Security Organization & Awareness. Januari, 28/29th th CENTR Security Workshop Brussels Bert ten Brinke

Size: px
Start display at page:

Download "Security Organization & Awareness. Januari, 28/29th 2014 6th CENTR Security Workshop Brussels Bert ten Brinke"

Transcription

1 Security Organization & Awareness Januari, 28/29th th CENTR Security Workshop Brussels Bert ten Brinke

2 Goals Creating a awareness plan Describing the security organization

3 What is necessary regarding ISO27001? 7.1 Resources The organization shall determine and provide the resources needed for the establishment, implementation, maintenance and continual improvement of the information security management system. -> Security Officer role 7.2 Competence The organization shall: a) determine the necessary competence of person(s) doing work under its control that affects its information security performance; -> Security tasks and responsibilities b) ensure that these persons are competent on the basis of appropriate education, training, or experience; -> How? With test? c) where applicable, take actions to acquire the necessary competence, and evaluate the effectiveness of the actions taken; and -> Awareness document d) retain appropriate documented information as evidence of competence. -> of all employees, list of people with ok/nok training

4 What is necessary regarding ISO27001? 7.3 Awareness Persons doing work under the organization s control shall be aware of: the information security policy; -> Everybody must know Homerules (by head :) ) their contribution to the effectiveness of the information security management system, including the benefits of improved information security performance; and ->Security Functions and roles the implications of not conforming with the information security management system requirements. ->Security Functions and roles

5 Working out the ISO27001: Awareness & Training Goal of Security Awareness The aim of the document is to describe all activities which has to be done to train the XYZ Organization in such a way that all employees have sufficient knowledge from security and are sufficient security aware to fulfill their function in a secure way. The aim of the security awareness and training program is that all employees should have had at least 1 training, security meeting or security course. The security officer should: -> Paragraph 7.3 determine what which security capabilities the employees should have. Offer training to comply with these capabilities. Keep a registration of all security trainings. Audit the effectiveness of the training.

6 Awareness?

7 Working out the ISO27001: Awareness & Training Possible types of training Initial training new employees Every new employee should be trained by the security officer. The employee will be told how to behave and how not, where he can find the security policies and company rules and what is in these documents. Every new employee signs in his contract for having read the company rules including security policies. Visiting department meetings The security Officer should visit department meetings ones a year to explain security policies. Security presentations for whole company Security papers on the companies Intranet Security campaigns with as example Flyers on doors or near coffee machines E-learning Employee specific training

8 Security Organization What is necessary regarding ISO27001: 5.3 Organizational roles, responsibilities and authorities Top management shall ensure that the responsibilities and authorities for roles relevant to information security are assigned and communicated. Top management shall assign the responsibility and authority for: a) ensuring that the information security management system conforms to the requirements of this International Standard; and -> Let CEO approve your yearplan b) reporting on the performance of the information security management system to top management. NOTE Top management may also assign responsibilities and authorities for reporting performance of the information security management system within the organization. -> Report to Board

9 Security Organization What is necessary regarding ISO27001: 7.4 Communication The organization shall determine the need for internal and external communications relevant to the information security management system including: a) on what to communicate; b) when to communicate; c) with whom to communicate; d) who shall communicate; and e) the processes by which communication shall be effected.

10 Security Organization document Organization chart Functions and roles -> Separate document Types of security meetings (tasks, frequency, participants) Management participation The CEO proves his engagement with the improvement of the ISMS by: Approve the ISMS; To assure that ISMS plans and targets are fulfilled Establish roles and responsibilities for IS. Underline the importance of IS to employees Making resources available Establish criteria for risk acceptance Doing a ISMS Management Review have supervision on security targets and results

11 Responsibilities of Security Officer & Management Responsibility Owner Overall responsible for Info Security CEO Managing the Security Officer Responsible for maintain ISMS Responsible for updating and controlling ISMS documentation Baselines BIA en Risk Man Implementation of Controls Audits CEO Security officer Security officer Security officer Owner of Information System Owner of Information System Auditor

