SOME SMES DATA SAFETY AND SECURITY ISSUES IN THE IN-HOUSE AND IN THE CLOUD COMPUTING
|
|
|
- Benedict Houston
- 9 years ago
- Views:
Transcription
1 18. medzinárodná vedecká konferencia Riešenie krízových situácií v špecifickom prostredí, Fakulta špeciálneho inžinierstva ŽU, Žilina, jún 2013 SOME SMES DATA SAFETY AND SECURITY ISSUES IN THE IN-HOUSE AND IN THE CLOUD COMPUTING Zoran Čekerevac * Savo Radonjić ** ABSTRAKT Článok prináša analýzu o potrebách malých a stredných podnikov pre ukladanie dát a spracovanie, a riziká, ktoré sa môžu objaviť pri použití cloud ako miesto na plnenie svojich potrieb. Porovnávacia analýza o rizikách používania cloud a in-house technológií je uvedený spolu s niektorými príkladmi. Osobitná pozornosť je venovaná problematike ochrany proti rizikám na internete strane poskytovateľa: hakovanie a dohľad. Na konci práce sú uvedené niektoré odporúčania pre malé a stredné podniky vo vzťahu k cloud computingu. Kľúčové slová: cloud computing, bezpečnosť dát, zabezpečenie dát, ochrana dát, malých a stredných podnikov ABSTRACT The article presents an analysis about SMEs needs for data saving and processing, and risks that can appear when using cloud as a place to fulfill their needs. A comparative analysis about risks of using cloud and in-house technology is given together with some examples. Special attention is paid to the problems of protection against risks on the Internet provider s side: hacking and surveillance. At the end of the work, some recommendations for SMEs in relation to cloud computing are given. Key words: Cloud computing, data safety, data security, data protection, SME * Zoran Čekerevac, PhD, Assoc. Prof., Faculty of Business and Industrial Management - Union University Belgrade, Kneza Višeslava 27, Belgrade, Tel (11) and Business School Čačak in Belgrade, Gradski park 2, Beograd-Zemun, Tel (11) , [email protected] ** Savo Radonjić, PhD, Docent, Business School Čačak in Belgrade, Gradski park 2, Beograd-Zemun, Tel (11) , [email protected] 99
2 1 INTRODUCTION The official position of the European Union in relation to the prosperity of its citizens is that it just depends on the development of small and medium-sized enterprises. This is not surprising, given that out of the 19.3 million enterprises in Europe in the year 2001, 99.8 percent were small and medium-sized enterprises, employing 66 percent of the total active population, and contributing by 54 percent to total generated turnover [1]. In 2009, in EU-27 were 20,791,190 enterprises with the SMEs 1 participation of 99.8%, same as eight years before [2]. That is why SMEs are recognized as the backbone of EU economy. Different forms of e-businesses play an important role in the business of SMEs. If the company's dependence on the data is considered, it can be seen that in that respect it is completely irrelevant whether it is a large multinational company or a company of ten employees. Both depend on the data they use in their daily work. Problems can arise either because of the banal loss of power supply, PC-theft, malicious hacker intrusion, virus attacks, but also because of the massive disasters that may be caused by floods or earthquakes as it was in March 2011 in Japan. SMEs take considerably small care of measures for their safety, and many of them find that they are not interesting to attackers, and that attacks will miss them. [3] Normally, this assumption is totally unwarranted. SMEs tend to have all their critical data on a single server. If the server "crashes", because most offices depend of that server, it would have to be running and to be fully restored immediately. Otherwise, the whole system could be exposed to costly consequences. SMEs and, also, large corporations, in regulated economies, are subject to the same requirements in the terms of quality and data availability, and, also, data protection. In the United States, there are established sets of very specific rules about the availability, organization, and regulatory data protection laws, such as: HIPAA, DOD 5015, FDA Part 11, Sarbanes-Oxley, SEC Rule 17 th... [4], and very severe penalties are provided for violations. The problem of SMEs is the lack of funds to undertake necessary measures. In addition, any disruption in cash flow is often fatal for SMEs. Aidan McDermot estimated in his article "A Small Business Approach to Computer Downtime" [5], that incidents can cost a small business from $232 to $844 per PC, depending of the kind of incident, as it is shown in the table 1. Option Table 1 An example of downtime cost (Authors presentation of the data in [5]) Total downtime Lost wages Cost of service Total cost of downtime per PC Onsite service 8 hours $36.20x8=$ $200 $ Drop off service 20 hours $36.20x20=$724 $120 $844 Remote service 2 hours $36.20x2=$72.40 $160 $ SMEs are defined by the European Commission as having less than 250 persons employed. [2] 100
