Media Disposition and Sanitation Procedure
|
|
|
- Janel Hamilton
- 9 years ago
- Views:
Transcription
1 Media Disposition and Sanitation Procedure
2 Revision History Version Date Editor Nature of Change /14/06 Kelly Matt Initial Release
3 Table of Contents 1.0 Overview Purpose Scope NIST Guidelines Information Protection and Media Disposition Primary Media Types... 1 Hard Copy:... 1 Electronic (or soft copy): Sanitization Sanitization Methods Sanitization Guidelines Enforcement Related Policies, Procedures, and Codes of Conduct.... 8
4 1.0 Overview Media disposition is a key element in assuring data confidentiality. Confidentiality is the ability to restrict access to information based on the value of the information. This includes protecting personally identifiable information. In order to provide appropriate controls on the information we are responsible for safeguarding, we must properly dispose of media in all forms. 2.0 Purpose This document aids in establishing clear guidelines for media disposition and sanitation. 3.0 Scope This Procedure applies to employees, contractors, consultants, temporary employees, and other workers at UNC including all personnel affiliated with third parties. 4.0 NIST Guidelines This procedure has been adapted for the University of Northern Colorado from the National Institute of Standards and Technology (NIST) Special Publication Guidelines for Media Sanitization. The information and recommendations made in this document have drawn heavily on the guidelines set forth by the NIST special publication. This adaptation has been developed for internal use. The express intent of this document is to provide a simplified and tailored approach to manage and implement the NIST guideline within UNC. 5.0 Information Protection and Media Disposition In order for UNC to have appropriate controls on the information it is responsible for safeguarding, it must properly safeguard the media used. An often rich source of illicit information collection is through dumpster diving for improperly disposed hard copy media or through reconstruction of data on media not sanitized in an appropriate manner. Media flows in and out of an organizations control through recycle bins in paper form, out to vendors for equipment repairs, and hot swapped into other systems in response to emergencies. This potential vulnerability can be mitigated through proper understanding of where information is located, what that information is and how to protect it. 5.1 Primary Media Types Hard Copy: Hard copy media is physical representations of information. Paper printouts, printer, and facsimile ribbons, drums, and platens are all examples of hard copy media. These types of media are often the most uncontrolled. Information tossed into the recycle bins and trash containers exposes a significant vulnerability to dumpster divers, and overcurious employees, risking accidental disclosures. Electronic (or soft copy): Electronic media are the bits and bytes contained in hard drives, USB removable media, disks, memory devices, phones, mobile computing devices, networking equipment, and many other types listed in section 6.2. Media will continue to advance and evolve over time. The processes described in this document should guide media sanitization decision making regardless of the type of media in use. Page 1
5 6.0 Sanitization Several different methods can be used to sanitize media. Four of the most common are presented in this section. Individuals should assess the media to be disposed of and determine the future plans for the media. Then, using information in the tables below, decide on the appropriate method for sanitization. To facilitate secure disposition of electronic media UNC Information Technology provides a secure drop service in the basement of Carter Hall at the operator s window. Individuals can bring digital media to this area and for secure disposal. 6.1 Sanitization Methods Sanitization Methods Method Disposal Clear Purge Description Disposal is the act of discarding media with no other sanitization considerations. This is most often done by paper recycling containing non-confidential information but may also include other media. One method to sanitize media is to use software or hardware products to overwrite storage space on the media with non-sensitive data. This process may include not only the logical storage location of a file(s) (e.g., file allocation table) but also may include all addressable locations. The security goal of the process is to replace written data with random data. Overwriting cannot be used for media that are damaged or not rewriteable. The media type and size may also influence whether is a suitable sanitization method. Two approved software tools are Secure Erase which can be download from the University of California, San Diego (UCSD) CMRR site or Eraser/DBAN a freeware tool that is readily available on the Internet. Degaussing and executing the firmware Secure Erase command (for ATA drives only) are acceptable methods for purging. Degaussing is exposing the magnetic media to a strong magnetic field in order to disrupt the recorded magnetic domains. A degausser is a device that generates a magnetic field used to sanitize magnetic media. Degaussing can be an effective method for purging damaged or inoperative media, for purging media with exceptionally large storage capacities, or for quickly purging diskettes. Destroy There are many different types, techniques, and procedures for media destruction. Disintegration or Pulverization. These sanitization methods are designed to completely destroy the media. Shredding. Paper shredders can be used to destroy flexible media such as diskettes once the media are physically removed from their outer containers. The shred size of the refuse should be small enough that there is reasonable assurance in proportion to the data confidentiality that the data cannot be reconstructed. Optical mass storage media, including compact disks (CD, CD-RW, CD-R, CD-ROM), optical disks (DVD), and MO disks, must be destroyed by pulverizing or crosscut shredding. Page 2
6 6.2 Sanitization Guidelines The following table can be used to determine recommended sanitization of specific media. This recommendation should reflect the security categorization of the media to reduce the impact of harm of unauthorized disclosure of information from the media. Not all types of available media are specified in this table. If your media is not included in this guide, you should identify and use processes that will fulfill the intent to clear, purge, or destroy your media. Media Sanitization Decision Matrix Media Type Clear Purge Physical Destruction Hard Copy Storages Paper and microforms See Physical Destruction. See Physical Destruction. Destroy paper using cross cut shredders or pulverize. Destroy microforms (microfilm, microfiche, or other reduced image photo negatives) cross cut shredders or pulverize. Hand-Held Devices Cell Phones Manually delete all information, such as calls made, phone numbers, then perform a full manufacturer s reset to reset the cell phone back to its factory default settings. Contact the manufacturer for proper sanitization procedure. Personal Digital Assistant (PDA) (Palm, PocketPC, other) Manually delete all information, then perform a manufacturer s hard reset to reset the PDA to factory state. Contact the manufacturer for proper sanitization procedure. Networking Devices Page 3
7 Routers (home, home office, enterprise) Perform a full manufacturer s reset to reset the router back to its factory default settings. Contact the manufacturer for proper sanitization procedure. Equipment Copy Machines Perform a full manufacturer s reset to reset the copy machine to its factory default settings. Contact the manufacturer for proper sanitization procedure. Fax Machines Perform a full manufacturer s reset to reset the fax machine to its factory default settings. Contact the manufacturer for proper sanitization procedures. Magnetic Disks Floppies approved software and validate the overwritten data. Degauss ATA Hard Drives 1. Purge using Secure Erase. The Secure Erase software can be download from the University of California, San Diego (UCSD) CMRR site. 2. Purge hard disk drives by either purging the hard disk drive in an automatic degausser or by disassembling the hard disk drive and purging the enclosed platters with a degaussing wand. Degaussing any current generation hard disk will render the drive permanently unusable. Page 4
8 USB Removable Media (Pen Drives, Thumb Drives, Flash Drives, Memory Sticks) with Hard Drives 1. Purge using Secure Erase The Secure Erase software can be download from the University of California, San Diego (UCSD) CMRR site or Eraser. 2. Purge hard disk drives by either purging the hard disk drive in an approved automatic degausser or by disassembling the hard disk drive and purging the enclosed platters with an approved degaussing wand. Degaussing any current generation hard disk will render the drive permanently unusable.. Zip Disks Degauss using an approved degausser. Degaussing any current generation zip disks will render the disk permanently unusable. SCSI Drives Purge hard disk drives by either purging the hard disk drive in an approved automatic degausser or by disassembling the hard disk drive and purging the enclosed platters with an approved degaussing wand. Degaussing any current generation hard disk will render the drive permanently unusable. Page 5
9 Magnetic Tapes Reel and Cassette Format Magnetic Tapes Clear magnetic tapes by either re-recording () or degaussing. Clearing a magnetic tape by re-recording () may be impractical for most applications since the process occupies the tape transport for excessive time periods. Purging by Degaussing: Purge the magnetic tape in any degausser that can purge the signal enough to prohibit playback of the previous known signal. Clearing by Overwriting: Overwriting should be performed on a system similar to the one that originally recorded the data. All portions of the magnetic tape should be overwritten one time with known non-sensitive signals. Optical Disks CDs See Physical Destruction. See Physical Destruction. Destroy in order of recommendations: Removing the Information bearing layers of CD media using a commercial optical disk grinding device. Use optical disk media shredders or disintegrator devices. DVDs See Physical Destruction. See Physical Destruction. Destroy in order of recommendations: Removing the Information bearing layers of DVD media using a commercial optical disk grinding device. Use optical disk media shredders or disintegrator devices to reduce DVD into particles. Memory Compact Flash Drives, SD See Physical Destruction. Destroy media in order of recommendations. Dynamic Random Access Memory (DRAM) Purge DRAM by powering off and removing the battery (if battery backed). Page 6
10 Electronically Alterable PROM (EAPROM) Perform a full chip purge as per manufacturer s data sheets. Shred Disintegrate Pulverize Electronically Erasable PROM (EEPROM) Incinerate by burning in a licensed incinerator. Erasable Programmable ROM (EPROM) Clear media in order of recommendations. 1. Clear functioning EPROM by performing an ultraviolet purge according to the manufacturer's recommendations Incinerate by burning in a licensed incinerator. 2. Flash Cards agency Flash EPROM (FEPROM) Perform a full chip purge as per manufacturer s data sheets. Purge media in order of recommendations Perform a full chip purge as per manufacturer s data sheets. Incinerate by burning in a licensed incinerator. PC Cards or Personal Computer Memory Card International Association (PCMCIA) Cards See Physical Destruction. See Physical Destruction. Destroy by incinerating in a licensed incinerator or use a disintegrator to reduce the card's internal circuit board and components to particles. RAM Purge functioning DRAM by powering off and removing the battery (if battery backed). Page 7
11 ROM See Physical Destruction. See Physical Destruction. USB Removable Media (Pen Drives, Thumb Drives, Flash Drives, Memory Sticks) without Hard Drives technologies/methods/tools Smart Cards See Physical Destruction. See Physical Destruction. For smart card devices& data storage tokens or cards packaged into tokens (i.e. SIM chips, thumb drives and other physically robust plastic packages cut or crush the smart card's internal memory chip using metals snips, a pair of scissors, or a strip cut shredder. Smart that are not capable of being shredded should instead be destroyed via incineration licensed incinerator or disintegration. 7.0 Enforcement Any person found in violation of Federal, State law or University policy, regulation or procedures is subject to loss of privileges, disciplinary action, personal liability and /or criminal prosecution. The University may block access to or remove a network connection that is endangering computing and or network resources or that is being used for inappropriate or illegal use. Information Technology will work with the Dean of Students, the UNC Police the academic deans and directors and others to enforce this policy. 8.0 Related Policies, Procedures, and Codes of Conduct. All applicable laws and University policies, regulations and procedures bind UNC students and employees. UNC Acceptable User Regulation Sensitive and Protected Data Management Page 8
Guidelines for Media Sanitization
NIST Special Publication 800-88 Guidelines for Media Sanitization Recommendations of the National Institute of Standards and Technology Richard Kissel Matthew Scholl Steven Skolochenko Xing Li C O M P
NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12. Issue Date: 15 December 2014 Revised:
NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12 Issue Date: 15 December 2014 Revised: NSA/CSS STORAGE DEVICE SANITIZATION MANUAL PURPOSE AND SCOPE This manual provides guidance
Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization
TECHNICAL REFERENCE DOCUMENT Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization Recommendations Key Points: of the National Real world compliance
Payment Card Industry (PCI) Policy Manual. Network and Computer Services
Payment Card Industry (PCI) Policy Manual Network and Computer Services Forward This policy manual outlines acceptable use Black Hills State University (BHSU) or University herein, Information Technology
Destruction and Disposal of Sensitive Data
Destruction and Disposal of Sensitive Data Good Practice Guidelines Version: 3.0 Date: March 2015 1 Copyright 2015, Health and Social Care Information Centre. Contents 1. Introduction 3 1.2 Aims and Objectives
Tech Application Chapter 3 STUDY GUIDE
Name: Class: Date: Tech Application Chapter 3 STUDY GUIDE Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. 1. This type of device retains data
MEDIA SANITIZATION MANUAL
MANUAL DOE M 205.1-6 Approved: Admin Chg 1: 9-1-09 Admin Chg 2: 12-22-09 MEDIA SANITIZATION MANUAL U.S. DEPARTMENT OF ENERGY Office of the Chief Information Officer AVAILABLE ONLINE AT: www.directives.doe.gov
Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?
Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers
Information Technology Services Guidelines
Page 1 of 10 Table of Contents 1 Purpose... 2 2 Entities Affected by These Guidelines... 2 3 Definitions... 3 4 Guidelines... 5 4.1 Electronic Sanitization and Destruction... 5 4.2 When is Sanitization
Chapter 8 Memory Units
Chapter 8 Memory Units Contents: I. Introduction Basic units of Measurement II. RAM,ROM,PROM,EPROM Storage versus Memory III. Auxiliary Storage Devices-Magnetic Tape, Hard Disk, Floppy Disk IV.Optical
الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات
- البحرين الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات Agenda The problem Traditional Methods Case Study Recommendation The problem What
University of Wisconsin-Madison Policy and Procedure
Page 1 of 6 I. Policy UW-Madison strives to ensure the privacy and security of all patient/clients protected health information in the maintenance, retention, and eventual destruction/disposal of such
Get rid of it Securely to keep it Private
Get rid of it Securely to keep it Private Best Practices for the Secure Destruction of Personal Health Information Information and Privacy Commissioner, National Association for Information Destruction,
Chapter 7 Types of Storage. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 7 Types of Storage Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Differentiate between storage devices and storage media Describe the characteristics
CITY UNIVERSITY OF HONG KONG. Information Classification and
CITY UNIVERSITY OF HONG KONG Handling Standard (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification
Types Of Storage Device
Types Of Storage Device by AA A POG D EE SRM U Outline Categorizing Storage Devices Magnetic Storage Devices Optical Storage Devices Categorizing Storage Devices Storage devices hold data, even when the
Discovering Computers 2008. Chapter 7 Storage
Discovering Computers 2008 Chapter 7 Storage Chapter 7 Objectives Differentiate between storage devices and storage media Describe the characteristics of magnetic disks Describe the characteristics of
CSCA0201 FUNDAMENTALS OF COMPUTING. Chapter 5 Storage Devices
CSCA0201 FUNDAMENTALS OF COMPUTING Chapter 5 Storage Devices 1 1. Computer Data Storage 2. Types of Storage 3. Storage Device Features 4. Other Examples of Storage Device 2 Storage Devices A storage device
Approved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition
APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,
Guidelines for Media Sanitization
NIST Special Publication 800-88 Revision 1 Richard Kissel Andrew Regenscheid Matthew Scholl Kevin Stine This publication is available free of charge from: http://dx.doi.org/10.6028/nist.sp.800-88r1 C O
Student Guide. [email protected]
Short: Disposal and Destruction of Classified Information Objective POC Estimated completion time Identify the who, what, when, why, and how concerning disposal and destruction of classified information
McGraw-Hill Technology Education McGraw-Hill Technology Education
McGraw-Hill Technology Education McGraw-Hill Technology Education Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
Lexmark Printers and Multifunction Products: Hard Disk and Non-Volatile Memory Guide
Lexmark Printers and Multifunction Products: Hard Disk and Non-Volatile Memory Guide This guide applies to the following Lexmark devices: Printers C780 C782 C935 T640 T642 T644 Multifunction Products X646
Office Equipment Disposal Policy
Office Equipment Disposal Policy R ISK MANAGEMENT HANDOUTS OF L AWYERS MUTUAL LAWYERS MUTUAL LIABILITY INSURANCE COMPANY OF NORTH CAROLINA 5020 Weston Parkway, Suite 200, Cary, North Carolina 27513 Post
HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as
HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as required by HIPAA. 1. Definitions. a. Business Associate, as used in this Contract, means the
UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY
DOC. T99-061 Passed by the BoT 8/4/99 UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY The President of the University shall adopt guidelines to require that each campus
PCI Data Security and Classification Standards Summary
PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers
Guidance on Personal Data Erasure and Anonymisation 1
Guidance on Personal Data Erasure and Anonymisation Introduction Data users engaged in the collection, holding, processing or use of personal data must carefully consider how to erase such personal data
LSE PCI-DSS Cardholder Data Environments Information Security Policy
LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project
NCTE Advice Sheet Storage and Backup Advice Sheet 7
Storage and Backup No matter how well you treat your system, no matter how much care you take, you cannot guarantee that your data will be safe if it exists in only one place. The risks are much greater
How To Store Data On A Computer (For A Computer)
TH3. Data storage http://www.bbc.co.uk/schools/gcsebitesize/ict/ A computer uses two types of storage. A main store consisting of ROM and RAM, and backing stores which can be internal, eg hard disk, or
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Writing Assignment #2 due Today (5:00pm) - Post on your CSC101 webpage - Ask if you have questions! Lab #2 Today. Quiz #1 Tomorrow (Lectures 1-7)
Overview of Computer Science CSC 101 Summer 2011 Main Memory vs. Auxiliary Storage Lecture 7 July 14, 2011 Announcements Writing Assignment #2 due Today (5:00pm) - Post on your CSC101 webpage - Ask if
HP FutureSmart Firmware Device Hard Disk Security
HP FutureSmart Firmware Device Hard Disk Security Summary: This document discusses hard disk security for HP FutureSmart Firmware printing devices. Contents: Overview... 2 Secure Erase Commands... 2 1.
Computers. Hardware. The Central Processing Unit (CPU) CMPT 125: Lecture 1: Understanding the Computer
Computers CMPT 125: Lecture 1: Understanding the Computer Tamara Smyth, [email protected] School of Computing Science, Simon Fraser University January 3, 2009 A computer performs 2 basic functions: 1.
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
Information Security Plan effective March 1, 2010
Information Security Plan effective March 1, 2010 Section Coverage pages I. Objective 1 II. Purpose 1 III. Action Plans 1 IV. Action Steps 1-5 Internal threats 3 External threats 3-4 Addenda A. Document
Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)
Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates
Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates Introduction and Summary Secure erase SE is defined in the ATA specification
Chapter 8. Secondary Storage. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 8 Secondary Storage McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Distinguish between primary and secondary storage Describe
ECONOMY 10-15 WORKING DAYS STANDARD 3-8 WORKING DAYS
TecLeo DATARECOVERYLAB H ELPING Y OU LO O K AFTER YO U R DATA V.A.T. REG. NO. 4410173209 20 Uitzicht Office Park, 5 Bellingham Street, Centurion, 0157 DATA RECOVERY Data Recovery & Data Destruction Price
UNCLASSIFIED. This page intentionally left blank. UNCLASSIFIED. Clearing And Declassifying Electronic Data Storage Devices (ITSG-06) ii July 2006
This page intentionally left blank. ii July 2006 Foreword The Clearing and Declassifying Electronic Data Storage Devices (ITSG-06) is an publication, issued under the authority of the Chief, Communications
STANDARD 3-8 WORKING DAYS
TecLeo DATARECOVERYLAB HELPING Y OU LO O K AFTER YO U R DATA V.A.T. REG. NO. 4410173209 20 Uitzicht Office Park, 5 Bellingham Street, Centurion, 0157 Price List DATA RECOVERY Deloud (Pty) Ltd Data Recovery
With respect to the way of data access we can classify memories as:
Memory Classification With respect to the way of data access we can classify memories as: - random access memories (RAM), - sequentially accessible memory (SAM), - direct access memory (DAM), - contents
Parts of a Computer. Preparation. Objectives. Standards. Materials. 1 1999 Micron Technology Foundation, Inc. All Rights Reserved
Parts of a Computer Preparation Grade Level: 4-9 Group Size: 20-30 Time: 75-90 Minutes Presenters: 1-3 Objectives This lesson will enable students to: Identify parts of a computer Categorize parts of a
Order. Directive Number: IM 10-3. Stephen E. Barber Chief Management Officer
Pension Benefit Guaranty Corporation Order Subject: Protecting Sensitive Information Directive Number: IM 10-3 Effective Date: 4/23/08 Originator: OGC Stephen E. Barber Chief Management Officer 1. PURPOSE:
Handout 17. by Dr Sheikh Sharif Iqbal. Memory Unit and Read Only Memories
Handout 17 by Dr Sheikh Sharif Iqbal Memory Unit and Read Only Memories Objective: - To discuss different types of memories used in 80x86 systems for storing digital information. - To learn the electronic
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Excerpt of Cyber Security Policy/Standard S05-001. Information Security Standards
Excerpt of Cyber Security Policy/Standard S05-001 Information Security Standards Issue Date: April 4, 2005 Publication Date: April 4, 2005 Revision Date: March 30, 2007 William F. Pelgrin Director New
Today we will learn about:
Storage Devices Today we will learn about: Storage Devices Ancient technology (from my days as a student) Floppies CD_ROM, DVDs Hard drives Magnetic tape Storage versus Memory Memory holds data, programs
HIPAA Training for Hospice Staff and Volunteers
HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you
That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.
Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20
HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Price/performance Modern Memory Hierarchy
Lecture 21: Storage Administration Take QUIZ 15 over P&H 6.1-4, 6.8-9 before 11:59pm today Project: Cache Simulator, Due April 29, 2010 NEW OFFICE HOUR TIME: Tuesday 1-2, McKinley Last Time Exam discussion
State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number:
State of Vermont Digital Media and Hardware Disposal Standard Date: Approved by: Policy Number: 1.0 INTRODUCTION... 3 1.1 Authority... 3 1.2 Scope and Purpose:... 3 2.0 STANDARD... 3 2.1 Preface... 3 2.2
Primary Memory. Input Units CPU (Central Processing Unit)
Basic Concepts of Computer Hardware Primary Memory Input Units CPU (Central Processing Unit) Output Units This model of the typical digital computer is often called the von Neuman compute Programs and
Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1.
Page 1 Walton Centre Asset Management Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 06/01/2004 1.1 L Wyatt Addition of storage media 16/03/2005 1.2 Liam Wyatt Update storage
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder
TEST CHAPTERS 1 & 2 OPERATING SYSTEMS
TEST CHAPTERS 1 & 2 OPERATING SYSTEMS True/False Indicate whether the statement is true or false. 1. Changes that you make in virtual machines do not affect your physical computer. 2. The size of a bus
CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global
CSCA0102 IT & Business Applications Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global Chapter 2 Data Storage Concepts System Unit The system unit
Information Destruction Solutions
Information Destruction Solutions Products Guide PAPER SHREDDERS HARD DRIVE DEGAUSSERS HARD DRIVE DESTROYERS OPTICAL MEDIA DESTROYERS MIXED MEDIA DESTROYERS SECURE WASTE CONTAINERS Paper Shredders While
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 1 Introducing Hardware Objectives Learn that a computer requires both hardware and software to work Learn about the many different hardware components
Computer Basics: Chapters 1 & 2
Computer Basics: Chapters 1 & 2 Definition of a Computer What does IPOS stand for? Input Process Output Storage Other types of Computers Name some examples of other types of computers, other than a typical
SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION
SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION Please Note: 1. THIS IS NOT A ONE-SIZE-FITS-ALL OR A FILL-IN-THE BLANK COMPLIANCE PROGRAM.
Module 1 Introduction to Information and Communication Technologies
Module 1 Introduction to Information and Communication Technologies Lesson 3 What are the Hardware Components of a Computer? UNESCO EIPICT Module 1. Lesson 3 1 Rationale The hardware components are the
Best Practices for Responsible Disposal of Tape Media
Best Practices for Responsible Disposal of Tape Media The Environmental and Economic Benefits of Recycling vs. Destruction White Paper The Data Media Source San Jose, CA Data Media Source 2006 For use
PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING
PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING PURPOSE The purpose of this policy is to describe the procedures by which Workforce members of UCLA Health System and David Geffen School of Medicine
CHAPTER 3: HARDWARE BASICS: PERIPHERALS
CHAPTER 3: HARDWARE BASICS: PERIPHERALS Multiple Choice: 1. is the early operating system developed by Microsoft A. Monitor B. MS-DOS C. Mouse D. Video games Answer: B Reference: Bill Gates Rides the Digital
Information Technology Acceptable Usage Policy
Information Technology Acceptable Usage Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly
Credit Card Processing and Security Policy
Credit Card Processing and Security Policy Policy Number: Reserved for future use Responsible Official: Vice President of Administration and Finance Responsible Office: Student Account Services Effective
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
Remote Working and Portable Devices Policy
Remote Working and Portable Devices Policy Policy ID IG04 Version: V1 Date ratified by Governing Body 29/09/13 Author South Commissioning Support Unit Date issued: 21/10/13 Last review date: N/A Next review
MOBILE DEVICE SECURITY POLICY
State of Illinois Department of Central Management Services MOBILE DEVICE SECURITY Effective: October 01, 2009 State of Illinois Department of Central Management Services Bureau of Communication and Computer
Angard Acceptable Use Policy
Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants
Computer Components Study Guide. The Case or System Box
Computer Components Study Guide In this lesson, we will briefly explore the basics of identifying the parts and components inside of a computer. This lesson is used to introduce the students to the inside
Tomorrow s Technology and You
Tomorrow s Technology and You 8 th Edition Slide 1 Tomorrow s Technology and You 8/e Hardware Basics: Peripherals Slide 2 Objectives List several examples of input devices and explain how they can make
Main Memory & Backing Store. Main memory backing storage devices
Main Memory & Backing Store Main memory backing storage devices 1 Introduction computers store programs & data in two different ways: nmain memory ntemporarily stores programs & data that are being processed
RETENTION OF UNIVERSITY RECORDS
RETENTION OF UNIVERSITY RECORDS Policy Statement Northwestern University and various federal and state laws require that different types of records be retained for specific periods of time. The University