12 Control of resources The Sec Off determines the yearly needed resources necessary to maintain the ISMS, mitigate the risk conform Risk Treatment Plan and report about the effectiveness from the controls. He should: Improve the ISMS Take care that information security procedures support the overall business processes. Regard compliance to laws and rules. Audit security controls Other documents Separation of duties Acceptable Use Policy

13 Security tasks and responsibilities XYZ functions Within organization XYZ all functions should be described with their Security tasks and responsibilities. Every employee of XYZ Competence Every employee should have knowledge from the homerules and generic policies, procedures and working instructions Tasks Will use assigned autorizations for access to systems and rooms integer. Will treat laptops, and other mobile HW integer and with responsibility Takes care of the clean desk, clear screen policy Takes care of the information classification policy Operates according to the NDA Wears his Access badge visible Escorts visitors Reports security incidents Regards the Acceptable Use Policy Works according roles, policies, procedures working instructions

14 Security tasks description Manager Manager Domain Registration Competence The manager Domain Registration should have knowledge of the ISMS and all its processes. He should have sufficient capabilities to explain all necessary policies, procedures and working instructions to his employees Tasks Stimulates the integration of security in the department Enforces the IS Policy Is responsible for autorizations to applications from his department and uses the need-toknow principle Takes care of separation of duties Checks if employees follow IS Policies, procedures, etc.

15 Questions? Any questions? Don t hesitate to ask!

16 Exercises for participants 1. Design possible trainings and awareness campaigns and design the contents of the Awareness and training document. 10 minutes 2. Design the contents of the Security Organization document. What security meeting structure will be used? 10 minutes 3. Design security competence, tasks and responsibilities for a Operations employee (Linux, networks, eg). 10 minutes 4. What mandatory mailing lists or environment information systems should people follow. How follow what goes on in the rest of the world? 5 minutes

17 Exercises 1 Answers Training and Awareness Security Officer s meeting for training new employees Visiting department meetings Security presentations for whole company Security papers on the companies Intranet Security campaigns with as example Flyers on doors or near coffee machines E-learning Employee specific training

18 Exercises 2 Answers Exercise 2: Contents Organization document Organization chart Functions and roles -> Separate document? Types of security meetings (tasks, frequency, participants) Management participation

19 Assignment 3 Answers Software Developer Competence A SW developper should be able to develop high secure SW, by implementing XYZ and international security standards. He should have a good security programming education Tasks Interpret standards an use these standards in daily work Perform code review against these standards

Risk Management. Januari, 28/29th 2014 6th CENTR Security Workshop Brussels Bert ten Brinke

Risk Management. Januari, 28/29th 2014 6th CENTR Security Workshop Brussels Bert ten Brinke Risk Management Januari, 28/29th 2014 6th CENTR Security Workshop Brussels Bert ten Brinke Goals Participants are able to design their own RM process Participants understand the ISO27001 requirements Participants

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

Information Shield Solution Matrix for CIP Security Standards

Information Shield Solution Matrix for CIP Security Standards Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability

More information

Document Hierarchy of Information Security. Corporate Security Policy. Information Security Standard. General Directive(s) Specific Directive(s)

Document Hierarchy of Information Security. Corporate Security Policy. Information Security Standard. General Directive(s) Specific Directive(s) Document Hierarchy of Information Security General commitment to Information Security Installation of CorpSec Enabling CSO Installing Information Security Standard Corporate Security Policy Defining Assets,

More information

STATE OF ARIZONA Department of Revenue

STATE OF ARIZONA Department of Revenue STATE OF ARIZONA Department of Revenue Douglas A. Ducey Governor September 25, 2015 David Raber Director Debra K. Davenport, CPA Auditor General Office of the Auditor General 2910 North 44 th Street, Suite

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

ISO 9001 Quality Management Systems Professional

ISO 9001 Quality Management Systems Professional ISO 9001 Quality Management Systems Professional Professional Certifications Sample Questions Sample Questions 1. The non-fulfillment of a specified requirement is called a: A. Concession B. Nonconformity

