Lawrence Police Department Administrative Policy. August A. Access to CJIS sensitive data is only available to authorized users.
|
|
|
- Marion Gilmore
- 10 years ago
- Views:
Transcription
1 Lawrence Police Department Administrative Policy SUBJECT Criminal Justice Information System (CJIS) APPLIES TO All Personnel EFFECTIVE DATE REVISED DATE August 2013 APPROVED BY Chief of Police TOTAL PAGES 7 POLICY CHAPTER 4 Criminal Justice Information System (CJIS) NETWORK SECURITY A. Access to CJIS sensitive data is only available to authorized users. B. All CJIS sensitive data shall be encrypted when passing through a public carrier network or any private network not dedicated to Criminal Justice use. C. Each system user shall have a unique user ID. D. Each user ID shall have an associated password. Valid passwords shall be at least 6 characters in length and shall consist of both letters and digits. Passwords shall be valid for thirty (30) days. E. All dial access into the secured CJIS network shall be via the DISC provided dial services. Dial modems are not allowed inside the secured network except as outlined in Technical Policies paragraph 2.E. F. Specific security standards shall be put into place by each agency regarding the access to the State CJIS system. These standards shall include: Internet Policies, Remote Site Policies, and Mobile Data Terminal (MDT) Policies. G. The following types of Dial-in-access are permitted from the open CJIS network. Dial access must comply with one of the following. This access must comply with the current version of Paradigm4 CJIS security report, Phase II, paragraph
2 1. Locally provided (Modem pool). 2. User accesses through an Internet Service Provider (ISP) as long as it complies with other security policies. H. Access to the secured CJIS network from the open CJIS network shall occur only through the DISC network firewall. I. Agency LANs shall provide adequate protection to the CJIS devices on the LAN. This protection may include firewalls or similar access devices as well as server/pc-level access control (logon ID", etc.). It is the responsibility of the agency head to ensure that only CJIS-authorized users are able to view CJIS data or issue CJIS transactions. J. All requests for connection to the open or secure CJIS network shall include a description of how the sites meet the network and technical security policies as defined or the level of connection requested. PERSONNEL SECURITY (USERS) An agency with access to CJIS information shall assume responsibility for and enforce CJIS System security policies. Specific personnel security standards shall be met in instances where agencies access the CJIS Network, NCIC and/or III information. Personnel included by the policy include: full time, part time, temporary and contract employees that have access to CJIS systems. These standards are included in the following: A. No one can have access to the CJIS systems that has been convicted of a felony or severe misdemeanor. B. All personnel with access must pass a background check minimally including; local name check, State and Federal name and fingerprint check, and local/federal warrants check, done by the user s agency. C. All personnel that have access to the CJIS system shall be at least 18 years old. D. Upon separation from the Lawrence Police Department the user s token will be disabled, and/or reassigned to a new user. 2
3 E. When accessing the Internet no user shall connect to any web sites pertaining to pornography, including but not limited to downloading of files, viewing material, and transmitting files. F. All traffic to and from the Lawrence Police Department on the secured CJIS network shall be for Criminal Justice or Law Enforcement business only. G. After completing a session on the CJIS system the user must shut the system down. Failure to shut down the system will allow unauthorized access. Any unauthorized access to an open system will be identified as the original authorized user. H. No user shall provide his/her security code to any other person to access the CJIS system, even if the person using the code is an authorized token holder. I. All policies and procedures apply to Mobile Data Terminals (MDT). J. Violations of personnel policies and procedures will result in disciplinary action against the user, and can subject the Lawrence Police Department to the loss of the ASTRA system. K. All authorized users will report their lost or damaged tokens immediately to their supervisor. PHYSICAL SECURITY A. The Lawrence Police Department shall ensure all ASTRA terminals and any related CJIS equipment shall have adequate security to protect against unauthorized person(s) gaining access to the computer, network and/or data. TECHNICAL POLICIES A. Policies in this section encompass general technical issues involving networks and authentication including management and support of the secured CJIS network and LANs connected to the system. B. Each work station accessing the system through the KBI KCJIS firewall shall have a unique mnemonic and a valid certificate. 3
