University of Hawai i Executive Policy on Data Governance (Draft 2/1/12)
|
|
|
- Julian Oliver
- 10 years ago
- Views:
Transcription
1 University of Hawai i Executive Policy on Data Governance (Draft 2/1/12) I. Definition Data governance is the exercise of authority and control (planning, monitoring, and enforcement) over the management of data assets. II. Vision DAMA: Guide to the Data Management Body of Knowledge Data governance at the University of Hawai i fosters a shared responsibility for and participation in the stewardship of data and information entrusted to the University, and promotes a governance philosophy grounded in the University s core values of institutional integrity, service, collaboration, and respect as well as commitments to excellence and accountability. III. Goals The goals of data governance at the University are to: Protect the privacy and security of data and information under the stewardship of the University; Support a culture of responsible data use for informed and actionable decision making; Promote an integrated view of data across organizational boundaries in the system; Promote the efficient use of resources to meet the data and information needs of the University community; Increase the University s transparency and accountability to external stakeholders and the public by promoting access to relevant information. IV. Purpose The objectives of this policy are to: Establish fundamental principles governing the management and use of data and information at the University, including, but not limited to, the creation or acquisition, privacy and security, integrity and quality of that data and information; Set forth best practices for effective data management, with ongoing objectives of increasing efficiencies, managing and mitigating information privacy and security risks, and promoting data quality; 1
2 Establish a set of standardized terms and definitions to promote consistent interpretations and implementations of policies, procedures, and practices related to data management; Establish clear lines of accountability and decision rights through the definition of roles and responsibilities related to data management. V. Scope The scope of this data governance policy applies to the following: Users employed by the University or any affiliates (including external agencies such as RCUH, Sodexho, third party vendors, etc.) with access to University-related data and information (i.e., Institutional Data - see Definitions below); Data originating from any Systems of Record (see Definitions below). All Institutional Data managed by UH units that may be used for administrative, academic, or educational research activities; All categories of data, regardless of the medium in which the data is held or transmitted (e.g., physical or electronic); Sensitive information which are subject to privacy considerations or has been classified as confidential and are therefore subject to protection from public access or inappropriate disclosure. Sensitive information, also referred to as personally identifiable information (PII), are defined in E2.214, Executive Policy on Security and Protection of Sensitive Information ( The scope of this policy does not apply to data created or collected outside of the University s Systems of Record. While data created or collected outside of the University s Systems of Record are beyond the scope of this policy, it should be noted that those data, like all University-related data, are subject to the requirements of Executive Policy E This policy recognizes the legal responsibilities of individual campuses to protect the privacy and security of their students data. VI. Principles The following principles are set forth as minimum standards to govern the appropriate usage and management of Institutional Data (see Definitions below). Institutional Data is the property of the University of Hawai i and shall be managed as a key asset. Institutional Data will be managed through defined governance guidelines, standards, policies and procedures. 2
3 Institutional Data shall be protected. Institutional Data must be safeguarded and protected according to approved security, privacy and compliance guidelines, laws, and regulations established by the University of Hawai i, the state, or the federal government. Institutional Data shall be accessible according to defined needs and roles. Institutional Data and Metadata shall be accessible to all, in accordance with defined access and use policies and procedures determined by the Data Governance Committee and Data Stewards (defined below). Users requesting access shall be assigned to appropriate roles that have clearly documented guidelines in accordance with all University of Hawai i, state, and federal laws and regulations. Institutional representatives will be held accountable to their roles and responsibilities. Roles and responsibilities for data management will be clearly defined, and individuals assigned to specific roles will be held accountable for performing data management responsibilities, as a part of their regular job responsibilities. Resolution of issues related to Institutional Data shall follow consistent and public processes. The Data Governance Committee shall coordinate the resolution of issues related to risks, costs, access, management, and use of Institutional Data with the appropriate Data Stewards and with UH leadership. VII. Best Practices Unnecessary duplication of Institutional Data is discouraged. Data Custodians (defined below) shall be responsible for sharing Institutional Data out of official Systems of Record, when reasonable and according to policies and procedures, so as to minimize redundant storage and processing of that data in multiple repositories. Exceptions are allowed for purposes of business continuity and fail-over. Unnecessary updating of Institutional Data is discouraged. When the same Institutional Data elements exist in multiple Systems of Record, the official values must be kept synchronized. When feasible, manual updates of Institutional Data should be performed in one System of Record and then automatically copied to as few other additional data repositories as possible. This eliminates redundant processing, increases integrity, and provides better auditing capabilities. Quality standards for Institutional Data shall be defined and monitored. Data quality standards shall be defined, published, communicated, managed, and applied according to the reliability and risk levels established by appropriate Data Stewards (defined below). Examples of data quality standards include: data validation rules, timeliness of updates, defined error rates, integrity monitoring processes, etc. 3
