Minnesota State Colleges and Universities System Guideline Chapter 5 Administration
|
|
|
- Vernon Taylor
- 9 years ago
- Views:
Transcription
1 Minnesota State Colleges and Universities System Guideline Chapter 5 Administration Appropriate Use and Implementation of Electronic Part 1. Purpose. To establish requirements and responsibilities for acceptable use and implementation of electronic signatures. The requirements are designed to provide the appropriate level of security, authentication, and record integrity when implementing or using electronic signatures for transactions. Colleges and universities may adopt additional conditions of use, consistent with board policy, procedure, and this guideline. Part 2. Authority. Board policy delegates authority to the chancellor to develop system guidelines for purposes of implementing policy and procedure. Part 3. Definitions. Subpart A. Authentication. A verification that substantiates that a person is who the person says he or she is. Subpart B. Data. Information collected, stored, transferred, or reported for any purpose, whether in computers or in manual files. Data can include: financial transactions, lists, identifying information about people, projects, or processes, and information in the form of reports. Subpart C. Electronic Signature Manager (ESM). The ESM is appointed by the president at each college or university to carry out the duties associated with implementing electronic signature use on campus. Subpart D. ESM Group. The group of all college, university, and system office ESMs. This group will meet on a regular basis and manage the electronic signature process. Subpart E. Information Resources. Data collected, created, received, maintained, or disseminated by any Minnesota State Colleges and Universities user, regardless of its form, storage media, security classification, or conditions of use. Subpart F. Information Technology Resources. Facilities, technologies, and information resources used for system member information processing, transfer, storage, and communications, including but not limited to computer labs, classroom technologies, computing and electronic communications devices and services, such as modems, , networks, telephones (including cellular), voice mail, fax transmissions, video, multimedia, and instructional materials.
2 Subpart G. Transaction. The act or process of doing business with another person, company, agency, or entity. Page 2 Subpart H. Signature types. The following include expanded definitions from board policy, and related additional definitions of signature types: 1. Digital signature. A type of electronic signature produced by two linked keys, a private key used to sign, and a public key used to validate the signature. A digital signature is created when a person uses his or her private key to create a unique mark (called a signed hash ) on an electronic document. The method used to link the two keys is called cryptography. It is a mathematical method to encrypt and decrypt a message. 2. Multi-factor authentication. Any two or more combinations of authentication methods. Authentication method examples may include: password/passphrase (something you know), token, smart card, digital certificate (something you have), fingerprint, retina scan, etc. (something you are). Often one method of authentication is something you know such as a username/password and a second authentication method that is something you have such as a token or smart card. An everyday example of multi-factor authentication is using a bank ATM card (something you have) where you input the card followed by a PIN (something you know). Although biometrics are not widely used yet, they would be considered something you are. 3. Single-factor authentication. A security process that requires one method of authentication before granting access to the user, typically a username with a password. 4. Digitized signatures. A digitized signature means a graphic image of a handwritten signature in any digitized form, then that digital signature image is applied to a digital document. 5. Faxed/scanned signatures. A paper document with an original, handwritten signature(s) that is converted into a digital document. Part 4. Guidelines. Subpart A. Responsibilities. 1. College or university president responsibilities. The president of the college or university must appoint an electronic signature manager (ESM) to oversee responsibilities for their institution as defined in board policy and procedure. The ESM should be an individual with knowledge of the employees who are delegated the responsibilities for business and/or academic functions or processes of the college or university where electronic signatures will be used. 2. Electronic signature manager responsibilities. The ESM is responsible for overseeing and ensuring that implementation and proper use of electronic signature requirements are met at their institution. 3. Delegating electronic signature responsibilities. The ESM may appoint a designee or delegate responsibilities to other college or university managers, supervisors, or