4 NETWORK MANAGEMENT, DIAGNOSTICS, AND REPAIR A. DISC shall be responsible to ensure the 7x24 availability of the secured and open CJIS networks, in accordance with the service level agreement(s) implemented between DISC and the Kansas Criminal Justice Coordinating Council. B. Third party vendors, consultants, etc., employed to perform maintenance or network service shall be monitored. It shall be the responsibility of the criminal justice agency to ensure no CJIS sensitive data is allowed to leave the site without prior approval. A log of CJIS sensitive data which has left the site shall be maintained for two (2) years. ACCESS TO SECURED CJIS NETWORK A. Only criminal justice agencies with no other non-criminal justice agency on their LAN and/or WAN shall access the CJIS system. B. A LAN connected to the secured CJIS network shall have only one access point to or from the LAN; that being the router connection to the secured CJIS network. C. Traffic to or from an agency on the secured CJIS network shall be for criminal justice or law enforcement business purposes only. It is the responsibility of the Lawrence Police Department to ensure compliance with this policy. D. Any dial access shall be authenticated and logged at the time of connection. All backups or other copies of CJIS information taken from the CJIS servers shall be protected to ensure no unauthorized access to the data is possible if removed from the secured physical location. E. No modems shall be permanently connected to the LAN on the secured CJIS network. Controlled modem access is permitted when the modem is enabled only during the time the dial in was necessary and immediately disabled. F. DISC may employ additional monitoring as necessary to isolate network problems on the secured and open CJIS networks. With the owning agency's approval DISC may employ additional 4
5 TRAINING POLICIES monitoring as necessary to isolate network problems that appear to be originating from a local LAN. All CJIS terminal users should be trained to their level of access within six (6) months of employment. The following outlines the training that each level of personnel shall achieve. A. All FULL ACCESS operators shall pass the NCIC certification test given by the Kansas Highway Patrol. This certification shall be renewed every two years. If certification expires, the operator will not be allowed on the network until re-certification is completed. B. All LESS-THAN-FULL-ACCESS operators shall be tested by the employing agency, and re-tested every two years to ensure operators proficiency. The employing agency shall keep documentation of all training that it provided and documentation shall be provided during audits. In addition, the Kansas Highway Patrol shall be notified of the names of all LESS-THAN-FULL- ACCESS operators, and the dates of their certification. C. All sworn law enforcement personnel shall receive basic training in NCIC matters adhering to the minimum curriculum recommended by the NCIC in order to ensure effective use of the system and compliance with the NCIC policies and regulations. The employing agency shall keep documentation of all training that it provided and documentation shall be provided during audits. D. The agency shall provide training to the level of access permitted for CRIMINAL JUSTICE PRACTITIONERS. This would include such personnel as record clerks, court clerks, district attorneys, etc. The employing agency shall keep documentation of all training that it provided and documentation shall be provided during audits. E. Within six (6) months of election, selection or assignment, CRIMINAL JUSTICE ADMINISTRATORS and upper level supervisory personnel shall obtain training concerning capabilities of the CJIS Network, regulations, policy, audit requirements, sanctions, and related civil liability problems. The training is designed to familiarize administrators with the key issues that affect their agency. The employing agency shall keep 5
