BERKELEY COLLEGE DATA SECURITY POLICY
|
|
|
- Phoebe Lynch
- 10 years ago
- Views:
Transcription
1 BERKELEY COLLEGE DATA SECURITY POLICY
2 BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data Classification and Control 6 5 Data Access Control 7 6 Password Control 9 7 Storage of Sensitive Data 10 8 Distribution and Transmission of Sensitive Data 11 9 Network Security Mobile Device Security Remote Access Physical Security Third Party Access Disposal of Sensitive Data Sensitive Data Security Incidents Sensitive Data Awareness Periodic Policy Review 20 APPENDICES Appendix A Categories of Restricted Data
3 CHAPTER 1 INTRODUCTION Accurate, timely, relevant, and properly protected information is a critical asset of Berkeley College. The College recognizes that failure to implement adequate security controls over sensitive information could potentially lead to: Irretrievable loss of important data; Serious financial consequences; Damage to the reputation of the College; and Legal penalties. Therefore, the College is committed to ensuring that all access to and uses of sensitive information is performed in a secure manner. Measures must be in place to minimize the risk to the College from unauthorized disclosure of sensitive data, whether accidental or deliberate. To comply with data protection laws, sensitive information must be collected and used appropriately, stored safely and not disclosed to any other person unlawfully. The object of this Data Security Policy is to define the security controls necessary to safeguard the confidentiality and integrity of sensitive College information. This policy provides a framework in which security threats to College information systems can be identified and managed on a risk basis and establishes terms of reference which ensure uniform implementation of data security controls throughout the College. This Data Security Policy applies to all associates and anyone else authorized to access College Data (as defined in Chapter 2). Failure to comply with these policies may result in loss of data access privileges and possible disciplinary action. 1
4 CHAPTER 2 - DEFINITIONS For purposes of this policy, the following terms shall be defined as indicated below: Access Administrator: An individual or department with primary responsibility for administering access rights for Users to one or more data systems, including granting new access rights, modifying a User s existing access rights and reducing or eliminating a User s access rights. A list of Access Administrators and the system(s) they administer is maintained by the Human Resources Department. College: Berkeley College. College Data: Data which is collected, maintained, or utilized by the College for the purpose of carrying out institutional business. College Network: The system of personal computers, servers, storage devices, printers, telecommunication devices and other related equipment owned by the College and used to process, transmit, receive, store and otherwise manage electronic College Data. Data: Factual material or information. Data Steward: An individual or department with primary responsibility for determining the purpose and function of a Data resource. One becomes the Data Steward either by designation or by virtue of having acquired, developed, or created information resources for which no other party has stewardship. A list of Data Stewards is maintained by the Human Resources Department. Internal Data: College Data which is considered neither Public Data nor Restricted Data. This includes student directory information that has not been restricted, as well as statistical, procedural, and other information gathered for internal reference and planning that is considered proprietary but its disclosure would not result in a substantial loss to the College, a violation of law, significant negative publicity or other serious consequences. Managers: Members of the College community who have management or supervisory responsibility. Mobile Device: Any computer, personal digital assistant, telephone or other device which is designed to be portable and can store Data or connect to a computer network or the Internet. Portable Digital Media: Any digital media which is designed to be portable, such as CDs, DVDs, tapes, flashdrives, floppy disks, memory sticks and portable hard drives. Public Data: Data which is easily accessible by the general public and requires no further authorization for release. This includes information not generally considered harmful or an invasion of privacy if disclosed. Restricted Data: College Data which is accessible only for specific uses by specific authorized individuals, and available for release to other persons under limited circumstances requiring formal approval. Information should be classified as Restricted Data if disclosure to an unauthorized individual could result in a substantial loss to the College, a violation of law, 2
