cmmunicatins and Operatins Security Standard Page 8 f 14
9 The fllwing standards apply: Backup Standards Backups f essential infrmatin and sftware used must be perfrmed n a regular basis fllwing a defined cycle. This will ensure that infrmatin deemed essential t the peratin f CPIT is available fllwing a security incident. It is imprtant that enterprise data, as defined in Appendix A, is backed up and can be restred within an acceptable timeframe as agreed as part f the Business Cntinuity and Disaster Recvery Plans. Dcumented standards must be defined and agreed by CPIT staff n which infrmatin is t be backed-up, the back-up cycles, agreed perids f reduced backup (e.g. ver weekends r statutry hlidays) and recvery times as indicated with the Business Service Catalgue. If the backup schedule includes incremental backups then a full backup is required weekly. In situatins where Restricted Data is backed up; the backup shuld be prtected by means f encryptin r backups prtected thrugh a passwrd. Detailed peratinal prcedures must be maintained t ensure ICT staff understand the backup prcess undertaken and the steps invlved t restre infrmatin. Backup strategies that include a backup t disk shuld als include a backup t ther media t prvide a secnd cpy f data and mitigate the reliance n backups kept n disk. Restricted Data? With reference t the CPIT data gvernance standards, restricted data is data cntaining sensitive r cnfidential infrmatin that if cmprmised culd have a material adverse effect n Institutinal interests, the peratins f CPIT and the privacy t which individuals are entitled. Encrypting this data will incur additinal time t perfrm the backup but is best practice t prtect data frm unauthrised access. The Backup strategy shuld include backups at cntrlled time intervals, referred t as snap shts r time stamps. If the data is frequently changing and it is deemed unacceptable t the institutin t rely n restred infrmatin frm the previus day mre frequent r nline backup strategies may be necessary. This will be agreed thrugh the Disaster Recvery prcess but it is recmmended that the apprach taken is reviewed annually with the Institutin data wners. Backups must be verified as part f the backup prcess (r a sub-set f backups shuld be verified). Backups must be retained fr a perid f time. Typically this is three generatins f backup cycles. Backup Media Backup tapes shuld be regularly recycled fllwing the manufacturers recmmended shelf life fr the media. Als nte the dispsal f backup media shuld fllw the dispsal standards defined within the Asset Management Standard. Backup tapes shuld be stred in a readily accessible lcatin (ideally in a cmputer media fire prf safe) t enable the restratin prcess t start quickly. ICT staff must be familiar with the prcess t find and retrieve backup tapes. Test yur backups Backup media deterirates ver time and it is imprtant that ICT staff check that backups are recverable and the data recvered is readable. T many times a security incident ccurs due t faulty media, pr backup prcesses being fllwed r hardware faults. Backup tapes shuld als be lcated in a facility that is envirnmentally friendly t the media and is restricted t ICT staff. Cmmunicatins and Operatins Security Standard Page 9 f 14
10 Backup cpies that are sent ff-site must be stred fr Disaster Recvery purpses and nt the daily backups as this will increase the time t restre data whilst the media is returned nsite. Backup tapes that are sent ff-site need t be transprted in a secure manner t reduce the risk f backup tapes being lst r cmprmised. Backup tapes must be labelled t fllw an agreed prcess and s that they are clearly identifiable. Tapes shuld be prtected frm accidental verwriting and be subjective t the same level f prtectin as live infrmatin. Backup Restratin and Testing Backup data must be regularly tested fr readability. Restratin prcedures shuld be reviewed quarterly t ensure that they are effective and can be cmpleted within the time alltted in the Business Service Catalgue. Recvery f critical business applicatins shuld be tested annually, hwever, peratinal requests may mitigate this requirement. Cmmunicatins and Operatins Security Standard Page 10 f 14
