Appendix F, Section 2 Web-Enabled Data Repository: Test Phase
|
|
|
- Tracy Lee
- 9 years ago
- Views:
Transcription
1 Appendix F, Section 2 Web-Enabled Data Repository: Test Phase Agency: Department of Children, Families and Learning (DCFL) TIS Evaluation Meeting Date: 2 June 1999 State Archives Staff: Mary Klauda, Shawn Rounds DCFL staff: Mark Manning, Theresa Mish, Mary Lillesve, Michael Riecken (Signature Software contractor) Agency Function: To help communities measurably improve the well-being of children through programs that focus on education, community services, prevention, and the preparation of young people for the work environment. Department efforts emphasize achieving positive results for children and their families. Its programs address family breakdown, violence, and poverty. The department strives to make accessible its educational and community resource services and encourages collaboration between state education professionals and social services advocates in order to meet the needs of Minnesota's children and families. System Name: Minnesota Electronic Curriculum Repository (MECR) System Function: The MECR is a quality-controlled database of curriculum materials that supports the implementation of the Minnesota Graduation Standards. The repository contains information on content standards, scoring criteria, large processes and concepts, state model performance packages, assessment tasks, learning activities, and other learning resources. The primary users of the MECR are teachers and other educational professionals (e.g., administrators, curriculum developers, technology specialists, counselors) seeking high-quality curriculum materials to design and deliver instruction for the standards. Other users might include parents, students, policy makers, legislators, and in-service teacher training program staff. Access primarily is web-based and available at: [NOTE: As of 2003, MECR and this URL are no longer active]. System Development Phase: Operational as of 1 June 1999 Appendix F2, Page 1
2 Background: DCFL is responsible for development of the MECR. The system was planned and developed as a way to better implement and disseminate information about the Minnesota Graduation Standards. The MECR also will allow for efficient and timely updates of curriculum guidelines as graduation standards are updated by the Legislature. The MECR is available to school districts via the Internet and CD-ROM. The CD-ROM version includes Java Runtime, a mini web server, an Internet browser, the entire contents of the database, source code, documentation, and executables. There currently are no version-tracking procedures. Software will be updated as the system warrants. Users can create assessment tasks, learning activities, and learning resources based on the MECR once user accounts are established. School districts can change the curriculum to suit individual district goals, but after having done so, districts are responsible for curriculum content and implementation. The system does not support random changes. However, new curriculum information can be submitted for approval and inclusion to the MECR. Prior to the MECR, the official version of state curriculum guidelines existed in paper formats. Most of the data in the MECR is new content. Once the system is operational, the electronic version will be considered the official record. State models and rules that serve as background for the MECR will remain in paper formats; policy documents for the MECR are in both paper and digital formats. The MECR is subject to Minnesota Statutes, Chapter 3501, which established the Graduation Standards. The Data Practices Act (Minnesota Statutes, Chapter 13) does not apply to the system since none of the system data is about individuals. However, since individuals set up user accounts to log on to the system, data practices issues may pertain to the log-on information. This may require further investigation. Records retention requirements for MECR data have not been fully identified. Permanent retention of any graduation standards information has yet to be addressed. Retention may be based on graduation years and/or updates of graduation standards. Plans are in place to have snapshots of the system data for graduation standard years. MECR staff thought it would be a good idea to retain snapshots of the web presentation of the MECR for historical purposes. The system has some capture mechanism, and CD-ROMs may be a viable means for retaining snapshots. During the initial stages of system development, the MECR web pages were hosted by Signature Software. The site will move to DCFL soon after the system is operational. System Documentation: DCFL does not have an agency-wide methodology for all aspects of system documentation. For the MECR, system operating procedures currently are in development. New entries are tracked in a log that records creators, dates of creation, and whether or not the new entries are approved. Design reviews and system tests were performed and documented before the MECR went into Appendix F2, Page 2
3 production. Maintaining audit trails of hardware and software changes may be considered in the future. There is an archive of all software. No one is able to make changes to the system without going through a change-request procedure followed by a review process. DCFL has documentation on the procurement and installation of MECR s hardware. Hardware is self-installed by staff and installation procedures are outlined. There have been no hardware modifications on the MECR to date, although the physical location of the system will be changing and that move will be documented. Future issues of hardware maintenance need to be addressed, specifically issues of cost and staff responsibilities. Documentation exists, or will exist, on the procurement, installation, modification, and maintenance of the system software. DCFL, as an agency, is finalizing a policy about use of agency-authorized hardware and software, and the MECR will be subject to the terms of that policy. The MECR is connected to the communication network infrastructure at DCFL. DCFL documents all network procurement, installation, modifications, and maintenance. The Internet is the only means of external system access to the MECR, and it is the system s main connection with school districts. School districts can choose to install MECR onto their own network systems off CD-ROM through a documented installation procedure. System Documentation Policy and Procedures: System documentation includes conventions and procedures for developing, programming, and testing. Periodic functional tests are performed that are basically self-testing routines for objects before they are plugged into the system; the tests are not documented thoroughly. There is user documentation on applications and associated procedures for entering and accessing data in the MECR. There is database documentation only for the initial raw data entry. There are applications and procedures for internal indexing of the database, but no indexing for external systems data. System output, namely the web user interface, is documented. System documentation includes record formats and codes for the database and procedures for identifying when system records become official. Additions to the MECR must be approved by a review authority and new entries are considered works-in-progress while they are under review. Records become official after review, approval, and publication. This is the only quality-assurance and control-check on system data. There is a mechanism for routine performance of system backups, but documentation on this is not complete. Backups are stored in secure, off-line, off-site storage; there are no integrity tests performed on backups. Storage mediums do not regularly undergo statistical sampling in order to identify data loss and corresponding causes, however MECR staff felt that this was an important consideration for the future. System documentation does not include plans for migration of records to new systems and media. There is an installation guide designed primarily to assist school district systems administrator in installing the MECR on different systems. User documentation and training on the MECR for mid-level administrators is available. Appendix F2, Page 3
4 System Security User Authorization: Information in the MECR is public, and DCFL wants the public to be able to easily access system data. To promote access, there is a generic user account for people who wish to access the MECR, but who do not want to identify themselves. These users have limited read-only access and can print any public data. Some users must be authenticated prior to being given access to certain areas of the system, and identification and access procedures for these people have been established and documented. Although each user has a unique identifier and password, there is no way for DCFL to monitor sharing of identifiers and passwords. User names and user identifiers are unique; passwords are not guaranteed to be unique. There is no means to control the use of access scripts and embedded passwords on the client-side of the system. The system terminates individual user sessions after a certain time period of inactivity. Password rules include a minimum password length, but do not establish expiration dates or a maximum number of log-on attempts. A help desk responds to any security incidents. System security administrators approve access for users. There are no formal procedures in place to ensure that user access corresponds to the level of access necessary to perform job functions. Staff positions have not been reviewed to ensure that they have been assigned appropriate security levels. MECR staff thought that there should be such procedures in the future. Permissions to create, modify, and delete records are granted only to authorized users with proper clearance. Modification of record identifiers is prohibited. Permissions are assigned to user groups rather than individual users. DCFL maintains lists of all current and past authorized users, but lists do not include corresponding privileges and responsibilities. These lists are not reviewed regularly to make adjustments for removal of former employees or clearances for workers with new job duties, but MECR staff felt that some method of review should be implemented. System Security Internal: MECR staff felt that issues of access to all systems documentation need to be addressed by DCFL as an agency. For the MECR, system output and storage devices are in a locked, controlled-access facility. There are controls to ensure security while data is being archived or moved, and procedures have been established for moving system backups to off-site storage. The DCFL information systems office has procedures for, and documentation on, the sanitization and disposal of all agency software and storage media when no longer needed. There are no procedures for sanitization and disposal of obsolete hardware, nor any policies addressing re-use of software, hardware, or storage media. There currently is no online insecurity-detection mechanism, but this issue will be addressed in the future. MECR staff felt that there should be a better process to minimize failure of primary security measures and more timely review of security procedures and rules. Various safeguards maintain the MECR s physical security. Plans are underway to train security administration personnel, ensuring their complete knowledge of MECR s security system. System Security External: There are security measures relating to remote access to the MECR via the Internet; there are no direct telephone connections to the MECR. Non-system records and data are not imported directly into the MECR. Verification of the sender/source, origin, and integrity of non-system Appendix F2, Page 4
5 records takes place through the approval process. After approval, records/data are entered into the system. There currently is no means to detect viruses on non-system records. MECR staff felt that there should be an automatic mechanism to scan the system on a routine basis. Audit Trails: The MECR does not have traditional audit trails. Two forms of access logs are maintained instead: access logs as a function of the web server and internal access logs in the database that includes incoming URL information. Status logs for records in the database are maintained, but they are overwritten so that only the most current status if available. Anyone with access to directories on the server can access the audit data. Ideally, this information should be available only to the database or system administrator. Access logs are backed up on the same schedule as the rest of the system. A system logs and tracks users, noting user identifiers, record identifiers, dates, times, and types of usage. Disaster Recovery: There is no disaster recovery plan, but there is recognition by DCFL information systems staff of the need. Record Data: Data in the MECR is considered an official record only after it has gone through the approval process. Components of a complete or final record depend on the record type. Generally, record components include type and identifier, creator, current status, status date, and record information. MECR data is not considered transactional. Upon approval, the original content, format, and structure are preserved, and each record can be printed or represented as it originally appeared at time of official acceptance. Record data, documents, and metadata are not accessed, displayed, and managed as a unit. MECR staff will need to define a records disposition plan for the MECR, as well as determine who is responsible for authorizing and altering that policy. Record metadata includes unique identifiers, dates of creation, creator and documentation of creator s authorization, date and time of modification (i.e., server date and time), modifier (individual or organization) and documentation of modifier s authorization, and indication of authoritative version. The media type is always the network, the format is always keyed-in internally, and the location of record is always within the database. Appendix F2, Page 5
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
System Requirements for Archiving Electronic Records PROS 99/007 Specification 1. Public Record Office Victoria
System Requirements for Archiving Electronic Records PROS 99/007 Specification 1 Public Record Office Victoria Version 1.0 April 2000 PROS 99/007 Specification 1: System Requirements for Archiving Electronic
How To Use A Court Record Electronically In Idaho
Idaho Judicial Branch Scanning and Imaging Guidelines DRAFT - October 25, 2013 A. Introduction Many of Idaho s courts have considered or implemented the use of digital imaging systems to scan court documents
System Security Plan Template
Institutional and Sector Modernisation Facility ICT Standards System Security Plan Template Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/SSP Template Version: 1.20 Project Funded by the European
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
University of Aberdeen Information Security Policy
University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...
M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General
M E M O R A N D U M To: From: IT Steering Committee Brian Cohen Date: March 26, 2009 Subject: Revised Information Technology Security Procedures The following is a revised version of the Information Technology
IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM Note: Before you use this
Draft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
2.2 INFORMATION SERVICES Documentation of computer services, computer system management, and computer network management.
3 Audit Trail Files Data generated during the creation of a master file or database, used to validate a master file or database during a processing cycle. GS 14020 Retain for 3 backup cycles Computer Run
Mike Casey Director of IT
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
Records Management Policy
Records Management Policy Responsible Officer Chief Operating Officer Approved by Vice-Chancellor Approved and commenced April, 2014 Review by April, 2017 Relevant Legislation, Ordinance, Rule and/or Governance
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
9. GOVERNANCE. Policy 9.8 RECORDS MANAGEMENT POLICY. Version 4
9. GOVERNANCE Policy 9.8 RECORDS MANAGEMENT POLICY Version 4 9. GOVERNANCE 9.8 RECORDS MANAGEMENT POLICY OBJECTIVES: To establish the framework for, and accountabilities of, Lithgow City Council s Records
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
PRIVACY IMPACT ASSESSMENT
Name of System/Application: LAN/WAN PRIVACY IMPACT ASSESSMENT U. S. Small Business Administration LAN/WAN FY 2011 Program Office: Office of the Chief Information Officer A. CONTACT INFORMATION 1) Who is
This policy is not designed to use systems backup for the following purposes:
Number: AC IT POL 003 Subject: Backup and Restore Policy 1. PURPOSE The backup and restore policy establishes the need and rules for performing periodic system backup to permit timely restoration of Africa
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
Agilent MicroLab Software with Spectroscopy Configuration Manager and Spectroscopy Database Administrator (SCM/SDA)
Agilent MicroLab Software with Spectroscopy Configuration Manager and Spectroscopy Database Administrator (SCM/SDA) Compliance with 21 CFR Part 11 Introduction Part 11 in Title 21 of the Code of Federal
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
UNIVERSITY OF MANITOBA PROCEDURE
UNIVERSITY OF MANITOBA PROCEDURE Procedure: Parent Policy: Effective Date: June 23, 2015 Revised Date: Review Date: June 23, 2025 Approving Body: Authority: Responsible Executive Officer: Delegate: Contact:
Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice
Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help
CCG: IG06: Records Management Policy and Strategy
Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of
Department of Homeland Security Web Portals
for the Department of Homeland Security Web Portals June 15, 2009 Contact Point Mary Ellen Callahan Chief Privacy Officer Department of Homeland Security (703) 235-0780 Page 2 Abstract Many Department
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
RECORDS MANAGEMENT POLICY
[Type text] RECORDS MANAGEMENT POLICY POLICY TITLE Academic Year: 2013/14 onwards Target Audience: Governing Body All Staff and Students Stakeholders Final approval by: CMT - 1 October 2014 Governing Body
REGULATIONS COMPLIANCE ASSESSMENT
ALIX is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation. REGULATIONS COMPLIANCE ASSESSMENT BUSINESS
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
Presentation Topics. What is a record? Hawaii State Archives Presentation December 14, 2010 ABC S OF RECORDS MANAGEMENT ACHIEVING BASIC CONTROL
ABC S OF RECORDS MANAGEMENT ACHIEVING BASIC CONTROL Presented by: Adam Jansen [email protected] December 2010 Presentation Topics What is a Record What is Records Management Your Responsibilities Conducting
Administrative Office of the Courts
Page 1 Administrative Office of the Courts GLENN A. GRANT, J.A.D. Acting Administrative Director of the Courts www.njcourts.com phone: 609-984-0275 fax: 609-984-6968 To: From: Hon. Carmen Messano Assignment
Union County. Electronic Records and Document Imaging Policy
Union County Electronic Records and Document Imaging Policy Adopted by the Union County Board of Commissioners December 2, 2013 1 Table of Contents 1. Purpose... 3 2. Responsible Parties... 3 3. Availability
GENERAL RECORDS SCHEDULE 3.1: General Technology Management Records
GENERAL RECORDS SCHEDULE 3.1: General Technology Management Records This schedule covers records created and maintained by Federal agencies related to the general management of technology. It includes
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
User Name: [insert facility name]grids (for example, lomitagrids or villagrids)
Appendix A010 Page 1 User Name: [insert facility name]grids (for example, lomitagrids or villagrids) Password: If access is authorized and currently have no password, contact Director of Nurses or Rehab
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Managed Hosting & Datacentre PCI DSS v2.0 Obligations
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
SECTION 15 INFORMATION TECHNOLOGY
SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County
Empower TM 2 Software
Empower TM 2 Software 21 CFR PART 11 COMPLIANCE ASSESSMENT Revision A, December, 2005 1 of 14 Waters Corporation Note: Information presented in this document assumes that the appropriate Empower 2 System
American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2
American International Group, Inc. DNS Practice Statement for the AIG Zone Version 0.2 1 Table of contents 1 INTRODUCTION... 6 1.1 Overview...6 1.2 Document Name and Identification...6 1.3 Community and
Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system.