3 Although the leadership of SMEs can find it difficult to refute the importance of preparing for operations in emergency situations, it is easy for them to postpone the planning and implementation of measures for crisis situations because of everyday problems and limited resources. US Small Business Administration (SBA) estimates that 25 to 40% of small companies disappear after a crisis or a prolonged suspension of operations. Companies, that are not able to resume their operations in 10 days of a disaster, are not likely to survive [6]. According to the same source: 80% that do not recover from a disaster are likely to go out of business within one month 51% of companies close within two years 75% of business without a business continuity plan fail within 3 years of disaster 43% of business never reopened Although the first thought of the SME leadership is the selection of appropriate technology, the first step in data protection should always be the selection of the right people, policies and procedures. The person responsible for data protection, at the very beginning of his work, has to organize a small group that is fully familiar with the technology of business. It is a way to determine the actual needs and possible critical places in the system. 2 DATA PROTECTION STRATEGIES To create comprehensive and effective strategy for data protection is serious job. Data protection is connected with many challenges, with technology, but also with standards and compliances, the changes in way of doing business, up to the every single person which is in touch with sensitive data. There are priorities that should be set. It is necessary to define potential and likelihood points of data endangerment, to focus on situations where interventions are the most expected. It is impossible to remove all risks, but strategies must be good enough to moderate serious risks. They need to prepare individuals to react in crisis situations, and provide them tools that will allow correct decision making. One of the first steps in any of data protection strategies measures for data protection is data backup. The need for backup is cowered also by legislation and privacy laws. The last years appeared a great number of state and local laws and regulations regarding data storage and privacy. Much of this has been driven by identity theft as well as the unintentional posting of sensitive data on the Internet. [7] Backup plan should be clear, specific and easy to follow and should cover all SMEs data protection needs. The data should be backed up on regular intervals, and the frequency of backups depends of the size and nature of business, number of computers and their location, amount of data, but also whether the SME maintain normal or 24/7 business hours. The second part of data protection strategy should cover archive, and, the third, data recovery. 101
4 Finally, strategy should establish a periodic system testing schedule. Many a company has needed to restore data, but only discovered the backup media is corrupted or blank. [7] One of the most important parts of the data protection strategy is a decision about the way of data keeping and processing: In-house data keeping and processing, or Cloud computing. Luckily, there are multiple choices that can lower costs and increase business agility, including server virtualization, internal and external private clouds, and public clouds. [8] In any case, a company must think about storage automation which can deliver the availability, performance and data protection required by users. The automatization can reduce resource requirements, lover provisioning costs and increase service level up to 80%. [9] 2.1 IN-HOUSE DATA KEEPING AND PROCESSING When the budget is defined, it is possible to choose a technology for data storage. It is easy to conclude that not all technologies are equally good for all SMEs. Due to differences in methods of data storage, data access, durability of the medium on which the data are stored, the speed of receipt and delivery of data, prices and other factors (e.g. mode of business operation: one or more locations), appropriate technology should be chosen very carefully. For in-house data keeping and processing, a company can apply own servers, including server virtualization which allow the server administrator to divide one physical server into multiple isolated virtual environments using some software application. Also, a company can use internal private storage clouds that can ensure that information remains safely within the company under the IT department s security parameters while providing the necessary storage capacity across the enterprise. [9] At companies operating in multiple