Security Best Practices: How to make it happen in your firm

Size: px
Start display at page:

Download "Security Best Practices: How to make it happen in your firm"

Transcription

1 Security Best Practices: How to make it happen in your firm Bess Reynolds Laura Ward Ben Ruocco Real Estate Attorney IT Programmer/Audit Coordinator Network Administrator Our firm primarily practices in default-related legal services and creditor rights representation. We have over 34 years of experience with Default Servicing Guidelines and frequently undergo many client audits ranging from simple reviews to full assessments of our entire organization. Our Real Estate practice is no stranger to state and federal regulations and we offer our expertise to those striving for compliance with the CFPB and other organizations. 1

2 Best Practice #3: Adopt and maintain a written privacy and information security program to protect NPI Purpose: Federal and state laws (including the Gramm-Leach-Bliley Act) require title companies (and law firms) to develop a written information security program that describes the procedures they employ to protect Non-public Personal Information (NPI). The program must be appropriate to the Company s size and complexity, the nature and scope of the Company s activities, and the sensitivity of the customer information the Company handles. A Company evaluates and adjusts its program in light of relevant circumstances, including changes in the Company s business or operations, or the results of security testing and monitoring. Physical Security of NPI Network Security of NPI Disposal of NPI Disaster Management Plan Employee Training and Management Oversight of Service Providers Audit and Oversight of Policies and Procedures Notification of Security Breaches to Customers and Law Enforcement 2

3 Physical Security of NPI Building Access: Authorized Personnel Only Consider labeling private doors with signs which will direct visitors to the main entrance. 3

4 Physical Security of NPI Building Access: Visitors Use conference rooms for closings rather than your general work area. If you do, then visitors do NOT need to sign in. Use visitor logs to track who has been in your office as well as key areas like server rooms. This applies to contractors and janitors too. Check ID of visitors you are not familiar with. Use passes to identify visitors in your office. 4

5 Physical Security of NPI Building Access: Unruly Visitors Consider what might happen if a visitor becomes unruly or threatening. Call someone in a different location in the office and use a keyword that triggers them to contact the authorities. Have a secure area your staff can move to. Have other staff ready to help deflate the situation if possible. Install a panic button that will automatically lock other doors and/or call the authorities or others in your office. 5

6 Physical Security of NPI Building Access: Ideas for securing your office Receptionist (open office for visitors but has computer that needs to be locked to desk and has a screen shade; no files other than on computer screen unless they can be placed in a drawer) Conference Room (open office for visitors, contains no equipment except phone and no files) Loan Processor (locked office; contains equipment and files and can be secured at night) Attorney Office (locked office; contains equipment and files and can be secured at night) 6

7 Physical Security of NPI Building Access: Employees and Contractors Be sure to perform background checks on employees and contractors who will be performing work for you. Use Non-Disclosure Agreements (NDAs) and Security Acknowledgement Forms for employees and contractors who will be in your office for any length of time (including janitors). This ensures everyone understands the importance of security and confidentiality while in your office. Be sure to obtain new signatures annually. Collect keys and equipment when employees resign or are terminated. 7

8 Physical Security of NPI Building Access: Annual Acknowledgements In lieu of obtaining new signatures annually for our employees, we have them electronically acknowledge the NDA, Security Awareness, and all of our security policies. This cuts down on paperwork. 8

9 Physical Security of NPI Building Access: Keys Limit who has access and who has keys, especially master keys. Keep extra keys in locked cabinets. Emphasize keys are only to be used by the people to whom they were assigned (no sharing). Consider an electronic access system like key fobs. This way you can control access and maintain logs electronically. 9

10 Physical Security of NPI Building Monitoring: Cameras, motion sensors, alarms Consider cameras for entryways and motion sensors (with alarms) for first floor offices. Contract with a security company for alarms. Be sure computer monitors are facing away from first floor windows. 10

11 Physical Security of NPI Server Room: Environmental Controls Server room (data center) walls must extend from floor to ceiling and environmental controls must be in place (temperature, humidity, fire detection, water detection) This room should be secured separately from other areas and only a few employees should have access. 11

12 Physical Security of NPI Other Environmental Controls & Security Fire codes prohibit the use of items that could possibly start fires. No smoking inside the building No open flames such as candles No heaters No extension cords (user power strips with surge protectors) For areas where the general public or visitors will have access, it is a good idea to actually lock equipment down. 12