More information

How To Audit Telecommunication Services And Enterprise Security

How To Audit Telecommunication Services And Enterprise Security EXECUTIVE DIGEST TELECOMMUNICATION SERVICES AND ENTERPRISE SECURITY INTRODUCTION This report, issued in March 2002, contains the results of our performance audit* of Telecommunication Services and Enterprise

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

Request for Proposals on Security Audit Services

Request for Proposals on Security Audit Services Request for Proposals on Security Audit Services Version 1.0 Date: 16 December 2011 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F ING Tower, 308 Des Voeux Road Central, Sheung

More information

ISO 14001 & ISO 18001 Legal Compliance Know Your Risk - Reduce your Risk"

ISO 14001 & ISO 18001 Legal Compliance Know Your Risk - Reduce your Risk American Society For Quality -Toronto Section ISO 14001 & ISO 18001 Legal Compliance Know Your Risk - Reduce your Risk" Copyright: Coudenys Management Systems Inc. RISK DEFINED Occurrence of the event

More information

Accreditation of document management and archiving services in Slovenia. From the legislation to the practice

Accreditation of document management and archiving services in Slovenia. From the legislation to the practice Accreditation of document management and archiving services in Slovenia From the legislation to the practice Tatjana Hajtnik,, MA The Archives of the Republic of Slovenia, Head of the Division for E-Archiving

More information

CENTRE (Common Enterprise Resource)

CENTRE (Common Enterprise Resource) CENTRE (Common Enterprise Resource) Systems and Software Engineering Platform designed for CMMI compliance Capability Maturity Model Integration (CMMI) is a process improvement approach that provides organizations

More information

The Encana Service Provider Safety Manual

The Encana Service Provider Safety Manual Practice Service Provider Equipment Specifications & Quality Management Owner: USA Division Safety Revision No: 00 Date last revised: 08/21/2013 1.0 Applicability This practice applies to all Encana Oil

More information

23. The quality management system

23. The quality management system 23. The quality management system Version 2.0 On this page: Mandatory requirements: Extracts from the HFE Act Extracts from licence conditions HFEA guidance: Definition of the quality management system

More information

CONTROLLED DOCUMENT. Traffic Management Policy

CONTROLLED DOCUMENT. Traffic Management Policy CONTROLLED DOCUMENT CATEGORY: CLASSIFICATION: PURPOSE Controlled Number: Document Version Number: 1 Controlled Sponsor: Controlled Lead: Approved By: On: Document Document Policy Governance To set out

More information

Checklist of ISO 22301 Mandatory Documentation

Checklist of ISO 22301 Mandatory Documentation Checklist of ISO 22301 Mandatory Documentation 1) Which documents and records are required? The list below shows the minimum set of documents and records required by ISO 22301:2012 (the standard refers

More information

as4 SOX Compliance at AEB Gesellschaft zur Entwicklung von Branchen-Software mbh

as4 SOX Compliance at AEB Gesellschaft zur Entwicklung von Branchen-Software mbh as4 SOX Compliance at AEB Gesellschaft zur Entwicklung von Branchen-Software mbh January, 2014 1 Basic Information The requirements for service providers, especially those outlined in Section 404 of the

More information

ISO 17025. Laboratory Quality Management. ISO 17025 Course Descriptions. training@qsiamerica.com www.qsiamerica.com

ISO 17025. Laboratory Quality Management. ISO 17025 Course Descriptions. training@qsiamerica.com www.qsiamerica.com ISO 17025 Laboratory Quality Management ISO 17025 Course Descriptions - Fundamentals Course Pg.2 - Documentation & Implementation Course Pg.3 - Auditor Course Pg.4 - Lead Auditor Course Pg.5 - Other Standards

More information

Quality Manual. UK Wide Security Solutions Ltd. 1 QM-001 Quality Manual Issue 1. January 1, 2011

Quality Manual. UK Wide Security Solutions Ltd. 1 QM-001 Quality Manual Issue 1. January 1, 2011 Quality Manual 1 QM-001 Quality Manual Issue 1 January 1, 2011 This document is uncontrolled when printed. Please verify with Quality Management Representative 16 Dukes Close, West Way, Walworth Industrial

More information

ISO 14001:2015 Client Transition Checklist

ISO 14001:2015 Client Transition Checklist ISO 14001:2015 Client Transition Checklist How to use this document: It is not mandatory to use this document. It is a guide to give you an indication of your readiness for audit against ISO 14001:2015.

