Size: px
Start display at page:

Download ""

Transcription

1

2

3

4

5

6

7

8

9

10

11

12 Corporate Policy TITLE: Acceptable Use POLICY TITLE Acceptable Use Information Technology Services Division Introduction IT resources under the custody and control of the California Lottery (Lottery) are the property and responsibility of the Lottery. Managing the appropriate use of information assets advances the protection of the Lottery, its employees, and partners from illegal or damaging activities. Policy This policy establishes the acceptable use of Lottery IT resources. Lottery employees are permitted to use the Lottery s IT resources in the performance of their job-related duties. Minimal incidental personal use of these resources is permitted, but is restricted to Lotteryapproved users only. Users must take precautions to ensure that IT resources remain protected at all times, and must take proactive measures to prevent the unauthorized use of their authentication (e.g., login and password) information. The Lottery reserves the right to monitor and log all usage of Lottery IT resources at any time. Unacceptable Use The following are examples of unacceptable use of Lottery IT resources: Any activity that: interferes with the normal performance of an employee s work duties violates regulations is illegal under local, state, federal, or international law causes the harassment of others creates a hostile workplace Any activity that results in: repeated unwelcome contacts Personal (non-lottery) use of IT Resources for: monetary gain political or religious purposes unsolicited advertising unauthorized fund raising activity that results in direct costs to the Lottery Any incidental use activity that: significantly reduces the performance or availability of Lottery information technology resources 1/2

13 Acceptable Use Information Technology Services Division Unacceptable Use (continued) Users must not purposely access, create, display, store, or transmit information containing material that is: defamatory abusive obscene pornographic indecent profane sexually oriented threatening racially offensive discriminatory Applicability This policy applies to all Lottery employees and IT resources. Policy Owner/ Stakeholder(s) ITSD is responsible for maintaining this policy. The is a stakeholder. Definitions Information Technology (IT) Resource Any related IT equipment (e.g., computers, servers, network equipment, imaging devices, removable media, peripherals, copiers, printers, mobile or telecommunication devices including telephones and mobile phones) or IT service (e.g., electronic mail, web sites, shared folders, applications, print queues, or operating systems). Approval 04/02/2013 Robert T. O Neill, Director Date Revisions Review Date Action Date Action Section(s) Revised Effective Date Approval Initial Publication /2

14 Corporate Policy TITLE: Access Control POLICY TITLE Access Control Version Introduction The purpose of this policy is to provide access control requirements to all authorized users of California Lottery (Lottery) information systems to ensure the confidentiality, integrity and availability of Lottery information assets in accordance with the Lottery Policy. Policy It is the Lottery s policy that access to Lottery information systems and resources must be authorized, reviewed, and granted in a controlled manner with the least level of privilege required to carry out responsibilities. The following statements pertain to this policy. Access must comply with the principle of separation of duties. Access must conform to the Lottery s Data Classification Policy. Data Owners must authorize access for which they are responsible. Data Owners may delegate some operational responsibilities, but will retain their accountability. Access authorization requests and denials must be documented via the Information Technology Services Division s access request process. Application owners must ensure that user access rights are removed when access to the information is no longer required. User access accounts must be unique and consist of at least a user ID and password set. Access passwords must conform to the Lottery s Password Policy. Service accounts must be used only by the intended application or service. Support personnel requiring equivalent access must use their user accounts. Privileged access must be restricted, controlled, provided to users only on a need-toknow basis and must be audited on a periodic basis. Privileged access must only be used for system administrative purposes and should be kept separate from the standard user account. User access must time out after a period of inactivity. Access to application and Lottery information systems must be logged. The access logs must be reviewed periodically for unauthorized activities. Application and system developers must not be given access to both development and production environments of the systems or applications. User access rights must be reviewed periodically by their direct supervisor and recertified by the information system s Data Owners. 1/3

15 Access Control Version Policy (continued) User accounts which have been inactive for 60 days or more must be suspended unless otherwise instructed by the Data Owner. User accounts which have not been reactivated within a 12-month period must be deleted unless otherwise instructed by the Data Owner. Compliance with the Access Control Policy must be monitored. Applicability This policy applies to all Lottery information systems and to all persons who perform work for the Lottery and have access to Lottery information resources, including but not limited to: rs Employees Temporary staff Contractors, consultants, and third parties Definitions Least Level of Privilege The principle of having each subject granted the most restrictive set of privileges needed for the performance of authorized tasks. Separation of Duties The principle of not allowing one person to be responsible for completing or controlling a task, or set of tasks, from beginning to end when the potential for fraud, abuse or other harm exists. Service Account An account that is used solely for the purpose of running an application or service. Once configured, service accounts do not require day-to-day human intervention. Policy Owner / Stakeholders r As the policy owner, is responsible for the maintenance of, overall compliance with, and enterprise monitoring of this Policy. Division Deputy Directors As the Data Owners, are responsible for enforcing and ensuring compliance with this policy within their respective divisions. Distribution Clearance Sensitive. Exceptions Exceptions to this policy must be requested through a Risk Assessment as detailed in the Risk Assessment procedure and approved by the appropriate level of management. 2/3

16 Access Control Version References Policy Data Classification Policy Password Policy Approval 5/5/2014 Paula D. LaBrie, Acting Director Date Revisions Review Date Action Date Action Section(s) Revised Effective Date Approval Applicability; Removed Enforcement Section; References Final QA Initial Publication /3

