Using Technology Control Plans in Export Compliance. Mary Beran, Georgia Tech David Brady, Virginia Tech
|
|
|
- Rosemary Glenn
- 10 years ago
- Views:
Transcription
1 Using Technology Control Plans in Export Compliance Mary Beran, Georgia Tech David Brady, Virginia Tech
2 What is a Technology Control Plan (TCP)? The purpose of a TCP is to control the access and dissemination of export controlled information, materials, technology, data, etc. in accordance with federal export regulations. TCP ensures that everyone working on project understand their obligations under the export control laws and regulations.
3 Authority: TCP Required The National Industrial Security Program Operating Manual (NISPOM) specifies: A Technology Control Plan is required to control access by foreign nationals assigned to, or employed by, cleared contractor facilities unless the CSA [Cognizant Security Agency] determines that procedures already in place at the contractor s facility are adequate. The TCP shall contain procedures to control access for all export-controlled information. (Emphasis Added) International Traffic in Arms Regulations (ITAR) 22CFR (c) also encourages use of a Technology Control Plan (TCP): In cases when foreign nationals are employed at or assigned to securitycleared facilities, provision by the applicant of a Technology Control Plan (available from the Defense Investigative Service) will facilitate processing.
4 Authority continued US Department of Commerce - Export Administration Act (EAA) and EAR Commerce Control List (CCL) -15 CFR US Department of Energy & Nuclear Regulatory Commission regulations -10 CFR 810, 110, 205 US Department of the Treasury - Office of Foreign Assets Control (OFAC) International Export Regulations & Requirements Institutional Policy Requirements
5 Elements of a Technology Control Plan Institutional Commitment Commodity jurisdiction and classification Physical security Information security Project personnel requirements
6 Elements of a Technology Control Plan Inspections Restricted research training Accountability Recordkeeping Violations and investigations Student and Publication Issues
7 Institutional Commitment Required in ITAR Registration Required in Voluntary Disclosure submissions Recommended key element of Export Compliance Management Plan
8 Commodity Jurisdiction and Classification Determine with sponsor, investigators what is controlled and what is not? Determine who has jurisdiction? Obtain a CJ if there is doubt Document export jurisdiction and classification clearly in the TCP
9 Commodity Jurisdiction and Classification Best Practices If doubt exists-obtain the CJ ITAR until proven innocent If self classifying: Review USML and Review contract Discuss with sponsor and PI If not ITAR/DoE, review the CCL
10 Physical Security
11 Physical Security Best Practices One lock principle Restricted work area Open/closed storage Access control and key custody Visitor control/ lab tours Available guidance
12 One Lock Principle There are no regulations specifying required security controls for unclassified export controlled items Design physical and IT security to be a minimum of one lock away from an inadvertent export without license Passwords, keys, etc. May need multiple locks depending on the items controlled and the foreign persons who may obtain unauthorized access
13 Restricted Work Area When it is necessary to control access to export controlled material in an open area during working hours, a restricted area may be established. A restricted area will normally become necessary when it is impractical or impossible to protect export controlled material because of its size, quantity or other unusual characteristic. The restricted area shall have a clearly defined perimeter, but physical barriers are not required. Personnel within the area shall be responsible for challenging all persons who may lack appropriate access authority. [modified from NISPOM 5-305]
14 Open vs. Closed Storage Closed storage: the items can be locked in a secure container (cabinet, safe, drawer) preferred (two locks- door and container) Open storage: the items cannot be stored in a secure container when not in use Less preferred, greater risk of inadvertent violation More security precautions necessary
15 Access Control and Key Custody Access log Key control Manual Electronic (preferred) No piggyback policy! Visitor control Login/logout Escorted Third party access control (e.g., custodians, maintenance, building mgt) Inspection of bags and parcels, electronic storage media
16 Visit Control and Lab Tours No visual or oral disclosure of controlled items If items cannot be secured during visit- policy of denial when: Deemed export/ defense service risk Not approved by contract or sponsor No need to know DoDI Security of Unclassified DoD Information on Non-DoD Information Systems (June 12, 2012) Proposed DFAR Safeguarding Unclassified Information Rule (June 29, 2011) Restricted party & nationality screen Include CV/ Visa review Acknowledge TCP and sign NDA