4 Institutional Metadata shall be recorded, managed, and utilized. Metadata will be used to model, define, and organize data in order to maximize the value of Institutional Data. Institutional Metadata will be published and communicated clearly and consistently. Necessary maintenance of Institutional Data shall be defined. Maintenance of Institutional Data to ensure appropriate backup, retention, destruction, deidentification, etc. will be defined by appropriate Data Custodians and Information Technology Services and other system operators. VIII. Definitions Institutional Data Institutional Data is defined as data elements which are created, received, maintained and/or transmitted by the University of Hawai i in the course of meeting its administrative and academic requirements. Institutional Information Institutional Information is defined as a collection of Institutional Data which can be contained in any form, including but not limited to documents, databases, spreadsheets, and websites; represented in any form, including but not limited to letters, numbers, words, pictures, sounds, symbols, or any combination thereof; communicated in any form, including but not limited to handwriting, printing, photocopying, photographing, and web publishing; and recorded upon any form, including but not limited to papers, maps, films, prints, discs, drives, memory sticks, and other information systems. Institutional Metadata Institutional Metadata is data collected, maintained, and used to describe and define the processes around the management of Institutional Data. Examples of Institutional Metadata include: - Definitions regarding the purpose, usage and context of Institutional Data - Identification of which system is the official system of record of Institutional Data - Who is responsible for management of Institutional Data - How Institutional Data is transferred, derived, and stored - What security and privacy practices are used to safeguard Institutional Data - Risk and compliance classifications for Institutional Data - Rules around retention of records and data System of Record A System of Record is an information system that is designated by Data Steward (defined below) as holding official values of Institutional Information. Official values are the data designated as the most accurate representation of the meaning and context of Institutional Data elements, which are recorded as facts. Official values are not necessarily the originally entered values, and as such, a System of Record may not necessarily be the system where values are originally entered. When questions arise over the meaning or interpretation of data elements or their values, the System of Record is used to resolve discrepancies. 4
5 Institutional Data Warehouses Institutional Data is often copied from Systems of Record into other systems, for ease of access, or to facilitate historical storage of data. UH s Operational Data Store (ODS) is an example of this type of additional data repository. Since Systems of Record may purge Institutional Data on defined schedules, these types of additional data repositories may contain Institutional Data that survives beyond what the System of Record contains. They then become a System of Record holding official values of Institutional Data. These additional Institutional Data Warehouses are sanctioned by Data Stewards (defined below) and are subject to the same policies and procedures that govern the use of Institutional Data. Departmental/Unit/Local Data Repositories Various UH academic and administrative departments or units copy Institutional Data from Systems of Record into their own departmental, unit, or local data repositories. Any Departmental / Unit / Local Data Repository that contains a copy of Institutional Data are subject to the same policies and procedures which govern the use of Institutional Data. IX. Roles and Responsibilities The following roles and responsibilities are defined, for both individuals and groups, for the purpose of establishing clear governance and accountabilities over Institutional Data. The terms and conditions for appointments and assignments are outlined for each. Executive Vice President for Academic Affairs/Provost The Executive Vice President for Academic Affairs/Provost is the lead institutional officer responsible for developing and implementing the University s data governance program. Authority and responsibility resides with the Executive Vice President for Academic Affairs/Provost on policy and system (multi-campus) issues. Vice President for Information Technology and Chief Information Officer The Vice President for Information Technology and Chief Information Officer is responsible for setting and enforcing standards and guidelines for data management technologies and systems related to computing infrastructures, data processing performance, data delivery and integration, data architectures and structures, metadata repositories, and access control mechanisms. The Vice President for Information Technology and Chief Information Officer has delegated authority over centralized Institutional Data Warehouses, such as the student, financial, and human resources databases. Chancellors and System Vice Presidents Chancellors and system vice presidents (collectively referred to as UH leadership) have authority and responsibility over policies and procedures regarding access and usage of data within their delegations of authority. The Data Governance Committee serves in an advisory capacity to UH leadership on strategic matters and conflict resolution issues. 5
