INFORMATION PROCEDURE
|
|
|
- Daniel Harrison
- 10 years ago
- Views:
Transcription
1 INFORMATION PROCEDURE Information Security - National Rules of Behavior Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY NATIONAL RULES OF BEHAVIOR 1. PURPOSE To establish the EPA National Rules of Behavior (NRoB) to comply with OMB Circular A-130, Appendix III, paragraph 3(a(2)(a) regarding rules of behavior for users of information systems applicable to all users of EPA information and information systems for Agency users and to safeguard EPA information and information systems from misuse, abuse, loss, or unauthorized access. 2. SCOPE AND APPLICABILITY The procedure covers use of all EPA information and information systems to include information and information systems used, managed, or operated by EPA employees, contractors, another agency or other organization on behalf of the agency. The EPA NRoB apply to all EPA employees, contractors, and all other users of EPA information and information systems. 3. AUDIENCE The audience is all EPA employees, contractors, and all other users of EPA information and information systems that support the operations and assets of EPA. 4. BACKGROUND The Office of Management and Budget (OMB) Circular A-130, Appendix III, paragraph 3(a(2)(a) requires that all Federal agencies promulgate rules of behavior that clearly delineate responsibilities and expected behavior of all individuals with access to the agencies information and information systems, as well as state clearly the consequences of behavior not consistent with the rules of behavior. 5. AUTHORITY E-Government Act of 2002, Public Law , Title III, Federal Information Security Management Act (FISMA) as amended Federal Information Security Modernization Act (FISMA) of 2014, Public Law Public Law No: (12/18/2014) (To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security.) Appendix III Security of Federal Automated Information Resources, to OMB Circular A- 130, Management of Federal Information Resources Executive Order 13103, Computer Software Piracy Page 1 of 17
2 OMB Memorandum Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency Information Technology Investments OMB Memorandum FY 2008 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management EPA Information Security Program Plan EPA Information Security Policy EPA Roles and Responsibilities Procedures CIO Limited Personal Use of Government Office Equipment Policy CIO , Privacy Policy CIO 2151-P-03.1, Procedures for Preparing and Publishing Privacy Act Systems of Records Notices 6. PROCEDURES The following are the NRoB for the protection of information and information systems. Appendix A includes a listing of abbreviations and acronyms. RULES OF BEHAVIOR Users must acknowledge their knowledge and understanding of responsibilities as well as the EPA NRoB when using EPA information and information systems before being granted access to any government system. The acknowledgement statement is at the end of the annual information security awareness course and on the EPA Information Security website. Individual systems may require separate acknowledgement of additional rules depending on the nature of the system and of the information processed by that system. In such cases, users are required to acknowledge that they will abide by system-specific rules in addition to these NRoB as a condition of gaining and retaining access to the system. Violation of these rules will be reported to the user s Program or Regional Office Information Security Officer (ISO) and the Computer Security Incident Response Center (CSIRC). Non-compliance with these rules may subject the user to disciplinary action, as well as penalties and sanctions, including verbal or written warning, removal of system access privileges, reassignment to other duties, removal from Federal service, and/or civil or criminal prosecution depending on the severity of the violation. Unauthorized access, use, misuse, or modification of government computer systems constitutes a violation of Title 18, United States Code, Section Page 2 of 17
3 System Access and Use Preventing unauthorized access to EPA information systems and information requires the full cooperation of all users. Users must be aware of their responsibilities for maintaining effective access controls, particularly regarding the use of identification and authentication information and strict adherence to the permissions granted to them. The following NRoB are relevant to EPA system access and use. Users must: Understand they have no expectation of privacy regarding any communications or data transiting or stored on EPA information systems, that information is the property of the Government and may become an official record. Be aware that at any time, and for any lawful government purpose, the government may monitor, intercept, and search and seize any communication or data transiting or stored on EPA information systems. Use Government furnished equipment (GFE) for work-related purposes only, except as allowed by EPA telework policy and as prescribed by CIO Policy on Limited Personal Use of Government Office Equipment. Adhere to all Federal laws, EPA information security policies, procedures, standards and other directives. Limit personal use of the Internet and in accordance with CIO Policy on Limited Personal Use of Government Office Equipment. Be responsible for all actions performed and activities initiated using his or her user account. Use only authorized and authorized devices and solutions when traveling internationally. Access and use only information or information systems for which he or she has been granted access by official authorization and for which access is required for the user s job function. Report inappropriate access to the Program or Regional Office ISO or the EPA Call Center. Follow established procedures for accessing information, including the use of user identification (ID), authentication information (e.g., personal identification numbers, passwords, digital certificates), and other physical and logical safeguards. Follow established procedures for requesting and disseminating information. Ensure all sensitive information is protected in a manner that prevents unauthorized personnel from having visual access to the information being processed. This may be accomplished by utilizing devices such as monitor privacy screens, hoods, or positioning equipment (monitors or printers) so that it faces away from doorways, windows, or open areas. Terminate sessions or employ a session-locking mechanism before leaving equipment unattended. Page 3 of 17
