Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
|
|
|
- Trevor Chambers
- 10 years ago
- Views:
Transcription
1 Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose of the Physical Security Rule is to ensure that information, systems and resources are safeguarded against unlawful and unauthorized physical intrusion, as well as fire, flood and other physical threats Scope The Physical Security Rule addresses threats to information, systems and resources that arise from unauthorized access to the University of Utah ( University ) facilities including offices, data centers and similar facilities Rule Statement All information processing facilities shall be physically protected in proportion to the criticality or importance of their function. Physical access procedures shall be documented, and access to such facilities shall be controlled. Access lists shall be reviewed at least quarterly or more frequently depending on the nature of the systems that are being protected Security of Facilities Area Statement: Access to information process facilities shall be controlled Securing Computing Facilities Access to facilities dedicated to information processing (e.g., data centers, operations centers, media libraries, telecommunications rooms, UPS rooms, etc.) shall be physically restricted and access shall only be granted to those users, employees, and third-party consultants, contractors and vendors who have legitimate responsibilities in the facility. Any observed or reported incident of unauthorized access shall be reported immediately to the UIT Data Center Manager and Information Security Office. [Ref: CS078, PCI, HIPAA] Access to facilities shall be authorized based on the frequency and length of time needed for an individual's roles and responsibilities. All requests for permanent access shall be approved by the manager responsible for the computing facility. [Ref: CS079, PCI, HIPAA] The use of electronic access control systems shall be implemented to prevent unauthorized access to computer facilities. The system shall record all entries to the room and/or facility, and be capable of producing printed audit trails. [Ref: CS080, HIPAA]
2 Physical access audit logs shall be maintained in either electronic or printed form for at least two (2) months, be designated Restricted, and be provided security protection commensurate to that classification. Appropriate managers shall review these logs on a daily basis. [Ref: CS081, HIPAA] Access to facilities that are dedicated to computer processing (e.g., data centers, computer rooms) shall be protected by a range of physical controls. Physical controls shall protect: [Ref: CS082, PCI, HIPAA] Buildings that house critical IT facilities against unauthorized access, by using locks, employing security guards and/or providing video surveillance Important papers and removable storage media such as CDs and diskettes against theft or copying, by complying with a ""clear desk"" rule, providing lock-out on unattended terminals, and restricting physical access to important post / fax points Easily portable computers and components against theft, by using physical locks and indelibly marking vulnerable equipment Employees against coercion from malicious third parties by providing duress alarms in susceptible public areas and establishing a process of responding to emergencies In addition, the location of data centers shall not be identified or advertised by signage or other indicators. All information processing facilities shall receive appropriate management approval, authorizing their purpose and use. Approval of the physical security designs shall also be obtained from the Information Security Office prior to utilizing the facility for processing to ensure the relevant security controls have been implemented. [Ref: CS475, PCI, HIPAA] Health and safety practices shall be put in place and maintained in conformance with applicable international, national, regional, state and local laws and regulations. [Ref: CS502, HIPAA] All University data centers shall be protected through the coordinated use of trained personnel who have undergone the proper background checks and local law enforcement. [Ref: CS505, HIPAA] Recordings / videos from cameras used to monitor sensitive areas of computing facilities shall be audited and correlated with other entries. Recordings shall be stored for a minimum of four months, unless otherwise restricted by law. [Ref: CS596, PCI] Construction and Design The following controls shall be implemented in relation to employees and visitor controls at University data centers: [Ref: CS491, PCI] A mantrap or optical turnstile shall be implemented. Design shall consider traffic flow for the proper number of these devices. Optical turnstiles are bi-directional; however,
