DATA SECURITY ADVICE FOR RESEARCHERS & THE McMASTER RESEARCH ETHICS BOARD. Table of Contents
|
|
|
- Sharyl Ashlyn Blake
- 10 years ago
- Views:
Transcription
1 DATA SECURITY ADVICE FOR RESEARCHERS & THE McMASTER RESEARCH ETHICS BOARD Revised - January Table of Contents A. SOME GENERAL POINTS TO CONSIDER ABOUT DATA SECURITY B. TIPS FOR PROTECTING DATA IN MOTION 1. Encrypted File System (EFS) 2. Storing and transporting data using USB keys and other mobile devices 3. Creating Better Passwords 4. Online surveys and Data Interception 5. Sending s security when off campus or abroad 6. ing data back to McMaster while doing research off campus or abroad 7. Wireless or Wired connections 8. Security issues related to online survey research C. TIPS FOR PROTECTING DATA AT REST 9. Servers 10. Anti-virus software protection 11. Research on/or recruiting participants through Chat-rooms, discussion lists, Face book, etc. 12. Security Breach Incident Response 13. Other sources of information to help you with you data security questions: D. TIPS FOR DESTROYING DATA 14. Decommissioning Computers and Clearing off Data E. GLOSSARY OF ABBREVIATIONS AND TERMS F. REFERENCES Data Security Advice (Revised January 2012) Page 1 of 9
2 A. SOME GENERAL POINTS TO CONSIDER ABOUT DATA SECURITY New data security issues are constantly emerging. When in doubt, always contact UTS for advice at extension Keeping data secure is important so that the researcher can access the data when needed (data availability), so that the data are not altered (data integrity), and so that the confidentiality of the data is preserved (data confidentiality). To maintain data s confidentiality, integrity, and availability, researchers should consider three different data security demands. In all three cases, security issues arise when personal information is present in the data. Data in motion: This is best described as the transmission/sending of electronic information via tools like in the form of attachments or in the body of the message. Advice for protecting data in motion Encrypt, encrypt, encrypt!!! Also use secure socket layers and Virtual Private Network. See Glossary. Data at rest: This is best described by the storage of information in both electronic and paper form. In the case of electronic data, the types of devices used to store information can be a computer s hard-drive, USB key, server, and CD/DVD to name a few. In the case of data in paper form, we tend to store in filing cabinets, in a desk drawer, or on a desk in a locked office. Advice for protecting data at rest encrypt, back-up, and secure data. Destruction of electronic data: This is best described as securely destroying all data on any physical device such as a computer hard disk drive, or a USB drive, in such a way that the data cannot be recovered. Advice for data destruction The US Department of Defense s method to securely destroy data is known as DoD7. It recommends assigning a random date to the file, then writing over the original computer code with 0 s, or 1 s, or random 1 s and 0 s, then basically doing it all over again seven times. (Please refer to for a complete list of free tools to use. Or destroy the hard drive physically, by breaking it into pieces with a hammer. B. TIPS FOR PROTECTING DATA IN MOTION 1. Encrypted file system (EFS): For example, for those individuals using Microsoft Windows 2000, XP, Vista, Windows 7; Microsoft introduced a built-in utility called Encrypted File System (EFS) that will allow you to encrypt a directory or your entire hard-drive. However, there is a caveat: Before using utilities such as these a word of caution; if not used properly all of the information you have stored may be lost forever. As such, before proceeding it is best to speak with your IT security expert for more information. In addition, Macintosh users will likely have different utilities. Call UTS at and ask for further details about this.. Data Security Tips (Revised Jan 16, 2012) Page 2 of 9
3 2. Storing and transporting data using a USB Key (i.e., jump drive, flash drive, data key and other mobile devices) If you misplace your USB key before encrypting the information, and someone finds the USB key the information will be exposed. If you intend to use a USB key to store information here is some information you should keep in mind. USB keys contain encryption software. There are also additional programs that can be used to encrypt USB keys. Here are two examples: True Crypt ( CruzerLock ( If you decided to encrypt your information and you forget your password/passphrase to unlock it, there is a good chance it could be lost forever. Because of how inexpensive USB keys have become, hackers have started using them to distribute computer viruses by strategically distributing them in parking lots outside companies enticing an unsuspecting helpful individual to place it in their computer to find out who lost the key. Don t be enticed! In light of new information as of 2010, using built-in encryption on USB keys is not advised. Using encryption