6 Data Governance Committee (DGC) The Data Governance Committee is responsible for: 1) revising, recommending, and endorsing the policies and standards that govern the University s data and information management practices; 2) defining clear and consistent structures and models, and establishing definitions to support systemwide coordination and collaboration, effective decision-support, and efficient operations; and, 3) providing guidance and recommendations concerning the University s institutional data related to expanding access, improving quality, assuring security, and improving performance. The DGC also recommends solutions to UH leadership when disputes arise in the definition or usage of Institutional Data, promotes knowledge and awareness of the existence of data governance policies, standards, guidelines, and procedures. Committee members are appointed by the Executive Vice President for Academic Affairs/Provost. Membership is based on ex-officio roles for system based personnel and two-year terms for campus based personnel. Rotating memberships of campus based personnel are intended to promote knowledge and awareness of data governance throughout the system. Institutional Research and Analysis Office (IRAO) Director A voting exofficio member of the DGC, the IRAO Director oversees the office that maintains the System of Record for student-related data and information and is the official reporting entity for student-related data and information for the University of Hawai i. The IRAO Director coordinates the cross-functional reporting and analysis of student, finance, and human resource data. The IRAO Director leads the University s efforts around data quality and works collaboratively with system and campus leadership to improve the consistency and accuracy of operational and policy research data within the University s administrative data systems. The individual updates the DGC on data quality issues and is responsible for decisions around mediating and correcting inconsistencies in data definitions. Information Technology (IT) Security Officer A voting ex-officio member of the DGC, the Information Security Officer leads the University s Information Security Program. The individual works with system and campus leadership to improve the security posture of the University. The individual convenes the Data Security Leadership Council and the UH IT Security Leads groups and updates the DGC on security and privacy issues. Data Stewards Institutional Data shall have one or more designated stewards. Data stewards are typically senior administrators responsible for functional operations such as Finance, Human Resources, Student Services and other activities that involve institutional information processing. At the University of Hawai i, offices such as the Institutional Research and Analysis Office (IRAO) and Information Technology Services (ITS) also have stewardship responsibility for institutional information. Data stewards ensure applicable federal, state and UH policies, standards, regulations and laws are met with regard to data in their respective areas. Data stewards are also responsible for minimizing the use, storage and exposure of 6
7 sensitive information, i.e., PII. They have responsibility to restrict the use and exposure of such information to those specific situations where it is essential and appropriate. Data Custodians Data custodians are the managers and/or administrators of systems or media on which sensitive data resides, including but not limited to personal computers, laptop computers, PDAs, smartphones, departmental servers, enterprise databases, storage systems, magnetic tapes, CDs/DVDs, USB drives, paper files and any other removable or portable devices. Any authorized individual who downloads or stores sensitive information onto a computer or storage device becomes a data custodian through that act. Data custodians are responsible for implementing and administering controls over the resources according to policies and parameters provided by data stewards. Data custodians are responsible for the technical safeguarding of sensitive information, including ensuring security transmission and providing access control systems approved by data stewards to prevent inappropriate disclosure. Users Users are any individuals who, in order to fulfill their job duties and responsibilities, require access to sensitive information as defined in Executive Policy E2.214, and are therefore granted access. Individuals must successfully complete training requirements as specified in Executive Policy E2.214 before access will be granted. Users are responsible for understanding and complying with all applicable University policies, procedures, and standards for dealing with sensitive information and its protection. Specific questions about the appropriate handling or usage of a specific information resource should be directed to the data steward responsible for that area. 7
SOUTHERN UNIVERSITY SYSTEM POLICIES AND PROCEDURES. I. Policy Statement
Name of Policy: Southern University System Data Governance Policy Policy Number: Issuing Authority: SUS Office of the President Initial Effective Date: On Presidential Approval X New Policy Proposal Major
University of Michigan Medical School Data Governance Council Charter
University of Michigan Medical School Data Governance Council Charter 1 Table of Contents 1.0 SIGNATURE PAGE 2.0 REVISION HISTORY 3.0 PURPOSE OF DOCUMENT 4.0 DATA GOVERNANCE PROGRAM FOUNDATIONAL ELEMENTS
Rowan University Data Governance Policy
Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data
Encryption Security Standard
Virginia Commonwealth University Information Security Standard Title: Encryption Security Standard Scope: Approval February 22, 2012 This document provides the encryption requirements for all data generated,
ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY
ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY PURPOSE The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through misuse,
PROCEDURE. The permission rights assigned to allow data custodians to view, copy, enter, download, update or query data.
