FedEx Guide for. Information Security. Version 5.0

Size: px
Start display at page:

Download "FedEx Guide for. Information Security. Version 5.0"

Transcription

1 FedEx Guide for Information Security Version 5.0

2 FedEx Guide for Information Security Version 5.0 Revised June 2013 The FedEx Guide for Information Security provides the general user with an introduction to the Information Security Standards adopted by FedEx Corporation and its operating companies. The Standards are available on the FedEx intranet at For reference only. Copyright 2013 FedEx Corporation

3 FedEx Guide for Information Security Contents Your Role in Information Security 5 Acceptable Use of Computer and Storage Devices 6 User ID and Password 7 Computer Devices 8 Portable Devices 9 Remote Access Internet 12 Virus and Malware Defense 13 Instant Messaging 14 Software 15 Data Security 16 Vendor Security 17 Telephone 18 Video and Web Conferencing 19 Fax 20 Modems 21 Physical Security 22 Information Security Data Classification 23 FedEx Key Policy for Information Security 26 Information Security Policy and Standards 26 Additional Resources 27 FedEx Confidential ISO 9001 Controlled cument Printed and other static representations of this document are classified for reference only. 3

4 4

5 Your Role in Information Security FedEx is committed to providing a safe and secure environment in which to conduct business and deliver a superior experience to our customers, shareowners and employees. To that end, FedEx Information Security has published the FedEx Information Security Policy and Standards to help reduce risk for FedEx and FedEx customers. The FedEx Guide for Information Security provides an overview of the Information Security Policy and Standards adopted by FedEx Corporation and its operating companies. This guide should be used as a supplement only as it is not a comprehensive source for all controls addressed within the Policy and Standards. Information Security is technology, but it s also people and processes. Whenever and wherever you connect to the FedEx network or access FedEx information, you must accept the responsibility of protecting it. How? Review this guide now and refer to it frequently to refresh your knowledge. Read and comply with s and announcements from Information Security. Reference the FedEx Information Security Policy. Keyword: InfoSec Policy Direct any questions concerning the Policy and Standards to: Immediately report any potential information security incident. Keyword: incident Visit the FedEx Information Security website for more information, including the all_secure@fedex e-newsletter. Keyword: InfoSec Ignorance is no excuse. FedEx Confidential ISO 9001 Controlled cument Printed and other static representations of this document are classified for reference only. 5

6 Acceptable Use of Computer and Storage Devices FedEx allows limited personal use of its computer resources provided such use doesn t interfere with your job duties, the business needs of other employees or serving our customers, and does not expose the Corporation to security risks. Know that it s okay to look up something on the Internet as long as it s not offensive. Know that it s okay to send an occasional personal or instant message. Realize that your use of FedEx computer resources may be monitored. Understand that you are responsible for notifying FedEx Information Security should you observe a possible information security incident. Keyword: incident n t Visit indecent or illegal websites. Participate in peer-to-peer file-sharing on your FedEx device. Illegally download copyrighted material to your FedEx device. Solicit or conduct a side business using FedEx computer resources. wnload FedEx business to any unauthorized device. Connect unauthorized devices to the FedEx network. 6

7 User ID and Password User IDs and passwords identify you and enable your access to FedEx networks, , systems and applications. Although some systems may have more stringent requirements, at a minimum you must follow these guidelines. Remember long to be strong. Create a strong password that includes these characteristics: o Minimum of eight characters. o Contains at least one numeral. o Contains at least one upper case and one lower case letter. Keep all passwords confidential. Never share them with anyone else. Change passwords if given indication that your system or password has been compromised. Change passwords every 90 days or even more frequently. n t Use proper names or words found in the dictionary as passwords because they are easily detected by computer hackers. Include passwords in automated logon processes. Use your name, title or job function as a password. Use your FedEx ID number as a password. Write down your password. FedEx Confidential ISO 9001 Controlled cument Printed and other static representations of this document are classified for reference only. 7

