REMOTE ACCESS POLICY OCIO TABLE OF CONTENTS
|
|
|
- Dustin Lenard Wood
- 9 years ago
- Views:
Transcription
1 OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES VII. EXCEPTIONS VIII. REFERENCES IX. EFFECT ON OTHER POLICIES I. PURPOSE This policy establishes the uniform policy within the United States Patent and Trademark Office (USPTO) to ensure that access to USPTO data from remote locations is provided to users in a secure and effective manner. This set of requirements defines a framework of implementation standards intended to protect USPTO IT networks, servers, and the data contained therein from the risks inherent in remote access without significantly impairing the USPTO mission or the quality of service to the remote user. II. AUTHORITY This policy is issued pursuant to: The Federal Information Security Management Act (FISMA) of 2002 USPTO IT Security Policy Management Policy III. SCOPE The provisions of this policy apply to all USPTO employees and contractor employees accessing USPTO Automated Information Systems (AIS) and to contractor employees providing telecommunications and AIS services to the USPTO. This policy applies to all USPTO personnel (Federal and contractor employees) and all USPTO AIS or resources, independent of the size of the computer, network, device, or information. For example, it applies to desktops, laptops, servers, or other media that provides file or data storage. This policy also applies to those AIS operated and used by contractor employees, guest Remote Access Policy Version
2 researchers, collaborators, and other Federal agencies to carry out the USPTO mission, whether or not they are owned, leased, or on Government property. This policy is applicable to all equipment and systems used for remote access (e.g., laptops and workstations used to remotely access USPTO AIS from home, while on travel, or from other remote locations). IV. DEFINITIONS Authentication: Authentication mechanisms provide an added level of assurance that users really are who they state they are. Authentication consists of something a user knows (such as, a password), something the user has (such as, a token or smart card), or something that is a part of the user (such as a fingerprint). It is the process by which the remote user is identified by entering a valid user name and password. Broadband: Broadband is a type of data transmission in which a single medium (wire) can carry several channels at once [such as Digital Subscriber Lines (DSL) and cable TV/modem, two-way satellite, and other emerging technologies]. Computer Security Incident: A reportable incident consists of any act that violates an explicit or implied security policy within USPTO. More specifically, an incident is any adverse event that threatens the security of information resources. Incidents may include, but are not limited to: Compromise of integrity - when a virus, Trojan, or worm infects an AIS or network; Denial of service attack - when an attacker has disabled a network resource or a virus, worm, or Trojan has used all available network bandwidth; Loss of accountability/misuse - when an intruder or insider uses an account or an AIS for unauthorized or illegal purposes; Damage to any part of the AIS - when a virus, trojan, worm, or Federal employee or contractor employee destroys data; and Compromise of confidentiality/intrusion - when an unauthorized outsider gains access to our IT resources. Dial-up Access: Dial-up Access is remote connectivity using a modem device to call other AIS over a public telephone line. Such access may utilize analog services, Integrated Services Digital Network (ISDN) service, or DSL telephone service. Firewall: A firewall is a general term for a network perimeter or border router device (could be hardware, software, or both) designed to prevent unauthorized access to or from one networked environment to another networked environment. A computing environment may consist of one or more firewall devices that protect specific sensitive areas of the internal USPTO network. The outermost of these devices would face the public Internet. Firewalls can be configured to examine all messages entering or leaving a USPTO network and block those messages that are not explicitly allowed by the firewall configuration rules. Remote Access Policy Version
3 Forensic Examination: Forensic examination is the detailed inspection of computer memory and storage media to confirm or deny the occurrence of compromised information and applications, and if compromised, the extent to which information was compromised. Information Sensitivity: Information sensitivity reflects the relationship between the characteristics of the information processed (e.g., personnel data subject to protection under the Privacy Act) and the mission need to ensure the confidentiality, integrity, and availability of the information (e.g., legal requirements to protect confidentiality of personal data). Sensitivity may vary from low to medium to high. During the AIS risk assessment, the System Owner must determine the sensitivity, or reaction, of the agency s mission to compromises of confidentiality, integrity, and availability of the information stored and processed by the AIS. This determination, along with the likelihood of compromise occurring, establishes the level of security adequate to protect the data as required by OMB Circular A-130, Appendix III. The System Owner must identify the management, technical, and operational controls necessary to provide the required protection. Local Area Network (LAN): A computer network that spans a relatively small area, such as a single building or