17 Available Guidance National Industrial Security Program Operating Manual (NISPOM DoD M Feb 2006) DDTC Compliance Program Guidelines BIS Deemed Exports Webinar DoDI Security of Unclassified DoD Information on Non-DoD Information Systems (June 12, 2012) Proposed DFAR Safeguarding Unclassified Information Rule (June 29, 2011)
18 Information Security
19 Information Security Best Practices NO data storage on personal computers!!! NO cloud exchange or file servers NO data storage or backup on shared servers unless approved by Research Security NO use of unsecured file sharing programs (sharepoints) unless approved by Research Security
20 Information Security Best Practices Greater security measures for networked machines Request that your department IT administrator review the TCP and help setup computers and data storage devices, Research Security can advise Basic safeguarding checklist: e.g., antivirus checks, firewall enabled, session lock, audit logs, file encryption Strong Passwords: #id
21 Information Security Best Practices Must have dedicated data storage devices (computers/portable hard drives/etc.), these will be wiped or dispositioned at conclusion of project Solid state ( flash ) drives must be destroyed, cannot be wiped If portable, must encrypt s of technical data must be encrypted (PGP, VT Soft Certificate, etc.) PI must maintain a list of computers and data storage devices used in the restricted research project, these machines will get higher level security monitoring
22 Available Guidance National Industrial Security Program Operating Manual (NISPOM DoD M Feb 2006) DoDI Security of Unclassified DoD Information on Non-DoD Information Systems (June 12, 2012) Proposed DFAR Safeguarding Unclassified Information Rule (June 29, 2011) NIST Special Publications: Recommended Security Controls for Federal Information Systems and Organizations Guidelines for Media Sanitization
23 Recordkeeping Regulatory requirement vs Institutional Policy: Whichever is longer Must be secure storage Coordinate with records management Electronic vs paper? ITAR Library
24 Foreign Person Participation Must comply with license provisos or terms of license exception/exemption Best practices: Make license part of TCP Train all participants (including foreign person) on proviso terms Disclosure of foreign travel
25 Inspections Kickoff: Lab or facility inspections are often needed to draft a TCP. Post-award monitoring: Lab or facility may be inspected as Post Approval Monitoring (PAM) or as part of annual reviews In person vs. via certification by PI Closeout: Lab or facility may be inspected as part of project closeout to ensure proper removal or destruction of materials
26 Personnel Screening Restricted Persons Screening (RPS) of all personnel with access to controlled items Includes graduate students, undergraduate students, technicians, and IT managers Screen individuals and companies Many companies offer RPS screening software Dynamic screen State license
27 Training and Education Train all project personnel with access to export controlled items, software or technical data on TCP procedures Train all personnel on reporting requirements and possible penalties for noncompliance Frequency and type of training may vary: Initial Training vs Refresher In person vs. Online Lab specific vs. Mixed groups Overview (FRE) vs. Specific (EC)
28 Accountability: Violations & Penalties Failure to comply with U.S. export control laws can result in severe penalties, both for the individual and institution: Criminal Penalties Fines: $1,000,000 per violation and imprisonment of up to 10 years. Civil Fines: $250,000 per violation, or twice the monetary amount of the underlying transaction, which ever is greater If ITAR=$500,000 per violation Debarment Negative Publicity 1. ITAR, EAR and OFAC all impose criminal and civil penalties, although the ranges of the penalties vary.
29 Accountability Who is responsible for export compliance under TCP? Best Department/PI sign Business manager or IT person for department All persons under the TCP having access to controlled items are required: To take restricted research training sign TCP acknowledgement/ NDA Who pays for an export investigation?
30 Violations and Investigations
31 Violations and Investigations Put procedures in place before a violation occurs Specify roles and responsibilities: Legal counsel (inside/outside) Attorney client privilege vs. work product Empowered official(s) Senior management IT support team Faculty, Staff, Students, others involved Other company or institution involved?