3 recommended design is for two (2) on each side of reception station (i.e., entry on right, exit on left). A card read in and card read out system shall be implemented through employee controls. Attempt to pass through controls without proper card read will cause an alarm at security desk. All employee entrances other than main lobby shall contain a single person mantrap. Optical turnstile may be applied if staff is on 7X24 basis or when entry is in operation. Loading dock entry shall be controlled by security or other authorized personnel. These personnel shall be present at all times when entry door to dock or loading dock doors are open. Main entry door will be of normal office entry design leading to a lobby where employees, visitors and vendors shall enter. If main entrance has multiple doors these controls may be applied to only one of those doors. All other doors may have standard locks. Entry doors shall be deactivated after hours when locked. Main entry will have the following: [Ref: CS492, PCI] Card reader on exterior for after hour employee entry, if required (7X24 staffing does not require) Door contact (if card reader applied) Electrified lock/strike (controlled by either central access system or security desk for after-hours entry control) Network wiring requires some form of protection since it does not have to be physically penetrated for the data it carries to be revealed or contaminated. The following controls are recommended: [Ref: CS503, PCI] Using a conduit to encase wiring Avoid routing wiring through publicly accessible areas Avoid routing wiring in close proximity to power cables The type of wiring to be used shall also be considered from a security point of view. For instance, signals over fiber are less susceptible to interception than signals over copper cable Physical Entry Controls Doors used for access to computing facilities shall be locked at all times, and when feasible they shall be alarmed. The access cards or badges of individuals who only have temporary access authorization shall be collected prior to departure. [Ref: CS085, HIPAA] Visitors to information processing facilities shall receive proper authorization, shall be provided a pass or badge to be displayed prominently, and provided escort as necessary. Visitors shall be asked to surrender the pass or badge before leaving the facility or at the date of expiration. [Ref: CS086, PCI]
4 All employees, third-party consultants, contractors and vendors are required to challenge and report individuals not displaying a correct access badge or are otherwise unknown. [Ref: CS087, PCI, HIPAA] All employees, third-party consultants, contractors and vendors who do not require continued access to computing facilities in order to perform their job functions are to be considered visitors. [Ref: CS088, PCI, HIPAA] Visitors shall be required to sign a visitor control log, and the Facility Manager shall maintain control logs for at least one (1) year. [CS089, PCI, HIPAA] Badges shall be worn by all employees, contractors, third-party users and visitors and visible at all times while in sensitive University facilities. All employees, contractors, vendors and visitors shall immediately report any lost identification badges. [Ref: CS817, PCI] Access rights to all facilities shall be reviewed on an annual basis. Access to areas deemed secure areas (e.g. computer data centers, security control centers, sensitive storage facilities or production processing centers), shall be reviewed on a quarterly basis. [Ref: CS818, PCI] Securing Offices, Rooms and Facilities Sensitive information resources shall be stored in rooms that can be secured when unattended, and shall not be located in areas accessible to the public or to unauthorized personnel. [Ref: CS090, HIPAA] Office areas containing sensitive information resources shall be locked at the end of each business day. The recommended locking mechanism for room doors is automated. [Ref: CS091, HIPAA] Intruder detection devices shall be implemented in all University data centers to prevent theft and safeguard equipment by alarming appropriate personnel when a response is necessary and to support subsequent forensics. [Ref: CS501, PCI, HIPAA] [Rules] The following intruder detection devices shall be considered: Switches that activate an alarm when an electrical circuit is broken Light and laser beams, ultraviolet beams and sound or vibration detectors that are invisible to the intruder, and ultrasonic and radar devices that detect movement in a room Closed Circuit Television ( CCTV ) that allows observation and recording of actions The following controls shall be considered to secure [sensitive] working areas: [CS092, HIPAA] Employees shall only be made aware of activities within a secured area on a need-toknow basis Sensitive materials shall be locked in secure cabinets immediately after use