5 significant negative publicity or other serious consequences. Categories of Restricted Data are set forth in Appendix A. Sensitive Data: Data which is either Restricted Data or Internal Data. Sensitive Data Security Incident: An occurrence in which it may be reasonably suspected that Sensitive Data has been compromised. Strong Password: A password at least 8 characters in length which consists of a combination of alphabetic, numeric and special (!@#$%^&*<>) characters. Third Party: Any individual, contractor, vendor or agent which is not an associate or student of the College. User: Anyone who has access to College Data. 3
6 CHAPTER 3 GENERAL ROLES AND RESPONSIBILITIES Purpose. This chapter defines general responsibilities of the College community for protecting sensitive information. 1. Users. Users are responsible for protecting Sensitive Data to which they have access. Their responsibilities cover both computerized and non-computerized information and information technology devices in their possession. Users are expected to learn and comply with all College policies relating to the protection of Sensitive Data. 2. Data Stewards. Data Stewards have the responsibilities of Users and in addition are responsible for the following: a. Establishing security policies and procedures. Data Stewards should establish specific data security policies and procedures for their information where appropriate. Stewards are responsible for the procedures related to the creation, retention, distribution and disposal of information. These must be consistent with this policy, and applicable records retention policies, as well as with other College policies, contractual agreements, and laws. Stewards may impose additional requirements that enhance security. b. Assigning classifications. Data Stewards shall be responsible for assigning each category of their designated Data to a sensitivity classification in accordance with Chapter 4. c. Determining authorizations. Data Stewards determine who is authorized to have access to their information. They shall make sure that those with access have a legitimate need to know the information and understand the security requirements for that information. 3. Managers. Managers have all the responsibilities of Users and may in some cases also serve as Data Stewards. In addition, they share responsibility for data security with the Users they manage and supervise. 4. Access Administrators. Access Administrators are responsible for controlling access to data systems by administering access rights under the direction of Data Stewards and the Human Resources Department. 5. Information Systems Department. The Information Systems Department is responsible for: a. Securing the College Network Infrastructure and protecting the College Network from external threats. b. Establishing security standards and protocols for Users including encryption techniques and procedures for secure disposal of digital media. 4
7 c. Determining secure methods of remote and Third Party access to the College Network. 6. Human Resources Department. The Human Resources Department is responsible for: a. Working with Data Stewards to manage data access rights. b. Maintaining master lists of access rights and Access Administrators. c. Distributing this policy to all associates and tracking their acceptance. d. Coordinating periodic classes about data security and tracking completion by associates. 7. Compliance Department. The College Compliance Department (in liaison with external legal counsel if necessary) is responsible for interpreting the laws that apply to this policy and ensuring that this policy is consistent with those laws and other College policies. 5
8 CHAPTER 4 SENSITIVE DATA CLASSIFICATION AND CONTROL Purpose. The purpose of this chapter is to establish sensitive information classifications and to provide for the identification and management of sensitive information. 1. All College Data shall have designated Data Stewards. 2. Data Stewards shall be responsible for assigning each category of their designated Data to one of the following sensitivity classifications: (a) Restricted Data, (b) Internal Data or (c) Public Data. 3. Data that is aggregated shall be classified as to the most secure classification level of any individual component. 4. Data Stewards shall implement policies and security measures as necessary to safeguard the Sensitive Data for which they are responsible. 6
9 CHAPTER 5 DATA ACCESS CONTROL Purpose. The purpose of this chapter is to ensure that proper controls are in place to establish and maintain the appropriate access rights for all internal or external data systems used at the College. 1. No User shall have access to Sensitive Data unless there is a legitimate business purpose for such access; and the level of access given to a User shall be the minimum required for such User to perform such business purpose. 2. Each Data Steward is responsible for determining the appropriate level of access rights to Sensitive Data for which the Data Steward is responsible. 3. Each Data Steward is responsible for designating Access Administrators who are responsible for administering access to the data system(s) for which the Data Steward is responsible. Each data system should have at least two Access Administrators (one primary and one or more secondary). 4. An Access Administrator shall not grant a User new access rights, modify a User s existing access rights, or reduce a User s access rights unless approved in advance by the appropriate Data Steward(s) or the Human Resources Department in accordance with this chapter. 5. Managers are responsible for ensuring that associates they supervise have proper access rights in order to perform their job responsibilities. In the event that an associate requires new access rights, modification of existing access rights or a reduction in access rights, the Manager must promptly submit a request for change to the appropriate Data Steward(s). Once approved by the Data Steward(s), the request for change shall be forwarded to the appropriate Access Administrator(s) to implement the change. 6. The Human Resources Department may approve new access rights in lieu of Data Steward(s) where such access rights are included in approved job descriptions. When time is of the essence, the Human Resources Department may authorize Access Administrators to reduce or eliminate an associate s access rights. 7. The Human Resources Department shall maintain an up-to-date master list of Access Administrators. Any new Access Administrator or any change in or separation of an existing Access Administrator must be promptly reported to the Human Resources Department by the Access Administrator s Manager. 8. The Human Resources Department shall maintain an up-to-date master list of access rights granted to each associate. 9. The Information Systems Department is responsible for assigning and maintaining access to the College Network infrastructure. 7
10 10. Appropriate audit tracking capabilities should be enabled on each data system as determined by the Data Steward(s) in consultation with the Information Systems Department. 8
11 CHAPTER 6 PASSWORD CONTROL Purpose. The purpose of this chapter is to ensure that proper password controls are in place to protect sensitive information. 1. Strong Passwords are required for any systems which provide access to Restricted Data. 2. Strong Passwords are recommended for any systems which provide access to Internal Data. 3. Users must not share passwords with anyone, including Managers and members of the Information Systems Department. 4. If a User knows or has reason to believe a password has been disclosed or otherwise compromised, the password must be immediately changed or inactivated. 5. If passwords are documented on paper, such paper must be stored in a secure locked location. Passwords which are stored electronically must be encrypted. 6. Passwords must be changed every 90 days. 7. Any system which provides access to Sensitive Data must be configured to lock out a user after three consecutive unsuccessful password attempts, if this feature is available on such system. 8. Web browsers must not be set to remember or otherwise store passwords. 9
12 CHAPTER 7 STORAGE OF SENSITIVE DATA Purpose. The purpose of this chapter is to provide for secure storage of sensitive data. Policies. 1. Restricted Data. Restricted Data must be securely stored at all times to prevent access by unauthorized individuals. a. Restricted Data in electronic format which is not stored on the College Network or another College-approved secure network must be encrypted. b. Any Portable Digital Media or a Mobile Device which contains Restricted Data must never be left unattended and must be securely stored in a locked drawer or cabinet when not in use. c. Paper containing Restricted Data must never be left unattended and must be stored in a locked cabinet when not in use. 2. Internal Data. Internal Data shall be stored so as to provide a reasonable level of protection against unauthorized access. The same standards for storage of Restricted Data should be employed for Internal Data whenever feasible. 10
13 Purpose. CHAPTER 8 DISTRIBUTION AND TRANSMISSION OF SENSITIVE DATA The purpose of this chapter is to provide for secure distribution and transmission of sensitive data. 1. Restricted Data. Restricted Data must not be distributed or made available to persons who are not authorized to access the information. Restricted Data that is transmitted electronically, transported physically or spoken in conversation must be appropriately protected from unauthorized interception. a. Restricted Data in electronic format which is transmitted by any means other than the College Network or another College-approved secure network must be encrypted. b. Distributing Restricted Data in paper form should be avoided unless there is a valid business reason for doing so. c. Restricted Data which is distributed from one person to another in paper form or stored on Portable Digital Media should either be marked as RESTRICTED or enclosed in a sealed envelope marked CONFIDENTIAL. d. Restricted Data should be distributed using a trusted delivery method such as by hand or by College interoffice mail. Restricted Data which must be delivered by courier should be sent certified mail-return receipt requested or by a recognized commercial courier (such as UPS or Federal Express) which provides delivery and receipt tracking. e. When Restricted Data is distributed from one person to another, the obligation is on the sender to confirm receipt by the intended recipient. f. Telephone or in-person conversations involving Restricted Data should take place in an area where such conversations can not be overheard by unauthorized individuals. 2. Internal Data. Internal Data should not be distributed or made available to persons who have no legal, business or other legitimate reason to access the information. The same standards for distribution and transmission of Restricted Data should be employed for Internal Data whenever feasible. 11
14 CHAPTER 9 - NETWORK SECURITY Purpose. The purpose of this chapter is to define roles and responsibilities for ensuring the security and integrity of the College Network. 1. The Information Systems Department is responsible for protecting the College Network from outside threats such as intrusion, probing, viruses, spyware and denial-of-service attempts. 2. The Information Systems Department has the authority to evaluate the seriousness and immediacy of any threat to the College Network and to take action to mitigate that threat. 3. The Information Systems Department is responsible for maintaining procedures to protect Sensitive Data that reside on network servers. 4. Users are responsible for complying with all rules, regulations and policies established to protect the security and integrity of the College Network. 12
15 CHAPTER 10 MOBILE DEVICE SECURITY Purpose. The purpose of this chapter is to protect sensitive information accessible from Mobile Devices. 1. Mobile Devices which allow access to systems containing Sensitive Data must be password protected in accordance with Chapter Once a User has logged into a Mobile Device, the device must not be left unattended. When finished using a Mobile Device, a User must log out and the device must remain in possession of the User until it can be securely stored. 3. Sensitive Data should not be stored on a Mobile Device unless there is a legitimate academic, administrative or business reason for doing so. 4. When a Mobile Device is permanently transferred from one User to another, any Sensitive Data on the device must be securely erased before transfer. 13
16 CHAPTER 11 REMOTE ACCESS Purpose. The purpose of this chapter is to define standards for securely connecting to the College Network from a computer or other device located outside of the College Network. 1. A User shall be granted remote access to the College Network only for legitimate academic, administrative or business purposes and only after prior approval by senior management of the College. 2. The College Network may be remotely accessed only by using methods of connection approved by the Information Systems Department. 3. Users are responsible for safeguarding the remote access credentials granted to them in accordance with this policy. These credentials may consist of username and password combinations, digital certificates or other software or hardware. 4. All computers or other devices to be used for remote access to the College Network must meet the standards established by the Information Systems Department and must be available for inspection upon request by a representative of the Information Systems Department in order to verify compliance with this policy. 5. After accessing Sensitive Data remotely from a public device, the User must clear cache and delete all temporary files in order to remove Sensitive Data stored on the device. 14
17 CHAPTER 12 PHYSICAL SECURITY Purpose. The purpose of this chapter is to ensure that appropriate physical access controls are in place to protect sensitive information. 1. Physical Entry Controls. Areas containing Sensitive Data in any form or access to any component of the College Network must be protected by appropriate physical entry controls to ensure that only authorized personnel are allowed access. Visitors to secured areas should be supervised by authorized personnel. 2. Server Rooms. College Network server rooms must be locked at all times. Campus Security should be able to monitor and log access to these locations. Visitors to server rooms must be accompanied by authorized staff or other designee of the Information Systems Department. 3. Individual Offices and Work Areas. Individual offices and work areas utilized by Users with access to Sensitive Data should be secure. a. Doors should be locked when Users are not present. b. Sensitive Data should not be viewable by passersby or unauthorized guests. i. Computer monitors must be carefully positioned so that viewing is restricted to the authorized User. ii. When leaving a computer unattended where it might be accessed by unauthorized individuals, the User should either log out of all networks and applications or utilize a password-protected screensaver. iii. Papers containing Restricted Data must be covered or put away when unauthorized individuals are present. c. Any media containing Restricted Data, whether electronic or non-electronic, must be in a locked drawer, cabinet or storage area when not in use. 4. Equipment Security. Equipment components of the College Network, including individual computers, should be secured using a locking mechanism where feasible. 5. Secure Disposal of Equipment. All equipment containing media should be checked to ensure that any Sensitive Data is securely erased prior to disposal. 15
18 CHAPTER 13 THIRD PARTY ACCESS Purpose. The purpose of this chapter is to define standards for Third Parties seeking to access the College Network in order to minimize the potential exposure to the College from risks associated with Third Party access. 1. Third Party access to the College Network may be made for legitimate academic, administrative or business purposes only. 2. Requests to allow a Third Party access to the College Network must be authorized by the Information Systems Department and the relevant Data Steward(s) prior to access being granted. 3. The requester is responsible for assuring that the Third Party agrees in writing to comply with all College data security policies and the requester remains responsible for the actions of the Third Party when accessing the College Network. 4. In order to ensure individual accountability on the College Network, each Third Party granted access must be given a unique user identification and password. The Third Party will at all times be held responsible for any activities which occur on the College Network using this unique user identification. 16
19 CHAPTER 14 DISPOSAL OF SENSITIVE DATA Purpose. The purpose of this chapter is to provide standards for secure disposal of any media which contains sensitive information. 1. Disposal of Restricted Data. When there is no legal, business or other legitimate reason to store Restricted Data, such Restricted Data must be disposed of as follows: a. Paper containing Restricted Data must be shredded. b. Any media containing Restricted Data in electronic format must be securely erased or physically destroyed. 2. Disposal of Internal Data. When there is no legal, business or other legitimate reason to store Internal Data, such Internal Data should be disposed of as follows: a. Paper containing Internal Data should be shredded if feasible, otherwise it must be recycled. b. Any media containing Internal Data in electronic format should be securely erased or physically destroyed if feasible, otherwise erased. 3. Transfer of Computers and Other Devices. Whenever a computer, Mobile Device or other equipment which has the capacity to store data is transferred from one User to another, all data stored on the device must be securely erased. 4. Responsibilities. a. Data Stewards shall be responsible for establishing timeframes and guidelines for when Data is to be disposed of in accordance with this policy. b. Campus Operating Officers shall be responsible for maintaining shredding and recycling facilities at their campus locations. c. The Information Systems Department shall be responsible for establishing procedures for securely erasing data as required by this policy. 17
20 CHAPTER 15 - SENSITIVE DATA SECURITY INCIDENTS Purpose. The purpose of this chapter is to provide steps to take when sensitive information may be compromised. 1. All observed or suspected Sensitive Data Security Incidents should be promptly reported to the Information Systems Helpdesk (Data Security Incident) which will notify the Vice President of Information Systems, the Director of Internal Audit, the Chief Compliance Officer, the Data Steward(s) and Campus Operating Officer of the area(s) affected and the Manager of the associate reporting the incident. Users should not attempt to investigate or resolve an incident on their own. 2. The Vice President of Information Systems, Director of Internal Audit and Chief Compliance Officer (the Investigative Team ) will investigate the incident and, when appropriate, take steps to contain any loss of data and remedy the suspected cause(s) of such incident. 3. If, after investigation, the Investigative Team determines there is a reasonable likelihood that Restricted Data may have been disclosed to unauthorized individual(s), the Incident Response Team will be notified. The Incident Response Team consists of: the Vice President of Information Systems, the Chief Compliance Officer, the Chief Financial Officer, the Director of Media Relations, the Director of Internal Audit, the Associate Vice President, Operations and a representative of the Provost s office. 4. The Incident Response Team will review the conclusions of the Investigative Team and will present a recommended response to the President. The Emergency Management Master Plan will be invoked if appropriate. 18
21 CHAPTER 16 SENSITIVE DATA AWARENESS Purpose. The purpose of this chapter is to ensure that all members of the College community are informed and aware of the importance and legal obligation of protecting sensitive information. 1. All associates are responsible for reviewing this Data Security Policy and affirmatively agreeing to comply with it. The Human Resources Department shall be responsible for distributing this Data Security Policy and tracking acceptance by associates. 2. During orientation, all new full and part-time associates, temporary workers and volunteers should be instructed on the importance of information security and their roles in protecting Sensitive Data. 3. Classes (online or in-person) shall be held periodically to continue to educate associates about this policy and the importance of sensitive data security. Successful completion of these classes shall be tracked by the Human Resources Department. 4. Managers shall ensure that associates under their supervision are aware of this Data Security Policy and other relevant information security policies, procedures, and guidelines, and have access to current versions. If modifications to policies are distributed, managers must inform their respective communities within seven days unless told otherwise. 5. Managers shall hold awareness and education sessions on an annual basis to review information security basics and current information security policies with associates under their supervision. 6. Third Parties authorized to access Sensitive Data must be informed of their responsibilities under this Data Security College information security awareness and educational materials shall be made available for use by authorized Third Parties. 19
22 CHAPTER 17 PERIODIC POLICY REVIEW Purpose. The purpose of this chapter is to define the process for periodic review and amendment of this Data Security 1. A Data Security Policy Review Committee made up of the Incident Response Team (as defined in Chapter 15) and other representatives of the various College constituencies shall meet annually each Spring to review this policy and recommend any changes. 2. The chairperson of the Data Security Policy Review Committee shall be the Vice President of Information Systems. 3. The recommendations of the Data Security Policy Review Committee shall be submitted to the President for approval. 20
23 APPENDIX A Categories of Restricted Data Identity Data Age/Date of Birth Anonymous Donor Information Bank/Financial Account Numbers Citizenship/Nationality/Visa Status Credit/Debit Card Numbers Driver s License Numbers Home Address Home Telephone Number Medical Records Passport Numbers Passwords Social Security Numbers Associate Data Identity Data (listed above) Compensation Disciplinary Actions Employee Benefits Elections Employment Applications Faculty Transcripts Faculty Evaluations Family Member/Beneficiary Information Grievances Performance Evaluations Student Instructional Reports (SIRS) Whistleblower Records Worker s Compensation Claims Student Data Identity Data (listed above) Academic Status Admissions Application Records Class Level Class Schedule Conduct/Misconduct Records Course Evaluations Disabilities Ethnicity Fees Assessed or Paid Financial Aid Records Financial Statements (Student or Parent/Guardian) Gender Grades (including GPA) Health Care Providers Instructors Letters of Recommendation i
24 Loan Collection Records Parent/Guardian Name and Address Residency Status Selective Service/Veteran s Administration Status Special Programs Student ID Numbers Transcripts Business and Financial Records Audit/Investigative Workpapers and Reports Bank/Financial Account Records Data Subject to Confidentiality Agreements Financial Statements Injury and Damage Claims Litigation Records Marketing Plans Proprietary Vendor Information Tax Returns Trade Secrets Facilities Architectural Records and Floor Plans Building Systems Equipment Locations Hazardous Materials Locations and Details Utility Valve Locations ii
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,
Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY
Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140
Information Security Policy
Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Statement of Policy. Reason for Policy
Table of Contents Statement of Policy 2 Reason for Policy 2 HIPAA Liaison 2 Individuals and Entities Affected by Policy 2 Who Should Know Policy 3 Exclusions 3 Website Address for Policy 3 Definitions
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
8.03 Health Insurance Portability and Accountability Act (HIPAA)
Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)
Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act) The GLB Act training packet is part of the Information Security Awareness Training that must be completed by employees. Please visit
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as
HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as required by HIPAA. 1. Definitions. a. Business Associate, as used in this Contract, means the
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.
Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
FDOH Information and Privacy Awareness Training Learner Course Guide
Florida Department of Health FDOH Information and Privacy Awareness Training Learner Course Guide To protect, promote & improve the health of all people in Florida through integrated state, county, & community
Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)
Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative
M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General
M E M O R A N D U M To: From: IT Steering Committee Brian Cohen Date: March 26, 2009 Subject: Revised Information Technology Security Procedures The following is a revised version of the Information Technology
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
HIPAA Education Level One For Volunteers & Observers
UK HealthCare HIPAA Education Page 1 September 1, 2009 HIPAA Education Level One For Volunteers & Observers ~ What does HIPAA stand for? H Health I Insurance P Portability A And Accountability A - Act
College of DuPage Information Technology. Information Security Plan
College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Wellesley College Written Information Security Program
Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
HIPAA Training for Hospice Staff and Volunteers
HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Information Security Policy
Information Security Policy Policy Title Responsible Executive Responsible Office Information Security Policy Vice President for Information Technology and CIO, Jay Dominick Office of Information Technology,
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Information Security Policy
Information Security Policy Contents Version: 1 Contents... 1 Introduction... 2 Anti-Virus Software... 3 Media Classification... 4 Media Handling... 5 Media Retention... 6 Media Disposal... 7 Service Providers...
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS
HIPAA Policy, Protection, and Pitfalls Overview HIPAA Privacy Basics What s covered by HIPAA privacy rules, and what isn t? Interlude on the Hands-Off Group Health Plan When does this exception apply,
How To Protect A Hampden County Hmis From Being Hacked
Hampden County HMIS Springfield Office of Housing SECURITY PLAN Security Officers The Springfield Office of Housing has designated an HMIS Security Officer whose duties include: Review of the Security
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
HIPAA Awareness Training
New York State Office of Mental Health Bureau of Education and Workforce Development HIPAA Awareness Training This training material was prepared for internal use by the New York State Office of Mental
ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA
ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA PURPOSE PURPOSE This document provides guidance to offices about protecting sensitive customer and company information. The protection of Non-public Personal
Authorized. User Agreement
Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
University of Aberdeen Information Security Policy
University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
All Users of DCRI Computing Equipment and Network Resources
July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services
Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...
Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
HMIS SECURITY PLAN of the PHILADELPHIA CONTINUUM OF CARE
HMIS SECURITY PLAN of the PHILADELPHIA CONTINUUM OF CARE This plan describes the standards for the security of all data contained in the Philadelphia Continuum of Care Homeless Management Information System
Network Security Policy
KILMARNOCK COLLEGE Network Security Policy Policy Number: KC/QM/048 Date of First Issue: October 2009 Revision Number: 3 Date of Last Review: October 2011 Date of Approval \ Issue May 2012 Responsibility
Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;
Page 1 National Organization of Alternative Programs 2014 NOAP Educational Conference HIPAA and Privacy Risks Ira J Rothman, CPHIMS, CIPP/US/IT/E/G Senior Vice President - Privacy Official March 26, 2014
Rowan University Data Governance Policy
Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Appendix A: Rules of Behavior for VA Employees
Appendix A: Rules of Behavior for VA Employees Department of Veterans Affairs (VA) National Rules of Behavior 1 Background a) Section 5723(b)(12) of title 38, United States Code, requires the Assistant
HIPAA Training for Staff and Volunteers
HIPAA Training for Staff and Volunteers Objectives Explain the purpose of the HIPAA privacy, security and breach notification regulations Name three patient privacy rights Discuss what you can do to help
Alphabet Soup - GLBA, FERPA and HIPAA: Security Best Practices
Alphabet Soup - GLBA, FERPA and HIPAA: Security Best Practices (Session ID: 152) Maureen Carver, Assistant Dean and Registrar, Law School, Villanova University Rita Garner, Registrar, Medical College of
NC DPH: Computer Security Basic Awareness Training
NC DPH: Computer Security Basic Awareness Training Introduction and Training Objective Our roles in the Division of Public Health (DPH) require us to utilize our computer resources in a manner that protects
Payment Card Industry (PCI) Policy Manual. Network and Computer Services
Payment Card Industry (PCI) Policy Manual Network and Computer Services Forward This policy manual outlines acceptable use Black Hills State University (BHSU) or University herein, Information Technology
Vulnerability Management Policy
Vulnerability Management Policy Policy Statement Computing devices storing the University s Sensitive Information (as defined below) or Mission-Critical computing devices (as defined below) must be fully
ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY
ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY PURPOSE The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through misuse,
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
