ADDENDUM TO STATE OF MARYLAND PURCHASES ISSUED UNDER STATE CONTRACT NO. 060B
|
|
|
- Annabella Potter
- 9 years ago
- Views:
Transcription
1 ADDENDUM TO STATE OF MARYLAND PURCHASES ISSUED UNDER STATE CONTRACT NO. 060B This addendum is applicable to each purchase order that is subject to the State of Maryland s contract number 060B The contract is the result of the State of Maryland s Request For Proposal ( RFP ) for Commercial-Off-the-Shelf ( COTS ) Software RFP Project No. 060B I. Section 508 Compliance. The Parties agree that the State s Section 508 Compliance is clarified as follows: Contractor s Products are developed using Section 508 standards and substantially comply with the current guidelines. Contractor reports the accessibility of its Products, including accessibility exceptions, on its Voluntary Product Accessibility Templates (VPATs). Information about specific Products and Contractor s VPATs are available at However, it should be noted that Contractor s Products are comprised of geographic information system (GIS) technology that captures, manages, and analyzes visual data through digital maps. Digital maps and GIS technology are inherently visual/graphical and may not have equivalent access in all cases. II. Security Policies. The Parties agree that the State s security policies are generally not applicable to Esri s COTS Software, and where relevant, shall apply only a case-by-case, order-by-order basis as negotiated by the Parties. Environmental Systems Research Institute, Inc. (Esri) Corporate Security Polices 11/20/15 NOTE: WHILE CLOUD PRODUCTS (SaaS / Esri Online Services) SHALL NOT BE PROVIDED UNDER THE MASTER CONTRACT, "CLOUD PRODUCT" INFORMATION IS SET FORTH HEREIN TO MAINTAIN THE CONTINUITY OF ESRI'S CORPORATE SECURITY POLICIES. On-Premises Products. To meet the requirements of RFP 060B , Section 2.3 COTS Software, Esri is offering a full suite Esri software "on premises" products to be deployed onto the State of Maryland IT systems. These include ArcGIS for Desktop, ArcGIS for Server, ArcGIS Pro, Portal for ArcGIS and the many extensions available for these products. As described here: deployment model, these products depend on and make use of the customer IT security and infrastructure upon which these products are deployed. In addition, the security and infrastructure layers for these products are the responsibility of the customer. Customers are provided with all the configuration capabilities, documentation and guidelines to implement Esri products securely. An example of these guidelines is here: Securing ArcGIS Server. Cloud Product. To meet the requirements of RFP 060B , Section 2.3 COTS Software, Esri is offering ArcGIS Online. ArcGIS Online has received a Federal Agency Production System Security Accreditation. Specifically, ArcGIS Online has been granted Federal Information Security Management Act of 2002 (FISMA) Low Authorization to Operate (ATO) by the USDA. This empowers ArcGIS Online users (including the State of Maryland, under this effort) to securely create interactive web maps to share with whomever they choose, whether it's a specific group, an organization, or the public. FISMA Low controls align with controls provided by the National Institute of Standards and Technology (NIST) Special Publication In addition, many security concerns of non-federal customers are addressed by the ArcGIS Online ATO. With regard to the applicability of referenced DoIT policies in RFP Section to ArcGIS Online and Compliance of ArcGIS Online to Applicable Policies: See Table 1. Table 1: Applicability of State of Maryland DoIT Policies to ArcGIS Online and Compliance of ArcGIS Online to Applicable Policies. DoIT Document Length Document Summary Assessment WRT ArcGIS Online State Project No. 060B / 1 11/20/2015
2 DoIT Security CSET Fact Sheet 45 pgs. Direction to Agencies from DoIT to implement protections in accordance with NIST SP r3, FIPS 199 and FISMA. Outline follows the NIST SP control family divisions. 1 pg. Maryland DoIT is directing that the CSET (Cyber Security Evaluation Tool), a DHS product, be used for assessing security posture of Agency cyber systems and networks. CRR Fact Sheet 1 pg. Maryland DoIT is directing that a CRR (Cyber Resilience Review), a DHS process, be used for assessing security posture of Agency cyber systems and networks. IT Security Plan Template Mobile Device Security Auto. Forwarding Standards for Security Categorization of Information Systems IT Security Certification & Accreditation Guidelines 113 pgs. Template, guidelines and instructions for Agencies to create their Agencyspecific Information Technology Security Plans (ITSPs). 2 pgs. Relates to protection of Marylandowned Mobile IT devices. 