More information

Course # 55011A. The ITIL Foundation Certificate in IT Service Management

Course # 55011A. The ITIL Foundation Certificate in IT Service Management Course # 55011A The ITIL Foundation Certificate in IT Service Management Course Outline Module 1: Introduction Module 1 includes Service Management as a Practice, Key Roles, Competence and Training describes

More information

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank

More information

Hence to overcome these challenges, it has become imperative to learn these topics and create awareness amongst the employees.

Hence to overcome these challenges, it has become imperative to learn these topics and create awareness amongst the employees. IT Service Management Trainings for Bank Konark Solutions and Services (KS&S) is an organization with Industry expert trainers and consultants. KS&S provides a wide range of Industry specific trainings

More information

Security Awareness Program Learning Objectives. By Aron Warren Last Update 6/29/2012

Security Awareness Program Learning Objectives. By Aron Warren Last Update 6/29/2012 Security Awareness Program Learning Objectives By Aron Warren Last Update 6/29/2012 Module 1: You are a target You are a target Explain how employees are a target from both domestic and foreign threats.

More information

IRAP Policy and Procedures up to date as of 16 September 2014.

IRAP Policy and Procedures up to date as of 16 September 2014. Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and

More information

CENTR Security Working Group

CENTR Security Working Group Security Working Group Bert ten Brinke TF-CSIRT Tallinn September 2015 Contents Presentation What is CENTR? CENTR GA CENTR Jamboree CENTR Working Groups CENTR Security Working Group Security WG Workshop

More information

Onboarding Checklist for Hiring Managers TEMPLATE

Onboarding Checklist for Hiring Managers TEMPLATE Onboarding is a long-term process that begins before your new employee arrives. It should continue for at least the first six months, and, ideally, through the first year. The idea is to improve your new

More information

Identity Theft Prevention Program Compliance Model

Identity Theft Prevention Program Compliance Model September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All

More information

ISMS Implementation Guide

ISMS Implementation Guide atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation

More information

Service Asset & Configuration Management PinkVERIFY

Service Asset & Configuration Management PinkVERIFY -11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to

More information

Security Control Standard

Security Control Standard Security Standard The security and risk management baseline for the lottery sector worldwide Updated by the WLA Security and Risk Management Committee V1.0, November 2006 The WLA Security Standard is the

More information

CENTRE (Common Enterprise Resource)

CENTRE (Common Enterprise Resource) CENTRE (Common Enterprise Resource) Systems and Software Engineering Platform designed for CMMI compliance Capability Maturity Model Integration (CMMI) is a process improvement approach that provides organizations

More information

COBIT Helps Organizations Meet Performance and Compliance Requirements

COBIT Helps Organizations Meet Performance and Compliance Requirements DISCUSS THIS ARTICLE COBIT Helps Organizations Meet Performance and Compliance Requirements By Sreechith Radhakrishnan, COBIT Certified Assessor, ISO/IEC 20000 LA, ISO/IEC 27001 LA, ISO22301 LA, ITIL Expert,

More information

Criminal Injuries Compensation Authority. Data protection audit report

Criminal Injuries Compensation Authority. Data protection audit report Criminal Injuries Compensation Authority Data protection audit report Executive summary January 2016 1. Background The Information Commissioner is responsible for enforcing and promoting compliance with

More information

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11 Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 26/10/2015 HSCIC Audit of Data Sharing

More information

Concepts for a standard based crossorganizational information security management system in the context of a nationwide EHR

Concepts for a standard based crossorganizational information security management system in the context of a nationwide EHR Concepts for a standard based crossorganizational information security management system in the context of a nationwide EHR Alexander Mense University of Applied Sciences Technikum Wien MedInfo 2013 August

More information

Enabling Compliance Requirements using ISMS Framework (ISO27001)

