Defense Security Service (DSS)
|
|
|
- Katherine Watson
- 9 years ago
- Views:
Transcription
1 Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) ADMINISTRATIVE INQUIRY (AI) PROCESS JOB AID July 2011
2 TABLE OF CONTENTS 1. INTRODUCTION Scope PRELIMINARY INQUIRY AND INITIAL REPORT Security Violations Conducting Preliminary Inquiry Initial Report Timeline for Initial Report Requirements for Initial Report FINAL REPORT Timeline for Final Report Requirements for Final Report Authority Essential Facts Corrective Actions Conclusions Determination of Culpability SPECIAL CONSIDERATIONS FOR INVESTIGATIONS INVOLVING INFORMATION SYSTEMS Additional Procedures for Investigations Additional Information for Final Report...9 APPENDIX A: ACRONYMS, ABBREVIATIONS, AND DEFINITIONS... A-1 APPENDIX B: FINAL REPORT TEMPLATE... B-1 Page i
3 1. INTRODUCTION 1.1 Scope The purpose of this document is to provide instructions for conducting an Administrative Inquiry (AI). Included in this reference are the guidelines for conducting investigations and submitting the initial and final reports. The procedures defined in this document are applicable to all personnel tasked with industrial security for programs requiring access to classified materials, systems, and information. These personnel include, but are not limited to, the Facility Security Officer (FSO), Information Systems Security Manager (ISSM), Department of Defense (DoD) Industrial Security Specialists, and other applicable security personnel. Page 1
4 2. PRELIMINARY INQUIRY AND INITIAL REPORT 2.1 Security Violations The DoD M National Industrial Security Program Operating Manual (NISPOM), defines a security violation as a failure to comply with the policy and procedures established by the NISPOM that reasonably could result in the loss or compromise of classified information. Security violations involving classified information must be appropriately investigated. An investigation, or AI, is necessary to determine whether the classified information was at risk of compromise, the individual(s) responsible for the violation, and whether appropriate corrective actions have been implemented to preclude a recurrence. Refer to DoD M NISPOM for additional information. 2.2 Conducting Preliminary Inquiry When a security violation occurs, the FSO is responsible for conducting the preliminary inquiry. The purpose of the preliminary inquiry is to secure the classified information, quickly gather all the facts, and determine if the classified information was subject to loss, compromise, or suspected compromise. 2.3 Initial Report Upon completion of the preliminary inquiry, the FSO must determine if the security violation warrants further investigation. If the preliminary inquiry indicated a possible loss, compromise, or suspected compromise, the FSO must document the findings in an initial report and provide notification to the Cognizant Security Agency (CSA)/DSS field office. If the facility is located on a Government installation, the initial report must be submitted concurrently to the Commander or Head of the host installation. Under certain circumstances, the DSS Industrial Security Representative may conduct the follow-on administrative inquiry based on the reported facts in the preliminary report. If the preliminary inquiry indicated that there is no loss, compromise, or suspected compromise of classified information, the FSO shall finalize the report and maintain a copy. This report will be reviewed by DSS during the next Industrial Security Inspection Timeline for Initial Report Submission of the initial report must adhere to the following guidelines: Top Secret: within 24-hours (1-day) Secret/Confidential: within 72-hours (3-days) 2.4 Requirements for Initial Report The initial report should include the following information: The nature of the security violation. Include a description of the circumstances surrounding the violation, the relevant sections of the NISPOM that were violated, who was involved, and when and where the violation occurred. Include the level and type of personnel clearance of the individuals involved in the occurrence. How the violation was discovered? Who reported the security violation? To who was the violation reported? When was the violation reported? Include if the violation was reported immediately upon discover. If not, include why there was a delay in the report. Identify all involved classified information. Include a listing of all materials with the following: Page 2
5 Unclassified Title Form Originator Prime Contract Number Procurement Activity (Procuring Contracting Officer (PCO)/Administrative Contracting Officer (ACO)), include Point of Contact (POC) information. Contracting Officer s Technical Representative (COTR), include POC information. Facility name and CAGE code, if information received from a Prime/Subcontracting organization. Level of Classification Special Access category, as applicable Identify the Government Contracting Activity (GCA) with cognizance over the classified information. Include GCA POC information with the following: Name Title Address Telephone Number Address NOTE: Depending on circumstances surrounding the security violation, it is possible that the initial report may be classified. Refer to ISL , Article #5 or contact your DSS Industrial Security Representative (IS Rep) for additional information. Page 3