4 Terminate sessions and log off of all information systems at the conclusion of the work day unless a specific need requires remaining logged on, e.g., system maintenance or incident response. Users must not: Allow anyone to use their system or application account. Use EPA information or information systems to conduct or support a personal business. Place unauthorized software onto an EPA computing resource. Install peer-to-peer (P2P) software on EPA computers without explicit written approval of the Authorizing Official (AO) generally the CIO. Use any computing resources to process, store, or transmit EPA information unless such use has been authorized. Connect any computing device or resource to any EPA system, including infrastructure systems, without Senior Information Official (SIO) or CIO authorization. Divulge access information (e.g., login procedures, lists of user accounts) for an unauthorized computing resource to anyone who does not have a need to know the information as determined by EPA management. Capture copies of security or configuration information from a computing resource for the purpose of unauthorized personal use or with the intention of divulging the information to anyone without a specific need to know as determined by EPA management. Leave an open login session unattended. The user shall lock the user interface to the session in such fashion that the user must identify and authenticate to regain access to the session. Bypass or attempt to bypass system controls or access data for any reason other than official duties. Use Internet, and social media for fraudulent or harassing messages or for sexual remarks or the downloading of illegal or inappropriate materials (e.g., pornography) in accordance with CIO Policy on Limited Personal Use of Government Office Equipment and CIO Social Media Policy. Identification and Authentication Identification is the process by which a person, device, or program is differentiated from all others. User identification is commonly provided in the form of User-IDs, but is also provided using other methods, such as digital certificates. Authentication is the process by which user identification is verified. Authentication can be performed using passwords, cryptographic keys, digital certificates, biometrics, access cards, tokens, or other methods. Page 4 of 17
5 To protect access to computing resources users must: Protect authentication information from disclosure at a level comparable to the most sensitive level of information on the most sensitive system accessible to the user s access rights once authenticated. Change authentication information immediately in the event of suspected or known compromise. Select and use unique authentication information for each computing resource or group of computing resources using discrete authentication objects. Notify the EPA Call Center when experiencing difficulties with user account or authentication information. Report any suspected or known authentication information (e.g., password, digital certificate) compromise to the Program or Regional Office ISO, system Information System Security Officer (ISSO), and to the EPA Call Center at EPA (4372) or [email protected]. Construct and maintain passwords in accordance with CIO 2150-P-02.1 Identification and Authentication Procedures document. Users must not: Allow anyone else to know or use their identification and authentication information to access an EPA information system. Attempt to bypass or circumvent access controls to a computing resource. Store authentication information in writing, on-line (including password saving features of operating systems and applications, such as auto-fill), or in password storage systems (e.g., password wallets or password safes ) unless approved/authorized and/or provided by the EPA. Use the same authentication information for EPA system access and non-epa purposes. Electronic Data Protection The user is responsible for protecting the confidentiality, integrity and availability of EPA information. Storage, disposal, mailing and electronic transmission of sensitive information shall be in accordance with Federal and EPA policies and directives. Users shall not create or maintain a System of Records (SoR or SOR) which contains information subject to the Privacy Act (e.g., files containing information related to individuals retrievable by name and/or other unique personal identifier) on an EPA system without approval of the EPA System Owner AND proper preannouncement of the SOR via a System Of Records Notice (SORN) published in the Federal Register (please consult the Agency Privacy officer and CIO policy CIO 2151-P-03.1 for assistance). Users shall protect controlled unclassified information (CUI) in accordance with EPA directives. Within EPA, CUI categories include Personally Identifiable Information (PII) and Sensitive Personally Identifiable Information (SPII). Page 5 of 17