32 Violations and Investigations Investigative team Two-person rule Other company or Institution involved? Heads up and joint VSD FOIA issues (state institutions) FERPA issues (students) Available guidance: SIA Voluntary Disclosure Handbook (May 2010)
33 Student and Publication Issues Issues with student involvement with export controlled items & restricted research: Student record privacy issues FERPA FOIA Risk to student graduation (thesis/dissertation restrictions) Student disciplinary procedures
34
EXPORT CONTROLS COMPLIANCE
Responsible University Official: Vice President for Research Responsible Office: Office for Export Controls Compliance Origination Date: May 1, 2014 EXPORT CONTROLS COMPLIANCE Policy Statement Northwestern
Policy and Procedures Date: 08-24-11
Virginia Polytechnic Institute and State University Policy and Procedures Date: 08-24-11 Subject: Export and Sanctions Compliance Policy Definitions 1.0 Policy 2.0 Oversight 3.0 Responsibilities of Faculty,
Export Control Compliance Procedure Guide June 8, 2012
Export Control Compliance Procedure Guide June 8, 2012 1 TABLE OF CONTENTS Contents TABLE OF CONTENTS... 1 SUMMARY... 2 INTRODUCTION... 3 SCHOOL POLICY... 4 EXCLUSIONS... 4 WHAT IS AN EXPORT?... 4 CONDUCTING
Harvard Export Control Compliance Policy Statement
Harvard Export Control Compliance Policy Statement Harvard University investigators engage in a broad range of innovative and important research both in the United States and overseas. These activities
EXPORT CONTROL GUIDELINES FOR STAFF
EXPORT CONTROL GUIDELINES FOR STAFF Created: June 2010 Reviewed: September 2013 Reviewed: April 2015 Maintained by the Office of Sponsored Programs 1 List of Commonly Used Acronyms BIS CCL CJ DDTC EAR
A Primer on U.S. Export Controls
A Primer on U.S. Export Controls Presentation for the Pacific Northwest Defense Coalition By Akana K.J. Ma Partner, Ater Wynne LLP 16 July 2013 (503) 226-8489/[email protected] Akana K.J. Ma 2013 All Rights
Export Control Basics
Export Control Basics Updated on May 15, 2014 What are Export Controls? U.S. laws and regulations that restrict the distribution to foreign nationals and foreign countries of strategically important products,
THE UNIVERSITY OF ALABAMA IN HUNTSVILLE. EXPORT COMPLIANCE PROGRAM MANUAL Updated August 2012
THE UNIVERSITY OF ALABAMA IN HUNTSVILLE EXPORT COMPLIANCE PROGRAM MANUAL Updated August 2012 List of Abbreviations AECA Arms Export Control Act ATF/BATF Bureau of Alcohol, Tobacco, Firearms & Explosives
COMPUTER & INTERNET. Westlaw Journal. Expert Analysis Software Development and U.S. Export Controls
Westlaw Journal COMPUTER & INTERNET Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 31, ISSUE 1 / JUNE 13, 2013 Expert Analysis Software Development and U.S. Export Controls
Second Annual Impact of Export Controls on Higher Education & Scientific Institutions
The following presentation was presented at the Second Annual Impact of Export Controls on Higher Education & Scientific Institutions Hosted by Georgia Institute of Technology In cooperation with Association
EXPORT CONTROLS AND RESEARCH AT WPI TRAINING PRESENTATION
EXPORT CONTROLS AND RESEARCH AT WPI TRAINING PRESENTATION EXPORT CONTROL LAWS WHAT ARE EXPORT CONTROLS? U.S. laws and their implementing regulations that govern the distribution to foreign nationals and
Export Control Management & Compliance Plan
Rensselaer Polytechnic Institute Export Control Management & Compliance Plan Office of the General Counsel Rensselaer Polytechnic Institute 110 8 th Street, Troy, New York 12180 October 1, 2012 (This page
SI/SAO Export Compliance Training 1/9/2014
1 Why Compliance Matters Risks and Responsibilities Export Controls are Complex Understanding the Regimes and Agencies we must comply with What processes we are putting in place at SI to comply Identifying
Export Controls and Cloud Computing: Legal Risks
Presenting a live 90-minute webinar with interactive Q&A Export Controls and Cloud Computing: Legal Risks Complying with ITAR, EAR and Sanctions Laws When Using Cloud Storage and Services TUESDAY, APRIL
Supplier Awareness. Export Control/ ITAR
Export Control & ITAR Supplier Awareness Export Control/ ITAR THIS INFORMATION IS PROVIDED BY PAR SYSTEMS, INC. ("PAR"). PAR IS NOT A LAW FIRM, AND THE INFORMATION CONTAINED HEREIN IS NOT INTENDED TO BE
white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations
white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations WWW.EPIQSYSTEMS.COM 800 314 5550 Mitigate Risk in Handling ediscovery Data Subject to the U.S.
Louisiana State University A&M Campus Export Control Compliance Manual October 2013
Louisiana State University A&M Campus Eport Control Compliance Manual October 2013 Acknowledgements: The information in this document has been derived from sources including University of Massachusetts
Export Controls Compliance
Export Controls Compliance Division of Research The Research Foundation of State University of New York At Binghamton University The purpose of this document is to provide overall guidance on export control
Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?