Enabling Compliance Requirements using ISMS Framework (ISO27001) Enabling Compliance Requirements using ISMS Framework (ISO27001) Shankar Subramaniyan Manager (GRC) Wipro Consulting Services Shankar.subramaniyan@wipro.com 10/21/09 1 Key Objectives Overview on ISO27001

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Quality Management System Manual

Quality Management System Manual Effective Date: 03/08/2011 Page: 1 of 17 Quality Management System Manual Thomas C. West Eric Weagle Stephen Oliver President ISO Management General Manager Representative Effective Date: 03/08/2011 Page:

More information

White Paper. Comparison of ISO/IEC 20000 with ASL and BiSL

White Paper. Comparison of ISO/IEC 20000 with ASL and BiSL White Paper Comparison of ISO/IEC 20000 with ASL and BiSL Both ISO/IEC 20000 and ASL offer guidance for IT Service Providers, ISO/IEC 20000 giving broad guidance for IT Service Management and ASL focusing

More information

Implementing ISO 9000 Quality Management System

Implementing ISO 9000 Quality Management System Implementing ISO 9000 Quality Management System Implementation of ISO 9000 affects the entire organization right from the start. If pursued with total dedication, it results in 'cultural transition' to

More information

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...

More information

PII Compliance Guidelines

PII Compliance Guidelines Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last

More information

GAIA Service Catalogs: A Framework for the Construction of IT Service Catalogs

GAIA Service Catalogs: A Framework for the Construction of IT Service Catalogs Revista de Sistemas de Informação da FSMA n. 14 (2014) pp. 11-25 http://www.fsma.edu.br/si/sistemas.html GAIA Service Catalogs: A Framework for the Construction of IT Service Catalogs Luiz Henrique Taconi,

More information

The Advantages of Using CENTRE

The Advantages of Using CENTRE CENTRE (Common Enterprise Resource) Systems and Software Engineering Platform designed for CMMI compliance Capability Maturity Model Integration (CMMI) is a process improvement approach that provides organizations

More information

CENTRE (Common Enterprise Resource)

CENTRE (Common Enterprise Resource) CENTRE (Common Enterprise Resource) Systems and Software Engineering Platform designed for CMMI compliance Capability Maturity Model Integration (CMMI) is a process improvement approach that provides organizations

More information

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy Page 1 of 10 Contents 1 Preamble...3 2 Purpose...3 3 Scope...3 4 Roles and responsibilities...3

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

COLORADO MEDICAL BOARD RULES AND REGULATIONS FOR LICENSURE OF AND PRACTICE BY PHYSICIAN ASSISTANTS (PAs) INTRODUCTION

COLORADO MEDICAL BOARD RULES AND REGULATIONS FOR LICENSURE OF AND PRACTICE BY PHYSICIAN ASSISTANTS (PAs) INTRODUCTION Rule 400 3 CCR 713-7 COLORADO MEDICAL BOARD RULES AND REGULATIONS FOR LICENSURE OF AND PRACTICE BY PHYSICIAN ASSISTANTS (PAs) INTRODUCTION BASIS. The authority for promulgation of Rule 400 ( these Rules

More information

IACS QUALITY MANAGEMENT SYSTEM CERTIFICATION SCHEME (QSCS)

IACS QUALITY MANAGEMENT SYSTEM CERTIFICATION SCHEME (QSCS) QA/1.0 IACS QUALITY MANAGEMENT SYSTEM CERTIFICATION SCHEME (QSCS) DESCRIPTION OF THE SCHEME 11 th EDITION 1 PURPOSE 1.1 The purpose of this document is to provide general information on the IACS Quality

More information

Aproved by: doron berger Data Security Manager - National Security unit

Aproved by: doron berger Data Security Manager - National Security unit Israel Electric Corporation National Security unit Data Security Security of critical project performed by vendor abroad Aproved by: doron berger Data Security Manager - National Security unit Project

More information

Understanding Principles and Concepts of Quality, Safety and Environmental Management System Graham Caddies

