Policy Document. Communications and Operation Management Policy
|
|
|
- Solomon Tate
- 10 years ago
- Views:
Transcription
1 Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11
2 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author Mark Hanwell Filename Communications and Operation Management Policy.doc Owner Mark Hanwell ICT Transformation Manager Subject Communications and Operation Management Policy Protective Marking Unclassified Review date 23/08/2011 Revision History Revision Date Revisor Previous Version Description of Revision Document Approvals This document requires the following approvals: Sponsor Approval Name Date Head of Business Transformation Deborah Poole 23 rd August 2011 Document Distribution This document will be distributed to: Name Job Title Address Page 2 of 11
3 Contents 1 Policy Statement 4 2 Purpose 4 3 Scope 4 4 Definition 4 5 Risks 4 6 Applying the Policy Operational Procedures and Responsibilities Documented Operating Procedures Change Management Separation of Development, Test and Operational Facilities System Planning and Acceptance Capacity Planning System Acceptance Protection against Malicious and Mobile Code Patching Controls against Malicious and Mobile Code Examples of Malicious and Mobile Code Backups Information Backup Information Restore Storage Media Handling Management of Removable Media Physical Storage Media in Transit Disposal of Storage Media Security of System Documentation Monitoring Audit Logging for Restricted Data and GCSx Service Administrator and Operator Logs Clock Synchronisation Network Management Network Controls Wireless Networks Systems Development and Maintenance Protection of System Test Data Annual Health Check 10 7 Policy Compliance 10 8 Policy Governance 10 9 Review and Revision References Key Messages 11 Page 3 of 11
4 1 Policy Statement Redditch Borough Council will ensure the protection of the Council IT service (including any information systems and information processing equipment used by the Council) against malware and malicious and mobile code. Only authorised changes will be made to the Council IT service (including any information systems and information processing equipment). Information leakage will be prevented by secure controls. 2 Purpose This policy covers the key areas in day to day operations management of the Council s IT services. This policy exists to protect the information and IT Infrastructure owned by Redditch Borough Council and to ensure people are aware of any restrictions in their use. 3 Scope This policy applies to all Redditch Borough Council Councillors, Committees, Departments, Partners, Employees of the Council, contractual third parties and agents of the Council with access to Redditch Borough Council s IT facilities and equipment. All users have a role to play and a contribution to make to the safe and secure use of technology and the information that it holds. 4 Definition This policy should be applied whenever users access Redditch Borough Council s IT facilities and equipment, and especially when managing, developing, configuring or maintaining Redditch Borough Council s IT facilities and equipment. Local procedures, standards and work instructions may be defined in the appendices to allow flexibility of organisational practices. This policy provides a minimum requirement to be met under nationally recognised standards. 5 Risks Redditch Borough Council recognises that there are risks associated with users accessing and handling information in order to conduct official Council business. This policy aims to mitigate the following risks: The non-reporting of information security incidents, inadequate destruction of data, the loss of direct control of user access to information systems and facilities etc.]. Malware and malicious and mobile code. Information leakage. Un-authorised changes Page 4 of 11
5 6 Applying the Policy 6.1 Operational Procedures and Responsibilities Documented Operating Procedures Operating procedures are used in all day to day maintenance of Redditch Borough Council IT systems and infrastructure in order to ensure the highest possible service from these assets. These operating procedures must be documented to an appropriate level of detail for the departmental team that will be using them Change Management Changes to the Council s operational systems must be controlled with a formally documented change control procedure. The change control procedure should include references to: A description of the change and business reasons. Information concerning the testing phase. Impact assessment including security, operations and risk. Formal approval process. Communication to all relevant people of the changes. Procedures for aborting and rolling back if problems occur. Process for tracking and audit. All significant changes to the main infrastructure (e.g. Network, Directories) need to be assessed for their impact on information security as part of the standard risk assessment Separation of Development, Test and Operational Facilities 1 The development and test environments will be separate from the live operational environment to reduce the risk of accidental changes or unauthorised access. 6.2 System Planning and Acceptance Capacity Planning All Redditch Borough Council IT infrastructure components or facilities are covered by capacity planning and replacement strategies to ensure that increased power and data storage requirements can be addressed and fulfilled in a timely manner. Key IT infrastructure components include, but are not restricted to, the following: File servers. Domain servers. servers. Web servers. Printers. Networks. Environmental controls including air conditioning. 1 This should include reference to authorisation levels and references to 3 rd party capabilities Page 5 of 11