3 Page 3 key personnel to implement and/or oversee electronic signature requirements. If responsibilities are delegated, the ESM must document who receives delegation, his/her title or job position, the date of the delegation, and the person s electronic signature responsibilities. The ESM retains overall responsibilities to ensure requirements are met by all designees or delegates. 4. Revoking electronic signature capabilities. The ESM or their designee(s) are responsible for revoking electronic signature capabilities for employees, contractors, or third-party entities that no longer are authorized to use electronic signatures. The revocation must be documented including the person s name, job title or position, and the revocation date. Subpart B. Implementation oversight and management. 1. Transaction categorization. ESMs or their designees will ensure processes are implemented for categorizing each transaction into one of the four transaction impact levels: Critical, High, Medium, or Low. A Transaction Category tool to help determine transaction categorization is available on the electronic signature SharePoint site, and is meant to document the selection process and provide consistency of the process across the system. The Transaction Category tool is owned by the ESM group and is expected to evolve as experience warrants. The FAQ document related to this guideline also provides guidance with regard to document categorization. The Transaction Category tool will guide an ESM through evaluation of transaction impact levels for financial, legal, and reputational risk. College and university ESMs may consider other factors when categorizing their transactions including the: relationships between the parties; value of the transaction; potential for fraud; unauthorized access to, modification of, loss, or corruption of protected data; and/or probability that a damaging event will occur. An ESM shall select the highest level impact category applicable to a transaction. 2. Assigning signature type. Based on the identified transaction impact level, the ESM or their designees will also approve and ensure that the type of signature selected for each transaction meets at least the minimum acceptable signature type as identified in Table A below. 3. Documenting transaction categorization. Once a transaction has been categorized and a minimum acceptable signature type has been assigned, it must be documented by the ESM with the transaction impact level: Critical, High, Medium, or Low, and with the minimum acceptable signature type. The table below can also be found in System Procedure Use of Electronic. 4. Identity verification for digital signature use. Before being given a digital signature, a person must have his/her identity verified through an approved identity vetting process. Self-proclaimed identification is prohibited and is not an approved identity verification.
4 Page 4 Transaction Impact Level Signature Type Original, Handwritten Digital Multi Factor Authentication Single Factor Authentication Digitized Faxed/Scanned Table A. Acceptable Signature Type Critical Impact High Impact Medium Impact Low Impact Yes Yes Yes Yes Yes Yes Yes Yes No Yes Yes Yes No No Yes Yes No No No Yes No No No Yes Subpart C. Technical implementation. ESMs are responsible for overseeing and ensuring that technical implementation requirements are met for electronic signature technologies in use at their institution. Business processes and/or electronic signature technologies must conform to the following requirements: 1. Consent to conduct business electronically. Both parties must agree to the use of electronic signatures for a transaction and users must be presented with language that informs them that an electronic signature is as legally binding as a handwritten signature. Users must affirm that they have read and understood this language. That affirmation must be part of the permanent record retained for the transaction. 2. Opt-Out. Users must be allowed to opt out of using an electronic signature and use a handwritten signature. 3. Reproduction of records. Electronically-signed records must contain all of the information necessary to reproduce the entire electronic record and all associated signatures in a format that permits the person viewing or printing the record to verify: a) the contents of the electronic record; b) the method used to sign the electronic record, if applicable, c) the full name of the person(s) signing the electronic record; and d) the date and time of each signature. 4. Transmission. After signing, a document must be transmitted in secure fashion to all parties in a format capable of being printed or stored. An electronic receipt or some form of electronic acknowledgement of a successful submission of the electronic record and signature must be provided.