Understanding Principles and Concepts of Quality, Safety and Environmental Management System Graham Caddies Understanding Principles and Concepts of Quality, Safety and Environmental Management System Graham Caddies Owner / Principal Advance Profitplan Understanding Principles & Concepts Page 1 of 10 Revision

More information

SUPPORT TO KOSOVO INSTITUTIONS IN THE FIELD OF FOR PROTECTION OF PERSONAL DATA

SUPPORT TO KOSOVO INSTITUTIONS IN THE FIELD OF FOR PROTECTION OF PERSONAL DATA INSTRUMENT FOR PRE ACCESSION ANNUAL PROGRAM 2012 SUPPORT TO KOSOVO INSTITUTIONS IN THE FIELD OF FOR PROTECTION OF PERSONAL DATA Project number: Europe Aid/133806/C/SER/XK Contract number: 2013/333-753

More information

Programs Implementing Management System Elements AT&T Environment, Health and Safety Management System ISO 14001 EMS Element 4.1General 4.

Programs Implementing Management System Elements AT&T Environment, Health and Safety Management System ISO 14001 EMS Element 4.1General 4. Conformity with ISO 14001 Environmental Management Systems AT&T developed a combined Environment, Health and Safety (EH&S) Management System, which is designed to use elements of ISO 14001 EMS standard

More information

TOTAL QUALITY MANAGEMENT II QUALITY AUDIT

TOTAL QUALITY MANAGEMENT II QUALITY AUDIT TOTAL QUALITY MANAGEMENT II Chapter 13: QUALITY AUDIT Dr. Shyamal Gomes Introduction: The term audit was defined in the 16th Century as the official examination of the accounts with verification by reference

More information

Safety Management System Manual Guidebook

Safety Management System Manual Guidebook Safety Management System Manual Guidebook Developed by: Commandant (G-MSO-2) U.S. Coast Guard Table of Contents Chapter 1: Introduction 1 Chapter 2: Safety and Environmental Protection Policy 3 Chapter

More information

Service Desk Level 2 Service Description

Service Desk Level 2 Service Description Service Desk Level 2 Service Description Copyright Copyright Atea Group. All rights reserved. This document may not be reproduced, in whole or in part, in any form or any language, except for the client

More information

Governance and Management of Information Security

Governance and Management of Information Security Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS HIPAA Policy, Protection, and Pitfalls Overview HIPAA Privacy Basics What s covered by HIPAA privacy rules, and what isn t? Interlude on the Hands-Off Group Health Plan When does this exception apply,

More information

CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY

CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY The Council s document management policy is intended to cover all documents produced and held by the

More information

ISO 20000-1:2005 Requirements Summary

ISO 20000-1:2005 Requirements Summary Contents 3. Requirements for a Management System... 3 3.1 Management Responsibility... 3 3.2 Documentation Requirements... 3 3.3 Competence, Awareness, and Training... 4 4. Planning and Implementing Service

More information

Scope Accreditation of Vessel Inspectors:

Scope Accreditation of Vessel Inspectors: www.imca-int.com Scope Accreditation of Vessel Inspectors: Use of IMCA P03 Competence Framework for Accreditation of Vessel Inspectors Accreditation process Aim and objectives Training and continuous personal

More information

Seven Requirements for Successfully Implementing Information Security Policies and Standards

Seven Requirements for Successfully Implementing Information Security Policies and Standards Seven Requirements for Successfully Implementing and Standards A guide for executives Stan Stahl, Ph.D., President, Citadel Information Group Kimberly A. Pease, CISSP, Vice President, Citadel Information

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

System Security Plan University of Texas Health Science Center School of Public Health

System Security Plan University of Texas Health Science Center School of Public Health System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many

More information

IT Governance: The benefits of an Information Security Management System

IT Governance: The benefits of an Information Security Management System IT Governance: The benefits of an Information Security Management System Katerina Cai, CISSP Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to

More information

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 jmadeja@buchananassociates.com Each business is required by Massachusetts law

More information

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information

More information

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: OCCUPATIONAL GROUP: Information Technology CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: This family of positions provides security and monitoring for the transmission of information in voice, data,