group of buildings. Personally Owned Resources: Remote-access user owned computers, other hardware devices, and software. Public-Access Equipment: Computers and other hardware devices that are owned by an entity or enterprise other than the USPTO or the remote user and allow unrestricted access by the general public. Remote Access: Remote access uses telecommunications to enable authorized access to non-public USPTO computing services that would otherwise be inaccessible from work locations outside the established USPTO local area network or USPTO-controlled wide area network computing environment. This includes access to non-public USPTO AIS and data that are exposed to the public Internet (e.g., web access to electronic mail by the home user or business traveler), as well as modem dial-up and/or Virtual Private Network (VPN) access to internal USPTO IT servers and desktop workstations. Remote Location: A work location where a worker is not able to connect a computer directly to the USPTO local area network or a USPTO-controlled wide area network that contains AIS needed for official duties. This includes a worker s home, a traveler s hotel room, or an emergency worker s field location. Work from remote locations requires the use of telecommunications capabilities, such as dial-up modems, Internet connectivity, or wireless networks to access USPTO AIS and data for official duty purposes. Remote user: Any user who requires access to USPTO AIS from a remote location. Users may include USPTO Federal employees and contractor employees, employees of other Federal agencies who require remote access to USPTO AIS, and remote researchers processing USPTO information. Sanitization: System sanitization is a process whereby the storage media (i.e. hard drive or USB drive) of a compromised system is erased in order to remove all traces of compromise or sensitive Government information. Remote Access Policy Version
4 System Owners: A project manager with day-to-day management and operational control over the AIS and direct oversight of the system/network administrators and operations staff. Although the Federal Government has ultimate ownership of all USPTO data, AIS and equipment, owner is the term commonly used by the National Institute of Standards and Technology (NIST) to refer to individuals with specific AIS oversight responsibilities. The System Owner role is discussed at length in the C&A section of the IT Security Handbook. Telework/telecommuting: Telework or telecommuting occur when authorized USPTO employees perform all, or a part of, their work away from their normal places of business, usually at home or from an established Government telework center. USPTO-owned/furnished resources: USPTO-owned/furnished resources including computers, other hardware devices, software, and data provided to remote users for use in their official duties. Virtual Private Network (VPN): A virtual private network is a private tunnel through a public network (i.e., the Internet). For example, there are a number of systems that can establish private networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. Wide Area Network: A wide area network consists of the connection of many LANs over any distance via telephone lines and radio waves. Wireless LAN (WLAN): A wireless LAN consists of a network that uses radio waves rather than wires to communicate between nodes. V. POLICY The following minimum standards apply to all USPTO federal employees and contractor employees who remotely access unclassified USPTO AIS, as well as other authorized Government officials, business partners, third party collaborators, and researchers who require remote access to USPTO AIS. This policy applies to all USPTO AIS, regardless of platform, that allow such access, and it explains the proper configuration and maintenance of the devices used to conduct remote access, including USPTOowned/furnished, personally owned, and publicly accessed equipment, as well as equipment at alternate operation sites used for continuity of operations activities. This policy applies to contractor employees as provided for in USPTO contracts. This policy applies to all AIS and its authority is independent of the type of remote access technology. This policy includes the following modes of remote access: modems, broadband and wireless connections; third party Internet service providers (ISP); public access sites such as kiosks and Internet cafés; and alternate platforms such as personal electronic devices (PED)/personal digital assistants (PDA); and cell phones. It applies to all AIS used to carry out the USPTO s mission, located both on and off Government property, whether operated by Federal employees or contractor employees. All USPTO Remote Access Users, including USPTO Federal employees and contractor employees, must follow the mandatory minimum standards of this policy. Failure to comply with this policy may result in disciplinary action and/or revocation of remote access privileges. Remote Access Policy Version
