Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.
|
|
|
- Doris May
- 9 years ago
- Views:
Transcription
1 Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR Knowledge Inc. 1
2 I. PLAN OBJECTIVE The objective of this comprehensive written information security plan ("Plan"), is to create effective administrative, technical and physical safeguards by HR Knowledge, Inc. ("Company"), located in Mansfield, MA for the protection of personally identifiable information ( PII ) of residents of the Commonwealth of Massachusetts, and to comply with obligations under 201 CMR Standards for The Protection of Personal Information of Residents of the Commonwealth, as well as any other federal, state and international regulations and standards. This plan is reviewed periodically and amended as necessary to protect personal information. This Plan sets forth Company procedure for evaluating electronic and physical methods of accessing, collecting, storing, using, transmitting, and protecting personal information of residents of the Commonwealth of Massachusetts. For purposes of this Plan, personal information means a Massachusetts resident's first name and last name or first initial and last name in combination with any one or more of the following data elements that relate to such resident: (a) Social Security number; (b) driver's license number or state-issued identification card number; or (c) financial account number, or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to a resident s financial account; provided, however, that personal information shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public. II. PURPOSE The purpose of this Plan is, to the extent possible, to: A. Ensure the security and confidentiality of personal information collected by and in the possession of the Company. B. Protect against potential threats or hazards to the security or integrity of such information. C. Protect against unauthorized access to or use of such information in a manner that creates a substantial risk of identity theft or fraud. III. SCOPE OF PLAN In formulating and implementing the Plan, the Company will take reasonable steps to: A. Identify reasonably foreseeable internal and external threats to the security, confidentiality, and/or integrity of any electronic, paper or other records containing personal information. B. Assess the likelihood and potential damage of these threats, taking into consideration the sensitivity of the personal information. C. Evaluate the sufficiency of existing policies, procedures, Written Information Security Policy (WISP) for HR Knowledge Inc. 2
3 customer information systems, and other safeguards in place to control risks. D. Consider and implement measures to minimize those risks, consistent with the requirements of 201 CMR 17. E. Regularly monitor the effectiveness of those safeguards. IV. DATA SECURITY COORDINATOR In compliance with 201 CMR 17, the Company has designated Gary Cowan as the Data Security Coordinator to implement, supervise and maintain the Plan. The Data Security Coordinator will be responsible for the following: a. Implementation of the Plan. b. Verifying training of employees. c. Monitoring and testing of employee compliance with the Plan s policies and procedures. d. Evaluating the ability of any third-party service provider to protect the personal information to which the Company has permitted it access; and taking necessary and reasonable steps to ensure that such third party service provider applies protective security measures at least as stringent as those required to be applied to such information under 201 CMR e. R e v i e w i n g the scope of the security measures in the Plan at least annually, or whenever there is a material change in the Company s business practices that may implicate the security or integrity of records containing personal information. f. Conducting an annual training session for all owners, managers and employees, including temporary and contract employees who have access to personal information on the elements of the Plan. All attendees at such training sessions are required to certify their attendance at the training, and their familiarity with the firm s requirements for ensuring the protection of personal information. V. INTERNAL RISKS To combat internal risks to the security, confidentiality, and/or integrity of any electronic, paper or other records containing personal information, and evaluating and improving, where necessary, the effectiveness of the current safeguards for limiting such risks the Company has implemented the following mandatory policies and procedures: A. The Company maintains that personal information or other sensitive information will be kept in filing Written Information Security Policy (WISP) for HR Knowledge Inc. 3
4 cabinets, servers, desktop PCs and specific laptop computers to be identified by the Company. Physical safeguards will include lock and key; logical safeguards will include perimeter firewalls and data encryption. B. The Company will provide regular network security reviews in which all server and computer system logs are evaluated for any possible electronic security breach. These reviews will be performed at least every thirty (30) days. Additionally, all employees will be trained to watch for any possible physical security breach, such as unauthorized personnel accessing file cabinets or computer systems. C. A copy of this Plan will be distributed to each employee who shall, upon its receipt, acknowledge in writing that he/she has received the copy. D. A version of this plan will be made available on the company Web site or upon request to those who have a legitimate need to verify the Company s legal compliance. E. The Data Security Coordinator or his authorized representative will immediately train all existing employees on the detailed provisions of the Plan. All employees will be subject to periodic reviews by the Data Security Coordinator to ensure compliance. F. All employees are responsible for maintaining the privacy and integrity of the Company s PII. Any paper record containing PII must be kept behind lock and key when not in use. Any computer file stored on the company network which contains personal information will be kept password-protected and/or encrypted. G. No personal information will be disclosed without authenticating the receiving party or without securing