8 Computer Devices We use many kinds of computer resources at FedEx: desktop and laptop computers, mobile and Internet devices, to name a few. The media might differ, but all must be configured and used securely. Use screensavers that are password-protected and set to lock after 15 minutes of inactivity. Install and enable antivirus software approved by FedEx. Keyword: antivirus Keep client management software installed and running properly on your computer. Use a personal firewall when connecting to the FedEx network from a remote location. Remote connection requirements and downloads are available at: Disconnect computers from the FedEx network when you no longer need access to the network remotely. Install anti-theft equipment, such as laptop security cables, when the device cannot be stored in a secure area. Report a lost or stolen device to your manager immediately. You or your manager should report the loss or theft to FedEx Information Security. Keyword: lost Follow your opco s IT asset disposal procedures for computer devices that are no longer needed. n t Turn off or disable antivirus, personal firewall or client management software. Use unauthorized remote-control software. Keyword: ETS Connect unauthorized devices directly to the FedEx network. Install personally-owned software or freeware on any FedEx computer resource without management approval. 8

9 Portable Devices More and more FedEx employees practice mobile computing by using portable devices such as BlackBerry devices, USB devices and other types of handheld devices. These devices yield great convenience but pose their own brand of security challenges. Purchase FedEx-approved devices only, following the order and approval process in place at your FedEx opco. Protect your portable device with a password-enabled screen saver set to lock after inactivity. Encrypt Sensitive and Internal data (see page 24) prior to saving on a portable device. See page 27 for options to encrypt data. Keep your portable device out of sight if you are leaving it in a vehicle or publicly accessible area. Report a lost or stolen portable device to your manager immediately. You or your manager should report the loss or theft to FedEx Information Security. Keyword: lost n t Connect unauthorized portable devices to the FedEx network. Route FedEx business or data to an unauthorized device. Store unencrypted passwords, user IDs or other access information on portable devices. Use the video or camera feature in secured or sensitive areas to transmit Sensitive or Internal data. Use the audio feature to record FedEx conversations or meetings. FedEx Confidential ISO 9001 Controlled cument Printed and other static representations of this document are classified for reference only. 9

10 Remote Access Remote access has become an essential service for FedEx, making the FedEx network available to you when traveling or at home. Follow these guidelines to create a secure connection. Obtain management approval for remote access. Use the VPN remote access method approved for your opco. Keyword: VPN Install and enable FedEx-approved antivirus software on your computer, available at: Perform Windows Update before connecting remotely to the FedEx network to download and install critical patches. Windows Update is available at: n t Store your password in an automated login process. Store your egrid credentials on an unencrypted laptop or any computing device on which multiple VPN users share a common logon ID. Disclose Sensitive or Internal information in public places. Use unauthorized remote-control software. Keyword: ETS Leave a remote computer logged into the FedEx network when not in use. 10

11 FedEx handles millions of messages daily. We depend on to conduct business, so it s critical that you know how to avoid the associated risks. Be professional and courteous when composing and replying to . If you wouldn t print it on letterhead and sign it, don t put it in FedEx . Limit recipients to only those individuals who have a need to know. Forward spam to Information Security following instructions provided online. Keyword: Spam Delete unexpected or unsolicited s and any that look like spam. Understand that use may be monitored. Use encryption when sending Sensitive data in . See the Information Security Data Classification on page 23 for details; see page 27 for options for encrypting data. n t Use in place of meetings or phone calls. Use another employee s account without delegated authority. Forward FedEx business or data to a personal account or unauthorized device. Forward chain letters, jokes or inappropriate images or files. Open suspicious attachments or s. Distribute lists of addresses to anyone who doesn t have a business need to know. Solicit or conduct a side business using FedEx . FedEx Confidential ISO 9001 Controlled cument 11 Printed and other static representations of this document are classified for reference only.

