Data Stored on a Windows Computer Connected to a Network



Similar documents
Data Stored on a Windows Server Connected to a Network

Attachment A Form to Describe Sensitive Data Security Plan for the Use of Sensitive Data from the National Longitudinal Study of Adolescent Health

System Security Policy Management: Advanced Audit Tasks

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Web. Security Options Comparison

Windows Operating Systems. Basic Security

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

Unit 11: Installing, Configuring and Administering Microsoft Windows Professional

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Microsoft Windows Client Security Policy. Version 2.1 POL 033

How To Secure An Rsa Authentication Agent

MSP Center Plus Features Checklist

Locking down a Hitachi ID Suite server

Manufacturer Disclosure Statement for Medical Device Security MDS 2 DEVICE DESCRIPTION MANAGEMENT OF PRIVATE DATA

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Manufacturer Disclosure Statement for Medical Device Security MDS 2 DEVICE DESCRIPTION MANAGEMENT OF PRIVATE DATA

Best Practice Document Hints and Tips

System Management. What are my options for deploying System Management on remote computers?

Microsoft Baseline Security Analyzer

USFSP Network Security Guidelines

Windows 2003 Server Installation Guide

Advanced Diploma In Hardware, Networking & Server Configuration

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Administrator s Upgrade Guide.

Chapter 15: Computer and Network Security

imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Information Technology Security Procedures

Windows IIS Server hardening checklist

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

About Microsoft Windows Server 2003

Cybersecurity Health Check At A Glance

Walton Centre. Document History Date Version Author Changes 01/10/ A Cobain L Wyatt 31/03/ L Wyatt Update to procedure

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Module 5 Introduction to Processes and Controls

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Introduction p. 1 Approach to the Book p. 2 At Least Three Ways to Do It p. 2 Where to Find the Tools p. 3 Running Tools with Alternate Credentials

Retrospect 7.7 User s Guide Addendum

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)

Understanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4

GFI White Paper PCI-DSS compliance and GFI Software products

WINDOWS SERVER HACKS. HLuHB Darmstadt. O'REILLY 5 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

General DBA Best Practices

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

BestSync Tutorial. Synchronize with a FTP Server. This tutorial demonstrates how to setup a task to synchronize with a folder in FTP server.

Xerox Mobile Print Cloud

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express

Supplier Security Assessment Questionnaire

Best Practices For Department Server and Enterprise System Checklist

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

English. Network Sharing. Ver.3.0. * Firmware

Using Remote Desktop Clients

Migrating helpdesk to a new server

Installation / Migration Guide for Windows 2000/2003 Servers

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Network Incident Report

CSG Windows Support Policy

Policy Document. Communications and Operation Management Policy

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Security and Control Issues within Relational Databases

The following items are trademarks or registered trademarks of Kaba Mas in the United States and/or other countries. GITCON

BM482E Introduction to Computer Security

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Client Security Risk Assessment Questionnaire

Security Guidelines for MapInfo Discovery 1.1

General Computing Network (GCN) Guide for Mac OS X

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box Phone: Midland, Texas Fax:

HIV EMR Proposal. Report prepared by: Dr John Haskew, Director Uamuzi Bora

HIPAA Privacy and Security Risk Assessment and Action Planning

Dooblo SurveyToGo: Security Overview

How To Secure Your Data Center From Hackers

FileMaker Security Guide The Key to Securing Your Apps

GETTING STARTED WITH A COMPUTER SYSTEM FACTSHEET

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0

GTS Software Pty Ltd. Remote Desktop Services

Windows Server 2008/2012 Server Hardening

Workflow Templates Library

Transcription:

Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Computer Connected to a Network All requests for data must include the following information. I. General Information 1. List below the name(s) and responsibilities of the investigator(s) and the research staff (students, research assistants, and programmers) who will have access to the data. Changes in personnel require that this information be updated. 1b. PI Institution PI contact information: Email Phone number System Administrator contact information: Email Phone number 2. Each participant must sign a separate security pledge to be included with the contract. As new personnel are added during the period of this contract an amended Attachment C and new security pledges must be obtained and sent to the Carolina Population Center. A security pledge form can be found under Attachment D. Please copy for each participant. Number of security pledges included: month 3. Only one complete copy of the Add Health data is permitted; however, time-delimited temporary data analysis files may be created. Temporary data analysis file(s) must be deleted every six months and recreated, as necessary, to complete analysis. Temporary data analysis files should be deleted upon completion of a project. All temporary data analysis files will be deleted and every year. month 4. Add Health data, including temporary data analysis files or subsets of the data, may not be copied to other media such as CDs or diskettes to be used on other machines and platforms. All Add Health data must remain in the same secure location as the one copy of the original Add Health data.

I agree to this condition. Investigator Initial 5. The time frame for analysis of the data should not exceed three years from the date that data files originally were sent to the investigator. Research projects requiring the data for more than three years should submit annual requests for continuation three months prior to the end date of the current project. Data, paper and electronic, shall be destroyed on that date unless prior arrangements have been made with Add Health. I agree to this condition. Investigator Initial II. Detailed description of computer system where data will be stored and analyzed 1. What type of hardware/operating system will be used? 2. What is the physical location of the hardware? 3. How are backups handled, and how will Add Health data will be excluded from the backup routine? 4. Who has physical access to the equipment? 5. Who has permission to use the equipment? 6. Is the equipment used by other projects? 7. Where will hard copy info be printed?

8. How will hard copy data will be handled/stored/discarded? Date: 9. What is the secure storage location (building, room number, and type of storage unit) of the original data CD? III. Security system to prevent unauthorized access to the data The following are minimum steps that should be taken to secure your Windows 7/8 computer that houses the Add Health data if your computer is connected to a network. Please indicate below each security step you have implemented. Please write a short explanation if you cannot implement a specific step Physical Security of a Windows 7/8 Computer on a Network 1. I configured the BIOS to boot the computer from the hard drive only. I will not allow the computer to be booted from the diskette or CD-ROM drive. 2. I password protected the BIOS so changes cannot be made to the BIOS without authorization. 3. I secured the computer on which the Add Health data resides in a locked room, or secured the computer to a table with a lock and cable (locking the case so the battery cannot be removed). 1. Controlling Access to the Data I restricted access to the Add Health data to project personnel using the security features available via the operating system (e.g., login via userid/password and NTFS permissions).

2. I require strong passwords. 3. I activated a screen saver with password after three minutes of inactivity. 4. I installed encryption software for directories containing secure data (e.g., Windows 7/8 encryption) Name of encryption software: 5. I configured my statistical applications to point the temporary working files to the secured data directory. Location of secured directory 6. I installed and periodically run a secure erasure program. This program will be run monthly and after the secure data has been removed from the computer at the end of the contract period. Name of secure erasure software: 7. I will not copy or move the Add Health data out of the secured directory for any reason. I agree to this condition. Investigator Initial

Protecting the Data from Unauthorized Access Across the Wire 1. I did not install IIS or MS SQL server on the Windows computer that houses sensitive data. 2. I turned off all unneeded services and disabled unneeded network protocols. 3. I disabled Windows File and Printer Sharing. 4. I did not enable file sharing on local Windows machines. 5. I removed the Everyone group from the Access this Computer from the Network user right. 6. I disabled the Guest account. 7. I replaced the Everyone group with the appropriate group(s) on critical system folders, files, and registry keys.

8. I removed, disabled, or renamed administrative shares. 9. I restricted/prevented anonymous access and enumeration of accounts and shares. 10. I created a new userid for administrative purposes and removed the original administrator userid's administrative privileges. 11. I installed, and will maintain, all OS and application (e.g., Internet Explorer) security patches. 12. I installed an antivirus software program and will keep the virus definition files updated. Name of antivirus software: 13. I secured performance data. 14. I enabled auditing and will check the logs often.

15. I disabled or removed Windows Scripting Host. 16. I use a corporate, hardware, or personal (software) firewall. Name of firewall: Investigator (or system administrator) Initial