5 Page 5 5. Alterations. If an electronically-signed document changes in any way, the document must indicate that it has been altered and that signatures affixed before alteration are now invalid. 6. Records retention. All electronically-signed documents must be retained in accordance with the applicable records retention schedule. 7. Audit capability. All electronic signature transactions must include audit capability. The requirements above may be met in different ways depending on the identified transaction impact level. Table B below illustrates acceptable examples for meeting the above requirements for each transaction impact level. Table B. Technical Implementation Requirements Consent Opt-Out Reproduce (cont d next pg) Critical High Medium Low Capture date and time Capture date and time Overall consent Overall consent of consent, with user of consent, with user form signed to form signed to ID and consent text. ID and consent text. cover all medium cover all low Capture date and time of opt out response with user ID and optout text. Contain all of the information necessary to reproduce the entire electronic record and all associated signatures in a format that permits the person viewing or printing the record to verify: a) the contents of the electronic record; b) the method used to sign the electronic record, if applicable; c) the full name of the person(s) signing the electronic record; and d) the date and time of each signature. Capture date and time of opt out response with user ID and optout text. Contain all of the information necessary to reproduce the entire electronic record and all associated signatures in a format that permits the person viewing or printing the record to verify: a) the contents of the electronic record; b) the method used to sign the electronic record, if applicable c) the full name of the person(s) signing the electronic record; and d) the date and time of each signature. transactions. Overall consent form will state the ability to opt out. Reply by electronic means can be used to opt-out. with signed document in unalterable format (i.e., PDF, JPEG) will be the reproducible record or the fields in the transactions. Overall consent form will state the ability to opt out. Reply by electronic means can be used to opt-out. with signed document will be the reproducible record or the
6 Page 6 Table B. Technical Implementation Requirements (cont d) Transmission Alteration Retention Audit Critical High Medium Low An electronic An electronic system receipt or some receipt or some or system log form of electronic form of electronic will acknowledgement acknowledgement acknowledge of a successful of a successful transmission. submission of the submission of the electronic record electronic record and signature must and signature must be provided. be provided. Cryptographic key is used to validate document has not been changed. All electronicallysigned documents must be retained in accordance with the applicable records retention schedule. Transaction audit log. Multi-factor product or process will be used to validate document has not changed. All electronicallysigned documents must be retained in accordance with the applicable records retention schedule. Transaction audit log. with the signed attachments in unalterable format (i.e. PDF, JPEG) or the Retained within system or a log or a system or system log will acknowledge transmission. with the signed attachments or the Retained within system or a log or a Subpart D. Training Colleges, universities, and the system office shall ensure that any employee involved in the administration or usage of electronic signatures receives appropriate training prior to use. At a minimum, refresher training must be conducted every three years or when a new or replacement electronic signature technology is implemented. ESMs are responsible for documenting training completion including the person s name, job title or position, and date of completion. Subpart E. User responsibilities. 1. Electronic signature users must not share or disclose any authentication information they use for signing transactions with any other person, including but not limited to digital signature private key, passwords, PINs, multi-factor tokens, and answers to security questions. 2. Reporting fraudulent activity. Users shall report any suspected or fraudulent activities related to electronic signatures in accordance with Board Policy 1C.2 Fraudulent or Other Dishonest Acts.