6 documentation of all training that it provided and documentation shall be provided during audits. F. All personnel assigned to technical and supervisory positions with access to the CJIS system shall have received approved training within six (6) months of their appointment. All personnel with CJIS access shall be trained on privacy and security issues regarding criminal history record information. Once trained, all personnel shall sign awareness statements showing that they understand the penalties and/or circumstances of misusing Criminal History Record Information (CHRI). All CJIS terminal users should be provided network security awareness training within six (6) months of employment. ADMINISTRATIVE SECURITY POLICIES A. RECORD KEEPING- Each agency is held responsible for their record keeping practices. This information will be monitored through compliance audits. B. DESTRUCTION/DISPOSAL- All information received from the CJIS Network shall be destroyed when no longer needed. C. DOCUMENTATION- Documentation that supports any operations on the CJIS Network, training personnel security violations, etc., shall be provided to authorized audit staff upon request. D. NOTIFICATION- If a violation of security is discovered the discovering agency shall notify the state NCIC Control Terminal Officer (CTO) without delay. Immediate reporting of such violation is expected. In any event, the discovering agency shall ensure that the state NCIC CTO is notified of such violation within one business day E. ADMINISTRATION- Each agency shall appoint a Terminal Agency Coordinator (TAC) who shall serve as a focal point for the CJIS issues, including these administration policies. AUDIT POLICY The Kansas Criminal Justice Coordinating Council (KCJCC), the Federal Bureau of Investigation (FBI), the Criminal Justice Information System (CJIS) Advisory Board, and the Kansas Law Enforcement Telecommunications Committee (ASTRA), have charged the Kansas Bureau of Investigation (KBI) and the Kansas Highway Patrol (KHP) with the audit responsibilities for the CJIS Network. 6
7 Those responsibilities are created through the following statutes, rules and regulations and/or policies: 1. FBI Security Policy 2. K.S.A K.S.A K.S.A Periodically, the KBI and/or the KHP will conduct audits to ensure compliance with established policies. During on-site audits at least the following areas may be reviewed: 1. Network Security 2. Personnel Security 3. Physical Security 4. Technical Security 5. Training Issues 6. Administrative Security Additional areas may also become part of the periodic audits that are not included in the policies listed above. Those areas are listed below. 1. Information Quality 2. Dissemination 3. Validation Review 4. NCIC Quality Assurance 5. Kansas Hot Files Quality Assurance Each agency shall respond to the NCIC CTO or his designee, in writing within thirty (30) days of receiving any final audit report, where an area is noncompliant. If areas of non-compliance are not corrected the report will be referred to the NCIC CTO, who will determine the appropriate sanctions, or termination of service. As a result of the auditor's findings and recommendations outlined in the final report, sanctions may be recommended to the NCIC Control Terminal Officer. The CTO will notify the local agency of any sanctions or other required change. 7
GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND
GENERAL ORDER DISTRICT OF COLUMBIA Subject CJIS Security Topic Series Number SPT 302 12 Effective Date March 28, 2014 Related to: GO-SPT-302.08 (Metropolitan Police Department (MPD) Wide Area Network)
ILLINOIS REGISTER DEPARTMENT OF STATE POLICE NOTICE OF ADOPTED RULES
TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: PART 1240 LAW ENFORCEMENT AGENCIES DATA SYSTEM (LEADS) Section 1240.10 Introduction 1240.20 The LEADS Advisory Policy Board (APB)
FLORIDA DEPARTMENT OF JUVENILE JUSTICE PROCEDURE
PROCEDURE Title: Florida Crime Information Center (FCIC), National Crime Information Center (NCIC), Criminal Justice Network (CJNet), Judicial Inquiry System (JIS), and Driver And Vehicle Information Database
ADM:49 DPS POLICY MANUAL Page 1 of 5
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL
LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL The Michigan Law Enforcement Information Network (LEIN) is a statewide computerized information system established in 1967 as a service to Michigan
Arkansas Crime Information Center. ACIC Training Policy
Arkansas Crime Information Center ACIC Training Policy pg. 1 Approved by the ACIC Supervisory Board December 4, 2015 ACIC Training Policy Training is necessary for the proper and effective use of the state
803 CMR: DEPARTMENT OF CRIMINAL JUSTICE INFORMATION SERVICES 803 CMR 7.00: CRIMINAL JUSTICE INFORMATION SYSTEM (CJIS)
803 CMR 7.00: CRIMINAL JUSTICE INFORMATION SYSTEM (CJIS) Section 7.01: Purpose and Scope 7.02: Definitions 7.03: Criminal Justice Agency (CJA) Access to Criminal Justice Information System (CJIS) 7.04:
DEPARTMENT OF STATE POLICE CRIMINAL RECORDS DIVISION CRIMINAL JUSTICE INFORMATION SYSTEMS
DEPARTMENT OF STATE POLICE CRIMINAL RECORDS DIVISION CRIMINAL JUSTICE INFORMATION SYSTEMS (By authority conferred on the Department of State Police by 1974 PA 163, MCL 28.214, and Executive Reorganization
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
