Michigan Department of Education
|
|
- Allen Preston
- 6 years ago
- Views:
Transcription
1 Michigan Department of Education NEW REQUIREMENTS IN ESSA AND PEER REVIEW AND STATES RESPONSES ON TEST INTEGRITY AND SECURITY NATIONAL CONFERENCE ON STUDENT ASSESSMENT 2017 Pietro Semifero Online Assessment Manager Peer Review Critical Elements 2.4: Monitoring Test Administration 2.5: Test Security 2.6: Systems for Protecting Data Integrity and Privacy Test Security Audit March 2016 Caveon test security audit to identify operational risks and propose recommendations Document review Two days of on-site interview and inspection Output: 31-page report on exemplary processes and recommendations for improvement Document the old, develop the new 1
2 Test Security Audit 1. Security Plan 2. Roles and Responsibilities 3. Budget and Funding 4. Standard Forms and Agreements 5. Test and Item Design 6. Test and Item Development and Maintenance 7. Test Publication 8. Test Administration 9. Test Scores and Results 10. Physical Security 11. Information Security 12. Web and Media Monitoring 13. Security Awareness and Training 14. Security Incident Response Plan 15. Conducting Security Investigations Test Security Audit Pre-Review Preparation Evidence Outside view, not we know what we do Expands the range of the possible You really have to make the improvements Implementing best practices requires resources 2.4 Assessment Monitoring Random Contract with Measurement Incorporated Standard instructions, checklist Covers all programs tied to state accountability Targeted Contracts with former State Police detectives Standard instructions, checklist, and look around a bit Sites selected based on previous year s assessment incidents 50 sites per year. More random if fewer targeted. 2
3 2.5 Test Security, 2.6 Test Material Integrity PDIR: Prevention, Detection, Investigation, Remediation State Test Security Handbook Documented policies and procedures for: Administration manuals, training Chain of custody for paper materials Secure online testing Incident detection and reporting Investigating prohibited behavior, misadministration Consequences, contingency plans Protecting the integrity of test materials Assessment Integrity Guide MDE publishes an Assessment Integrity Guide (AIG) that all test administrators must acknowledge reading before administering assessments Goal of the AIG is to represent the expected professional conduct of educators who administer state assessments With the advent of online testing, the AIG was extensively refreshed in 2015 with input by John Olson and John Fremer, finalized after the security audit Reviewing for next round of updates, now that we have more experience with online testing Assessment Integrity Guide The Assessment Integrity Guide focuses on 4 major assessment integrity themes: Prevention standards and best practices for test integrity and security to prevent irregularities from occurring Detection guidelines for monitoring, reporting, and working with MDE when irregularities are found Follow-Up Investigations guidelines for investigating irregularities Remediation guidelines for schools to work with MDE to remediate issues and ensure valid results for all students 3
4 Assessment Integrity Guide Useful to the field: best practices, establish expectations Useful to the office: documented policies and procedures, manual to follow in the event of questions Useful for review: documentation that is polished, reviewed, and approved by the State Board of Education Test Security Specialist Staff member dedicated to test security and integrity Duties include: Developing and updating test security policies Developing and implementing test security training Responding to incident reports and tips Assessment monitoring, social media monitoring Data forensic analysis Investigating irregularities Working with schools on remediation Test Security Specialist Manual Written by the Test Security Specialist: write down what it is that you actually do on a day-to-day basis Practical, not theoretical Reference guide for consistency Training manual for turnover, backups Identifies: Duties Procedures Documentation Contacts 4
5 Document the Old: Response Plans Security incident response planning Document practices for analysis and monitoring Incident triage and investigation Incident response matrix Communications plan Document everything Document the Old: Formal Investigations Defined plans for investigating more serious incidents Define what rises to the level of an incident Establish thresholds in advance rather than ad hoc Investigation policies and procedures Standard responses, consequences Factors to consider in weighing appropriate remediation Review panel for appeals New Developments: Online Training A series of four online modules through Michigan Virtual University Walks through key topics from the Assessment Integrity Guide For staff and schools, new and refresher Focused on practitioners: preparation, administration, incident response (less on investigation and remediation) Includes examples and quizzes 5