2 pgs. Relates to restrictions regarding automatic forwarding of State of Maryland . 3 pgs. Provides guidelines to categorize the security levels of info. systems based on Confidentially/ Integrity/ Availability FISMA/FIPS 199 Security Objectives. 20 pgs. Describes the State of Maryland IT C&A process for Agency systems as a 4 phased activity Definition, Verification, Validation and Post- Accreditation. Firewall Policies 2 pgs. Firewall Policies for Agency networks Platform, Physical Security, Configuration, External Connections, Change Control, Logging and Enforcement. Publicly Accessible Systems 2 pgs. Policies related to public-facing IT Password 3 pgs. for IT systems passwords for State of Maryland agencies. Remote Access 2 pgs. for remote connections to DoIT Wireless Communication 2 pgs. for wireless communications to DoIT systems for State of Maryland agencies. ArcGIS Online Complies: has a FISMA Low ATO and FISMA controls align with NIST SP not an Agency System not an Agency System Agencies are responsible for this activity. not a Mobile IT device. not an system. Agencies are responsible for this categorization activity. C&A for systems at Agencies. Agencies are responsible for these Firewall policies. by itself ArcGIS Online is not a Public-facing Agency System. (However, note Implementation Services comments (See Table 2)). not a State of Maryland IT system. by itself ArcGIS does not implement remote access. (However, note Implementation Services comments (See Table 2)). not a wireless communication technology. State Project No. 060B / 2 11/20/2015
3 Acknowledgement of DoIT Electronic Communications Encryption Incident Report Form 1 pg. Form for user of Agency's or State's electronic communications systems. Relevant to Esri employees on-site during the installation process. not COTS product requirement. (However, will be relevant to Esri employees on-site during the installation process. (See Table 2)). 1 pg. Relates to encryption of s. not an system. 1 pg. PDF form for reporting IT security incidents to [email protected] not COTS product requirement. (However, will be relevant to Esri employees on-site during the installation process. (See Table 2)) Security Requirements and Incident Response The Contractor agrees to abide by all applicable federal, State and local laws concerning information security Applicability to Esri COTS products and Esri Services. o Compliance:. and comply with current State and Department of Information Technology information security policy, currently found at Applicability to Esri COTS products and Esri Services. o Compliance: See Table 1 and Table 2. Contractor shall limit access to and possession of Sensitive Data to only employees whose responsibilities reasonably require such access or possession and shall train such employees on the Confidentiality obligations set forth herein. Applicability to Esri Services The Contractor agrees to notify the Department when any Contractor system that may access, process, or store State data or Work Product is subject to unintended access or attack. Unintended access or attack includes compromise by a computer malware, malicious search engine, credential compromise or access by an individual or automated program due to a failure to secure a system or adhere to established security procedures. Applicability to Esri Services The Contractor further agrees to notify the Department within twenty-four (24) hours of the discovery of the unintended access or attack by providing notice via written or electronic correspondence to the Contract Manager, Department chief information officer and Department chief information security officer. Applicability to Esri Services The Contractor agrees to notify the Department within two (2) hours if there is a threat to Contractor's product as it pertains to the use, disclosure, and security of the State's data. State Project No. 060B / 3 11/20/2015
4 Applicability to Esri Services If an unauthorized use or disclosure of any Sensitive Data occurs, the Contractor must provide written notice to the Department within one (1) business day after Contractor's discovery of such use or disclosure and thereafter all information the requests concerning such unauthorized use or disclosure. Applicability to Esri Services The Contractor, within one day of discovery, shall report to the Department any improper or non-authorized use or disclosure of Sensitive Data. Contractor's report shall identify: (a) the nature of the unauthorized use or disclosure; (b) the Sensitive Data used or disclosed, (c) who made the unauthorized use or received the unauthorized disclosure; (d) what the Contractor has done or shall do to mitigate any deleterious effect of the unauthorized use or disclosure; and (e) what corrective action the