written authorization from the individual whose personal information is contained in such disclosure. H. Employees are prohibited from keeping open files containing personal information on their desks when they are not at their desks. I. At the end of the work day, all files and other records containing personal information must be secured by employees in a manner that is consistent with the Plan s rules for protecting the security of personal information. J. Visitors access is restricted to a single entry point for each building in which personal information is stored, and visitors shall be required to present a photo ID, sign-in and/or wear a plainly visible GUEST badge or tag. Alternatively, visitors must be accompanied by an escort within any area of the company. K. When disposing of paper records containing personal information, a cross-cut shredder or outside shredding service will be used. Similar appropriate electronic methods will be used for disposing of electronic media. Written Information Security Policy (WISP) for HR Knowledge Inc. 4
5 L. The amount of personal information collected as well as access to records containing personal information shall be limited to those persons who are reasonably required to know such information in order to accomplish a legitimate business purpose or to enable us to comply with other state or federal regulations. M. The Company will take all possible measures to ensure that employees are trained to keep all paper and electronic records containing personal information securely on- premises at all times. When there is a need to bring records containing personal information off-site, only the minimum information necessary will be brought. Electronic records will be encrypted; paper records will be kept behind lock and key. Records brought off-site should be returned to the Company office as soon as possible. N. Under no circumstances are documents, electronic devices, or digital media containing any personal information to be left unattended in an employee s car, home, or in any other potentially insecure location. O. Any employee who willfully discloses personal information or fails to comply with these policies will face immediate disciplinary action that includes a written warning plus other actions up to and including termination of employment. P. Any terminated employees computer access passwords will be disabled before or at the time of the termination process. Physical access to any documents or resources containing personal information will also be immediately discontinued. Such terminated employee shall be required to surrender all keys, IDs or access codes or badges, business cards, and the like, that permit access to the firm s premises or information. Moreover, such terminated employee s remote electronic access to personal information will be disabled; his/her voic access, access, Internet access, and passwords will be invalidated. The Data Security Coordinator and/or his designee shall maintain a highly secured master list of all lock combinations, passwords and keys. Q. The Company periodically shares personal information in the form of employment records, pension and insurance information, and other information required to be a responsible employer. The Company may share this personal information with the state and federal tax authorities, a bookkeeping service, a payroll service, a CPA firm, legal counsel, and/or business advisors. An IT support company may occasionally see personal information in the course of service. Access to personal information by these third-party organizations will be kept to the minimum required to conduct business. Any third party service provider that does require access to information must be compliant with 201 CMR 17. The Company requires each of these organizations to provide a letter annually, signed by their CEO or other authorized individual, stating that they follow a written information security plan (WISP) that fully complies with 201 CMR 17. The only exception is the state and federal tax authorities, which we assume are compliant, since they must comply with laws that are stricter than 201 CMR 17. R. The Company is committed to collecting only the minimum amount of personal information Written Information Security Policy (WISP) for HR Knowledge Inc. 5
6 necessary for its business operations; old information is also disposed of securely after no more than seven years or after whatever period is required by federal and state data retention requirements. S. The Data Security Coordinator has identified and documented the locations where personal information is stored on the Company network. i. Servers ii. Filing Cabinets iii. Desktop PC Workstations iv. Laptop Computers v. Online (Web-based) applications vi. Database Applications, such as Intuit QuickBooks T. Laptop hard disks and USB-based storage media are encrypted using software such as Microsoft BitLocker. U. The Company stores backups on hard disks and at an offsite data center using strong encryption techniques provided by the manufacturer of the backup software. V. The Data Security Coordinator or his designee will monitor and review access, security and handling of personal information by employees. Company offices and filing cabinets containing PII are kept locked third-parties are not allowed physical access to data or records. Paper files that are not currently in use are kept in locked filing cabinets. In addition, electronic records are kept in databases and on servers which are behind multiple layers of electronic security. W. The Data Security Coordinator or his approved representative will regularly monitor and assess all of the Company s information safeguards to determine when upgrades may be necessary. X. If there is an incident that requires notification under the provisions of 201 CMR 17, there shall be a mandatory post-incident review by the Data Security Coordinator of events and actions taken, if any, with a view to determining whether any changes in operations are required to improve the security of personal information for which Company is responsible. Records of this will be kept on file with our Written Information Security Plan. VI. EXTERNAL RISKS To combat external risks to the security, confidentiality, and/or integrity of any electronic, paper or other records containing personal information, and evaluating and improving, where necessary, the effectiveness of the current safeguards for limiting such risks, the Company has implemented the following mandatory policies and procedures. A. The Company shall implement and maintain secure authentication protocols to gain access to network that include: Written Information Security Policy (WISP) for HR Knowledge Inc. 6
7 a. Protocols for control of user IDs and other identifiers. b. A secure method of assigning and selecting passwords, or use of unique identifier technologies, such as biometrics or token devices. c. Unique strong passwords are required for all user accounts. d. Control of passwords to ensure that such passwords are kept in a location and/or format that does not compromise the security of the data they protect. e. Restriction of access to active users only. f. Blocking of logon access after multiple, unsuccessful attempts to gain access to a resource. B. The Company shall implement and maintain secure access control measures that include: a. Only employees that need access to the personal information are given access to the storage locations containing such information. b. Each person shall have a unique password to the computer network, which may be changed at will by the individual without disclosure of such password to any other individual. c. User passwords will be subject to an enforced password policy. C. Company policy is that PII will not be ed in plain-text over an unsecured medium such as the Internet unless the message is sent using an encryption method such as TLS or if the specific PII is encrypted using an alternative method. D. The Company makes wireless access available to its users. All wireless access points are configured to use strong encryption. The company does not provide open (guest) access on its corporate network and will not support WEP. E. The Data Security Coordinator or his representative performs a network security review at least every thirty (30) days in order to detect possible threats or breaches in network security. F. Information regarding audits, audit trails and other secure information will be restricted to the Data Security Coordinator and other authorized personnel as designated by the President or owner of the Company. G. The Company uses at least a third-generation, business-class firewall between the Internet and the private network. This firewall is secured and maintained by the Company s IT provider. H. Operating system patches and security updates are installed at least every thirty (30) days to all Company servers. Written Information Security Policy (WISP) for HR Knowledge Inc. 7
8 I. The Company enforces the use of a software-based firewall on all workstations. The Company will configure firewall exceptions if/when needed based on the business requirements. J. The company supports only Web browsers that have built-in antiphishing techniques. K. The Company provides remote access using mechanisms that encrypt not only the traffic between the client and server, but also the authentication requests (ID and password). L. The Company conducts a thorough security review of any computer that it adds to the network, patching it with the latest updates and then providing the user with his/her logon ID and password. M. The Company or a certified, third-party organization erases the hard disk of any computer that the Company intends to permanently remove from the network. If a hard drive is unable to be erased because it is broken, the Company or third-party will destroy its electrical leads and dispose of it in the trash, or send it to a disk destruction facility. N. The Company runs licensed antivirus software which is kept updated on all servers and workstations. Virus definition updates are installed on a regular basis, and the entire system is tested at least once per month. O. All employees are responsible for maintaining the privacy and integrity of the Company s PII. All employees have been trained that any paper record containing personal information must be kept behind lock and key when not in use. Any computer file containing personal information will be encrypted if it needs to be transmitted or moved off the corporate network. The Data Security Coordinator trains all new employees on this policy, and there are also periodic reviews for existing employees. VII. NOTIFICATION OF SECURITY BREACH If the Company s Data Security Coordinator determines that personal information has been stolen or lost, s/he will notify the Office of Consumer Affairs & Business Regulation (OCABR) and the Attorney General's office, describing the theft or loss in detail, and work with authorities to investigate the issue and to protect the victims identity and credit. To the extent possible, the Data Security Coordinator will also notify the victims of the theft so that they can protect their credit and identity. Written Information Security Policy (WISP) for HR Knowledge Inc. 8
9 VIII. IMPLEMENTATION Effective this date January 1, 2014 _, HR Knowledge Inc. has developed and implemented this written information security plan (WISP) in compliance with Massachusetts Regulation 201 CMR 17. Jeffrey Garr January 1, 2014 Date Title CEO Written Information Security Policy (WISP) for HR Knowledge Inc. 9
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00
Client Advisory October 2009 Data Security Law MGL Chapter 93H and 201 CMR 17.00 For a discussion of these and other issues, please visit the update on our website at /law. To receive mailings via email,
Wellesley College Written Information Security Program
Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP
Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)
Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) May 15, 2009 LLP US Information Security Framework Historically industry-specific HIPAA Fair Credit Reporting
M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General
M E M O R A N D U M To: From: IT Steering Committee Brian Cohen Date: March 26, 2009 Subject: Revised Information Technology Security Procedures The following is a revised version of the Information Technology
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
Massachusetts Identity Theft/ Data Security Regulations
Massachusetts Identity Theft/ Data Security Regulations Effective March 1, 2010 Are You Ready? SPECIAL REPORT All We Do Is Work. Workplace Law. In four time zones and 45 major locations coast to coast.