13 Physical Security of NPI Equipment Inventory: Maintain a list of all equipment (even equipment not in use) and the location of each item; examples are computers, printers, copiers, servers, monitors, etc. Small items like keyboard do not apply. Number each item and use inventory tags. Remember to make updates as you move equipment. Perform inventories annually; keep documentation including staff acknowledgements listing what equipment they have. 13

14 Physical Security of NPI Building Access Policies and Procedures: Visitors check ID, have them sign a log and wear a badge Unruly Visitors have a process and train your staff Employees perform background checks; have employees sign security forms and NDAs Termination Procedures be sure to collect keys and equipment from employees resigning or being terminated Vendors and Contractors check ID, have them sign a log and wear a badge; either escort them at all times or have them sign security forms and NDAs before they perform work in your office Keys consider electronic access with fobs Monitoring consider cameras at entrances and secure doors, motion sensors with alarms in ground floor offices; if you have a server room, be sure it has environmental controls in place; be mindful of fire codes Equipment Inventory be sure to maintain an inventory of all equipment and keys and perform an inventory annually; have staff sign acknowledgements that they are in possession of equipment/keys annually 14

15 Physical Security of NPI Files and Paper: Keep papers in files and not scattered loosely around the office. This will also keep visitors from seeing information accidentally. Image or scan as much as possible so that you have an electronic copy of your paper files in case documents go missing or in lieu of maintaining paper files. Original documents (if applicable) should be maintained in locked cabinets inside secure rooms with limited access. Mail handling? Yes, be thoughtful about opening and processing mail. Also be thoughtful about mailing papers out. Use certified mail or carriers like UPS/Fedex in order to track packages. 15

16 Physical Security of NPI Clean Desk Policy: Keep files and papers in locked cabinets or offices daily and secure the keys. Use stop signs to let people know you are on vacation or gone for the day. Do a sweep of the area each evening to ensure cabinets or offices are locked and nothing is left out on desks or printers/copiers or in shred boxes. Be sure to also log this information. 16

17 Physical Security of NPI 17

18 Physical Security of NPI Transporting Files: While attending hearings, sales, closings, etc, attorneys may have the need to carry client files with them. It is important to safeguard the information in those files while in transit. Be sure to use locked cases for carrying files and store them in the trunk if you have to leave them in the vehicle. When carrying the files with you, be sure they remain in your possession or lock them in a case if you plan to step out of the room they will be used in. 18

19 Physical Security of NPI Record Retention: There are many thoughts on the length of time you should keep client files. Some regulations require 7-10 years while others only require 3-5. Whichever term your firm adopts, be sure to have a policy and follow it. Storing Files: Your office may not have adequate storage for keeping files for any length of time. There are many off-site storage companies with strong security already in place to safeguard your files. Keep in mind that using an off-site storage facility means you are outsourcing this function and will therefore need to vet this company as you would any vendor or subcontractor (which we will discuss later). 19

20 Physical Security of NPI File Management Policies and Procedures: Files (define the contents) Imaging (list what software is used and the security methods) Original Documents (if applicable) and Secure File Room Mail Handling Clean Desk Policy Transporting Files Record Retention Storing Files (on-site or off-site) 20

21 Network Security of NPI Computer Access: Use your computers/equipment for business purposes only. Limit who has access to your computers. Do not let third parties or contractors have access to your internal network. This includes other agents visiting your office. We maintain a separate network for this purpose. Control who can make changes in your systems like adding/removing software, add/removing user accounts, etc. Assign accounts to individuals and do not share computer accounts. Use strong/complex password configurations such as 8-9 characters combining upper and lower case letters, numbers and special characters and change them every 90 days. Do not share passwords are leave them on desks or taped to computers. Lock your computer when you step away so that no one can see what is on your screen. Aim computers away from windows on the first floor. 21

22 Network Security of NPI Virus Protection: Be sure to have strong anti-virus software that is updated automatically. If using removable media is necessary, run scans on the media prior to using. The following items/practices can allow dangerous content and are therefore discouraged industry-wide: access to social networking sites and streaming sites for music connecting to a cell phone or ipod for music (bring a radio) removable media (thumb drives, CDs, USB devices, etc.) wireless access to your internal network 22