More information

Service Management Policy

Service Management Policy Service Management Policy XIT-POL-006 Policy - PUBLIC- Author Jan Pavel Version 1.4 Status Reviewed by Approved by Responsible Final Tomas Kucera Tomas Kucera Pavel JANÁK Valid from 9.6.2010 Scope Whole

More information

Utica College. Information Security Plan

Utica College. Information Security Plan Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles

More information

2014 Financial Services Industry Compliance Benchmark Study

2014 Financial Services Industry Compliance Benchmark Study 2014 Financial Services Industry Compliance Benchmark Study Presented By: and Executive Summary Beginning in early December 2013, SAI Global Compliance conducted a survey among compliance professionals

More information

UNCLASSIFIED. Victorian Protective Data Security Framework (VPDSF) ROSETTA STONE

UNCLASSIFIED. Victorian Protective Data Security Framework (VPDSF) ROSETTA STONE 1 Security Management Framework 1. Information Security Management Structure 2. Security Roles (Security Exec, ASA, ITSA) 40. Identify and document legal GOV-2 Security Roles (Security Executive, ASA and

More information

TITLE III INFORMATION SECURITY

TITLE III INFORMATION SECURITY H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable

More information

This is Document Schedule 5 Part 1 referred to in this Contract SCOTTISH MINISTERS REQUIREMENTS SCHEDULE 5 PART 1 QUALITY MANAGEMENT SYSTEM

This is Document Schedule 5 Part 1 referred to in this Contract SCOTTISH MINISTERS REQUIREMENTS SCHEDULE 5 PART 1 QUALITY MANAGEMENT SYSTEM This is Document Schedule 5 Part 1 referred to in this Contract SCOTTISH MINISTERS REQUIREMENTS SCHEDULE 5 PART 1 QUALITY MANAGEMENT SYSTEM CONTENTS Page No 1 GENERAL REQUIREMENTS 1 1.1 Requirements 1

More information

Information Security Management System (ISMS) Policy

Information Security Management System (ISMS) Policy Information Security Management System (ISMS) Policy April 2015 Version 1.0 Version History Version Date Detail Author 0.1 18/02/2015 First draft Andy Turton 0.2 20/02/2015 Updated following feedback from

More information

Jonathan Wilson. Sector Manager (Health & Safety)

Jonathan Wilson. Sector Manager (Health & Safety) Jonathan Wilson Sector Manager (Health & Safety) OHSAS 18001:2007 Making Life Easier For Health & Safety Managers Workshop Agenda 1. Introduction 2. Why Manage Health & Safety 3. OHSAS 18001 and OHSMS

More information

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant Brochure More information from http://www.researchandmarkets.com/reports/3302152/ Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT /

More information

A Risk Based Thinking Model for ISO 9001:2015

A Risk Based Thinking Model for ISO 9001:2015 A Risk Based Thinking Model for ISO 9001:2015 Bob Deysher Senior Consultant 2014 QSG, Inc. Agenda Why implement Risk Based Thinking? What does ISO 9001:2015 require? What is Risk Based Thinking? What is

More information

Chapter 1. The ISO 9001:2000 Standard and Certification Process

Chapter 1. The ISO 9001:2000 Standard and Certification Process CH01_pp.001-008 15/08/01 12.15 pm Page 1 Chapter 1 The ISO 9001:2000 Standard and Certification Process Overview Introduction This chapter describes the ISO 9000 Standards, ISO 9001:2000 concepts, and

More information

Information Security Awareness Training

Information Security Awareness Training Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information

More information

Security Management Practices. Keith A. Watson, CISSP CERIAS

Security Management Practices. Keith A. Watson, CISSP CERIAS Security Management Practices Keith A. Watson, CISSP CERIAS Overview The CIA Security Governance Policies, Procedures, etc. Organizational Structures Roles and Responsibilities Information Classification

More information

ENVIRONMENTAL POLICY & MANAGEMENT SYSTEM GUIDE

ENVIRONMENTAL POLICY & MANAGEMENT SYSTEM GUIDE ENVIRONMENTAL POLICY & MANAGEMENT SYSTEM GUIDE 1 Statement of Intent Corps Security aims to create and maintain through staff awareness, the highest level of environmental responsibility. We regard the

More information

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)

More information

ISO 27000 Information Security Management Systems Professional

ISO 27000 Information Security Management Systems Professional ISO 27000 Information Security Management Systems Professional Professional Certifications Sample Questions Sample Questions 1. A single framework of business continuity plans should be maintained to ensure

More information

Quality Manual ALABAMA RESEARCH & DEVELOPMENT. This Quality Manual complies with the Requirements of ISO 9001:2008.

Quality Manual ALABAMA RESEARCH & DEVELOPMENT. This Quality Manual complies with the Requirements of ISO 9001:2008. ALABAMA RESEARCH & DEVELOPMENT This complies with the Requirements of ISO 9001:2008. Prepared By: Phyllis Olsen Release Date: 03/19/09 Quality Policy & Objectives s quality policy is to achieve sustained,

More information

REGIONAL CENTRE EUROPE OF THE INTERNATIONAL FEDERATION OF TRANSLATORS

REGIONAL CENTRE EUROPE OF THE INTERNATIONAL FEDERATION OF TRANSLATORS Recommendations on Criteria for Conformity Assessment and Certification under EN 15038 (The numbering of the sections below follows the numbering in the Standard) Note: In the light of practical experience

More information

How To Implement An Information Security Management System

How To Implement An Information Security Management System ISO/IEC 27001 Informa2on Security Management System Presented by Daminda Perera 26/07/2008 ISO/IEC 27001:2005 Informa@on technology Security techniques Informa@on security management systems Requirements

More information

Guideline for Roles & Responsibilities in Information Asset Management

Guideline for Roles & Responsibilities in Information Asset Management ISO 27001 Implementer s Forum Guideline for Roles & Responsibilities in Information Asset Management Document ID ISMS/GL/ 003 Classification Internal Use Only Version Number Initial Owner Issue Date 07-08-2009

More information

Johnson Controls Privacy Notice

Johnson Controls Privacy Notice Johnson Controls Privacy Notice Johnson Controls, Inc. and its affiliated companies (collectively Johnson Controls, we, us or our) care about your privacy and are committed to protecting your personal

More information

ISO/IEC 20000 IT Service Management - Benefits and Requirements for Service Providers and Customers

ISO/IEC 20000 IT Service Management - Benefits and Requirements for Service Providers and Customers ISO/IEC 20000 IT Service Management - Benefits and Requirements for Service Providers and Customers Authors Ralf Buchsein, Manager, KESS DV-Beratung GmbH Klaus Dettmer, Product Manager, iet Solutions GmbH

More information

Proving Control of the Infrastructure

Proving Control of the Infrastructure WHITE paper The need for independent detective controls within Change/Configuration Management page 2 page 3 page 4 page 6 page 7 Getting Control The Control Triad: Preventive, Detective and Corrective

More information

Preparation Guide. EXIN IT Service Management Associate based on ISO/IEC 20000

Preparation Guide. EXIN IT Service Management Associate based on ISO/IEC 20000 Preparation Guide EXIN IT Service Management Associate based on ISO/IEC 20000 Edition January 2014 Copyright 2014 EXIN All rights reserved. No part of this publication may be published, reproduced, copied

More information

Group Guidelines Management Consulting and Lobbying

Group Guidelines Management Consulting and Lobbying Group Guidelines Management Consulting and Lobbying Integrity is the Basis of Our Business. honest. fair. transparent. January 2016 Corporate Guidelines Management Consulting and Lobbying January 2016

More information

Preparation Guide. EXIN IT Service Management Associate Bridge based on ISO/IEC 20000

Preparation Guide. EXIN IT Service Management Associate Bridge based on ISO/IEC 20000 Preparation Guide EXIN IT Service Management Associate Bridge based on ISO/IEC 20000 Edition January 2014 Copyright 2014 EXIN All rights reserved. No part of this publication may be published, reproduced,

More information