17 Corporate Policy TITLE: Social Media POLICY TITLE Social Media Corporate Communications Division Introduction Social media is changing the way we work, communicate, and engage with the world. Social media channels, such as Twitter, YouTube, and Facebook, provide unique opportunities for the California Lottery (Lottery) to interact with the public. This policy sets forth guidelines for the use of social media that will help protect both our employees and the Lottery. Policy When engaging in social media activities the following information and guidelines are applicable: You are not permitted to publish any content or express any opinions on behalf of the Lottery on any social media networks or websites, including but not limited to the Lottery s official social media websites or accounts, without prior written authorization from our Corporate Communications Deputy Director; If part of your duties includes communicating through social media on behalf of the Lottery, your communications should be consistent with Lottery policies and standards for professional conduct; You are individually responsible for the content you post online, and could be subject to disciplinary action for content or commentary that is confidential or proprietary to the Lottery or its contractors or vendors; Never reveal information that is deemed sensitive or confidential by the Lottery; if you are unsure whether information is sensitive or confidential, please refer to the Lottery s Data Privacy and Confidentiality Policy and consult with your manager. If necessary, our Corporate Communications Deputy Director or can provide further direction; Please refer any player complaints, including but not limited to those related to player accounts or claims, to the Lottery s Customer Service staff; Any questions from the media regarding official Lottery communications or information should be directed to the Lottery s Corporate Communications Division; When your connection to the Lottery is apparent but you are not acting with prior authorization on behalf of the Lottery, please make it clear that any information or opinions that you express are your own and do not necessarily reflect the views of the Lottery; You are responsible for ensuring that any content you post on behalf of the Lottery is not in violation of law, including intellectual property law and the California Labor Code; You are not permitted to discuss competitors, customers/players, and Lottery partners without the prior approval of your manager and our Corporate Communications Deputy Director; Nothing in this policy is intended to interfere with your rights as a state employee. 1/2

18 Social Media Corporate Communications Division Definitions Social Media Websites and applications that enable users to create and share content or to participate in social networking. Examples of social media websites/applications include but are not limited to: Facebook, Twitter, YouTube, Instagram, LinkedIn, Google+, Pinterest, Wikis, blogs, messages boards, webinars, and content sharing sites. Social Media/Web Content Text, visual, audio or experiential content that is published online or across digital devices. These may include, among other things, text, images, sounds, interactive experiences, videos, games, and animations. Confidential Information maintained by the Lottery that is exempt from disclosure under the provisions of the California Public Records Act or other applicable state or federal laws. This information is limited to use by defined authorized personnel only and considered critical to ongoing operations. This includes, but is not limited to, personally identifiable information, protected health information, personal financial information/payment card information, gaming system data, electronic player information, and communications subject to attorney-client privilege. Applicability This policy applies to all Lottery officers, employees, and contractors. Policy Owner / Stakeholders The Corporate Communications Division is responsible for maintaining this policy. Additional stakeholders include Information Technology Services Division and. References Lottery Policies: Acceptable Use Code of Conduct for Responsible Gaming Data Privacy and Confidentiality Employee Conduct and Appearance Incompatible Activities and Ethical Conduct Standards Data Classification Approval 06/04/2015 Paula D. LaBrie, Acting Director Date Revisions Review Date Action Date Action Section(s) Revised Effective Date Approval Initial Publication /2

19 Corporate Policy TITLE: Securing Visible Sensitive and Confidential Information POLICY TITLE Securing Visible Sensitive and Confidential Information Introduction The purpose of this policy is to reduce the risks of unauthorized access to, loss of, or damage to California Lottery (Lottery) information, especially at times when work areas are left unattended. Policy It is the Lottery s policy that work environments must be properly maintained to prevent the unauthorized disclosure and/or alteration of sensitive and confidential information. The following statements pertain to this policy: Secured Desk Whenever away from a designated work area, sensitive working documents, digital media such as CDROM, DVD, or USB drives, and portable computing devices should be stored in a secure manner. Avoid writing sensitive information such as user IDs, passwords, account numbers, etc. on Post-It or on other handwritten notes. Use the shredding bins for sensitive documents when they are no longer needed in accordance with Lottery Records Retention policies. Common Areas Special attention should be given to reception desks and reception areas since they can be particularly vulnerable to visitors. These areas must be kept clear and not allow for visitors to reach or have sight of sensitive documents, media, and devices. Printed and faxed documents with sensitive information should be cleared as soon as they are printed. Where possible, apply a PIN when printing restricted information. Incoming and outgoing mail collection should be protected so that letters cannot be stolen or lost. 1/3

20 Securing Visible Sensitive and Confidential Information Policy (continued) Secured Screen Ensure that the password-protected screen saver is enabled in your computer and that it activates when the computer is not in use for a short period of time. Contact the ITSD Service Desk if this setting is not enabled. Always activate the password-protected screen lock or completely logoff from your computer when leaving the computer unattended. Computer screens should be protected from unauthorized viewing. If necessary, position screens away from direct view or use a privacy screen filter. When visitors are present and a computer screen is in direct view, activate the password-protected screen lock. Applicability This policy applies to all Lottery information systems and to all persons who perform work for the Lottery and have access to Lottery information resources, including, but not limited to: Employees Temporary staff Contractors, consultants, and third parties. Policy Owner / Stakeholders r As the policy owner, is responsible for maintaining, monitoring, and overall compliance with this policy. Division Deputy Directors As the Data Owners, are responsible for enforcing and ensuring compliance with this policy within their respective divisions. Distribution Clearance Public. Exceptions Exceptions to this policy must be requested through a Risk Assessment as detailed in the Risk Assessment procedure and approved by the appropriate level of management. References Policy 2/3

21 Securing Visible Sensitive and Confidential Information Approval 5/9/2014 Paula D. LaBrie, Acting Director Date Revisions Review Date Action Date Action Section(s) Revised Effective Date Approval Initial Publication 3/3