Section: Subject: Administration (AD) Data Governance AD.3.3.1 DATA GOVERNANCE PROCEDURE Legislation: Alberta Evidence Act, RSA 2000, c.a-18; Electronic Transactions Act, SA 2001, c.e- 5.5; Freedom of
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor
Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and
Data Management Standard
Data Management Standard Revision: Version 1.0 Date: 11/2015 Status: Approved by ISAC, Reviewed by Chancellor s Cabinet 1. Objectives Page 1 2. Scope Statement. Page 1 3. Requirements..Page 1 4. Definitions
Institutional Data Governance Policy
Institutional Data Governance Policy Vanderbilt University and Medical Center Effective Date: 07/09/2014 Revision Date: N/A DOCUMENT CONTROL Document Title Institutional Data Governance Policy Summary:
UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter
Pennsylvania State System of Higher Education California University of Pennsylvania UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter Version [1.0] 1/29/2013 Revision History
October 8, 2014. User Conference. Ronald Layne Manager, Data Quality and Data Governance [email protected]
Ensuring the highest quality data is delivered throughout the university providing valuable information serving individual and organizational need October 8, 2014 Ronald Layne Manager, Data Quality and
MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 5 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: October 19, 2006 Contact for More Information: Chief Privacy Officer 1303 A West Campus
U.S. Department of Education. Office of the Chief Information Officer
U.S. Department of Education Office of the Chief Information Officer Investment Review Board (IRB) CHARTER January 23, 2013 I. ESTABLISHMENT The Investment Review Board (IRB) is the highest level IT investment
Institutional Data Governance Policy
Institutional Data Governance Policy Policy Statement Institutional Data is a strategic asset of the University. As such, it is important that it be managed according to sound data governance procedures.
Data Governance Policy. Version 2.0 19 October 2015
Version 2.0 19 October 2015 Document Title: Summary: Date of Issue: Status: Contact Officer: Applies To: References: This policy provides the Cancer Institute NSW with an instrument to formally manage
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
An Overview of Data Management
An Overview of Data Management Recognition of Contribution The AICPA gratefully recognizes the invaluable contribution and involvement from the AICPA s IMTA Executive Committee Data Management Task Force
UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET. 1283 Data Administration and Management (Public)
Form 1221-2 (June 1969) Subject UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET 1283 Data Administration and Management (Public) Release 1-1742 Date 7/10/2012
Records & Information Management Policy
2014 Records & Information Management Policy VerQu CONTENTS Document Control... 2 Purpose... 3 Scope... 3 Organizational Placement... 3 Roles and Responsibilities... 3 Corporate Records Manager... 3 Record
INFORMATION SECURITY Humboldt State University
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY Humboldt State University Audit Report 14-50 October 30, 2014 EXECUTIVE SUMMARY OBJECTIVE The objectives of
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY
DOC. T99-061 Passed by the BoT 8/4/99 UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY The President of the University shall adopt guidelines to require that each campus
UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
OPERATIONAL DIRECTIVE. Data Stewardship and Custodianship Policy. Superseded By:
OPERATIONAL DIRECTIVE Enquiries to: Ruth Alberts OD number: OD0321/11 Performance Directorate Phone number: 9222 4218 Date: February 2011 Supersedes: OD 0107/08 File No: F-AA-00673 Subject: Data Stewardship
BOARD MANDATE. an Audit Committee, and a Governance, Nominating & Compensation Committee.
BOARD MANDATE 1.0 Introduction The Board of Directors (the "Board") of Baja Mining Corp. (the "Company") is responsible for the stewardship of the Company and management of its business and affairs. The
Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY
Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140
Continuity Planning and Disaster Recovery
Responsible Officer: AVP - Information Technology Services & UC Chief Information Officer Responsible Office: IT - Information Technology Services Issuance Date: 7/27/2007 Effective Date: 7/27/2007 Scope:
Utica College. Information Security Plan
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
Southern Law Center Law Center Policy #IT0004. Title: Email Policy
Southern Law Center Law Center Policy #IT0004 Title: Email Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/2012 1.0 Purpose: To provide members of
RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES
PURPOSE Records and information are important strategic assets of an organization and, like other organizational assets (people, capital and technology), must be managed to maximize their value. Information
Recommendations for the PIA. Process for Enterprise Services Bus. Development
Recommendations for the PIA Process for Enterprise Services Bus Development A Report by the Data Privacy and Integrity Advisory Committee This report reflects the consensus recommendations provided by
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Health Sciences Compliance Plan
INDIANA UNIVERSITY Health Sciences Compliance Plan 12.18.2014 approved by University Clinical Affairs Council Table of Contents Health Sciences Compliance Plan I. INTRODUCTION... 2 II. SCOPE... 2 III.