12 Internet The Internet offers a wealth of information but is notoriously unsecured. Not all websites offer confidentiality or provide integrity of data. Use common sense - and follow these guidelines - when using the Internet. Understand that Internet use may be monitored. Limit personal use. Properly configure your browser following instructions provided online. Keyword: proxy Be mindful of what personal information you share online, especially on social networking sites. Social engineers use this type of information to create credible but fraudulent phishing campaigns. n t Visit indecent or illegal websites. Participate in peer-to-peer file-sharing. wnload copyrighted material to your work PC. Store company data on third-party websites without Information Security approval. Connect to the Internet from a FedEx location via an Internet service provider not provided by FedEx. 12

13 Virus and Malware Defense Blacole, Flame, Koobface... The list of threats goes on and on. You must stay on guard against computer viruses, malware and other exploits. Keep your FedEx-approved antivirus software current and enabled at all times. Keyword: antivirus Adhere to antivirus update processes. Clean or delete viruses as soon as they are discovered. Delete any unexpected or unsolicited s and attachments as they are sometimes used to transmit viruses to computers. Report a potential virus infection. Keyword: antivirus n t Turn off or disable virus protection software. Fall for hoaxes. FedEx Confidential ISO 9001 Controlled cument 13 Printed and other static representations of this document are classified for reference only.

14 Instant Messaging FedEx provides instant messaging so employees can benefit from its use while reducing potential security issues related to unapproved commercial software. Before you use instant messaging, please remember the following guidelines. Use only FedEx-approved instant messaging software to conduct business and to transfer files. Understand that IM usage can be logged and reviewed to determine appropriate use. Use AOL, Yahoo, MSN or other IM clients for limited personal use only. n t Use AOL, Yahoo, MSN or other IM clients for FedEx business use. Use AOL, Yahoo, MSN or other IM clients to transmit or receive files. Transfer Sensitive data via instant messaging. 14

15 Software Only authorized software is permitted on FedEx computer resources. If you have questions concerning software permitted for your opco, ask your manager. Use only FedEx-approved software. Keyword: ETS n t wnload software from the Internet without management approval. Install unauthorized software on any FedEx computer resource without management approval. Use unauthorized open source software. Keyword: IT OSSM Distribute, obtain or attempt to obtain pirated, stolen, copyrighted, trademarked or protected information such as software, video or audio using FedEx computer resources. FedEx Confidential ISO 9001 Controlled cument 15 Printed and other static representations of this document are classified for reference only.

16 Data Security We lock the doors to our homes when we leave, but what about our computers and desks? We secure important personal papers in a safety deposit box, but what about critical business documents? your part to protect FedEx data by following these guidelines. Enable password-protection on all FedEx-owned devices that could potentially contain Sensitive or Internal data. This includes, but is not limited to, laptops, workstations, BlackBerry devices, etc. Place Sensitive files in a secure location. Cleanse or destroy data when it is no longer needed for business or legal purposes. Lock your PC whenever you are away from your computer. Shred or use authorized bins for all excess copies of proprietary business documents instead of disposing them in unsecured trash bins. Protect your information assets in the event of a disaster. Keyword: BCDR n t Write down your passwords. Leave Sensitive or Internal information on your desk. Store Sensitive data on unauthorized devices. 16

17 Vendor Security As more business owners utilize 3rd party vendors to supplement their business needs, it is critical that FedEx data remains secure. Information Security works with business owners to ensure vendors comply with FedEx requirements for handling FedEx data. Following these guidelines will help protect FedEx data. Select the most secure vendor during proof of concept by ensuring they can comply with FedEx Security Compliance Requirements: Understand the types of data your vendor will be accessing. Keyword: data classification Register your vendor at the Vendor Compliance website for an assessment of the vendor s security posture. Keyword: Vendor Compliance Register each vendor engagement, regardless if a vendor has been previously approved. Complete the vendor registration process prior to requesting connectivity for your vendor. n t Assume your vendor has been approved by Information Security. Confirm approval at: VendorCompliance@corp. ds.fedex.com Send FedEx Sensitive data to a vendor without approval from Information Security. Provide your vendor with more access than needed. FedEx Confidential ISO 9001 Controlled cument 17 Printed and other static representations of this document are classified for reference only.

18 Telephone Security protocol also applies to FedEx telephone use. Be cautious of unsolicited callers requesting Company information. Scammers can use seemingly insignificant information to conduct fraud or gain unauthorized access to systems. Regularly change dial-in codes to maintain confidentiality of conference calls. Use teleconference providers approved by FedEx to conduct teleconferences. Know that regularly scheduled teleconferences that cover Sensitive or Internal information must have an access code. n t Leave a voic message if using collect or third-party bill-to calls. Leave a voic message containing Sensitive information. Return a page to a telephone number. Distribute internal phone numbers to those outside FedEx without authorization from that person. 18

19 Video and Web Conferencing Conferencing via video or the Internet is a relatively low-cost way to bring employees together. Following the guidelines below will maintain security. Use for business purposes only. Use only FedEx-approved Web conference providers. Turn off video conferencing equipment when not in use. Keep video conferencing equipment in a physically secure location. Verify Web conferencing participants to ensure they are authorized to participate before starting a conference. n t Publish or provide a link to Web conferencing passwords. FedEx Confidential ISO 9001 Controlled cument 19 Printed and other static representations of this document are classified for reference only.

20 Fax For most business purposes, use of facsimile is acceptable. However, if you transmit Sensitive or Internal information via fax, follow these secure practices. Notify the recipient before sending. Ensure that both you and the recipient are at the designated fax machines during transmission of Sensitive or Internal documents. Utilize a machine in a restricted area to prevent unauthorized use. Use a fax server maintained by FedEx or an approved fax service provider for desktop faxing. n t Send Sensitive information unless absolutely necessary. Use desktop fax unless through a fax server maintained by FedEx or a fax outsourcing service under contract with FedEx. 20

21 Modems Modems connected to computers within the FedEx network pose a major security risk and can only be used if an exception is obtained from FedEx Information Security. Obtain an exception request from Information Security for modem use. Keyword: exception n t Attach analog phone lines or modems to your desktop without approval from your manager and Information Security. Connect directly to a FedEx computer resource without approval from FedEx Information Security. Leave modem in auto-receive mode. FedEx Confidential ISO 9001 Controlled cument 21 Printed and other static representations of this document are classified for reference only.

22 Physical Security Securing information extends beyond the virtual world and into the physical space because tangible items oftentimes provide or contain Sensitive information, or the means to obtain information, related to our professional or personal lives. Display your employee ID badge at all times while on FedEx property on the outermost garment, on the upper torso of the body. Ask for verification. Non-employees should be approved by FedEx Security, accompanied by a FedEx employee and wear a visitor s badge. Keep FedEx computer devices properly secured when not in use. Store or properly dispose of all items printed, faxed, or left in your mailbox at mid and end of business day. Shred or use authorized bins for all excess copies of Sensitive or Internal business documents instead of disposing them in unsecured trash bins. n t Allow tailgating or piggybacking at facility entrances. Leave Sensitive or Internal information unsecured (e.g. hardcopies of current projects, disks, CDs, BlackBerry devices, executive itineraries). 22

23 Information Security Data Classification The FedEx Information Security Data Classification applies to FedEx company, customer and employee data. All information at FedEx - be it documents, files, worksheets, s or conversations - should be managed according to the FedEx Information Security Data Classification. Review the three categories of data classification on pages Securely dispose of Sensitive and Internal information via shredder or secure disposal container. n t Leave Sensitive or Internal information on your desk. Forward unencrypted Sensitive or Internal information to an outside company. FedEx Confidential ISO 9001 Controlled cument 23 Printed and other static representations of this document are classified for reference only.