6 3. FINAL REPORT Upon completion of the administrative inquiry or investigation, the FSO must submit a final report regarding the identified security violation. A template is provided for the final report in Appendix B. (Final Report Template) of this document. The following subsections follow the organization of this template. Refer to DoD M NISPOM, Section 1-303, C for additional information. 3.1 Timeline for Final Report Submission of the final report must adhere to the following guidelines: Top Secret/Secret/Confidential: within 15-days of discovery 3.2 Requirements for Final Report The final report presents a summary of the administrative inquiry and includes information used to arrive at a specific determination (loss, compromise, suspected compromise). This report must include specific reasons for reaching a determination. Per NISPOM requirements, the only determinations that are applicable are loss, compromise, or suspected compromise. The final report must include this formal determination along with specific supporting documentation that aligns to the definitions below. Loss: A loss involves classified information that is or was outside the custodian s control and the classified information cannot be located or its disposition cannot be determined. NOTE: Classified information sent via unencrypted communication is considered a loss. Compromise: A compromise is a confirmed disclosure of specifically identifiable classified information to specified unauthorized individuals(s). Suspected Compromise: A suspected compromise occurs whenever identifiable classified information has been made available to unauthorized individual(s) who may have gained access to the information. Providing that there was unauthorized access to the information may be difficult, but the facts in cases of Suspected Compromise would lead a reasonable person to conclude that unauthorized access, more that likely, occurred. No Loss, Compromise, or Suspected Compromise The final report should also include the essential facts surrounding the violation, the corrective actions taken to safeguard the classified information, the disciplinary actions taken against the culpable individual(s) involved in the security violation, and any culpability notifications that were sent to the Defense Industrial Security Clearance Office (DISCO). Conclusions and recommendations for follow-up actions should also be addressed in the final report. Refer to Section 2.4 Initial Report of this document for additional information Authority This heading provides the reason why the inquiry was conducted, when and where the inquiry was conducted, and identifies who conducted the inquiry Essential Facts The final report should include a description of the circumstances surrounding the violation, the relevant sections of the NISPOM that were violated, who was involved, and when and where the violation occurred. Also, the report should provide the level and type of personnel clearance of the individuals involved in the occurrence. When was the violation reported? Include who discovered the violation, who reported the violation, and to whom it was reported. Include if the violation was reported immediately upon discover. If not, include why there was a delay in the report. Page 4
7 Description of unauthorized access. How was the access achieved, and by whom? Was the information distributed? If so, to whom and how? Identify specific NISPOM provisions violated. Identify all involved classified information. Include a listing of all materials with the following: Unclassified Title Type of Material Originator Prime Contract Number Procurement Activity (PCO)/ACO), include POC information. COTR, include POC information. Facility name and CAGE code, if information received from a Prime/Subcontracting organization. Level of Classification Special Access category, as applicable Corrective Actions The final report should include a summary of the corrective actions taken by the facility. This should include any disciplinary actions taken against the culpable individual(s) involved in the security violation, and specifically, the corrective actions initiated or taken by the facility to secure the information after the violation was discovered. Included in this summary should be a description of the graduated scale of disciplinary actions, as established by the organization, and how it was applied to this event. Refer to DoD M NISPOM, Sections for additional information. The summary of corrective actions should include the following information: Reaction to security violation. Include a description of all actions taken/initiated by the organization in reaction to the security violation. Include time and date, responsible personnel, and future actions planned. Have all required follow-up actions been taken? If yes, include description, time and date, responsible personnel, and plans for continuing action. If no, provide the outstanding action and reasons they remain pending. Notification of all involved facilities and personnel. If applicable, provide date, POC information for notification, and summary of required actions identified as a result of security violation. Provisions for additional security training. Provide a summary of all additional security training to be provided to personnel, including schedule, title, description, and impacted personnel. Description of graduated scale of disciplinary actions. Include brief summary of graduated scale with the following: Page 5