6 6.2.2 System Acceptance All departments must inform ICT via the Helpdesk of any new product requirements or of any upgrades, service packs, patches or fixes required to existing systems. All new products must be purchased through the ICT. New information systems, product upgrades, patches and fixes must all undergo an appropriate level of testing prior to acceptance and release into the live environment. The acceptance criteria must be clearly identified, agreed and documented and should involve management authorisation. 3 rd party applications must also be monitored for service packs and patches. Major system upgrades must be thoroughly tested in parallel with the existing system in a safe test environment that duplicates the operational system. 6.3 Protection against Malicious and Mobile Code Appropriate steps are taken to protect all Redditch Borough Council IT systems, infrastructure and information against malicious code. Effective and up-to-date anti-virus software is run on all servers and PCs. Redditch Borough Council staff are responsible for ensuring that they do not introduce malicious code into Redditch Borough Council IT systems as stated within the Software Policy. Where a virus is detected on a Redditch Borough Council system, the individual must contact the ICT Helpdesk Patching All servers must have appropriate critical security patches applied as soon as they become available and have passed the system acceptance testing. All other patches must be applied as appropriate. Patches must be applied to all software on the Council network where appropriate. Unpatchable software must not be used where there is a GCSx connection provided. There must be a full record of which patches have been applied and when Controls against Malicious and Mobile Code In order to prevent malicious and mobile code, appropriate access controls (e.g. administration / user rights) shall be put in place to prevent installation of software by all users. Requests for software installation shall only be accepted where there is a clear technical verification. Anti-malware software will be installed on appropriate points on the network and on hosts Examples of Malicious and Mobile Code Mobile code represents newer technologies often found in web pages and s, and includes, but is not limited to: Page 6 of 11
7 ActiveX. Java. JavaScript. VBScript. Macros. HTTPS. HTML. 6.4 Backups Information Backup Regular backups of essential business information must be taken to ensure that the Council can recover from a disaster, media failure or error. An appropriate backup cycle must be used and fully documented. Any 3 rd parties that store Council information must also be required to ensure that the information is backed up. Full backup documentation, including a complete record of what has been backed up along with the recovery procedure, must be stored at an off site location in addition to the copy at the main site and be readily accessible. This must also be accompanied by an appropriate set of media tapes and stored in a secure area. The remote location must be sufficiently remote to avoid being affected by any disaster that takes place at the main site Information Restore Full documentation of the recovery procedure must be created and stored. Regular restores of information from back up media must be tested to ensure the reliability of the back up media and restore process and this should comply with the agreed change management process. 6.5 Storage Media Handling Storage media includes, but is not restricted, to the following: Computer Hard Drives (both internal and external). CDs. DVDs. Optical Disks USB Memory Sticks Media Card Readers. MP3 Players. Digital Cameras. Backup Cassettes. Audio Tapes (including Dictaphones and Answering Machines) Management of Removable Media Removable computer media (e.g. tapes, disks, cassettes and printed reports) must be protected to prevent damage, theft or unauthorised access. Documented procedures must be kept for backup tapes that are removed on a regular rotation from Council buildings. Media stores must be kept in a secure environment. Appropriate arrangements Page 7 of 11
8 must be put in place to ensure future availability of data that is required beyond the lifetime of the backup media. For further information, please refer to Removable Media Policy Physical Storage Media in Transit Storage media being transported must be protected from unauthorised access, misuse or corruption. Where couriers are required a list of reliable and trusted couriers should be established. If appropriate, physical controls such as encryption or special locked containers should also be used. For further information, please refer to Removable Media Policy Disposal of Storage Media Storage media that is no longer required must be disposed of safely and securely to avoid data leakage. Any previous contents of any reusable storage media that are to be removed from the Council must be erased. This must be a thorough removal of all data from the storage media to avoid the potential of data leakage. For further information, please refer to Removable Media Policy Security of System Documentation System documentation must be protected from unauthorised access. This includes bespoke documentation that has been created by ICT staff. This does not include generic manuals that have been supplied with software. Examples of the documentation to be protected include, but are not restricted to, descriptions of: Applications. Processes. Procedures. Data structures. Authorisation details. Effective version control should be applied to all documentation and documentation storage. 6.6 Monitoring Audit Logging for Restricted Data and GCSx Services Audit logs must be kept for a minimum of six months which record exceptions and other security related events 2. As a minimum audit logs must contain the following information: System identity. User ID. Successful/Unsuccessful login. Successful/Unsuccessful logoff. 2 It is good practice to keep all audit logs for 6 months Page 8 of 11