software such as True Crypt ( is a better option. When encrypting a USB key using True Crypt, you can download the encryption program onto a non-writeable (write once) CD, load that CD onto a desktop or laptop, insert the USB key into the computer s port and run the encryption software to protect the USB key. A product called Iron Key is more expensive than the average USB key but everything stored on it is automatically encrypted However, US Military-grade USB key such as Iron Key, could actually be problematic in certain sensitive locales. Generally, when traveling to or through the United States or other countries with strong national security concerns, researchers are advised to check those countries importation rules regarding bringing in, traveling with or taking out encryption software. Call UTS at Extension for more advice about these issues prior purchase and your departure. Data Security Advice (Revised January 2012) Page 3 of 9
4 3. Creating Better Passwords: Researchers should consult the UTS website or Ext for instructions on how to create better passwords and how and where to store passwords. A quick tip: DO NOT create a file on your computer entitled Passwords or similar words. Web crawlers (i.e., a computer program that browses the World Wide Web in a methodical, automated manner) look for these kinds of file names and are a dead giveaway. 4. On-line surveys and Data Interception: Here is a Canadian online survey provider that offers very similar functions and pricing structures and is a Canadian alternative to the popular US online survey providers. Before using an online survey provider you could ask them these kinds of questions. Some questions to ask the sales and service people at online survey companies: Where is the survey service located? USA or Canada or elsewhere? (If data is held on a server in the US or US subsidiary in Canada it is subject to the USA Patriot Act). Who owns the survey service? Who owns the data? Do they use SSL (https) for surveys (a secure from of data transmission?? Do they capture personal information other than that explicitly provided by the user? Does the researcher see the IP address of the respondent? If yes how easy is it to be turned off? How is personal information provided by the user stored? How is data transferred to the researcher? How is data protected on the server? Backups? Who has access to their backups? After the data are transferred to the researcher, how/when are they destroyed on the company s servers? 5. Sending s securely when off campus or abroad: Internet Cafes and Keyloggers: Be aware that there could be hardware and software-based keyloggers. A keylogger is a program or a hardware device that captures or monitors every keystroke made on a keyboard. A hardware-based keylogger is easily detected by inspecting where the computer s keyboard and mouse are plugged into the computer. If the cable is not directly connected to the computer, but rather into another device that, in turn, is plugged into the computer; there is a good chance this is a keylogger. On the other hand, a software-based keylogger is a program that records all keystrokes and stores them for later retrieval and you can t detect it visually. The existence of a keylogger hardware device/program installed on a public/kiosk computer is highly likely; as such it is highly recommended you refrain from using them If you must use a public/kiosk computer, never access any website that requires you to enter a username/password, and never enter any personally identifiable information while you are using it. Information is available on the Internet to assist you to do safe logins from Internet cafes. Click this link to read a useful article by Cormac Herley and Dinei Florencio entitled: Data Security Tips (Revised Jan 16, 2012) Page 4 of 9
5 How To Login From an Internet Cafe Without Worrying About Keyloggers Which account to use? It is best to use your McMaster account rather than other popular free accounts like gmail and hotmail that may not have the same level of security that the University provides. UnivMail uses a secure socket layer (SSL) that encrypts the communication path. If you do not know how to access your Univmail account go to: A quick tip: Once you ve sent the , you should delete the from your sent folder if it is not on a secure computer. If sending research data over the internet using , consider setting up a free encrypted e- mail application such as GnuPG on your laptop or desktop. Be aware of who manages the service that you use. UnivMail is owned by McMaster versus Hotmail and Gmail which are both owned and operated in the United States. See further discussion in the section below. 