21 CRF 11 Electronic Records and Signatures Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system. By Todd Duell What does Title 21 of the Code of Federal
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls
Information System Audit Arkansas Administrative Statewide Information System (AASIS) General Controls ARKANSAS DIVISION OF LEGISLATIVE AUDIT April 12, 2002 April 12, 2002 Members of the Legislative Joint
Electronic Records Management in the City of Philadelphia
Electronic Records Management in the City of Philadelphia I. Introduction II. Issues for Managing Electronic Records III. Records Management Officer's Responsibilities IV. Electronic Records Management
VIRGINIA STATE UNIVERSITY RISK ANALYSIS SURVEY INFORMATION TECHNOLOGY
ASSESSABLE UNIT: ENTER THE NAME OF YOUR ASSESSABLE UNIT HERE BUSINESS PROCESS: ENTER YOUR BUSINESS PROCESS HERE BANNER INDEX CODE: ENTER YOUR BANNER INDEX CODE HERE Risk: If you monitor the activity and
A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
PHASE 9: OPERATIONS AND MAINTENANCE PHASE
PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.
U. S. Department of Energy Consolidated Audit Program Checklist 5 Laboratory Information Management Systems Electronic Data Management
U. S. Department of Energy Consolidated Audit Program Checklist 5 Laboratory Information Management Systems Electronic Data Management Revision 4.0 February 2014 Use of this DOECAP checklist is authorized
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
Information Systems Access Policy
Information Systems Access Policy I. PURPOSE The purpose of this policy is to maintain an adequate level of security to protect data and information systems from unauthorized access. This
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
21 CFR Part 11 Electronic Records & Signatures
Gap Analysis - Checklist 21 CFR Part 11 Electronic Records & Signatures his document is a proposal and starting point only. he type and extent of documentation depends on the process environment. he proposed
UMHLABUYALINGANA MUNICIPALITY
UMHLABUYALINGANA MUNICIPALITY BACKUP AND RESTORE POLICY Backup and Restore Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator Recommended by Director of
SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Input and Output of ISM-Benchmark
Information Security Measures Benchmark (ISM-Benchmark) Ms. Yasuko Kanno, Chief Advisor, IT Security Center, Information-technology Promotion Agency (IPA) Japan Abstract This paper presents introduction
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
Full Compliance Contents
Full Compliance for and EU Annex 11 With the regulation support of Contents 1. Introduction 2 2. The regulations 2 3. FDA 3 Subpart B Electronic records 3 Subpart C Electronic Signatures 9 4. EU GMP Annex
Paladin Computers Privacy Policy Last Updated on April 26, 2006
Paladin Computers Privacy Policy Last Updated on April 26, 2006 At Paladin Computers ( Service Provider ), we respect our Users and Clients right to privacy with regards to the use of their email and our
CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS
11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Validating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
DELAWARE PUBLIC ARCHIVES POLICY STATEMENT AND GUIDELINES MODEL GUIDELINES FOR ELECTRONIC RECORDS
DELAWARE PUBLIC ARCHIVES POLICY STATEMENT AND GUIDELINES MODEL GUIDELINES FOR ELECTRONIC RECORDS STATEMENT OF PURPOSE The Delaware Public Archives (DPA) has issued "Model Guidelines for Electronic Records"
3.11 System Administration
3.11 The functional area is intended to contribute to the overall flexibility, efficiency, and security required for operating and maintaining the system. Depending on the architecture of the system, system
Recordkeeping for Good Governance Toolkit. GUIDELINE 14: Digital Recordkeeping Choosing the Best Strategy
Recordkeeping for Good Governance Toolkit GUIDELINE 14: Digital Recordkeeping Choosing the Best Strategy i The original version of this guideline was prepared by the Pacific Regional Branch of the International
Guidance for Industry Computerized Systems Used in Clinical Investigations
Guidance for Industry Computerized Systems Used in Clinical Investigations U.S. Department of Health and Human Services Food and Drug Administration (FDA) Office of the Commissioner (OC) May 2007 Guidance
WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0
WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
State Records Office Guideline. Management of Digital Records
State Records Office Guideline Management of Digital Records An Information Management Guideline for State Organizations Version 2 January 2015 www.sro.wa.gov.au Contents GLOSSARY... 2 PURPOSE... 5 BACKGROUND...
Digital Records Preservation Procedure No.: 6701 PR2
Digital Records Preservation Procedure No.: 6701 PR2 Policy Reference: Category: Department Responsible: Current Approved Date: 6700 Records Management Information Management Records Management and Privacy
Mapping the Technical Dependencies of Information Assets
Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Chapter 8: Security Measures Test your knowledge
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