22 Corporate Policy TITLE: Physical and Environmental Security POLICY TITLE Physical and Environmental Security Introduction The purpose of this policy is to provide Physical and Environmental Security requirements in order to ensure the confidentiality, integrity and availability of California Lottery (Lottery) information assets. Policy It is the Lottery s policy that information resource facilities must be physically protected from loss, destruction, damage and that access to such facilities must be controlled, monitored and protected against unauthorized and unlawful access. The following statement pertains to this policy: Access Control All Lottery physical locations must have the appropriate level of controls to protect against unauthorized access. Physical access to all information processing facilities must be controlled. Doors must be locked at all times and access can be provided after gaining the required approval. Physical locations that are designated Restricted Access Area must be protected with an additional layer of protection against compromise of the primary security control. Delivery and loading areas must be adequately separated from information processing facilities. Environmental Protection Power protection must be provided to support both personnel safety and to ensure the availability of critical information systems. All servers, computer equipment and other critical hardware must be housed in an environment equipped to control, detect, prevent, and suppress environmental hazards including fire, water, temperature and humidity. Uninterruptible Power Supplies (UPS) must be used on equipment supporting critical business operations to allow turning off of the systems in an orderly fashion or to allow systems to continue running. 1/3

23 Physical and Environmental Security Policy (continued) Monitoring General A formal inventory of information processing assets (hardware, software and applications) must be maintained. A review of the inventory must be performed on an annual basis. Rooms containing wiring or communications equipment (wiring closets, PBX rooms, etc.) must be locked at all times with access restricted to authorized personnel only. Wiring closets and equipment rooms must not have signage which identifies the room as containing such equipment. Any Lottery information processing equipment that is to be disposed of, or reused, must undergo a cleansing process before its disposal or reuse. Definitions Restricted Access Area Physical location that has been designated by the Deputy Director of SLED as critical to the operation of the Lottery. Applicability This policy applies to all Lottery facilities including but not limited to the Lottery Headquarters, District s, Distribution Centers, Backup Facilities and Off-Site Storage Facilities. Policy Owner / Stakeholders r As the policy owner, they are responsible for the maintenance, overall compliance with, and enterprise monitoring of this corporate policy. Division Deputy Directors As the Data Owners, are responsible for enforcing and ensuring compliance with this policy within their respective divisions. Distribution Clearance Sensitive Exceptions Exceptions to this policy must be requested through a Risk Assessment as detailed in the Risk Assessment procedure and approved by the appropriate level of management. 2/3

24 Physical and Environmental Security References Policy Information Media Protection and Destruction Policy Access Control Badge Changes, Contractor, Issuance, Operational Recovery, Recovered, Separations Access to Employee Work Locations Approval 5/5/2014 Paula D. LaBrie, Acting Director Date Revisions Review Date Action Date Action Section(s) Revised Effective Date Approval Initial Publication 3/3

25 Corporate Policy TITLE: Password POLICY TITLE Password Version Introduction The purpose of this policy is to provide the password requirements for all California Lottery (Lottery) information systems and users to ensure the confidentiality, integrity, and availability of Lottery information assets. Policy It is the Lottery s policy that passwords used to authenticate to Lottery information systems must be protected from unauthorized access and must comply with the following: Password Storage Passwords are restricted information and must not be shared with anyone (including system administrators). Passwords must not be written down. Where technology permits, passwords must not be stored in clear text. The highest possible encryption must be given to stored passwords. Password Controls Passwords must not be transmitted in clear text over networks, including internal networks. The highest possible encryption must be given to all passwords transmitted. Irreversible encryption/hashing techniques are recommended. Passwords must be changed at least every 60 calendar days. Reuse of 12 previous passwords is not allowed. The user account must lock out after 8 unsuccessful password attempts. Passwords must contain at least 8 characters. Passwords must not contain the username or user ID. Passwords must contain any three of the four following classes of characters in any order: Uppercase letters Lowercase letters Numerals Non-alphanumeric special characters Service Accounts Service accounts cannot be used for vendor access to Lottery systems. Service accounts must be used only by the intended application or service. Support personnel requiring equivalent access must use their user credentials. 1/3

26 Password Version Policy (continued) General Service accounts must also implement the following controls to mitigate the risk of account compromise: Use a complex password that has a minimum of 12 characters. Limit access to the service account password to only those personnel who have an operational need. Change the password when a person who knows the password leaves their position or when it is suspected that the password has been compromised. Set up the account as a local server account rather than a global domain account. Give the account the least amount of access needed to run the service or process. This includes User Rights and File and Share permissions. Compliance with the Password Policy will be monitored. Definitions Service Account Account that is used solely for the purpose of running an application or service. Service accounts, once configured, do not require day-to-day human intervention. Authenticate To verify the identity of a user or the authenticity of an application or service. Applicability This policy applies to all Lottery information systems, applications, operating systems, network devices, and any other entity that uses passwords. This also applies to all persons who perform work for the Lottery and have access to Lottery information resources, including, but not limited to: rs Employees Temporary staff Contractors, consultants, and third parties. 2/3

27 Password Version Policy Owner / Stakeholders r As the policy owner, is responsible for the maintenance, overall compliance with, and enterprise monitoring of this information security policy. Division Deputy Directors As the Data Owners, are responsible for enforcing and ensuring compliance with this policy within their respective divisions. Distribution Clearance Sensitive Exceptions Exceptions to this policy must be requested through a Risk Assessment as detailed in the Risk Assessment procedure and approved by the appropriate level of management. References Policy Access Control Policy Encryption Policy Approval 5/5/2014 Paula D. LaBrie, Acting Director Date Revisions Review Date Action Date Action Section(s) Revised Effective Date Approval Applicability; Authority changed to Policy Owner/Stakeholders; Removed Enforcement Section Final QA Initial Publication /3