6. ing data back to McMaster while conducting research off-campus or abroad Note: Please refer to the previous section regarding Internet Cafes and Keyloggers. If you are a McMaster researcher (faculty, student or staff) conducting research off-campus or abroad and the only service available to transmit your data back to McMaster is , then be sure to use your McMaster account. All faculty, students and staff can obtain a Virtual Private Network (VPN) account from UTS. VPN is a good way to work away from one s desk at McMaster while at home because it provides a secure tunnel that protects your transmission of data while it is in transit from the IP address you are using to a drive back at the university. If you have questions about VPN contact the UTS service desk Graduate and undergraduate students may need to request permission to access a drive at their home departments where they can send your data for safekeeping against theft, loss, corruption or confiscation. Given the varying levels of sensitivity of data and risk to study participants more sophisticated data security measures can be created on a case by case basis. Please leave enough time for you and UTS personnel to work out the best strategy well in advance of your departure to conduct research. 7. Wireless or Wired Connection? To reduce the risk whilst working from home, setup a secure password protected wireless network. Make sure that you take the time to set up your connection securely. Be reminded that levels of security can change so follow the vendor supplied installation guide to set up your wireless router security. If you require assistance contact UTS for advice at Ext From hotels whilst traveling on business or conducting research, use Virtual Protocol Network (VPN) to protect data transmission back to McMaster. When using Wireless from an Internet Café one should use a VPN to protect data transmission back to McMaster. 8. Security Issues related to Online Survey Research Data Security Advice (Revised January 2012) Page 5 of 9
6 On-line surveys go out and come back on to the Internet. Wherever there is a server there is someone administering the server and they may have access. Thus researchers should read the agreement carefully and ask questions about security. Survey Monkey is a common on-line survey. The basic package does not have a SSL option but for an additional $9.00 per month this option can increase the security of data. The option in Survey Monkey to use SSL which encrypts data being sent across the Internet reduces the probability to intercept and reassemble to being very unlikely. If the server is in the USA or is on the server of a U.S. subsidiary in Canada, then the USA Patriot Act permits snooping by U.S. Homeland Security without probable cause or a warrant. Canada is not impervious to government surveillance. CSIS can conduct surveillance but there is more legal protection. Keeping a separate (hard copy) identity key is important in research. If information might be of interest to governments, or electronic data is very sensitive, extra data security measures should be undertaken such as encrypting the key. It is vital to strip off identifiers as quickly as possible. Maintaining Server Security: If researchers have a server, they along with their staff and graduate students need to be trained on how to secure their server. Call UTS (Ext 24357) to learn how to secure servers with appropriate passwords and other procedures. C. TIPS FOR PROTECTING DATA AT REST 9. Servers: Measures to reduce risk include: restricting server access, installing security updates, configuring properly, installing anti-virus (see below for access to software), coding web applications to OWASP guidelines (see Glossary). Refer graduate students or research staff to this if they are responsible for the maintenance of a project s server. Encrypt sensitive information. You need to ensure that the physical security of data is also ensured in your office or lab. Don t share swipe entry keys with people, lock doors where servers are physically housed and don t leave passwords in stickies near your computer. See the UTS website for their more detailed Best Practices guide on server security Anti-virus software protection: All McMaster faculty, staff and students have access to Trendmicro for campus and home computers. Go to the UTS website: or contact the help desk at X Because Windows, Macintosh and other non-windows computing environments may have built in protections it is important to be familiarized with these features. 11. Conducting research on or recruiting participants through chat-rooms, discussion lists and face book/second life etc. Data Security Tips (Revised Jan 16, 2012) Page 6 of 9
7 Researchers and research ethics boards continue to struggle with understanding what constitutes public and private when it comes to research on and recruiting through discussion lists, support groups, chat-rooms, Facebook etc. This form of technology is continually evolving and new options or applications may pose new challenges to the researcher, the participant and the research ethics board. Here are some points for researchers to consider. Consult your ethics board when in doubt and to work out how to a strategy that works for your study Your data may not be permanently accessible Your data may not be accurate or representative due to anonymous online participation. See the Queen s University guidelines document in the references section at the end of this document. 12. SECURITY BREACHES Steps for an Incident response If it appears that there has been an electronic security breach: Seek assistance from McMaster Security Department (Emergency number dial 88) (General number Ext ). McMaster Security works with the local police. Turn off computer DO NOT try to remedy the problem. Call University Technology Services (UTS) at ext Call the Research Ethics Board to determine if participants need to be informed of the security breach of research data. 13. Other sources of information to help you with you data security questions: If you have further questions, contact the UTS staff, ask for education and training for yourself or research staff at [email protected] or call the UTS service desk ext Also consult the IT Security web pages of UTS for a variety of information and to keep up with ongoing changes.: D. TIPS FOR SECURELY DESTROYING DATA 14. Decommissioning computers and clearing off data: Sensitive files and research materials should be removed from the computer prior to disposal Formatted hard disks may contain recoverable residual data If disposing a computer, examine affordable disposal services. If transferring ownership of computer, low-level hard-drive cleansing is required. Consult UTS for advice on removing sensitive data See UTS advice for hard disk disposal The US Department of Defense s method to securely destroy data is known as DoD7. It recommends assigning a random date to the file, then writing over the original computer code with 0 s, or 1 s, or random 1 s and 0 s, then basically doing it all over again seven times. (Please refer to for a complete list of free tools to use. Or destroy the hard drive physically, by breaking it into pieces with a hammer. Data Security Advice (Revised January 2012) Page 7 of 9
8 E. Glossary of Abbreviations and Terms Cache: a cache is a temporary storage area where frequently accessed data can be stored for rapid access. Once the data is stored in the cache, future use can be made by accessing the cached copy rather than re-fetching or re-computing the original data, so that the average access time is shorter. Data sniffer: A sniffer is a type of software that grabs all of the traffic flowing into and out of a computer attached to a network. Encryption: the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication code (MAC) or a digital signature. Keylogger: A keylogger is a program or a hardware device that captures or monitors every keystroke made on a keyboard. OWASP: The Open Web Application Security Project (OWASP) is a not-for-profit worldwide charitable organization focused on improving the security of application software. SSL: Secure Socket Layers are cryptographic protocols that provide secure communications on the Internet for such activities as web browsing, , Internet faxing, instant messaging and other data transfers. USB Key: also known as a data key, jump drive, etc. VPN: Virtual Private Network Web crawler: A Web crawler is a computer program that browses the World Wide Web in a methodical, automated manner. F. References: Herley,C. and Florencio,D. How To Login From an Internet Cafe Without Worrying About Keyloggers. Microsoft Research, Redmond. Accessed from the Internet, December 15, Queen s University General Research Ethics Board Data Security Tips (Revised Jan 16, 2012) Page 8 of 9
9 2008 Draft Exemption Policy: Research Ethics Review of Projects Involving Digital Data Collection (October 3, 2008 version) olicy.pdf Data Security Advice (Revised January 2012) Page 9 of 9
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
File Management and File Storage
File Management and File Storage http://training.usask.ca Information Technology Services Division Table of Contents File Management at the University of Saskatchewan...3 Introduction...3 Creating Files
Mobile Device Security and Encryption Standard and Guidelines
Mobile Device Security and Encryption Standard and Guidelines University Mobile Computing and Device best practices are currently defined as follows: 1) The use of any sensitive or private data on mobile
NETWORK AND INTERNET SECURITY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
Setting Up Email. on Your Touch by HTC
Setting Up Email on Your Touch by HTC Intellectual Property Notices 2007 Sprint Nextel. All rights reserved. No reproduction in whole or in part without prior written approval. SPRINT and other trademarks
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS
Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information
Law College Computer and Technology Information
Law College Computer and Technology Information Account Creation All law students, faculty and staff must have a University of Toledo authentication domain (UTAD) computer account. This account will allow
General Questions... 1. Requesting Access... 2. Client Support... 3. Downloading Issues... 4. Installation Issues... 4. Connectivity Issues...
Contents General Questions... 1 Requesting Access... 2 Client Support... 3 Downloading Issues... 4 Installation Issues... 4 Connectivity Issues... 5 Performance Issues... 7 Application Issues... 8 General
Student Halls Network. Connection Guide
Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to
LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan
LAW OFFICE SECURITY for Small Firms and Sole Practitioners Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan 1. Introduction CONTENTS 2. Security Consciousness Having a Firm Security
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
Chapter 8: Security Measures Test your knowledge
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
ScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.
Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
ScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
SGUL VPN Connection Guide for Windows 10
SGUL VPN Connection Guide for Windows 10 2016-01-22 First draft 2016-01-29 Second draft 2016-04-01 First release v1.0 Regulations Before connecting to the network, you should familiarize yourself with
Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide
Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide Seagate Business Storage NAS User Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP
Secure Your Home Computer and Router Windows 7 Abbreviated Version LeRoy Luginbill, CISSP TABLE OF CONTENTS Introduction... 2 Getting Ready... 5 Page 1 of 10 Introduction By giving the Introduction and
IT Information Packet
IT Information Packet Welcome to the University of Mount Olive! Beginning college is an exciting time where you will be experiencing many new things in a short amount of time. We understand that technology
Setting Up Email. on Your Sprint Power Vision SM Mogul by HTC
Setting Up Email on Your Sprint Power Vision SM Mogul by HTC Intellectual Property Notices 2007 Sprint Nextel. All rights reserved. No reproduction in whole or in part without prior written approval. SPRINT
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
BlackArmor NAS 110 User Guide
BlackArmor NAS 110 User Guide BlackArmor NAS 110 User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks
A Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2
Open Source and License Source Information
BlackArmor NAS 220 BlackArmor NAS 220 User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks of Seagate
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM
REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM This document explains the various ways to connect to your network files and group share data. In addition, staff and full-time faculty are
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
VPN Overview. The path for wireless VPN users
VPN Overview The path for wireless VPN users First, the user's computer (the blue computer) connects to an access point in the uiuc-wireless-net network and is assigned an IP address in that range (172.21.0.0
NovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
Set Up Your Email. HTC Touch Pro. www.sprint.com
Set Up Your Email HTC Touch Pro www.sprint.com 2008 Sprint. Sprint and the logo are trademarks of Sprint. Other marks are the property of their respective owners. Intellectual Property Notices Copyright
Setting Up Email on Your Palm. Treo 700wx Smartphone
Setting Up Email on Your Palm Treo 700wx Smartphone Intellectual property notices 2006 Palm, Inc. All rights reserved. Trademark, copyright, patent, and other intellectual property notices are set forth
Storing and securing your data
Storing and securing your data Research Data Management Support Services UK Data Service University of Essex April 2014 Overview Looking after research data for the longer-term and protecting them from
Storage, backup, transfer, encryption of data
Storage, backup, transfer, encryption of data Veerle Van den Eynden UK Data Archive Looking after your research data: practical data management for research projects 5 May 2015 Overview Looking after research
Computer Backup Strategies
Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and
Frequently Asked Questions
FAQs Frequently Asked Questions Connecting your Linksys router to the Internet 1 What computer operating systems does my Linksys router support? 1 Why can t I connect my computer or device to my router?