8 Application of these corrective actions to each individual involved in the violation implementation of corrective actions. Has the GCA been notified of the security violation? If yes, identify the Individual who notified the GCA If no, identify the reasons why notification was not made Has the classification level of the material been confirmed by the GCA? Conclusions If yes, identify who made the determination. If no, identify what attempts have been made to obtain classification guidance from the GCA. The FSO must provide a formal determination for each security violation as previously identified (loss, compromise, suspected compromise) NOTE: If the FSO concludes from the preliminary inquiry that no loss, compromise, or suspected compromise of classified information occurred, the FSO must finalize the report, document the conclusion, and retain the report for the next DSS Industrial Security Inspection. Exceptions to this requirement can be found in NISPOM Chapter 10, International Security Requirements, paragraphs , , and Vulnerability of classified information. Include a description of when the vulnerability began, duration, and under what circumstances the information was vulnerable to unauthorized disclosure. Description of unauthorized access. If the information was accessed by unauthorized individuals, include a description of how the access was achieved, and provide, as completely as possible, identification data regarding the unauthorized individual(s). NOTE: If the unauthorized access involved use of an Information System (IS), either accredited or non-accredited, refer to Section 4. Special Considerations for Investigations Involving Information Systems of this document. Description of GCA Classification Review. As applicable, include a description of the GCA classification review of the information with the following: Was a GCA classification review conducted? If the information was declassified or downgraded, include date of determination, name and POC information of individual who made determination, and GCA notification of declassification. If the information was downgraded, include new level of classification. If the information cannot be declassified or downgraded, include measures, if known, that have been initiated/taken to protect against threat to national security Determination of Culpability The determination of culpability summarizes the procedures followed to investigate the individual(s) involved in the security violation. The FSO should interview the relevant co-workers and management of the involved individual(s), to determine if there were any indicators of intent for security violations, or concerns regarding the individual s ability to protect classified information. When appropriate, investigations may also include a search of the individual(s) workspace and any applicable accesses to computer systems, such as , shared drives, and cellular communications. Page 6
9 Refer to Section 4. Special Considerations for Investigations Involving Information Systems of this document. The Culpability Report should address the following information: Does the violation meet the criteria of NISPOM 1-304? The violation and individual(s) involved should be evaluated against the following questions. Did the violation involve a deliberate disregard for established security requirements? Did the violation involve gross negligence in the handling of classified information? Was the violation deliberate in nature? If the violation was not deliberate, does the individual(s) exhibit a pattern of negligence and/or carelessness in the handling of classified information? NOTE: If the individual(s) involved in the security violation meet the criteria, as stated above, a report must be sent to the DISCO via the Joint Personnel Adjudication System (JPAS), following coordination with the IS Rep. The individual(s) involved in the violation. Include the following: Name(s) Title/Position Social Security Number Date of Birth Place of Birth Level of Classification Special Access Permissions, as applicable Description of individual actions. Include a summary of how each involved individual acted with regards to the violation with the following: Was the employee aware of violation of security guidelines and policies? What was the intent of acting in a manner