23 Network Security of NPI Vulnerability Testing: External penetration/vulnerability testing (PEN Test) can be done by purchasing inexpensive software which will ping your network for weak points and give you options for increasing your security. 23

24 Network Security of NPI and Internet: Define your and internet Acceptable Use Policy and train staff. Access to social networking sites and streaming sites for music should be prohibited. Make your policy very clear and prohibit personal use. Having a confidentiality banner that users must acknowledge each time they log in is a good reminder for staff. 24

25 Network Security of NPI Computer Configurations: If you re a larger firm, use Group Policy for setting up the majority of your users with the same privileges so that updates can be sent in batches. Review and test the monthly Microsoft updates before pushing them out. List whatever system configurations you use as auditors want to see a list of software on user machines and how confidential data is used in this software. They also want to see system level software or server hardening standards. Software Inventory: Maintain a list of all software, their licenses, and which users have which software. This is important for upgrading software. 25

26 Network Security of NPI Network Diagrams: Auditors want to see network diagrams even for the simplest networks. This conveys to them a sense of your understanding of where the data is residing or being transported. Wireless access to your internal network should be prohibited as there are too many vulnerabilities. Using a separate external network is the standard. 26

27 Network Security of NPI Mobile Devices: If you allow laptops and cell phones to connect to your network, then you should have a Mobile Device Policy. If you are NOT allowing laptops/cell phones, it is a good idea to add this to your security policies also. Laptops be sure they contain hard drive locks where users must use a password before getting to the operating system or software. Maintain anti-virus software and perform the monthly updates to software just like desktop computers. Cell phones Only allow company-owned cell phones with virus software to be used. Personal use of cell phones in the office where confidential data is stored or processed is a bad practice as images of computer screens can be captured. Control the use of thumb drives (or CDs) by scanning with anti-virus software first. Remote Access Limit connections to your internal network to users absolutely needing access and require multi-factor authentication such as a fingerprint scan or phone-call authentication in addition to entering a password. Be sure to use secure connections such as VPN which prohibits split tunneling. 27

28 Network Security of NPI Redaction: Electronic redaction is used with some imaging software and other software such as Adobe (PDF). Be sure to use redaction methods which actually strip the data rather than cover it up (which can possibly be removed). Manual redaction can also be used by printing the document, using a black marker or whiteout to strike through the text, then scanning the document back to your system. Most clients want the word redacted written/typed on top of the whiteout portion for clarity. 28

29 Network Security of NPI Never place NPI in the body of an unless you are sure the system is secure. If you are using a website that you must log into for access, then that is a secure method. Encryption: Encryption sounds very technical but is actually very easy. When encrypting a document, you are adding a password to open the document. Most software programs have password protection options. You can also encrypt a folder that contains many documents, using a compression method like WinZip or 7-zip. Adobe (PDF) File Zip Folder Whichever method you use, always send the password separately from the actual files you are protecting. If you are using a secure system, there is no need to encrypt (or password protect) the file you are sending. 29

30 Network Security of NPI Data/Computer Access Policies and Procedures: Users Only allow employees to access your system, not contractors, and control who can make changes to your system; assign accounts by user rather than sharing accounts. Logging In Use strong passwords, change them often and do not share them; do not store passwords on paper on your desk or taped to computers; lock your computer when stepping away. Virus Protection Use strong anti-virus software and update it frequently; perform vulnerability/penetration testing. /Internet Develop an Acceptable Use Policy and limit/prohibit visiting social networking sites. Network Setup Setup up users in group policy; perform patches/updates; define and list your software configurations at the user and system levels; maintain a software inventory; create a network diagram and prohibit wireless access. Mobile Devices Limit/prohibit cell phones near computers or files; scan thumb drives and CDs for dangerous content; use hard drive locks on laptops; use multi-factor authentication remote access. Redaction Decide which method is best for you and draft a policy. Encryption Safeguard data through by password-protecting files or folders or using a secure system. 30

31 Disposal of NPI Shredding Paper: Place papers containing NPI in locked shred bins rather than trash cans. Either shred them yourself or outsource this function being very careful to vet this vendor as they will have direct access to papers containing NPI. Cleaning Hard Drives: Prior to destroying or donating equipment, it is important to clean the equipment of any and all data and programs. Several software options are on the market that will wipe electronic devices. 31