11 3 COMMUNICATION STANDARD AND INFORMATION EXCHANGE This sectin f the Security Standard defines the standard n cmmunicatin and infrmatin exchange. The bjective is t establish standards t prtect the exchange f infrmatin thrugh all types f cmmunicatin facilities Standards is nw cnsidered a critical mechanism fr business cmmunicatins. CPIT emplyees are encuraged t exchange infrmatin thrugh where the infrmatin exchange r transactin meets the acceptable use defined within the ICT Security Plicy. The fllwing standards apply: CPIT emplyees are encuraged t use t further the gals and bjectives f the Institutin. The institutin fllws the address frmat f [email protected] fr all new accunts. This standard applies fr all accunts. Bradcast s t all CPIT staff are t be kept t a minimum and are acceptable nly fr apprved business purpses. Individuals authrised t send bradcast s must be apprved by the ICT Directr. Opening s frm an unknwn r un-trusted surce is a significant risk. The risks are s that may cntain a virus r cntain a link t a website then when accessed will install a virus n the cmputer. There are als phishing s which lure users t part with private infrmatin. Whilst technlgy is installed at CPIT t blck these s it is recmmended that all users receive training t identify the threat and understand what t d when they receive s frm un-trusted surces. The ICT Security Plicy defines the fllwing plicies fr using Phishing Attacks Phishing attacks are increasing and pse a significant risk t a business. Phishing typically invlves an that tries t lure users t part with their credit card details r username and passwrd. Mre recently phishing attacks have been fcussed n key staff rather than sending a general . These attacks are referred t as spear phishing and can be very cnvincing when the attack is persnalised and targeted. Besides using technlgy t blck these attacks it is imprtant that users are trained t identify a phishing attack and understand when unsure t cntact the help desk. messages within the bunds f CPIT s service are the prperty f the institutin. The permanent re-directing f institutin s t a private accunt (fr example, Yah, Htmail r Gmail), rather than using remte access t is unacceptable practice. access will be terminated when the emplyee r third party terminates their assciatin with CPIT, unless an extensin has been agreed by the line manager. is nt t be used fr unslicited mass mailings, plitical campaigning, disseminatin f chain letters, and use by nn-emplyees sending chain s, malicius data (viruses), slicitatin s r any ffensive material. accunts are prvided fr emplyee s sle use, it is nt apprpriate t send, reply r mdify anther emplyee s accunt withut the authrity f the line Manager. Cnfidential r sensitive messages are nt t be sent utside f the institutin withut authrity f the riginatr r wner f the infrmatin cntained within the . Permissin is required, frm the riginatr f the message, t frward attachments that cntain sensitive r cnfidential material. Cmmunicatins and Operatins Security Standard Page 11 f 14
12 3.2 Internet Standards The ICT Security Plicy defines what acceptable and unacceptable practice is when visiting internet sites. The types f activities that are encuraged and cnsidered acceptable practice when using the internet are advised in the ICT Security Plicy: Access t the internet and brwsing web sites is t cmply with the Acceptable Use Plicy defined in sectin 2 f the ICT Security Plicy. CPIT allws limited persnal use f the Internet s lng as it des nt interfere with staff prductivity, cnsume sustained high vlume traffic r hinder thers in their use f the Internet. Emplyees must nt transmit sensitive institutin infrmatin r infrmatin that is classified as restricted (within the data gvernance standards) thrugh the Internet unless the infrmatin is encrypted t reduce the risk f data being cmprmised. The ICT Directr has the right t blck Internet sites that d nt cmply with the Acceptable Use Plicy in the ICT Security Plicy. The fllwing standards need t be cnsidered t supprt the ICT Security Plicy: ICT t ensure that all CPIT staff and students are aware f the ICT Security Plicy s requirements and the acceptable use f the internet. It is recmmended that the ICT inductin prcess clearly defines what is acceptable and nt acceptable when using the internet. ICT t prvide CPIT with clear guidance n what internet services have been blcked as the use f these services may result in the excessive use f the Internet (whereby use f the Internet hinders thers accessing the Internet) r they are cnsidered nn-business related sites. Make recmmendatins n internet sites t be blcked t the ICT Directr wh is authrised t blck these sites n a case by case basis. This is the end f the Cmmunicatins and Operatins Management Standard. This standard is ne f six standards that prvide advice and guidance n the best practices t fllw when using and accessing ICT services. The ther standards are available n the CPIT ICT intranet. Cmmunicatins and Operatins Security Standard Page 12 f 14