Research Data Ownership, Retention, Access, and Security
, Access, and Security Policy Type: Administrative Responsible Office: VCU Office of Research and Innovation Initial Policy Approved: 05/15/09 Current Revision Approved: 11/05/2015 Policy Statement and
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
NCI-Frederick Safety and Environmental Compliance Manual 03/2013
E-1. Records Management I. Scope The Records Management Office maintains a comprehensive records management system meeting regulatory and contractual requirements ensuring documentation is readily accessible.
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW
September 28 2011. Tsawwassen First Nation Policy for Records and Information Management
Tsawwassen First Nation Policy for Records and Information Management September 28 2011 Tsawwassen First Nation Policy for Records and Information Management Table of Contents 1. RECORDS AND INFORMATION
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
Information Security Policy
Information Security Policy Policy Title Responsible Executive Responsible Office Information Security Policy Vice President for Information Technology and CIO, Jay Dominick Office of Information Technology,
CHARTER OF THE AUDIT AND RISK MANAGEMENT COMMITTEE OF THE BOARD OF DIRECTORS OF BLACKBERRY LIMITED AS ADOPTED BY THE BOARD ON MARCH 27, 2014
CHARTER OF THE AUDIT AND RISK MANAGEMENT COMMITTEE OF THE BOARD OF DIRECTORS OF BLACKBERRY LIMITED AS ADOPTED BY THE BOARD ON MARCH 27, 2014 1. AUTHORITY The Audit and Risk Management Committee (the "Committee")
4.10 Information Management Policy
Policy Statement Information is a strategic business resource that the must manage as a public trust on behalf of Nova Scotians. Effective information management makes program and service delivery more
Life Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
ACCESS, PRODUCTION AND RETENTION OF CITY RECORDS
1.05-3 1 of 6 I. PURPOSE This directive prescribes the rules regarding access, production, and retention of City records. II. POLICY A. All records and other matters in City offices are presumed to be
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Stakeholder Engagement Initiative: Customer Relationship Management
for the Stakeholder Engagement Initiative: December 10, 2009 Contact Point Christine Campigotto Private Sector Office Policy 202-612-1623 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
Managing Shared Electronic Workspace
i Information Management Managing Shared Electronic Workspace (Non-EIM Environment) Business Rules December 2005 Produced by: Records and Information Management Branch Information Services Division Service
PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING
PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING PURPOSE The purpose of this policy is to describe the procedures by which Workforce members of UCLA Health System and David Geffen School of Medicine
A. Title 5, United States Code (U.S.C.), Section 552a, Records Maintained On Individuals (The Privacy Act of 1974)
Department of Homeland Security DHS Directives System Directive Number: 103-01 Revision Number: 01 Issue Date: 8/25/2014 ENTERPRISE DATA MANAGEMENT POLICY I. Purpose This Directive establishes the Department
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the "Agreement") is made and entered into this day of,, by and between Quicktate and idictate ("Business Associate") and ("Covered Entity").