Contractor has taken or shall take to prevent future similar unauthorized use or disclosure. (f) The Contractor shall provide such other information, including a written report, as reasonably requested by the State. Applicability to Esri Services The Contractor shall protect Sensitive Data according to a written security policy no less rigorous than that of the State, and shall supply a copy of such policy to the State for validation. The Contractor agrees to comply with all applicable laws that require the notification of individuals in the event of unauthorized release of Sensitive Data or other event requiring notification and, should an event occur that triggers an obligation to provide such notification, the Contractor agrees to assume responsibility for informing all such individuals in accordance with applicable law and to indemnify, hold harmless and defend the State and its officials and employees from and against any claims, damages, or other harm related to such security obligation breach or other event requiring the notification. Applicability to Esri Services This Section shall survive expiration or termination of this Contract. Applicability to Esri COTS products and Esri Services. o Compliance:. With regard to the applicability of referenced DoIT policies in RFP Section to Services and Compliance of the Provision of Services to Applicable Policies: See Table 2. Table 2: Applicability of State of Maryland DoIT Policies to Services and Compliance of the Provision of Services to Applicable Policies. DoIT Document DoIT Security Length Document Summary Assessment WRT Implementation and Training Services 45 pgs. Direction to Agencies from DoIT to : implement protections in accordance with NIST SP controls with NIST SP r3, FIPS 199 and relevant to personnel security, and FISMA. Outline follows the NIST SP personnel training, specifically, control family divisions. control groups: AT, IR, and PS. State Project No. 060B / 4 11/20/2015
5 CSET Fact Sheet 1 pg. Maryland DoIT is directing that the CSET (Cyber Security Evaluation Tool), a DHS product, be used for assessing security posture of Agency cyber systems and networks. CRR Fact Sheet 1 pg. Maryland DoIT is directing that a CRR (Cyber Resilience Review), a DHS process, be used for assessing security posture of Agency cyber systems and networks. IT Security Plan Template Mobile Device Security Auto. Forwarding Standards for Security Categorization of Information Systems IT Security Certification & Accreditation Guidelines 113 pgs. Template, guidelines and instructions for Agencies to create their Agencyspecific Information Technology Security Plans (ITSPs). 2 pgs. Relates to protection of Marylandowned Mobile IT devices. 2 pgs. Relates to restrictions regarding automatic forwarding of State of Maryland . 3 pgs. Provides guidelines to categorize the security levels of info. systems based on Confidentially/ Integrity/ Availability FISMA/FIPS 199 Security Objectives. 20 pgs. Describes the State of Maryland IT C&A process for Agency systems as a 4 phased activity Definition, Verification, Validation and Post- Accreditation. Firewall Policies 2 pgs. Firewall Policies for Agency networks Platform, Physical Security, Configuration, External Connections, Change Control, Logging and Enforcement. Publicly Accessible Systems 2 pgs. Policies related to public-facing IT Password 3 pgs. for IT systems passwords for State of Maryland agencies. Remote Access 2 pgs. for remote connections to DoIT Esri staff will not have Marylandowned Mobile IT devices. Esri staff will not have State of Maryland accounts. During implementation of any publicfacing web services, Esri Implementation Services staff will comply with this policy. It is anticipated that Esri staff will be provided with State of Maryland IT accounts. Esri staff will comply with DoIT password policies. It is anticipated that Esri staff may have remote connections to Maryland DoIT networks. Esri staff will comply with the DoIT remote access policy. State Project No. 060B / 5 11/20/2015
6 Wireless Communication Acknowledgement of DoIT Electronic Communications Encryption Incident Report Form 2 pgs. for wireless communications to DoIT systems for State of Maryland agencies. 1 pg. Form for user of Agency's or State's electronic communications systems. Relevant to Esri employees on-site during the installation process. It is anticipated that Esri staff may have wireless connections to Maryland DoIT networks. Esri staff will comply with the DoIT wireless communications policy. It is anticipated that Esri staff will have access to Maryland DoIT systems and networks. Esri staff will complete the DoIT electronic communications policy acknowledgement form. 1 pg. Relates to encryption of s. Esri staff will not have State of Maryland accounts. 1 pg. PDF form for reporting IT security incidents to [email protected] Esri staff will report IT security incidents using the Incident Report Form. State Project No. 060B / 6 11/20/2015
