FROM: John Na tmo Audito

Size: px
Start display at page:

Download "FROM: John Na tmo Audito"

Transcription

1 COUNTY OF LOS ANGELES DEPARTMENT OF AU DITOR.CONTROLLER KENNETH HAHN HALL OF ADMINISTRATION 5OO WEST TEMPLE STREET, ROOM 525 LOS ANGELES, CALIFORNIA 9OO PHONE: (213) FAX: (213) JOHN NAIMO AUDITOR.CONTROLLER April 20, 2015 TO Supervisor Michel D. Antonovich, Myor Supervisor Hild L. Solis Supervisor Mrk Rid ley-thoms Supervisor Sheil Kuehl Supervisor Don Knbe FROM: John N tmo Audito ller SUBJECT: DEPARTMENT OF PUBLIC HEALTH - AND SECURITY POLICIES REVIEW INFORMATION TECHNOLOGY The Bord of Supervisors' (Bord) Informtion Technology (lt) nd Security Policies (Policies) require ll County deprtments to comply with estblished Countyrruide lt security stndrds to help ensure proper controls over County lt resources. As required by Bord Policy 6.108, we re reviewing County deprtments'complince with the Policies. We hve completed review of the Deprtment of Public Helth's (DPH or Deprtment) complince with the Policies nd relted County stndrds. Our review included testing system ccess to five systems DPH identified s mission criticl, including systems contining sensitive helth informtion. We lso reviewed physicl security over lt equipment, computer encryption nd ntivirus softwre, equipment disposition, nd lt security wreness trining. Results of Review Our review disclosed tht DPH needs to improve its controls over res such s systems ccess, lt equipment control, nd computer encryption. ln ddition, some of the issues noted could violte federl Helth lnsurnce Portbility nd Accountbility Act (HIPAA) nd Helth lnformtion Technology for Economic nd Clinicl Helth (HITECH) Act lws. Therefore, we reported our preliminry findings to the County's Chief HIPAA Privcy Officer. The following re exmples of res for improvement: Help Conserve Pper - Print Double-Sided "To Enrich Lives Through Effective nd Cring Service"

2 Bord of Supervisors April 20, 2015 Pge 2 lnpproprite Systems Access - DPH needs to restrict unneeded ccess to sensitive/confidentil informtion in their systems, nd determine whether unneeded ccess resulted in HIPAA/HITECH violtion. We reviewed two of DPH's systems, nd noted tht DPH did not remove systems ccess for 13 users who terminted DPH employment. One of the terminted employee ccounts ws used for three yers fter the employee terminted to view protected helth informtion (PHl) nd to order lbortory tests for pproximtely 100 DPH clients. DPH mngement indicted tht they re investigting to determine if the individul who ccessed the terminted user ccount ws uthorized to view the PHI nd to order the lbortory tests DPH's ttched response indíctes they determined tht current employee used the terminted employee's ccount in performíng her job duties. The current employee filed to obtin her own sysfem ccount, which violted County policy. However, she ws uthorized to view PHI nd no reportble HIPANHITECH violtion occurred. DPH indicfes if hs reminded lt mngers to promptly remove terminted employee ccess. DPH rs /so developing procedure to notify mngers of personnel chnges so they cn immeditely updte sysfems ccess. Systems Access Documenttion - DPH needs to improve their systems ccess documenttion. We could not review user ccess for three of DPH's systems. For one of the three systems, DPH could not generte list tht identifies who hs ccess to the system. For two systems, DPH could not document system ccess role cpbilities, mking it imprcticl to determine if users' ccess roles were pproprite for their job duties. DPH's response indictes they implemented system upgrde tht llows them to generte user ccess logs to monitor sysfem ccess, ln ddition, DPH will develop sysúem ccess uthoriztion form tht includes ccess role d e scri ption s nd j u stificti on s. Physicl Security - DPH needs to physiclly secure its lt resources, s required by Bord Policy Twenty-one employees who terminted from the County continued to hve key crd ccess to enter three DPH offices for up to five yers fter termintion. We lso noted tht DPH stores surplus computer equipment in wrehouse receiving re tht is open to the public for deliveries. ln ddition, lptops t two (4Ùo/o) of the five offices reviewed re not secured with lock when left unttended. DPH's response indictes they cnceled key crd ccess for the terminted employees nd will develop procedures to immeditely updte keycrd ccess when personnel chnges occur. DPH lso convened n Assef Mngement

3 Bord of Supervisors April 20, 2015 Pge 3 lmprovement Tem to ensure computer equipment in their wrehouse nd other fcilities re properly secured. Inccurte lt Inventories - DPH needs to improve controls over lt equipment inventories. We could not locte seven (10Yo) of the 68 items from DPH's equípment lists. While DPH stff indicted tht some of these items hd been disposed, they could not document ny of the disposls. ln ddition, we noted 9,400 (45%) of the 20,757 items on DPH's lists hve missing or incorrect mke/model, mnufctureds seril number, sset custodin, etc., including 315 items ssigned to individuls who no longer work t the Deprtment. DPH's response indictes they investigted nd submitted Computer Security lncident Report to the County Chief lnformtion Security Officer for the missing lt devices. DPH lso reminded mngers nd ssef custodins to immeditely report /osf, stolen, or improperly inventoried lt resources. DPH's Assef Mngement lmprovement Tem,s /so reviewing inventory mngement procedures to identify improve ments. Stff Gomputer Assignments DPH needs to evlute stff computer ssignments, trnsfer/slvge unneeded items, nd evlute estblishing computer pool nd checkout process for computer devices tht stff do not frequently use. DPH's inventory records indicte tht 487 (14%) of the 3,583 employees hve two or more ssigned computers (e.9., desktop nd lptop or tblet). Eight (32%) of the 25 employees interviewed with two or more computers indicted they do not need one of their computers, including one employee who hd not used his lptop for two yers. DPH's response indictes they will review computer ssignmenfs fo determine if the type nd mount of devices re ligned with ssef custodins' job duties. They will lso evlute expnding the use of computer check-out pools. Portble Computer Encryption DPH needs to improve encryption documenttion nd ensure portble computers re encrypted, s required by Bord Policy DPH did not hve encryption documenttion for 319 (18%) of the 1,773 portble computers. ln ddition, their documenttion for the remining items does not include enough detil, such s the computers' sset tg or seril numbers, to mtch it to ny of the 1,773 computers in inventory. We reviewed 28 portble computers nd noted eight (29o/o) did not hve encryption softwre instlled. We lso noted tht stff/mngers do not periodiclly monitor to ensure portble computers re encrypted. DPH's response indictes they will recll ll portble computers to vlidte nd document tht ech devíce is encrypted. DPH lso worked with the Chief

4 Bord of Supervisors April 20, 2015 Pge 4 lnformtion Office to cquire softwre tht will llow them to monitor the encryption sffus of ll portble nd desktop computers. Antivirus Softwre - DPH needs to ensure ll computers hve current ntivirus protection, s required by Bord Policy Thirteen (23"/o) of the 56 computers reviewed hd outdted ntivírus softwre protection, including one computer with no ntivirus softwre instlled. DPH's response indictes they will review ll portble computers to verify tht ntivirus protection is instlled nd configured to receive routine updtes. Hrd Drive Disposl - DPH needs to properly document tht ll County dt is ersed from hrd drives when computers re disposed, s required by Bord Policy We noted two instnces where DPH disposed of 65 hrd drives but could not document ersing ten (15%) of them. ln nother instnce, DPH documented disposing of 35 computers nd four boxes of hrd drives, nd documented ersing 84 hrd drives. However, DPH's documenttion does not indicte how mny hrd drives were in the boxes, so we could not determine if DPH ersed ll hrd drives before disposl. DPH's response indictes they implemented new procedure where progrm offices send ech computer to DPH's Mterils Mngement wrehouse for proper sn ittion nd docu me nttion. Gomputer lncident Response - DPH needs to report missing lt equipment through the County's computer incident response process. We noted tht between 2011 nd 2013, DPH mngers/stff filed to report 131 missing or stolen lt equipment items to the Deprtment's lnformtion Security Officer (DISO), s required by Bord Policy As result, the DISO could not ssess the impct of ny dt/softwre loss nd could not mke ny required notifictions to the Chief lnformtion Office, the Auditor-Controller (A-C) HIPAA Privcy Officer, or the A-C Office of County Investigtions. DPH's response indictes they hve reminded ll employees fo immeditely report mrssrng or stolen lt resources fo their superuisor. DPH mngement lso told us tht subsequent to our review, they investigted nd ccounted for 100 (76%) of the 131 mrsslng lt equipment items. Of the 31 tht remin unccounted for, DPH indicted tht three could hve contined PHl, but DPH indicted they believe the risk of brech is low. They re prepring seprte memo to the Bord on this rssue, Detils of these nd other findings nd recommendtions re included s Attchment I

5 Bord of Supervisors April 20, 2015 Pge 5 Review of Report We discussed our report with DPH mngement. The Deprtment's ttched response (Attchment ll) indictes generl greement with our findings nd recommendtions. We thnk DPH's mngement nd stff for their coopertion nd ssistnce during our review. lf you hve ny questions, plese contct me, or your stff my contct Robert Smythe t (213) JN:AB:RS:MP Attchments c: SchiA. Hmi, lnterim Chief Executive Offícer Cynthi A. Hrding, M.P.H., lnterim Director, Deprtment of Public Helth Robert Pittmn, Chief Informtion Security Officer, Chief lnformtion Office Lind McBride, Chief HIPAA Privcy Officer, Deprtment of Auditor-Controller Public lnformtion Office Audit Committee

6 Attchment I DEPARTMENT OF PUBLIC HEALTH INFORMATION TECHNOLOGY AND SECURITY POLICIES REVIEW Bckground The Bord of Supervisors' (Bord) lnformtion Technology (lt) nd Security Policies (Policies) require ll County deprtments to comply with Countywide lt Policies, stndrds, nd guidelines. The Policies help protect County lt ssets nd ensure the confidentility nd integrity of systems dt. As required by Bord Policy 6.108, we re reviewing County deprtments' complince with the Policies. We hve completed review of the Deprtment of Public Helth's (DPH or Deprtment) complince with the Policies, nd relted County stndrds nd guidelines. DPH hs pproximtely 21,000 lt devices such s desktop computers, lptops, servers, multifunctionl printers, tblets, etc. Our review included testing systems ccess, physicl security, encryption nd ntivirus softwre, equipment disposition, nd lt security wreness trining. Systems Access Bord Policy requires deprtments to sfegurd personl nd confidentil informtion on their lt systems. As n entity tht delivers helth cre nd possesses protected helth informtion (PHl), DPH is responsible for complince with informtion security nd privcy stndrds defined within the federl Helth lnsurnce Portbility nd Accountbility Act (HIPAA), including the Helth lnformtion Technology for Economic nd Clinicl Helth (HITECH) Act. These lws ddress privcy nd security requirements relted to the storge nd trnsmission of PHl, to prevent ginst unuthorized ccess nd dt breches. Filure to comply with HIPAA nd HITECH cn result in prctices or incidents tht my be reportble to the United Sttes Deprtment of Helth nd Humn Services. lnpproprite Access We reviewed user ccess for two of the 30 systems tht DPH identified s mission criticl. The systems reviewed were the Phrmcy lnventory nd Lbeling System (PILS), nd the Public Helth Lbortory System (PHLAB). Our review ws intended to determine if ccess to PHI is limited bsed on employee job duties. Bsed on our review, user ccess to PILS ppered to be pproprite. However, we noted tht 13 PHLAB users, including two contrctors, terminted employmenucontrcts with DPH but continued to hve ctive ccess to PHLAB for two weeks to three yers fter termintion. ln ddition, one of the user ccounts ws used to ccess PHLAB 133 times fter termintion to view PHI nd order lbortory tests for pproximtely 100 clients. DPH mngement indicted they re investigting whether the individul who ccessed the terminted user ccount ws uthorized to view the PH! nd to order the lbortory tests. AU DITOR-CONTROLLER COUNTY OF IOS A'VGELES

7 DPH - lt nd Security Policies Review Pge 2 These issues occurred becuse DPH stff did not follow Deprtment policy for immeditely restricting ccess when employees terminte, nd did not periodiclly review PHLAB ccess levels, s required by County Fiscl Mnul (CFM) Section DPH mngement needs to determine if the terminted employee's ccess to PHLAB resulted in HIPAA/HITECH violtion, nd tke ction to correct nd report ny violtions. The Deprtment lso needs to remind stff to immeditely updte systems ccess privileges when employees terminte nd periodiclly review systems ccess to ensure ccess levels re uthorized nd pproprite for ech user's job duties. Recommendtions Deprtment of Public Helth mngement: 1 Determine f terminted employee ccess to the Public Helth Lbortory System resulted in HIPAA/HITECH violtion, nd tke ction to correct nd report ny violtions. 2. Remind stff to immeditely updte systems ccess privileges when employees terminte. 3. Periodiclly review systems ccess to ensure ccess levels re uthorized nd pproprite for ech user's job duties. Access Documenttion We plnned to review user ccess for three other criticl DPH systems; the Ptient Helth Informtion System (P-H S), CseWtch HlV, nd CseWtch STD. However, we could not review ccess due to lck of documenttion. Specificlly: User Access Reports - DPH could not generte user ccess report for P-HIS. As result, we could not identify who hd system ccess or their ccess cpbilities. DPH mngement indicted tht P-HIS is legcy system tht does not currently hve ccess reporting cpbility. DPH mngement needs to evlute modifying the P-HIS to trck nd report user ccess roles, or develop lterntive mesures to monitor user ccess. Access Role Documenttion - DPH could not document the user ccess role cpbilities for the CseWtch HIV nd CseWtch STD Systems. As result, we could not determine if users' ccess roles re pproprite for their job duties. DPH mngement needs to document ccess role cpbilities for CseWtch HIV nd CseWtch STD, nd monitor ccess s required. Without sufficient informtion, the Deprtment cnnot dequtely monitor user ccess nd ccess role cpbilities s required by CFM Section AU DITOR-CONTROLLER COUNTY OF LOS AA'GELES

8 DPH - lt nd Securitv Policies Review Poe 3 Recommendtions Deprtment of Public Helth mngement: 4 Evlute modifying the Ptient Helth lnformtion System to trck nd report user ccess roles, or develop lterntive mesures to monitor user ccess. 5. Document ccess role cpbilities for CseWtch HIV nd CseWtch STD, nd monitor ccess s required. Access Controls Bord Policy requires systems to hve pproprite user uthentiction such s log-on identifictions (ld) nd psswords tht re not shred. CFM Section includes pssword complexity requirements, nd requires deprtments to document pprovls for system ccess ssignments. We reviewed ccess controls for the fíve DPH systems mentioned in the sections bove, nd noted the following weknesses: O o Pssword Complexity - Psswords for four (80%) of the five systems do not require combintion of numeric, upper, nd lower cse chrcters s required by the CFM. Access Authoriztions - 18 (90%) of the 20 user ccounts reviewed for four systems did not hve documented pprovl for the ccess. This includes 16 users who hd no ccess request form on file, nd two users who hd n ccess request form on file tht ws not signed by supervisor. We could not review ccess uthoriztions for the fifth system due to the lck of user ccess report noted in the section bove. DPH mngement needs to require systems psswords to include combintion of numeric, upper, nd lower cse chrcters, nd needs to document pprovls for ll system ccess ssignments. Recommendtions Deprtment of Public Helth mngement: 6. Require systems psswords to include combintion of numeric, upper, nd lower cse chrcters. 7. Document pprovls for ll system ccess ssignments. AU DITOR-CONTROLLER COUNTY OF OS AA'GELES

9 DPH - lt nd Security Policies Review Pqe 4 Phvsicl Securitv Bord Policy requires deprtments to physiclly sfegurd lt resources from tmpering, dmge, theft, or unuthorized physicl ccess. This includes developing Fcility Security Pln tht documents the physicl security mesures t ech fcility. These controls help prevent dt breches such s the recent brech t DPH contrctor. We noted tht DPH hs not developed Fcility Security Plns. ln ddition, we visited five DPH offices tht house criticl lt resources such s dt centers, computers, multifunctionl printers, etc., nd noted the following physicl security weknesses: o lnpproprite Access: Twenty-one employees who terminted from the County continued to hve ctive key crd ccess to enter three DPH offices for up to five yers fter termintion. Unsecured Equipment: DPH stff do not lwys secure unttended computer equipment. Specificlly, DPH's Mterils Mngement Division stores surplus computer equipment Ín wrehouse receiving re tht is open to the public during business hours. DPH stff re not lwys present, mking the equipment, dt, nd softwre susceptible to theft.!n ddition, lptops t two of the five DPH offices reviewed re not secured wíth lock when left unttended. Surveillnce System: One of DPH's most criticl dt centers contining confidentil dt hs surveillnce system tht does not work. DPH lt mngers re wre of the issue, but need to tke ction to identify funds nd dedicte stff to replce the surveillnce system. DPH mngement needs to immeditely cncel key crd ccess for the terminted employees noted in our review nd for ny employee who trnsfers loctions or termintes. DPH lso needs to secure unttended computing devices when not in use, including when devices re witing for snittion nd disposl. While Bord Policy does not require surveillnce cmers, DPH needs to identify funds nd stff resources to replce the surveíllnce system t the criticl lt fcility identified in our review. Recommendtions Deprtment of Public Helth mngement: I I lmmeditely cncel key crd ccess for the terminted employees noted in our review, nd for ny employee who trnsfers loctions or termintes. Secure unttended computing devices when not in use, including when devices re witing for snittion nd disposl. AU DITOR-CONTROLLER COUNTY OF OS ANGE ES

10 10. ldentify funds nd stff resources to replce the surveillnce system t the criticl informtion technology fcility identified in our review. lt Equipment Control Bord Policy requires deprtments to ssign lt equipment to specífic individuls (custodins). CFM Chpter 6 lso requires deprtments to inventory their lt equipment nnully nd to keep up-to-dte lt equipment lists. These controls help ensure County computers nd dt re ccounted for nd sfegurded. Equipment Inventories We reviewed 98 DPH lt equipment items, including the 68 from DPH's equipment lists nd 30 we observed t five DPH field offices. We noted missing lt equipment, nd weknesses in equipment control tht could llow County computers nd dt to go missing or be stolen without being detected. Specificlly: Missing Equipment - We could not locte seven (1O%) of the 68 items from DPH's equipment lists. This includes three desktops, two lptops, nd two tblets ssigned to DPH offices tht mnge PHl. DPH lt stff t one office indicted tht five of the computers my hve been disposed, but could not provide ny disposl documenttion. DPH mngement needs to investigte the missing computer devices nd report ny lost or stolen computers through the County's incident response procedures to minimize the risk of ny lost dt or softwre on these devices. Inccurte Trcking - 40 (41o/o) of the 98 items reviewed hd n inccurte custodin, loction, or equipment description recorded on DPH's equipment lists. Using udit softwre, we nlyzed ll 20,757 items on DPH's lt equípment lists nd noted tht 9,400 (45%) hve missing or incorrect mke/model, mnufcturer's seril number, sset custodin, etc., including 315 items ssigned to individuls who no longer work t the Deprtment. DPH needs to updte its equipment inventories for the inccurcies identified in our review. Asset Tgs - DPH generlly does good job of using sset tgs to ccount for lt equipment. However, we noted one (1o/o) of the 98 lt equipment items reviewed did not hve n sset tg to identify it s County property. DPH needs to ensure County property tg is ttched to ll equipment. We lso noted DPH does not properly conduct physicl inventories of their lt equipment becuse they do not lwys updte their inventory lists for discrepncies in loction, custodin, or equipment description when conducting their physicl count. DPH needs to conduct ccurte physicl inventories nd investigte nd updte inventory lists for ny discrepncies. AU DITOR.CONTROLLER COUNTY OF LOS A'VGEI-ES

11 DPH - lt nd Securitv Policies Review Pqe 6 Recommendtions Deprtment of Public Helth mngement: 11. lnvestigte missing computer devices nd report ny lost or stolen computers through the County's incident response procedures. 12. Updte equipment inventories for the inccurcies noted in our review. 13. Ensure County property tg is ttched to ll equipment. 14. Ensure stff conduct ccurte physicl equipment inventories nd investigte nd updte inventory lists for ny discrepncies. Computer Assignments DPH's records indicte tht 487 (14o/o) of their 3,583 employees hve two or more computers ssigned to them (e.9., desktop nd lptop or tblet). Eight (32Yo) of the 25 stff interviewed with two computers indicted tht they do not need one computer, including one person who hd not used his lptop for two yers. In ddition, three of the eight individuls hd two of the sme type of device (e.9., two lptops, two tblets, etc.). Unneeded computers increse the risk of loss, nd result in higher mintennce, support, nd softwre costs. DPH should evlute their stff computer ssignments, trnsfer or slvge unneeded items, nd evlute estblishing computer pool nd checkout process for devices tht stff do not frequently use. Recommendtion 15. Deprtment of Public Helth mngement evlute stff computer ssignments, trnsfer or slvge unneeded items, nd evlute estblishing computer pool nd checkout process. Portble Gomputer Encrvption Bord Policy requires deprtments to encrypt ll County owned portble computers. Encryption helps render dt unredble if computer is lost or stolen, nd protects ginst unuthorized disclosure of personl/confidentil informtion. DPH could not document tht they encrypted ll of the 1,773 portble computers in their inventory. Specificlly, DPH only hd encryption documenttion for 1,454 (82Yo) portble computers (319 less thn their inventory). ln ddition, the encryption documenttion did not include enough informtion, such s ech device's sset tg number or seril number, to llow us to mtch it to ny of the 1,773 computers in AU DITOR-CONTROLLER COUNTY OF LOS AA'GELES

12 DPH - lt nd Securitv Policies Review Pqe 7 inventory. We reviewed 28 portble computers ssigned to DPH stff nd noted eight (29%) díd not hve encryption softwre instlled. ln ddition, DPH mngement does not periodiclly monitor the Deprtment's portble computers to ensure tht ech device is encrypted. DPH needs to ensure ll portble computers re encrypted, nd tht ech portble computer cn be specificlly mtched with documenttion tht confirms it is protected by current encryption technology, nd periodiclly monitor the encryption sttus of ll portble computers. Recommendtions Deprtment of Public Helth mngement: 16. Ensure ll portble computers re encrypted, nd tht ech portble computer cn be specificlly mtched with documenttion tht confirms it is protected by current encryption technology. 17. Periodiclly monitor the encryption sttus of ll portble computers. Antivirus Softwre Bord Policy requires deprtments to ensure they hve functioning up-to-dte ntivirus softwre protection for ll County computers. Deprtments must updte ntivirus softwre regulrly to protect ginst the most current threts. Thirteen (23o/o) of the 56 computers reviewed did not hve up-to-dte ntivirus softwre protection, including one with no ntivirus softwre instlled. DPH mngement needs to ensure ll computers hve current ntivirus protection. Recommendtion 18. Deprtment of Public Helth mngement ensure ll computers hve current ntivirus protection. Hrd Drive Disposl Bord Policy requires deprtments to render unredble nd unrecoverble ll dt nd softwre from computer hrd drives before disposing of the devices from County inventory. We reviewed ten instnces where DPH disposed of multiple computers nd hrd drives. For three (30%) of the ten computer disposls reviewed, DPH could not document tht they ersed every hrd drive disposed. Specificlly: AU DITOR-CONTROLLER COUNTY OF LOS AÍVGELES

13 o f n two disposl instnces, DPH could not document ersing ten (15%o) of the 65 totl hrd drives. ln one disposl instnce, DPH documented disposing of 35 computers nd four boxes of hrd drives, nd documented ersing 84 hrd drives. However, we could not determine if DPH ersed every hrd drive becuse the documenttion does not indicte how mny hrd drives were in the boxes. DPH lso does not document the sset tg number of disposed computing devices or the seril number of the ersed hrd drives, mking it impossible to determine which computing devices hd their hrd drive ersed. DPH mngement needs to ensure ll hrd drives re properly ersed before disposl, mintin documenttion of the ersures, nd ensure the documenttion includes the seril number nd/or computing device sset tg number of every hrd drive ersed. Recommendtion 19. Deprtment of Public Helth mngement ensure ll hrd drives re properly ersed before disposl, mintin documenttion of the ersures, nd ensure the documenttion includes the seril number nd/or computing device sset tg number of every hrd drive ersed. lt Securitv lncidents Bord Policy requires deprtment mngement to immeditely report lt security incidents through the County's computer incident response procedure to minimize the impct of security breches, such s HIPAA dt loss, to individuls nd to the County. We noted tht DPH does not lwys report lt security incidents through the County's incident response procedure. Specificlly, DPH mngers/stff identified 131 missing or stolen lt equipment items between 2011 nd 2013, but did not report them to the Deprtment Informtion Security Officer (DISO), s required by Bord Policy As result, the DISO could not ssess the impct of these losses to the individuls, the Deprtment, nd the County. The DISO lso could not mke required notifictions to the Chief lnformtion Office, the Auditor-Controller's (A-C) HIPAA Privcy Officer, nd the A-C Office of County lnvestigtions tht the items nd ny ssocited dt or softwre were missing. Approximtely 85 (65%) of the 131 missing/stolen items were ssigned to sections tht hndle PHl, incresing the risk tht HIPAA or HITECH violtions could hve occurred. DPH mngement needs to report missing nd stolen computers through the County's incident response procedure, nd remind stff to report security incidents to the DISO. Weknesses in DPH's security wreness trining progrm, discussed ín the next section, my hve contributed to stff nd mngers' lck of knowledge of incident response procedures. AU DITOR-CONTROLLER COUNTY OF tos ANGELES

14 DPH - lt nd Securitv Policies Review Pqe 9 Recommendtion 20. Deprtment of Public Helth mngement report missing nd stolen computers through the Gounty's incident response procedure, nd remind stff to report security incidents to the Deprtment Informtion Security Officer. lnformtion Securitv Trining Bord Policy requires deprtments to provide informtion security wreness trining (Trining) to ll lt resource users t the time they re hired nd periodiclly therefter. Trining should be documented to ssist mngement in determining employee wreness nd prticiption. DPH mngement indicted tht they provide periodic Trinings for ll lt users, but lso indicted tht the trining is optionl, genertes low ttendnce, nd DPH does not keep ttendnce records to evlute employee wreness. DPH needs to ensure ll lt resource users receive dequte lt Security Awreness Trining. DPH lso could not document wht Trining mteril they provided to stff, so we could not determine if the Trining ddressed criticl topics such s procedures for reporting lt security incidents s mentioned bove. DPH needs to ensure!t trining nd ttendnce is documented. Recommendtion 21. Deprtment of Public Helth mngement ensure ll informtion technology (lt) resource users receive dequte lt Security Awreness Trining, nd tht the trining nd ttendnce is documented. AU DITOR.CONTROLLER COUNTY OF LOS AÍVGEI-ES

15 Attchment II Pge I of 8 CYNTHIA A. HARDING, M,P.H. lntsr m Direclor JEFFFEY D. GUNZENHAUSER, M.D., M.P.H. lnler m Hollh Ollic r 313 Nolh F gu m Slrs, Fæm 7@ Los An9 16s, Clilornl TEL (213) 2G8156. FAX (213) 48l-2739 wwyy. pnbl ch.rllh.l county. gov EOARD OF SUPERVISORS Hild! L. Solir Fúst Di6tricl l lrrl Rldl.Êhom. Secmd 0irtict Sh.ih Ku.hl Thùd D strit Oon Xnlb Foudh Oiskict Frhh O 3ùicl April2,20L5 TO: lohn Nimo Auditor-Controller FROM Cynthi A, Hrdine, MPH lnterim Director SUBJECf: DEPARTMENT OF PUBUC HEALTTI - RESPONSE TO INFORMATION TECHNOTOGY AND SECURITY POTICIES REVIEW Plese find ttched our response to the ud t performed by your deprtment of Public Helth's complince with the Bord of Superyisors' lnformtion Technology nd Security Policies, As indicted in the ttchment, DPH grees with ll of the findings nd we re in the process of ddressing those res where we were not in full complince, Our Deprtmentl lnformtion Security Officer will be following up to ensure tht ech corrective ction is effectively implemented. I would like to thnk you nd your stff for bringing to our ttent on the res tht we need to strengthen. lf you hve ny quest ons or require dditionl informtion, plese contct me, or your stff my contct Jim Green, DPH Chief lnformtion Officer, t or jimgreen@ph.lcounty.gov CH:JG:dc:v Attchment County Counsel County Chief HIPAA Privcy Officer County Chief lnformtion Security Officer Auditor-Controller DPH Administrtive Deputy DPH Chief lnformtion Officer DPH Audit & lnvestigtions Division DPH HIPAA Privcy Officer DPH lnformtion Security Officer

16 Attchment ll Pge 2 ol 8 Attchment I Review of Public Helth's Complince with Bord lt Policies Systems Access 1." Terminted Employee Access Determine if terminted employee ccess to the Public Helth lb System resulted in Helth lnsurnce PortbiliÇ nd Accountbility Act nd Helth lnformtion Technology for Economic nd Clinicl Helth Act lws (HIPAA/HITECH violtion, nd tke ction to correct nd report ny violtions. Agree, DPH determined tht the terminted employee's Public Helth Lb System ccount ws used by n employee ssigned to perform the sme duties tht the terminted employee performed. The employee filed to obtin nd use her own credentils for these duties, which violted County policy. However, this did not result in reportble brech of Electronic Protected Helth lnformtion (ephl). DPH reviewed Public Helth Lb System user ccounts t the helth center to ensure tht employees re ll using their own credentils. The DPH lt Security Awreness Trining Progrm includes review of Acceptble Use, lt Security is emphsizing in ech trining session t DPH Progrm offices the requirement tht employees use only their own uthorized credentils for system ccess. 2 Remind stff to immeditely updte systems ccess privileges when employees terminte. Agree. Since July, 2Ot4,DPH lt Directors re being reminded in the Deprtmentl lnformtion Security Steering Committee to promptly remove credentils of terminted employees nd to regulrly review user ccounts to ensure tht ll system ccess privileges re pproprite. DPH is developing procedures for notifying Progrm Directors nd System Mngers of personnel chnges, instructing them to immeditely updte system ccess privileges when employees terminte or chnge ssignments, nd providing regulr review of ccount privileges, 3. Periodiclly review systems ccess to ensure ccess levels re uthorized nd ppropríte for ech user's job duties. Agree, DPH now utomticlly disbles ny Active Directory ccount for which 60 dys psses without login ctivity, The Deprtmentl lnformtion Security Officer is developing tools to conduct regulr ssessments of ccounts nd ccess privileges for ech DPH system to ensure users hve the pproprite level of ccess reltive to their job duties,

17 Attchment ll Pge 3 of I Access Documenttion Recommendtions 4. User Access Reports Evlute modifying the Ptient Helth lnformtion System (P-HlSl to trck nd report user ccess roles or develop lterntive mesures to monítor user ccess. Agree, As prt of n upgrde implemented in December 20L4, users re now required to uthenticte through Active Directory (AD) to log in to P-HIS. The login cretes user ccess log entry, which is being used to monitor ccess. 5. Access Role Documenttion Document ccess role cpbilities for CseWtch HIV nd CseWtch STD, nd monitor eccess s required, Agree. As of September,2OL4, Csewtch (HlV) nd STD*Csewtch users log in through Terminl Server, This login process cretes user ccess log entry, which is used to monitor ccess. DPH will develop stndrd System Access Authoriztion form by June 30,2015, to include justifictions for ccess nd role descriptions for ech system ccess request. Access Controls Recommendtions 6. Require systems' psswords to include combintion of numeric upper nd lowercse chrcters. Agree. The DPH Active Directory, which controls ccess to PCs, file shres, nd other DPH network resources, enforces complex psswords, Some DPH dt systems require dditionl credentils for ccess, nd we re conducting n evlution to determine for ech system whether it cn be configured or modified to implement complex pssword requirements, ln cses where strong pssword logic cnnot be implemented, DPH will evlute options to replce systems or provide compensting controls. 7 Access Authoriztions Document pprovls for ll system ccess ssignments. DPH will develop stndrd System Access Authoriztion form by June 30,2Ot5, to include justifictions for ccess nd role descriptions for ech system ccess request, nd develop record-keeping procedures, Revielv of Pul)l c Heòlth's Cornplince r,vitlr Borcl lt Policies April 2, 2015 Pge 2 oí 7

18 Physicl Security Attchment ll Pge 4 of I 8. lmmeditely cncel keycrd ccess for terminted employees nd for ny employee who trnsfers to nother loction or termintes employment. Agree. DPH hs cnceled keycrd ccess for terminted employees identified in the udit. DPH will develop procedures to notify Progrm Directors nd System Mngers of personnel chnges nd instruct them to immeditely updte keycrd ccess when employees terminte or chnge ssignments. We will lso conduct periodic reviews of ccess lists to ensure tht ll ccess continues to be pproprite, 9. Unsecured Equipment Secure unttended computing devices when not in use, including when devices re witíng for snittion nd disposl. Agree. DPH hs convened n Asset Mngement lmprovement Tem to work with the Ferguson Wrehouse Mngers nd Asset Custodins to ensure tht ssets in the wrehouse nd other fcilities re properly secured. 10. Surveillnce Svstem ldentify funds nd stff resources to replce the surveillnce system t the criticl informtion technology fcility ldentified in our review. Agree, DPH hs engged vendor to review the surveillnce system nd mke recommendtions for the design nd impfementtion of replcement system. Once design is pproved, DPH will move expeditiously to cquire nd implement the replcement system. To further ddress physicl security, DPH will develop Fcility Security Pln to document physicl security mesures t ech DPH fcility. Revierv of PLrblic Helth's Conrplince t', ith Borcl lt Policies April 2,2015 Pge 3 of 7

19 Attchment ll Pge 5 of I lt Equipment Control E q ui pme nt I nve ntories Recom me n d ti ons tt. lnvestigte missing computer devices nd report ny lost or stolen computers using the County's íncident response procedures. Agree, DPH investigted the missing devices identified in the udit, A Computer Security lncident Report Form hs been completed nd submitted to the County Chief lnformtion Security Officer in ccordnce with the County's incident response procedures. Progrm Directors nd Asset Custodins hve been reminded tht the County's incident response procedures require employees to report lost, stolen, or improperly inventoried County lt resources immeditely to their supervisors. The monthly Deprtmentl lnformtion Systems Security Committee (DISSC) Meeting is used to periodiclly remind lt Directors of these requirements. ln ddition, t ech nnul inventory, the Deprtmentl lnformtion Security Officer will work with DPH Mterils Mngement to ensure tht in the event ny computer items re not ccounted for, they re properly reported using the DPH Computer Security lncident Report Form. t2 Updte equipment inventories for inccurcies. Agree, The DPH Asset Mngement lmprovement Tem is reviewing ll inventory mngement procedures to identify gps nd prioritize improvements, lnitil improvements include: (1) Slvge ctivities hve been centrlized for improved ccurcy nd control, nd (2) PC technicins use the Deprtment's brcode sset mngement system to immeditely updte inventory in the field s equipment is moved or slvged, 13. Ensure County property tg is ttched to ll equipment. Agree. DPH revised its process in December 2OL4to ensure tht ll equipment received goes through the DPH Mterils Mngement Wrehouse, where it is tgged, ln ddition, PC technicins will be trined to ensure County ssettg is ttched when performing nnul inventories, conducting routine inspections, providing mintennce, or replcing lt equipment, Revielv of Pt blic Helth's Conrplince t'vith Borcl lt Policies April 2,2015 Pge 4 of 7

20 Attchment Il Pge 6 of 8 L4. Ensure stff conduct ccurte physicl equípment inventories nd investigte nd updte inventory lists for ny discrepncies. Agree. The DPH Asset Mngement lmprovement Tem is reviewing ll inventory mngement procedures to identify gps nd prioritize improvements. PC technicins will receive dditionl trining on procedures nd will use the Deprtment's brcode sset mnegement system to immeditely updte inventory in the field s equipment is mintined, moved or slvged, 15. Evlute stff computer ssignments, trnsfer or slvge unneeded items, nd evlute estblishing computer pool nd checkout process. Agree. DPH will evlute current computer ssignments to determine whether the pproprite equipment nd the number of ssigned computers re in lignment with job duties. We will ensure tht proper trnsfer nd slvging of unneeded items re completed nd documented. We will evlute expnding the use of computer pools nd refining the computer checkout process. Portble Computer Encryption 16. Ensure ll poéble computers re encrypted nd tht ech portble computer cn be specificlly rntched with documenttion tht confirms it is protected by current encryption technology. Agree, DPH will conduct LOO% recll of ll portble computers in the Deprtment to vlidte nd document tht they re properly encrypted. ln ddition, s prt of the desktop encryption project, we re implementing the cpbility to monitor nd report on the encryption sttus of ll computers, including portbles. L7 Periodiclly monitor the encryption sttus of ll portble computers. Agree. DPH worked with the County Chief lnformtion Security Officer to cquire WinMgic softwre, which DPH will use to monitor nd report on encryption sttus of ll desktops nd portble computers, Revielv of Pr.rl lic Helth's Cornplince r,vith Bord lt Polícies April 2, 2O15 Pge 5 of 7

21 Attchment ll Pge 7 of I Antivirus Softwre Antivirus Recommendtion 18. Ensure ll computers hve current ntivirus protection. Agree, The Deprtment's desktop computers receive ntivirus updtes through routine ptching over the network, As prt of the portble computer recll, DPH will review ech portble computer to verify its ntivirus protection nd correct ech deficiency. We will ensure ech computer is configured to receive routine ntivirus updtes. Hrd Drive Disposl 19. n Ensure ll hrd drives re properly ersed before disposl, mintin documenttion of the ersures, nd ensure the documenttíon includes the seril number ndlor computing device sset tg number of every hrd drive ersed. Agree, Previously, hrd drives were removed from computers in DPH Progrm offices before being slvged, which mde it difficult to determine whether the hrd drive ws properly ersed prior to disposl of the computer. Under our new procedures implemented in July 2OL4, the entire computer is sent to the DPH Mterils Mngement Wrehouse for proper snitizing nd documenttion. lt Security lncidents 20. endtion Report missing nd stolen computers through the County's incident response procedure nd remind stff to report security incidents to the Deprtment lnformtion Security Officer (Drsol. Agree. All DPH stff were reminded in Mrch, 2015, tht the County's incident response procedures require employees to report missing or stolen County lt resources immeditely to their supervisors. The DepÉmentl lnformtion Security Officer routinely reinforces incident response procedures in the monthly Deprtmentl lnformtion Systems Security Committee (DISSC) Meeting. Revier*v of Pul lic Helth's Complince r,vith Bord lt Policies April 2,2015 Pge 6 of 7

22 Attchment II Pge 8 of 8 I nfo rmtio n Secu ritv Tri ni nq 2t. Ensure ll informtion technology (lt) resource users receive dequte lt Security Awreness Trining nd tht the trining nd ttendnce is documented. Agree. Currently, Deprtmentl policy requires tht ll employees tke HIPAA wreness trining within 30 dys of employment. The Deprtment's orienttion pckge includes dditionl informtion bout computer security. Effective My 2OtL, ttendees of the qurterly lt Security Awreness Trinings sign in to document their ttendnce trining. ln ddition, the DepÉmentl lnformtion Security Officer is working with the County lnformtion Security Officer on selection nd implementtion of online lt security wreness trining to be delivered to ll employees through the LerningNet. Revierv of Public He lth's Conrplince with Bord lt Policies April 2, 2O15 Pge 7 of 7

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

Quick Reference Guide: One-time Account Update

Quick Reference Guide: One-time Account Update Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

Chromebook Parent/Student Information

Chromebook Parent/Student Information Chromebook Prent/Student Informtion 1 Receiving Your Chromebook Student Distribution Students will receive their Chromebooks nd cses during school. Students nd prents must sign the School City of Hmmond

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

File Storage Guidelines Intended Usage

File Storage Guidelines Intended Usage Storge 1 Google Cloud 2 Other cloud storge Exmple or Box, Dropbox, Crbonite, idrive File Storge Guidelines Usge Fculty nd student collbortion Specil use cses. When non-lcc employee nd students need ccess

More information

Corporate Compliance vs. Enterprise-Wide Risk Management

Corporate Compliance vs. Enterprise-Wide Risk Management Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will

More information

Total Data Protection for Sensitive Data Wherever It May Flow

Total Data Protection for Sensitive Data Wherever It May Flow Totl Dt Protection for Sensitive Dt Wherever It My Flow PGP Corportion nd Protegrity protect sensitive dt throughout its lifecycle, while enforcing nd verifying policy requirements for complince. Protegrity

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

In addition, the following elements form an integral part of the Agency strike prevention plan:

In addition, the following elements form an integral part of the Agency strike prevention plan: UNITED STTES DEPRTMENT OF GRICULTURE Wshington, DC 20250 Federl Grin Inspection Service FGIS Directive 4711.2 6/16/80 STRIKE PREVENTION ND STRIKE CONTINGENCY PLNS I PURPOSE This Instruction: Estlishes

More information

THE FOLLOWING QUESTIONS WERE ASKED DURING THE DISASTER APPLICATION WORKSHOP OR IMMEDIATELY THEREAFTER.

THE FOLLOWING QUESTIONS WERE ASKED DURING THE DISASTER APPLICATION WORKSHOP OR IMMEDIATELY THEREAFTER. WORKSHOP UESTIONS THE FOLLOWING UESTIONS WERE SKED DURING THE DISSTER PPLICTION WORKSHOP OR IMMEDITELY THEREFTER. GENERL INFORMTION HOW WILL DC DETERMINE THT PROJECT IS RELTED TO HURRICNE DMGE? BY SUBMITTING

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

INJURY MANAGEMENT & REHABILITATION

INJURY MANAGEMENT & REHABILITATION OBJECTIVES To estblish systemtic pproch to injury mngement nd rehbilittion throughout the City immeditely following work relted illness, injury nd disbility. To estblish tht it is the responsibility of

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

2. Transaction Cost Economics

2. Transaction Cost Economics 3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service

More information

Humana Critical Illness/Cancer

Humana Critical Illness/Cancer Humn Criticl Illness/Cncer Criticl illness/cncer voluntry coverges py benefits however you wnt With our criticl illness nd cncer plns, you'll receive benefit fter serious illness or condition such s hert

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Pay over time with low monthly payments. Types of Promotional Options that may be available: *, ** See Page 10 for details

Pay over time with low monthly payments. Types of Promotional Options that may be available: *, ** See Page 10 for details With CreCredit... Strt cre immeditely Py over time with low monthly pyments For yourself nd your fmily Types of Promotionl Options tht my be vilble: Not ll enrolled helthcre prctices offer ll specil finncing

More information

Architecture and Data Flows Reference Guide

Architecture and Data Flows Reference Guide Architecture nd Dt Flows Reference Guide BlckBerry Enterprise Service 12 Version 12.0 Pulished: 2014-11-10 SWD-20141110103011848 Contents Components used in the BES12 solution... 5 Components used to mnge

More information

Recognition Scheme Forensic Science Content Within Educational Programmes

Recognition Scheme Forensic Science Content Within Educational Programmes Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems

More information

Your duty, however, does not require disclosure of matter:

Your duty, however, does not require disclosure of matter: Your Duty of Disclosure Before you enter into contrct of generl insurnce with n insurer, you hve duty, under the Insurnce Contrcts Act 1984 (Cth), to disclose to the insurer every mtter tht you know, or

More information

The 8 Essential Layers of Small-Business IT Security

The 8 Essential Layers of Small-Business IT Security The 8 Essentil Lyers of Smll-Business IT Security While there is no technology tht cn gurntee your network is truly impenetrble, you cn significntly reduce your risk by deploying multiple lyers of defense.

More information

Utilization of Smoking Cessation Benefits in Medicaid Managed Care, 2009-2013

Utilization of Smoking Cessation Benefits in Medicaid Managed Care, 2009-2013 Utiliztion of Smoking Cesstion Benefits in Medicid Mnged Cre, 2009-2013 Office of Qulity nd Ptient Sfety New York Stte Deprtment of Helth Jnury 2015 Introduction According to the New York Stte Tocco Control

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 11/12 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Application Bundles & Data Plans

Application Bundles & Data Plans Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help

More information

Current Topics. Implications for Compliance Organizations. Presentation to the IIB. October, 2015

Current Topics. Implications for Compliance Organizations. Presentation to the IIB. October, 2015 Current Topics Implictions for Complince Orgniztions Presenttion to the IIB October, 2015 This presenttion contins generl informtion only nd Deloitte is not, by mens of this presenttion, rendering ccounting,

More information

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, o_c 20301-6000

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, o_c 20301-6000 DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, o_c 20301-6000 CHIEF INFORMATION OFFICER December 9. 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF

More information

Psychological health and safety in the workplace Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013

Psychological health and safety in the workplace Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013 Psychologicl helth nd sfety in the workplce Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013 promotion, nd guidnce to stged implementtion This smple udit tool is n nnex of the Ntionl Stndrd of Cnd on Psychologicl

More information

STATE OF MONTANA Developomental Disabilities Program Comprehensive Evaluation Hi-Line Home Programs, Inc Adult Services

STATE OF MONTANA Developomental Disabilities Program Comprehensive Evaluation Hi-Line Home Programs, Inc Adult Services Dtes of Review: FY '09 Evluttor(s): S. Crpenter DESK REVIEW: Accredittion: Acredittion is no longer required by the stte contrct. Significnt Events from the Agency: Developomentl Disbilities Progrm Comprehensive

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

Many national organizations

Many national organizations SYMPOSIUM Primry-cre setting Implementtion of drug therpy monitoring clinic in primry-cre setting JILLMARIE K. YANCHICK Mny ntionl orgniztions hve identified the optiml mngement of chronic disese sttes

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

GAO IRS AUDIT RATES. Rate for Individual Taxpayers Has Declined But Effect on Compliance Is Unknown

GAO IRS AUDIT RATES. Rate for Individual Taxpayers Has Declined But Effect on Compliance Is Unknown GAO United Sttes Generl Accounting Office Report to the Chirmn, Subcommittee on Oversight, Committee on Wys nd Mens, House of Representtives April 2001 IRS AUDIT RATES Rte for Individul Txpyers Hs Declined

More information

Prescriptive Program Rebate Application

Prescriptive Program Rebate Application Prescriptive Progrm Rebte Appliction Check the pproprite progrm box for your rebte. OID Internl Use Only Cooling FSO (Fluid System Optimiztion) Foodservice Equipment Heting Lighting Motors & Drives Customer

More information

Anthem Blue Cross Life and Health Insurance Company University of Southern California Custom Premier PPO 800/20%/20%

Anthem Blue Cross Life and Health Insurance Company University of Southern California Custom Premier PPO 800/20%/20% Anthem Blue Cross Life nd Helth Insurnce Compny University of Southern Cliforni Custom Premier 800/20%/20% Summry of Benefits nd Coverge: Wht this Pln Covers & Wht it Costs Coverge Period: 01/01/2015-12/31/2015

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION KENYA THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION INTRODUCTION Hving estblished itself in no less thn eleven Sub-Shrn countries nd with more thn 230 000 vehicles lredy on its system

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

Active & Retiree Plan: Trustees of the Milwaukee Roofers Health Fund Coverage Period: 06/01/2015-05/31/2016 Summary of Benefits and Coverage:

Active & Retiree Plan: Trustees of the Milwaukee Roofers Health Fund Coverage Period: 06/01/2015-05/31/2016 Summary of Benefits and Coverage: Summry of Benefits nd Coverge: Wht this Pln Covers & Wht it Costs Coverge for: Single & Fmily Pln Type: NPOS This is only summry. If you wnt more detil bout your coverge nd costs, you cn get the complete

More information

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt

More information

Welch Allyn CardioPerfect Workstation Installation Guide

Welch Allyn CardioPerfect Workstation Installation Guide Welch Allyn CrdioPerfect Worksttion Instlltion Guide INSTALLING CARDIOPERFECT WORKSTATION SOFTWARE & ACCESSORIES ON A SINGLE PC For softwre version 1.6.5 or lter For network instlltion, plese refer to

More information

VMware Horizon Mirage Web Manager Guide

VMware Horizon Mirage Web Manager Guide VMwre Horizon Mirge We Mnger Guide Horizon Mirge 4.3 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To check for

More information

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.

More information

UNITED STATES DEPARTMENT OF AGRICULTURE Washington, D.C. 20250. ACTION BY: All Divisions and Offices. FGIS Directive 2510.

UNITED STATES DEPARTMENT OF AGRICULTURE Washington, D.C. 20250. ACTION BY: All Divisions and Offices. FGIS Directive 2510. UNITED STATES DEPARTMENT OF AGRICULTURE Wshington, D.C. 20250 ACTION BY: All Divisions nd Offices FGIS Directive 2510.1 12-11-73 FEDERAL TORT CLAIMS I PURPOSE This Instruction: A Sets forth the bsic provisions

More information

Quick Reference Guide: Reset Password

Quick Reference Guide: Reset Password Quick Reference Guide: Reset Pssword How to reset pssword This Quick Reference Guide shows you how to reset your pssword if you hve forgotten it. There re three wys to reset your SingPss pssword: 1) Online

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

FDIC Study of Bank Overdraft Programs

FDIC Study of Bank Overdraft Programs FDIC Study of Bnk Overdrft Progrms Federl Deposit Insurnce Corportion November 2008 Executive Summry In 2006, the Federl Deposit Insurnce Corportion (FDIC) initited two-prt study to gther empiricl dt on

More information

Commercial Cooling Rebate Application

Commercial Cooling Rebate Application Commercil Cooling Rebte Appliction Generl Informtion April 1 st 2015 through Mrch 31 st 2016 AMU CUSTOMER INFORMATION (Plese print clerly) Business Nme: Phone #: Contct Nme: Miling Address: City: Stte:

More information

Health Information Systems: evaluation and performance of a Help Desk

Health Information Systems: evaluation and performance of a Help Desk 536 Digitl Helthcre Empowering Europens R. Cornet et l. (Eds.) 2015 Europen Federtion for Medicl Informtics (EFMI). This rticle is published online with Open Access by IOS Press nd distributed under the

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

How To Reduce Telecommunictions Costs

How To Reduce Telecommunictions Costs Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

IaaS Configuration for Virtual Platforms

IaaS Configuration for Virtual Platforms IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To

More information

Features. This document is part of the Terms and Conditions for Personal Bank Accounts. 16-20 Barolin St, PO Box 1063 Bundaberg Queensland 4670

Features. This document is part of the Terms and Conditions for Personal Bank Accounts. 16-20 Barolin St, PO Box 1063 Bundaberg Queensland 4670 S This document is prt of the Terms nd Conditions for Personl Bnk Accounts Issued y Auswide Bnk Ltd ABN 40 087 652 060/Austrlin Finncil Services & Austrlin Credit Licence 239686 Effective from Jnury 18

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

San Mateo County ACCEL Adult-Education College and Career Educational Leadership AB 86 Adult Education Consortium Project Management Plan 24, 2014 -

San Mateo County ACCEL Adult-Education College and Career Educational Leadership AB 86 Adult Education Consortium Project Management Plan 24, 2014 - A Sn Mteo County ACCEL Adult-Eduction College nd Creer Eductionl Ledership AB 86 Adult Eduction Consortium Project Mngement Pln - Februry 24, 2014 - This project mngement pln presents ACCEL s process frmework

More information

S a l e s Ta x, U s e Ta x, I n c o m e Ta x W i t h h o l d i n g a n d M i c h i g a n B u s i n e s s Ta x E s t i m a t e s

S a l e s Ta x, U s e Ta x, I n c o m e Ta x W i t h h o l d i n g a n d M i c h i g a n B u s i n e s s Ta x E s t i m a t e s 78 (Rev. 8-08) S l e s T x, U s e T x, I n c o m e T x W i t h h o l d i n g n d M i c h i g n B u s i n e s s T x E s t i m t e s Forms nd Instructions Cll (517) 636-4730 or visit Tresury s Web site t

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Voluntary Prekindergarten Parent Handbook

Voluntary Prekindergarten Parent Handbook Voluntry Prekindergrten Prent Hndbook Wht is Voluntry Prekindergrten (VPK)? Voluntry Prekindergrten (VPK) is legisltively mndted progrm designed to prepre every four-yer-old in Florid for kindergrten nd

More information

Pre-Approval Application

Pre-Approval Application Pre-Approvl Appliction In tody s rel estte mrket, Pre-Approved mortgge provides you the buyer with powerful tool in the home purchse process! Once you hve received your Pre-Approvl, you cn shop for your

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Office of Student Financial Aid Haven-Warren Room 210

Office of Student Financial Aid Haven-Warren Room 210 Office of Student Finncil Aid Hven-Wrren Room 210 Division of Enrollment Services & Student Affirs Phone: (404) 880-8992 FEDERAL WORK-STUDY PROGRAM HANDBOOK Revision Approved: Complince Committee Dte Februry

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

License Manager Installation and Setup

License Manager Installation and Setup The Network License (concurrent-user) version of e-dpp hs hrdwre key plugged to the computer running the License Mnger softwre. In the e-dpp terminology, this computer is clled the License Mnger Server.

More information

LEGISLATIVE BUDGET SYSTEM BUDGET COMPARISON WORKSHEET EXPLANATION A W

LEGISLATIVE BUDGET SYSTEM BUDGET COMPARISON WORKSHEET EXPLANATION A W LEGISLTIVE UDGET SYSTEM UDGET COMPRISON ORKSHEET Page 1 of 24 Program ID: JUD101 Structure #: 010101000000 COURTS OF PPEL JUDICIRY SEQ # EXPLNTION FIRST FY SECOND FY EXPLNTION 79.00 6,429,114 79.00 6,429,114

More information

Portfolio approach to information technology security resource allocation decisions

Portfolio approach to information technology security resource allocation decisions Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This

More information

Talent (or guardian) signature: Date:

Talent (or guardian) signature: Date: Sesme Communictions Sesme Communictions Mkers of Ortho Sesme nd Dentl Sesme PRESENTS: Sesme Prctice Mrketing SAVE ALL IDEAS: Strt file to store the news items nd ides tht come up between your scheduled

More information

Pathway Guide to. NYC Early Childhood. www.earlychildhoodnyc.org

Pathway Guide to. NYC Early Childhood. www.earlychildhoodnyc.org Pthwy Guide to NYC Erly Childhood Techer Certifiction www.erlychildhoodnyc.org THE MISSION The Institute works to ensure tht ll erly childhood providers hve ccess to comprehensive system of professionl

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

What is the closest Metro/Train or Bus station? The T - (www.the-t.com)

What is the closest Metro/Train or Bus station? The T - (www.the-t.com) Are GABLES 411: Sutter Creek Where is the closest post office? Locted 5.3 miles from the community, t the intersection of E Prk Row Dr. nd New York Ave. Below is the ddress nd phone number for your reference.

More information

Below is the address and phone number for your reference.

Below is the address and phone number for your reference. Are GABLES 411: Gbles Ok Creek Where is the nerest post office? Locted 4 miles from the community, t the intersection of Clinton Keith nd Plomr Street. Below is the ddress nd phone number for your reference.

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs TechAdvisory.org SME Reports sponsored by Cybernut Solutions provides outsourced IT support from welth of knowledgeble technicins nd system dministrtors certified

More information

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

Hillsborough Township Public Schools Mathematics Department Computer Programming 1 Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Electrical Engineering

Electrical Engineering Electricl Engineering R Wherever Energy Flows or Goods re Produced Our Electricl Engineering Group provides electricl design nd consulting services to electric & gs utilities, oil & gs pipelines, refineries,

More information

elearning platforms and consultation service at CU Presented by Judy Lo 31 August 2007

elearning platforms and consultation service at CU Presented by Judy Lo 31 August 2007 elerning pltforms nd consulttion service t CU Presented by Judy Lo 31 August 2007 Agend The elerning guidelines How elerning cn lower your work burden nd enhnce lerning? The elerning pltforms The elerning

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

aaaaaaa aaaaaaa aaaaaaa a Welcome To The ADP TotalPay Visa Card Program!

aaaaaaa aaaaaaa aaaaaaa a Welcome To The ADP TotalPay Visa Card Program! Welcome To The ADP TotlPy Vis Crd Progrm! The TotlPy Vis Crd Account Experience the ese & relibility of direct deposit through n ADP TotlPy VISA crd ccount ADP TotlPy VISA crd ccounts llow crdholders to

More information

Understanding Cloud Accounting and QuickBooks Online

Understanding Cloud Accounting and QuickBooks Online Understnding Cloud Accounting nd QuickBooks Online This guide is intended to provide comprehensive look t the prcticl benefits of working in the cloud, nd how QuickBooks Online cn help your business chieve

More information

Where is the nearest post office? Located.9 miles from the community on Oak Lawn. Below is the address and phone number for your reference:

Where is the nearest post office? Located.9 miles from the community on Oak Lawn. Below is the address and phone number for your reference: Are GABLES 411: Gbles Uptown Tower Where is the nerest post office? Locted.9 miles from the community on Ok Lwn. Below is the ddress nd phone number for your reference: United Sttes Post Office 2825 Ok

More information

802.16e requirements from an operator s perspective

802.16e requirements from an operator s perspective 802.16e requirements from n opertor s perspective IEEE 802.16 Presenttion Submission Templte (Rev. 8.3) Document Number: IEEE S802.16e-03/23 Dte Submitted: 2003-03-10 Source: Anthony (Tony) Klinkert Voice:

More information

Where is the nearest post office? 1.64 miles from the community, at the intersection of Timmons and Westheimer.

Where is the nearest post office? 1.64 miles from the community, at the intersection of Timmons and Westheimer. Are GABLES 411: Gbles Post Ok Where is the nerest post office? 1.64 miles from the community, t the intersection of Timmons nd Westheimer. United Sttes Postl Office 2802 Timmons Ln. Houston, Tx 77027 713.572.3936

More information

2001 Attachment Sequence No. 118

2001 Attachment Sequence No. 118 Form Deprtment of the Tresury Internl Revenue Service Importnt: Return of U.S. Persons With Respect to Certin Foreign Prtnerships Attch to your tx return. See seprte instructions. Informtion furnished

More information

According to Webster s, the

According to Webster s, the dt modeling Universl Dt Models nd P tterns By Len Silversn According Webster s, term universl cn be defined s generlly pplicble s well s pplying whole. There re some very common ptterns tht cn be generlly

More information

collection, dissemination and security of data. inform the access and utilisation of data within the organisation.

collection, dissemination and security of data. inform the access and utilisation of data within the organisation. Corporte Policies & Procedures Generl Administrtion Document CPP123 Dt Governnce Policy First Produced: Current Version: Pst Revisions: Review Cycle: Applies From: 17/07/13 17/07/13 Nil 3 yer cycle Immeditely

More information