28 Corporate Policy TITLE: Operating System Security POLICY TITLE Operating System Security Introduction The purpose of this policy is to provide operating system requirements to ensure the confidentiality, integrity, and availability of California Lottery (Lottery) applications and information assets. Policy It is the Lottery s policy that operating systems must be protected and configured to prevent unauthorized access. The following statements pertain to this policy: User Access Operating system users must be authenticated before access is allowed. All users must have a unique user ID. User IDs must not be shared. Operating systems must display a standard message approved by the Lottery Legal upon log on. The user ID of the last individual logged on must not be displayed to the next user that attempts to log on. Operating systems must store and send passwords in encrypted form. Non-essential user IDs must be deleted. Temporary user IDs must be deleted immediately after use. Password Management Operating systems must conform to the Lottery s Password Policy. Auditing, Logging and Monitoring Logging must be enabled for user ID management, log on, log off, privilege changes and system activities. All log files must be kept in a secure manner. Logs must be reviewed periodically. File System Access and Management All permissions to folder and file shares must be based on need-to-know and least level privilege principles. All access to restricted files must be logged and monitored. Operating systems must use the most secured file system applicable. 1/3

29 Operating System Security Policy (continued) Services and Networking Secure alternatives for unsecured services must be used wherever possible. All services or programs that are not essential for the functioning of the system must be disabled. Security Tools and Updates Documentation Access control lists must be used to protect business-critical systems. Wherever possible, all updates must be tested on a non-production environment before being deployed to production. Security settings for each operating system must be documented in respective operating system procedures. General Application owners must include operating system secure configuration documents as part of application installation and configuration documentation. Compliance with the Lottery s Operating System Security Policy will be monitored. Definitions Authenticate To verify the identity of a user or the authenticity of an application or service. Least Level Privilege The principle of having each subject granted the most restrictive set of privileges needed for the performance of authorized tasks. Need To Know The determination by an authorized holder of sensitive information that access to the information is required by another appropriately cleared individual to perform official duties. Applicability This policy applies to all Lottery information systems and operating systems. This also applies to all persons who perform work for the Lottery and have access to Lottery information resources, including, but not limited to: rs Employees Temporary staff Contractors, consultants, and third parties. 2/3

30 Operating System Security Policy Owner / Stakeholders r As the policy owner, is responsible for the maintenance, overall compliance with, and enterprise monitoring of this information security policy. Division Deputy Directors As the Data Owners, are responsible for enforcing and ensuring compliance with this policy within their respective divisions. Distribution Clearance Sensitive Exceptions Exceptions to this policy must be requested through a Risk Assessment as detailed in the Risk Assessment procedure and approved by the appropriate level of management. References Policy Access Control Policy Password Policy Application Security Policy Approval 5/5/2014 Paula D. LaBrie, Acting Director Date Revisions Review Date Action Date Action Section(s) Revised Effective Date Approval Initial Publication 3/3

31 Corporate Policy TITLE: POLICY TITLE Version Introduction This policy supports the California Lottery s commitment to: Protect the confidentiality, integrity and availability of its information assets. Comply with regulatory and legal requirements related to. Policy California Lottery (Lottery) information and applications must be protected in a manner commensurate with their sensitivity, value, and criticality. It is the Lottery s policy that information security management must be used to systematically integrate information security into management and work practices at all levels so that missions are accomplished while appropriately protecting Lottery information and applications. Users of Lottery Information System: Must review the Lottery s Acceptable Use Policy annually and attest to compliance with its terms and provisions. Must adhere to all applicable legal, statutory, regulatory and contractual requirements. Must adhere to security and privacy policies and procedures. Must report information security incidents to the upon discovery. Lottery information system refers to an integrated set of information technology components that is used by the Lottery to collect, store and to process data that are used to deliver information, knowledge, and digital products. Infrastructure: The Lottery information system and network infrastructure must be designed and implemented to protect Lottery information and third party information for which the Lottery is responsible. Computer Hardware, Software, and Equipment: Only authorized hardware, software, and supporting equipment is allowed for use on Lottery systems. Authorized hardware, software, and supporting equipment purchased or obtained by the Lottery must be used only in accordance with the Lottery Acceptable Use Policy. Awareness: Communications will be issued periodically to the organization to enhance information security awareness. Such communications will address both best practices and unsafe practices, and reinforce information security policies, procedures, and information system user responsibilities. 1/3

32 Version Applicability This policy applies to all persons that perform any work for the Lottery and have access to Lottery information resources, including, but not limited to: rs Employees Temporary staff Contractors, consultants, and third parties Each individual will be required to sign an annual statement, confirming that they have read and understood the Acceptable Use Policy and the Lottery s Incompatible Activities and Ethical Conduct Standards. Policy Owner / Stakeholders r As the policy owner, the is responsible for the maintenance, overall compliance with, and enterprise monitoring of this corporate policy. Division Deputy Directors As the Data Owners, Deputy Directors are responsible for enforcing and ensuring compliance with this policy within their respective divisions. Distribution Clearance Sensitive Exceptions Exceptions to this policy must be requested through a Risk Assessment as detailed in the Risk Assessment procedure and approved by the appropriate level of management. References Acceptable Use Policy Incompatible Activities and Ethical Conduct Standards Data Classification Policy Privacy and Confidentiality Policy 2/3

33 TITLE Version Approval Paula D. LaBrie, Acting Director Revisions Date Review Date Action Date Action Section(s) Revised Effective Date Approval Policy; Authority changed to Policy Owner/Stakeholders; Removed Enforcement Section 5/5/ Final QA Initial Publication /3

34 Corporate Policy TITLE: Compliance Review POLICY TITLE Compliance Review Introduction This policy sets forth compliance review requirements for the California Lottery s (Lottery) information security policies in order to ensure the confidentiality, integrity, and availability of Lottery information assets. Policy It is the Lottery s policy that continued compliance with information security policies must be ensured. General The Lottery s operating environment, including but not limited to information technology security, physical and environmental security, and human resources security, will be subject to continued and periodic reviews and assessments to ensure compliance with Lottery security policies. The (ISO) will periodically conduct information security policy compliance checks. Information security compliance checks must be properly planned and executed. This includes but is not limited to the following: Communicating the activities, objectives, and scope to management. Identification of proper resources and skills for support. Documentation of all activities, findings made, and recommendations suggested. Applicability This policy applies to Lottery information systems and to all persons who perform work for the Lottery and have access to Lottery information resources, including but not limited to: rs Employees Temporary staff Contractors, consultants, and third parties. 1/2

35 Compliance Review Policy Owner / Stakeholders r As the policy owner, is responsible for the maintenance, overall compliance with, and enterprise monitoring of this information security policy. Division Deputy Directors As the Data Owners, are responsible for enforcing and ensuring compliance with this policy within their respective divisions. Distribution Clearance Sensitive Exceptions Exceptions to this policy must be requested through a Risk Assessment as detailed in the Risk Assessment procedure and approved by the appropriate level of management. References Policy Approval 5/7/2014 Paula D. LaBrie, Acting Director Date Revisions Review Date Action Date Action Section(s) Revised Effective Date Approval Initial Publication 2/2

36 Corporate Policy TITLE: Information Media Protection and Destruction POLICY TITLE Information Media Protection and Destruction Version Introduction The purpose of this policy is to provide information media protection and destruction requirements in order to ensure the confidentiality, integrity, and availability of California Lottery (Lottery) information assets. Policy It is the Lottery s policy that information media and the sensitive data contained therein must be protected through the application of security controls and proper handling procedures. The following statements pertain to this policy: Data Classification Data Owners are responsible for labeling and classifying their information assets based on the Lottery s Data Classification Policy. Information media must be secured in a manner commensurate with the level of sensitivity of the information. Access to Media Information media that is classified as confidential, restricted, or private must be stored securely, e.g. in locked drawers, cabinets, or rooms specifically designated for that purpose and accessible only by authorized personnel. Recipients of the information media must have the need to know as verified by the Data Owner. Information classified as confidential, restricted, private, or sensitive must not be read or discussed in public places. Media handlers must not take non-public media out of the country without prior written authorization from the Data Owner. Media Duplication Duplication of non-public information must not take place without advance written permission by the Data Owner. Information media must only be duplicated to the extent necessary to support business operations. Printers and fax machines must not be left unattended if non-public information is being printed or faxed. 1/5

37 Information Media Protection and Destruction Version Policy (continued) Third Party A signed non-disclosure agreement (NDA) must be in place before sending any nonpublic information to a third party. Trusted courier or traceable mail must be used to deliver non-public hardcopy information and other non-public media. Intended recipients must provide acknowledgment of the delivery of non-public information. Faxing restricted or private information must be avoided. In the event that faxing is the only practical alternative, the sender must confirm with the recipient that the receiving fax machine is in a secured location. Third-party Contracts and Agreements Third-party contracts must address Lottery confidentiality and NDA requirements. Third-party contracts must include a Right to Audit clause. Encryption All confidential, restricted, or private information must have controls such as encryption, restricted physical access, and secure storage in place to protect the information while in transit and at rest. All confidential, restricted, or private information must be encrypted at rest. All non-public information must be encrypted when it is outside the Lottery environment. Logging Access to non-public media must be logged and traceable to an individual. Logs must be maintained in a manner that prevents modification, erasure, or destruction by unauthorized personnel. Information protection controls must be audited on a regular basis to ensure effectiveness. Compliance with this policy must be monitored. 2/5

38 Information Media Protection and Destruction Version Policy (continued) Media Destruction Lottery information media that may contain non-public information must be destroyed or securely erased before any reuse, transfer, disposal, or surplus occurs. Data Owners must determine the retention and destruction schedule for information media based on business needs and applicable law and regulations. Information media must not be retained beyond the retention requirements as determined by the Data Owner. Destruction or erasure of information media must occur when the media is obsolete, has exceeded the required retention schedule, or cannot be repaired and must be replaced. Electronic information media that contain non-public information must be erased or destroyed by degaussing, overwriting all addressable locations sufficient to preclude recognition or reconstruction of the non-public information, or physically destroyed by companies that have contracted with the Lottery to provide secured destruction services. Hardcopy information media that may contain non-public information must be destroyed by crosscut shredding, mutilated to preclude recognition or reconstruction of the non-public information, or deposited in locked containers from companies that have contracted with the Lottery to provide secured destruction services. Training Data Owners must ensure that personnel assigned as media handlers or custodians of records are adequately trained in proper handling and destruction procedures. Definitions Non-public Information that is classified as confidential, restricted, private, or sensitive as defined in the Lottery s Data Classification Guidelines. Third-party Someone who may be indirectly involved but is not a principal party to an arrangement, contract, or transaction. 3/5

39 Information Media Protection and Destruction Version Applicability This policy applies to all Lottery information media. Information media includes, but is not limited to, hardcopy and removable electronic media and devices such as , electronic files, floppy disks, Compact Discs, DVDs, optical drives, ZIP and USB drives, memory tokens/sticks, magnetic tapes and cartridges, embedded memory systems, mobile devices, PDAs, BlackBerrys, tablets, smart cards, key fobs, and hard drives within laptops, desktops, and servers. This policy also applies to all persons who perform work for the Lottery and have access to Lottery information resources, including, but not limited to: rs Employees Temporary staff Contractors, consultants, and third parties. Policy Owner / Stakeholders r As the policy owner, is responsible for the maintenance, overall compliance with, and enterprise monitoring of this corporate policy. Division Deputy Directors As the Data Owners, are responsible for enforcing and ensuring compliance with this policy within their respective divisions. Distribution Clearance Sensitive Exceptions Exceptions to this policy must be requested through a Risk Assessment as detailed in the Risk Assessment procedure and approved by the appropriate level of management. References Policy Data Classification Guidelines Encryption Policy Clean Desk and Clear Screen Policy 4/5

40 Information Media Protection and Destruction Version Approval Paula D. LaBrie, Acting Director Revisions Date Review Date Action Date Action Section(s) Revised Effective Date Approval Applicability; Authority changed to Policy Owner/Stakeholders; Removed Enforcement Section 5/5/ Final QA Initial Publication /5

41 Corporate Policy TITLE: Information Backup POLICY TITLE Information Backup Introduction The purpose of this policy is to safeguard Lottery information and services from loss. Policy A backup and recovery strategy must be established to ensure information and services can be recovered in the event of an equipment failure or interruption, intentional or inadvertent destruction of data, a malware attack, or physical disaster. Storage The backups should be stored in a secure off-site location, at a sufficient distance to escape any damage from a disaster at the main site; Backup locations should be given an appropriate level of physical and environmental protection as stated in the Lottery s Physical and Environmental Security Policy; The retention period for backups should adhere to the Lottery s Record Retention Schedule and Retention Policy. Backups Backup plans and procedures should identify the extent (e.g. full, incremental, or differential backup) and frequency of backups, identify the applications and data dependencies, and reflect the business requirements of the organization; Where technology permits, backups must be protected by means of encryption; Accurate records of the backup copies must be maintained; Operational procedures should monitor the execution of backups and address failures of scheduled backups to ensure completeness of backups. Recovery Recovery plans and procedures should identify enough information (e.g., the amount of data loss that can be tolerated, how long it takes to become operational, data synchronization, and order of recovery) to meet business operational requirements; As part of recovery planning, Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO) must be established; Recovery plans must be tested periodically and restoration procedures must be checked against the established RPO and RTO; Restoration of backups must require specific and appropriate authorization; and Reliability of backup media must be regularly tested to ensure recovery is possible. 1/2

42 Information Backup Exceptions Exceptions to this policy must be requested through a Risk Assessment as detailed in the Risk Assessment procedure and approved by the appropriate level of management. Applicability This policy applies to all Lottery information systems and to all persons who perform work for the Lottery and have access to Lottery information resources, including, but not limited to: rs Employees Temporary staff Contractors, consultants, and third parties. Policy Owner / Stakeholders r As the policy custodian, is responsible for maintenance, overall compliance guidelines, and enterprise monitoring of this information security policy. Information Technology Services Division Deputy Director As the implementer of this policy, is responsible for ensuring compliance with this policy. Division Deputy Directors As the Data Owners, are responsible for enforcing and ensuring compliance with this policy. Distribution Clearance Sensitive Approval 5/5/2014 Paula D. LaBrie, Acting Director Date Revisions Review Date Action Date Action Section(s) Revised Effective Date Approval Initial Publication 2/2

43 Corporate Policy TITLE: Incident Management POLICY TITLE Incident Management Introduction The purpose of this policy is to provide Incident Management direction and requirements for identifying, reporting, and responding to information security related incidents, in order to ensure the confidentiality, integrity, and availability of Lottery information assets. Information security incidents involve loss, damage, misuse, unauthorized use of information assets, and improper dissemination of information. Policy It is the Lottery s policy that information security incidents must be reported promptly to the IT Service Desk. When deemed appropriate, the may, in coordination with the affected Division, direct the incident response. The Director and r or the Deputy Director of the Security and Law Enforcement Division, has the authority to take any action deemed appropriate to mitigate the risk posed by any information security incident. Applicability This policy applies to Lottery information systems and to all persons who perform any work for the Lottery and have access to Lottery information resources. Policy Owner / Stakeholders r As the policy owner, they are responsible for the maintenance, overall compliance with, and enterprise monitoring of this information security policy. Division Deputy Directors As the Data Owners, are responsible for enforcing and ensuring compliance with this policy within their respective divisions. Distribution Clearance Sensitive Exceptions Exceptions to this policy must be requested through a Risk Assessment as detailed in the Risk Assessment procedure and approved by the appropriate level of management. 1/2

44 Incident Management References Policy Data Classification Policy Approval Paula D. LaBrie, Acting Director Date 5/5/2014 Revisions Review Date Action Date Action Section(s) Revised Effective Date Approval Initial Publication 2/2

45 Corporate Policy TITLE: Encryption POLICY TITLE Encryption Version Introduction The purpose of this policy is to specify the encryption requirements for California Lottery (Lottery) information, while at rest or in transit, in order to ensure the confidentiality, integrity, and availability of the Lottery information. Policy It is the Lottery s policy that all cryptographic technologies used for the transmission or storage of electronic data conform to those that have been reviewed and authorized for use by the Lottery. Encryption The Lottery s r (ISO) sets the minimum encryption requirements for Lottery data. The ISO establishes the Encryption Standard document. The use of proprietary encryption algorithms is not allowed for any purpose, unless reviewed by qualified experts outside of the vendor in question and approved as described under Exceptions. When technology permits, confidential, restricted, or private data (including passwords) must be encrypted at rest and in transit. Web servers processing confidential, restricted, or private information must use Secure Sockets Layer (SSL) protocol. Encryption must be used, regardless of classification of data, in a communication environment where any of the following conditions exist: Integrity of the communication is required (wherein no data may be arbitrarily added, deleted or modified); The requested service is granted only to authenticated users; Non-repudiation of communication is required (in which the sender of data and the receiver cannot deny having processed the data); and Encryption is required by regulation. Key Management Appropriate key management must be implemented to ensure secure key generation, use, storage, and destruction. Key management must be fully automated. Keys in storage and in transit must be encrypted. 1/3