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
Model Business Associate Agreement
Model Business Associate Agreement Instructions: The Texas Health Services Authority (THSA) has developed a model BAA for use between providers (Covered Entities) and HIEs (Business Associates). The model
How To Manage Information Security At A University
Data Management & Protection: Roles & Responsibilities Document Version: 1.0 Effective Date: December, 2008 Original Issue Date: December, 2008 Most Recent Revision Date: November 29, 2011 Approval Authority:
BYLAWS OF NAMI Greater Houston A NON-PROFIT CORPORATION ORGANIZED UNDER THE LAWS OF TEXAS. ARTICLE I Organization
BYLAWS OF NAMI Greater Houston A NON-PROFIT CORPORATION ORGANIZED UNDER THE LAWS OF TEXAS ARTICLE I Organization Section 1. Name The name of the organization is NAMI Greater Houston, which is a nonprofit
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 Revision History Update this table every time a new edition of the document is published Date Authored
5 FAM 630 DATA MANAGEMENT POLICY
5 FAM 630 DATA MANAGEMENT POLICY (Office of Origin: IRM/BMP/OCA/GPC) 5 FAM 631 GENERAL POLICIES a. Data management incorporates the full spectrum of activities involved in handling data, including its
US Department of Education Federal Student Aid Integration Leadership Support Contractor June 1, 2007
US Department of Education Federal Student Aid Integration Leadership Support Contractor June 1, 2007 Draft Enterprise Data Management Data Policies Final i Executive Summary This document defines data
Council Policy. Records & Information Management
Council Policy Records & Information Management COUNCIL POLICY RECORDS AND INFORMATION MANAGEMENT Policy Number: GOV-13 Responsible Department(s): Information Systems Relevant Delegations: None Other Relevant
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
State of Montana E-Mail Guidelines
State of Montana E-Mail Guidelines A Management Guide for the Retention of E-Mail Records for Montana State Government Published by the: Montana State Records Committee Helena, Montana September 2006 Based,
STT ENVIRO CORP. (the Company ) CHARTER OF THE CORPORATE GOVERNANCE AND NOMINATING COMMITTEE. As amended by the Board of Directors on May 10, 2012
STT ENVIRO CORP. (the Company ) CHARTER OF THE CORPORATE GOVERNANCE AND NOMINATING COMMITTEE PURPOSE AND SCOPE As amended by the Board of Directors on May 10, 2012 The primary function of the Committee
CONSOLIDATED RECORDS MANAGEMENT SYSTEM (CRMS) USER AGREEMENT
CONSOLIDATED RECORDS MANAGEMENT SYSTEM (CRMS) USER AGREEMENT I. PURPOSE STATEMENT The TENNESSEE FUSION CENTER (TFC) is an initiative of the Tennessee Bureau of Investigation (TBI) and the Department of
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Handheld Mobile Device Security Standard This standard is applicable to all VCU School of Medicine personnel.
HALOGEN SOFTWARE INC. AUDIT COMMITTEE CHARTER. oversee the qualifications and independence of the independent auditor;
HALOGEN SOFTWARE INC. AUDIT COMMITTEE CHARTER PURPOSE The Audit Committee is a standing committee appointed by the Board of Directors of Halogen Software Inc. The Committee is established to fulfill applicable
UNIVERSITY OF NAIROBI POLICY ON RECORDS MANAGEMENT
UNIVERSITY OF NAIROBI POLICY ON RECORDS MANAGEMENT APRIL 2011 POLICY ON RECORDS MANAGEMENT TABLE OF CONTENTS DEFINITION OF TERMS AND ACRONYMS... 5 1.0 BACKGROUND... 5 1.1 RATIONALE... 5 1.2 VISION... 5
RUTGERS POLICY. Policy Name: Standards for Privacy of Individually Identifiable Health Information
RUTGERS POLICY Section: 100.1.9 Section Title: HIPAA Policies Policy Name: Standards for Privacy of Individually Identifiable Health Information Formerly Book: 00-01-15-05:00 Approval Authority: RBHS Chancellor
Audit, Business Risk and Compliance Committee Charter. Spotless Group Holdings Limited ACN 154 229 562
Audit, Business Risk and Compliance Committee Charter Spotless Group Holdings Limited ACN 154 229 562 Adopted by the Company board on 26 March 2014 Contents Page 1 Role and authority of the Audit, Business
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
PRIVATE HEALTH INSURANCE INTERMEDIARIES. DOCUMENT 1: Self-Audit Guide for All Members of PHIIA JUNE 2015 VERSION 2
PRIVATE HEALTH INSURANCE INTERMEDIARIES DOCUMENT 1: Self-Audit Guide for All Members of PHIIA JUNE 2015 VERSION 2 9 For All Members of PHIIA Code Compliance Committee Private Health Insurance Intermediaries
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
City of Minneapolis Policy for Enterprise Information Management
City of Minneapolis Policy for Enterprise Information Management Origin: Developed by the City Clerk s Office and Business Information Services. Based on requirements set forth in Federal and State regulations
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
EXPLORING THE CAVERN OF DATA GOVERNANCE
EXPLORING THE CAVERN OF DATA GOVERNANCE AUGUST 2013 Darren Dadley Business Intelligence, Program Director Planning and Information Office SIBI Overview SIBI Program Methodology 2 Definitions: & Governance