FBI CJIS SECURITY ADDENDUM
FBI CJIS SECURITY ADDENDUM The following is an expanded version of the FBI Criminal Justice Information Services (CJIS) Security Addendum. This document was created in order to assist Texas agencies and
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition Revised: 02/13/2015 A. STATEMENT OF PURPOSE The purpose of this document is to outline the responsibilities
APPENDIX H SECURITY ADDENDUM
APPENDIX H SECURITY ADDENDUM The following pages contain the legal authority, purpose, and genesis of the Criminal Justice Information Services Security Addendum (H2-H4); the Security Addendum itself (H5-H6);
SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS
SHP-570A 1/14 SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS The goal of this document is to provide adequate security and integrity for criminal history record information (CHRI)
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
STATE OF WISCONSIN DEPARTMENT OF JUSTICE
STATE OF WISCONSIN DEPARTMENT OF JUSTICE J.B. VAN HOLLEN ATTORNEY GENERAL Kevin St. John Deputy Attorney General December 2014 Division of Law Enforcement Services Crime Information Bureau Walt Neverman,
STATE OF KANSAS OFFICE OF THE ATTORNEY GENERAL Through the KANSAS BUREAU OF INVESTIGATION INSTRUCTIONS
STATE OF KANSAS OFFICE OF THE ATTORNEY GENERAL Through the KANSAS BUREAU OF INVESTIGATION INSTRUCTIONS RENEWAL OF PRIVATE DETECTIVE LICENSE *Complete this renewal form if you are an employee, owner, partner,
CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION
1. Purpose: CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION The intent of this agreement and the policies and procedures herein is to facilitate compliance in Colorado with
How To Protect The Time System From Being Hacked
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
PHARMACY TECHNICIAN APPLICATION & INSTRUCTIONS
PHARMACY TECHNICIAN APPLICATION & INSTRUCTIONS IMPORTANT INFORMATION: Complete this application if you are applying to the Board for a pharmacy technician registration. You must answer all questions on
Physical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number 95.51 PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9.
95.5 of 9. PURPOSE.. To establish a policy that outlines the requirements for compliance to the Payment Card Industry Data Security Standards (PCI-DSS). Compliance with this standard is a condition of
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
Security awareness training is not a substitute for the LEADS Security Policy.
Revised 4/2014 This training will discuss some of the duties of the Terminal Agency Coordinator (TAC), Local Agency Security Officer (LASO) and provide basic security awareness training. Security awareness
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
Approved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
140-2-.04 Criminal Justice Information Exchange and Dissemination.
140-2-.04 Criminal Justice Information Exchange and Dissemination. (1) Exchange and dissemination of criminal justice information by criminal justice agencies: (a) Criminal justice agencies shall exchange
CJIS Division Update
CJIS Division Update Oregon State Police Criminal Justice Information Services Division Kendele Miyasaki, Training Coordinator Russ Hoskins, Training Specialist CJIS/LEDS Contact Information Criminal Justice
Criminal Justice Information System (CJIS) Vendor Policy Guidelines
Criminal Justice Information System (CJIS) Vendor Policy Guidelines Last Updated: 08/17/2015 Massachusetts Department of Criminal Justice Information Services 200 Arlington Street, Suite 2200 Chelsea,
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
CITY OF BOULDER *** POLICIES AND PROCEDURES
CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of
Delete Regulation 73-40(1)-(36) and replace with the proposed regulations (73-400 through 73-422).
SOUTH CAROLINA LAW ENFORCEMENT DIVISION CHAPTER 73 Statutory Authority: 1976 Code Section 40-18-30 (Administrative Regulations - Effective June 23, 2006) Instructions: Delete Regulation 73-40(1)-(36) and
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
1.02 Authorized Recipient means an entity authorized by statute to receive background check information for noncriminal justice purposes.
SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD The goal of this document is to provide adequate security and integrity for background check information while under the control or management of an
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly
Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008
Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008 TABLE OF CONTENTS SB9 OVERVIEW... 3 DEFINITIONS... 4 THE FINGERPRINTING PROCESS:... 6 SUMMARY OF REQUIREMENTS FROM THE BILL...