6 New Developments: Data Forensics Ideal case of what data forensics we would like Realistic case of what we have resources for Now Development plan Division of labor between contractors and staff Identify values that trigger investigations or invalidations Identify and improve internal understanding of forensics It is not psychomagic Political support for data-based invalidations 6
Data Privacy Breach Policy and Procedure
Data Privacy Breach Policy and Procedure Document Information Last revision date: April 16, 2018 Adopted date: Next review: January 1 Annually Overview A privacy breach is an action that results in an
More informationChapter 4 After Incident Detection
Chapter 4 After Incident Detection Ed Crowley Spring 10 1 Topics Incident Response Process SANs Six Step IR Process 1. Preparation 2. Identification 3. Containment 4. Eradication 5. Recovery 6. Lessons
More informationPrivacy Breach Response and Reporting
Privacy Breach Response and Reporting AFNIGC - Privacy Education Series October 18, 2017 Chris Stinner Senior Information and Privacy Manager Office of the Information and Privacy Commissioner of Alberta
More informationSTAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:
STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationData Processing Agreement
In accordance with the European Parliament- and Council s Directive (EU) 2016/679 of 27th April 2016 (hereinafter GDPR) on the protection of physical persons in connection with the processing of personal
More informationHong Kong Accountability Benchmarking Micro-Study. Nymity Accountability Workshop 10 June 2015, Office of the PCPD, Hong Kong
Hong Kong Accountability Benchmarking Micro-Study Nymity Accountability Workshop 10 June 2015, Office of the PCPD, Hong Kong Interactive Workshop What we will do: Your participation: Provide background
More informationEducation Network Security
Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or
More informationOracle Data Cloud ( ODC ) Inbound Security Policies
Oracle Data Cloud ( ODC ) Inbound Security Policies Contents Contents... 1 Overview... 2 Oracle Data Cloud Security Policy... 2 Oracle Information Security Practices - General... 2 Security Standards...
More informationGetting Started with Cybersecurity
2 Incidents per week: Since 2016, U.S. K-12 school districts have experienced more than two cyber incidents per week on average. Fastest growing cyber incidents in K12 schools Most common cyber incidents
More informationDesigning Robustness and Resilience in Digital Investigation Laboratories
DIGITAL FORENSIC RESEARCH CONFERENCE Designing Robustness and Resilience in Digital Investigation Laboratories By Philipp Amann and Joshua James Presented At The Digital Forensic Research Conference DFRWS
More informationComputer Security Incident Response Plan. Date of Approval: 23-FEB-2014
Computer Security Incident Response Plan Name of Approver: Mary Ann Blair Date of Approval: 23-FEB-2014 Date of Review: 31-MAY-2016 Effective Date: 23-FEB-2014 Name of Reviewer: John Lerchey Table of Contents
More informationInformation Security Risk Strategies. By
Information Security Risk Strategies By Larry.Boettger@Berbee.com Meeting Agenda Challenges Faced By IT Importance of ISO-17799 & NIST The Security Pyramid Benefits of Identifying Risks Dealing or Not
More informationSubject: University Information Technology Resource Security Policy: OUTDATED
Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from
More informationInsideNGO Certificate
InsideNGO Certificate in USAID Assistance Management Candidate Handbook Date of Publication: October 2016 Contents Introduction and Value Statement..............................................1 Program
More informationHIPAA For Assisted Living WALA iii
Table of Contents The Wisconsin Assisted Living Association... ix Mission... ix Vision... ix Values... ix Acknowledgments... ix Who Should Use This Manual... x How to Use This Manual... x Updates and Forms...
More informationPostal Inspection Service Mail Covers Program
Postal Inspection Service Mail Covers Program May 28, 2014 AUDIT REPORT Report Number HIGHLIGHTS BACKGROUND: In fiscal year 2013, the U.S. Postal Inspection Service processed about 49,000 mail covers.
More informationPERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established
PERSON SPECIFICATION Area: Crime and Intelligence Directorate Job Title: Cyber PROTECT Officer Weekly Hours: Section: CAID Scale: Grade 6 Version: 1.2 Post No: GI080 Status: Established Version Date: 37
More informationPrivacy Breach Policy
1. PURPOSE 1.1 The purpose of this policy is to guide NB-IRDT employees and approved users on how to proceed in the event of a privacy breach, and to demonstrate to stakeholders that a systematic procedure
More informationIT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I
Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program
More informationContinuous protection to reduce risk and maintain production availability
Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading
More informationVirginia State University Policies Manual. Title: Information Security Program Policy: 6110
Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including
More informationAdvent IM Ltd ISO/IEC 27001:2013 vs
Advent IM Ltd ISO/IEC 27001:2013 vs 2005 www.advent-im.co.uk 0121 559 6699 bestpractice@advent-im.co.uk Key Findings ISO/IEC 27001:2013 vs. 2005 Controls 1) PDCA as a main driver is now gone with greater
More informationInformation Technology Disaster Recovery Planning Audit Redacted Public Report
1200, Scotia Place, Tower 1 10060 Jasper Avenue Edmonton, Alberta T5J 3R8 edmonton.ca/auditor Information Technology Disaster Recovery Planning Audit Redacted Public Report June 12, 2018 City of Edmonton
More informationCRIMINAL NETWORK INTRUSION AND DATA THEFT: Today s Security Landscape and What to Do If You ve Been Compromised
CRIMINAL NETWORK INTRUSION AND DATA THEFT: Today s Security Landscape and What to Do If You ve Been Compromised TUESDAY, MAY 24, 2011 Alston & Bird LLP PricewaterhouseCoopers Silverpop www.pwc.com Data
More informationProgram Review for Information Security Management Assistance. Keith Watson, CISSP- ISSAP, CISA IA Research Engineer, CERIAS
Program Review for Information Security Management Assistance Keith Watson, CISSP- ISSAP, CISA IA Research Engineer, CERIAS Disclaimer and Purpose PRISMA, FISMA, and NIST, oh my! PRISMA versus an Assessment
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationContracting for an IT General Controls Audit
Contracting for an IT General Controls Audit Lori Schubert, C.P.A. Internal Audit Manager age Waukesha County (WI) lschubert@waukeshacounty.gov Overview of Presentation Description of Waukesha County Information
More informationInformation Technology Branch Organization of Cyber Security Technical Standard
Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:
More informationInstructions for Participating in ASHRAE s. Commissioning Process Management Professional (CPMP) Certification Program
Instructions for Participating in ASHRAE s Commissioning Process Management Professional (CPMP) Certification Program Effective date: 10/06/2009 Related Resources Resources available to help prepare for
More informationPROTERRA CERTIFICATION PROTOCOL V2.2
PROTERRA CERTIFICATION PROTOCOL V2.2 TABLE OF CONTENTS 1. Introduction 2. Scope of this document 3. Definitions and Abbreviations 4. Approval procedure for Certification Bodies 5. Certification Requirements
More informationSparta Systems TrackWise Solution
Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA
More informationSparta Systems Stratas Solution
Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA
More informationCASA External Peer Review Program Guidelines. Table of Contents
CASA External Peer Review Program Guidelines Table of Contents Introduction... I-1 Eligibility/Point System... I-1 How to Request a Peer Review... I-1 Peer Reviewer Qualifications... I-2 CASA Peer Review
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative
More informationREQUEST FOR INFORMATION FOR FLORIDA DIGITAL TOOL CERTIFICATES RFI
REQUEST FOR INFORMATION FOR FLORIDA DIGITAL TOOL CERTIFICATES RFI 2016-57 Florida Department of Education 325 West Gaines Street Tallahassee, FL 32399-0400 Please email submissions to: Florida Department
More informationChecklist: Credit Union Information Security and Privacy Policies
Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC
More informationSAAS Procedure 201B. SAAS Competence and Maintenance Requirements for SA8000 Social Accountability Program Managers, Auditors and Allied Experts
1 2 3 4 5 6 SAAS Procedure 201B SAAS Competence and Maintenance Requirements for SA8000 Social Accountability Program Managers, Auditors and Allied Experts 7 8 9 10 For Use By Certification Bodies Performing
More informationConsumer Protection & System Security Update. Bill Jenkins and Cammie Blais
Consumer Protection & System Security Update Bill Jenkins and Cammie Blais Consumer Protection Goal: To act responsibly to protect consumers against deceptive, fraudulent or unfair practices. 2 2 Partners
More informationHIPAA Security and Privacy Policies & Procedures
Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400
More informationPolicy for Accrediting Assessment Bodies Operating within the Cradle to Cradle Certified Product Certification Scheme. Version 1.2
Policy for Accrediting Assessment Bodies Operating within the Cradle to Cradle Certified Product Certification Scheme Version 1.2 July 2015 Copyright, Cradle to Cradle Products Innovation Institute, 2015
More informationPOLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6
POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 North Gem School District No. 149 establishes the following guidelines to provide administrative direction pertaining to the retention