13 4 APPENDIX 4.1 CPIT Enterprise Data Reference CPIT s data gvernance architecture. Enterprise data is the term used when defining business data frm a crss-functinal prcess, services, and cntrls pint f view. It fcuses n the creatin f accurate, cnsistent and transparent data cntent. There is emphasis n data precisin, granularity and meaning and is cncerned with hw the cntent is integrated int business applicatins as well as hw it is passed alng frm ne business prcess t anther. Treating data in this way brings clarity and cnsistency t system integratin prjects, data warehuses, service-riented architectures, and ther prjects. CPIT s Enterprise data is held in cre databases defined in the table belw. HR + Payrll Talent2 Alesc Staff emplyment and payrll SMS Tribal Student enquiries, Applicatins and Enrlments, Curriculum, Timetable, Assessment Finance Kypera P&L, GL Data Warehuse MS SQLServer BI, Reprting Time Tabling Tribal Timetable, Rm Bking Asset Management BEIMS Assets, Maintenance LMS Mdle, Equella, Mahara Teaching material, Student/Tutr interactin, Student Materials CMS CMS Web Cntent Management Prgramme & Curse Repsitry Prgramme dcuments Dcument Management SharePint Cmmunicatins and Operatins Security Standard Page 13 f 14
14 Cmmunicatins and Operatins Security Standard Page 14 f 14
Christchurch Polytechnic Institute of Technology Access Control Security Standard
CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin
GUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch
COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
Chapter 7 Business Continuity and Risk Management
Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity
Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
System Business Continuity Classification
System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality
System Business Continuity Classification
Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required
CPIT Aoraki ICT Asset and Media Security Standard
CPIT Araki Crprate Services Divisin: ICT This security standard refers t CPIT, which is the current legal name fr the new rganisatin established 1 January 2016 bringing tgether CPIT and Araki Plytechnic.
Information Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
Sources of Federal Government and Employee Information
Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities
Personal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
HIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
AML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email:
AML Internet Manr Curt, Manr Farm Huse, Lndn Rad, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: [email protected] Cntents Page Situatin Analysis 3 AML Internet - The Slutin
Session 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
Internet and E-Mail Policy User s Guide
Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin
First Global Data Corp.
First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First
Internal Audit Charter and operating standards
Internal Audit Charter and perating standards 2 1 verview This dcument sets ut the basis fr internal audit: (i) the Internal Audit charter, which establishes the framewrk fr Internal Audit; and (ii) hw
BackupAssist SQL Add-on
WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system
This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.
Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an
Monthly All IFS files, all Libraries, security and configuration data
Server Backup Plicy Intrductin Data is ne f Banks DIH Limited s mst imprtant assets. In rder t prtect this asset frm lss r destructin, it is imperative that it be safely and securely captured, cpied, and
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles
PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK
Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs
Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S
Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...
TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY
TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act
VCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
In addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
Data Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
IT Help Desk Service Level Expectations Revised: 01/09/2012
IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+
Implementing an electronic document and records management system using SharePoint 7
Reprt title Agenda item Implementing an electrnic dcument and recrds management system using SharePint 7 Meeting Finance, Prcurement & Prperty Cmmittee 16 June 2008 Date Reprt by Dcument Number Head f
Backups and Backup Strategies
IT Security Office Versin 2.3 02/19/10 Backups and Backup Strategies IT managers need t plan fr backups in terms f time and space required. Hwever, mst mdern backup sftware can cmpress the backup files
State of Wisconsin. File Server Service Service Offering Definition
State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm
Plus500CY Ltd. Statement on Privacy and Cookie Policy
Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and