6 Personally Identifiable Information (PII). Per OMB M (July 12, 2006), "the term Personally Identifiable Information means any information about an individual maintained by an agency, including, but not limited to, education, financial transactions, medical history, and criminal or employment history and information which can be used to distinguish or trace an individual s identity, such as their name, social security number, date and place of birth, mother s maiden name, biometric records, etc., including any other personal information which is linked or linkable to an individual." Sensitive Personally Identifiable Information (SPII). SPII is a subset of PII, which, if lost, compromised or disclosed without authorization, could result in substantial harm, embarrassment, inconvenience or unfairness to an individual. At EPA, SPII is defined as social security numbers or comparable identification numbers, financial information associated with individuals and medical information associated with individuals. SPII requires additional levels of security controls (see EPA Information Security Privacy Procedures). The Privacy Act protects personal information collected for entry into a system of records and information that is contained in a Privacy Act System of Records. To protect PII, users shall comply with the CIO Privacy Policy: Ensure that PII retrieved by an individual s name or other personal identifier is maintained in an authorized system of records for which a Privacy Act SORN has been published in the Federal Register. o If Sensitive PII is being collected ensure you have the legal authority to do so and ensure a SORN was published before the system became active describing the information. PII in electronic form should only be accessed via EPA-authorized computing resources such as EPA provided desktop and laptop computers If SPII must be ed, ensure it is within an encrypted attachment using EPA authorized encryption standards and the password provided separately (e.g. by phone, another , or in person). o PII data-at-rest on EPA-authorized removable storage media (USB flash drives, external disk drives, etc.), desktop/laptop computer hard drives (or solid state equivalents thereof) shall be encrypted using EPA authorized encryption standards1. Use authentication information protection and where possible, automatically lock out after 15 minutes (or less) of user inactivity all mobile computing resources on which PII is stored. Identify files, extracts or outputs that contain PII and delete those that no longer serve a business purpose. Disseminate PII only to those EPA employees who have a need to know to perform their official duties, not a want to know. 1 Department of Homeland Security (DHS) threshold for encryption is: All user data is encrypted with FIPS validated cryptographic modules, or modules approved for classified data. Page 6 of 17
7 Maintain PII in a manner that will ensure no inadvertent or unauthorized disclosures occur: o Do not leave in open view of others; o Use an opaque envelope when transmitting through the mail; o Secure paper records in a locked file drawer and electronic records in a password protected or restricted access file; and o Do not place or store PII on a shared network drive unless access controls are enforced. Ensure disposition complies with EPA records disposition schedules. Dispose of PII using sensitive waste disposal methods. Users shall not: Remove electronic EPA data (including PII) from EPA controlled spaces unless it is appropriately protected, utilizing EPA authorized and provided cryptographic methods. Use personal computing resources for processing, transmitting, or storing PII pertaining to EPA official business. or otherwise transmit PII outside of the EPA s infrastructure, except when authorized and necessary to conduct official agency business. ing PII within the EPA local area network (LAN) or wide area network (WAN) is acceptable, including to and from all mobile devices that interact within the EPA s system. ing PII to personal accounts (e.g., Gmail, Hotmail, Yahoo, etc.) is prohibited. Leave SPII in hard copy unattended and unsecured. Use of Software Users shall abide by CIO Software Management and Piracy Policy, Executive Order and U.S. copyright laws when using EPA systems, and shall not acquire, install, reproduce, distribute, or transmit computer software in violation of these and other applicable directives and the applicable software license. Teleworking When authorized to telework from home or from other alternate workplaces users shall: Use GFE for work-related purposes only, except as allowed by EPA telework guidance and as prescribed by CIO Policy on Limited Personal Use of Government Office Equipment. Use only EPA-authorized technologies for remote access to the EPA network as prescribed by control AC-17 Remote Access in the most current version of CIO 2150 P 01.2 Access Control Procedure. Follow security practices that are the same as or equivalent to those required at his or her primary workplace when teleworking from an alternate workplace. Page 7 of 17
8 Secure or physically protect all computing resources when they are not in use. Protect sensitive data at his or her alternate workplace, including proper disposal of sensitive information (e.g., shredding using authorized shredders). Protect PII by using only EPA-authorized removable storage media (USB flash drives, external disk drives, SATA disk drives), desktop/laptop computer hard drives (or solid state equivalents thereof) encrypted using EPA authorized encryption standards. To access and use Sensitive PII (SPII) remotely, first obtain written permission from the Senior Information Official (SIO). If a request is approved, follow the procedures as prescribed by CIO Limited Personal Use of Government Office Equipment Policy. Authorized and EPA Sponsored Social Media Representation When an Authorized EPA user creates an official EPA-sponsored social media site or account; or posts in an official capacity on behalf of the EPA; the user shall: Receive approval from the Administrator's Office (Office of Web Communications) before posting. Initiate and maintain the profiles and access controls necessary to fulfill their designated representation responsibilities, such as registering for a forum in order to post information, according to their office s social media guidance. When establishing accounts/profiles for EPA authorized and sponsored social media representation: Ensure the profile complies with EPA information security policy, procedures, standards, and guidance. Ensure the user s username is not an EPA LAN account username, does not reflect personal information about the user, and is authorized by an Office Director. Ensure the profile information, such as the user s biography, is authorized by the user s Office Director and that it reflects EPA-relevant information that is not sensitive. Ensure the profile is linked to the user s EPA account (e.g., [email protected]) and not to a personal account (e.g. Gmail, Hotmail, Yahoo, etc.). Ensure the authorized EPA accounts/profiles are restricted to EPA employee work and office-related information only, and no personal information, including PII, is included. Ensure the authorized EPA profile displays only images authorized by the user s Office Director. Protection of Computing Resources Users of EPA computing resources that process EPA information or connect to EPA systems shall: Use only EPA furnished computing resources (or authorized personally owned equipment) to access EPA systems and information. Page 8 of 17
9 If using authorized but non-gfe, implement security controls as directed by EPA policy, procedures, standards and guidance. Maintain physical control of EPA computing resources at all times and take all necessary precautions for their protection against loss, theft, damage, abuse, or unauthorized use, which includes but is not limited to, employing lockable cases and keyboards, locking cables, and encrypted removable media drives. Keep operating system, antivirus, application, and firewall software on the computing resources up to date. Use only EPA-authorized Internet connections that conform to EPA security and communications standards (i.e., avoid using connections of unknown or questionable security, such as public wireless networks at restaurants, coffee shops, conference centers, parks, etc.). Users shall not: Make any changes to an EPA computing resource system configuration unless directed to do so by an authorized EPA system administrator. Use wireless solutions and configurations that are not configured in accordance with the CIO s technical standards and specifically authorized by the SIO. Process, store, or transmit sensitive information on wireless devices unless encrypted using EPA authorized encryption methods. Information Technology Incident Reporting Users must be vigilant for questionable activities or behavior that may indicate that an information security incident is in progress. Users must address suspicious activity, including spam, phishing or originating from unknown sources and mass s (i.e., s with empty TO: addresses or very large numbers of TO: addressees) by opening a security incident with the EPA Call Center, (866) ( EPA) option 1, without opening the or its attachments and without clicking on any links within the . Users must report actual and suspected incidents immediately to the EPA Call Center at EPA (4372) (press 1 for Security). Examples of incidents include: that warrants attention beyond deletion Obscene, racist, profane, libelous, or offensive . that triggers unexpected computer activity. Social engineering efforts Intelligence gathering or phone calls (e.g., unknown persons soliciting personal or information system information). Requests for user identification and authentication information. Page 9 of 17
10 Unexpected computer activity Automatic installation of unknown software. Constant disk activity. Intruders Computer use in EPA facilities by unknown or unidentified individuals. Data loss Losses or compromises of PII. Losses or compromise of confidential business Information (CBI) or trade secrets. Situations involving the improper handling or storage of PII must be reported immediately to the EPA Call Center. User Accountability Unauthorized use of a user account or a computing resource can result in criminal penalties under Section 1030, Title 18, of the United States Code. Users will be held accountable for their access and use of EPA computing resources. Users shall: Have no expectation of privacy while using any EPA computing resource including the EPA Internet, Intranet and services. Complete EPA-required security awareness courses, briefings and updates and all mandated training commensurate with their information security responsibilities and roles at the required frequency and before accessing EPA systems. Read and understand warning banners and end-user licensing agreements. Classified Information Unauthorized disclosure of classified information (whether in print, on a blog, or on websites) does not remove the information's classified status or automatically result in declassification of the information. Classified information, whether or not already posted on public websites or disclosed to the media, remains classified, and must be treated as such by EPA employees and contractors, until an appropriate original classification authority declassifies it. EPA employees and contractors shall never access classified information unless they have: Received the appropriate clearance from an appropriate authority. Signed an approved nondisclosure agreement. Demonstrated a need to know the information, and Page 10 of 17
11 Received training on the proper safeguarding of classified information and on the criminal, civil, and administrative sanctions that may be imposed on an individual who fails to protect classified information from unauthorized disclosure. This requirement does not restrict employee or contractor access to unclassified, publicly available news reports (and other unclassified material) that may in turn discuss classified material. This is distinguished from access to classified documents available on public websites or otherwise improperly published to the public. 7. RELATED DOCUMENTS National Institute of Standards and Technology (NIST) Federal Information Processing Standards (FIPS) NIST Special Publications, 800 Series NIST IR 7298 Revision 2, Glossary of Key Information Security Terms EPA Privacy Act Manual 8. ROLES AND RESPONSIBILITIES Assistant Administrators, Regional Administrators, and other key officials (e.g., Principal Deputy Assistant Administrators, Deputy Assistant Administrators, Deputy Regional Administrators, Assistant Regional Administrators, and Office Directors) 1) Assistant Administrators, Regional Administrators, and other key officials have the following responsibilities with respect to NRoB: a) Enforcing and ensuring the EPA NRoB and additional system specific rules of behavior (RoB), where applicable, are reviewed and signed or acknowledged electronically or manually prior to being granted access to EPA information and information systems and annually thereafter to maintain access. Computer Security Incident Response Center (CSIRC) 1) The CSIRC has the following responsibilities with respect to NRoB: a) Protect the Agency s information assets and network. b) Ensure prompt response and documentation of all information technology related privacy and information security incidents. c) Ensure threat and incident information is reported, communicated, and used to inform the Agency s information technology security risk management awareness and training, privacy, and physical security management programs. d) Define the process by which the Agency responds to computer security-related incidents such as data spillage, computer viruses, unauthorized user activity, and serious software vulnerabilities. e) Provide a method to promote computer security awareness of related risks so the Agency is better prepared to handle those incidents and is protected against them. Page 11 of 17
12 f) Upon learning of a potential incident, take actions to verify whether an incident actually occurred. g) Determine the scope and impact of each incident and prioritize actions. h) Protect the Agency s information assets and network. i) Work in conjunction with supporting entities to establish tools and resources in anticipation of security incidents and events. j) Work with the IT maintenance and security communities to make recommendations for securing networks, systems, and applications. k) Educate ISOs and end users on CSIRC goals and operations. l) Provide coordination for the Agency computer security incident reporting. m) Act as EPA s distributor for security advisories that are received from external Computer Emergency Readiness Team (CERT) organizations and that may have a potential impact on Agency computer systems. n) Take actions to verify whether an incident actually occurred upon learning of a potential incident. o) Determine the scope (potentially vulnerable target space) and impact of each incident and prioritize response activities. p) Track all incidents that occur at the EPA. q) Provide scripts to the EPA Call Center to ensure that potential security events are properly identified, sufficient initial information is obtained for follow-up, and Remedy tickets are properly routed. r) Ensure that Remedy tickets for actual and potential incidents are: i) Updated throughout the incident management life cycle, and ii) Made available only to appropriate personnel. s) Report and coordinate incidents with US-CERT, OIG, OPA, the EPA Physical Security Officer, and EPA Senior Management (e.g., CTO, SAISO), as appropriate. t) Periodically provide information security reports and updates to US-CERT. u) Set up an incident support resource that offers assistance and advice to users regarding potential incidents and vulnerabilities and the incident handling/reporting procedures. v) Manage and coordinate all responses to malicious software incidents. w) Assist the SAISO in establishing efficient and effective reporting system related to incidents involving EPA information resources. x) Utilize post-incident analysis to determine if and when additional alerts should be issued to users specifying actions to reduce vulnerabilities exploited during an incident. y) Assess impacts on EPA s security posture and controls as a result of handling and resolving incidents. Provide lessons learned for System Owners (SO), Information Security Officers (ISOs), Information System Security Officers (ISSOs), Senior Managers and others with recommendations to mitigate weaknesses identified during analysis. Page 12 of 17
13 z) Determine and implement specific response actions and escalation protocols for each incident type. Information Management Officials (IMO) 1) IMOs have the following responsibilities with respect to NRoB: a) Enforce and ensure the EPA NRoB and any additional system specific RoB, where applicable, are reviewed and signed or acknowledged electronically or manually by each user prior to being granted access to EPA information and information systems and annually thereafter to maintain access. Information Owners (IO) 1) IOs have the following responsibilities with respect to NRoB: a) Enforce and ensure the EPA NRoB and additional RoB of behavior for particular systems, if established, are signed or acknowledged electronically or manually annually by all information users for information for which the IO is responsible. Information Security Officer (ISO) 1) ISOs have the following responsibilities with respect to NRoB: a) Enforce and ensure the EPA NRoB and additional system specific RoB, where applicable, are reviewed and signed or acknowledged electronically or manually by each user prior to being granted access to EPA information and information systems and annually thereafter to maintain access. Ensure access is removed for users who are not in compliance. Information System Security Officer (ISSO) 1) ISSOs have the following responsibilities with respect to NRoB: a) Support the SIO, SO, SM, IO and ISO in managing and implementing the activities, processes, policies, procedures, control techniques, and other countermeasures identified under the EPA Information Security Program and ensure protection measures are compliant with FISMA and related information security directives for the information, information system, and service assigned. b) Serve as a principal advisor on all matters, technical and otherwise, involve the security of information, information systems, or services assigned. c) Implement policies, procedures, and control techniques identified in the Agency information security program. Chief Information Officer (CIO) 1) The CIO has the following responsibilities with respect to NRoB: a) Establish the EPA NRoB for appropriate use and protection of the information and information systems that support EPA missions and functions. Page 13 of 17
14 Senior Agency Information Security Officer (SAISO) 1) The SAISO has the following responsibilities with respect to NRoB: a) Develop, maintain, and distribute Agency-wide information security policies, procedures, and control techniques to provide direction for implementing the requirements of the information security program. b) Develop and maintain the EPA NRoB for appropriate use and protection of information and information systems that support the EPA missions and functions. c) Coordinate with the Director, Office of Technology Operations and Planning (OTOP) in delivering annual awareness training, the EPA NRoB content and tracking user completion of training. Service Manager (SM) 1) SMs have the following responsibilities with respect to NRoB: a) Coordinate with information owners to decide who has access to services along with what types of privileges or access rights are assigned. Ensure service users and support personnel receive the requisite security training (e.g., instruction in RoB). b) Coordinate with information owners to determine if additional RoB are needed beyond those provided in the EPA NRoB and Service Providers RoB for particular services. If additional RoB are needed, SMs will coordinate with information owners to establish and publish the additional RoB. System Owners (SO) 1) SOs have the following responsibilities with respect to NRoB: a) Coordinate with information owners and service managers to determine if any additional RoB are needed beyond those provided in the EPA NRoB for particular systems. If additional RoB are needed, SOs will coordinate with information owners and service managers to establish and publish the additional RoB. Users 1) Users have the following responsibilities with respect to NRoB: a) Comply with CSIRC security notifications immediately upon issue. b) Take immediate action to comply with directives from the CIO to mitigate the impact of any potential security risk, respond to a security incident. c) Report confirmed or suspected information security incidents and violations to the EPA Call Center and other designated entities. EPA CSIRC EPA (4372) (press 1 for security). d) Successfully complete information security awareness training prior to initial access to EPA systems and information and at least annually thereafter. e) Sign or acknowledge electronically or manually the EPA NRoB, and additional RoB for particular systems if established, annually. Page 14 of 17
15 9. DEFINITIONS Access means Ability to make use of any information system (IS) resource. Further, Access means ability and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions. Availability ensuring timely and reliable access to and use of information. Confidentiality preserving restrictions on access and disclosure, including means for protecting personal privacy and proprietary information. Information Security the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. Information System a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. Information Technology (IT) any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by an agency. For purposes of the preceding sentence, equipment is used by an agency if the equipment is used by the agency directly or is used by a contractor under a contract with the agency that (i) requires the use of such equipment or (ii) requires the use, to a significant extent, of such equipment in the performance of a service or the furnishing of a product. The term Information Technology includes computers, ancillary equipment, software, firmware, and similar procedures, services (including support services), and related resources. Integrity guarding against improper modification or destruction of information, including ensuring information nonrepudiation and authenticity. Organization - a federal agency or, as appropriate, any of its operational elements. Need-to-know means a determination within the executive branch in accordance with directives issued pursuant to this policy or procedure that a prospective recipient requires access to specific classified information in order to perform or assist in a lawful and authorized governmental function. Signature (of an individual) a mark or sign made by an individual to signify knowledge, approval, acceptance, or obligation (can be accomplished manually, sometimes referred to as a wet signature, or electronically). User individual or (system) process authorized to access an information system. Written (or in writing) means to officially document the action or decision, either manually or electronically, and includes a signature. 10. WAIVERS N/A Page 15 of 17
16 11. RELATED PROCEDURES, STANDARDS AND GUIDANCE Related policy and procedures are available on OEI s Policy Resources website. Related standards and guidelines are available on OEI s website. 12. MATERIAL SUPERSEDED All previously published Rules of Behavior procedure, guidance, and example RoB documents. 13. ADDITIONAL INFORMATION N/A Ann Dunkin Chief Information Officer U.S. Environmental Protection Agency Page 16 of 17
17 INFORMATION PROCEDURE APPENDIX A: ABBREVIATION & ACRONYMS AO CAN CIO CSIRC CUI EPA FIPS FR GFE ID IMO IO ISO ISSO IT LAN MAN NIST NRoB NSI OMB OTOP P2P PII RoB SAISO SIO SM SO SOR SORN SP SPII USC WAN Authorizing Official Campus Area Network Chief Information Officer Computer Security Incident Response Center Controlled Unclassified Information Environmental Protection Agency Federal Information Processing Standards Federal Register Government Furnished Equipment Identification Information Management Official Information Owner / Steward Information Security Officer Information System Security Officer Information Technology Local Area Network Metropolitan Area Network National Institute of Standards and Technology National Rules of Behavior National Security Information (classified or unclassified information categorized as NSI) Office of Management and Budget Office of Technology Operations and Planning Peer-to-Peer Personally Identifiable Information Rules of Behavior Senior Agency Information Security Official Senior Information Official Service Manager System Owner System of Records System of Records Notice Special Publication Sensitive Personally Identifiable Information United States Code Wide Area Network Page 17 of 17
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
EPA Classification No.: CIO-2150.3-P-02.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM AWARENESS AND TRAINING PROCEDURES V3.1 JULY 18, 2012 1. PURPOSE The purpose of this
General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information
General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information The following rules of behavior apply to all Department of Homeland Security
Standards for Security Categorization of Federal Information and Information Systems
FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology
INFORMATION PROCEDURE
INFORMATION PROCEDURE Information Security - Privacy Procedures Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY PRIVACY PROCEDURES 1. PURPOSE
Appendix A: Rules of Behavior for VA Employees
Appendix A: Rules of Behavior for VA Employees Department of Veterans Affairs (VA) National Rules of Behavior 1 Background a) Section 5723(b)(12) of title 38, United States Code, requires the Assistant
The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015
The Department of Health and Human Services Privacy Awareness Training Fiscal Year 2015 Course Objectives At the end of the course, you will be able to: Define privacy and explain its importance. Identify
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
Privacy Impact Assessment. For. Non-GFE for Remote Access. Date: May 26, 2015. Point of Contact and Author: Michael Gray michael.gray@ed.
For Non-GFE for Remote Access Date: May 26, 2015 Point of Contact and Author: Michael Gray [email protected] System Owner: Allen Hill [email protected] Office of the Chief Information Officer (OCIO)
Order. Directive Number: IM 10-3. Stephen E. Barber Chief Management Officer
Pension Benefit Guaranty Corporation Order Subject: Protecting Sensitive Information Directive Number: IM 10-3 Effective Date: 4/23/08 Originator: OGC Stephen E. Barber Chief Management Officer 1. PURPOSE:
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM
PREFACE TO SELECTED INFORMATION DIRECTIVES CIO Transmittal No.: 15-010 CIO Approval Date: 06/12/2015 Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 CHIEF INFORMATION
Appendix H: End User Rules of Behavior
Appendix H: End User Rules of Behavior 1. Introduction The Office of Management and Budget (OMB) has established the requirement for formally documented Rules of Behavior as set forth in OMB Circular A-130.
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106
APHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
IT Security Handbook. Incident Response and Management: Targeted Collection of Electronic Data
IT Security Handbook Incident Response and Management: Targeted Collection of Electronic Data ITS HBK 2810.09 03 Effective Date: 20110824 Expiration Date: 20130824 Responsible Office: OCIO/ Deputy CIO
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources
Boston Public Schools Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and Scope of Policy Technology Resources ACCEPTABLE USE POLICY AND GUIDELINES Boston
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)
Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
Privacy Incident Handling Guidance
Privacy Incident Handling Guidance Revised January 26, 2012 Basis for Privacy Incident Handling Guidance The following procedures establish governing policies and procedures for Privacy Incident handling
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This
Your Agency Just Had a Privacy Breach Now What?
1 Your Agency Just Had a Privacy Breach Now What? Kathleen Claffie U.S. Customs and Border Protection What is a Breach The loss of control, compromise, unauthorized disclosure, unauthorized acquisition,
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT
Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT I. Purpose This directive provides Department of Homeland
Privacy Impact Assessment (PIA) Waiver Review System (WRS) Version 03.06.01.01. Last Updated: December 2, 2013
United States Department of State (PIA) Waiver Review System (WRS) Version 03.06.01.01 Last Updated: December 2, 2013 Bureau of Administration 1. Contact Information Department of State Privacy Coordinator
Identification and Authentication on FCC Computer Systems
FCC Computer Security TABLE OF CONTENTS Desk Reference 1 INTRODUCTION...1 Identification and Authentication on FCC Computer Systems 1.1 PURPOSE...1 1.2 BACKGROUND...1 1.3 SCOPE...2 1.4 AUTHORITY...2 2
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-32 July 2005 PROCESSING CLASSIFIED
Homeland Security Virtual Assistance Center
for the Homeland Security Virtual Assistance Center November 3, 2008 Contact Point Donald M. Lumpkins National Preparedness Directorate (FEMA) (202) 786-9754 Reviewing Official Hugo Teufel III Chief Privacy
PERSONALLY IDENTIFIABLE INFORMATION (Pin BREACH NOTIFICATION CONTROLS
ClOP CHAPTER 1351.19 PERSONALLY IDENTIFIABLE INFORMATION (Pin BREACH NOTIFICATION CONTROLS TABLE OF CONTENTS SECTION #.1 SECTION #.2 SECTION #.3 SECTION #.4 SECTION #.5 SECTION #.6 SECTION #.7 SECTION
NATIONAL HEALTHCARE SAFETY NETWORK USER RULES OF BEHAVIOR. Version 1.0 08/08/05
NATIONAL HEALTHCARE SAFETY NETWORK USER RULES OF BEHAVIOR Version 1.0 08/08/05 VERSION HISTORY Version # Implemented By Revision Date Reason 1.0 James Tolson 08/08/05 Page 2 of 12 TABLE OF CONTENTS 1 INTRODUCTION...
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
ORDER 1370.108. National Policy. Effective Date 09/21/09. Voice Over Internet Protocol (VoIP) Security Policy SUBJ:
National Policy ORDER 1370.108 Effective Date 09/21/09 SUBJ: Voice Over Internet Protocol (VoIP) Security Policy 1. Purpose of This Order. This Order establishes the Federal Aviation Administration s (FAA)
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Privacy Impact Assessment
AUGUST 16, 2013 Privacy Impact Assessment CIVIL PENALTY FUND AND BUREAU-ADMINISTERED REDRESS PROGRAM Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
DHS SharePoint and Collaboration Sites
for the March 22, 2011 Robert Morningstar Information Systems Security Manager DHS Office of the Chief Information Officer/Enterprise Service Delivery Office (202) 447-0467 Reviewing Official Mary Ellen
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Table of Contents INTRODUCTION AND PURPOSE 1
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 ( HIPAA ) COMPLIANCE PROGRAM Adopted December 2008: Revised February 2009, May, 2012, and August 2013 Table of Contents INTRODUCTION AND PURPOSE
United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)
for the United States Citizenship and Immigration Services (USCIS) June 22, 2007 Contact Point Harry Hopkins Office of Information Technology (OIT) (202) 272-8953 Reviewing Official Hugo Teufel III Chief
Approved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
How To Protect Your Information From Being Hacked By A Hacker
DOL New Hire Training: Computer Security and Privacy Table of Contents Introduction Lesson One: Computer Security Basics Lesson Two: Protecting Personally Identifiable Information (PII) Lesson Three: Appropriate
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Franciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
REVISION: This directive supersedes TSA MD 3700.4, Handling Sensitive Personally Identifiable Information, dated March 13, 2008.
OFFICE OF THE SPECIAL COUNSELOR Privacy TSA MANAGEMENT DIRECTIVE No. 3700.4 To enhance mission performance, TSA is committed to promoting a culture founded on its values of Integrity, Innovation and Team
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