Information Security and Privacy WHAT is to be done? HOW is it to be done? WHY is it done? 1 WHAT is to be done? O Be in compliance of Federal/State Laws O Federal: O HIPAA O HITECH O State: O WIC 4514
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
Wellesley College Written Information Security Program
Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as
TECHNOLOGY CONTROL PLAN TEMPLATE
Boston University TECHNOLOGY CONTROL PLAN TEMPLATE Developed and Approved by Marie Hladikova, Export Control Director Boston University, Office of Research Compliance Date: Revised March, 2015 1 1) COMMITMENT
Key Elements of International Trade Compliance. Presented by:
Key Elements of International Trade Compliance Presented by: International Business Transactions International Civil Litigation 2 I. Introduction Every international shipment implicates at least TWO legal
University of Maryland Export Compliance Program
April 6, 2015 Message from the Vice President for Research Export control is governed by a group of federal regulations intended to advance the national security, foreign policy, and economic interests
Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY
Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140
Approved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Export Controls. How to Comply with Export Controls. By Kimberly Marshall
Export Controls How to Comply with Export Controls By Kimberly Marshall Purpose of Regulation Technological superiority is a significant element in the defense of the United States, along with research,
Interagency Review of Foreign National Access to Export-Controlled Technology in the United States. Executive Summary
Offices of Inspector General of the Departments of Commerce, Defense, Energy, Homeland Security, and State and the Central Intelligence Agency Report No. D-2004-062 April 16, 2004 Interagency Review of
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually
Export Control Laws Training Presentation FLORIDA INSTITUTE OF TECHNOLOGY
Export Control Laws Training Presentation FLORIDA INSTITUTE OF TECHNOLOGY 1 Why Be Concerned with Export Control Laws Certain export control laws may apply to FIT research activities here and abroad. Failure
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Welcome to the World of Public Cloud Collaboration Allowing Enhanced Security
Whitepaper Welcome to the World of Public Cloud Collaboration Allowing Enhanced Security A New, More Secure, and More Efficient Approach to Storage, Management and Collaboration for ITAR-defined Technical
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
Table of Contents 762.1 SCOPE 762.2 RECORDS TO BE RETAINED
Recordkeeping Part 762--page 1 Table of Contents 762.1 SCOPE... 1 762.2 RECORDS TO BE RETAINED... 1 762.3 RECORDS EXEMPT FROM RECORDKEEPING REQUIREMENTS... 3 762.4 ORIGINAL RECORDS REQUIRED... 4 762.5
Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI
Office of Regulatory Compliance 13001 E. 17 th Place, Suite W1124 Mail Stop F497 Aurora, CO 80045 Main Office: 303-724-1010 Main Fax: 303-724-1019 HIPAA Policy 7.1 Title: Source: Prepared by: Approved
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
EXPORT COMPLIANCE OFFICE (ECO) MANUAL
EXPORT COMPLIANCE OFFICE (ECO) MANUAL LIST OF ABBREVIATIONS BIS CCATS CCL CJ CMU CTTEC DDTC EAR ECCN ECO EO FBE FFRDC FRE IEEPA ITAR NREC NSDD OFAC ORIC RPS SDNL SEI TCP TWEA USML Bureau of Industry and
Selected Troublesome/Unacceptable Clauses Related to Information Release and Foreign Nationals
Selected Troublesome/Unacceptable Clauses Related to Information Release and Foreign Nationals (Note: Please review the applicable clause in the most current version available to you to ensure you have
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
ITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
Introduction to Braumiller Schulz LLP Why Trade Compliance? Establishing an Internal Compliance Program (ICP) Contracting Services to Outside Experts
Olga Torres, Associate Ol T A i t Braumiller Schulz LLP International Trade Law www.globaltradelaw.net Overview Introduction to Braumiller Schulz LLP Why Trade Compliance? Establishing an Internal Compliance
DATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
Export Control Training
2007 Export Control Training Office of Sponsored Research and Programs Missouri State University Missouri State University Research Security and Export Controls Compliance Manual 11/7/2007 1 As an employee
CREDIT CARD PROCESSING & SECURITY POLICY
FINANCE AND TREASURY POLICIES AND PROCEDURES E071 CREDIT CARD PROCESSING & SECURITY POLICY PURPOSE The purpose of this policy is to establish guidelines for processing charges/credits on Credit Cards to
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
Gramm Leach Bliley Act. GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 7/1/2007
Gramm Leach Bliley Act 15 U.S.C. 6801-6809 6809 GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 7/1/2007 1 Objectives for GLBA Training GLBA Overview Safeguards Rule
Office of Export Enforcement Bureau of Industry and Security (BIS) U.S. Department of Commerce
Office of Export Enforcement Bureau of Industry and Security (BIS) U.S. Department of Commerce Sidney M. Simon Special Agent in Charge New York Field Office Export Enforcement s Mission Protect National
Bossier Parish Community College
Bossier Parish Community College Department of Cyber Information Technology Welcome to the Program! Network Security & Networking Tracks Code of Conduct This marks the beginning of your journey through
Export Controls: What are they? Why do we care?