STATE OF NEW JERSEY Security Controls Assessment Checklist
STATE OF NEW JERSEY Security Controls Assessment Checklist Appendix D to 09-11-P1-NJOIT P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 Agency/Business (Extranet) Entity Response
Privacy Impact Assessment. For Person Authentication Service (PAS) Date: January 9, 2015
For Person Authentication Service (PAS) Date: January 9, 2015 Point of Contact and Author: Hanan Abu Lebdeh [email protected] System Owner: Ganesh Reddy [email protected] Office of Federal Student
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Homeland Security Virtual Assistance Center
for the Homeland Security Virtual Assistance Center November 3, 2008 Contact Point Donald M. Lumpkins National Preparedness Directorate (FEMA) (202) 786-9754 Reviewing Official Hugo Teufel III Chief Privacy
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
Open Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
Exhibit 2. Business Associate Addendum
Exhibit 2 Business Associate Addendum This Business Associate Addendum ( Addendum ) governs the use and disclosure of Protected Health Information by EOHHS when functioning as a Business Associate in performing
Anatomy of a Cloud Computing Data Breach
Anatomy of a Cloud Computing Data Breach Sheryl Falk Mike Olive ACC Houston Chapter ITPEC Practice Group September 18, 2014 1 Agenda Ø Cloud 101 Welcome to Cloud Computing Ø Cloud Agreement Considerations
PCI Compliance for Cloud Applications
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
DATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ) is entered into by and between Professional Office Services, Inc., with principal place of business at PO Box 450, Waterloo,
Appendix 10 IT Security Implementation Guide. For. Information Management and Communication Support (IMCS)
Appendix 10 IT Security Implementation Guide For Information Management and Communication Support (IMCS) 10.1 Security Awareness Training As defined in NPR 2810.1A, all contractor personnel with access
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT
SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article A.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen
Medical Privacy Version 2015.12.10 - Standard. Business Associate Agreement. 1. Definitions
Medical Privacy Version 2015.12.10 - Standard Business Associate Agreement This Business Associate Agreement (the Agreement ) shall apply to the extent that the Lux Scientiae HIPAA Customer signee is a
United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)
for the United States Citizenship and Immigration Services (USCIS) June 22, 2007 Contact Point Harry Hopkins Office of Information Technology (OIT) (202) 272-8953 Reviewing Official Hugo Teufel III Chief
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen
Information Security @ Blue Valley Schools FEBRUARY 2015
Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that
REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.
Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee
Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies Privacy Committee Web 2.0/Cloud Computing Subcommittee August 2010 Introduction Good privacy practices are a key
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people
STATE MODEL CLOUD COMPUTING SERVICES SPECIAL PROVISIONS (Software as a Service)
SHI THESE SPECIAL PROVISIONS ARE ONLY TO BE USED FOR SOFTWARE AS A SERVICE (SaaS), AS DEFINED BELOW. THESE SPECIAL PROVISIONS ARE TO BE ATTACHED TO THE GENERAL PROVISIONS INFORMATION TECHNOLOGY AND ACCOMPANIED
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
Personal Security Practices of the CAO
Personal Security Practices of the CAO 1. Do you forward your government email to your personal email account? 2. When is the last time you changed your Enterprise password? Within the last 60 days Within
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
DHS Cyber Security & Resilience Resources: Cyber Preparedness, Risk Mitigation, & Incident Response
February 2015 DHS Cyber Security & Resilience Resources: Cyber Preparedness, Risk Mitigation, & Incident Response Cyber Security Advisor Program Office of Cybersecurity & Communications National Protection
FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB 2014-05. Cyber Risk Management Guidance. Purpose
FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB 2014-05 Cyber Risk Management Guidance Purpose This advisory bulletin provides Federal Housing Finance Agency (FHFA) guidance on cyber risk management.
