Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
|
|
|
- Eugenia Lynch
- 9 years ago
- Views:
Transcription
1 Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11
2 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2 of 11
3 Introduction Delphi security policies cover the management of security for both Delphi internal operations as well as the services Delphi provides to its customers. The Delphi Information Security policy applies to all Delphi employees. The policies are confidential information and are not available for review by Customer or third parties. However, brief summaries of certain Delphi security policies relevant to the engagement of Third Party Service Providers are provided below. This document summarizes the security policies and practices required by Delphi from Third Party companies providing services that include: The creation of, purchase of, or right to use software, web application, IT utilities, and/or hardware OR the capture, storage, or transfer of Delphi data, whether standalone by the supplier, between Delphi and the supplier, or between third parties Lack of inclusion or omission of a particular subject in this summary does not eliminate oversight and responsibility on behalf of the Third Party, and they are expected to exercise due care and sound judgment, and recognize potential Information Security concerns or risks. Delphi expects evidence ensuring these policies and requirements are met will be provided upon request Any awareness of an information security concern, or any doubt or question with respect to information security guidance or practices, should be immediately directed to the Delphi Information Security Team at [email protected]. Page 3 of 11
4 Summary for All Users Delphi computing and data communications are valuable and limited resources that serve a large number and variety of users. (NOTE: A user is any Delphi person, including: permanent/fulltime employees, temporary employees, contractors, and any other individual that is working with or on behalf of Delphi, and/or has access to Delphi information or resources.) All users have the responsibility to make use of these resources in an efficient, ethical, and legal manner. These policies apply to all users of Delphi information globally, including visitors, contractors, suppliers and employees. These policies also apply to all information systems owned, contracted, leased or operated for or by Delphi, connected to the Delphi network, or used to process, stored or transfer Delphi data. Delphi reserves the right to scan and monitor system access and use. Delphi s computer and network services provide access to resources both within and outside the Delphi environment. These services must be used in a manner consistent with the mission and objectives of Delphi and with the purpose for which such use was intended. Such open access is a privilege, and imposes upon users certain responsibilities and obligations. Access to Delphi's computers and network services is granted subject to Delphi policies, and applicable laws. Acceptable use is always ethical, reflects professional integrity, and shows restraint in the consumption of shared resources. It demonstrates respect for intellectual property, protection of sensitive information, ownership of data, copyright laws, system security mechanisms, and individuals' rights to privacy and to freedom from intimidation and harassment. All activities inconsistent with these objectives are considered to be inappropriate and may jeopardize continued use of computing facilities and networks. In consideration of being allowed to use the Delphi computer and network services ("Resources"), all users must understand and agree to the following: 1. Users shall not use the Resources for any illegal activity or for any activity prohibited by this policy (see subsequent examples of inappropriate conduct that is prohibited). 2. Users agree not to use the Resources to infringe upon or otherwise impair, interfere with or violate any copyright or other intellectual property rights of another. This pertains to all Page 4 of 11
5 Delphi intellectual property as well as copyrighted material, including, but not limited to music, video and software. 3. Users shall avoid any action that interferes with the efficient operation of the Resources or impedes the flow of information necessary for conduct of Delphi business. 4. Users shall protect their computer resources such as ID, logins and systems from unauthorized use. Users are responsible for reasonably securing their computer, including implementing such protections as logins to prohibit unauthorized use. 5. Users will access only information that is their own, or to which their access has been authorized. Users will only access networks, network resources, and information for their intended use. Examples of Inappropriate Use of Resources include, but are not limited to: Accessing another person's computer, computer account, files, or data without permission. Using the Delphi network to gain unauthorized access to any computer system. Using any means to decode or otherwise obtain restricted passwords or access control information. Attempting to circumvent or subvert system or network security measures. Examples include creating or running programs that are designed to identify security loopholes, to decrypt intentionally secured data, or to gain unauthorized access to any system. Engaging in any activity that might be purposefully harmful to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, damaging files or making unauthorized modifications to Delphi data. Performing any act, intentionally or otherwise, that will interfere with the normal operation of computers, peripherals, or networks. Making or using illegal copies of copyrighted software, storing such copies on Delphi systems, or transmitting them over Delphi networks. Harassing or intimidating others via electronic mail, news groups or Web pages. Initiating or propagating electronic chain letters. Initiating or facilitating in any way mass unsolicited and unofficial electronic mailing (e.g., "spamming", "flooding", or "bombing."). Forging the identity of a user or machine in an electronic communication. Page 5 of 11
6 Saturating network or computer resources to the exclusion of another's use, for example, overloading the network with traffic such as s, excessive file backup/archive, or malicious (denial of service attack) activities. Using Delphi systems or networks for personal gain; for example, by selling access to your ID or to Delphi systems or networks, or by performing work for profit with Delphi resources in a manner not authorized. Engaging in any other activity that does not comply with the general principles presented above. Page 6 of 11
7 Vendor Assessment Considerations The following list intends to serve as considerations for assessing the risks associated with service providers information technology practices, processes and controls. It is based on the ISO framework and presents a list of expectations for each of the ISO domains. While the specific controls and requirements can vary considerably with the nature or scope of the service, the following serves as a foundation to understand and manage the service providers risks. The specific controls and amount of evidence required around those controls can also vary considerably with the nature and scope of the service provided, and will be determined on a case by case basis. Domain: Security Policy Domain: Organization of Information Security All vendors and Service Providers should have and adhere to a written and comprehensive set of information security policy documents, which act as the rules and guidelines for dealing with the protection of information and information assets. Security policy Procedures and/or standards supporting the policy Document update schedule Evidence of policy review Audit report of security policy A management framework should be established to initiate and control the implementation of information security within the Service Provider s organization. Domain: Asset Management The Service Provider should have a process to review all dependent Service Providers security policies and procedures to ensure that appropriate security language is incorporated into all third-party agreements. Information security organization chart (including where information security resides in the organization) Roles and responsibilities Job descriptions Overview of access administration process and procedures Third-party security reviews/assessments Due diligence performed on third parties Service Providers should have in place an Page 7 of 11
8 appropriate asset control policy structure, including appropriate ownership, management, licensing and other controls that address the following asset types: information assets, software assets, physical assets, and services. Domain: Human Resources Security The information and materials processed, stored or transmitted by the Service Provider should be handled in accordance with the classification (e.g., confidential, sensitive, public) of the information. Asset control policy Data classification policy Service Providers should have and adhere to policies and procedures in place to perform background checks for those individuals who will be administering systems or have access to Receiver Company information. These policies and procedures should ensure that personnel responsible for design, development, implementation and operation are qualified to fulfill their responsibilities. Domain: Physical and Environmental Security Domain: Communications and Operations Management All employees of the Service Provider s organization, and where relevant, third-party users, should be made aware of informationsecurity threats and concerns, and should be equipped to support the organizational security policy in the course of their normal work. Employment policy Non-disclosure agreements Background check documents for staff supporting very sensitive services or data Business information processing, storage or distribution facilities should be housed in secure areas, protected by a defined security perimeter, with appropriate security barriers and entry controls. Facilities should be physically protected from unauthorized access, damage and interference. Access should be logged and logs should be securely maintained. Equipment should be physically protected from security threats and environmental hazards in order to prevent loss, damage or compromise of assets and interruption to business activities. Floor plan Badge control policy Physical access logging policy Copy of insurance declaration pages Responsibilities and procedures for the management and operation of all information- Page 8 of 11
9 processing facilities should be established and adhered to. This includes the development of appropriate operating instructions, and change control and incident-response procedures. Segregation of duties and environments development, testing, staging, and production should be implemented where appropriate to reduce the risk of negligent, inadvertent or deliberate misuse of information-processing facilities and systems. Domain: Access Control Controls should be in place to prevent and detect the introduction and dissemination of malicious software. Recovery plans should be prepared, updated and tested regularly. Routine backup procedures should be established and adhered to for carrying out the agreed backup strategy, such as taking backup copies of data, rehearsing their timely restoration, logging events and faults, and, where appropriate, monitoring the equipment environment. Network diagram Dataflow diagram SOPs (standard operating procedures) Desktop procedures Operations (network, processing) and incident response team organization charts Office/employee awareness materials and corporate policies Evidence of frequency of awareness plans Change control manual System and network outage and capacity utilization records Incident-identification and response records Test plans and results Third-party due diligence records and contracts Planning and acceptance records Service Providers should have and adhere to a documented policy to ensure that only properly approved users are granted access to systems and assets. Users should be granted access on a need-to-know basis, according to job responsibilities. The access-control policy should employ methods designed to physically and logically restrict access to equipment, ensure the identification and authentication of individuals who access computing resources, and restrict an individual s access to information once the individual has accessed a system. Depending on the level of protection required (based on the asset classification); a combination of accesscontrol techniques may need to be employed. Users should be aware of their responsibilities for maintaining effective access controls, particularly Page 9 of 11