MFA Perspective. 201 CMR 17.00: The Massachusetts Privacy Law. Compliance is Mandatory... Be Thorough but Be Practical
MFA Perspective 201 CMR 17.00: The Massachusetts Privacy Law Compliance is Mandatory... Be Thorough but Be Practical DEADLINE FOR FULL COMPLIANCE HAS BEEN EXTENDED FROM JANUARY 1, 2010 TO MARCH 1, 2010
PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs
PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs The Identity Theft and Fraud Protection Act (Act No. 190) allows for the collection, use
Subject: U.S. Department of Housing and Urban Development (HUD) Privacy Protection Guidance for Third Parties
U.S. Department of Housing and Urban Development Office of Public and Indian Housing SPECIAL ATTENTION OF: NOTICE PIH-2014-10 Directors of HUD Regional and Field Offices of Public Housing; Issued: April
IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS. Boston, MA 02110 Richmond, Virginia 23219 Tel. (617) 502.8238 Tel. (804) 783.7579
IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS Daniel J. Blake, Esq. Vijay K. Mago, Esq. LeClairRyan, A Professional Corporation LeClairRyan, A Professional Corporation One International Place, Eleventh Floor
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
Identity Theft Prevention Program Compliance Model
September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
Information Security Plan effective March 1, 2010
Information Security Plan effective March 1, 2010 Section Coverage pages I. Objective 1 II. Purpose 1 III. Action Plans 1 IV. Action Steps 1-5 Internal threats 3 External threats 3-4 Addenda A. Document
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
6-8065 Payment Card Industry Compliance
0 0 0 Yosemite Community College District Policies and Administrative Procedures No. -0 Policy -0 Payment Card Industry Compliance Yosemite Community College District will comply with the Payment Card
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)
Small Business IT Risk Assessment
Small Business IT Risk Assessment Company name: Completed by: Date: Where Do I Begin? A risk assessment is an important step in protecting your customers, employees, and your business, and well as complying
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
Cyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
Identity Theft Prevention Program. Effective: November 1, 2009
Identity Theft Prevention Program Effective: November 1, 2009 I. BACKGROUND Galveston College ("College" / Institution ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal
FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY
FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY Authority: Category: Applies to: Chancellor, Fayetteville State University University-wide Faculty, Staff, and Students History: Approved on
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
LSE PCI-DSS Cardholder Data Environments Information Security Policy
LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
Hang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation
IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009
IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009 Table of Contents Introduction to the Training Module.. i I. Introduction. 1 II. Definitions. 3 III. Recognizing Identity Theft.. 6 IV. Identifying
ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA
ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA PURPOSE PURPOSE This document provides guidance to offices about protecting sensitive customer and company information. The protection of Non-public Personal
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific
Best Practices for Protecting Sensitive Data in an Oracle Applications Environment. Presented by: Jeffrey T. Hare, CPA CISA CIA
Best Practices for Protecting Sensitive Data in an Oracle Applications Environment Presented by: Jeffrey T. Hare, CPA CISA CIA Webinar Logistics Hide and unhide the Webinar control panel by clicking on
PII Compliance Guidelines
Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last
FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY
FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY Page 1 of 6 Summary The Payment Card Industry Data Security Standard (PCI DSS), a set of comprehensive requirements for enhancing payment account
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
HIPAA 101: Privacy and Security Basics
HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
HIPAA Training for Hospice Staff and Volunteers
HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you
The Massachusetts Data Security Law and Regulations
The Massachusetts Data Security Law and Regulations November 2, 2009 Boston Brussels Chicago Düsseldorf Houston London Los Angeles Miami Milan Munich New York Orange County Rome San Diego Silicon Valley
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Physical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008
Travis County Water Control & Improvement District No. 17 Identity Theft Prevention Program Effective beginning November 20, 2008 I. PROGRAM ADOPTION The Travis County Water Control and Improvement District
PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data
PCI Training for Retail Jamboree Staff Volunteers Securing Cardholder Data Securing Cardholder Data Introduction This PowerPoint presentation is designed to educate Retail Jamboree Staff volunteers on
PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING
PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING PURPOSE The purpose of this policy is to describe the procedures by which Workforce members of UCLA Health System and David Geffen School of Medicine
Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY
Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Employee Teleworking Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Introduction... 2 2. Teleworking Risks... 3 3. Safeguards for College
Valdosta Technical College. Information Security Plan
Valdosta Technical College Information Security 4.4.2 VTC Information Security Description: The Gramm-Leach-Bliley Act requires financial institutions as defined by the Federal Trade Commision to protect
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Payment Cardholder Data Handling Procedures (required to accept any credit card payments)
Payment Cardholder Data Handling Procedures (required to accept any credit card payments) Introduction: The Procedures that follow will allow the University to be in compliance with the Payment Card Industry
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
The New York Consumer Protection Board s Business Privacy Guide:
The New York Consumer Protection Board s Business Privacy Guide: How to Handle Personal Identifiable Information and Limit the Prospects of Identity Theft New York State Consumer Protection Board Advocating