5 All desks and screens shall be cleared and workstations locked immediately after use Networked computers shall be password protected and have active screen savers Workstation activity shall be monitored to identify unauthorized access Unsupervised personnel working in secure areas shall be avoided to prevent malicious activities Third-party support services employees shall be granted restricted access to secure areas only when absolutely required Third-party access shall be authorized and monitored Photographic, video, audio or other recording equipment shall not be allowed Working in Secure Areas University personnel, third-party consultants, contractors and vendors are required to adhere to the following rules with respect to the disposal of information in hard copy form: [Ref: CS052, HIPAA] Disposal of Sensitive or Restricted information shall be disposed of in a manner that ensures the information cannot be reconstructed into a usable format. Papers, slides, microfilm, microfiche and photographs containing sensitive information shall be disposed of by cross-shredding or burning. The use of third-party collection and disposal services for disposal of information in hard copy is authorized; however, care shall be exercised in selecting suitable contractors that exercise adequate security controls and have requisite experience. Background checks shall also be considered. Destruction of Restricted information shall be reported to the Information Owner in the form of a certificate of destruction which identifies when data was destroyed, who destroyed it, and means of destruction to permit them to update their records Health & Safety The University shall compile a list of all service providers including data processing service providers, computing and communication providers, general utilities, heating, cooling, power and other providers that perform services or process data for the University and document all service provider related information. This includes: [Ref: CS800, PCI] Service provider contact All emergency service procedures Criticality and administrative units affected by the services Related contracts or service level agreements Security and controls reviews including any SSAE 16 or audit reports
6 01.5 Security of Information Systems Area Statement: Access to workstations, laptops and handheld devices shall be controlled Workstation Protection Access to workstations, laptops, and handheld devices that process sensitive information shall be limited by physical controls in addition to logical security controls. [Ref: CS095, PCI] Systems processing highly sensitive data shall be physically isolated to reduce the opportunities for unauthorized access. This includes restricting physical access to network jacks, wireless access points and gateways at information processing facilities. [Ref: CS096, PCI, HIPAA] Laptop computers shall not be left unattended or unsecured and shall be locked or secured when there is doubt of the security of the physical environment. Laptops shall not be checked in airline luggage systems, but remain in the possession of the traveler as hand luggage. [Ref: CS097, HIPAA] Cabling and line facilities supporting voice and data communications shall be protected with controls consistent with requirements for physical and environmental controls such as alternative power supplies, physical access and environmental management facilities. [CS099, PCI] [Rules] Physical and environmental controls to protect cabling and line facilities include: Voice networks shall be protected with controls to ensure availability of service and security of communications. To minimize the threat of interception or damage, all cable and line facilities for both voice and data shall be secured. Consideration shall be given to the use of shielding, conduit, burial and routing away from uncontrolled areas to meet this requirement. In-house telephone exchanges shall have the capacity to cope with peak workloads and expansion / upgrade capabilities to cope with projected demand. Monitoring of voice and data networks shall include monitoring facility capable of providing reports on usage, traffic and response statistics. In-house telephone exchanges shall be supported by continuity controls such as duplicate processors and function cards, emergency bypass, duplicate groups of exchange lines, access to alternative main exchanges operated by service providers and a source of power capable of coping with prolonged power failures. Additionally, voice and data systems shall be accounted for in all contingency and business continuity plans. Timely repair shall be ensured by the use of maintenance contracts providing agreed response times for in-house telephone exchanges and operator consoles, and for telephone and associated wiring / cables.
7 Identification labels shall be attacked to communications equipment and cables Network / Server Equipment All information resources classified as network equipment (e.g., LAN servers, routers, hubs, modem banks, etc.) shall be located in a secured facility. If possible, it will be housed in a dedicated computer room or data center. If this is not possible, such equipment will be secured in locked rooms, such as the telephone or wiring closets. [Ref: CS103, PCI] Equipment Maintenance A record of all maintenance activities will be maintained and will include the date, incident, modifications and name of the person or persons making the modifications. [Ref: CS107, HIPAA] All transfers, loss, replacement or other physical movement of hardware will be reported according to established procedures within each administrative unit. [Ref: CS108, HIPAA] All Sensitive or Restricted information shall be purged through overwrites prior to hardware being released for off-site maintenance. [Ref: CS109, HIPAA] Security of Equipment Off-Premises The following rules shall be considered when protecting off-site equipment: [Ref: CS112, HIPAA] Equipment and media taken off the premises shall not be left unattended in public places Portable computers shall be carried as hand luggage when traveling Manufacturer's instructions for protecting equipment shall be observed at all times Home office controls shall be determined by a risk assessment and suitable controls applied as appropriate (e.g., lockable filing cabinets, ""clear desk"" policy, access controls on personal computers, etc.) Adequate insurance coverage shall be in place to protect off-site equipment Secure Disposal or Re-Use of Equipment All equipment containing storage media (e.g., fixed hard disks, tapes, diskettes) shall be checked to ensure that any sensitive data and licensed software have been removed or overwritten prior to disposal. If it cannot be sanitized it shall be destroyed or kept unless an exception is granted by the appropriate official. [Ref: CS113, PCI, HIPAA] Damaged storage devices containing sensitive data require a risk assessment to determine if the items shall be destroyed, repaired or discarded. [Ref: CS114, HIPAA]
8 Removal of Equipment Inventories of University resources shall be maintained and spot checks shall be performed to detect unauthorized removal of property. Employees, third-party consultants, contractors and vendors shall be advised that spot checks will take place. [Ref: CS116, HIPAA] Unused Ports and Cables Procedures for controlling physical and logical access to diagnostic and configuration ports shall be established. Access ports that no longer support authorized connections shall be disconnected and unused cables shall be removed from network components. [Ref: CS119, PCI] 01.6 Fire Protection Area Statement: Fire protection controls shall be implemented Monitoring Systems Facility managers shall develop procedures for monitoring and responding to fire incidents. [Ref: CS133, HIPAA] 01.7 Contacts A. Policy Owner: Questions about this Rule should be directed to the CISO, B. Policy Officer: Only the CIO, , has the authority to grant exceptions to this Rule References A. Policy 4-002: Information Resources Policy B. Policy 4-004: University of Utah Information Security Policy C. Data Classification Model 01.9 Policy Meta-Data A. Policy Owner B. Audience C. Status D. Published Date E. Effective Date F. Next Review Date Revision History
ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL
9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent
CITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
PCI Data Security and Classification Standards Summary
PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
Managed Hosting & Datacentre PCI DSS v2.0 Obligations
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed) 01.1 Purpose
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice
Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help
System Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
The second section of the HIPAA Security Rule is related to physical safeguards. Physical safeguards are physical measures, policies and procedures
The second section of the HIPAA Security Rule is related to physical safeguards. Physical safeguards are physical measures, policies and procedures to protect and secure a covered entity s electronic information
Does it state the management commitment and set out the organizational approach to managing information security?
Risk Assessment Check List Information Security Policy 1. Information security policy document Does an Information security policy exist, which is approved by the management, published and communicated
Security Control Standard
Department of the Interior Security Control Standard Physical and Environmental Protection April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
How To Ensure Security At A Site Security Site
Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
Purpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS)
Procedure Credit Card Handling and Security for Departments/Divisions and Elected/Appointed Offices Last Update: January 19, 2016 References: Credit Card Payments Policy Purpose: To comply with the Payment
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Dublin Institute of Technology IT Security Policy
Dublin Institute of Technology IT Security Policy BS7799/ISO27002 standard framework David Scott September 2007 Version Date Prepared By 1.0 13/10/06 David Scott 1.1 18/09/07 David Scott 1.2 26/09/07 David
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Cyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
April 21, 2009 Dines Bjørner: MITS: Models of IT Security: 1. c Dines Bjørner 2006, Fredsvej 11, DK 2840 Holte, Denmark
April 21, 2009 Dines Bjørner: MITS: Models of IT Security: 1 Models of IT Security Security Rules & Regulations: An Interpretation Dines Bjørner Fredsvej 11, DK 2840 Holte, Denmark Presented at Humboldt
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Middleborough Police Electronic Security Narrative
Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Information Security Management. Audit Check List
Information Security Management BS 7799.2:2002 Audit Check List for SANS Author: Val Thiagarajan B.E., M.Comp, CCSE, MCSE, SPS (FW), IT Security Consultant. Approved by: Algis Kibirkstis Owner: SANS Extracts
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
Physical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
State HIPAA Security Policy State of Connecticut
Health Insurance Portability and Accountability Act State HIPAA Security Policy State of Connecticut Release 2.0 November 30 th, 2004 Table of Contents Executive Summary... 1 Policy Definitions... 3 1.
