A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher
|
|
|
- Lindsay Burke
- 10 years ago
- Views:
Transcription
1 A Nemaris Company Formal Privacy & Security Assessment For Surgimap version and higher 306 East 15 th Street Suite 1R, New York, New York 10003
2 Application Name Surgimap Vendor Nemaris Inc. Version V2.2.6 Release Date September 25, 2015 Application supports the following business function(s): Image viewing and measuring, surgical planning and real time simulated outcomes. 1 Hardware and Software Requirements 1.1 Can you provide a technical diagram of your system s configuration (Visio preferred)? We have some PPT presentations that explain the software s configuration 1.2 Is this an ASP (Application Service Provider) model? No, but we have a licensing server that the software must connect to the first time to activate. 1.3 Does this system run on VMware? What version? No, Surgimap is supported on its own, using its own cloud server and (Amazon) AWS secure server 1.4 What is the Server OS? Is 64bit OS supported? Yes, Surgimap will run on a 64bit machine. No server required in-hospital 1.5 Can the system be joined to an existing Active Directory domain? If not does it support LDAP authentication? 1.6 Is there a database component? Which databases are supported? (Oracle, MSSQL Server) What versions are supported? No, AD/LDAP authentication is not done. Authentication is done against an online licensing server Surgimap has an internal, encrypted SQLITE database that is managed by the software. No external database is needed. 1.7 Does your system use a web server? What vendor/versions are supported? No web server is used. 1.8 How many servers are required for this system? What is the function of each server? Does this include a test environment? There are no minimum required servers for Surgimap. Surgimap downloads directly onto the workstation/computer of an end user s preference. 1.9 What is the expected annual storage growth requirement? 10GB/user/year typically. Storage is local to the user s workstation, and it is encrypted via AES/Blowfish encryption with 256/512 bit keyspace Can the application be installed somewhere other than the C drive? Surgimap is meant to be installed on the C Drive, but a user also has the option to run Surgimap from a USB stick Does this system run on Citrix? What versions do you support? The software has been configured to run on Citrix. Although we will provide support to help you configure it, we have not evaluated any specific versions. However, we have multiple customers deployed on Citrix, and it is known to work well with the latest versions Is this application 32 or 64 bit application? Surgimap is compatible with both 32 and 64 bit environments. October 2015 Formal System Assessment Page 2 of 10
3 1.13 What Client Operating Systems are supported? Personal laptops (Windows XP+, Mac OS X 10.7+), iphone, ipad 1.14 Do files need to be loaded onto individual clients? If so what? The Surgimap software must be loaded as well as the user database, if not stored locally Is your system compatible with wireless? Does it support n? Can it support certificate based authentication? Yes, Surgimap is compatible with wireless machines What files or folders do we need to back up in order for successful recovery? Can you explain your recommended backup strategy? Firewall/VPN does your system require outbound or inbound connectivity? List ports, protocol, and ip addresses SurgimapDatabase folder contains all of the user s encrypted files (images + metadata + configuration). Backing up this directory and restoring it into a client version of the software will copy all necessary information in order to restore a working copy of Surgimap. Please see the PACs connection guidelines that can be found at This gives you all the information you need to run Surgimap from behind hospital firewalls Are there any HL7 interfaces for this system? N/A 1.19 Are there any other interfaces for this system? N/A 1.20 What is your licensing model? (per seat, concurrent user) per-user 2 Printers & Special Hardware 2.1 What printers are compatible with this system? N/A. Surgimap does not have a print feature. 2.2 Are there any special labels required? No. 2.3 What special hardware is required to use this system, if any? (touch screens, wands, scanners, readers, faxing, etc.) 2.4 Special hardware modules to be installed on server? Does it require a separate server? Will it fit in a 1U, 2U server? No special hardware is needed to run Surgimap. No. 2.5 Are any handheld devices used with this system? Surgimap works on Mac and Windows computers. It is also compatible with the iphone and ipad, and the app is available on the Apple App store. However, surgeons can only use the desktop version in order to link with their PACS system. 3 Support 3.1 Does vendor need remote access to the system? No. 3.2 Is this only for initial configuration? 3.3 What is your support model if any? Surgimap directly helps its clients with any issues that they are experiencing and it provides WebEx trainings and demonstrations of the software if requested by client. October 2015 Formal System Assessment Page 3 of 10
4 3.4 Is remote access needed for clients & servers? No. 3.5 Is a dedicated, point to point connection required to exchange transactions, etc. for this system? It is only required if the end user would like to connect PACs with Surgimap. 3.6 What is your web site URL? Do you have a support number? What is our client ID? 3.9 Who is responsible for supporting this application?(client/vendor) If both who is responsible for the following 1) Hardware 2) Operating System 3) Patching 4) Software/Application Updates 5) Antivirus Client is respons ble for supporting the Surgimap application. Surgimap pushes out software/application updates every few months. The client will see a notification about an available update when he or she launches the software How many installs of this system exists today? 4 Privacy and Health Information Management 4.1 Will your system contain patient demographic information? No 4.2 Will your system be used to document treatment information? If yes, can your system interface with Cerner? Only if client decides to include this information 4.3 What is the retention period for information stored on your system? Information is stored on the local computer/drive where it is installed. The information will remain on that local device, unless it is deleted by user. 4.4 If the information is archived, is it easily retrievable? Information is not archived. 4.5 Will your system contain patient images, readings, voice files, or videos? Yes. 4.6 Does the client have the ability to modify fields? Yes. 4.7 What are the fields contained in the survey? Questions 4.7 through 4.8 apply to Studies and Surveys (If this request relates to a study and/or survey, then continue with 4.7; If not, continue with 5.1) 4.8 Will any patient identifiable information be captured? If yes, will the information be sold to other companies? 5 Access Management October 2015 Formal System Assessment Page 4 of 10
5 Does the application support integration with the enterprise identity management system? a. If yes, indicate the alert (such as Directory Services, LDAP, Kerberos, etc.): Is user authentication controlled by means other than user account and password or PIN? a. If yes, indicate what other mechanisms are used (e.g. certificates, token, biometric, etc.): N/A No Questions 5.3 through 5.8 apply to the use of passwords 5.3 Does the application force new users to change their password upon first login into the application? Before launching the software, the user has to register his or her and create a password. The user then receives an activation , after which time the user provides information and agrees to our Terms & Conditions. Only after this is the user able to gain access to the software. 5.4 Can the user change their password at any time? Yes. 5.5 Can the system administrator enforce password policy and/or complexity such as minimum length, numbers and alphabet requirements, and upper and lower case constraint, etc.? Surgimap software has password requirements: 7 letters in length, 1 number, 1 upper case letter. 5.6 Can the application force password expiration and prevent users from reusing a password? 5.7 Is password transmission and storage encrypted and unviewable even to the system administrators? 5.8 Can the application be set to automatically lock a user s account after a predetermined number of consecutive unsuccessful logon attempts? 5.9 Does the application proh bit users from logging into the application on more than one workstation at the same time with the same user ID? 5.10 Can the application be set to automatically log a user off the application after a predefined period of inactivity? No. Yes, passwords are stored as a one-way hashed bcrypt ed value and transmitted over SSL. Yes, after 3 failed log-in attempts, the user is locked out of the account and has to follow specific steps to create a new password to regain access to the account. No. No, but this is something we are in the process of developing Can access be defined based upon the user s job role? (Role-based Access Controls (RBAC))? a. If yes, can application generate the list of users by job role? 5.12 Can the application support the removal of a user s access privileges without October 2015 Formal System Assessment Page 5 of 10
6 requiring deletion of the user account? Does the application support a mechanism for allowing emergency access by a caregiver to a patient's electronic health information that is not included within their standard access privileges? No a. If yes, does the application capture and retain details pertaining to this action for review? b. If yes, do the caregiver s access privileges revert back to the original setting upon next log-in? 6 Audit Capabilities 6.1 Is audit log tracking a feature available in the current version of this software application? If yes, then continue with 6.2; If no, continue with 7.0 No Capturing user access activity such as successful logon, logoff, and unsuccessful logon attempts? a. If yes, list the data elements contained in the audit log: Capturing data access inquiry activity such as screens viewed and reports printed? a. If yes, list the data elements contained in the audit log: 6.4 Capturing data entries, changes, and deletions? a. If yes, list the data elements contained in the audit log: 6.5 Does the application time stamp for audit log entries synchronize with other applications and systems using NTP/SNTP? Are audit log reports available for the current version of this software application? 6.6 a. If yes, specify the types of reports. b. If yes, indicate if additional hardware or software (including any thirdparty software) is required to activate or utilize the audit logging and/or October 2015 Formal System Assessment Page 6 of 10
7 reporting feature. 6.7 Can the audit log "data" be exported from the application for further processing (e.g. storage, analysis)? 6.8 Indicate how audit log files are protected from unauthorized alteration: Does the application allow a system administrator to set the inclusion or exclusion of audited events based on organizational policy and operating requirements or limits? Can the application continue normal operation even when security audit capability is non-functional? (For example, if the audit log reaches capacity, the application should continue to operate and should either suspend logging, start a new log or begin overwriting the existing log) 7 Security of Remote Access and Support Which connection method(s) are used to accomplish remote support? a. Dial-up 7.1 b. Secure web tunneling c. VPN Client (specify VPN technology method here) d. Business-to-business VPN using IPSec e. Other (please explain) We use WebEx for all support calls. 7.2 Identify which remote support applications are utilized and the security controls enabled: 7.3 Is functionality built into the application which allows remote user access and/or control? 7.4 If requested, can the application associate remote support activities with an individual employee of the vendor? (accountability) N/A No October 2015 Formal System Assessment Page 7 of 10