locations, use of magnetic tape backup on the place of use may be the solution if the company has staff trained to wipe and maintain tape, to store them properly, to copy them regularly, and, if necessary, perform system recovery. Hence, it is necessary to ensure proper discipline and appropriate regularity in the work. SMEs face a big dilemma [3]: Tapes as a backup systems are fairly inexpensive and reliable, but offer modest capabilities in terms of DRA and ADL for critical applications. They are mostly ineffective for remote locations. Hardware mirroring, that uses remote copy technology to provide synchronous mirroring between two locations, offers excellent DRA but can be overly expensive solution for SMEs. In addition, this solution is far from ideal for backing up from remote locations that, often, are associated with low-bandwidth connections. Hardware mirroring requires huge data flows between sites. Solutions based on software-based asynchronous replication can be cost effective for SMEs in terms of ADL for critical applications. Thereby, the complexity 102
5 and high cost of synchronous replication are avoided. With software-based replication, only the bits that were changed during data processing are changing. Even data stored in-house, in the own premises are not safe, because there are always the risks. From data theft, eavesdropping and unauthorized copying, up to the theft of physical hard disks. For protection against hackers, there are a number of measures, but the question is whether the SMEs are able to recognize and use them. The reasons are primarily in the SMEs staff potential. Additional risk can appear from possible natural disasters, fires and similar unwanted events. Although the organizations take care about their data, they are mainly focused on external threats. But, there are also internal threats, mainly from permanent staff, former workers and employees in cooperative companies. The staff and especially careless workers are probably the biggest threat. They have daily access to sensitive information and for misuse they often do not need high levels of education. Also, big threats can be caused by former workers, regardless of whether they were dismissed or were changed their job to another (especially in competitive) organization. Subcontracting companies can be a big problem for security systems because they often have access to sensitive data. In the area of personnel management it is necessary to apply all available measures to meet the threat of destruction, damage and stealing information. If not completely eliminated, they should be, at least, reduced to acceptable limits by: the selection of personnel; working adaptation; and for security education and training. Each measure must be carefully analyzed and fully applied. Also, nonetheless, a system of passwords and privileges must be used. 2.2 CLOUD DATA STORRAGE AND PROCESSING According to the Dictionary.com, the term cloud computing represents: Internet-based computing in which large groups of remote servers are networked so as to allow sharing of data-processing tasks, centralized data storage, and online access to computer services or resources. SMEs in recent years increasingly used cloud computing and stored data on servers in the cloud. The main reasons lie in the reduced need for maintenance of data and systems, improved Internet connections and low costs. In addition to these, there are other benefits such as: increased data security with the absence of the need to store data in remote locations, which, because of the risks connected with data storage in one place, until now imposed as an imperative. 35% of SMEs in 2012 signed up to use Cloud Computing Software. [10] But, there are also some security fears that hamper SME's cloud lift-off. SMEs can fear of cloud computing for two important reasons: Security of data transmission over the network, and Data security in place to keep. Although there is always a risk, when use a secure line and encrypted data transfer, a company can consider that the data are secure. When the data are stored on the hard drive in the cloud, data are exposed to possible attacks. Big cloud providers 103