that violated security guidelines and policies? Identify all classified programs to which the individual(s) had access. Did any of the programs and/or systems accessed by the individual(s) have foreign involvement? Previous history of foreign travel, in both business and personal capacities. Associations with foreign visitors, in both business and personal capacities. Awareness of NISPOM and associated security guidelines, policies, and provisions. Include a summary of the individual(s) perceived knowledge and comprehension of NISPOM and associated provisions with the following: Was the employee aware of the violation of security guidelines and policies? What security briefings, training and/or certifications has the employee received related to security of classified information? Include dates, title, description, and issuing authority of identified security briefings, training and certifications. Has DISCO been notified? Page 7
10 4. SPECIAL CONSIDERATIONS FOR INVESTIGATIONS INVOLVING INFORMATION SYSTEMS An Emergency Response Team and Emergency Action Plan should be established to mitigate violations occurring within organizational and non-accredited information systems IS. The following recommendations should be addressed in the plan: Stopping all processes. This should be completed with limited interruption and impact to other Users of the system(s). This may include erasing/wiping of files, folders, and drives, and should encompass all applications and media with access to the associated system(s). Quarantine location for classified information. Identify quarantine location for storage of information involved in security violation during investigation and classification review. Event Log(s) and Back-up Databases. Identify location and retrieval methods for IS Event Log(s) and back-up databases for evaluation, and restore of any records, files, and/or applications. The Event Log also provides additional evidence to be included in the Final Report. Identify Subject Matter Experts (SMEs) and Security POCs. Include POC information for all personnel with authority to mitigate IS security violations. Establish standard reporting vehicles for documentation of security violation. Include the following: Description of security violation. Include date of violation, duration, under what circumstances the information was vulnerable to unauthorized access, and all possible impacted IS. Description of unauthorized access. If the information was accessed by unauthorized individual(s), include a description of how the access was achieved, and provide, as completely as possible, identification data regarding the unauthorized individual(s). Notification of all involved facilities and personnel. Include facility, POC information, and method of notification. 4.1 Additional Procedures for Investigations When conducting investigations for security violations involving IS, whether accredited or nonaccredited, the designated security personnel should follow the same processes as defined in Section 2. Preliminary Inquiry and Initial Report and Section 3. Final Report of this document. Additionally, the designated security personnel should include the following: Interview associated SMEs, information technology (IT) specialists, ISSM, and Information Systems Security (INFOSEC) personnel to document impact and extent of vulnerability to IS. Establish standard protocols for interviewing individual(s) involved in violation, with recommendations from IT security professionals and SMEs for specific lines of questioning, including the following: What was the nature of the information placed on the system? How was the information accessed and/or distributed? If distributed, to whom and how? Where was the file stored on the IS? Was the information transferred to another storage media? If transferred, what is the current location and status of that media? Was a hard-copy output of the information created? Page 8
11 If so, where was it accomplished? Include current location and status of any associated record/tape/ribbon used to create hard-copy output. 4.2 Additional Information for Final Report When submitting the final report to the IS Rep for security violations involving IS, whether accredited or non-accredited, the designated security personnel should follow the same guidance as defined in Section 3. Final Inquiry of this document. Additionally, the FSO should summarize all actions taken/initiated to mitigate the impact of the security violation, including the following: Current location of classified information. Identify location of quarantined classified information, including Back-Up/Event Log data. NOTE: Contractors are reminded that when classified information is transmitted or disseminated as unclassified, notification of the actual classification to recipients who are cleared for access to the material is, at a minimum, CONFIDENTIAL. When control of the material has been lost, or if unauthorized personnel have had access to the information, such as when the recipient is not cleared for access, the matter is to be reported to your DSS Field Office as a report of compromise. Regardless of whether the recipient is a cleared or uncleared contractor/individual, if the transmission occurred by an unsecure means (e.g., unsecure fax, Internet, unclassified server, etc.), the control of the material is deemed lost. Refer to ISL , Article #5 for additional information. Description of networked systems. Identify the network configuration of the impacted IS. Include the following: Other systems with which the IS interacts. Additional networked locations for exterior storage. Operating System(s), applications, and associated hardware/software accessing/interacting with the IS, including remote access point(s) and Virtual Private Network(s) (VPN). Configuration and process for back-up database/record storage, including back-up schedule and location. Page 9
12 APPENDIX A: ACRONYMS, ABBREVIATIONS, AND DEFINITIONS Acronym/ Abbreviation Definition ACO AI CDSE COTR CSA DISCO DoD DSS FSO GCA INFOSEC IS IS Rep ISSM IT JPAS NISPOM PCO POC SME VPN Administrative Contracting Officer Administrative Inquiry Center for Development of Security Excellence Contracting Officer s Technical Representative Cognizant Security Agency Defense Industrial Security Clearance Office Department of Defense Defense Security Service Facility Security Officer Government Contracting Activity Information Systems Security Information System Industrial Security Representative Information Systems Security Manager Information Technology Joint Personnel Adjudication System National Industrial Security Program Operating Manual Procuring Contracting Officer Point of Contact Subject Matter Expert Virtual Private Network Page A-1
13 DATE: SUBJECT [Line]: Facility Information Name: Address: CAGE Code: FCL Level: Level of Facility Safeguarding: Special Considerations: APPENDIX B: FINAL REPORT TEMPLATE 1. AUTHORITY: Provide authority under which conducting the inquiry, the reason for the inquiry, when and where it was conducted, and who conducted the inquiry. 2. ESSENTIAL FACTS: Provide description of the circumstances surrounding the violation, the relevant sections of the NISPOM that were violated, who was involved, and when and where the violation occurred. Include the level and type of personnel clearance of the individuals involved in the occurrence. 3. CORRECTIVE ACTIONS: Provide summary of the corrective actions taken against the individual(s) involved in the security violation, and the actions initiated or taken by the facility to secure the information after the violation. Include a description of the graduated scale of disciplinary actions, as established by the organization. 4. CONCLUSIONS: Define the security violation as a Loss, Compromise, Suspected Compromise, or No Loss, Compromise, or Suspected Compromise. Include vulnerability of information, description of unauthorized access, and description of GCA classification review. 5. DETERMINATION OF CULPABILITY: Provide summary of procedures to investigate individual(s) involved in security violation, including personnel information for individual(s), description of actions, relevant criteria from NISPOM 1-304, and individual(s) perceived knowledge of NISPOM and associated security procedures and policies. 6. RECOMMENDATIONS 7. FOLLOW-UP SIGNATURE [Line]: Position/Title: Facility: CC: (as applicable) Page B-1
There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened.
Data Spills Short Introduction There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened. When data spills occur, they
Introduction. Derivative Classification Training JOB AID
Introduction Derivative Classification Training The purpose of this job aid is to provide reference information for the responsibilities and procedures associated with derivative classification. This job
DSS Monthly Newsletter
(Sent on behalf of ISR) Dear FSO, DSS Monthly Newsletter December 2012 This is the monthly email containing recent information, policy guidance, security education and training updates. If you have any
Commanding Officer and Executive Officer. Information and Personnel Security Reference Handbook
Commanding Officer and Executive Officer Information and Personnel Security Reference Handbook Assistant for Information and Personnel Security (N09N2) Office of the Chief of Naval Operations Governing
Suggested Contractor File Folder Headings
Suggested Contractor File Folder Headings 1. Facility Clearance 2. Personnel Clearances 3. Recurring Security Education 4. Self-Inspection 5. Security Correspondence 6. Standard Practice Procedures 7.
03/21/2013. Security Incident Requirements. Information Security Webinar. Administrative Announcements. Security Incident Requirements
Security Incident Requirements Information Security Webinar Security Incident Requirements Host: Lisa Rainey, SAPPC Information Security Curriculum Manager, DSS - CDSE Distinguished career-security professional
JOB AID. Derivative Classification Training U N I T E D A M E R I C A S TAT E S O F. Center for Development of Security Excellence (CDSE) www.cdse.
Center for Development of Security Excellence Learn. Perform. Protect. www.cdse.edu DEFENSE SECURITY SERVICE U N I T E D S TAT E S O F A M E R I C A Center for Development of Security Excellence (CDSE)
Obtaining a Facility Security Clearance A Pinkerton Government Services White Paper
Obtaining a Facility Security Clearance A Pinkerton Government Services White Paper Robert Maydoney Vice President Sales Pinkerton Government Services, Inc. 740 North Main Street Mansfield, MA 02048 T:
Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS
Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS The Contractor Security Review Requirement... 2 The Self-Inspection Handbook for NISP Contractors... 2 The Elements of Inspection... 2 Self-Inspection
Webinar Questions and Answers
Webinar Questions and Answers New Facility Clearance (FCL) Sponsorship for Government Contracting Activities (GCAs) and Prime Contractors (PCs) Webinar guests submitted several questions before and during
Computer Security Incident Reporting and Response Policy
SECTION: 3.8 SUBJECT: Computer Security Incident Reporting and Response Policy AUTHORITY: Executive Director; Chapter 282.318, Florida Statutes - Security of Data and Information Technology Resources;
Information Security Program Management Procedures and Guidelines
Directive: LPR 1620.1C Effective Date: June 20, 2014 Expiration Date: May 31, 2019 Langley Research Center Information Security Program Management Procedures and Guidelines National Aeronautics and Space
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Data Backup and Protection Solution (Yosemite) US Army Medical Command - DHP Funded Application SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN. 1250 Siskiyou Boulevard Ashland OR 97520
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN 1250 Siskiyou Boulevard Ashland OR 97520 Revision History Revision Change Date 1.0 Initial Incident Response Plan 8/28/2013 Official copies
DEPARTMENT OF DEFENSE DEFENSE SECURITY SERVICE, INDUSTRIAL SECURITY PROGRAM OFFICE INDUSTRIAL SECURITY LETTER
DEPARTMENT OF DEFENSE DEFENSE SECURITY SERVICE, INDUSTRIAL SECURITY PROGRAM OFFICE INDUSTRIAL SECURITY LETTER Industrial Security letters will be issued periodically to inform Industry, User Agencies and
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
NATO SECURITY BRIEFING NATO/ATOMAL SECURITY BRIEFING
NATO SECURITY BRIEFING FOREWORD This sample security briefing contains the minimum elements of information that must be provided to individuals upon initial indoctrination for access to NATO classified
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map Prepared by: Booz Allen Hamilton Career progression within the 0080-Information/Personnel
IMS-ISA Incident Response Guideline
THE UNIVERSITY OF TEXAS HEALTH SCIENCE CENTER AT SAN ANTONIO IMS-ISA Incident Response Guideline Incident Response Information Security and Assurance 12/31/2009 This document serves as a guideline for
This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.
Department of Homeland Security Management Directives System MD Number: 11043 Issue Date: 09/17/2004 SENSITIVE COMPARTMENTED INFORMATION PROGRAM MANAGEMENT I. Purpose This directive establishes Department
2016 OCR AUDIT E-BOOK
!! 2016 OCR AUDIT E-BOOK About BlueOrange Compliance: We specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that
1 Purpose The DOE M 470.4-4A, Information Security Manual states, All information security programs, practices, and procedures developed within DOE must be consistent with and incorporate the requirements
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
Outside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service
Outside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service February 2014 Training Objectives FOCI Control Procedures
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service February 2014 Training Objectives DSS Agency DSS Mission
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Practice Test Security Fundamentals Professional Certification (SFPC) Multiple Choice. Multiple-Choice Sample Question # 1
The following Practice Test presents samples of the type, difficulty, and format of questions found on the SFPC assessment. At the end of the Practice Test, a table is provided outlining the topics and
DSS Secret Internet Protocol Router Network (SIPRnet) Processing Procedures
DSS Secret Internet Protocol Router Network (SIPRnet) Processing Procedures Introduction DSS is the Cognizant Security Authority (CSA) for contractors participating in the National Industrial Security
DHS / UKvisas Project
for the DHS / UKvisas Project November 14, 2007 Contact Point Elizabeth Gaffin Associate Counsel United States Citizenship and Immigration Services 202-272-1400 Reviewing Official Hugo Teufel III Chief
BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011
BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011 Communications and Information MANAGEMENT OF PORTALS AND WEB SITES COMPLIANCE WITH THIS PUBLICATION
Organization. Project Name. Project Overview Plan Version # Date
Project Overview Plan Template Organization Project Name Project Overview Plan Version # Date REVISION HISTORY VERSION # REVISION DATE COMMENT 1 APPROVALS: Authorized Signature DATE 2 Table of Contents
IT Security Incident Management Policies and Practices
IT Security Incident Management Policies and Practices Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Feb 6, 2015 i Document Control Document
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Healthcare Continuing Education and Training Enterprise Subscription Service (Swank Healthcare) US Army Medical Command - Defense Health Program (DHP) Funded Application
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Credit Card (PCI) Security Incident Response Plan
Credit Card (PCI) Security Incident Response Plan To address credit cardholder security, the major credit card brands (Visa, MasterCard, American Express, Discover & JCB) jointly established the PCI Security
PERFORMANCE WORK STATEMENT. for. United States Air Forces in Europe (USAFE)/ Air Forces Africa (AFAFRICA)
PERFORMANCE WORK STATEMENT for United States Air Forces in Europe (USAFE)/ Air Forces Africa (AFAFRICA) Communications Directorate (A6) Task Management Tool (TMT) Support 1 TABLE OF CONTENTS Contract Number
IT Security Handbook. Incident Response and Management: Targeted Collection of Electronic Data
IT Security Handbook Incident Response and Management: Targeted Collection of Electronic Data ITS HBK 2810.09 03 Effective Date: 20110824 Expiration Date: 20130824 Responsible Office: OCIO/ Deputy CIO
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
Reference Guide for Security in Networks
Reference Guide for Security in Networks This reference guide is provided to aid in understanding security concepts and their application in various network architectures. It should not be used as a template
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR Web Portal Security Review Page 2 Audit Report 03-11 Web Portal Security Review INDEX SECTION I EXECUTIVE SUMMARY
DD FORM 254 Preparation Guide
Headquarters, Department of the Army, G-2 DD FORM 254 Preparation Guide FY-10 FOREWORD Within The Department of Defense, Industrial Security is identified as the portion of information security concerned
DEPARTMENT OF DEFENSE Defense Contract Management Agency INSTRUCTION. Small Business Process
DEPARTMENT OF DEFENSE Defense Contract Management Agency INSTRUCTION Small Business Process Contracts Directorate DCMA-INST 119 OPR: DCMA-AQS 1. PURPOSE. This Instruction: a. Reissues and updates DCMA
Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5
Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 5220.22, Volume 3 April 17, 2014 USD(I) SUBJECT: National Industrial Security Program: Procedures for Government Activities Relating to Foreign Ownership, Control, or
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
SMSe Privacy Impact Assessment
1. Contact Information Department of State Privacy Coordinator Margaret P. Grafeld Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information
FirstCarolinaCare Insurance Company Business Associate Agreement
FirstCarolinaCare Insurance Company Business Associate Agreement THIS BUSINESS ASSOCIATE AGREEMENT ("Agreement"), is made and entered into as of, 20 (the "Effective Date") between FirstCarolinaCare Insurance
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
Prepared for Public Service Staff Relations Board. Prepared by Consulting and Audit Canada Project No.: 330-0998
Security Audit Report Prepared for Public Service Staff Relations Board Prepared by Consulting and Audit Canada Project No.: 330-0998 Table of Contents 1. Executive Summary... ii 2. About the Audit...1
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Integrated Visual and Auditory Continuous Performance Test (IVA-AE) US Army Medical Command - Defense Health Program (DHP) Funded Application SECTION 1: IS A PIA
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
Information Security: Roles, Responsibilities, and Data Classification. Technology Services 1/4/2013
Information Security: Roles, Responsibilities, and Data Classification Technology Services 1/4/2013 Roles, Responsibilities, and Data Classification The purpose of this session is to: Establish that all
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Policies and Compliance Guide
Brooklyn Community Services Policies and Compliance Guide relating to the HIPAA Security Rule June 2013 Table of Contents INTRODUCTION... 3 GUIDE TO BCS COMPLIANCE WITH THE HIPAA SECURITY REGULATION...