10 as they relate to password security and user equipment. Service Providers should have a written authorized user accountability policy that incorporates authentication standards and clearly articulates user responsibilities. Security policy with access policy User policy and network access controls Network architecture diagram (including placement of firewalls) Application access control procedures Dataflow diagram Domain: Information Systems Acquisition, Development and Maintenance Domain: Information Security Incident Management Domain: Business Continuity Management Service Providers should have and adhere to an established process for developing secure infrastructure, systems, and/or applications. Programs written should be certified as free from malicious code and patent-infringement issues and appropriate for use. The programs should also be protected from unauthorized copy, use, duplication, and storage, with asset-management requirements specified. Service Providers should ensure all proposed system changes are reviewed and tested to be sure they do not compromise the security of either the system or the operating environment. Application security policy Network diagram Dataflow diagram Change control policy Programming standard and guidelines Certifications of encryption algorithms Documentation of security reviews of application code Vulnerability assessments of application and environment Security events and weaknesses associated with information systems are communicated in a manner allowing timely corrective action to be taken. A consistent and effective approach is applied to the management of information security incidents. Incident and response policies Log of incidents with evidence of investigation procedures and results Service Providers are expected to have comprehensive business continuity plans, including having technology solutions that ensure recovery of services to during a time of business interruption. These plans should be tested at Page 10 of 11
11 Domain: Compliance least annually and results of the tests should be made available. The Service Provider is responsible for ensuring its suppliers have business continuity programs and that those plans are included in recovery testing Business continuity plan Technology recovery plan(s) Testing schedule Latest test results or generic test results Contract Copy of insurance declaration pages Service Providers should establish and adhere to policies to ensure compliance with applicable legal and regulatory requirements. These regulatory requirements should reflect any international environments that must be accommodated based on processing locations. Information systems should be audited regularly for compliance with the Service Provider s security policies and standards. Third-party assessment reports Regulatory reports Annual reports (if a publicly traded company) Financial statements for prior two years (audited, if available) Page 11 of 11
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
REGION 19 HEAD START. Acceptable Use Policy
REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
Draft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
Acceptable Use Policy
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
Acceptable Use Policy
Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
How To Use A College Computer System Safely
1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Indiana University of Pennsylvania Information Assurance Guidelines. Approved by the Technology Utilities Council 27-SEP-2002
Indiana University of Pennsylvania Information Assurance Guidelines Approved by the Technology Utilities Council 27-SEP-2002 1 Purpose... 2 1.1 Introduction... 2 1.1.1 General Information...2 1.1.2 Objectives...
Hyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Acceptable Use Policy
Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
All Users of DCRI Computing Equipment and Network Resources
July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform
Page 1 of 10. TITLE: Network Usage Policy STATEMENT OF PURPOSE: Policy Number: AM-RM-010
Page 1 of 10 TITLE: Network Usage Policy STATEMENT OF PURPOSE: Policy Number: AM-RM-010 This document constitutes an Organization-wide policy intended to allow for the proper use of all Neighbor To Family
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
COMPUTER NETWORK FOR EDUCATION
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
APHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
Information Shield Solution Matrix for CIP Security Standards
Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks
MAINE COMMUNITY COLLEGE SYSTEM GENERAL ADMINISTRATION Section 203 SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks As with any college
ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
INFORMATION SYSTEM GENERAL USAGE POLICY
PURPOSE The Information System General Usage Policy ("Policy") establishes appropriate uses of Devon s Information Systems. Devon provides secure Information Systems in accordance with the Information
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
Acceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services
Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.
Abstract This paper addresses the methods and methodologies required to develop a corporate security policy that will effectively protect a company's assets. Date: January 1, 2000 Authors: J.D. Smith,
TELEFÓNICA UK LTD. Introduction to Security Policy
TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
State HIPAA Security Policy State of Connecticut
Health Insurance Portability and Accountability Act State HIPAA Security Policy State of Connecticut Release 2.0 November 30 th, 2004 Table of Contents Executive Summary... 1 Policy Definitions... 3 1.
State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.
Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
ISO 27002:2013 Version Change Summary
Information Shield www.informationshield.com 888.641.0500 [email protected] Information Security Policies Made Easy ISO 27002:2013 Version Change Summary This table highlights the control category
INFORMATION SECURITY California Maritime Academy
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California Maritime Academy Audit Report 14-54 April 8, 2015 Senior Director: Mike Caldera IT Audit Manager:
Hengtian Information Security White Paper
Hengtian Information Security White Paper March, 2012 Contents Overview... 1 1. Security Policy... 2 2. Organization of information security... 2 3. Asset management... 3 4. Human Resources Security...
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
JHSPH Acceptable Use Policy
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
AASTMT Acceptable Use Policy
AASTMT Acceptable Use Policy Classification Information Security Version 1.0 Status Not Active Prepared Department Computer Networks and Data Center Approved Authority AASTMT Presidency Release Date 19/4/2015
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Star has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Star s Broadband Internet
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
Information Security Policy Manual
Information Security Policy Manual Latest Revision: May 16, 2012 1 Table of Contents Information Security Policy Manual... 3 Contact... 4 Enforcement... 4 Policies And Related Procedures... 5 1. ACCEPTABLE
BUDGET LETTER 05-03 PEER-TO-PEER FILE SHARING 4841.1, 4841.2, EXECUTIVE ORDER S-16-04
BUDGET LETTER SUBJECT: PEER-TO-PEER FILE SHARING REFERENCES: STATE ADMINISTRATIVE MANUAL SECTIONS 4819.2, 4840.4, 4841.1, 4841.2, EXECUTIVE ORDER S-16-04 NUMBER: 05-03 DATE ISSUED: March 7, 2005 SUPERSEDES:
POLICY 4526. Adopted by Board of Education: 4/20/05
POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