Chief Finance and Operations Officer IfM Education and Consultancy Services (IfM ECS)
Chief Finance and Operatins Officer IfM Educatin and Cnsultancy Services (IfM ECS) Rle Summary IfM ECS disseminates the research and educatin utputs f the University f Cambridge Institute fr Manufacturing
RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer
RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible
Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply
Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t
Microsoft Certified Database Administrator (MCDBA)
Micrsft Certified Database Administratr (MCDBA) 460 hurs Curse Overview/Descriptin The MCDBA prgram and credential is designed fr individuals wh want t demnstrate that they have the necessary skills t
HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
Symantec User Authentication Service Level Agreement
Symantec User Authenticatin Service Level Agreement Overview and Scpe This Symantec User Authenticatin service level agreement ( SLA ) applies t Symantec User Authenticatin prducts/services, such as Managed
Key Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
IT CONTROL ENVIRONMENT ASSESSMENT AND RECOMMENDATIONS REPORT
Chairpersn and Subcmmittee Members AUDIT AND RISK SUBCOMMITTEE 6 AUGUST 2015 Meeting Status: Public Purpse f Reprt: Fr Infrmatin IT CONTROL ENVIRONMENT ASSESSMENT AND RECOMMENDATIONS REPORT PURPOSE OF
Cloud Services Frequently Asked Questions FAQ
Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like
How To Ensure That The Internet Is Safe For A Health Care Worker
POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy
TO: Chief Executive Officers of all National Banks, Department and Division Heads, and all Examining Personnel
AL 96-7 Subject: Credit Card Preapprved Slicitatins TO: Chief Executive Officers f all Natinal Banks, Department and Divisin Heads, and all Examining Persnnel PURPOSE The purpse f this advisry letter is
Data Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor
ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library
Organisational self-migration guide an overview V1-5 April 2014
Organisatinal self-migratin guide an verview V1-5 April 2014 Cpyright 2013, Health and Scial Care Infrmatin Centre. 1 Self Migratin t NHSmail an verview fr rganisatins Cntents Intrductin 3 1. Initial preparatins
CUSTOMER Information Security Audit Report
CUSTOMER Infrmatin Security Audit Reprt Versin 1.0 Date Wednesday, 18 January 2006 SafeCms Internet: www.safecms.cm Email: mailt:[email protected] 2001 Chartered Square Building. 20 th Fl, 152 Nrth Sathrn
Remote Working (Policy & Procedure)
Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer
LINCOLNSHIRE POLICE Policy Document
LINCOLNSHIRE POLICE Plicy Dcument 1. POLICY IDENTIFICATION PAGE POLICY TITLE: ICT CHANGE & RELEASE MANAGEMENT POLICY POLICY REFERENCE NO: PD 186 POLICY OWNERSHIP: ACPO Cmmissining Officer: Prtfli / Business-area
Electronic and Information Resources Accessibility Compliance Plan
Electrnic and Infrmatin Resurces Accessibility Cmpliance Plan Intrductin The University f Nrth Texas at Dallas (UNTD) is cmmitted t prviding a wrk envirnment that affrds equal access and pprtunity t therwise
Risk Management Policy AGL Energy Limited
Risk Management Plicy AGL Energy Limited AUGUST 2014 Table f Cntents 1. Abut this Dcument... 2 2. Plicy Statement... 2 3. Purpse... 2 4. AGL Risk Cntext... 3 5. Scpe... 3 6. Objectives... 3 7. Accuntabilities...
Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.
Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and
Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd
Audit Cmmittee Charter St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Versin 2.0, 22 February 2016 Apprver Bard f Directrs St Andrew
Implementing SQL Manage Quick Guide
Implementing SQL Manage Quick Guide The purpse f this dcument is t guide yu thrugh the quick prcess f implementing SQL Manage n SQL Server databases. SQL Manage is a ttal management slutin fr Micrsft SQL
AUDIT AND RISK COMMITTEE TERMS OF REFERENCE
AUDIT AND RISK COMMITTEE TERMS OF REFERENCE 1. TITLE OF COMMITTEE Audit and Risk Cmmittee 2. ESTABLISHMENT The Audit and Risk Cmmittee is established under Part 3 Sectin 19(1) f the Charles Darwin University
Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012
Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.
SaaS Listing CA Cloud Service Management
SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters
Guidelines on Data Management in Horizon 2020
Guidelines n Data Management in Hrizn 2020 Versin 1.0 11 December 2013 Guidelines n Data Management in Hrizn 2020 Versin 16 December 2013 Intrductin In Hrizn 2020 a limited pilt actin n pen access t research
ensure that all users understand how mobile phones supplied by the council should and should not be used.
Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended
SAEMA Document No. SDN. 14001
SAEMA Dcument N. SDN. 14001 Issue Date: 6 th Nvember 2012 Guidance dcument n facade access mechanical/ electrical breakdwn, rescue and rescue planning. Specialist Access Engineering and Maintenance Assciatin
CSC IT practix Recommendations
CSC IT practix Recmmendatins CSC Healthcare 28th January 2014 Versin 3 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins
Professional Leaders/Specialists
Psitin Prfile Psitin Lcatin Reprting t Jb family Band BI/Infrmatin Manager Wellingtn Prfessinal Leaders/Specialists Band I Date February 2013 1. POSITION PURPOSE The purpse f this psitin is t: Lead and
KIK s GUIDE FOR LAW ENFORCEMENT
Thanks fr checking ut ur law enfrcement guide. Kik takes the safety f ur users very seriusly, and we hpe this guide will be a useful tl fr yu. It includes infrmatin abut ur app; the features and functins
UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES
UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES REFERENCES AND RELATED POLICIES A. UC PPSM 2 -Definitin f Terms B. UC PPSM 12 -Nndiscriminatin in Emplyment C. UC PPSM 14 -Affirmative
Oracle Cloud Enterprise Hosting and Delivery Policies
Oracle Clud Enterprise Hsting and Delivery Plicies Statement f Changes Versin 1.5, 6/01/2015 This dcument utlines changes made t the Oracle Clud Enterprise Hsting and Delivery Plicies dated December 1,
Financial Accountability Handbook
Financial Accuntability Handbk >> Vlume 5 Reprting Systems Infrmatin Sheet 5.2 Preparatin f Financial Statements Intrductin The Financial Accuntability Act 2009 (the Act) and the Financial and Perfrmance
DATE APPROVED March 2011. Version Date Comments / Changes 1.0 March 2011 Initial policy released
Page 1 f 11 APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial plicy released 1. PURPOSE OF THIS POLICY T define the purpses fr which Crprate Purchase Cards are t be used
Magenta HR in partnership with breath ehr
BREATHEHR ONLINE HR SYSTEM AND PORTAL Magenta HR in partnership with breath ehr Magenta HR Cnsulting Ltd. 24 Canning Street, Edinburgh EH3 8EG Tel. 0131 2272769 www.magentahr.cm [email protected] 6 December
Service Desk Self Service Overview
Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service
IT CHANGE MANAGEMENT POLICY
IT CHANGE MANAGEMENT POLICY Effective Date May 19, 2016 Crss-Reference 1. IT Operatins and Maintenance Plicy 2. IT Security Incident Management Plicy Respnsibility Apprver Review Schedule 1. Plicy Statement
Licensing Windows Server 2012 R2 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents
Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network
2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal
esupport Quick Start Guide
esupprt Quick Start Guide Last Updated: 5/11/10 Adirndack Slutins, Inc. Helping Yu Reach Yur Peak 908.725.8869 www.adirndackslutins.cm 1 Table f Cntents PURPOSE & INTRODUCTION... 3 HOW TO LOGIN... 3 SUBMITTING
General Records Authority 33. Accredited Training
General Recrds Authrity 33 2012/00579704 Accredited Training February 2013 This is an accurate reprductin f the authrised recrds authrity cntent, created fr accessibility purpses CONTENTS INTRODUCTION
EA-POL-015 Enterprise Architecture - Encryption Policy
Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:
BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS
BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin
Accident Investigation
Accident Investigatin APPLICABLE STANDARD: 1960.29 EMPLOYEES AFFECTED: All emplyees WHAT IS IT? Accident investigatin is the prcess f determining the rt causes f accidents, n-the-jb injuries, prperty damage,
Nuance Healthcare Services Project Delivery Methodology
NUANCE PROFESSIONAL SERVICES Nuance Healthcare Services 2008 Nuance Cmmunicatins, Inc. All rights reserved. Nuance Healthcare Services 1 INTRODUCTION This dcument describes the prject management methdlgy
Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2.
Oracle s Hyperin Data Integratin Management Release 9.2.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 Intrductin t Data Integratin Management... 1 Data Integratin Management Adapters...
SBClient and Microsoft Windows Terminal Server (Including Citrix Server)
SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance
Change Management Process
Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses
Gravesham Borough Council
Classificatin: Part 1 Public Key Decisin: Please specify - N Gravesham Brugh Cuncil Reprt t: Perfrmance and Administratin Cmmittee Date: 12 Nvember 2015 Reprting fficer: Subject: Crprate Perfrmance Manager
DisplayNote Technologies Limited Data Protection Policy July 2014
DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f
MaaS360 Cloud Extender
MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument