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
Standard Operating Procedure Information Security Compliance Requirements under the cabig Program
Page 1 of 9 Pages Standard Operating Procedure Information Security Compliance Requirements under the cabig Program This cover sheet controls the layout and components of the entire document. Issued Date:
Network Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
Physical Access Control System
for the Physical Access Control System DHS/ALL 039 June 9, 2011 Contact Point David S. Coven Chief, Access Control Branch (202) 282-8742 Reviewing Official Mary Ellen Callahan Chief Privacy Officer (703)
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
TERMINAL CONTROL MEASURES
UCR Cashiering & Payment Card Services TERMINAL CONTROL MEASURES Instructions: Upon completion, please sign and return to [email protected] when requesting a stand-alone dial up terminal. The University
BREACH NOTIFICATION FOR UNSECURED PROTECTED HEALTH INFORMATION
BREACH NOTIFICATION FOR UNSECURED PROTECTED HEALTH INFORMATION Summary November 2009 On August 24, 2009, the Department of Health and Human Services (HHS) published an interim final rule (the Rule ) that
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
NSA/IAD NSCAP CIRA Accreditation Instruction Manual
Table of Contents 1 Introduction...5 1.1 Fees and Charges... 5 1.2 Application Submittals... 6 2 How to Apply Qualifications...7 3 CIRA Services The Accreditation Process...7 3.1 Overview... 7 3.2 Application
Department of Homeland Security DHS Directives System Directive Number: 140-04 Revision Number: 00 Issue Date: SPECIAL ACCESS PROGRAM MANAGEMENT
I. Purpose Department of Homeland Security DHS Directives System Directive Number: 140-04 Revision Number: 00 Issue Date: 08/12/2009 SPECIAL ACCESS PROGRAM MANAGEMENT This Directive establishes the Department
Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:
Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal
How To Do A Vulnerability Assessment
2013 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories Table of Contents Vulnerability Assessments... 2 Vulnerabilities... 3 NISP Enhancements... 4 1 Company Sponsored
Using Technology Control Plans in Export Compliance. Mary Beran, Georgia Tech David Brady, Virginia Tech
Using Technology Control Plans in Export Compliance Mary Beran, Georgia Tech David Brady, Virginia Tech What is a Technology Control Plan (TCP)? The purpose of a TCP is to control the access and dissemination
Statement of Policy. Reason for Policy
Table of Contents Statement of Policy 2 Reason for Policy 2 HIPAA Liaison 2 Individuals and Entities Affected by Policy 2 Who Should Know Policy 3 Exclusions 3 Website Address for Policy 3 Definitions
Iowa Health Information Network (IHIN) Security Incident Response Plan
Iowa Health Information Network (IHIN) Security Incident Response Plan I. Scope This plan identifies the responsible parties and action steps to be taken in response to Security Incidents. IHIN Security
DATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Brain Training Software US Army Medical Command - DHP Funded Applications SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system
Healthcare Management Service Organization Accreditation Program (MSOAP)
ELECTRONIC HEALTHCARE NETWORK ACCREDITATION COMMISSION (EHNAC) Healthcare Management Service Organization Accreditation Program (MSOAP) For The HEALTHCARE INDUSTRY Version 1.0 Released: January 2011 Lee
2015 Security Training Schedule
2015 Security Training Schedule Risk Management Framework Course (RMF) / $1,950.00 Per Student Dates June 1-4 Location 4775 Centennial Blvd., Suite 103 / Colorado Springs, CO 80919 July 20 23 444 W. Third
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Recommendations for the PIA. Process for Enterprise Services Bus. Development
Recommendations for the PIA Process for Enterprise Services Bus Development A Report by the Data Privacy and Integrity Advisory Committee This report reflects the consensus recommendations provided by
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
The President. Part VII. Tuesday, January 5, 2010
Tuesday, January 5, 2010 Part VII The President Executive Order 13526 Classified National Security Information Memorandum of December 29, 2009 Implementation of the Executive Order Classified National