5 Remote users shall: REMOTE ACCESS POLICY Complete initial and annual refresher IT security awareness training as required by USPTO IT security policy. Certify that the user has read and understand their responsibilities under this policy prior to receiving remote access authorization and authentication credentials. Adhere to the terms of signed remote access user security agreement or similar agreement (See Appendix A). Ensure the computer used for remote access is configured and maintained according to this policy and according to the method of remote access being used. (See Appendix B -- Minimum Standards for Protective Remote Access Countermeasures). Periodically check to determine that all applicable configuration guidance and security patches available for the software used to process USPTO information on personally owned computers have been installed. Return USPTO-owned computers used for remote access, as required and as directed by the responsible manager, supervisor, COTR, or ISSO, so that the security configuration (e.g. patches) of the computer can be checked and updated. Exercise caution when accessing Government information from a public area to prevent compromise of sensitive information by inadvertent over the shoulder reading of material. Report within 24 hours of identification all IT security incidents to their supervisor, to their COTR, to their ITSO, or to the USPTO CIRT following USPTO incident reporting procedures. All USPTO System Owners must determine the sensitivity of information contained in their AIS as part of the decision-making process to allow or deny remote access to data on their AIS. System Owners must also ensure that: remote access controls are implemented consistently with the risk and magnitude of harm to the information and the mandatory minimum standards of this policy; the relevant AIS security plans document the types of remote access that are acceptable and document the security controls required for that access; and ensure the relevant system security plan includes approved waivers of the requirements of this policy. The waiver process is detailed in the IT Security Handbook. USPTO categorizes remote access into three tiers, according to the risk of harm inherent in the nature of the access and the sensitivity of the information accessed. Tier 1 represents low risk because the AIS accessed are between the outermost USPTO network perimeter or border device, such as the USPTO firewall, and outside inner USPTO firewalls that protect local area networks. In addition, Tier 1 information is of low sensitivity. Tier 2 represents medium risk because basic user privileges are allowed to access AIS processing or storing sensitive-but-unclassified information inside the inner USPTO firewalls and internal to the USPTO computing environment. Remote Access Policy Version
6 Tier 3 represents high risk because administrative (or super-user ) privileges are allowed to access AIS processing or storing sensitive-but-unclassified information that are internal to the USPTO computing environment. VI. RESPONSIBILITIES All USPTO employees and contractor employees shall adhere to this policy and to refrain from any activity that might circumvent this policy. All USPTO employees or contractor employees responsible for the management, implementation, installation, configuration, operation, maintenance, or security of a USPTO AIS must implement the mandatory practices of this policy and, if necessary, must identify any proposed deviations from the mandatory practices of this policy and request a waiver in writing from the USPTO IT Security Officer in accordance with the waiver process as defined in the USPTO IT Security Handbook. System administrators shall ensure technical controls and/or operational procedures are in place to identify, prevent, correct, and report violations of this policy. Violations of this policy shall be reported via to the HELPDESK address. The IT Security Management Group (ITSMG) shall maintain and update the policy annually, review and approve or deny waivers, and monitor compliance through the conduct of annual compliance reviews. ITSMG shall be responsible for the monitoring of AIS user compliance with this policy as part of the periodic IT security self-assessment program or AIS evaluations, and maintaining approved waivers as part of the documentation for appropriate system security plan(s). ITSMG shall ensure communication of the policy to all USPTO employee and contractor employee AIS users and shall ensure that IT security awareness and training programs address the proper use of remote access privileges. VII. EXCEPTIONS 1. This policy does not apply to remote access of publicly accessible USPTO Web sites, such as including those USPTO sites intended to provide services to the public that support transactions and access to databases although the access supports official Government business. 2. The term "remote access" as used in this policy does not include such public Web site access, except when the public access site supports access to AIS and data not publicly available through such Web. This would be the case if a USPTO public Web site provided initial access for a secure portal that required further authentication for access to internal resources. 3. This policy does not cover requirements for securing the servers and applications that are remotely accessed. Additional exceptions to this policy shall be determined on a case-by-case basis using the waiver process as defined in the USPTO IT Security Handbook. Remote Access Policy Version
7 VIII. REFERENCES REMOTE ACCESS POLICY E-Government Act (Public Law ), Title III - Federal Information Security Management Act (FISMA), December Federal Information Processing Standards (FIPS) Publication 140-2, Security Requirements for Cryptographic Modules, February Federal Information Processing Standards (FIPS) Publication 199, Standards for Security Categorization of Federal Information and Information Systems, February Federal Information Processing Standard (FIPS) Publication 200, Minimum Security Requirements for Federal Information and Information Systems, March Office of Management and Budget (OMB) Circular A-130, Management of Federal Information Resources, Appendix III, Revised November OMB M Guidance for implementing the Privacy Provisions of the E-Government Act of 2002 OMB Memorandum M-06-15, Safeguarding Personally Identifiable Information, May OMB Memorandum M-06-16, Protection of Sensitive Agency Information, June OMB Memorandum M-06-19, Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency Information Technology Investments, July OMB Memorandum M-07-16, Safeguarding Against and Responding to the Breach of Personally Identifiable Information, May 2007 The Privacy Act of 1974, 5 U.S.C. 552a U.S. Department of Commerce, IT Privacy Policy. U.S. Department of Commerce, IT Security Program Policy and Minimum Implementation Standards, June 30, U.S. Patent and Trademark Office, Agency Administrative Order 212-4, USPTO IT Security Handbook. U.S. Patent and Trademark Office, IT Privacy Policy. U.S. Patent and Trademark Office, Rules of the Road. U.S. Patent and Trademark Office, Comprehensive Records Schedule. IX. EFFECT ON OTHER POLICIES This policy affects all new, revised, or retired policies issues in Fiscal Year Remote Access Policy Version
8 ISSUED BY: Chief ~nfarmabon Officer United States Patent and Trademark Office OFFICE OF PRIMARY INTEREST: IT Security Management Group Remote Access Policy Version
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section
ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS
OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions
PASSWORD MANAGEMENT POLICY OCIO-6012-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER PASSWORD MANAGEMENT POLICY OCIO-6012-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY
SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO-6013-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER OCIO-6013-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS
UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series. Secure Baseline Attachment
UNITED STATES PATENT AND TRADEMARK OFFICE AGENCY ADMINISTRATIVE ORDER 212-04 Agency Administrative Order Series Secure Baseline Attachment Date of Issuance: Effective Date: TABLE OF CONTENTS I. Purpose
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people
WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
United States Department of Agriculture Marketing and Regulatory Programs Grain Inspection, Packers and Stockyards Administration Directive GIPSA 3140.5 11/30/06 WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
Appendix H: End User Rules of Behavior
Appendix H: End User Rules of Behavior 1. Introduction The Office of Management and Budget (OMB) has established the requirement for formally documented Rules of Behavior as set forth in OMB Circular A-130.
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Network Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
Enterprise K12 Network Security Policy
Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
CITY OF BOULDER *** POLICIES AND PROCEDURES
CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
Telework and Remote Access Security Standard
State of California Office of the State Chief Information Officer Telework and Remote Access Security Standard SIMM 66A March 2010 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES Initial
Department of Veterans Affairs VA Handbook 6500. Information Security Program
Department of Veterans Affairs VA Handbook 6500 Washington, DC 20420 Transmittal Sheet September 18, 2007 Information Security Program 1. REASON FOR ISSUE: To provide specific procedures and establish
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
ORDER 1370.108. National Policy. Effective Date 09/21/09. Voice Over Internet Protocol (VoIP) Security Policy SUBJ:
National Policy ORDER 1370.108 Effective Date 09/21/09 SUBJ: Voice Over Internet Protocol (VoIP) Security Policy 1. Purpose of This Order. This Order establishes the Federal Aviation Administration s (FAA)
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
CIT End User Device Policy
Version 1.0 Information Systems Security Office Center for Information Technology National Institutes of Health U.S. Department of Health and Human Services January 4, 2011 Version Number Release Date
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-2105 Remote Access Security Standard Revision Number: 1.0 Effective
Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI
Office of Regulatory Compliance 13001 E. 17 th Place, Suite W1124 Mail Stop F497 Aurora, CO 80045 Main Office: 303-724-1010 Main Fax: 303-724-1019 HIPAA Policy 7.1 Title: Source: Prepared by: Approved
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Miami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
UNCLASSIFIED (U) U.S. Department of State Foreign Affairs Manual Volume 5 Information Management 5 FAM 870 NETWORKS
5 FAM 870 NETWORKS (Office of Origin: IRM/BMP/GRP/GP) 5 FAM 871 ENTERPRISE NETWORKS (CT:IM-138; 01-18-2013) The Department currently has two enterprise networks: ClassNet and OpenNet. Only Department-issued
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
POLICY ON WIRELESS SYSTEMS
Committee on National Security Systems CNSSP No. 17 January 2014 POLICY ON WIRELESS SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CHAIR
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
Information Security Network Connectivity Process
Information Security Network Connectivity Process Handbook AS-805-D September 2009 Transmittal Letter A. Purpose It is more important than ever that each of us be aware of the latest policies, regulations,
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
This policy applies to all DRC employees, contractors, volunteers, interns and other agents of the state.
STATE OF OHIO SUBJECT: PAGE 1 OF 9 DRC Sensitive Data Security Requirements NUMBER: 05-OIT-23 DEPARTMENT OF REHABILITATION AND CORRECTION RULE/CODE REFERENCE: RELATED ACA STANDARDS: SUPERSEDES: 05-OIT-23
Appendix A: Rules of Behavior for VA Employees
Appendix A: Rules of Behavior for VA Employees Department of Veterans Affairs (VA) National Rules of Behavior 1 Background a) Section 5723(b)(12) of title 38, United States Code, requires the Assistant
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE Instruction 60-701 28 May 2012 Information Technology IT Security Assignment of Responsibilities
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
How To Protect The Time System From Being Hacked
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
Telework and Remote Access Security Standard
State of California California Information Security Office Telework and Remote Access Security Standard SIMM 5360-A (formerly SIMM 66A) September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Final Audit Report. Report No. 4A-CI-OO-12-014
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: AUDIT OF THE INFORMATION TECHNOLOGY SECURITY CONTROLS OF THE U.S. OFFICE OF PERSONNEL MANAGEMENT'S
User s Guide to Securing External Devices for Telework and Remote Access
Special Publication 800-114 User s Guide to Securing External Devices for Telework and Remote Access Recommendations of the National Institute of Standards and Technology Karen Scarfone Murugiah Souppaya
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes
Policy Title: HIPAA Security Awareness and Training
Policy Title: HIPAA Security Awareness and Training Number: TD-QMP-7011 Subject: HIPAA Security Awareness and Training Primary Department: TennDent/Quality Monitoring/Improvement Effective Date of Policy:
Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Sample Policies for Internet Use, Email and Computer Screensavers
Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
How To Get The Nist Report And Other Products For Free
National Institute of Standards and Technology (NIST) The Information Technology Lab Computer Security Division (893) Now What? What does NIST have for you to use and how do you get it? How do you contact
EPA Classification No.: CIO-2150.3-P-02.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM AWARENESS AND TRAINING PROCEDURES V3.1 JULY 18, 2012 1. PURPOSE The purpose of this
OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES
Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Security Controls Over Wireless Technology Were Generally in Place; However, Further Actions Can Improve Security September 26, 2011 Reference Number:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access
Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
Guide to Enterprise Telework and Remote Access Security
Special Publication 800-46 Revision 1 Guide to Enterprise Telework and Remote Access Security Recommendations of the National Institute of Standards and Technology Karen Scarfone Paul Hoffman Murugiah
Ohio Supercomputer Center
Ohio Supercomputer Center Portable Security Computing No: Effective: OSC-09 05/27/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
ehealth Ontario EMR Connectivity Guidelines
ehealth Ontario EMR Connectivity Guidelines Version 1.3 Revised March 3, 2010 Introduction Ontario s new ehealth strategy includes the use of commercially-available high-speed Internet to meet Electronic
Office of Inspector General
Office of Inspector General DEPARTMENT OF HOMELAND SECURITY U.S. Department of Homeland Security Washington, DC 20528 Office of Inspector General Security Weaknesses Increase Risks to Critical DHS Databases
BUDGET LETTER 05-03 PEER-TO-PEER FILE SHARING 4841.1, 4841.2, EXECUTIVE ORDER S-16-04
BUDGET LETTER SUBJECT: PEER-TO-PEER FILE SHARING REFERENCES: STATE ADMINISTRATIVE MANUAL SECTIONS 4819.2, 4840.4, 4841.1, 4841.2, EXECUTIVE ORDER S-16-04 NUMBER: 05-03 DATE ISSUED: March 7, 2005 SUPERSEDES:
Network Infrastructure - General Support System (NI-GSS) Privacy Impact Assessment (PIA)
Network Infrastructure - General Support System (NI-GSS) Privacy Impact Assessment (PIA) System Categorization: Moderate Version 1.5 May 30, 2013 Prepared by: Security & Compliance Services (SCS) and Infrastructure
STATE OF NEW JERSEY Security Controls Assessment Checklist
STATE OF NEW JERSEY Security Controls Assessment Checklist Appendix D to 09-11-P1-NJOIT P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 Agency/Business (Extranet) Entity Response
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
NIST Cyber Security Activities
NIST Cyber Security Activities Dr. Alicia Clay Deputy Chief, Computer Security Division NIST Information Technology Laboratory U.S. Department of Commerce September 29, 2004 1 Computer Security Division