9 Unauthorised application access. Changes to system configurations. Use of privileged accounts (e.g. account management, policy changes, device configuration). Access to the logs must be protected from unauthorised access that could result in recorded information being altered or deleted. Where appropriate, classified data should be stored separately from non-classified data. Data sent or received via GCSx must be stored separately from non-classified data Administrator and Operator Logs Operational staff and system administrators must maintain a log of their activities. The logs should include. Back-up timings and details of exchange of backup tapes. System event start and finish times and who was involved. System errors (what, date, time) and corrective action taken. The logs should be checked regularly to ensure that the correct procedures are being followed Clock Synchronisation All computer clocks must be synchronised to the GSI time source to ensure the accuracy of all the systems audit logs as they may be needed for incident investigation. 6.7 Network Management Network Controls Connections to the Redditch Borough Council network infrastructure are made in a controlled manner. Network management is critical to the provision of Council services and must apply the following controls: Operational responsibility for networks should, where possible be separate from computer operations activities. There must be clear responsibilities and procedures for the management of remote equipment and users (please refer to the Remote Working Policy and Removable Media Policy). Where appropriate, controls must be put in place to protect data passing over the network (e.g. encryption). The network architecture must be documented and stored with configuration settings of all the hardware and software components that make up the network. All components of the network should be recorded in an asset register. All hosts must be security hardened to an appropriate level. Operating systems will have their network services reviewed, and those services that are not required will be disabled Wireless Networks Wireless networks must apply controls to protect data passing over the network and prevent unauthorised access. Encryption must be used on the network to prevent information being intercepted. WPA2 should be applied as a minimum. Page 9 of 11
10 6.8 Systems Development and Maintenance Protection of System Test Data If personal information is used during the development and test phase of preparing application software it must be protected and controlled in line with the Data Protection Act (please refer to the Legal Responsibilities Policy) and where possible depersonalised. If operational data is used controls must be used including, but not limited to, the following: An authorisation process. Removal of all operational data from the test system after use. Full audit trail of related activities. Any personal or confidential information must be protected as if it were live data. 6.9 Annual Health Check An annual health check of all Council IT infrastructure systems and facilities must be undertaken by ICT every 12 months. This health check must include, but is not restricted to, the following: A full penetration test. A network summary that will identify all IP addressable devices. Network analysis, including exploitable switches and gateways. Vulnerability analysis, including patch levels, poor passwords and services used. Exploitation analysis. A summary report with recommendations for improvement. 7 Policy Compliance If any user is found to have breached this policy, they may be subject to Redditch Borough Council s disciplinary procedure. If a criminal offence is considered to have been committed further action may be taken to assist in the prosecution of the offender(s). If you do not understand the implications of this policy or how it may apply to you, seek advice from ICT via the Helpdesk. 8 Policy Governance The following table identifies who within Redditch Borough Council is Accountable, Responsible, Informed or Consulted with regards to this policy. The following definitions apply: Responsible the person(s) responsible for developing and implementing the policy. Accountable the person who has ultimate accountability and authority for the policy. Consulted the person(s) or groups to be consulted prior to final policy implementation or amendment. Informed the person(s) or groups to be informed after policy implementation or amendment. Responsible Accountable ICT Transformation Manager Head of Business Transformation Page 10 of 11
11 Consulted Informed Corporate Management Team All Council employees, councillors, all temporary staff, all contractors etc 9 Review and Revision This policy will be reviewed as it is deemed appropriate, but no less frequently than every 12 months. Policy review will be undertaken by ICT Transformation Manager. 10 References The following Redditch Borough Council policy documents are directly relevant to this policy, and are referenced within this document: Software Policy. Remote Working Policy. Removable Media Policy. Legal Responsibilities Policy. IT Infrastructure Policy. The following Redditch Borough Council policy documents are indirectly relevant to this policy: Policy. Internet Acceptable Usage Policy. GCSx Acceptable Usage Policy and Personal Commitment Statement. IT Access Policy. Computer, Telephone and Desk Use Policy. Information Protection Policy. Human Resources Information Security Standards. Information Security Incident Management Policy. 11 Key Messages Changes to the Council s operating systems must be follow the Council s formal change control procedure. Unpatchable software must not be used where there is GCSx connection provided. Appropriate access controls shall be put in place to prevent user installation of software and to protect against malicious and mobile code. Regular backups of essential business information will be taken to ensure that the Council can recover from a disaster, media failure or error. Storage media must be handled, protected and disposed of with care. Audit logs for RESTRICTED data and GCSx services must be kept for a minimum of six months. Connections to the Council network are made in a controlled manner. An annual health check must be made of all Council IT infrastructure systems. Page 11 of 11