Network Security Policy: Best Practices White Paper
Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security
Law Enforcement Agencies Data System (LEADS) Operator Certification Program (LOCP)
Law Enforcement Agencies Data System (LEADS) Operator Certification Program (LOCP) BACKGROUND...2 PROGRAM GOALS...2 CERTIFICATION...3 Overview...3 Who Must Be Certified...4 Registration Procedures...4
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
Columbus Police Division Directive. I. Definitions. May 15, 1993 10.01 REVISED. Division Computer Systems
Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 10.01 REVISED TOTAL PAGES Mar. 30, 2014 9 Division Computer Systems I. Definitions A. Executable File A program or file that automatically
The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014
The Practice of Internal Controls Cornell Municipal Clerks School July 16, 2014 Page 1 July 18, 2014 Cash Receipts (Collection procedures) Centralize cash collections within a department or for the local
NONCRIMINAL JUSTICE AGENCY USE OF CRIMINAL JUSTICE INFORMATION
NONCRIMINAL JUSTICE AGENCY USE OF CRIMINAL JUSTICE INFORMATION PRESENTED BY: MICHIGAN STATE POLICE CRIMINAL JUSTICE INFORMATION CENTER SECURITY & ACCESS SECTION A PROUD tradition of SERVICE through EXCELLENCE,
Next Generation Identification Program (NGI) Rap Back Service
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Next Generation Identification Program (NGI) Rap Back Service Criminal Justice Policy and Implementation
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Electronic Information Security and Data Backup Procedures Date Adopted: 4/13/2012 Date Revised: Date Reviewed: References: Health Insurance Portability
GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2012-149 SENATE BILL 707
GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2012-149 SENATE BILL 707 AN ACT TO ENACT THE SCHOOL VIOLENCE PREVENTION ACT OF 2012; LIMIT PRAYERS FOR JUDGMENT CONTINUED; AND END SUNSET FOR
INFORMATION SECURITY OVERVIEW
INFORMATION SECURITY OVERVIEW December 2003 TABLE OF CONTENTS 1 INTRODUCTION... 1 1.1 SECURITY POLICY HIGHLIGHTS... 1 1.1.1 INFORMATION SECURITY POLICY RECAP... 1 1.1.2 NETWORK POLICY RECAP... 2 1.2 COMPUTER
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
STEP 5 - EDUCATION You must request Official Transcripts verifying your education, to be sent directly from your college or university.
INFORMATION & INTRUCTIONS FOR CPA CERTIFICATION This application is for CPA Licensure by Original Certification based on an applicant s passing the CPA Examination in another state. The applicant will
NETWORK SECURITY GUIDELINES
NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services
Justice Information Sharing Division ( ND CJIS ), and
Criminal Justice Information Sharing Division (ND CJIS) Office of the Attorney General 600 E Blvd Ave, Dept 125 Bismarck ND 58505 Office: (701) 328-1110 Fax: (701) 328-2226 P1 LERMS AGENCY AGREEMENT This
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00
Client Advisory October 2009 Data Security Law MGL Chapter 93H and 201 CMR 17.00 For a discussion of these and other issues, please visit the update on our website at /law. To receive mailings via email,
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
V 11.01.14. Seven areas are covered by this Notice:
Mediatti Broadband Communications, your local cable operator ( MBC ) is providing this Subscriber Privacy Notice ( Notice ) to inform you of its practices regarding personally identifiable information
South Carolina Law Enforcement Division Criminal Justice Information System (CJIS)
South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) USER AGREEMENT AND SYSTEM RESPONSIBILITIES Introduction The South Carolina Criminal Justice Infonnation and Communications
The ReHabilitation Center. 1439 Buffalo Street. Olean. NY. 14760
Procedure Name: HITECH Breach Notification The ReHabilitation Center 1439 Buffalo Street. Olean. NY. 14760 Purpose To amend The ReHabilitation Center s HIPAA Policy and Procedure to include mandatory breach
Fingerprint-Based Background Check Responsibilities for Non-Criminal Justice Agencies and Users
Fingerprint-Based Background Check Responsibilities for Non-Criminal Justice Agencies and Users Version 1.2 Hawaii Criminal Justice Data Center March 20, 2014 Table of Contents Table of Contents... 2 I.
Criminal Justice Information Services (CJIS) Security Policy
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.0 Prepared by: CJIS Information
CA Technologies Solutions for Criminal Justice Information Security Compliance
WHITE PAPER OCTOBER 2014 CA Technologies Solutions for Criminal Justice Information Security Compliance William Harrod Advisor, Public Sector Cyber-Security Strategy 2 WHITE PAPER: SOLUTIONS FOR CRIMINAL
CONSOLIDATED RECORDS MANAGEMENT SYSTEM (CRMS) USER AGREEMENT
CONSOLIDATED RECORDS MANAGEMENT SYSTEM (CRMS) USER AGREEMENT I. PURPOSE STATEMENT The TENNESSEE FUSION CENTER (TFC) is an initiative of the Tennessee Bureau of Investigation (TBI) and the Department of
FLORIDA HIGHWAY PATROL POLICY MANUAL
FLORIDA HIGHWAY PATROL POLICY MANUAL SUBJECT MOBILE VIDEO/AUDIO RECORDING PERSONAL AUDIO/VIDEO RECORDING DEVICES APPLICABLE CALEA STANDARDS 41.3.8; 83.2.2 POLICY NUMBER 17.22 ISSUE DATE 05/01/01 REVISION
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
Alan Ferretti CJIS Information Security Officer
Alan Ferretti CJIS Information Security Officer CJIS Technical Audit Overview Who, What, Why and When Audit Process Review Network Diagram Review Written Policies/Process Available Resources Helps To Know.
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
ORDINANCE NO. 08-129
ORDINANCE NO. 08-129 AN ORDINANCE REPEALING AND REORDAINING PART 4 (ALARM LICENSES AND REGISTRATION) OF ARTICLE 3 (SALES OF GOODS AND SERVICES) OF CHAPTER 2 (BUSINESS LICENSES, LIQUOR REGULATION AND TAXATION),
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
FLORIDA HIGHWAY PATROL POLICY MANUAL
FLORIDA HIGHWAY PATROL POLICY MANUAL SUBJECT PUBLIC RECORDS REQUESTS POLICY NUMBER 13.04 ISSUE DATE 11/01/96 REVISION DATE 05/29/15 TOTAL PAGES 8 13.04.01 PURPOSE It is the purpose of this policy to establish
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Document Title: System Administrator Policy
Document Title: System REVISION HISTORY Effective Date:15-Nov-2015 Page 1 of 5 Revision No. Revision Date Author Description of Changes 01 15-Oct-2015 Terry Butcher Populate into Standard Template Updated
CRIMINAL JUSTICE AGENCY ACCESS AGREEMENT
ASSIGNED ORI: Al.0050] 3C CRIMINAL JUSTICE AGENCY ACCESS AGREEMENT This document constitutes an agreement between the Commission (Commission), an agency of the State of Alabama with headquarters at 20
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management
6-8065 Payment Card Industry Compliance
0 0 0 Yosemite Community College District Policies and Administrative Procedures No. -0 Policy -0 Payment Card Industry Compliance Yosemite Community College District will comply with the Payment Card
VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION
VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION 1. Purpose This Agreement, entered into by the Hawaii Criminal Justice Data Center (hereinafter
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
NEW YORK. New York Executive Law 296 Human Rights Law Unlawful discriminatory practices
NEW YORK New York Executive Law 296 Human Rights Law Unlawful discriminatory practices 15. It shall be an unlawful discriminatory practice for any person, agency, bureau, corporation or association, including
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
Classification: CJIS Program Manager (UCR/Auditing) Title Code: V00681 Pay Range: 34
Pay Range: 34 POSITION SUMMARY: This is advanced professional, technical, and consultative work that involves developing, organizing, implementing, and directing all activities associated with a specific
DEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
Niagara County Community College
Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:
