Date: October 24, 2013 Code: TECHNICAL LETTER HR/EHDB Common Human Resources System (CHRS) Security Plan and Requirements - Policy Guidelines

Size: px
Start display at page:

Download "Date: October 24, 2013 Code: TECHNICAL LETTER HR/EHDB 2013-05. Common Human Resources System (CHRS) Security Plan and Requirements - Policy Guidelines"

Transcription

1 Office f the Chancellr 401 Glden Shre, 4 th Flr Lng Beach, CA hradmin@calstate.edu Date: Octber 24, 2013 Cde: TECHNICAL LETTER HR/EHDB T: Human Resurces Officers Frm: Evelyn Nazari William Perry Assciate Vice Chancellr Chief Infrmatin Security Officer Human Resurces Management & CO HR Services Infrmatin Security Subject: Cmmn Human Resurces System (CHRS) Security Plan and Requirements - Plicy Guidelines Overview Audience: Actin Item: Affected Emplyee Grup(s)/Unit(s): Human Resurces Officers and/r HR Prfessinals, Security Administratrs r designees respnsible fr campus security administratin. Adhere t the plicy guidelines fr implementatin f the CHRS Security Plan and Requirements. Individuals respnsible fr supprting and administering campus security and thse individuals invlved in the varius implementatin aspects f CHRS. Summary This Technical Letter prvides detailed infrmatin regarding the implementatin f the CHRS Security Plan and Requirements. HR Letter annunced the release f the CHRS Security Plan and Requirements as required by the system wner, Califrnia State University (CSU) Systemwide HR. This Technical Letter includes an verview f the infrmatin cntained in the CHRS Security Plan and Requirements fr CHRS, which serves as fficial dcumentatin. This infrmatin will establish secure prtcls and unifrmity fr campuses and the Chancellr s Office. Infrmatin is prvided based n the fllwing sectins: Sectins 2.0 Systemwide HR Requirements 3.0 CHRS Gvernance Structure 4.0 CHRS Security Training 5.0 Authenticatin and Access Cntrl Distributin: CSU Chancellr All Campus Vice Presidents Assciate Vice Presidents/Deans, Faculty Affairs Human Resurces Officers Business Managers Budget Officers General Cunsel State Cntrller s Office (SCO)

2 6.0 CHRS Security Incident Management 7.0 CHRS Business Cntinuity and Disaster Recvery 8.0 CHRS Infrastructure TECHNICAL LETTER HR/EHDB Page 2 f 2 Questins regarding this technical letter may be directed t Human Resurces Management at (562) This dcument is available n Human Resurces Management s Web site at: EN/th

3 CHRS Security Plan and Requirements FINAL

4 CHRS Security Plan and Requirements FINAL REVISION CONTROL Dcument Title: CHRS Security Plan and Requirements Authr: Tammy Hines File Reference: CHRS Security Plan and Requirements Revisin Histry Revisin Date Revised By Summary f Revisins Sectin(s) Revised 07/05/13 T. Hines, A. Harwd, G. Mansr New Dcument 07/09/13 J. Whitney Reviewed All 07/16/13 T. Hines Revised t remve reference t Central Security Administratr 08/19/13 T. Hines Updates t indicate dcument is apprved/final All 10/18/13 T. Hines Final edits fr distributin All All Sectin 1.3 Review / Apprval Histry Review Date Reviewed By Actin (Reviewed, Recmmended r Apprved) 07/05/13 Evelyn Nazari, Assciate Vice Chancellr HRM and CO HR Services 07/08/13 William Perry, Chief Infrmatin Security Officer, CO Infrmatin Security 07/09/13 Jessie Lum, Chief Infrmatin System Officer, CO Infrmatin Systems 08/19/13 Gail Brks, Vice Chancellr, Systemwide HR Recmmended fr apprval Recmmended fr apprval Recmmended fr apprval Apprved Page ii

5 CHRS Security Plan and Requirements FINAL Table f Cntents Page 1.0 Intrductin Dcument Purpse Dcument Scpe Assumptins Systemwide HR Requirements System Applicatins/Specific Prcesses Emplyment infrmatin Campus Cnversin Validatin Develpment HR/CS Split Persn Data (Demgraphic) /Searches Persn Data and CS CHRS Nn-Prductin Sensitive Data CHRS Data Classificatin Oracle Reprting/Queries Database SQL Access Rles and Permissins CHRS Gvernance Structure System-wide Rles and Respnsibilities Systemwide Human Resurces CHRS Data Gvernance CHRS Security Campus Actin Team (CHRS Security CAT) Central Security Administratr CMS Technical Services and Applicatin Develpment Team Campus Rles and Respnsibilities Distributed Security Administratrs CHRS Security Training Authenticatin and Access Cntrl Passwrd Management CHRS Security Incident Management CHRS Business Cntinuity and Disaster Recvery Page iii

6 CHRS Security Plan and Requirements FINAL 8.0 CHRS Infrastructure Oracle Database User Accunts Passwrd Management Appendix Page iv

7 1.0 Intrductin The Cmmn Management Systems (CMS) currently supprts Califrnia State University (CSU) campuses and the Chancellr s Office (CO) peratinal databases. Campuses have a minimum f seven test, develpment, and prductin databases fr each applicatin. A recent study f CMS recmmended that the CSU cnsider cnslidating applicatins t prvide pprtunities fr cst savings t the CSU. CMS gals are t achieve best business practices, reduce csts and imprve perfrmance. The CMS Executive Cmmittee (EC) determined that CMS is nt sustainable in its current state. The CMS EC prpsed the Cmmn Human Resurces System (CHRS) initiative t achieve CMS s stated gals. A CHRS Advisry Grup was then established t research the feasibility f adpting a cmmn Human Resurces (HR) system. The majr reasns t adpt a cmmn HR system were t: Enable adptin f a system-wide HR mdel that facilitates the timely adptin f best business practices acrss all campuses. Allw all campuses t take full advantage f a feature rich system. Smaller campuses d nt have the resurces t maintain and enhance the system. Cntain csts assciated with managing CMS. Prvide the CSU with a cmprehensive reprting system via a system-wide HR reprting envirnment and Data Warehuse (DW). The EC apprved the CHRS Prject which encmpasses an enriched cmmn HR applicatin cde and cmmn cnfiguratin n a single platfrm, with an HR reprting slutin. 1.1 Dcument Purpse This dcument describes the CHRS Security Plan and Requirements as required by the system wner, CSU Systemwide HR. The prtectin measures described in this dcument were designed t ensure CHRS cmplies with CSU Systemwide HR Plicies, CSU System-wide Infrmatin Security Standards and Plicies gverning infrmatin technlgy (including thse with specific relevance t HR peratins), infrmatin security and human resurces as well as all pertinent state and federal regulatry requirements. Security within CHRS will be addressed thrughut the sftware develpment life cycle and within the envirnment supprting CHRS, including but nt limited t the prductin and nn-prductin netwrk, perating system, and applicatin levels. 1.2 Dcument Scpe This strategy was develped t ensure the cnfidentiality, integrity and availability f CHRS infrmatin assets. It utlines security cntrls that must be in place t reduce and mitigate CSU security risks with assciated data frm 23 campuses and the CO residing in ne cnslidated envirnment. The CHRS Security Plan and Requirements is nt intended t be a campus prcedural dcument r a campus peratinal guide; hwever, it Page 5 f 15

8 will include specific prtcls that will gvern the security f CHRS system-wide data. The CHRS Security team will develp and distribute additinal dcuments t supprt the implementatin f this plan. 1.3 Assumptins A cre security design will be develped fr CHRS. This cre design will include the fllwing elements: Security Administratrs will be assigned t CHRS t supprt the security management activities at the CO and campus ffices. The Security Administratrs will include the CO Infrmatin Security Officer (ISO) t ensure security within CHRS is managed by a subject matter expert and cmplies with CSU System-wide Infrmatin Security Standards and Plicies gverning infrmatin security. CHRS users will be permitted t view data applicable t their jb duties nly. Campus Distributed Security Administratrs (DSAs) and ther designated emplyees may be permitted t access system-wide data t supprt develpment within a specific CHRS prject, fr a specified time, with apprpriate apprvals frm Systemwide HR. Authenticatin cntrls will be managed similar t the Cmmn Financial System (CFS) thrugh System-wide Identity Access Management (IAM) infrastructure. Access t the CHRS system-wide data will be based n the principles f need-t-knw and least privileges. Campuses will cmply with all CSU plicies gverning infrmatin security including the CSU s Segregatin f Duties plicy (SD). 2.0 Systemwide HR Requirements Each campus is its wn appinting authrity. As such, all campus infrmatin must be secured at the campus level bth in prductin and nn-prductin database instances. Applicable CSU Systemwide HR and Security Plicies must be fllwed. Refer t the Appendix sectin fr a listing f applicable CSU Systemwide HR and security plicies/laws. Where specific apprvals have been granted, an emplyee may be granted access t data at anther campus when wrking n a specific CHRS system-wide prject fr a specified duratin. In thse instances, a Cnfidentiality Agreement must be signed by the emplyee and apprvals t grant such access must be btained frm Systemwide HR. Quarterly audits f changes made t permissins and security rles must be perfrmed t ensure the access assigned was authrized, apprpriate and applicable t the functins being perfrmed. The details arund these prcesses will be dcumented in the CHRS Security/Operatinal Guide. In all ther situatins, all security strategies must be administered in such a way that campus emplyees are able t nly access infrmatin needed t perfrm their jb duties. All regulatry laws and CSU plicies must be adhered t, including thse specified in HR which states: The Califrnia State University (CSU) has a respnsibility t prtect sensitive persnal data and maintain cnfidentiality f that data under the Infrmatin Practices Act (IPA) and Title 5. In light f rapidly changing technlgy and increased Internet use, this memrandum is written t highlight the imprtance f the CSU s respnsibility. The Infrmatin Practices Act, Califrnia Civil Cde 1798, et seq., requires Page 6 f 15

9 the Chancellr s Office and campuses t cllect, use, maintain, and disseminate infrmatin relating t individuals in accrdance with its prvisins. Additinally, thrugh f Title 5 f the Califrnia Cde f Regulatins address privacy and the principles f persnnel infrmatin management. (Refer t Appendix) The CSU als cmplies with the Family Educatinal Rights and Privacy Act (FERPA), which prhibits the release f educatin recrds withut student permissin (Refer t Appendix). Each campus is respnsible fr campus recrd-keeping and prcedures relating t student and emplyee persnal infrmatin. In additin, each campus is required t maintain apprpriate access, disclsure, and cnfidentiality f student and emplyee persnal infrmatin. 1. Each campus must ensure that all emplyees with access t cnfidential persnal infrmatin have a legitimate CSU need t have such access. These emplyees must understand the respnsibility they have under the Infrmatin Practices Act and Title 5 t prtect sensitive persnal data. 2. Cnfidential persnal infrmatin shuld nt be transmitted utside the CSU unless it is fr legitimate CSU purpses. Recipients must be infrmed that the infrmatin prvided is cnfidential and is prvided fr the sle purpse f the specific business need. Als, recipients must be infrmed that they are respnsible fr the prtectin f the infrmatin and the destructin f all files after the intended use is satisfied. 2.1 System Applicatins/Specific Prcesses The fllwing system applicatin security requirements, in additin t the infrmatin utlined abve, must be adhered t fr CHRS. These peratinal security requirements apply t prductin and nn-prductin CHRS database instances Emplyment infrmatin Emplyee infrmatin must be secured at the campus and department levels and nly accessible t emplyees based upn a need-t-knw basis t perfrm their assigned jb duties. Emplyment infrmatin includes but is nt limited t infrmatin identified as Level 1 and/r Level 2 data. Refer t the CHRS Data Classificatin sectin belw fr specific details Campus Cnversin Validatin The apprach used fr campus validatin f cnverted data fr CHRS must adhere t the security requirements utlined previusly t ensure all data is secured by the campus. Access must be prvided in a manner that enables campus designated emplyees t validate data at their respective campus by specific jb functin(s) Develpment CHRS develpment will be handled by the central CO staff. Campus-specific mdificatins t CHRS are nt allwed. Therefre, campus develpment access will nt be authrized, unless it is granted t supprt a specific CHRS prject. Refer t Sectin 2.0 fr additinal details. Page 7 f 15

10 2.1.4 HR/CS Split Oracle has advised that althugh the applicatin is physically splitting, certain HR emplyment and pay infrmatin is necessary and must be kept in sync t supprt CS peratinal business needs, e.g. Wrk Study. The specific tables and values that will remain in sync will be defined by the CHRS Data Gvernance team. Nnetheless, each campus must secure their campus CS system t ensure that nly CS menu ptins, pages and functins are available within CS. The campus must cmply with the Systemwide HR plicy (t be defined) t remve access t HR menu ptins, pages and functins as these are n lnger applicable and will nt be maintained. Quarterly audits will be gverned by CO Security t ensure campus cmpliance; details f these audits and cntrls will be included in the CHRS Security Guide. (A delivered slutin will be pursued with Oracle.) Persn Data 1 (Demgraphic) /Searches HR Persn Data may be viewed by campus emplyees n a need-t-knw basis t perfrm their jb. Certain Persn Data elements may als be viewed t preclude duplicate recrds frm being added t the system, e. g. Search Match functinality. Data available fr nline viewing and searches include infrmatin cntained in the existing CSU ID Search Mdificatin. Search Criteria Search Results Name Name SSN (full) SSN last 4 digits Emplyee ID/Recrd Number Empl ID/Recrd Number Jb Cde and Descriptin HR Status (Active/Inactive) Department ID and Descriptin Date f Birth (Mnth and Date) Organizatin Relatinship Emplyee Class POI Type Business Unit Persn Data and CS HR Persn Data may be shared between the campus HR and respective CS instance. HR Persn Data may nt be shared r used t update a nn-respective campus CS instance. Systemwide HR is the data wner f Persn Data and a designated delegate will wrk with respective campus representative(s) t manage demgraphic related data discrepancies. Operatinal prcesses that gvern hw persnal infrmatin will be updated within CHRS and the Higher Educatin Cnstituent Hub (HECH) will be defined by the CHRS Data Gvernance team. 1 Refer t the data standards defined as part f the CHRS Systemwide HR Data Standardizatin prject fr a cmplete listing f Persn Data elements (Phase I). Page 8 f 15

11 2.1.7 CHRS Nn-Prductin Sensitive Data Specific develpment functins must be perfrmed in the CHRS nn-prductin envirnments where data may nt be fully secured by the campus. As part f the CHRS develpment/implementatin effrts, campus emplyees may be given access t system-wide data t assist with specific prject develpment. In these instances, sensitive data cntained within the CHRS develpment (nn-prductin envirnments) must be masked and/r scrambled t minimize the pssibility that persnally identifiable infrmatin cannt be assciated with actual emplyees. T prtect infrmatin in this categry, the fllwing data elements, at a minimum are cnsidered sensitive and must be prtected as nted abve: 1. Name 2. SSN Natinal ID 3. Date f Birth (DOB) CHRS Data Classificatin The fllwing data items are classified as Level 1 and 2 by Systemwide HR as they relate t an emplyee s CSU emplyment histry and applicant recrd (name and qualificatins, educatin, physical descriptin-including pht, and backgrund investigatins) and thereby must be prtected/secured (this infrmatin is typically stred in Oracle within multiple mdules, e.g., Wrkfrce Administratin, Benefits Administratin, Time & Labr/Payrll, Absence Management, etc.). Emplyees may be granted access t these data items nly as it is relevant and necessary t perfrm their jb duties. Level 1 Data Items: Scial Security Numbers (with name) Taxpayer ID Natinal ID Internatinal Identificatin (such as passprt, visa-with name) Date f Birth (with partial SSN and Name) Benefits Recrds Medical Infrmatin Driver s License (with name) Citizenship/Visa Status Persnal Telephne Numbers, Address Address (Hme and Mailing) Race and Ethnicity Family Member Names (Mther s Maiden Name) Gender Marital Status Level 2 Data Items: Date f Birth (partial r full with name) Emplyee Applicant Recrd Net Salary Time and Labr Page 9 f 15

12 Payment Infrmatin Emplyee Evaluatins Veteran Status Disability/Reasnable Accmmdatin Age (Date f Birth) Oracle Reprting/Queries Access t Oracle query and reprting capabilities will use delivered Oracle applicatin security cntrls and rw level security. Oracle nline reprting and query is the primary reprting tl fr CHRS. Direct SQL access is nt intended fr reprting and is prvided fr technical supprt and integratin purpses Database SQL Access Access t the CHRS prductin database fr technical supprt and service accunts, e.g. integratin pint, will be allwed using Oracle accunts. The default and standard CSU_SELECT rle as utlined in the Validating Oracle Users and Rles dcument will nt include any tables that cntain emplyee related data. The CSU_UPDATE rle will nt exist within the CHRS envirnment. Only a limited number f campus based emplyees may be granted (direct database) access fr their respective campus t view and/r query infrmatin cntaining sensitive data. Level 1 and 2 data will be segregated by campus using campus specific Oracle views/rles which must be requested via the mdificatin gvernance prcess. A few predefined tables that include emplyee related data will be secured by campus and prvided as a baseline. Access t the campus-specific Oracle views will be prvided by way f campus specific Oracle rles Rles and Permissins Security Rles and Permissins lists fr CHRS will be defined and maintained by the CHRS Security Team. A system-wide set f security rles and permissin lists will be defined t supprt the Systemwide HR apprved jb functins required t implement the CHRS business practices defined by Systemwide HR. Campuses will have the ability t assign rles t users based upn their jb functin(s). Campuses may submit a request t the Central Security ffice fr an updated, r a new rle/permissin list t be defined t supprt a specific business need/functin. The request will be reviewed by the CHRS Security Team, and apprved by the Systemwide HR Data Steward fr inclusin in CHRS. Page 10 f 15

13 3.0 CHRS Gvernance Structure The CHRS gvernance structure defines the functins, relatinships, respnsibilities, and authrities f cmmittees and individuals that supprt CHRS. 3.1 System-wide Rles and Respnsibilities Systemwide Human Resurces The data wner fr CHRS will be the Assciate Vice Chancellr f Human Resurces Management and CO HR Services, Systemwide HR. The data delegate will be the Sr. Manager, CMS-Systemwide HR. The Vice Chancellr fr Systemwide HR is primarily respnsible fr reviewing and apprving the CHRS Security Plan and Requirements CHRS Data Gvernance Updates made t an emplyee s Persn Data recrd within CHRS may be permitted but will be gverned by rules defined by the CHRS Data Gvernance Team. The system update rules will be applicable t CHRS, the HECH and ther internal and/r external applicatins and integratins that rely n Persn Data, e.g. HR/CS Split envirnment, Identity Management Systems etc CHRS Security Campus Actin Team (CHRS Security CAT) A review team, cmprised f persnnel frm campuses and CMS Central, will be created t supprt CHRS infrmatin security requirements and initiatives. This team will be respnsible fr develping a set f rles and permissin lists apprved fr CHRS fr which security administratrs will use t assciate with campus based users. A security matrix that describes what access each end-user needs, based n the Systemwide HR Plicies and requirements and security guidelines and delivered rles frm CHRS Central team will be available t campuses. If campuses identify a needed change r new rle r permissin list, they will submit that request as described in the sectin n Rles and Permissins lists. The CHRS Security CAT will review the requests and recmmend apprval Central Security Administratr The Central Security Administratr (CSA) will wrk with the CO, campus staff, and CHRS CAT, t validate the security design and prvide pst-implementatin supprt. The CSA s duties include but are nt limited t the fllwing: Cnsultatin with campus and CO staff t meet peratinal security needs. Cnsultatin with the prject team t ensure CHRS cmpliance with CSU System-wide Infrmatin Security Standards and Plicies. Evaluatin f user security requests and cnsultatin with the CHRS Security CAT t ensure requests cmply with CHRS security plicies and audit guidelines. Prviding supprt t campuses and CMS during audits. Initial creatin f DSA User Accunts: - On-ging respnsibility will be perfrmed by Central Security Maintenance rather than Administratin. Page 11 f 15

14 Mnthly, quarterly, and annual review f CHRS security t ensure cmpliance with SD plicies CMS Technical Services and Applicatin Develpment Team CMS Technical Services will manage the prductin infrastructure assciated with the applicatin and web tiers, supprting the CHRS envirnment with directin frm the Central Security Administratr. This includes all tasks assciated with applicatin server setup, cnfiguratin and management, prcess scheduler setup, cnfiguratin and management, and web server setup cnfiguratin and management. CMS Technical Services is respnsible fr ensuring apprpriate resurces at the web and applicatin tier and include respnsibilities fr capacity planning, tuning, and installatin. CMS Technical Services alng with CMS Applicatin Develpment Teams will supprt the campus nnprductin envirnments as this nw requires central security cntrl and crdinatin. 3.2 Campus Rles and Respnsibilities Distributed Security Administratrs T highlight the shared respnsibilities f CHRS, campus security administratrs will be referred t as Distributed Security Administratrs (DSA s). The DSA s will be managed using Oracle s delivered Distributed User Prfiles functinality. They will be given the capability f assigning rles restricted t thse in their Rle Grant dmain. DSA s will prvide security supprt fr peratinal activities at the campus within the limitatins f the access prvided t them. Other duties f the DSA s include but are nt limited t the fllwing: Evaluate and act upn user access requests fr their respective campuses. Establish and maintain user prfiles in CHRS fr their respective campuses. Prcess user requests by assigning privileges t user accunts based n apprval frm Campus Applicatin Owners. Maintain dcumentatin related t users requests fr their respective campus. Accept and review user requests t access nn-campus based security bjects. Such requests are frwarded t the Central Security Administratr based n apprval frm Campus Applicatin Owner. Participate in audits f user accunts in accrdance with CSU Infrmatin Security Plicies. De-prvisin accunts when the user has separated frm the university by lcking them. Limited (Security Maintenance nly) mnthly, quarterly and annual reviews f SD reprts fr cmpliance. DSA s and their backups can grant any level f access r respnsibility within the rles granted t them fr the CHRS Oracle Applicatin. This respnsibility includes delegating limited administrative capabilities t Applicatin Leads. This special rle prvides the ability t administer the rights t any menu, cmpnent, page r tl within CHRS, again delineated by the rle granted thrugh the Rle Grant functinality, and therefre shuld be deplyed sparingly. Page 12 f 15

15 4.0 CHRS Security Training Effrts are underway t develp a system-wide campus CHRS implementatin supprt prgram that will include training fr the CHRS security mdel. CMS expects campuses t take the requisite security awareness and training. CHRS will require existing security experience and reinfrce security awareness as part f the implementatin supprt prgram, as utlined in CSU System-wide Infrmatin Security Plicy. 5.0 Authenticatin and Access Cntrl CHRS will implement a custm authenticatin prcess. CHRS Oracle system will be frnt-ended by a cmbinatin f the CSYu Emplyee Prtal and Shibbleth fr general authenticatin. Users that are successfully lgged int CSYu r ther system-wide authenticatin services will be able t access resurces based n their rles that are defined and granted within CHRS. The fllwing apprach prvides an example f this mdel: 1. A user attempts t access the main page f CSYu. 2. The user is redirected t their lcal campus Identity Prvider (IAM infrastructure) t enter their campus managed credentials. 3. Once authenticated, the user will be redirected back t CSYu where they will find a link t access CHRS. 4. This link executes custm cde that wrks in cnjunctin with the Oracle Sign-In Cde. 5. If the user has been prvided access, they will nw be able t perfrm any functins granted t them thrugh the rles that have been assigned t them. 5.1 Passwrd Management Oracle Passwrd Management feature will NOT be used in CHRS. Since campuses are respnsible fr managing their campus user s passwrd plicy they are encuraged t require strng passwrds and fllw the passwrd management guidelines in the Califrnia State University System-wide Infrmatin Security Standard. Significant changes that are t be implemented in the shared CHRS will be apprpriately reviewed and apprved by the CHRS Security CAT. Significant changes made t the CHRS Security mdel will be apprpriately reviewed and apprved by the designated change cntrl authrity. Any apprved changes will be migrated int CHRS prductin per the CHRS Release Management Guide. This dcuments the migratin prcess and describes the delineatin f respnsibilities in cmpliance with SD plicies. 6.0 CHRS Security Incident Management CHRS will cmply with the Infrmatin Security Incident Management Plices as defined in the Califrnia State University System-wide Infrmatin Security Plicy. Page 13 f 15

16 7.0 CHRS Business Cntinuity and Disaster Recvery Campus and CO users and administratrs access the CHRS at the Unisys data center. Disaster recvery fr all f CMS, including the CHRS, is managed and crdinated within the purview f the Unisys data center cntract. 8.0 CHRS Infrastructure This sectin describes differences t the CMS security infrastructure made t supprt the CHRS applicatin envirnment. All current CMS security practices, plicies and prcedures will be in place fr CHRS. This includes all current security cmpnents such as VPN, IDS, and Firewalls that are in place fr the CMS envirnment. This sectin cvers nly areas where CHRS is different frm current CMS HRSA envirnments. 8.1 Oracle Database User Accunts Passwrd Management The racle accunt s passwrd cntrls will cmply with CSU Plicy Access Cntrl and Standard 8060.S01 Access Cntrl. Page 14 f 15

17 9.0 Appendix Califrnia State University. (2012, June 5). Access Cntrl 8060.S01 Retrieved August 18, 2013, frm Califrnia State University. (2010, April 19). Cnfiguratin Management Plicy Retrieved 08 19, 2013, frm ICSUAM CSU Plicy: Califrnia State University. (2011, June 22). HIPPA Regulatins as Amended by the HITECH Act- Update f Privacy and Security. Retrieved 2013, frm CSU Human Resurces Management: Califrnia State University. (2010, April 19). Infrmatin Asset Management Plicy Retrieved 08 19, 2013, frm ICSUAM CSU Plicy: Califrnia State University. (2011, September 23). Infrmatin Security Data Classificatin 8065.S02. Retrieved August 18, 2013, frm Califrnia State University. (2005, April 8). Requirements fr Prtecting Cnfidential Persnal Data: Updated t Include Infrmatin Practices Act Web Site and Security Breach. Retrieved August 18, 2013, frm CSU Human Resurces Management: US Department f Educatin. (n.d.). Family Rights and Privacy Act (FERPA). Retrieved August 18, 2013, frm US Department f Educatin: Page 15 f 15

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Gvernment f Newfundland and Labradr Office f the Chief Infrmatin Officer Infrmatin Management Branch GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Guideline (Definitin): OCIO Guidelines derive frm

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Audit Cmmittee Charter St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Versin 2.0, 22 February 2016 Apprver Bard f Directrs St Andrew

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

Internal Audit Charter and operating standards

Internal Audit Charter and operating standards Internal Audit Charter and perating standards 2 1 verview This dcument sets ut the basis fr internal audit: (i) the Internal Audit charter, which establishes the framewrk fr Internal Audit; and (ii) hw

More information

Business Continuity Management Policy

Business Continuity Management Policy Business Cntinuity Management Plicy Versin: 1.0 Last Amendment: Apprved by: Library Cuncil f New Suth Wales Plicy wner/spnsr: Directr, Operatins and Chief Financial Officer Plicy Cntact Officer: Senir

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Audit Committee Charter

Audit Committee Charter Audit Cmmittee Charter Membership The Audit Cmmittee (the "Cmmittee") f the Bard f Directrs (the "Bard") f Philip Mrris Internatinal Inc. (the "Cmpany") shall cnsist f at least three directrs all f whm

More information

Data Warehouse Scope Recommendations

Data Warehouse Scope Recommendations Rensselaer Data Warehuse Prject http://www.rpi.edu/datawarehuse Financial Analysis Scpe and Data Audits This dcument describes the scpe f the Financial Analysis data mart scheduled fr delivery in July

More information

How To Write An Ehsms Training, Awareness And Competency Procedure

How To Write An Ehsms Training, Awareness And Competency Procedure Envirnmental, Health & Safety Management System (EHSMS) Dcument Number: 00122 Issue Date: 05/07/2014 Training, Awareness and Cmpetency Prcedure Revisin Number: 7 Prepared By: Stalcup, Bryce Apprved By:

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position Psitin Title I.T Prject Officer Classificatin Higher Educatin Wrker, Level 7 Respnsible t The Psitin I.T Manager The psitin assists with the cmpletin f varius IT prjects intended t enable the nging administratin

More information

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

Appendix H. Annual Risk Assessment and Audit Plan 2013/14

Appendix H. Annual Risk Assessment and Audit Plan 2013/14 Annual Risk Assessment and Audit Plan 2013/14 Internal Audit Department September 25, 2013 Table f Cntents Intrductin.. 3 Risk Assessment Prcess... 4 Page 2 Intrductin Each year, the Internal Audit Department

More information

Purpose Statement. Objectives

Purpose Statement. Objectives Apprved by Academic Affairs Cuncil, June 24, 2014 Faculty Handbk Part VI: Other Plicies and Prcedures Sectin R. Intellectual Prperty Classified Emplyee Handbk Part VI: Other Plicies and Prcedures Sectin

More information

ENTERPRISE RISK MANAGEMENT ENTERPRISE RISK MANAGEMENT POLICY

ENTERPRISE RISK MANAGEMENT ENTERPRISE RISK MANAGEMENT POLICY ENTERPRISE RISK MANAGEMENT POLICY Plicy N. 10014 Review Date Octber 1, 2014 Effective Date March 1, 2014 Crss- Respnsibility Vice President, Reference Administratin Apprver Executive Cuncil 1. 1. Plicy

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

Symantec User Authentication Service Level Agreement

Symantec User Authentication Service Level Agreement Symantec User Authenticatin Service Level Agreement Overview and Scpe This Symantec User Authenticatin service level agreement ( SLA ) applies t Symantec User Authenticatin prducts/services, such as Managed

More information

Zimbra Professional Services Portfolio, Purchasing Guide & Price List

Zimbra Professional Services Portfolio, Purchasing Guide & Price List In- Tuitin Netwrks Ltd Zimbra Prfessinal Services Prtfli, Purchasing Guide & Price List This dcument prvides an verview f In- Tuitin Netwrks Limited s range f Zimbra Prfessinal Services available n the

More information

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028

More information

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act

More information

CMS Eligibility Requirements Checklist for MSSP ACO Participation

CMS Eligibility Requirements Checklist for MSSP ACO Participation ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.

More information

Information Technology Department REQUEST FOR PROPOSALS

Information Technology Department REQUEST FOR PROPOSALS Infrmatin Technlgy Department REQUEST FOR PROPOSALS Identity and Access Management Service Design and Technlgy Implementatin January 11, 2013 Prpsals due by 4 p.m. n February 1 st, 2013 Attachment 2 Prject

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

Change Management Process

Change Management Process Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses

More information

IT CHANGE MANAGEMENT POLICY

IT CHANGE MANAGEMENT POLICY IT CHANGE MANAGEMENT POLICY Effective Date May 19, 2016 Crss-Reference 1. IT Operatins and Maintenance Plicy 2. IT Security Incident Management Plicy Respnsibility Apprver Review Schedule 1. Plicy Statement

More information

IT CONTROL ENVIRONMENT ASSESSMENT AND RECOMMENDATIONS REPORT

IT CONTROL ENVIRONMENT ASSESSMENT AND RECOMMENDATIONS REPORT Chairpersn and Subcmmittee Members AUDIT AND RISK SUBCOMMITTEE 6 AUGUST 2015 Meeting Status: Public Purpse f Reprt: Fr Infrmatin IT CONTROL ENVIRONMENT ASSESSMENT AND RECOMMENDATIONS REPORT PURPOSE OF

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER This Audit Cmmittee Charter has been amended as f July 17, 2015. The Audit Cmmittee shall review and reassess this Charter annually and recmmend

More information

Sources of Federal Government and Employee Information

Sources of Federal Government and Employee Information Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine Title: Identity Theft Prgram Effective Date: July 2009 NYU Langne Medical Center NYU Hspitals Center NYU Schl f Medicine POLICY It is the plicy f the NYU Langne Medical Center t educate and train staff

More information

Unified Communications

Unified Communications Office f Infrmatin Technlgy Services Service Level Agreement Unified Cmmunicatins Nvember 7, 2013 v2.2 Service Descriptin Unified Cmmunicatins Service Descriptin ITS Unified Cmmunicatins ffers a number

More information

LINCOLNSHIRE POLICE Policy Document

LINCOLNSHIRE POLICE Policy Document LINCOLNSHIRE POLICE Plicy Dcument 1. POLICY IDENTIFICATION PAGE POLICY TITLE: ICT CHANGE & RELEASE MANAGEMENT POLICY POLICY REFERENCE NO: PD 186 POLICY OWNERSHIP: ACPO Cmmissining Officer: Prtfli / Business-area

More information

HEALTH INFORMATION EXCHANGE GRANTS CRITERIA

HEALTH INFORMATION EXCHANGE GRANTS CRITERIA 1 HEALTH INFORMATION EXCHANGE GRANTS CRITERIA INTRODUCTION On August, 20 th, the federal Office f the Natinal Crdinatr fr Health Infrmatin Technlgy (ONC) released an pprtunity fr states t apply fr between

More information

Human Resources Policy pol-020

Human Resources Policy pol-020 Human Resurces Plicy pl-020 Versin: 2.00 Last amendment: Jul 2014 Next Review: Jul 2017 Apprved By: Cuncil Date: 04 May 2005 Cntact Officer: Directr, Office f Human Resurce Services INTRODUCTION The University

More information

REQUEST FOR PROPOSAL SECURITY SERVICES

REQUEST FOR PROPOSAL SECURITY SERVICES REQUEST FOR PROPOSAL SECURITY SERVICES Sectin I INTRODUCTION [Cmpany] is seeking prpsals frm qualified Cntractrs t prvide unifrmed security service fr [Cmpany] facilities at [Lcatin(s)]. This dcument is

More information

ITIL V3 Planning, Protection and Optimization (PPO) Certification Program - 5 Days

ITIL V3 Planning, Protection and Optimization (PPO) Certification Program - 5 Days ITIL V3 Planning, Prtectin and Optimizatin (PPO) Certificatin Prgram - 5 Days Prgram Overview The ITIL Intermediate Qualificatin: Planning, Prtectin and Optimizatin (PPO) Certificate is a free-standing

More information

Business Continuity Management Systems Foundation Training Course

Business Continuity Management Systems Foundation Training Course Certificatin criteria fr Business Cntinuity Management Systems Fundatin Training Curse CONTENTS 1. INTRODUCTION 2. LEARNING OBJECTIVES 3. ENABLING OBJECTIVES KNOWLEDGE & SKILLS 4. TRAINING METHODS 5. COURSE

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

The user authentication process varies from client to client depending on internal resource capabilities, and client processes and procedures.

The user authentication process varies from client to client depending on internal resource capabilities, and client processes and procedures. Learn Basic Single Sign-On Authenticatin Tale s Basic SSO applicatin grants Learn access t users withut requiring that they enter authenticatin lgin credentials (username and passwrd). The access pint

More information

UNIVERSITY INCIDENT PLANNING COMMITTEE TERMS OF REFERENCE

UNIVERSITY INCIDENT PLANNING COMMITTEE TERMS OF REFERENCE 1. TITLE OF COMMITTEE UNIVERSITY INCIDENT PLANNING COMMITTEE University Incident Planning Cmmittee (IPC) 2. ESTABLISHMENT TERMS OF REFERENCE The University Incident Planning Cmmittee is established in

More information

Risk Management Policy AGL Energy Limited

Risk Management Policy AGL Energy Limited Risk Management Plicy AGL Energy Limited AUGUST 2014 Table f Cntents 1. Abut this Dcument... 2 2. Plicy Statement... 2 3. Purpse... 2 4. AGL Risk Cntext... 3 5. Scpe... 3 6. Objectives... 3 7. Accuntabilities...

More information

CHARTER OF THE COMPENSATION COMMITTEE OF THE BOARD OF DIRECTORS OF UPLAND SOFTWARE, INC.

CHARTER OF THE COMPENSATION COMMITTEE OF THE BOARD OF DIRECTORS OF UPLAND SOFTWARE, INC. CHARTER OF THE COMPENSATION COMMITTEE OF THE BOARD OF DIRECTORS OF UPLAND SOFTWARE, INC. PURPOSE The purpse f the Cmpensatin Cmmittee f the Bard f Directrs (the Bard ) f Upland Sftware, Inc. (the Cmpany

More information

ITIL Release Control & Validation (RCV) Certification Program - 5 Days

ITIL Release Control & Validation (RCV) Certification Program - 5 Days ITIL Release Cntrl & Validatin (RCV) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management

More information

STANDARDISATION IN E-ARCHIVING

STANDARDISATION IN E-ARCHIVING STANDARDISATION IN E-ARCHIVING R E Q U I R E M E N T S A N D C O N T R O L S F O R D I G I T I S AT I O N A N D E - A R C H I V I N G S E R V I C E P R O V I D E R S Alain Wahl 1 Requirements and cntrls

More information

Service Level Agreement

Service Level Agreement Template SDSU-TPL-11085 v1.3 18/1/11 IT Services Service Level Agreement Staff Email and SMTP Accunts (EMSF) Versin: 0.1 01/11/2010 Service Level Agreement: Staff Email and SMTP Accunts (EMSF) Cntents

More information

BIBH Duty Statements and Governance chart reviewed and approved April 2014. BIBH Executive Governance & Management Arrangements

BIBH Duty Statements and Governance chart reviewed and approved April 2014. BIBH Executive Governance & Management Arrangements BIBH Duty Statements and Gvernance chart reviewed and apprved April 2014 BIBH Executive Gvernance & Management Arrangements BIBH COMMITTEE CEO - Paul O Cnnell Executive Secretary - Brian Firth Executive

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

Implementing an electronic document and records management system using SharePoint 7

Implementing an electronic document and records management system using SharePoint 7 Reprt title Agenda item Implementing an electrnic dcument and recrds management system using SharePint 7 Meeting Finance, Prcurement & Prperty Cmmittee 16 June 2008 Date Reprt by Dcument Number Head f

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

RATIONALE TERMS OF REFERENCE FOR THE QUALITY COMMITTEE UNDER THE EXCELLENT CARE FOR ALL ACT. Authority

RATIONALE TERMS OF REFERENCE FOR THE QUALITY COMMITTEE UNDER THE EXCELLENT CARE FOR ALL ACT. Authority RATIONALE With the intrductin f the Excellent Care fr All Act, hspital bards must nw have a quality cmmittee that reprts t the bard. The template prvides sample terms f references fr rganizatins t adapt

More information

Lumesse TalentLink pricing guide for G-Cloud 5

Lumesse TalentLink pricing guide for G-Cloud 5 Pricing guide Lumesse TalentLink pricing guide fr G-Clud 5 Pricing Guide Lumesse TalentLink Page 1 Pricing Intrductin TalentLink pricing is cmpsed f tw distinct elements: Implementatin and Subscriptin.

More information

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved. Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Infrmatin Security Incident Respnse Plan Agency: Date: Cntact: 1 TABLE OF CONTENTS Intrductin... 3 Authrity... 4 Terms and Definitins... 4 Rles and Respnsibilities... 5 Prgram... 6 Educatin and Awareness...

More information

AUDIT AND RISK COMMITTEE TERMS OF REFERENCE

AUDIT AND RISK COMMITTEE TERMS OF REFERENCE AUDIT AND RISK COMMITTEE TERMS OF REFERENCE 1. TITLE OF COMMITTEE Audit and Risk Cmmittee 2. ESTABLISHMENT The Audit and Risk Cmmittee is established under Part 3 Sectin 19(1) f the Charles Darwin University

More information

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT Suth Australia Plice POSITION INFORMATION DOCUMENT Stream: Career Grup: Discipline: Classificatin: Service: Branch: Psitin Title: Administrative Services Cnsultancy and Infrmatin AO ASO-6 Infrmatin Systems

More information

Investigative Management Program and Case Tracking System (IMPACT)

Investigative Management Program and Case Tracking System (IMPACT) Privacy Impact Assessment fr the Investigative Management Prgram and Case Tracking System (IMPACT) February 4, 2008 Cntact Pint Office f Infrmatin Systems Drug Enfrcement Administratin 202-307-1000 Reviewing

More information

DATE APPROVED March 2011. Version Date Comments / Changes 1.0 March 2011 Initial policy released

DATE APPROVED March 2011. Version Date Comments / Changes 1.0 March 2011 Initial policy released Page 1 f 11 APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial plicy released 1. PURPOSE OF THIS POLICY T define the purpses fr which Crprate Purchase Cards are t be used

More information

Chief Finance and Operations Officer IfM Education and Consultancy Services (IfM ECS)

Chief Finance and Operations Officer IfM Education and Consultancy Services (IfM ECS) Chief Finance and Operatins Officer IfM Educatin and Cnsultancy Services (IfM ECS) Rle Summary IfM ECS disseminates the research and educatin utputs f the University f Cambridge Institute fr Manufacturing

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc. HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days

ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days ITIL Service Offerings & Agreement (SOA) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management

More information

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd. Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

E-Business Strategies For a Cmpany s Bard

E-Business Strategies For a Cmpany s Bard DATATEC LIMITED BOARD CHARTER / TERMS OF REFERENCE 1. CONSTITUTION The primary bjective f the Cmpany s Bard Charter is t set ut the rle and respnsibilities f the Bard f Directrs ( the Bard ) as well as

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

All Harvard University schools, tubs, local units, Affiliate Institutions, Allied Institutions and University-wide Initiatives.

All Harvard University schools, tubs, local units, Affiliate Institutions, Allied Institutions and University-wide Initiatives. HARVARD UNIVERSITY FINANCIAL POLICY INDEPENDENT CONTRACTOR CLASSIFICATION Plicy Title: Independent Cntractr Respnsible Office: ERP and UFS Effective Date: Octber 4, 2000 Revisin Date: May 12, 2009 Plicy

More information

Information Security Policy

Information Security Policy Purpse The risk t Charlestn Suthern University, its emplyees and students frm data lss and identity theft is f significant cncern t the University and can be reduced nly thrugh the cmbined effrts f every

More information

Gravesham Borough Council

Gravesham Borough Council Classificatin: Part 1 Public Key Decisin: Please specify - N Gravesham Brugh Cuncil Reprt t: Perfrmance and Administratin Cmmittee Date: 12 Nvember 2015 Reprting fficer: Subject: Crprate Perfrmance Manager

More information

Chapter 7 Business Continuity and Risk Management

Chapter 7 Business Continuity and Risk Management Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity

More information

MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016

MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 The Manitba Securities Cmmissin (the Cmmissin) is a divisin f the Manitba Financial Services Agency (MFSA). The ther divisin is the Financial Institutins

More information

Enterprise Security Management CIS 259

Enterprise Security Management CIS 259 Enterprise Security Management CIS 259 Prerequisites CIS 175 Descriptin This curse is designed t cver the managerial aspects f cmputer security and risk management fr enterprises. The student will attain

More information

State of Wisconsin Division of Enterprise Technology (DET) Distributed Database Hosting Service Offering Definition (SOD)

State of Wisconsin Division of Enterprise Technology (DET) Distributed Database Hosting Service Offering Definition (SOD) State f Wiscnsin Divisin f Enterprise Technlgy (DET) Distributed Database Hsting Service Offering Definitin (SOD) Distributed Database Hsting SOD Page 1 12/9/2010 Dcument Revisin Histry (Majr Pst Publishing

More information

THIRD PARTY PROCUREMENT PROCEDURES

THIRD PARTY PROCUREMENT PROCEDURES ADDENDUM #1 THIRD PARTY PROCUREMENT PROCEDURES NORTH CENTRAL TEXAS COUNCIL OF GOVERNMENTS TRANSPORTATION DEPARTMENT JUNE 2011 OVERVIEW These prcedures establish standards and guidelines fr the Nrth Central

More information

COUNTY OF SACRAMENTO PLANNING AND ENVIRONMENTAL REVIEW

COUNTY OF SACRAMENTO PLANNING AND ENVIRONMENTAL REVIEW COUNTY OF SACRAMENTO PLANNING AND ENVIRONMENTAL REVIEW REQUEST FOR PROPOSAL fr ON-CALL CULTURAL RESOURCE SERVICES Release Date: Tuesday, March 10, 2015 Submittal Deadline: Mnday, April 13, 2015 by 5:00

More information

Software and Hardware Change Management Policy for CDes Computer Labs

Software and Hardware Change Management Policy for CDes Computer Labs Sftware and Hardware Change Management Plicy fr CDes Cmputer Labs Overview The cmputer labs in the Cllege f Design are clsely integrated with the academic needs f faculty and students. Cmputer lab resurces

More information

Template on written coordination and cooperation arrangements of the supervisory college established for the <XY> Group/<A> Institution

Template on written coordination and cooperation arrangements of the supervisory college established for the <XY> Group/<A> Institution COORDINATION AND COOPERATION ARRANGEMENTS EBA/RTS/2014/16 EBA/ITS/2014/07 Annex II Template n written crdinatin and cperatin arrangements f the supervisry cllege established fr the Grup/ Institutin

More information

Health and Safety Training and Supervision

Health and Safety Training and Supervision Intrductin: Health and Safety Training and Supervisin University f Nttingham is cmmitted t maintaining and develping standards f excellence in all aspects f its business. T that end, the University aspires

More information

Texas Woman's University University Policy Manual

Texas Woman's University University Policy Manual Texas Wman's University University Plicy Manual Plicy Name: Plicy Number: 6.06 Date Passed: July 2004 Health Insurance Prtability& Accuntability Act (HIPAA) Date Reviewed: September 2008 Next Review: September

More information