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
REMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
IT ACCESS CONTROL POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Data Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
Information Security Policy
Information Security Policy Last updated By A. Whillance/ Q. North/ T. Hanson On April 2015 This document and other Information Services documents are held online on our website: https://staff.brighton.ac.uk/is
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
SECURITY POLICY REMOTE WORKING
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
Course: Information Security Management in e-governance
Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
Name: Position held: Company Name: Is your organisation ISO27001 accredited:
Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:
ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Dublin Institute of Technology IT Security Policy
Dublin Institute of Technology IT Security Policy BS7799/ISO27002 standard framework David Scott September 2007 Version Date Prepared By 1.0 13/10/06 David Scott 1.1 18/09/07 David Scott 1.2 26/09/07 David
Somerset County Council - Data Protection Policy - Final
Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council
Mike Casey Director of IT
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0
SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
Merthyr Tydfil County Borough Council. Information Security Policy
Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of
University of Aberdeen Information Security Policy
University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
NETWORK SECURITY POLICY
NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Data Security Policy
Policy Number: Revision Number: 0 QP1.44 Date of issue: March 2009 Status: Approved Date of approval: April 2009 Responsibility for policy: Responsibility for implementation: Responsibility for review:
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Network Security Policy
Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant
How To Audit Health And Care Professions Council Security Arrangements
Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
Information Technology Policy and Procedures
Information Technology Policy and Procedures Responsible Officer Author Ben Bennett, Business Planning & Resources Director Policy Development Group Date effective from April 2005 Date last amended February
Information Security Management. Audit Check List
Information Security Management BS 7799.2:2002 Audit Check List for SANS Author: Val Thiagarajan B.E., M.Comp, CCSE, MCSE, SPS (FW), IT Security Consultant. Approved by: Algis Kibirkstis Owner: SANS Extracts
Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)
Introduction This document provides a summary of technical information security controls operated by Newcastle University s IT Service (NUIT). These information security controls apply to all NUIT managed
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
Draft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW
Information Security Policy. Chapter 13. Information Systems Acquisition Development and Maintenance Policy
Information Security Policy Chapter 13 Information Systems Acquisition Development and Maintenance Policy Author: Policy & Strategy Team Version: 0.3 Date: June 2008 Document Control Information Document
NETWORK SECURITY GUIDELINES
NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy
School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy Page 1 of 10 Contents 1 Preamble...3 2 Purpose...3 3 Scope...3 4 Roles and responsibilities...3
Operational Risk Publication Date: May 2015. 1. Operational Risk... 3
OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
Decision on adequate information system management. (Official Gazette 37/2010)
Decision on adequate information system management (Official Gazette 37/2010) Pursuant to Article 161, paragraph (1), item (3) of the Credit Institutions Act (Official Gazette 117/2008, 74/2009 and 153/2009)
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Data Handling in University Case Study- Information Security in University Agenda Case Study Background
The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.
CIPS Overview Introduction The reliability of the energy grid depends not only on physical assets, but cyber assets. The North American Electric Reliability Corporation (NERC) realized that, along with
SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices
SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices 8-27-2015 4-007.1 Supersedes 4-007 Page Of 1 5 Responsible Authority Vice Provost for Information
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
Information Security Incident Management Policy and Procedure
Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
Working Practices for Protecting Electronic Information
Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
U06 IT Infrastructure Policy
Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement
INFORMATION SECURITY PROGRAM
Approved 1/30/15 by Dr. MaryLou Apple, President MSCC Policy No. 1:08:00:02 MSCC Gramm-Leach-Bliley INFORMATION SECURITY PROGRAM January, 2015 Version 1 Table of Contents A. Introduction Page 1 B. Security
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Protection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
Highland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