32 Disaster Management Plan Disaster Recovery Plan (DRP) or Business Continuity Plan (BCP): Think about what you and your staff would do in a disaster or emergency. Scenarios: fire, flood, hurricane, tornado, snow, power outages, one of your servers or your main computer was corrupted by a virus, disgruntled person came into your office and threatened to shoot or explode a bomb, etc. Develop a call tree of all of your employees. Make sure your staff knows who to call in any emergency. Perform drills/tests like fire drills. Document them. Do these at least annually. Document your business dependencies and develop plans for when they are interrupted (e.g. power goes out, Internet Service Provider goes down, etc.). Develop an Incident Response form or report for documenting events. These can be great training tools. Be detailed in what took place before and after. Have a plan, train your staff, test the plan, revise it, test it again 32

33 Employee Training and Management Staff Training/Management: Your staff needs to know more than just their job. Auditors will ask! Hold regular meetings or training sessions to review policies and procedures. Document those sessions and have staff acknowledge that they are aware of the policies, attended the training, and agree to abide by said policies. 33

34 Employee Training and Management Location of Training Materials and Policies: Be prepared to provide auditors with lists of trainings held during the year. Be sure your staff knows where training materials and policies are located. 34

35 Oversight of Service Providers Service Providers: Develop a policy for vetting ALL vendors and service providers. Place them into categories where you can assess risk by whether they will handle NPI or not (Level 1 dealing in no NPI up to Level 4 dealing in NPI directly). Auditors want to be sure you have done your due diligence in establishing relationships with your vendors and service providers. We check our vendors against the Freddie/Fannie Exclusionary lists, FHFA Suspended Counterparty Program, and the Office of Foreign Assets Control (OFAC) Specially Designated Nationals List. We require that they perform background checks on their employees. We require that they notify us of security breaches or customer complaints. We maintain a list of service providers we have approved and annually review this list. We also have a process for evaluating their services and reporting any incidents that may arise through the year. Examples of our services providers are our off-site storage facility, shredding company, background check provider, janitors, etc. 35

36 Audit/Oversight of Policies and Procedures Audit/Oversight: Maintain revision logs of all policies and procedures. Use revision dates in each document. Assign managers/attorneys to be responsible for reviewing all policies at least annually and submitting changes as necessary. Changes can be the result of regulation changes, client directives, changes to your business, etc. Example: Policy Name Revision Date Summary of Changes ABC Policy 2/15/2009 Added language to define ABC. 36

37 Notification of Security Breaches Notification: Either post your privacy and information security information on your websites or provide the information directly to clients. When a breach occurs, you should inform clients and law enforcement as required by law. Examples of breaches are: Data loss or leakage outside your network Stolen equipment containing confidential data Missing or stolen paper files Severe or catastrophic incident Be prepared with restoration scenarios in the above events. Some client may have procedures for you to follow in these instances. 37

38 Security of NPI Other Policies and Procedures: Disposal of NPI shredding and wiping computers Disaster Management Plan plan it, train on it, and test it Employee Training/Management document training Service Providers due diligence with all types of contractors Policies and Procedures revision logs and summary of changes Notification of Security Breaches inform clients and law enforcement 38

39 Conclusion Security is Everyone s Responsibility! Document what you do and do what you say you are doing. If you revise a process, be sure to revise the policy document. Continuously train your staff. Be prepared for audit time. You will be asked about all of the above. Helpful Links: NC Closing Attorney Best Practices Task Force - Real Estate Lawyers Association of NC - American Land Title Association - Consumer Financial Protection Bureau

ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA

ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA PURPOSE PURPOSE This document provides guidance to offices about protecting sensitive customer and company information. The protection of Non-public Personal

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

Cyber Self Assessment

Cyber Self Assessment Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have

More information

HIPAA RISK ASSESSMENT

HIPAA RISK ASSESSMENT HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation

More information

County Identity Theft Prevention Program

County Identity Theft Prevention Program INTRODUCTION CHAPTER OSCEOLA COUNTY IDENTITY THEFT PREVENTION PROGRAM The Osceola County Board of County Commissioners is committed to protecting consumers who do business with Osceola County, and as such

More information

System Security Plan University of Texas Health Science Center School of Public Health

System Security Plan University of Texas Health Science Center School of Public Health System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

31 Ways To Make Your Computer System More Secure

31 Ways To Make Your Computer System More Secure 31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows

More information

Intel Enhanced Data Security Assessment Form

Intel Enhanced Data Security Assessment Form Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

Lauren Hamill, Information Governance Officer. Version Release Author/Reviewer Date Changes (Please identify page no.) 1.0 L.

