BACKUP & RESTORATION PROCEDURE

Size: px
Start display at page:

Download "BACKUP & RESTORATION PROCEDURE"

Transcription

1 BACKUP & RESTORATION PROCEDURE KING SAUD UNIVERSITY DEANSHIP OF ETRANSACTIONS & COMMUNICATION VERSION 1.1 INTERNAL USE ONLY

2 PREPARED BY REVIEWED BY APPROVED BY ALTAMASH SAYED NASSER A. AMMAR DR. MOHAMMED A ALNUEM REVISION HISTORY Sr. No. Date of Revision Ver. Validity Description of change Reviewed By Approved By 1 18/03/ One Year Initialization Nasser A. Ammar Dr. Mohammed A Alnuem 2 02/03/ One Year Department Ownership Changed Mr. Toqeer Ahmad 3 05/03/ One Year No Change Mr. Toqeer Ahmad Mr. Mohammed A. Alsarkhi Mr. Mohammed A. Alsarkhi DISTRIBUTION LIST Sr. No Version Number Name Designation Department ISMS/A.10.3/BR/PRO/ V1.1 Page 2 of 18 Internal Use Only

3 TABLE OF CONTENTS 1. PURPOSE SCOPE RELATED POLICIES AND PROCEDURES PROCEDURE ENFORCEMENT / COMPLIANCE DOCUMENT OWNER ROLES & RESPONSIBILITY INVOCATION BACKUP PROCEDURE FLOWCHART BACKUP PROCEDURE DETAILS RESTORATION PROCEDURE FLOWCHART RESTORATION PROCEDURE DETAILS ANNEXURE FORM RECORD ISMS/A.10.3/BR/PRO/ V1.1 Page 3 of 18 Internal Use Only

4 1. PURPOSE The purpose of Backup and Restoration Procedure is to establish an effective way for the backup and restoration process adopted by King Saud University - etransactions & Communication Deanship. The data of King Saud University - etransactions & Communication Deanship is a valuable asset which could be lost or destroyed by intentional/unintentional actions. Therefore, it is crucial to safeguard assets by implementing a backup and restore procedure which will define the required actions to protect ETC Deanship's data. 2. SCOPE This procedure applies to King Saud University (KSU) - etransactions & Communication (ETC) Deanship and all parties, its affiliated partners or subsidiaries, including data processing and process control systems, that are in possession of or using information and/or facilities owned by KSU-ETC Deanship. This procedure applies to all staff/ users that are directly or indirectly employed by KSU-ETC Deanship, subsidiaries or any entity conducting work on behalf of KSU that involves the use of information assets owned by ETC Deanship. 3. RELATED POLICIES AND PROCEDURES Backup Policy Communications and Operations Management Policy Change Management Policy Change Management Procedure 4. PROCEDURE ENFORCEMENT / COMPLIANCE Compliance with this procedure is mandatory and ETC Deanship managers shall ensure continuous compliance monitoring within their departments. Compliance with the statements of this procedure is a matter of periodic review by Risk & Information Security Department and any violation of the procedure will result in corrective action by the ISMS Steering Committee. Disciplinary action will be depending on the severity of the violation which will be determined by the investigations. such as termination or others as deemed appropriate by ETC Management and Human Resources Department will be taken. ISMS/A.10.3/BR/PRO/ V1.1 Page 4 of 18 Internal Use Only

5 5. DOCUMENT OWNER ISMS Manager 6. ROLES & RESPONSIBILITY Each role involved in this procedure shall have main responsibilities as follows: 1. ISMS Manager Evaluating and approving backup and restoration plan according to KSU-ETC Deanship's business needs, considering security and requirements. Informing requester about the results and status of the backup request, backup plan evaluation and approval. 2. Backup Requester / Asset Owners Initiating backup or restoration request and filling up the request form. Coordinating with respective to prepare the request. 3. Evaluating technical requirement of backup in terms of backup frequency, data size, offsite storage, retention and restore. Developing backup plan in terms of backup scope, frequency, type, mechanism, storage location, retention period, encryption, media labeling and media destruction. Planning and performing all activities required for backup and restoration procedures (e.g. obtain, prepare the backup media and prepare systems for the backup/ restoration). Maintaining accurate records of backup and restoration procedures details and components. Evaluating the backup and restore requests according to ETC deanship's business and security needs. Determining the criticality of restore process. Agreeing and reviewing with Backup Requester / Asset Owners in all details of backup and restoration with regard to information security. Ensuring that the backup and restoration procedure is properly implemented. ISMS/A.10.3/BR/PRO/ V1.1 Page 5 of 18 Internal Use Only

6 7. INVOCATION This procedure shall be followed whenever there is: BACKUP INVOCATION: Request for Backup If there is a business need to backup any information, a request must be initiated; and this procedure will be triggered. Emergency Backup Request / Disaster Response In the event of urgent change, disaster and emergency backup request shall be initiated; and this procedure will be triggered. Conditional Backup Request (Changes Request / Patch Implementation) If there is a change in any information system or a patch needs to be implemented, a backup request shall be initiated in order to roll back the information system to the previous status in case of any an unexpected failure / disaster caused from that change. Periodic Backup Plan If there is a periodic backup request, this procedure shall be invoked. RESTORE INVOCATION: Regular Restoration Request If there is a business need to restore any information, a request will be initiated; and this procedure will be triggered. Emergency Restore In the event of a disaster, an emergency restoration request will be initiated; and this procedure will be triggered. Periodic Backup Restoration Testing To ensure that the backup scheme is working as expected, restoration testing shall be initiated on a periodic basis. ISMS/A.10.3/BR/PRO/ V1.1 Page 6 of 18 Internal Use Only

7 8. BACKUP PROCEDURE FLOWCHART Backup Procedure Backup Requester / Asset Owners Start Step 1.a Backup Request Received Backup Request Step 1.b Automated Backup Step 2 Process Evaluate Business and Security Requirements Step 4 Backup Process / Verification Step 5 Restore Test Yes Successful No Accept End Step 7 Media Storage Backup and Restoration Log 4 Step 6 Inspect Log and take corrective action Backup and Restoration Log Step 3 ISMS Manager Evaluate Technical needs & Approve Backup Plan Decision Reject Step 8 Inform Requester Start / End Start and end of the procedure Reference to another procedure Another related procedure Input/ Output Input or output infomation Log/Record Storage to file Step 1 An activity / step Decision A decision in a procedure Form Document / Form 1 Follow to step no. Flow of 2 or more different decisions ISMS/A.10.3/BR/PRO/ V1.1 Page 7 of 18 Internal Use Only

8 9. BACKUP PROCEDURE DETAILS STEP 1.A : BACKUP REQUEST RECEIVED Backup Requester / Asset Owners Input Backup Request Form Backup Requester / Asset Owners will identify backup needs, and fill up backup request form. Proceed to step 2. Output Backup Request Form Backup Business Needs Identification STEP 1.B : AUTOMATED BACKUP Backup Requester / Asset Owners Input Automated Backup Automated Backup scheduled. Proceed to step 4. Output Backup Business Needs Identification STEP 2 : EVALUATE BUSINESS NEEDS Input Backup Request Form Backup Business Needs Identification Once the backup request form initiated, the department will evaluate the request according to business and security needs and then sends it to the ISMS Manager for assessment. Proceed to step 3. Output Backup Request Form with Business and Security Requirements ISMS/A.10.3/BR/PRO/ V1.1 Page 8 of 18 Internal Use Only

9 STEP 3 : EVALUATE TECHNICAL NEEDS / BACKUP PLAN ISMS Manager Input Output Backup Request Form with Business and Security Requirements Backup Plan Determine technical requirement, dependencies and limitations to perform backup Job once or maintain periodic backup plan. With the participation of the ETC Department Asset Owners, a backup plan will be developed, which consists of the following: Backup scope: what type of information/ data needs back up (e.g. databases, network settings, file system, etc). Backup frequency: durations by which back up will be taken (taking into consideration the criticality/ availability factors). Backup type: is it (full, incremental or online). Backup mechanism: is it (automatic or manual). Backup storage location: the storage for the backup media should be in a secure location on-site/off-site in different zones if possible, taking into consideration the criticality/ availability factors. Backup retention period: establish the retention period for the backup media. Backup encryption: agree if encryption is required, for which data. Media labeling: agree on a labeling scheme. Media destruction: agree on media disposal process. Once the plan has been determined, ISMS Manager will evaluate the plan and decides on approval: If plan is approved, proceed to step 4. If plan is rejected, inform requester and go to step 8. Backup Form with Technical Requirements Backup Plan Approved / Rejected Backup Plan ISMS/A.10.3/BR/PRO/ V1.1 Page 9 of 18 Internal Use Only

10 STEP 4 : BACKUP / PROCESS VERIFICATION Input Approved Backup Plan Respective department will start backup process, prepare the environment and perform backup on systems / network devices. The backup process will be validated to confirm the success of the process and no problems were encountered by Backup Administrator. Proceed to step 5. Output System / Network Backup STEP 5 : RESTORE TEST Input System / Network Backup Respective department will perform a restore test on a test environment to verify the ability of backup to be restored successfully and meet the requester expectations. If it is successful, go to step 7. If it is unsuccessful, go to step 6 to analyze the issue and then go to step 4 and re-perform the backup if required. Output Successful / Unsuccessful Restore Test STEP 6 : INSPECT BACKUP LOG Input Unsuccessful Backup / Test In case of unsuccessful backup process, respective department will inspect backup logs for errors detection and corrective actions will be taken. Go back to step 4 to retry the backup process again. End process and inform requester if it is failed several times. Update backup and restoration log. ISMS/A.10.3/BR/PRO/ V1.1 Page 10 of 18 Internal Use Only

11 Output Backup Inspection Results. Corrective Updated Backup and Restoration log STEP 7 : MEDIA STORAGE Input Successful Backup Process Respective department will store Backup media as per Backup Policy. respective department will update backup record and restoration log. End of procedure. Output Successful Backup Media Process and Storage Updated Backup and Restoration Log STEP 8 : INFORM REQUESTER Input Output Rejected Backup Plan Unsuccessful Backup Process Once the request has been rejected, ISMS Manager will inform the requester with justification. Add notification / update the request status. End process if request is rejected / process completed. Approved / Rejected Backup Request. Requester Updated with Request Evaluation and Approval Status. ISMS/A.10.3/BR/PRO/ V1.1 Page 11 of 18 Internal Use Only

12 10. RESTORATION PROCEDURE FLOWCHART Restoration Procedure Restoration Requester / Asset Owners Start Step 1 Notify ICT Infrastructure Manager Step 5 Restore Verification Successful No 4 Process ISMS Manager Step 2 Evaluate Technical Needs and Approve Overall Request Yes Step 3 Restoration Preparation Type? Emergency 6 Regular Step 4 Restore to Test Environment No Step 8 Inspect Logs & Correct Errors Backup and Restoration Log Successful Step 6 Implement Restoration Yes Step 7 Process Completion Backup and Restoration Log 6 End Start / End Start and end of the procedure Reference to another procedure Another related procedure Input/ Output Input or output infomation Log/Record Storage to file Step 1 An activity / step Decision A decision in a procedure Form Document / Form 1 Follow to step no. Flow of 2 or more different decisions ISMS/A.10.3/BR/PRO/ V1.1 Page 12 of 18 Internal Use Only

13 11. RESTORATION PROCEDURE DETAILS STEP 1 : NOTIFY ISMS MANAGER Restoration Requester / Asset Owners Input Business Need for Restoration Requester will complete restoration request form and send it to ISMS Manager for evaluation. Proceed to step 2. Output Restoration Business Needs Identification STEP 2 : EVALUATE TECHNICAL NEEDS AND APPROVE OVER ALL REQUEST ISMS Manager. Input Restoration Request Form Restoration Business Needs Identification ISMS Manager will evaluate restoration request from technical point of view and send to step 3. Output Restoration preparation STEP 3: RESTORATION PREPARATION Input Approved Restoration Request Form Respective ETC department will prepare storage media / environment for restoration. Prepare systems / network devices for restoration. If a restoration request is an emergency, jump to step 6. If a restoration request is a regular, proceed to step 4. Output Prepared System and Storage Media ISMS/A.10.3/BR/PRO/ V1.1 Page 13 of 18 Internal Use Only

14 STEP 4: RESTORE TO TEST ENVIRONMENT Input Prepared System and Storage Media Respective ETC department will perform restoration on the system / network devices on a test environment. Proceed to step 5 to verify the results with requester. Output Test Restoration Process Results STEP 5: TEST RESTORATION VERIFICATION Input Test Restoration / Restore Implementation Process Results The requester will confirm the success of the test / implementation process, the data is restored completely and the restored data is as per the expectations. If a process is successful, proceed to step 6 to perform the restoration. If a process is unsuccessful, go back to step 4 to re-test the restoration. Output Successful / Unsuccessful Test Restoration Process Results STEP 6: IMPLEMENT RESTORATION Input Test Restoration Verification Emergency Restoration Request Respective ETC department will perform / implement restoration on requested production system / devices: If a restoration is successful, proceed to step 7. If a restoration is unsuccessful, proceed to step 8. Output Implementation of Restoration ISMS/A.10.3/BR/PRO/ V1.1 Page 14 of 18 Internal Use Only

15 STEP 7: PROCESS COMPLETION Input Restoration Process Completion Verification Output Respective ETC department will update the backup and restoration Log. Updated Backup and Restoration Log Closed / Updated Restoration Request Form STEP 8: INSPECT LOG AND CORRECT ERRORS Input Unsuccessful Restoration Process on System / Network Devices. Output In case of unsuccessful restoration process, concerned department will inspect logs for errors detection and corrective actions will be taken. Proceed to step 6 to retry the restoration process again. End process and inform requester if failed several times. Update backup and restoration log. Corrective Backup and Restoration Log Updated Restoration Request Form ISMS/A.10.3/BR/PRO/ V1.1 Page 15 of 18 Internal Use Only

16 12. ANNEXURE 12.1 FORM SECTION A BACKUP / RESTORE REQUEST System Name/ Label System ID Request Purpose & Description Data Description Requester Name: Signature: Supervisor Name: Signature: Tel #: SECTION B Department: Location: Approved Not Approved Comments: BACKUP PLAN Type of Backup Backup Priority Backup Test Planned Backup Media Storage Location Backup Frequency Backup Type Backup Time (Optional) Periodic / planned Yes Details: On Site Location: Daily Full Date Start: / / Emergency Critical High Weekly Incremental Conditional Medium No Offsite Low Reason: Location: Monthly Differential Change Request Patch Management Other Other Other Date Finish: / / Time Start: Time Finish: SECTION C RESTORE PLAN Type of Restore Restore Priority Restore Test Planned Restore Media Storage Location Restore Reason Other Details Restore Time (Optional) Periodic Test Yes Details: On Site Location: System Fault Date Start: / / Emergency Conditional Change Request Patch Management Other Critical High Medium Low No Reason: Offsite Location: Human error Incident / Disaster Other Date Finish: / / Time Start: Time Finish: RESTORE DOWNTIME (OPTIONAL) DOWNTIME DURATION DOWNTIME APPROVAL Yes (need signatures) Days: Time: Owner Name Signature Date: Date: Start Time: Finish Time: No ISMS/A.10.3/BR/PRO/ V1.1 Page 16 of 18 Internal Use Only

17 AFFECTED DEPARTMENT WHICH MUST BE NOTIFIED PRIOR TO THE RESTORE DEPARTMENT NAME DIRECTOR NAME SIGNATURE Test Plan Prepared Yes No Test Performed in Test Environment Yes No BACKUP / RESTORE TESTING IF Not Successful Cause : Recommendation: Test Result Successful Not Successful Plan Prepared Yes No Plan Initiated Due to Restore Failure Yes No ROLLBACK / RECOVERY PLAN IF Not Successful Cause : Recommendation: Plan Initiated Result: Successful Not Successful ADDITIONAL REQUIREMENT Technical / Support Documentation Yes No Vendors staffs required in Computer Room Yes (attach access request form) No Implementation Plan attached Yes Not Required Drawing required and approved Yes Not Required SECTION D ISMS MANAGER APPROVAL Department Name Director Name Approval Signature Yes Yes No No ISMS/A.10.3/BR/PRO/ V1.1 Page 17 of 18 Internal Use Only

18 12.2 RECORD BACKUP AND RESTORATION LOG No. Date System/ Application Name Backup Type Restoration Type Starting Time Finishing Time Status (Backup / Restoration) Person Name Signature Remarks ISMS/A.10.3/BR/PRO/ V1.1 Page 18 of 18 Internal Use Only

DOCUMENT CONTROL PROCEDURE

DOCUMENT CONTROL PROCEDURE DOCUMENT CONTROL PROCEDURE KING SAUD UNIVERSITY DEANSHIP OF E-TRANSACTIONS & COMMUNICATION VERSION 1.1 INTERNAL USE ONLY PREPARED BY REVIEWED BY APPROVED BY ALTAMASH SAYED NASSER A. AMMAR DR. MOHAMMED

More information

UMHLABUYALINGANA MUNICIPALITY

UMHLABUYALINGANA MUNICIPALITY UMHLABUYALINGANA MUNICIPALITY BACKUP AND RESTORE POLICY Backup and Restore Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator Recommended by Director of

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security

More information

Stellar Phoenix Exchange Server Backup

Stellar Phoenix Exchange Server Backup Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically

More information

15 Organisation/ICT/02/01/15 Back- up

15 Organisation/ICT/02/01/15 Back- up 15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional

More information

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

This policy is not designed to use systems backup for the following purposes:

This policy is not designed to use systems backup for the following purposes: Number: AC IT POL 003 Subject: Backup and Restore Policy 1. PURPOSE The backup and restore policy establishes the need and rules for performing periodic system backup to permit timely restoration of Africa

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

DATA CENTER SERVICE CATALOG

DATA CENTER SERVICE CATALOG DATA CENTER SERVICE CATALOG KING SAUD UNIVERSITY DEANSHIP OF ETRANSACTIONS & COMMUNICATION VERSION 1.1 INTERNAL USE ONLY PREPARED BY REVIEWED BY APPROVED BY NAFEZ ALBESHEETI DR.MISHARI ALMISHARI DR.MISHARI

More information

Document and Record Control Procedures

Document and Record Control Procedures Information Security Document Document and Record Control Procedures 1 Version History Version Date Detail Author 1.0 30/08/2013 Approved by Information Governance Jo White Group 2.0 27/09/2013 Changes

More information

INFORMATION TECHNOLOGY CONTROLS

INFORMATION TECHNOLOGY CONTROLS CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,

More information

Alberta Reliability Standard Cyber Security System Security Management CIP-007-AB-5

Alberta Reliability Standard Cyber Security System Security Management CIP-007-AB-5 A. Introduction 1. Title: 2. Number: 3. Purpose: To manage system security by specifying select technical, operational, and procedural requirements in support of protecting BES cyber systems against compromise

More information

IT Security Standard: Computing Devices

IT Security Standard: Computing Devices IT Security Standard: Computing Devices Revision History: Date By Action Pages 09/30/10 ITS Release of New Document Initial Draft Review Frequency: Annually Responsible Office: ITS Responsible Officer:

More information

ReliabilityFirst CIP Evidence List CIP-002 through CIP-009 are applicable to RC, BA, IA, TSP, TO, TOP, GO, GOP, LSE, NERC, & RE

ReliabilityFirst CIP Evidence List CIP-002 through CIP-009 are applicable to RC, BA, IA, TSP, TO, TOP, GO, GOP, LSE, NERC, & RE R1 Provide Risk Based Assessment Methodology (RBAM) R1.1 Provide evidence that the RBAM includes both procedures and evaluation criteria, and that the evaluation criteria are riskbased R1.2 Provide evidence

More information

IMPLEMENTATION OF AN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM TECHNICAL SPECIFICATIONS FOR AGENCIES AND BROKERS ACTING ON THEIR ACCOUNT

IMPLEMENTATION OF AN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM TECHNICAL SPECIFICATIONS FOR AGENCIES AND BROKERS ACTING ON THEIR ACCOUNT IMPLEMENTATION OF AN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM TECHNICAL SPECIFICATIONS FOR AGENCIES AND BROKERS ACTING ON THEIR ACCOUNT IMPORTANT The OACIQ reserves the right to change its requirements based

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Information Technology General Controls And Best Practices

Information Technology General Controls And Best Practices Paul M. Perry, FHFMA, CITP, CPA Alabama CyberNow Conference April 5, 2016 Information Technology General Controls And Best Practices 1. IT General Controls - Why? 2. IT General Control Objectives 3. Documentation

More information

Business Continuity Planning and Disaster Recovery Planning

Business Continuity Planning and Disaster Recovery Planning 4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business

More information

Test du CISM. Attention, les questions, comme l'examen, ne sont disponibles qu'en anglais.

Test du CISM. Attention, les questions, comme l'examen, ne sont disponibles qu'en anglais. Test du CISM Attention, les questions, comme l'examen, ne sont disponibles qu'en anglais. 1. Which of the following would BEST ensure the success of information security governance within an organization?

More information

Information Shield Solution Matrix for CIP Security Standards

Information Shield Solution Matrix for CIP Security Standards Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

White Paper: Librestream Security Overview

White Paper: Librestream Security Overview White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing

More information

PCLaw Scheduled Backup

PCLaw Scheduled Backup Contents About PCLaw Scheduled Backup Enabling Connection Settings Creating a Backup Schedule Viewing Backup Logs PCLaw Scheduled Backup About PCLaw Scheduled Backup Use PCLaw Scheduled Backup to automate

More information

VMware vsphere Data Protection 6.1

VMware vsphere Data Protection 6.1 VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data

More information

CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments

CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine

More information

San Francisco Chapter. Information Systems Operations

San Francisco Chapter. Information Systems Operations Information Systems Operations Overview Operations as a part of General Computer Controls Key Areas of focus within Information Systems Operations Key operational risks Controls generally associated with

More information

Dr.Backup, LLC Online Backup Service. Pro-Partner Program Overview

Dr.Backup, LLC Online Backup Service. Pro-Partner Program Overview Dr.Backup, LLC Online Backup Service Pro-Partner Program Overview Increase Revenues & Customer Retention Using Online Backup [email protected] (301) 560-4534 Mr. Fubar - A Typical Small Business Owner

More information

Electronic Bill of Lading for Carriers

Electronic Bill of Lading for Carriers www.bolero.net Electronic Bill of Lading for Carriers Frequently Asked Questions (FAQs) Introduction As with a traditional bill of lading (b/l) there are two principle types of electronic bill of lading

More information

COMMERCIALISM INTEGRITY STEWARDSHIP. Back-up Policy & Guidance

COMMERCIALISM INTEGRITY STEWARDSHIP. Back-up Policy & Guidance Back-up Policy & Guidance Document Control Document Details Author Adrian Last Company Name The Crown Estate Division Name Information Services Document Name Back Up Policy Version Date 10/10/12 Effective

More information

Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00

Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00 Client Advisory October 2009 Data Security Law MGL Chapter 93H and 201 CMR 17.00 For a discussion of these and other issues, please visit the update on our website at /law. To receive mailings via email,

More information

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3 OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...

More information

Business System Recordkeeping Assessment - Digital Recordkeeping Compliance

Business System Recordkeeping Assessment - Digital Recordkeeping Compliance Introduction The following assessment will assist to identify whether the system complies with State Records Authority of NSW Standards on Records Management The broad Principles of this standard are as

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

Getting Started Guide

Getting Started Guide Page 2 of 9 Introduction This guide is designed to provide you with the information you need to complete your Payment Gateway account set up and begin processing live payment transactions. As a quick overview,

More information

Business Continuity Planning (BCP) / Disaster Recovery (DR)

Business Continuity Planning (BCP) / Disaster Recovery (DR) Business Continuity Planning (BCP) / Disaster Recovery (DR) Introduction Interruptions to business functions can result from major natural disasters such as earthquakes, floods, and fires, or from man-made

More information

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from

More information

7Seven Things You Need to Know About Long-Term Document Storage and Compliance

7Seven Things You Need to Know About Long-Term Document Storage and Compliance 7Seven Things You Need to Know About Long-Term Document Storage and Compliance Who Is Westbrook? Westbrook Technologies, based in Branford on the Connecticut coastline, is an innovative software company

More information

Feedback Ferret. Security Incident Response Plan

Feedback Ferret. Security Incident Response Plan Feedback Ferret Security Incident Response Plan Document Reference Feedback Ferret Security Incident Response Plan Version 3.0 Date Created June 2013 Effective From 20 June 2013 Issued By Feedback Ferret

More information

VMware vcloud Air HIPAA Matrix

VMware vcloud Air HIPAA Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Information Security Policy version 2.0

Information Security Policy version 2.0 http://kfu.edu.sa KING FAISAL UNIVERSITY Information Security Policy version 2.0 Prepared & Presented by: M. Shahul Hameed, MBA, M.Sc.IT, C\MA, CIA, PMP, CGEIT, CISA, CISM, ITSM(ITIL), ISO27001LA, Head

More information

TechExcel. ITIL Process Guide. Sample Project for Incident Management, Change Management, and Problem Management. Certified

TechExcel. ITIL Process Guide. Sample Project for Incident Management, Change Management, and Problem Management. Certified TechExcel ITIL Process Guide Sample Project for Incident Management, Management, and Problem Management. Certified Incident Management Red Arrows indicate that the transition is done automatically using

More information

Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services

Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services Service Level Agreement Page 1 of 7 Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services 1. Agreement This agreement is to define Domain Name Service (DNS) provided

More information

Montclair State University. HIPAA Security Policy

Montclair State University. HIPAA Security Policy Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that

More information

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution. Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR

More information

BUSINESS CHICKS, INC. Privacy Policy

BUSINESS CHICKS, INC. Privacy Policy BUSINESS CHICKS, INC. Privacy Policy Welcome to businesschicks.com, the online and mobile service of Business Chicks, Inc. ( Company, we, or us ). Our Privacy Policy explains how we collect, use, disclose,

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS. Boston, MA 02110 Richmond, Virginia 23219 Tel. (617) 502.8238 Tel. (804) 783.7579

IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS. Boston, MA 02110 Richmond, Virginia 23219 Tel. (617) 502.8238 Tel. (804) 783.7579 IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS Daniel J. Blake, Esq. Vijay K. Mago, Esq. LeClairRyan, A Professional Corporation LeClairRyan, A Professional Corporation One International Place, Eleventh Floor

More information

ensurcloud Service Level Agreement (SLA)

ensurcloud Service Level Agreement (SLA) ensurcloud Service Level Agreement (SLA) Table of Contents ensurcloud Service Level Agreement 1. Overview... 3 1.1. Definitions and abbreviations... 3 2. Duties and Responsibilities... 5 2.1. Scope and

More information

HELP DESK MANAGEMENT PLAN

HELP DESK MANAGEMENT PLAN AT&T Help Desk Overview: DIR Platinum Customer Status AT&T is committed to continuous process improvement to meet DIR requirements and expectations, and to improve the end user experience. Today s process

More information

Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method

Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method R2 Critical Asset Identification R3 Critical Cyber Asset Identification Procedures and Evaluation

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

1. "Bill Payment" means our service that allows you to pay or transfer funds to designated Payee(s) in connection with our Home Banking Service.

1. Bill Payment means our service that allows you to pay or transfer funds to designated Payee(s) in connection with our Home Banking Service. I. HOME BANKING AND BILL PAYMENT SERVICES. This Home Banking Agreement ( Agreement ) is between Arizona Federal Credit Union (hereinafter we, us, our or Credit Union ), and each member who has enrolled

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.0 October 1, 2012 Procurement Group, Manufacturing Enhancement Center, Global Manufacturing Division Information Security Group,

More information

THIS ELECTRONIC DATA INTERCHANGE TRADING PARTNER AGREEMENT (the Agreement ) is made as of