46 Encryption Version Policy (continued) Authentication (including but not limited to password, tokens, etc.) must be required in order to gain access to keys. Access to keys must be restricted to authorized personnel only. Separation of duties and least privilege must be enforced in the management of keys. Considerations must be made to support the recovery of encrypted data if a key is inadvertently disclosed, destroyed, or becomes unavailable. Keys must be physically secured and backed up. Definitions Key Unless otherwise noted, refers to non-public cryptographic key. Least Privilege The principle of having each subject granted the most restrictive set of privileges needed for the performance of authorized tasks. Separation of Duties The principle of not allowing one person to be responsible for completing or controlling a task, or set of tasks, from beginning to end when it involves the potential for fraud, abuse or other harm. Applicability This policy applies to all Lottery information systems and to all persons who perform work for the Lottery and have access to Lottery information resources, including, but not limited to: rs Employees Temporary staff Contractors, consultants, and third parties Policy Owner / Stakeholders r As the policy owner, is responsible for the maintenance, overall compliance with, and enterprise monitoring of this information security policy. Division Deputy Directors As the Data Owners, are responsible for enforcing and ensuring compliance with this policy within their respective divisions. Distribution Clearance Sensitive 2/3

47 Encryption Version Exceptions Exceptions to this policy must be requested through a Risk Assessment as detailed in the Risk Assessment procedure and approved by the appropriate level of management. References Policy Data Classification Policy Information Media Protection and Destruction Approval 5/5/2014 Paula D. LaBrie, Acting Director Date Revisions Review Date Action Date Action Section(s) Revised Effective Date Approval Policy; Applicability; Authority changed to Policy Owner/Stakeholders; Removed Enforcement Section Final QA Initial Publication /3

48 Corporate Policy TITLE: Data Privacy and Confidentiality POLICY TITLE Data Privacy and Confidentiality Introduction To further its mission, the Lottery accesses, creates, and collects confidential and private information regarding players, retailers, and third parties. As an employer, the Lottery also maintains confidential and private information regarding its employees. This policy presents the organization s standards governing the collection, access, use, and treatment of confidential and private information. Policy The Lottery handles personally identifiable information of individuals, which in many cases is confidential and protected by privacy laws. The Lottery also handles sensitive commercial information about its retailers and business partners. This information may also be confidential and subject to protection by the Lottery. The Lottery has established appropriate policies and procedures to protect confidential and private information. Lottery Workforce The disclosure of confidential and private information regarding players, retailers, and employees must be prevented. The information should: Be collected only when such collection is permitted by law and necessary to accomplish the intended purpose. Only be released to authorized persons, and then its disclosure must be limited to only the information required to accomplish the intended purpose. Handling Player, Retailer, Employee, and Third Party Restricted/Private Information Data Destruction As soon as reasonably practicable and in a manner consistent with the Lottery s record retention schedule, confidential and private information must be destroyed unless there is a legitimate purpose for retaining such information or retention of the information is required by law. Data sets that are used on a limited basis must be destroyed or returned to the Data Owner when projects for which they are obtained are completed. Use of Data Linked Information If confidential or private information is used for data linkage, the linked data set must be stripped of personal identifiers and all identifiers must be destroyed unless there is a legitimate, authorized purpose for retaining such identifiers. 1/3

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information

More information

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,

More information

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services Bureau

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

PCI Data Security and Classification Standards Summary

PCI Data Security and Classification Standards Summary PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers

More information

CITY UNIVERSITY OF HONG KONG. Information Classification and

CITY UNIVERSITY OF HONG KONG. Information Classification and CITY UNIVERSITY OF HONG KONG Handling Standard (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification

More information

Montclair State University. HIPAA Security Policy

Montclair State University. HIPAA Security Policy Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

BERKELEY COLLEGE DATA SECURITY POLICY

BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3 Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

University of Aberdeen Information Security Policy

University of Aberdeen Information Security Policy University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...

More information

Career Connection, Inc. Data Privacy. Bringing Talent Together With Opportunity

Career Connection, Inc. Data Privacy. Bringing Talent Together With Opportunity Career Connection, Inc. Data Privacy Objectives This course is intended for CCI employees. The course gives guidance on data privacy concepts and describes how data privacy is relevant when delivering

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as required by HIPAA. 1. Definitions. a. Business Associate, as used in this Contract, means the

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology

More information

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and

More information

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security

More information

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014 Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS

Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

Information Technology Acceptable Use Policies and Procedures

Information Technology Acceptable Use Policies and Procedures Information Technology Acceptable Use Policies and Procedures The following Information Technology Acceptable Use Policies and Procedures are to be followed by ALL employees, contractors, vendors, and

More information

Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY

Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

VMware vcloud Air HIPAA Matrix

VMware vcloud Air HIPAA Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory

More information

Policy for the Acceptable Use of Information Technology Resources

Policy for the Acceptable Use of Information Technology Resources Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...

More information

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 jmadeja@buchananassociates.com Each business is required by Massachusetts law

More information

Chapter 84. Information Security Rules for Street Hail Livery Technology System Providers. Table of Contents

Chapter 84. Information Security Rules for Street Hail Livery Technology System Providers. Table of Contents Chapter 84 Information Security Rules for Street Hail Livery Technology System Providers Table of Contents 84-01 Scope of the Chapter... 2 84-02 Definitions Specific to this Chapter... 2 83-03 Information

More information

Western Oregon University Information Security Manual v1.6

Western Oregon University Information Security Manual v1.6 Table of Contents: 000 Introductory Material 001 Introduction Western Oregon University v1.6 Please direct comments to: Bill Kernan, Chief Information Security Officer 100 Information Security Roles and

More information

The Contractor's Responsibility - Preventing Improper Information Process

The Contractor's Responsibility - Preventing Improper Information Process BRIGHT HORIZONS BASELINE THIRD PARTY SECURITY REQUIREMENTS Version 1.0 (updated March 2015) Contents SECTION 1:... 3 REQUIREMENTS INTRODUCTION AND BACKGROUND... 3 1. SUMMARY... 3 2. DEFINITIONS... 3 3.

More information

Information Security Policy

Information Security Policy Information Security Policy Contents Version: 1 Contents... 1 Introduction... 2 Anti-Virus Software... 3 Media Classification... 4 Media Handling... 5 Media Retention... 6 Media Disposal... 7 Service Providers...

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

HIPAA Information Security Overview

HIPAA Information Security Overview HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data PCI Training for Retail Jamboree Staff Volunteers Securing Cardholder Data Securing Cardholder Data Introduction This PowerPoint presentation is designed to educate Retail Jamboree Staff volunteers on

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers.

a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers. CAYUGA COUNTY POLICY MANUAL Section 11 Subject: Electronic messaging and internet 1 Effective Date: 5/25/10; Res. 255-10 Supersedes Policy of: November 28, 2000 Name of Policy: County Computer Hardware-Software

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

How To Write A Health Care Security Rule For A University

How To Write A Health Care Security Rule For A University INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a

More information

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder

More information

Information Security Policy Manual

Information Security Policy Manual Information Security Policy Manual Latest Revision: May 16, 2012 1 Table of Contents Information Security Policy Manual... 3 Contact... 4 Enforcement... 4 Policies And Related Procedures... 5 1. ACCEPTABLE

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

Approved By: Agency Name Management

Approved By: Agency Name Management Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the

More information

INFORMATION SYSTEM GENERAL USAGE POLICY

INFORMATION SYSTEM GENERAL USAGE POLICY PURPOSE The Information System General Usage Policy ("Policy") establishes appropriate uses of Devon s Information Systems. Devon provides secure Information Systems in accordance with the Information

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

Acceptable Usage Guidelines. e-governance

Acceptable Usage Guidelines. e-governance Acceptable Usage Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

SECURITY POLICIES AND PROCEDURES

SECURITY POLICIES AND PROCEDURES 2014 WorldEscrow N.V./S.A. SECURITY POLICIES AND PROCEDURES This document describes internal security rules within the WorldEscrow N.V./S.A. organization. Content 1) Employee Responsibilities... 1 2) Use

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11 Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2

More information

HMIS SECURITY PLAN of the PHILADELPHIA CONTINUUM OF CARE

HMIS SECURITY PLAN of the PHILADELPHIA CONTINUUM OF CARE HMIS SECURITY PLAN of the PHILADELPHIA CONTINUUM OF CARE This plan describes the standards for the security of all data contained in the Philadelphia Continuum of Care Homeless Management Information System

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

Federal Trade Commission Privacy Impact Assessment

Federal Trade Commission Privacy Impact Assessment Federal Trade Commission Privacy Impact Assessment for the: W120023 ONLINE FAX SERVICE December 2012 1 System Overview The Federal Trade Commission (FTC, Commission or the agency) is an independent federal

More information

State HIPAA Security Policy State of Connecticut

State HIPAA Security Policy State of Connecticut Health Insurance Portability and Accountability Act State HIPAA Security Policy State of Connecticut Release 2.0 November 30 th, 2004 Table of Contents Executive Summary... 1 Policy Definitions... 3 1.

More information

Information Technology Services Guidelines

Information Technology Services Guidelines Page 1 of 10 Table of Contents 1. Purpose... 2 2. Entities Affected by This Guideline... 2 3. Definitions... 2 4. Guidelines... 3 4.1 Requesting Data Center or... 3 4.2 Requirements for Data Center or...

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information

More information

Other terms are defined in the Providence Privacy and Security Glossary

Other terms are defined in the Providence Privacy and Security Glossary Subject: Device and Media Controls Department: Enterprise Security Executive Sponsor: EVP/COO Approved by: Rod Hochman, MD - President/CEO Policy Number: New Date: Revised 10/11/2013 Reviewed Policy Owner:

More information

Chronic Disease Management

Chronic Disease Management RESOURCE AND PATIENT MANAGEMENT SYSTEM Chronic Disease Management (BCDM) Version 1.0 Office of Information Technology (OIT) Division of Information Resource Management Albuquerque, New Mexico Table of

More information

California State University, Sacramento INFORMATION SECURITY PROGRAM

California State University, Sacramento INFORMATION SECURITY PROGRAM California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...

More information

All Users of DCRI Computing Equipment and Network Resources

All Users of DCRI Computing Equipment and Network Resources July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform

More information

5. Users of ITS are the persons described above under Policy Application of the diocese of Springfield in Illinois.

5. Users of ITS are the persons described above under Policy Application of the diocese of Springfield in Illinois. Diocese of Springfield in Illinois Section I General Statement 1. Information Technology Systems (ITS), when properly used, provide timely communication and technological support to help fulfill the mission

More information

Town of Essex Comprehensive Public Records and Technology Policy

Town of Essex Comprehensive Public Records and Technology Policy Town of Essex Comprehensive Public Records and Technology Policy Introduction: Public records and the use of technology are inextricably linked in our modern age. As such, this policy covers both topics,

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014 HIPAA PRIVACY AND SECURITY AWARENESS Covering Kids and Families of Indiana April 10, 2014 GOALS AND OBJECTIVES The goal is to provide information to you to promote personal responsibility and behaviors

More information

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information