7 Page 7 Subpart F. Reviews 1. Frequency. At a minimum of every three years, the ESM shall reexamine the placement of transactions into one of the four designated categories with particular attention paid to continuing changes in technology and law. At a minimum of every three years, the ESM shall also determine the appropriate signature type for transactions, consistent with Table A above. The ESM shall document the review and any changes. At a minimum of every three years, the System Chief Information Officer shall facilitate a reassessment to determine the appropriate electronic signature technologies for each transaction category. 2. Revocation of approved technologies. In the event it is determined that an approved electronic signature technology is no longer trustworthy, the System Chief Information Officer may revoke approval of that signature technology at any time. 3. Transition. If an electronic signature technology is currently being used that has not been approved by the System Chief Information Officer, migration to an approved electronic signature technology must be completed within one (1) year. A request for an exception may be submitted to the System Chief Information Officer for consideration on a case-by-case basis. 4. Notarization. If a document or transaction requires notarization, electronic signatures along with the notarial stamp may be used to sign the documents or transactions in accordance with applicable laws and state statutes. 5. Use of a third-party s electronic signature technology. The use of any third-party electronic signature technology must conform to all requirements set forth in policy and procedure. Date of implementation: 12/09/15, Date of adoption: 12/09/15, Date of last review: Date and Subject of Revision:
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Procedures associated with Board Policy 5.22
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Procedures associated with Board Policy 5.22 5.25.1 Use of Electronic Part 1. Purpose. This procedure establishes requirements
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS
ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS June 2015 Purpose The Electronic Signatures in Global and National Commerce (ESIGN) Act (15 U.S.C. 7001-7006), enacted in 2000, permits, but does not require,
Full Compliance Contents
Full Compliance for and EU Annex 11 With the regulation support of Contents 1. Introduction 2 2. The regulations 2 3. FDA 3 Subpart B Electronic records 3 Subpart C Electronic Signatures 9 4. EU GMP Annex
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
Self-Assessment of eresearch Compliance with 21 CFR Part 11, Electronic Record; Electronic Signatures
Self-Assessment of eresearch Compliance with 21 CFR Part 11, Electronic Record; Electronic Signatures Subpart A General Provisions Sec. 11.1 Scope. (a) The regulations in this part set forth the criteria
21 CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES 21.11.2013. 21 CFR Part 11 Compliance PLA 2.1
21 CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Compliance of PLA 2.1 21.11.2013 21 CFR Part 11 Compliance PLA 2.1 SEC. 11.2 IMPLEMENTATION. (a) For records required to be maintained but not submitted
Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
ELECTRONIC SIGNATURES
ELECTRONIC SIGNATURES Sarah McGee Assistant General Counsel Jim Nelson Security Risk Analyst Kathy Hanon System Office Budget Director The Minnesota State Colleges and Universities system is an Equal Opportunity
New York State Electronic Signatures and Records Act
PIANY Doc. No. 31174 New York State Electronic Signatures and Records Act The information contained within this Resource kit was made available by the New York State Department of State Division of Administrative
Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements
/ WHITE PAPER Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements The 21 CFR Part 11 rule states that the FDA view is that the risks of falsification, misinterpretation,
Business Issues in the implementation of Digital signatures
Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions
State of Arizona Policy Authority Office of the Secretary of State
SIGNATURE DYNAMICS ELECTRONIC SIGNING POLICY for electronic signature use version as of April 25, 2001 the current version may be found at http://www.sos.state.az.us/pa/default.htm State of Arizona Policy
White Paper. The E-Sign Act. Use and enforceability of identifiers, passwords and personal identification numbers as signatures
White Paper The E-Sign Act Use and enforceability of identifiers, passwords and personal identification numbers as signatures 1 Table of Contents Introduction 2 The Audit Confirmation Process 2 The Confirm
Administrative Guidelines for the Use of Electronic Signatures
Administrative Guidelines for the Use of Electronic s I. Introduction II. Scope & Applicability III. Electronic Acceptance & Use IV. E- Approval V. Implementation and Security Procedures VI. Misuse of
Authentication of Documents/Use of Professional Stamps
Authentication of Documents/Use of Professional Stamps 1 Introduction The intention of this guideline is to amplify and clarify requirements for authentication of documents and use of the stamp, based
Building a Digital Signature to Meet State Statute Requirements Using a Certificate Authority. Adobe Acrobat Pro DC (Released July 2015)
DIGITAL SIGNATURES eplans REVIEW Building a Digital Signature to Meet State Statute Requirements Using a Certificate Authority Adobe Acrobat Pro DC (Released July 2015) 8 12 15 DIGITAL SEAL AND SIGNATURE
ELECTRONIC DOCUMENTS A Board Interpretative Guideline
STATE OF WASHINGTON BOARD OF REGISTRATION FOR PROFESSIONAL ENGINEERS AND LAND SURVEYORS P.O BOX 9025 OLYMPIA, WASHINGTION 98507 June 30, 2015 ELECTRONIC DOCUMENTS A Board Interpretative Guideline To help
U.S. DEPARTMENT OF EDUCATION
U.S. DEPARTMENT OF EDUCATION STANDARDS FOR ELECTRONIC SIGNATURES IN ELECTRONIC STUDENT LOAN TRANSACTIONS April 30, 2001 (Revised as of July 25, 2001) PURPOSE This document establishes standards regarding
InfinityQS SPC Quality System & FDA s 21 CFR Part 11 Requirements
InfinityQS SPC Quality System & FDA s 21 CFR Part 11 Requirements www.infinityqs.com Copyright InfinityQS International Table of Contents Overview... FDA s 21 CFR Part 11 Requirements... PART 11 ELECTRONIC
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
Internet Banking Internal Control Questionnaire
Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?
21 CFR Part 11 Implementation Spectrum ES
21 CFR Part 11 Implementation Spectrum ES INFRARED SPECTROSCOPY T E C H N I C A L N O T E Introduction Compliance with 21 CFR Part 11 is mandatory for pharmaceutical companies and their suppliers to sell
Arkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
Compliance Matrix for 21 CFR Part 11: Electronic Records
Compliance Matrix for 21 CFR Part 11: Electronic Records Philip E. Plantz, PhD, Applications Manager David Kremer, Senior Software Engineer Application Note SL-AN-27 Revision A Provided By: Microtrac,
January 30, 2014 Mortgagee Letter 2014-03
U.S. DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT WASHINGTON, DC 20410-8000 ASSISTANT SECRETARY FOR HOUSING- FEDERAL HOUSING COMMISSIONER January 30, 2014 Mortgagee Letter 2014-03 To: All FHA-Approved Mortgagees
Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device industries
White Paper No 01 I December 2010 Implementation of 21 CFR Part 11 in the epmotion Software Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device
InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures
InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures Overview One of the most popular applications of InfoCenter Suite is to help FDA regulated companies comply with
BUSINESS ONLINE BANKING AGREEMENT
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
ELECTRONIC SIGNATURES AND ELECTRONICALLY SIGNED RECORDS
1600 9th Street, Sacramento, CA 95814 (916) 654-2309 DMH LETTER NO.: 08-10 TO: SUBJECT: LOCAL MENTAL HEALTH DIRECTORS LOCAL MENTAL HEALTH PROGRAM CHIEFS LOCAL MENTAL HEALTH ADMINISTRATORS COUNTY ADMINISTRATIVE
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 141 PURPOSE (CT-IM-112; 07-30-2010) (Office of Origin: IRM/OPS/ITI/SI/IIB) The purpose of this FAM chapter is to enable the Department to
GlobalSign Subscriber Agreement for DocumentSign Digital ID for Adobe Certified Document Services (CDS)
GlobalSign Subscriber Agreement for DocumentSign Digital ID for Adobe Certified Document Services (CDS) Version 1.1 PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE DIGITAL CERTIFICATE ISSUED TO YOU
2.0 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS (PCI-DSS)
CSU, Chico Credit Card Handling Security Standard Effective Date: July 28, 2015 1.0 INTRODUCTION This standard provides guidance to ensure that credit card acceptance and ecommerce processes comply with
The Impact of 21 CFR Part 11 on Product Development
The Impact of 21 CFR Part 11 on Product Development Product development has become an increasingly critical factor in highly-regulated life sciences industries. Biotechnology, medical device, and pharmaceutical
L@Wtrust Class 3 Registration Authority Charter
Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM Effective May 1, 2009 Because [FACILITY NAME] offers and maintains covered accounts, as defined by 16 C.F.R. Part 681 (the Regulations ), [FACILITY NAME]
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
The Virginia Electronic Notarization Assurance Standard
The Virginia Electronic Notarization Assurance Standard Published by Secretary of the Commonwealth Richmond, Virginia January 1, 01 Version 1.0 Table of Contents Scope and Intent... 1 Definitions... Article
LET S ENCRYPT SUBSCRIBER AGREEMENT
Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf
Electronic Signatures: A New Opportunity for Growth. May 10, 2005
Electronic Signatures: A New Opportunity for Growth May 10, 2005 1 Contents Is It Legal? 3 E-Signature Technology 12 Another Industry Example 15 National Association for Variable Annuities Applications
Authentication of Documents. Use of Professional Seals
Authentication of Documents Use of Professional Seals Table of Contents Introduction 1 Definitions 2 1 Concepts and Principles of Authentication 4 1.1 Principles 4 1.2 Purpose of the Seal 4 1.3 Obtaining
Electronic Submission of Medical Documentation (esmd) CDA Digital Signatures. January 8, 2013
Electronic Submission of Medical Documentation (esmd) CDA Digital Signatures January 8, 2013 Wet Signatures Standards and legal standing Standards are based on legal precedence Non-repudiation inherent
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
Implementation of 21CFR11 Features in Micromeritics Software Software ID
Implementation of 21CFR11 Features in Micromeritics Software Software ID PART 11 ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Subpart A General Provisions Sec. 11.1 Scope. 11.2 Implementation. 11.3 Definitions.
Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system.
21 CRF 11 Electronic Records and Signatures Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system. By Todd Duell What does Title 21 of the Code of Federal
DEA's New Proposed Regulations For E-Prescribing
Portfolio Media, Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 [email protected] DEA's New Proposed Regulations For E-Prescribing
A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or
SBA Procedural Notice TO: All SBA Employees CONTROL NO.: 5000-1323 SUBJECT: Acceptance of Electronic Signatures in the 7(a) and 504 Loan Program EFFECTIVE: 10/21/14 The purpose of this Notice is to inform
CHAPTER 16 ELECTRONIC DOCUMENT MANAGEMENT SYSTEM
CHAPTER 16 ELECTRONIC DOCUMENT MANAGEMENT SYSTEM 621 16.1(20) Effective Date, Scope, and Authority. This chapter governs the filing of all documents in adjudicatory proceedings before PERB commenced on
HKUST CA. Certification Practice Statement
HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of
Online Lead Generation: Data Security Best Practices
Online Lead Generation: Data Security Best Practices Released September 2009 The IAB Online Lead Generation Committee has developed these Best Practices. About the IAB Online Lead Generation Committee:
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
SUBSCRIBER PRIVACY NOTICE
PRIVACY AND SECURITY NewWave will provide you with a copy of its privacy notice at the time Service is installed, and annually afterwards, or as otherwise permitted by law. Customer can view the most current
Digital Signatures For Engineering Documents
OREGON DEPARTMENT OF TRANSPORTATION Technical Services Traffic-Roadway Section Geometronics Unit 200 Hawthorne Avenue S.E. Suite B250 Salem, OR 97310 (503) 986-3103 Ron Singh, PLS Geometronics Manager
Ford Motor Company CA Certification Practice Statement
Certification Practice Statement Date: February 21, 2008 Version: 1.0.1 Table of Contents Document History... 1 Acknowledgments... 1 1. Introduction... 2 1.1 Overview... 3 1.2 Ford Motor Company Certificate
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline 5.23.1.4 Information Security Incident Response
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Information Security Incident Response Part 1. Purpose. This guideline establishes the minimum requirements for Information
FILEHOLD DOCUMENT MANAGEMENT SYSTEM 21 CFR PART 11 COMPLIANCE WHITE PAPER
FILEHOLD DOCUMENT MANAGEMENT SYSTEM 21 CFR PART 11 COMPLIANCE WHITE PAPER Copyright 2012 FileHold Systems Inc. All rights reserved. For further information about this manual or other FileHold Systems products,
Frequently Asked Questions on FFIEC Guidance on Authentication in an Internet Banking Environment. August 15, 2006
Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation National Credit Union Administration Office of the Comptroller of the Currency Office of Thrift Supervision Frequently
Adobe PDF for electronic records
White Paper Adobe PDF for electronic records Digital signatures and PDF combine for definitive electronic records and transactions Contents 1 PDF and electronic records 2 Digital certification 3 Validating
Electronic Signature, Attestation, and Authorship
Electronic Signature, Attestation, and Authorship Appendix C: Electronic Signature Model Policy This template document is not intended for adoption as a substitute for a customized organizational policy
CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number 95.51 PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9.
95.5 of 9. PURPOSE.. To establish a policy that outlines the requirements for compliance to the Payment Card Industry Data Security Standards (PCI-DSS). Compliance with this standard is a condition of
Tools to Aid in 21 CFR Part 11 Compliance with EZChrom Elite Chromatography Data System. White Paper. By Frank Tontala
Tools to Aid in 21 CFR Part 11 Compliance with EZChrom Elite Chromatography Data System White Paper By Frank Tontala Agilent Technologies Software & Informatics Life Sciences & Chemical Analysis Group
APGO GUIDANCE ON DOCUMENT AUTHENTICATION. Table of Contents
1.0 Introduction Table of Contents 2.0 Document Authentication: The Basics 2.1 The Purpose of the Seal 2.2 The Practice of Authentication 3.0 Document Authentication: Application 3.1 The Authentication
CREDIT CARD SECURITY POLICY PCI DSS 2.0
Responsible University Official: University Compliance Officer Responsible Office: Business Office Reviewed Date: 10/29/2012 CREDIT CARD SECURITY POLICY PCI DSS 2.0 Introduction and Scope Introduction
Issues to Address: The Privacy Concerns of Individuals
July 21, 2009 The Honorable Michael J. Astrue Commissioner Social Security Administration 6401 Security Boulevard Baltimore, MD 21235-7703 Dear Mike: As you requested, the ABA explored the issues related
Troy Cablevision, Inc. Subscriber Privacy Policy
Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. ( Troy Cable ) is committed to protecting and securely maintaining our customers privacy. The following privacy policy applies to
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
rsdm and 21 CFR Part 11
rsdm and 21 CFR Part 11 Meeting the 21 CFR Part 11 Burden without Overburdening The right solutions for smaller biopharma. Nothing more. Nothing less. Prepared by: Ken VanLuvanee www.virtualregulatorysolutions.com
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data
PCI Training for Retail Jamboree Staff Volunteers Securing Cardholder Data Securing Cardholder Data Introduction This PowerPoint presentation is designed to educate Retail Jamboree Staff volunteers on
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Article. Electronic Notary Practices. Copyright Topaz Systems Inc. All rights reserved.
Article Electronic Notary Practices Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents Key Features and
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
INSTRUCTIONS FOR COMPLETING THE USPTO CERTIFICATE ACTION FORM
INSTRUCTIONS FOR COMPLETING THE USPTO CERTIFICATE ACTION FORM The completed form should be sent to: Box EBC Washington D.C.20231 Block 1- Requestor Status The Certificate requester should check the appropriate
Identity and Access Management Policy
Page 1 of 5 Identity and Access Management Policy Reference number 0605-IAM Interim HEMIS Classification 0605 Purpose Date of implementation 1 December 2012 Review date Previous reviews Policy owner Policy
REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A.
REGISTRATION AUTHORITY (RA) POLICY Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. INDEX Contenido 1. LEGAL FRAMEWORK... 4 1.1. Legal Base...
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Record Keeping. Guide to the Standard for Professional Practice. 2013 College of Physiotherapists of Ontario
Record Keeping Guide to the Standard for Professional Practice 2013 College of Physiotherapists of Ontario March 7, 2013 Record Keeping Records tell a patient s story. The record should document for the