Secure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
HOSTED DESKTOP MANUAL
HOSTED DESKTOP MANUAL TABLE OF CONTENTS REMOTE DESKTOP MANUAL Last revision August 18, 2005 WHAT IS A REMOTE DESKTOP... 1 Security... 1 Terminals...2 SETTING UP YOUR REMOTE DESKTOP... 2 Installing Remote
Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI
Office of Regulatory Compliance 13001 E. 17 th Place, Suite W1124 Mail Stop F497 Aurora, CO 80045 Main Office: 303-724-1010 Main Fax: 303-724-1019 HIPAA Policy 7.1 Title: Source: Prepared by: Approved
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
SecureMail User Guide
SecureMail User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Using SecureMail to reply to
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!
Protect Your Privacy Online P 7/1 Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! With the information in this article you can: Find out what secret information your PC is sharing with
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism. www.spreed.com
Spreed Keeps Online Meetings Secure Online meeting controls and security mechanism www.spreed.com Spreed Online Meeting is protected by the most advanced security features. Rest assured that your meetings
This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network.
This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network. Prerequisites for Network Registration: 1. In order to
SecureDoc for Mac v6.1. User Manual
SecureDoc for Mac v6.1 User Manual Copyright 1997-2012 by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada and
Fundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
LAB FORWARD. WITH PROService REMOTE SERVICE APPLICATION. Frequently Asked Questions
LAB FORWARD WITH PROService REMOTE SERVICE APPLICATION Frequently Asked Questions MORE WAYS TO INCREASE UPTIME AND IMPROVE PRODUCTIVITY. GENERAL INFORMATION Q: What is PROService? A: PROService is Beckman
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
How To Export Data From Exchange To A Mailbox On A Pc Or Macintosh (For Free) With A Gpl Or Ipa (For A Free) Or Ipo (For Cheap) With An Outlook 2003 Or Outlook 2007 (For An Ub
Exchange Client Quick Start Guide GAPC Hosted Exchange Client Guide Page 1 of 12 Client Requirements Hosted Exchange requires Outlook 2003 and Windows XP for MAPI access to your hosted Exchange mailboxes,
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
USER GUIDE. General Information... 2. The BeAnywhere Service... 2. BeAnywhere Server... 2. BeAnywhere DRIVE... 2. Security... 2
USER GUIDE TABLE OF CONTENTS General Information... 2 The BeAnywhere Service... 2 BeAnywhere Server... 2 BeAnywhere DRIVE... 2 Security... 2 Level 1 User Security... 3 Level 2 Communications Security...
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Payment Card Industry (PCI) Compliance. Management Guidelines
Page 1 thehelpdeskllc.com 855-336-7435 Payment Card Industry (PCI) Compliance Management Guidelines About PCI Compliance Payment Card Industry (PCI) compliance is a requirement for all businesses that
Secure Email User Guide
Secure Email User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Resetting your SecureMail password..
Is Skype Safe for Judges?
Is Skype Safe for Judges? By Martin Felsky, PhD, JD, for the Judges Technology Advisory Committee, Canadian Judicial Council, 1 Version 2.0 July 6, 2010 In this article I will try to help judges understand
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
The Hidden Dangers of Public WiFi
WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Cyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
Xerox Mobile Print Cloud
September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United
GETTING STARTED WITH A COMPUTER SYSTEM FACTSHEET
FACTSHEET When setting up a small business there can be many areas of uncertainty, but getting your IT or computer systems right and connected does not need to be one of them. If your company is either
Remote VPN: Remote access for personal devices
Remote VPN: Remote access for personal devices Documentation Team. March 2013. About Remote VPN Remote VPN 1 provides staff and students with secure, authenticated remote access to personal and shared
Set Up Your Email. HTC Touch Pro2. www.sprint.com
Set Up Your Email HTC Touch Pro2 www.sprint.com 2009 Sprint. Sprint and the logo are trademarks of Sprint. Other marks are the property of their respective owners. Intellectual Property Notices HTC, the
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Encryption Made Simple for Lawyers
Encryption Made Simple for Lawyers By David G. Ries, Esq. and John W. Simek Encryption is a topic that most attorneys don t want to touch with a 10-foot pole, but it is becoming a more and more important