THIS ELECTRONIC DATA INTERCHANGE TRADING PARTNER AGREEMENT (the Agreement ) is made as of ELECTRONIC DATA INTERCHANGE (EDI) TRADING PARTNER AGREEMENT THIS ELECTRONIC DATA INTERCHANGE TRADING PARTNER AGREEMENT (the Agreement ) is made as of (date) by and between HD Supply Facilities Maintenance

More information

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices

More information

Checklist. Standard for Medical Laboratory

Checklist. Standard for Medical Laboratory Checklist Standard for Medical Laboratory Name of hospital..name of Laboratory..... Name. Position / Title...... DD/MM/YY.Revision... 1. Organization and Management 1. Laboratory shall have the organizational

More information

Summary of CIP Version 5 Standards

Summary of CIP Version 5 Standards Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide Third Party Identity Services Assurance Framework Information Security Registered Assessors Program Guide Version 2.0 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work

More information

Contractor. Management

Contractor. Management Contractor Environment Health and Safety Management Best Practice (2007) A. INTRODUCTION Many construction Owners employ contract personnel for a wide range of activities, from administrative support to

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS 11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78

More information

Job Streaming User Guide

Job Streaming User Guide Job Streaming User Guide By TOPS Software, LLC Clearwater, Florida Document History Version Edition Date Document Software Trademark Copyright First Edition 08 2006 TOPS JS AA 3.2.1 The names of actual

More information

CONFIGURATION MANAGEMENT PLAN GUIDELINES

CONFIGURATION MANAGEMENT PLAN GUIDELINES I-680 SMART CARPOOL LANE PROJECT SYSTEM ENGINEERING MANAGEMENT PLAN CONFIGURATION MANAGEMENT PLAN GUIDELINE SECTIONS: PLAN GUIDELINES 1. GENERAL 2. ROLES AND RESPONSIBILITIES 3. CONFIGURATION MANAGEMENT

More information

REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the

REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the maintenance, retention and submission of electronic records.

More information

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

Copies of this document shall be classified either as Controlled or Uncontrolled, and shall be identified as such on the cover sheet.

Copies of this document shall be classified either as Controlled or Uncontrolled, and shall be identified as such on the cover sheet. INTRODUCTION This document describes an inspection system broken down into four separate levels. When Inspection Level IV is invoked, this system meets the requirements of former MIL-I-45208A. The primary

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

BT Assure DoS Mitigation UK

BT Assure DoS Mitigation UK BT Assure DoS Mitigation UK Annex to the Internet Connect UK Schedule Contents A note on we and you... 2 1. Service Summary... 2 2. Service Standard Components... 2 3. Service Options... 2 4. Service Management

More information

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director

More information

2.1 To define the backup strategy for systems and data within the Cape Winelands District Municipality (CWDM).

2.1 To define the backup strategy for systems and data within the Cape Winelands District Municipality (CWDM). BACKUP POLICY POLICY ADOPTED BY COUNCIL ON 25 APRIL 2012 AT ITEM C.14.3 POLICY AMENDED BY COUNCIL ON 24 APRIL 2014 AT ITEM C.14.1 Cape Winelands District Municipality Backup Policy 1. 1. INTRODUCTION Computer

More information

PBGC Information Security Policy

PBGC Information Security Policy PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.

More information

Backup Tab. User Guide

Backup Tab. User Guide Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...

More information

Cardholder Guide. Applying for a Card

Cardholder Guide. Applying for a Card Cardholder Guide Applying for a Card Corporate Purchasing Card Cardholder New Account Form needs to be filled out for every candidate with the appropriate department manager as well as the Comptroller's

More information

HIPAA Compliance Evaluation Report

HIPAA Compliance Evaluation Report Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 / 2012 R2 Hyper-V support...

More information

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT

More information

Internal Audit Checklist

Internal Audit Checklist Internal Audit Checklist 4.2 Policy Verify required elements Verify management commitment Verify available to the public Verify implementation by tracing links back to policy statement Check review/revisions

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT Delivering the as a service to users Maintaining the integrity of a solution and its ability to operate error-free despite changes in configuration, software versions, operating

More information