24 Data Classification FedEx Information Security has classified three categories of FedEx data: Sensitive Internal Public This section describes these three categories and identifies the type of data within each classification. The FedEx Information Security Data Classification is also available at Keyword: data classification Sensitive Description: FedEx company, customer and employee data that requires an additional level of protection using stringent controls as required by law or as deemed necessary by FedEx. Data Elements: PCI Data Cardholder Data - Primary Account Number (PAN) and Expiration Date Sensitive Authentication Data - Magnetic Stripe data, Card Validation Code (a.k.a. CVV,CVV2) Passwords, Cryptographic Key, Session ID that can be associated to a user, application ID, or other resource. HR Data (HIPAA) - SSN, DOB, Healthcare ID in combination with name or biometric data PII Data - Name in combination with one of the following: Government issued ID, employee performance or salary data, personal phone number Bank account (Company and Individual) in combo with Routing # or entity name Trade Secrets/Strategic Project Data Unannounced acquisitions/organizational changes Consolidated Revenue, Expense, Debt, & Equity Data prior to regulatory disclosure 24

25 Data Classification - cont. Internal Description: FedEx company, customer and employee data that requires protection from being used for unintended purposes. All FedEx data not identified as Sensitive or Public. **Note that lists are not considered exhaustive for Internal and Public. For any clarification please contact the InfoSec Standards Organization. Data Elements: Post-acquisition cuments FedEx Account Number in combination with customer name and/or address Employee work contact information Project & planning information Pricing information Compensation information In-house developed code Public Description: Data that has been publicly distributed external to FedEx. **Note that lists are not considered exhaustive for Internal and Public. For any clarification please contact the InfoSec Standards Organization. Data Elements: Publicly posted press releases Published Annual Reports Marketing materials FedEx Confidential ISO 9001 Controlled cument 25 Printed and other static representations of this document are classified for reference only.

26 Congratulations! Now that you have finished reading this guide, you have been introduced to many key security practices that help keep FedEx secure. Continue reading for additional resources that provide more direction on protecting FedEx data. FedEx Key Policy for Information Security The Key Policy explains your role as it relates to protecting customer, employee, and company information and resources: Keep corporate information confidential, regardless of how it is created, distributed, stored, or discarded (including, but not limited to, whether it is typed, handwritten, printed, filmed, computer-generated, or spoken). Access only the information, resources, and locations necessary for your job. Limit personal use of FedEx resources so as not to impact the business. Information Security Policy and Standards Information Security has defined the FedEx Information Security Policy and Standards. Their scope is to reduce risk for FedEx and FedEx customers. The FedEx Information Security Policy and Standards apply to everyone at FedEx, not just system administrators or other IT employees. They extend beyond technology to advance safe computing practices and secure processes across the enterprise. The Policy defines your role, responsibility and accountability to protect FedEx information. Keyword: InfoSec Policy The Standards define the minimum level of security you must implement. Non-compliance to a Standard must be reported. Keyword: Standards 26

27 Additional Resources Information Security Website The Information Security website has resources available to help you stay current on cyber threats and to learn best practices for safe computing. Keyword: InfoSec Reporting Information Security Incidents An Information Security incident is any activity that indicates an actual or possible breach of data or information security policy has occurred. If you detect a potential Information Security incident, immediately report it. Keyword: incident Encrypting Data The Enterprise Encryption Support Site offers multiple, standard encryption solutions for all opcos and regions. Keyword: enterprise encryption WinZip Encryption bestpractices/docman.root.security/doc1074 GPG bestpractices/docman.root.security/doc1075 Sending Encrypted Data on CD bestpractices/docman.root.security/doc1076 Customer Protection FedEx strives to provide a safe, secure online environment for our customers. Sadly, we regularly witness and receive reports on cybercriminals exploiting the trusted FedEx brand to increase the likelihood someone will fall victim to a phishing . Take an active role in raising customer awareness about scams and phishing campaigns by telling customers about the FedEx Customer Protection Center. This site provides online safety tips, examples of actual phishing scams, and a dedicated to which customers can report potential scams. Visit the FedEx Customer Protection Center at: Report any suspected FedEx-branded phishing to: abuse@fedex.com FedEx Confidential ISO 9001 Controlled cument 27 Printed and other static representations of this document are classified for reference only.

28 Visit for full Information Security Standards FedEx Guide for Information Security Version 5.0 Revised June 2013 The FedEx Guide for Information Security provides the general user with an introduction to the Information Security Standards adopted by FedEx Corporation and its operating companies. The Standards are available on the FedEx intranet at For reference only. Copyright 2013 FedEx Corporation FedEx Confidential ISO 9001 Controlled cument Printed and other static representations of this document are classified for reference only.

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable

More information

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data PCI Training for Retail Jamboree Staff Volunteers Securing Cardholder Data Securing Cardholder Data Introduction This PowerPoint presentation is designed to educate Retail Jamboree Staff volunteers on

More information

General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information

General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information The following rules of behavior apply to all Department of Homeland Security

More information

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...

More information

PCI Data Security and Classification Standards Summary

PCI Data Security and Classification Standards Summary PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers

More information

PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs

PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs The Identity Theft and Fraud Protection Act (Act No. 190) allows for the collection, use

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific

More information

Information Security. Annual Education 2014. Information Security. 2014 Mission Health System, Inc.

Information Security. Annual Education 2014. Information Security. 2014 Mission Health System, Inc. Annual Education 2014 Why? Protecting patient information is an essential part of providing quality healthcare. As Mission Health grows as a health system and activities become more computerized, new information

More information

Welcome to Information Security Training

Welcome to Information Security Training Welcome to Information Security Training Welcome to Georgia Perimeter College s Information Security Training. Information security consists of processes, measures, and technologies employed to protect

More information

Course: Information Security Management in e-governance

Course: Information Security Management in e-governance Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security

More information

HIPAA and Health Information Privacy and Security

HIPAA and Health Information Privacy and Security HIPAA and Health Information Privacy and Security Revised 7/2014 What Is HIPAA? H Health I Insurance P Portability & A Accountability A - Act HIPAA Privacy and Security Rules were passed to protect patient

More information

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

Information Security Training 2012

Information Security Training 2012 Information Security Training 2012 Authored by: Gwinnett Medical Center Information Security Department Modified for affiliated schools students & instructors by: Linda Horst, RN, BSN, BC Objectives After

More information

PCI Data Security. Information Services & Cash Management. Contents

PCI Data Security. Information Services & Cash Management. Contents PCI Data Security Information Services & Cash Management This self-directed learning module contains information you are expected to know to protect yourself, our patients, and our guests. Target Audience:

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

LSE PCI-DSS Cardholder Data Environments Information Security Policy

LSE PCI-DSS Cardholder Data Environments Information Security Policy LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project

More information

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution. Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010

ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010 ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010 OBJECTIVE This Security Plan (the Plan ) is intended to create effective administrative, technical and physical safeguards for the protection

More information

NC DPH: Computer Security Basic Awareness Training

NC DPH: Computer Security Basic Awareness Training NC DPH: Computer Security Basic Awareness Training Introduction and Training Objective Our roles in the Division of Public Health (DPH) require us to utilize our computer resources in a manner that protects

More information

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014 Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology

More information

Identity Theft Prevention Program Compliance Model

Identity Theft Prevention Program Compliance Model September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)

More information

Network Security for End Users in Health Care

Network Security for End Users in Health Care Network Security for End Users in Health Care Virginia Health Information Technology Regional Extension Center is funded by grant #90RC0022/01 from the Office of the National Coordinator for Health Information

More information

BSHSI Security Awareness Training

BSHSI Security Awareness Training BSHSI Security Awareness Training Originally developed by the Greater New York Hospital Association Edited by the BSHSI Education Team Modified by HSO Security 7/1/2008 1 What is Security? A requirement

More information

ABERDARE COMMUNITY SCHOOL

ABERDARE COMMUNITY SCHOOL ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

SHS Annual Information Security Training

SHS Annual Information Security Training SHS Annual Information Security Training Information Security: What is It? The mission of the SHS Information Security Program is to Protect Valuable SHS Resources Information Security is Everyone s Responsibility