6 are obvious and prominent targets for hackers. For example, in June of 2011, Melbourne based hosting provider Distribute.IT was subject of a targeted attack by an unknown instigator rendering data from four of its servers completely unrecoverable. [10] Even, if that risk is minimized by appropriate measures, the problem of the data safety can appear from the cloud data storage service providers. Assuming that none of the provider's employees will abuse the data access, there remains a risk of external pressures on provider to submit reports of the stored data to the governing structures and intelligence. A paper published in Document Management News [11] states that service providers can store data on someone else's servers, in other countries in which there are other laws in use, and that data owners have no information about it. For example, the European providers can keep data in the U.S. Thanks to the Patriot Act, foreigners are mostly unprotected in the USA because restrictions in law enforcement agencies' gathering of intelligence within the United States are significantly reduced. In his speech posted on YouTube Julian Assange [12] said: There s not a barrier anymore between corporate surveillance, on the one hand, and government surveillance, on the other. 3 CONCLUSIONS - WHAT SME CAN DO TO PROTECT ITSELF? As it was mentioned, SMEs must define their data protection strategies, and decide about the platform for data keeping and processing. In choosing whether to use in-house, cloud or some hybrid solution, SMEs will have to prepare appropriate procedures to educate and train their employees, and fully apply planned measures including regular testing of hardware, software and procedures. In the future, SMEs will generate huge amount of data and for their storage they will use cloud disks. Software resources will be available on Internet in the form of network versions and the most of jobs will be done in the cloud. To prepare themselves SMEs should follow some recommendations in relation to cloud computing that are well described in the OPC Guidance Documents [13]. They have to: Limit access to the information and restrict further uses by the provider; Ensure that the provider has in place appropriate authentication/access controls; Manage encryption; Ensure that there are procedures in place in the event of a personal information breach or security incident; Ensure that there are procedures in place in the event of an outage to ensure business continuity and prevent data loss. Ensure periodic audits are performed; and Have an exit strategy. It is obvious that ICT sector is poised for strong growth of cloud services in the years to come, and SMEs will have the full access to the benefits, risks, and implications for privacy before using a cloud computing solution. 104
7 BIBLIOGRAPHY [1] Mala i srednja preduzeća - Halo pomoć. Žarković, Zorica. [ed.] Predrag Ursić. 33, Beograd : Evropski pokret u Srbiji, May 2001, Evropa Plus, pp [2] Eurostat. Small and medium-sized enterprises. eurostat. [Online] European Commission, 12 14, [Cited: 04 09, 2013.] m-sized_enterprises. [3] Data protection in small and medium sized enterprises. Čekerevac, Z, Andjelić, S and Radović, D. Novi Pazar, Serbia : Interbational University Novi Pazar, PROCEEDINGS of International Conference Smal and Medium Enterprises Possibilities and Perspectives [4] Wilson, Jean. Oracle Universal Records Management - Records Manager DoD Edition User Guide. Oracle documentation. [Online] 10g Release 3 ( ), [Cited: 04 10, 2013.] ser_recordsmanager_10en.pdf. [5] McDermot, Aidan. A small business approach to computer downtime. [Online] 01 11, [Cited: 04 10, 2013.] Small-Business-Approach-To-Computer-Downtime&id= [6] Bolt. Small business & natural disasters - Small business survival guide. Bolt insurance agency. [Online] [Cited: 04 05, 2013.] Natural-disasters-infographic-large2.jpg. [7] Developing an effective data protection strategy. Kherif, Nordine. [ed.] Jill Franklin. Orem, Utah : Carlie Fairchild, 08 24, 2004, Linux journal. [8] Claybrook, Bill. Cloud vs. in-house: Where to run that app? Computerworld. [Online] March 01, [Cited: 03 23, 2013.] o_run_that_app_. [9] Keeping Data In-house: Leveraging the Power of Storage Automation. Rhymes, Brent. Alpharetta, GA : s.n., December 18, 2012, Data CenterJournal. [10] Small an medium sized enterprises data seccurity in cloud computing. Čekerevac, Zoran. Chernivtsi : Bukovinsky Universitet, [11] Reporter, Staff. EU research points SMEs to data protection risks when using overseas cloud computing providers. Document Management News. [Online] [Cited: 02 10, 2013.] [12] Assange, Julian. EXCLUSIVE: Julian Assange on WikiLeaks, Bradley Manning, Cypherpunks, Surveillance State. [interv.] Amy Goodman. EXCLUSIVE: Julian Assange on WikiLeaks, Bradley Manning, Cypherpunks, Surveillance State. London : JouTube, 11 29, Transcript. 105
8 [13] OPC. OPC Guidance Documents: Cloud Computing for Small and Mediumsized Enterprises: Privacy Responsibilities and Considerations. Office of the privacy commissioner of Canada. [Online] 06 14, [Cited: 02 20, 2013.] Článok recenzovali dvaja nezávislí recenzenti. 106
Preparing for the HIPAA Security Rule
A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION
SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION Please Note: 1. THIS IS NOT A ONE-SIZE-FITS-ALL OR A FILL-IN-THE BLANK COMPLIANCE PROGRAM.