Export Controls: What are they? Why do we care? Laura Langton, PhD Export Control Manager [email protected] 314-747-1378 http://research.wustl.edu/complianceareas/exportcontrols What is an Export? Release
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
EAR/ITAR Compliance Strategies. Network Performance Inc
EAR/ITAR Compliance Strategies Network Performance Inc Agenda 1. Overview of EAR/ITAR requirements 2. Impacts on computer systems and security 3. Data access policies and restrictions 4. Data Marking/classification
Export and Other Troublesome Clauses in Defense Contracting. David Brady, Virginia Tech Mary Beran, Georgia Tech
Export and Other Troublesome Clauses in Defense Contracting David Brady, Virginia Tech Mary Beran, Georgia Tech David A. Brady David Brady is the Director of the Office of Export and Secure Research Compliance
Addendum 529 (5/13) Page 1 of 5
Additional Terms and Conditions E-2D Full Rate Production (FRP) Lot 2 (Prime Contract No. N00019-13-C-9999) All of the additional terms and conditions set forth below are incorporated in and made part
Accepting Payment Cards and ecommerce Payments
Policy V. 4.1.1 Responsible Official: Vice President for Finance and Treasurer Effective Date: September 29, 2010 Accepting Payment Cards and ecommerce Payments Policy Statement The University of Vermont
Computer Security Incident Reporting and Response Policy
SECTION: 3.8 SUBJECT: Computer Security Incident Reporting and Response Policy AUTHORITY: Executive Director; Chapter 282.318, Florida Statutes - Security of Data and Information Technology Resources;
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
FDOH Information and Privacy Awareness Training Learner Course Guide
Florida Department of Health FDOH Information and Privacy Awareness Training Learner Course Guide To protect, promote & improve the health of all people in Florida through integrated state, county, & community
HIPAA Compliance Evaluation Report
Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5
Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose
Stringent Guidelines. ITAR dictates control over the export and import of. defense-related articles and services on the United States
ITAR Rules Undergo 2l't Century Facelift Regulations and practices governing the storage and processing of International Traffic in Arms Regulations (ITAR) technical data are evolving. For example,in2or4,
ITAR: Welcome to Public Cloud Collaboration
Whitepaper ITAR: Welcome to Public Cloud Collaboration Updated Guidelines Create New Avenues for Aerospace and Defense Contractors to Share and Store Technical Data www.brainloop.com ITAR Rules Undergo
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS PURPOSE The purpose of establishing this policy is to ensure Virginia Union University s compliance with the Family Educational Rights and Privacy Act
1. Not Subject to the EAR and Defense Article. (1) Reserved. (2) Reserved
1. Not Subject to the EAR and Defense Article 734.3 (a) (NO REVISION) (b) The following are not subject to the EAR: (1) (NO REVISION) (2) (NO REVISION) (3) Information and software that: (i) Are published,
EXPORT COMPLIANCE MANUAL
EXPORT COMPLIANCE MANUAL Prepared By: John Fusco of Locke Lord LLP (07/21/2015) Approved By: Rick Parent - Export Compliance Mgr. Revision B TABLE OF CONTENTS Page 1. ASTRO-MED INC. REGULATORY COMPLIANCE
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
Information Security Policy
Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED
Management and Storage of Sensitive Information UH Information Security Team (InfoSec)
Management and Storage of Sensitive Information UH Information Security Team (InfoSec) Who Are We? UH Information Security Team Jodi Ito - Information Security Officer Deanna Pasternak & Taylor Summers
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Encryption Security Standard
Virginia Commonwealth University Information Security Standard Title: Encryption Security Standard Scope: Approval February 22, 2012 This document provides the encryption requirements for all data generated,
HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant
1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad
