HIV EMR Proposal. Report prepared by: Dr John Haskew, Director Uamuzi Bora
|
|
|
- Aubrie Lewis
- 10 years ago
- Views:
Transcription
1 HIV EMR Proposal Report prepared by: Dr John Haskew, Director Uamuzi Bora November 2013
2 ABSTRACT Uamuzi Bora is a medical project that supports the Ministry of Health (MoH) and partners in Kenya to implement an electronic medical record to improve clinical and public health decision-making. The EMR is built using free, open source software and is based on the Open Medical Record System (OpenMRS) platform, increasingly being adopted in developing countries around the world. Uamuzi Bora has implemented an HIV EMR in Western Kenya since 2009 and more than 17,000 patients are now registered across five sites, including Kakamega PGH, which has the largest caseload in all of Kakamega County. Among other indicators, a 77% reduction in patients eligible for ART but not on ART has been documented and more than 3,700 patients previously lost to follow up have been traced using the EMR in the past 12 months. The budget will facilitate implementation of the HIV EMR by MoH to cover at least 25,000 people living with HIV across 25 health facilities (including Kakamega Provincial General Hospital, Vihiga District Hospital and 3 health facilities currently supported in Kakamega County). Technical support and training will be provided within the budget to support MoH ownership and sustainability for the long-term. The budget assumes that MoH staff costs (at national, county, district and facility levels) are covered by the MoH themselves, as use of the EMR will become part of the daily work of public health and clinical staff. These staff costs include data entry and routine use of the EMR, as well as attendance at training. 2
3 TABLE OF CONTENTS ABSTRACT... 2 TABLE OF FIGURES The HIV Electronic Medical Record Features of the EMR Data Entry Data Verification Clinical Decision Support in Care Follow Up and Retention in Care Reporting Indicator Dashboard System Infrastructure Network Server Clinic computers Data Management Data Protection Data transfer and backup Anonymisation Objectives, Outputs and Activities Principal Objective Specific Objectives Outputs and activities Output 1: An HIV EMR is implemented and co-ordinated by Ministry of Health Output 2: At least 25,000 people living with HIV are enrolled in the HIV EMR Output 3: Quality of record keeping, clinic attendance and retention is improved Output 4: Quality of clinical care is standardised and improved Logical Framework Matrix Budget Letters from Health Facilities regarding the HIV EMR Kakamega Provincial General Hospital Vihiga District Hospital Bushiri Health Centre Emusanda Health Centre Bukura Health Centre
4 TABLE OF FIGURES Figure 1. Features of a local clinic model of EMR implementation... 6 Figure 2. The Uamuzi Bora model of EMR implementation... 6 Figure 3. The Uamuzi Bora model of EMR implementation... 6 Figure 4. The Uamuzi Bora HIV EMR indicator dashboard
5 1. The HIV Electronic Medical Record The HIV electronic medical record (EMR) is built using free, open source software and builds on common platforms and previous work, notably that of Open Medical Record System (OpenMRS). The HIV EMR uses a cloud-based model of deployment that only requires a single server to be maintained centrally, with no infrastructure required by the individual clinic (Figure 1 and 2). The EMR uses a secure, encrypted virtual private network (VPN) with Safaricom, a mobile phone provider in Kenya, to which the server and clinic computers can connect securely. The VPN is air gapped from the internet and only computers that have been registered by the project can access this secure private network. Each clinic only requires a single computer to run the EMR and the Google Chromebook has been selected as the clinic computer of choice. Chromebooks function as a laptop and are capable of hosting a SIM card to connect directly to a mobile data network. In this manner, each clinic can connect securely to the EMR server via the VPN on the mobile data network. The cloud-based model allows health information to be shared in real-time between different levels of care to improve clinical and public health decision-making (Figure 3). Every 24 hours, the database of individual patients (which remains encrypted and secure and only accessible to clinics) is copied and all patient-identifiable information is removed. This anonymous version of the database is then used to provide health information to different users at different levels of health care. 5
6 Figure 1. Features of a local clinic model of EMR implementation Figure 2. The Uamuzi Bora model of EMR implementation Figure 3. The Uamuzi Bora model of EMR implementation 6
7 1.1 Features of the EMR Data Entry Data is entered from the paper record to the electronic medical record either by the clinician or a data entry clerk. During the first phase of Uamuzi Bora EMR implementation in a new clinic, the existing paper-record is entered into the electronic database. Clinic data clerks are trained in data entry and Uamuzi Bora data entry assistants support data entry and supervision in high volume sites. Once the backlog of historical patient data is entered, prospective new patients and clinic visit data continues to be entered. Depending on the site, this data entry can proceed in two ways: 1. Data is entered during the patient consultation by the clinician 2. Data is entered after the patient consultation has finished by a data entry clerk Data Verification Data checks are run automatically on all data collected in the electronic medical record to ensure data is valid, accurate and complete. Once data is entered into the HIV EMR, the system automatically reviews all data every 24 hours and produces a data verification report to indicate if pertinent data is missing from the record. Individual patient records are also flagged to highlight which data is missing. Clinic data clerks can then review these reports and flags to correct missing data from the patient record Clinical Decision Support in Care Clinical reminders and decision support is designed to ensure standardised care is provided that will improve the quality of care delivered. Adherence to clinical guidelines is essential for ensuring a high standard of health care provision. The HIV EMR automatically reviews the database every 24 hours to generate a clinical verification report and flag patients who have not received care according to 7
8 standardised guidelines and protocols. Clinicians then regularly review the clinical verification report and individual patient flags to review appropriate management plans Follow Up and Retention in Care A successful outpatient program must ensure continuity and retention in care Continuity of care and retention in care remain particular challenges for many health services in resource-constrained settings. The HIV EMR can automatically flag and provide a list of patients who have not attended clinic or missed a clinic appointment. The EMR can also automatically send out SMS text message reminders to these patients or a phone call can be made from the clinic to ensure patients are retained in care and followed up appropriately Reporting Standardised reports can be automatically generated to enhance the monitoring and evaluation functions of the clinic, as well as district and provincial health management. The HIV EMR provides standardised reporting to the Ministry of Health and partners, for example the MOH711a report, MOH731 report and NASCOP HIVQual report. Both external and internal reporting is essential to determine the success of programming and the HIV EMR provides the ability to generate such reports quickly and accurately. Reports can be generated via the EMR itself. Online aggregated data tables are also available via the following web address: Indicator Dashboard A real-time online indicator dashboard provides feedback and monitoring at all levels of health management and decision-making. The HIV EMR improves access to and use of health information at all levels of public health and clinical decision making, from the clinic to national level, through the use of an online indicator dashboard. An example view is shown in Figure 4. The indicator dashboard can be accessed at the following web address: 8
9 Figure 4. The Uamuzi Bora HIV EMR indicator dashboard 1.2 System Infrastructure Network Uamuzi Bora utilises a secure, encrypted virtual private network (VPN) with Safaricom, a mobile phone provider in Kenya, to which the server and clinic computers can connect securely. The VPN is air gapped from the internet and only Chromebooks and SIM cards that have been registered by the project can access the secure, private network Server The physical server is hosted for Ministry of Health by Uamuzi Bora, and is currently located in Kakamega. It uses a WiMAX radio connection to connect to the VPN. The Uamuzi Bora server runs a customised version of OpenMRS 1.9: a Java application running on top of Apache Tomcat 7, using MySQL 5.5 as a database server, and run behind Nginx as a reverse proxy server, on a server running Ubuntu LTS Linux. Regular security updates are applied to the system from the main Ubuntu repositories. The BIOS is password protected. The hard drives are encrypted using dm-crypt and a key file is used to decrypt the hard drives at boot time. The key file is stored on a separate USB 9
10 memory stick that is required to be plugged into the server to boot. The USB stick is then removed after booting and stored in a locked cabinet elsewhere in the building. The server runs a fully patched version of Ubuntu using only packages from official Ubuntu stable repositories. Only ports 80, 443, and 22 are open; the rest firewalled. SSH has a stringent configuration to resist brute force attacks and root login is disabled. MySQL has been secured from its default configuration, and only accepts connections from the localhost. Tomcat only serves pages over HTTPS: it redirects all port 80 traffic to port 443 and uses SSL/TLS with our own self-signed certificate. All server processes are owned by non-privileged users and are sandboxed. OpenMRS user accounts have permissions relevant to their roles and may only access relevant data, as per principle of least privilege. A strong password policy is enforced Clinic computers Clinic computers are Google Chromebooks, which use a 3G mobile internet connection to connect directly with the VPN. The 3G mobile internet connection does not permit access to the internet, and Wifi and Ethernet networking on the client machines is disabled. Clinicians and data clerks use the Chromebooks to search, view, edit and create electronic patient records and access verification reports and clinical reminders within the OpenMRS web application. 1.3 Data Management Data Protection Uamuzi Bora stores patient data confidentially and, in accordance with best practices, data are protected through a variety of mechanisms. The server is physically secured in a locked office in Kakamega, and physical access is limited to select Uamuzi Bora staff. An alarm is triggered if the server case is tampered with and the BIOS requires a password to continue booting. Patient identifiable information (such as the MySQL database) is stored on an encrypted file system that is decrypted at boot time using a USB key, which is then stored in a different secure physical location to the server. Connections between the clinic computers and the server use exclusively HTTPS over an IPsec VPN. Core Uamuzi Bora staff can also connect to the server from the internet using public-key authenticated SSH over the IPsec VPN. All connections and connection attempts to the server are logged and audited. 10
11 1.3.2 Data transfer and backup Encrypted backups are made of patient identifiable data. These backups are encrypted using GnuPG to a private key, which is split between four lead Uamuzi Bora staff using Shamir's Secret Sharing in a (2,4)-threshold scheme. This means that no-one person can decrypt the backup - it requires two people to combine their shares of the private key to decrypt it. Encrypted backups are transferred to long-term storage on Amazon Glacier over the VPN and held for a period of 6 months for the purpose of disaster recovery after which time they are securely deleted. All backups are protected with strong encryption. Only the project's public keys are on the server; the corresponding private keys are held out of country by the research team. Temporary files are immediately securely deleted after encryption is completed Anonymisation In addition to backups for the purposes of disaster recovery, regular anonymised versions of the database are created automatically by the server, which contain no patient identifiable data. This anonymous database is encrypted with a different key to the main backup and is held by all core project members. The anonymisation process is automated by a backup script and does not involve any human intervention. It occurs on the same physical machine as OpenMRS, so data are anonymised at point of source. Patient identification numbers, names, data of birth, relations, first line of address and freetext fields are considered represent patient identifiable data and these are deleted as part of the anonymisation process, apart from date of birth which is rounded to the nearest year. Our anonymisation process thus performs the following functions: Deletes the UPN (the unique patient identification number). Deletes the patient's forename(s) and replaces it with 'Unknown'. Deletes the patient's surname and replaces it with 'Unknown'. Deletes the patient's middle names (if applicable). Deletes the patient's maiden name or previous surnames (if applicable). Deletes any prefixes or suffixes of the patient's name (if applicable). Deletes the first line of the patient's address Deletes the patient's telephone number Rounds the patient's date of birth to the nearest month (e.g. 14/07/1970 would be come 01/07/1970) 11
12 Deletes all details of the patient's treatment support (names, phone numbers and addresses) The anonymous database is used to create aggregated data that is transferred over a VPN to a public webserver for use in the dashboard indicators and application programming interface (API), which allows partners to access aggregated data. 12
13 2. Objectives, Outputs and Activities 2.1 Principal Objective To improve clinical care of people living with HIV through implementation of an electronic medical record. 2.2 Specific Objectives The Ministry of Health maintain and implement an HIV electronic medical record for public health and clinical decision-making. At least 25,000 people living with HIV are enrolled and registered in the HIV electronic medical record across 25 health facilities (including Kakamega Provincial General Hospital and Vihiga District Hospital) All patients registered in the HIV electronic medical record are reviewed daily to ensure clinical care delivered is standardised and appropriate. 2.3 Outputs and activities Output 1: An HIV electronic medical record is implemented and co-ordinated by Ministry of Health Activities: A1. Server and network infrastructure A server and virtual private network is registered, implemented and maintained by Ministry of Health for implementation of the HIV electronic medical record. A2. HIV EMR reporting and updates Regular reporting and updates are provided on the status and outcomes of implementation of the HIV electronic medical record at national, county and district levels. Output 2: At least 25,000 people living with HIV are enrolled and registered in the HIV electronic medical record across 25 health facilities (including Kakamega Provincial General Hospital and Vihiga District Hospital) Activities: A1. National, county and district EMR training National, county and district training is completed on the role of the HIV electronic medical record in public health decision making and reporting. A2. Health facility EMR training HIV electronic medical record training is completed in 25 health facilities on the role of the HIV electronic medical record in clinical decision making, record keeping, retention in care and follow-up. A3. Data entry Data entry of at least 25,000 people living with HIV into the HIV electronic medical record is completed across 25 health facilities. 13
14 Output 3: Quality of record keeping, clinic attendance and retention in care is improved through implementation of the HIV electronic medical record Activities: A1. Record keeping All patient records are screened daily to ensure missing administrative and demographic data is complete. A2. Retention in care All patient records are reviewed daily to ensure that patients who have missed a clinic appointment are reviewed and followed up. Output 4: Quality of clinical care is standardised and improved, according to predefined clinical reminders and indicators through implementation of the HIV electronic medical record Activities: A1. Clinical Care Patient records are reviewed daily to ensure that all patients receive appropriate care, for example flagging patients eligible for ART (based on CD4 count or WHO stage) but who are not on ART and patients lost to follow-up. 14
15 3. Logical Framework Matrix Intervention Logic Objectively Verifiable Indicators Sources Verification of Risks and Assumptions Principal Objective: (IMPACT) To improve clinical care of people living with HIV through implementation of an electronic medical record People living with HIV enrolled and registered in the EMR People living with HIV attending HIV services MoH reports Health facility data HIV EMR database Specific Objective: (OUTCOME) The Ministry of Health maintain and implement an HIV electronic medical record for public health and clinical decision-making. At least 25,000 people living with HIV are enrolled and registered in a HIV electronic medical record across 25 health facilities. All patients registered in the HIV electronic medical record are reviewed daily to ensure clinical care delivered is standardised and appropriate At least 80% of patient records are complete At least 80% of people living with HIV are patients in care 100% of patients eligible for ART are on ART HIV database EMR Funding is available to support activities Co-ordination capacity is available and
16 OUTCOME: At least 25,000 people living with HIV are enrolled and registered in a HIV electronic medical record across 25 health facilities Results R1: Co-ordination (OUPUTS) Results R2: Registration (OUPUTS) 1. An HIV electronic medical record is implemented and co-ordinated by Ministry of Health 2. At least 25,000 people living with HIV are enrolled and registered in the HIV electronic medical record across 25 health facilities A functioning HIV EMR and network is hosted by MoH At least 25,000 patients are registered in the HIV EMR Observation MoH Reports MoH reports Health facility data EMR database Funding is available to support activities Co-ordination and capacity is available Results R3: Record Keeping (OUPUTS) 3. Quality of record keeping, clinic attendance and retention in care is improved through implementation of the HIV electronic medical record At least 80% patient records are complete At least 80% of patients are retained in care MoH reports Health facility data EMR database Results R4: Clinical Care (OUPUTS) 4. Quality of clinical care is standardised and improved, according to predefined clinical reminders and indicators through implementation of the HIV electronic medical record 100% of patients who are eligible for ART are on ART 100% of HIV patients receive appropriate care and support MoH reports Health facility data EMR database 16
17 RESULT 1: An HIV electronic medical record is implemented and co-ordinated by Ministry of Health Activities R1 (INPUTS) Activities associated with R1 A1. Server and network infrastructure A server and virtual private network is registered, implemented and maintained by Ministry of Health for implementation of the HIV electronic medical record. A2. HIV EMR reporting and updates Regular reporting and updates are provided on the status and outcomes of implementation of the HIV electronic medical record at national, county and district levels. Means Human resources Server, network, database Technical support IT and Program Consultants Developer/ Programmer Costs Staff costs Transport costs Server, network, database Funding is available to support activities Co-ordination capacity is available and RESULT 2: At least 25,000 people living with HIV are enrolled and registered in the HIV electronic medical record across 25 health facilities Activities R2 (INPUTS) Activities associated with R2 A1. National, county and district EMR training National, county and district training is completed on the role of the HIV electronic medical record in public health decision making and reporting. A2. Health facility EMR training HIV electronic medical record training is completed in 25 health facilities on the role of the HIV electronic medical record in clinical decision making, record keeping, retention in care and follow-up. Means Human resources Technical support Costs Staff costs Transport costs Training costs Data entry costs Funding is available to support activities Co-ordination capacity is available and A3. Data entry Data entry of at least 25,000 people living with HIV into the HIV electronic medical record is completed across 25 health facilities. RESULT 3: Quality of record keeping, clinic attendance and retention in care is improved through implementation of the HIV electronic medical record Activities Activities associated with R3 Means Costs Funding is available to 17
18 R3 (INPUTS) A1. Record keeping All patient records are screened daily to ensure missing administrative and demographic data is complete. A2. Retention in care All patient records are reviewed daily to ensure that patients who have missed a clinic appointment are reviewed and followed up.. Human resources Technical support Staff costs Transport costs Server, network, database support activities Co-ordination capacity is available and RESULT 4: Quality of clinical care is standardised and improved, according to predefined clinical reminders and indicators through implementation of the HIV electronic medical record Activities R4 (INPUTS) Activities associated with R4 A1. Clinical Care Patient records are reviewed daily to ensure that all patients receive appropriate care, for example flagging patients eligible for ART (based on CD4 count or WHO stage) but who are not on ART and patients lost to follow-up. Means Human resources Technical support Costs Staff costs Transport costs Server, network, database Funding is available to support activities Co-ordination capacity is available and 18
19 4. Budget The budget will facilitate implementation of the HIV EMR by Ministry of health (MoH) to cover at least 20,000 people living with HIV across 25 health facilities (including Kakamega Provincial General Hospital, Vihiga District Hospital and three facilities currently supported in Kakamega County). Technical support and training will be provided within the budget to support MoH ownership and sustainability for the long-term. The budget assumes that MoH staff costs (at national, county, district and facility levels) are covered by the MoH themselves, as use of the EMR will become part of the daily work of public health and clinical staff. These staff costs include data entry and routine use of the EMR, as well as attendance at training. 19
20 5. Letters from Health Facilities regarding the HIV EMR 5.1 Kakamega Provincial General Hospital 20
21 5.2 Vihiga District Hospital 21
22 5.3 Bushiri Health Centre 22
23 5.4 Emusanda Health Centre 23
24 5.5 Bukura Health Centre 24
Stars in Global Health Project Report
! Stars in Global Health Project Report Strengthening integrated care and support for people living with HIV in Western Kenya through the use of an electronic medical record Report prepared by: John Haskew,
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Data Stored on a Windows Computer Connected to a Network
Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Computer Connected to
Name: Position held: Company Name: Is your organisation ISO27001 accredited:
Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
NETWORK SECURITY HACKS
SECOND EDITION NETWORK SECURITY HACKS 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. Andrew Lockhart O'REILLY Beijing
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
DiamondStream Data Security Policy Summary
DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers
Casper Suite. Security Overview
Casper Suite Security Overview JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave S Suite
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
NETWORK SECURITY HACKS *
NETWORK SECURITY HACKS * Andrew %pckhart Ji O'REILLY* Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Contents Credits Preface ix xi Chapter 1. Unix Host Security 1 1. Secure Mount Points
Cybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Data Stored on a Windows Server Connected to a Network
Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Server Connected to
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Mac OS X Security Checklist:
Mac OS X Security Checklist: Implementing the Center for Internet Security Benchmark for OS X Recommendations for securing Mac OS X The Center for Internet Security (CIS) benchmark for OS X is widely regarded
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Overview of PC Security Since computer security has become increasingly important, almost all of the focus has been on securing
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
Standard: Event Monitoring
Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems
Manage a Firewall Using your Plesk Control Panel Contents
Manage a Firewall Using your Plesk Control Panel Contents Goals... 2 Linux Based Plesk Firewall... 2 Allow or Restrict Access to a Service... 3 Manage System Policies... 3 Adding Custom Rules... 4 Windows-based
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
Credit Card Security
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3
HC3 Draft Cloud Security Assessment
HC3 Draft Cloud Security Assessment Respondent Contact Information First Name: Grant Company: Ostendio Email: [email protected] Last Name: Elliott Company Address: Ostendio Date: 01/27/2015 Information
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...
CorreLog Alignment to PCI Security Standards Compliance
CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
CloudPassage Halo Technical Overview
TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure
Intel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
VMware vcenter Log Insight Security Guide
VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email
WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly
Security for Cloud- and On Premise Deployment. Mendix App Platform Technical Whitepaper
Security for Cloud- and On Premise Deployment Mendix App Platform Technical Whitepaper Security for Cloud- and On Premise Deployment EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 THE MENDIX APP PLATFORM...
Deployment Topologies - DPAdmin An isoagroup Product
Deployment Topologies - DPAdmin An isoagroup Product Author: Sinu Sekhar Revision History Date Version Description Author 10/24/2010 1.0 Initial version Sinu Sekhar 1. DPAdmin and DataPower Deployment
Tibbr Installation Addendum for Amazon Web Services
Tibbr Installation Addendum for Amazon Web Services Version 1.1 February 17, 2013 Table of Contents Introduction... 3 MySQL... 3 Choosing a RDS instance size... 3 Creating the RDS instance... 3 RDS DB
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
QuickStart Guide for Managing Computers. Version 9.2
QuickStart Guide for Managing Computers Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
Famly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
Hardening MySQL. Maciej Dobrzański maciek at psce.com @MushuPL http://www.psce.com/
Hardening MySQL Maciej Dobrzański maciek at psce.com @MushuPL http://www.psce.com/ In this presentation Database security Security features in MySQL The ugly truth Improving security DATABASE SECURITY
Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett
Linux Boot Camp Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett Schedule for the Week Schedule for the Week Mon Welcome from Enrollment Management
Cyber Essentials Questionnaire
Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
LogRhythm and PCI Compliance
LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.
RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Avaya TM G700 Media Gateway Security. White Paper
Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
Endpoint Security VPN for Mac
Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
1B1 SECURITY RESPONSIBILITY
(ITSP-1) SECURITY MANAGEMENT 1A. Policy Statement District management and IT staff will plan, deploy and monitor IT security mechanisms, policies, procedures, and technologies necessary to prevent disclosure,
How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)
PCI Compliance Reporting Solution Brief Automating Regulatory Compliance and IT Best Practices Reporting Automating Compliance Reporting for PCI Data Security Standard version 1.1 The PCI Data Security
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Forward proxy server vs reverse proxy server
Using a reverse proxy server for TAD4D/LMT Intended audience The intended recipient of this document is a TAD4D/LMT administrator and the staff responsible for the configuration of TAD4D/LMT agents. Purpose
Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux
Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com [email protected] August 2015 Copyright 2015 1&1
Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging
Log Management Standard Effective Date: 7/28/2015 1.0 INTRODUCTION The California State University, Chico system/application log management standard identifies event logging requirements, log review frequency,
NovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Division of IT Security Best Practices for Database Management Systems
Division of IT Security Best Practices for Database Management Systems 1. Protect Sensitive Data 1.1. Label objects containing or having dedicated access to sensitive data. 1.1.1. All new SCHEMA/DATABASES
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
CloudPassage Halo Technical Overview
TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
Filr 2.0 Administration Guide. April 2016
Filr 2.0 Administration Guide April 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy,
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
Remote Access Platform. Architecture and Security Overview
Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards
Implementation Guide
Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Research Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Using Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