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
State of Vermont. Physical Security for Computer Protection Policy
State of Vermont Physical Security for Computer Protection Policy Date Approved: 04-02-10 Approved by: Tom Pelham Policy Number: 0501.012005 Contents 1.0 Introduction... 3 1.1 Authority... 3 1.2 Purpose...
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
Ohio Supercomputer Center
Ohio Supercomputer Center Portable Security Computing No: Effective: OSC-09 05/27/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data
PCI Training for Retail Jamboree Staff Volunteers Securing Cardholder Data Securing Cardholder Data Introduction This PowerPoint presentation is designed to educate Retail Jamboree Staff volunteers on
HIPAA Privacy and Security Risk Assessment and Action Planning
HIPAA Privacy and Security Risk Assessment and Action Planning Practice Name: Participants: Date: MU Stage: EHR Vendor: Access Control Unique ID and PW for Users (TVS016) Role Based Access (TVS023) Account
HIPAA Security Series
7 Security Standards: Implementation for the Small Provider What is the Security Series? The security series of papers provides guidance from the Centers for Medicare & Medicaid Services (CMS) on the rule
Small Business IT Risk Assessment
Small Business IT Risk Assessment Company name: Completed by: Date: Where Do I Begin? A risk assessment is an important step in protecting your customers, employees, and your business, and well as complying
INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY
INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY 1. PURPOSE In respect to this policy the term physical and environmental security refers to controls taken to protect
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Supply Chain Security Audit Tool - Warehousing/Distribution
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
Course: Information Security Management in e-governance
Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security
ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014
The Practice of Internal Controls Cornell Municipal Clerks School July 16, 2014 Page 1 July 18, 2014 Cash Receipts (Collection procedures) Centralize cash collections within a department or for the local
SECURITY RULE POLICIES AND PROCEDURES
County of Sacramento Health Insurance Portability and Accountability Act (HIPAA) SECURITY RULE POLICIES AND PROCEDURES Issued: February 1, 2005 Effective: April 14, 2005 Revised: January 1, 2010 HIPAA
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE
HIPAA: Bigger and More Annoying
HIPAA: Bigger and More Annoying Instructor: Laney Kay, JD Contact information: 4640 Hunting Hound Lane Marietta, GA 30062 (770) 312-6257 (770) 998-9204 (fax) [email protected] www.laneykay.com OFFICIAL
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1
TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1 Table of Contents 1. Operational Security 2. Physical Security 3. Network
Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy
Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy Access: If you have been granted a Frey Access Card with currently approved access to
Mike Casey Director of IT
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7
Page 1 of 7 1.0 GENERAL 1.1 Related UBC Guidelines.1 Section 17910, 17920 and 17930.2 Section 17100 Cable Infrastructure Overview, sub sections 1.4.9 and 1.5.3 Section 17110 Communication Rooms, sub section
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.
Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems
Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published
ISLAND COUNTY SECURITY POLICIES & PROCEDURES
Health Insurance Portability and Accountability Act (HIPAA) ISLAND COUNTY SECURITY POLICIES & PROCEDURES Island County HIPAA Security Rule Page 1 Table of Contents Table of Contents... 2 Authority... 3
Chapter 84. Information Security Rules for Street Hail Livery Technology System Providers. Table of Contents
Chapter 84 Information Security Rules for Street Hail Livery Technology System Providers Table of Contents 84-01 Scope of the Chapter... 2 84-02 Definitions Specific to this Chapter... 2 83-03 Information
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