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because

More information

Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users

Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

PCI Security Awareness for ECU Payment Card Merchants

PCI Security Awareness for ECU Payment Card Merchants PCI Security Awareness for ECU Payment Card Merchants Read this document carefully. Sign, date, and return the last page to your departmental PCI coordinator, who is required to store the documentation

More information

Information Technology Security Standards and Protocols. Coast Community College District

Information Technology Security Standards and Protocols. Coast Community College District Information Technology Security Standards and Protocols Coast Community College District 1 Contents DIT 01 - Information Security Program Overview... 7 1.0 Purpose, Scope, and Maintenance... 7 1.1 Purpose...

More information

Best Practices for Information Security

Best Practices for Information Security Best Practices for Information Security Suzanne Dmytrenko, Information Privacy Officer Email: suzanne@sfsu.edu. Ph: 415-338-2823 Mig Hofmann, Information Security Officer Email: mig@sfsu.edu. Ph: 415-338-3018

More information

Information Security Code of Conduct

Information Security Code of Conduct Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

Information Security Policy Manual

Information Security Policy Manual Information Security Policy Manual Latest Revision: May 16, 2012 1 Table of Contents Information Security Policy Manual... 3 Contact... 4 Enforcement... 4 Policies And Related Procedures... 5 1. ACCEPTABLE

More information

Technical Standards for Information Security Measures for the Central Government Computer Systems

Technical Standards for Information Security Measures for the Central Government Computer Systems Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...

More information

Miami University. Payment Card Data Security Policy

Miami University. Payment Card Data Security Policy Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Employee Teleworking Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Introduction... 2 2. Teleworking Risks... 3 3. Safeguards for College

More information

Topics. What are privacy and security all about? How can I protect confidential information? What should I do if I see a problem?

Topics. What are privacy and security all about? How can I protect confidential information? What should I do if I see a problem? Federal: Privacy And Security 1 Topics What are privacy and security all about? What s confidential here? How can I protect confidential information? What should I do if I see a problem? How can I get

More information

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually.

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. April 23, 2014 Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. What is it? Electronic Protected Health Information There are 18 specific

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY Version Author Date Approved by Board 2009-1 Gillian Kirkup 24 March 2010 Page 1 of 8 THE RICE MARKETING BOARD FOR

More information

Who must complete this training

Who must complete this training Stop!! THINK Click Who must complete this training All Users: This training is required for all individuals, including contractors and vendors, with security access to sensitive or confidential systems

More information

Policies and Procedures for Electronic Protected Health Information (ephi) and Personally Identifiable Information (PII)

Policies and Procedures for Electronic Protected Health Information (ephi) and Personally Identifiable Information (PII) Policies and Procedures for Electronic Protected Health Information (ephi) and Personally Identifiable Information (PII) Effective Date: April 10, 2012 Prepared by: Joe Raschke (IT) Table of Contents Purpose

More information

Hengtian Information Security White Paper

Hengtian Information Security White Paper Hengtian Information Security White Paper March, 2012 Contents Overview... 1 1. Security Policy... 2 2. Organization of information security... 2 3. Asset management... 3 4. Human Resources Security...

More information

The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015

The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015 The Department of Health and Human Services Privacy Awareness Training Fiscal Year 2015 Course Objectives At the end of the course, you will be able to: Define privacy and explain its importance. Identify

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

Appendix H: End User Rules of Behavior

Appendix H: End User Rules of Behavior Appendix H: End User Rules of Behavior 1. Introduction The Office of Management and Budget (OMB) has established the requirement for formally documented Rules of Behavior as set forth in OMB Circular A-130.

More information

ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA

ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA PURPOSE PURPOSE This document provides guidance to offices about protecting sensitive customer and company information. The protection of Non-public Personal

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

DSHS CA Security For Providers

DSHS CA Security For Providers DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public

More information

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology

More information

Guide to Preventing Social Engineering Fraud

Guide to Preventing Social Engineering Fraud Guide to Preventing Social Engineering Fraud GUIDE TO PREVENTING SOCIAL ENGINEERING FRAUD CONTENTS Social Engineering Fraud Fundamentals and Fraud Strategies... 4 The Psychology of Social Engineering (And

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

CYBERSECURITY POLICY

CYBERSECURITY POLICY * CYBERSECURITY POLICY THE CYBERSECURITY POLICY DEFINES THE DUTIES EMPLOYEES AND CONTRACTORS OF CU*ANSWERS MUST FULFILL IN SECURING SENSITIVE INFORMATION. THE CYBERSECURITY POLICY IS PART OF AND INCORPORATED

More information

Computing Services Information Security Office. Security 101

Computing Services Information Security Office. Security 101 Computing Services Information Security Office Security 101 Definition of Information Security Information security is the protection of information and systems from unauthorized access, disclosure, modification,

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY Illinois Department of Healthcare and Family Services Training Outline: Training Goals What is the HIPAA Security Rule? What is the HFS Identity

More information

Policy for Protecting Customer Data

Policy for Protecting Customer Data Policy for Protecting Customer Data Store Name Store Owner/Manager Protecting our customer and employee information is very important to our store image and on-going business. We believe all of our employees

More information

Security Awareness Quiz Questions

Security Awareness Quiz Questions Category Question Awareness Quiz Questions Answer 1. Why is backing up data files important? Backups ensure that the information you need is there when you need it If the information is damaged it can

More information

Payment Cardholder Data Handling Procedures (required to accept any credit card payments)

Payment Cardholder Data Handling Procedures (required to accept any credit card payments) Payment Cardholder Data Handling Procedures (required to accept any credit card payments) Introduction: The Procedures that follow will allow the University to be in compliance with the Payment Card Industry

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

Covered Areas: Those EVMS departments that have activities with Covered Accounts.

Covered Areas: Those EVMS departments that have activities with Covered Accounts. I. POLICY Eastern Virginia Medical School (EVMS) establishes the following identity theft program ( Program ) to detect, identify, and mitigate identity theft in its Covered Accounts in accordance with

More information

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Data Protection Safeguards Page 1 Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Purpose: The purpose of the Data Protection Safeguards is to provide guidelines for the appropriate

More information

Standards for Business Processes, Paper and Electronic Processing

Standards for Business Processes, Paper and Electronic Processing Payment Card Acceptance Information and Procedure Guide (for publication on the Treasury Webpages) A companion guide to University policy 6120, Payment Card Acceptance Standards for Business Processes,

More information

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information

More information

Cyber Security Best Practices

Cyber Security Best Practices Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:

More information

Dartmouth College Merchant Credit Card Policy for Managers and Supervisors

Dartmouth College Merchant Credit Card Policy for Managers and Supervisors Dartmouth College Merchant Credit Card Policy for Managers and Supervisors Mission Statement Dartmouth College requires all departments that process, store or transmit credit card data remain in compliance

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

County Identity Theft Prevention Program

County Identity Theft Prevention Program INTRODUCTION CHAPTER OSCEOLA COUNTY IDENTITY THEFT PREVENTION PROGRAM The Osceola County Board of County Commissioners is committed to protecting consumers who do business with Osceola County, and as such

More information

Computer Security at Columbia College. Barak Zahavy April 2010

Computer Security at Columbia College. Barak Zahavy April 2010 Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced

More information

TERMINAL CONTROL MEASURES

TERMINAL CONTROL MEASURES UCR Cashiering & Payment Card Services TERMINAL CONTROL MEASURES Instructions: Upon completion, please sign and return to cashandmerchant@ucr.edu when requesting a stand-alone dial up terminal. The University

More information

PCI Compliance Top 10 Questions and Answers

PCI Compliance Top 10 Questions and Answers Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs

More information

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior

More information

Cyber Self Assessment

Cyber Self Assessment Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information