8 7.5 Do vendor support personnel have specific roles and accesses that control access to ephi? (See section 5.11) 7.6 Does the audit system log remote support connection attempts and remote support actions such as application or configuration modifications? No, there should be no ephi data communication. It is worth noting that all Surgimap employees are HIPAA trained before they are ever allowed to access or handle ephi. 8 Protection from Malicious Code Is the application compatible with commercial off the shelf (COTS) virus scanning software products for removal and prevention from malicious code? a. If no, indicate what additional security controls are included with the application/system used to mitigate the risks associated with malicious code: Does the application s client software operate without requiring the user to have local administrator level rights in order to run the application? Yes, Surgimap will run on devices with virus scanning software. Yes, if the software is installed in a location where the local user has write-access. If the application is installed in the Program Files directory, then administrative access is required to write there. 9 Configuration Management and Change Control 9.1 Are updates to application software and/or the operating system controlled by a mutual agreement between the support vendor and the application owner? Yes. When users first create an account with Surgimap they must agree to the terms and conditions of the software. This includes, but is not limited to, updates to the application. 9.2 Has the application been tested to be fully functional residing on its associated operating system/middleware platform configured with a recognized security configuration benchmark? Surgimap is fully tested and works with Windows XP and newer operating systems. L kewise, it is fully tested and works on Mac OS X 10.7 and newer Mac operating systems. a. If yes, indicate the configuration benchmark: Windows XP+, Mac OS X using internal test suite. 9.3 Can the operating system hosting the application (server or client) be updated by the user without voiding the application warranty or support agreement? a. If no, will operating system changes, updates, and patches be provided by the vendor? Yes. 9.4 Indicate how updates to the application are typically handled: If software updates are available, the user will receive a notification to upgrade the software when they launch the program (i.e., before they log-in). October 2015 Formal System Assessment Page 8 of 10
9 9.5 Indicate how the application is certified to perform as intended with updates to the operating system and other helper applications (such as service packs and hot fixes) and how the customer is notified of this information. We cryptographically sign and validate our updates per FDA recommendation using RSA 2048 bit signatures of the MD5 hash 10 Data Export and Transfer Capabilities 10.1 Does the application encrypt data before sending it over the Internet or an open network? a. If yes, indicate the encryption used: 256-bit SSL certificate Yes Does the application encrypt data before storing on removable media such as backup tapes, CDs, DVDs, etc. or devices such as laptops, tablets, or computer workstation hard disk drives? Yes. a. If yes, indicate the encryption used: SQLite Encryption Extension, images using Blowfish Indicate the interfacing and format standards the application can accept or use for transferring data: (e.g., HL7 transaction formats, ANSI X.12 standards, CCOW, etc.): 10.4 If the application includes a web interface, then identify the type(s) of secure connection supported: This question is only applicable if you, the user, seek to use Surgimap Access. 11 Other Capabilities 11.1 Does the application maintain a journal of transactions or snapshots of data between backup intervals? 11.2 Can the system administrator reconfigure to nonstandard port assignments other than the list of registered ports published by IANA? 11.3 Does the application provide for integration into standard network domain structures? 11.4 Has the application security controls been tested by a third party? Surgimap uses internal testing only Does the application have ability to run a backup concurrently with the operation Yes, the database is synced to disk transactionally, so only complete data is ever found on disk. Backup can October 2015 Formal System Assessment Page 9 of 10
10 of the application? 11.6 Does the application include documentation that explains error or messages to users and system administrators and information on what actions required? therefore run concurrently Please see the Surgimap user guide in the IT Department section of the web site. October 2015 Formal System Assessment Page 10 of 10
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
System Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
Research Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
Georgia Institute of Technology Data Protection Safeguards Version: 2.0
Data Protection Safeguards Page 1 Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Purpose: The purpose of the Data Protection Safeguards is to provide guidelines for the appropriate
Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
DiamondStream Data Security Policy Summary
DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0
WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of
White Paper. Support for the HIPAA Security Rule PowerScribe 360
White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
Catapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
Manufacturer Disclosure Statement for Medical Device Security MDS 2 DEVICE DESCRIPTION MANAGEMENT OF PRIVATE DATA
Disclosure Statement for Medical Device Security MDS 2 DEVICE DESCRIPTION Device Model Software Revision Software Release Date Company Name Contact Information or Hologic, Inc [email protected]
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.
FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates
ADM:49 DPS POLICY MANUAL Page 1 of 5
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers
Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec
USING GENIE REMOTELY
USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.
VMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
enicq 5 Technical FAQ
enicq 5 Technical FAQ Classification Q: What is the purpose of the enicq 5 application? A: The enicq 5 application is a Windows-based application provided by Vermont Oxford Network ( VON ) to its members
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
RSS Cloud Solution COMMON QUESTIONS
RSS Cloud Solution COMMON QUESTIONS 1 Services... 3 Connectivity... 5 Support... 6 Implementation... 7 Security... 8 Applications... 9 Backups... 9 Email... 10 Contact... 11 2 Services What is included
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Xerox Mobile Print Cloud
Xerox Mobile Print Cloud Information Assurance Disclosure Software Version 3.0 May 2015 702P03595 2013-2015 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Manufacturer Disclosure Statement for Medical Device Security MDS 2 DEVICE DESCRIPTION MANAGEMENT OF PRIVATE DATA
Device Model A B C D HN 1-2013 Page 17,,, or See te Can this device display, transmit, or maintain private data (including electronic Protected Health Information [ephi])? 1 Types of private data elements
NETWRIX IDENTITY MANAGEMENT SUITE
NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS
Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
HIPAA Privacy and Security Risk Assessment and Action Planning
HIPAA Privacy and Security Risk Assessment and Action Planning Practice Name: Participants: Date: MU Stage: EHR Vendor: Access Control Unique ID and PW for Users (TVS016) Role Based Access (TVS023) Account
McAfee Enterprise Mobility Management
McAfee Enterprise Mobility Management Providing mobile application enablement and HIPAA security compliance Table of Contents HIPAA and ephi 3 Overview of 3 HIPAA Compliance for Remote Access 4 Table 1.
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Introduction. Connection security
SECURITY AND AUDITABILITY WITH SAGE ERP X3 Introduction An ERP contains usually a huge set of data concerning all the activities of a company or a group a company. As some of them are sensitive information
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Policy Title: HIPAA Access Control
Policy Title: HIPAA Access Control Number: TD-QMP-7018 Subject: Ensuring that access to EPHI is only available to those persons or programs that have been appropriately granted such access. Primary Department:
by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document
Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.
HIPAA Security Matrix
HIPAA Matrix Hardware : 164.308(a)(1) Management Process =Required, =Addressable Risk Analysis The Covered Entity (CE) can store its Risk Analysis document encrypted and offsite using EVault managed software
Exhibit B5b South Dakota. Vendor Questions COTS Software Set
Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event
Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)
Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
LifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
Summer 2013 Cloud Initiative. Release Bulletin
Summer 2013 Cloud Initiative In this bulletin... July 2013 Summer 2013 Cloud Initiative 1 Getting started with the new Cloud... 2 Cloud Enhancements 3 How To Save Files 7 How to Set Up ipad Access 9 How
Compulink Advantage Online TM
Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
TestNav 8 User Guide for PARCC
TestNav 8 User Guide for PARCC Copyright 2014, Pearson Education, Inc. Published March 6, 2014 TestNav 8 User Guide for PARCC 1 TestNav 8 User Guide for PARCC Revision History What is TestNav? Technical