MAXIMUM PROTECTION, MINIMUM DOWNTIME
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
10 Hidden IT Risks That Might Threaten Your Law Firm
(Plus 1 Fast Way to Find Them) Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Data Backup Options for SME s
Data Backup Options for SME s As an IT Solutions company, Alchemy are often asked what is the best backup solution? The answer has changed over the years and depends a lot on your situation. We recognize
Beyond Disaster Recovery: Why Your Backup Plan Won t Work
Beyond Disaster Recovery: Why Your Backup Plan Won t Work Contents Introduction... 3 The Data Backup Model - Upgraded for 2015... 4 Why Disaster Recovery Isn t Enough... 5 Business Consequences with DR-Only
Making the leap to the cloud: IS my data private and secure?
Making the leap to the cloud: IS my data private and secure? tax & accounting MAKING THE LEAP TO THE CLOUD: IS MY DATA PRIVATE AND SECURE? Cloud computing: What s in it for me? The more you know about
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
Top Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology
SAFETY FIRST. Emerging Trends in IT Disaster Recovery. By Cindy LaChapelle, Principal Consultant. www.isg-one.com
SAFETY FIRST Emerging Trends in IT Disaster Recovery By Cindy LaChapelle, Principal Consultant www.isg-one.com INTRODUCTION Against a backdrop of increasingly integrated and interdependent global service
Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution
PARTNER BRIEF: IS ONLINE BACKUP RIGHT FOR YOUR BUSINESS?........................................ Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid Who
Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery
Disaster Recovery 1.1 Introduction Every day, there is the chance that some sort of business interruption, crisis, disaster, or emergency will occur. Anything that prevents access to key processes and
Local Government Cyber Security:
Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use
Guidance on data security breach management
ICO lo Guidance on data security breach management Data Protection Act Contents... 1 Data Protection Act... 1 Overview... 1 Containment and recovery... 2 Assessing the risks... 3 Notification of breaches...
Guidance on data security breach management
Guidance on data security breach management Organisations which process personal data must take appropriate measures against unauthorised or unlawful processing and against accidental loss, destruction
Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services
Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Introduction Patient privacy has become a major topic of concern over the past several years. With the majority of
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business. www.cibecs.
CIBECS / IDG Connect 2014 DATA LOSS SURVEY The latest statistics and trends around user data protection for business. REPORT www.cibecs.com 2 Table of ontents EXECUTIVE 01 02 03 04 05 06 SUMMARY WHO PARTICIPATED
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and
KEEPING PATIENT INFORMATION SAFE AND SECURE IN THE CLOUD
CASE STUDY Take Cover The costs of exposing or losing patient information can ruin a dental practice. Cloud-based solutions can protect your business and your patients against these threats: Unauthorized
Planning and Implementing Disaster Recovery for DICOM Medical Images
Planning and Implementing Disaster Recovery for DICOM Medical Images A White Paper for Healthcare Imaging and IT Professionals I. Introduction It s a given - disaster will strike your medical imaging data
White Paper. Eversync. Achieving Increased Backup Availability and Reduced Backup Widows with Disk-To-Disk-To-Disk. Now Part of
White Paper Achieving Increased Backup Availability and Reduced Backup Widows with Disk-To-Disk-To-Disk Eversync Now Part of Eversync Now Part of Infrascale White Paper Achieving Increased Backup Availability
What You Should Know About Cloud- Based Data Backup
What You Should Know About Cloud- Based Data Backup An Executive s Guide to Data Backup and Disaster Recovery Matt Zeman 3Fold IT, LLC PO Box #1350 Grafton, WI 53024 Telephone: (844) 3Fold IT Email: [email protected]
Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster
WHITE PAPER: DON'T WAIT UNTIL IT'S TOO LATE: CHOOSE NEXT-GENERATION................. BACKUP........ TO... PROTECT............ Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
Virtual Infrastructure Security
Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0
ADRI Advice on managing the recordkeeping risks associated with cloud computing ADRI-2010-1-v1.0 Version 1.0 29 July 2010 Advice on managing the recordkeeping risks associated with cloud computing 2 Copyright
HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1
HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
HIPAA Compliance Evaluation Report
Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations
BRING YOUR OWN DEVICE
BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services Page 2 of 8 Introduction Patient privacy has become a major topic of concern over the past several years. With the majority
Managed Services. Who are NCI Technologies? Full support for your IT systems and users, without the hassle or expense of an in-house IT department
Who are NCI Technologies? NCI provide IT solutions and telephone systems to businesses and schools. We strive to be at the forefront of technological developments helping organisations get the most from
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
White Paper: Librestream Security Overview
White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing
1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
Business Continuity Planning in IT
Introduction: Business Continuity Planning in IT The more your business relies on its IT systems, the more you need to consider how unexpected disruptions might affect your business. These disruptions
HIPAA RISK ASSESSMENT
HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation
itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.
Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your
This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan
This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan and execute a strategy to protect 100 percent of your
ICT Disaster Recovery Plan
7 Appendix A ICT Disaster Recovery Plan Definition of a Disaster A computer disaster is the occurrence of any computer system or associated event which causes the interruption of business, leading in the
SafeMail April 2015. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres.
SafeMail April 2015 Secure cloud solutions with guaranteed UK data sovereignty. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres. Detailing the
White Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1
White Paper LIVEVAULT Top 10 Reasons for Using Online Server Backup and Recovery Introduction Backup of vital company information is critical to a company s survival, no matter what size the company. Recent
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider
Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist for As the importance and value of corporate data grows, complex enterprise IT environments need
Stable and Secure Network Infrastructure Benchmarks
Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day
Security and Managed Services
iconnect Cloud Archive System Overview Security and Managed Services iconnect Cloud Archive (formerly known as Merge Honeycomb ) iconnect Cloud Archive offers cloud-based storage for medical images. Images
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:
Company or Trading Name: Address: Post Code: Telephone: E-mail: Website: Date Business Established Number of Employees Do you have a Chief Privacy Officer (or Chief Information Officer) who is assigned
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
What We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs
What We ll Cover Foundations of Records and Information Management Creating a Defensible Retention Schedule Paper v. Electronic Records Organization and Retrieval of Records and Information Records Management
Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:
Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services
LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)
CHARLES LUCE S LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) A. Cloud Computing Defined: n. A loosely defined term for any system providing access
Disaster Recovery for Small Businesses
Technical White Paper Disaster Recovery for Small Businesses A disaster recovery plan helps you understand what data is critical to your business operations and how to best protect it from unexpected failures.
10 Hidden IT Risks That Threaten Your Practice
(Plus 1 Fast Way to Find Them) Your practice depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain
1. What is the most common planned performance duration for a continuity of operations plan (COOP)? A. 30 days B. 60 days C. 90 days D. It depends on the severity of a disaster. 2. What is the business
IT Security Standard: Computing Devices
IT Security Standard: Computing Devices Revision History: Date By Action Pages 09/30/10 ITS Release of New Document Initial Draft Review Frequency: Annually Responsible Office: ITS Responsible Officer:
SIR, IT S QUITE POSSIBLE THIS ASTEROID IS NOT ENTIRELY STABLE
EBOOK For small to medium-sized businesses, Office 365 offers a compelling service where everything is managed and available when it is needed. However, for larger enterprises - where IT groups are used
The Difference Between Disaster Recovery and Business Continuance
The Difference Between Disaster Recovery and Business Continuance In high school geometry we learned that a square is a rectangle, but a rectangle is not a square. The same analogy applies to business
Axcient Data Protection Platform. Axcient Data Protection Platform
Axcient Data Protection Platform Axcient Data Protection Platform 2 Axcient Overview Summary: Axcient provides a complete data protection platform, delivered as a service, for the small to mid-size business