Crew Member Self Defense Training (CMSDT) Program
for the Crew Member Self Defense Training (CMSDT) Program February 6, 2008 Contact Point Michael Rigney Federal Air Marshal Service Flight Programs Division [email protected] Reviewing Officials Peter
Securing the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management
Federal Trade Commission Privacy Impact Assessment. for the: Analytics Consulting LLC Claims Management System and Online Claim Submission Website
Federal Trade Commission Privacy Impact Assessment for the: Analytics Consulting LLC Claims Management System and Online Claim Submission Website January 2015 Page 1 of 14 1 System Overview The Federal
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND
NIST Cyber Security Activities
NIST Cyber Security Activities Dr. Alicia Clay Deputy Chief, Computer Security Division NIST Information Technology Laboratory U.S. Department of Commerce September 29, 2004 1 Computer Security Division
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
Overview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
CATHOLIC SOCIAL SERVICES BUSINESS ASSOCIATE AGREEMENT
CATHOLIC SOCIAL SERVICES BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT (Agreement) is made this day of, 20, between the Catholic Social Services ( CSS ), whose business address is 3710
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance
WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is by and between ( Covered Entity ) and Xelex Digital, LLC ( Business Associate ), and is effective as of. WHEREAS,
SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures
1. Introduction 1.1. Purpose and Background 1.2. Central Coordinator Contact 1.3. Payment Card Industry Data Security Standards (PCI-DSS) High Level Overview 2. PCI-DSS Guidelines - Division of Responsibilities
PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]
PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name] [Date] [Location] 1 Prepared by: [Author] [Title] Date Approved by: [Name] [Title] Date 2
Information Security and Risk Management
Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Security Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
University System of Maryland University of Maryland, College Park Division of Information Technology
Audit Report University System of Maryland University of Maryland, College Park Division of Information Technology December 2014 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
Information Technology Security Requirements Summary
Information Technology Security Requirements Summary 1. Background Investigation Contractor employees who will have access to federal information technology (IT) systems are subject to background investigations
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
BUSINESS ASSOCIATE ADDENDUM
BUSINESS ASSOCIATE ADDENDUM This BA Agreement, effective as of the effective date of the Terms of Use, adds to and is made part of the Terms of Use by and between Business Associate and Covered Entity.
Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM )
ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM ) IMPORTANT NOTICES: In order to access and/or use this Cloud Service
Office of Inspector General
Office of Inspector General DEPARTMENT OF HOMELAND SECURITY U.S. Department of Homeland Security Washington, DC 20528 Office of Inspector General Security Weaknesses Increase Risks to Critical DHS Databases
Table of Contents INTRODUCTION AND PURPOSE 1
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 ( HIPAA ) COMPLIANCE PROGRAM Adopted December 2008: Revised February 2009, May, 2012, and August 2013 Table of Contents INTRODUCTION AND PURPOSE
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
BUSINESS ASSOCIATE AGREEMENT Tribal Contract
DEPARTMENT OF HEALTH SERVICES Division of Enterprise Services F-00714 (08/2013) STATE OF WISCONSIN BUSINESS ASSOCIATE AGREEMENT Tribal Contract This Business Associate Agreement is made between the Wisconsin
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT
GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology A comprehensive approach
Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government
Department of Information Technology Remote Access Audit Final Report January 2010 promoting efficient & effective local government Background Remote access is a service provided by the county to the Fairfax
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
STANDARD FORM BUSINESS ASSOCIATE CONTRACT AND DATA USE AGREEMENT
STANDARD FORM BUSINESS ASSOCIATE CONTRACT AND DATA USE AGREEMENT THIS AGREEMENT is entered into and made effective the day of, 2014 (the Effective Date ), by and between (a) GI Quality Improvement Consortuim,
INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies
United States Government Accountability Office Report to Congressional Requesters June 2014 INFORMATION SECURITY Additional Oversight Needed to Improve Programs at Small Agencies GAO-14-344 June 2014 INFORMATION
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Compliance Risk Management IT Governance Assurance
Compliance Risk Management IT Governance Assurance Solutions That Matter Introduction to Federal Information Security Management Act (FISMA) Without proper safeguards, federal agencies computer systems
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