Lauren Hamill, Information Governance Officer. Version Release Author/Reviewer Date Changes (Please identify page no.) 1.0 L. Document No: IG10d Version: 1.1 Name of Procedure: Third Party Due Diligence Assessment Author: Release Date: Review Date: Lauren Hamill, Information Governance Officer Version Control Version Release

More information

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy June 10, 2015 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT

More information

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)

More information

HIPAA Privacy and Security Risk Assessment and Action Planning

HIPAA Privacy and Security Risk Assessment and Action Planning HIPAA Privacy and Security Risk Assessment and Action Planning Practice Name: Participants: Date: MU Stage: EHR Vendor: Access Control Unique ID and PW for Users (TVS016) Role Based Access (TVS023) Account

More information

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Managed Hosting & Datacentre PCI DSS v2.0 Obligations Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version

More information

Cyber Security Best Practices

Cyber Security Best Practices Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

Small Business IT Risk Assessment

Small Business IT Risk Assessment Small Business IT Risk Assessment Company name: Completed by: Date: Where Do I Begin? A risk assessment is an important step in protecting your customers, employees, and your business, and well as complying

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,

More information

HIPAA Training for Hospice Staff and Volunteers

HIPAA Training for Hospice Staff and Volunteers HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you

More information

Identity Theft Prevention Program Compliance Model

Identity Theft Prevention Program Compliance Model September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All

More information

Data Security John Hopkins Core Operations Manager Melanie Williams, Ph.D. Branch Manager Texas Cancer Registry April 17, 2009

Data Security John Hopkins Core Operations Manager Melanie Williams, Ph.D. Branch Manager Texas Cancer Registry April 17, 2009 Data Security John Hopkins Core Operations Manager. Melanie Williams, Ph.D. Branch Manager Texas Cancer Registry April 17, 2009 Background TCR receives approximately 200,000 reports from over 500 reporters

More information

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud Cloud Computing Chapter 10 Disaster Recovery and Business Continuity and the Cloud Learning Objectives Define and describe business continuity. Define and describe disaster recovery. Describe the benefits

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

Information Security Policy

Information Security Policy Information Security Policy Contents Version: 1 Contents... 1 Introduction... 2 Anti-Virus Software... 3 Media Classification... 4 Media Handling... 5 Media Retention... 6 Media Disposal... 7 Service Providers...

More information

Contents. Instructions for Using Online HIPAA Security Plan Generation Tool

Contents. Instructions for Using Online HIPAA Security Plan Generation Tool Instructions for Using Online HIPAA Security Plan Generation Tool Contents Step 1 Set Up Account... 2 Step 2 : Fill out the main section of the practice information section of the web site.... 3 The next

More information

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared; Page 1 National Organization of Alternative Programs 2014 NOAP Educational Conference HIPAA and Privacy Risks Ira J Rothman, CPHIMS, CIPP/US/IT/E/G Senior Vice President - Privacy Official March 26, 2014

More information

The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014

The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014 The Practice of Internal Controls Cornell Municipal Clerks School July 16, 2014 Page 1 July 18, 2014 Cash Receipts (Collection procedures) Centralize cash collections within a department or for the local

More information

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific

More information

HELPFUL TIPS: MOBILE DEVICE SECURITY

HELPFUL TIPS: MOBILE DEVICE SECURITY HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information

More information

HIPAA: Bigger and More Annoying

HIPAA: Bigger and More Annoying HIPAA: Bigger and More Annoying Instructor: Laney Kay, JD Contact information: 4640 Hunting Hound Lane Marietta, GA 30062 (770) 312-6257 (770) 998-9204 (fax) laney@laneykay.com www.laneykay.com OFFICIAL

More information

SITECATALYST SECURITY

SITECATALYST SECURITY SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance

More information

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...

More information

Aproved by: doron berger Data Security Manager - National Security unit

Aproved by: doron berger Data Security Manager - National Security unit Israel Electric Corporation National Security unit Data Security Security of critical project performed by vendor abroad Aproved by: doron berger Data Security Manager - National Security unit Project

More information

Information Security Plan effective March 1, 2010

Information Security Plan effective March 1, 2010 Information Security Plan effective March 1, 2010 Section Coverage pages I. Objective 1 II. Purpose 1 III. Action Plans 1 IV. Action Steps 1-5 Internal threats 3 External threats 3-4 Addenda A. Document

More information

ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010

ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010 ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010 OBJECTIVE This Security Plan (the Plan ) is intended to create effective administrative, technical and physical safeguards for the protection

More information

Physical Security Policy

Physical Security Policy Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security

More information

PII Compliance Guidelines

PII Compliance Guidelines Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

Information Security Program Management Standard

Information Security Program Management Standard State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES

More information

HIPAA Training for Staff and Volunteers

HIPAA Training for Staff and Volunteers HIPAA Training for Staff and Volunteers Objectives Explain the purpose of the HIPAA privacy, security and breach notification regulations Name three patient privacy rights Discuss what you can do to help

More information

VRH s Internal Customer Service Policy

VRH s Internal Customer Service Policy VRH s Internal Customer Service Policy Excellent customer service depends mainly on two elements: (1) training, and (2) management follow-through. VRH asset managers must always maintain a calm and professional

More information

UCS Level 2 Report Issued to

UCS Level 2 Report Issued to UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs info@mspalliance.com Welcome to the UCS report which stands for Unified Certification

More information

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution. Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR

More information

Risk Assessment Guide

Risk Assessment Guide KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment

More information

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008 AUBURN WATER SYSTEM Identity Theft Prevention Program Effective October 20, 2008 I. PROGRAM ADOPTION Auburn Water System developed this Identity Theft Prevention Program ("Program") pursuant to the Federal

More information

Network Security for End Users in Health Care

Network Security for End Users in Health Care Network Security for End Users in Health Care Virginia Health Information Technology Regional Extension Center is funded by grant #90RC0022/01 from the Office of the National Coordinator for Health Information

More information

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation

More information

INFORMATION SECURITY FOR YOUR AGENCY

INFORMATION SECURITY FOR YOUR AGENCY INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection

More information

HIPAA ephi Security Guidance for Researchers

HIPAA ephi Security Guidance for Researchers What is ephi? ephi stands for Electronic Protected Health Information (PHI). It is any PHI that is stored, accessed, transmitted or received electronically. 1 PHI under HIPAA means any information that

More information

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C. Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.

More information

IT - General Controls Questionnaire

IT - General Controls Questionnaire IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow

More information

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT

More information

Business Checklist for Severe Weather

Business Checklist for Severe Weather Business Checklist for Severe Weather When faced with a hurricane watch or warning, flood warning or other impending potential natural disaster, refer to this checklist for guidelines on how to prepare

More information

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior

More information

Purpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS)

Purpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS) Procedure Credit Card Handling and Security for Departments/Divisions and Elected/Appointed Offices Last Update: January 19, 2016 References: Credit Card Payments Policy Purpose: To comply with the Payment

More information

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS HIPAA Policy, Protection, and Pitfalls Overview HIPAA Privacy Basics What s covered by HIPAA privacy rules, and what isn t? Interlude on the Hands-Off Group Health Plan When does this exception apply,

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts

More information

Physical Protection Policy Sample (Required Written Policy)

Physical Protection Policy Sample (Required Written Policy) Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the

More information

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014 HIPAA PRIVACY AND SECURITY AWARENESS Covering Kids and Families of Indiana April 10, 2014 GOALS AND OBJECTIVES The goal is to provide information to you to promote personal responsibility and behaviors

More information

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Name: Position held: Company Name: Is your organisation ISO27001 accredited: Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:

More information

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help

More information

Effective Date: Subject Matter Experts / Approval(s): TAC: LASO: C/ISO: Front Desk: Technology Support Lead: Agency Head:

Effective Date: Subject Matter Experts / Approval(s): TAC: LASO: C/ISO: Front Desk: Technology Support Lead: Agency Head: Policy Title: Effective Date: Revision Date: Subject Matter Experts / Approval(s): TAC: LASO: C/ISO: Front Desk: Technology Support Lead: Agency Head: Every 2 years or as needed Purpose: The purpose of

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

DSHS CA Security For Providers

DSHS CA Security For Providers DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public

More information

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant Brochure More information from http://www.researchandmarkets.com/reports/3302152/ Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT /

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

Acceptable Usage Guidelines. e-governance

Acceptable Usage Guidelines. e-governance Acceptable Usage Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service) Introduction This document provides a summary of technical information security controls operated by Newcastle University s IT Service (NUIT). These information security controls apply to all NUIT managed

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

Valdosta Technical College. Information Security Plan

Valdosta Technical College. Information Security Plan Valdosta Technical College Information Security 4.4.2 VTC Information Security Description: The Gramm-Leach-Bliley Act requires financial institutions as defined by the Federal Trade Commision to protect

More information

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act) Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act) The GLB Act training packet is part of the Information Security Awareness Training that must be completed by employees. Please visit

More information

Countering and reducing ICT security risks 1. Physical and environmental risks

Countering and reducing ICT security risks 1. Physical and environmental risks Countering and reducing ICT security risks 1. Physical and environmental risks 1. Physical and environmental risks Theft of equipment from staff areas and Theft of equipment from public areas Theft of

More information

VIRGINIA STATE UNIVERSITY RISK ANALYSIS SURVEY INFORMATION TECHNOLOGY

VIRGINIA STATE UNIVERSITY RISK ANALYSIS SURVEY INFORMATION TECHNOLOGY ASSESSABLE UNIT: ENTER THE NAME OF YOUR ASSESSABLE UNIT HERE BUSINESS PROCESS: ENTER YOUR BUSINESS PROCESS HERE BANNER INDEX CODE: ENTER YOUR BANNER INDEX CODE HERE Risk: If you monitor the activity and

More information

Computer Security Policy (Interim)

Computer Security Policy (Interim) Computer Security Policy (Interim) Updated May, 2001 Department of Information Systems & Telecommunications Table of Contents 1. SCOPE...1 2. OVERVIEW...1 3. RESPONSIBILITIES...3 4. PHYSICAL SECURITY...4

More information

ADEC GROUP INFORMaTiON SecURiTY AND CONTROLS

ADEC GROUP INFORMaTiON SecURiTY AND CONTROLS ADEC GROUP INFORMaTiON SecURiTY AND CONTROLS Rising To Global Information Challenges Information is your most valuable commodity today. As a global enterprise servicing a wide range of businesses, ADEC

More information

OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire

OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire OFFICE OF THE STATE AUDITOR Agency: * University Please answer all of the following questions. Where we ask for copies of policies and procedures and other documentation, we would prefer this in electronic

More information

A Brief on the Benefits of Going Green and Taking Your Market Paperless. Why Deploy Document Management in Your Market

A Brief on the Benefits of Going Green and Taking Your Market Paperless. Why Deploy Document Management in Your Market A Brief on the Benefits of Going Green and Taking Your Market Paperless Why Deploy Document Management in Your Market March 11, 2009 Introduction As a leader in your organization and your community, you

More information

PCI DSS COMPLIANCE DATA

PCI DSS COMPLIANCE DATA PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities

More information

Policy Scope: The policy applies across the Division to all DPH workgroups who maintain, use, have access to, or come into contact with IIHI.

Policy Scope: The policy applies across the Division to all DPH workgroups who maintain, use, have access to, or come into contact with IIHI. Title: DPH Current Effective Date: September 22, 2003 Original Effective Date: April 14, 2003 Revision History: April 22, 2004 May 1, 2011 January, 2014 Purpose The purpose of the Division of Public Health

More information

How To Protect Research Data From Being Compromised

How To Protect Research Data From Being Compromised University of Northern Colorado Data Security Policy for Research Projects Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope... 1 4.0 Definitions, Roles, and Requirements... 1 5.0 Sources of Data...

More information

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Data Protection Safeguards Page 1 Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Purpose: The purpose of the Data Protection Safeguards is to provide guidelines for the appropriate

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009

University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009 University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009 Effective Date of this Policy: August 1, 2008 Last Revision: September 1, 2009 Contact for More Information: UDit Internal Auditor

More information

A California Business Privacy Handbook

A California Business Privacy Handbook A California Business Privacy Handbook April 2008 This brochure is for informational purposes and should not be construed as legal advice or as policy of the State of California. If you want advice in

More information

SCRIPT: Security Training

SCRIPT: Security Training SCRIPT: Security Training Slide Name Introduction Overview 1 Overview 2 Overview 3 Text Welcome to the MN WIC Program Security Training Module for all MN WIC Program staff provided by the MN Department

More information