More informationREQUEST FOR PROPOSAL DATABASE DEVELOPMENT FOR THE DISTRICT OF COLUMBIA COLLEGE ACCESS PROGRAM
1400 L Street, NW, Suite 400, Washington, D. C. 20005 Phone: (202) 783-7933 Fax: (202) 783-7939 www.dccap.org REQUEST FOR PROPOSAL DATABASE DEVELOPMENT FOR THE DISTRICT OF COLUMBIA COLLEGE ACCESS PROGRAM
More informationIntegrating HIPAA into Your Managed Care Compliance Program
Integrating HIPAA into Your Managed Care Compliance Program The First National HIPAA Summit October 16, 2000 Mark E. Lutes, Esq. Epstein Becker & Green, P.C. 1227 25th Street, N.W., Suite 700 Washington,
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationUniversity of Wisconsin-Madison Policy and Procedure
Page 1 of 5 I. Policy A. The units of the UW-Madison Health Care Component and each individual or unit within UW-Madison that is a Business Associate of a covered entity (hereafter collectively referred
More informationInformation Security Data Classification Procedure
Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations
More informationACM Retreat - Today s Topics:
ACM Retreat - Today s Topics: Phase II Cyber Risk Management Services - What s next? Policy Development External Vulnerability Assessment Phishing Assessment Security Awareness Notification Third Party
More informationPost-Secondary Institution Data-Security Overview and Requirements
Post-Secondary Institution Data-Security Overview and Tiina K.O. Rodrigue, EdDc, CISSP, CISM, PMP, CSM, CEA, ITIL, ISC2 Compliance Mapper, A+ Senior Advisor Cybersecurity - 2017 Agenda Who needs to worry
More informationEXHIBIT A. - HIPAA Security Assessment Template -
Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,
More informationPreventing Insider Sabotage: Lessons Learned From Actual Attacks
Preventing Insider Sabotage: Lessons Learned From Actual Attacks Dawn Cappelli November 14, 2005 2005 Carnegie Mellon University Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting
More informationCorporate Governance and Internal Control
01 20 Lawson 93 Lawson strives to enhance Corporate Governance by improving the soundness and transparency of management, through ensuring compliance and affirmative disclosure. Overall view of Lawson
More informationNW NATURAL CYBER SECURITY 2016.JUNE.16
NW NATURAL CYBER SECURITY 2016.JUNE.16 ADOPTED CYBER SECURITY FRAMEWORKS CYBER SECURITY TESTING SCADA TRANSPORT SECURITY AID AGREEMENTS CONCLUSION QUESTIONS ADOPTED CYBER SECURITY FRAMEWORKS THE FOLLOWING
More informationRMU-IT-SEC-01 Acceptable Use Policy
1.0 Purpose 2.0 Scope 2.1 Your Rights and Responsibilities 3.0 Policy 3.1 Acceptable Use 3.2 Fair Share of Resources 3.3 Adherence with Federal, State, and Local Laws 3.4 Other Inappropriate Activities
More informationNetiquette: Composing
Netiquette: Composing Email Critical Learning Summarizing information from multiple internet sources Understand email: my attitudes, advantages and disadvantages, comparison to memos, guidelines for writing
More informationFreedom of Information and Protection of Privacy (FOIPOP)
Freedom of Information and Protection of Privacy (FOIPOP) No.: 6700 PR1 Policy Reference: 6700 Category: FOIPOP Department Responsible: Records Management and Privacy Current Approved Date: 2008 Sep 30
More informationINCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER
INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER 1 INCIDENT RESPONDER'S FIELD GUIDE TABLE OF CONTENTS 03 Introduction
More informationCertificate of Recognition. John Sammut, Manager
Certificate of Recognition John Sammut, Manager 1 Certificate of Recognition - COR Voluntary audit-based certification recognizing employers who demonstrate an ongoing commitment to a Health & Safety Management
More informationBreaches and Remediation
Breaches and Remediation Ramona Oliver US Department of Labor Personally Identifiable Information Personally Identifiable Information (PII): Any information about an individual maintained by an agency,
More informationShort courses presented by the NWU Programme in Forensic Accountancy
Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information
More informationANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And
ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief
More informationRisk Management in Electronic Banking: Concepts and Best Practices
Risk Management in Electronic Banking: Concepts and Best Practices Jayaram Kondabagil BICENTENNIAL B1CBNTENNIAL John Wiley & Sons (Asia) Pte Ltd. Contents List of Figures xiii List of Tables xv Preface
More informationSparta Systems TrackWise Digital Solution
Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities
More informationAlberta Reliability Standard Cyber Security Incident Reporting and Response Planning CIP-008-AB-5
A. Introduction Consultation Draft April 5, 2016 1. Title: 2. Number: 3. Purpose: To mitigate the risk to the reliable operation of the bulk electric system as the result of a cyber security incident by
More informationBirmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018
1.0 Executive Summary Birmingham Community Healthcare NHS Foundation Trust 2017/17 Data Security and Protection Requirements March 2018 The Trust has received a request from NHS Improvement (NHSI) to self-assess
More informationBusiness Continuity and Disaster Recovery
Business Continuity and Disaster Recovery Index Section Title 1. Executive Summary 2. Policy Statement 3. Strategy 4. Governance 5. Key Documentation 6. Testing 1 Executive Summary Business Continuity
More informationISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard
Certification Exam Outline Effective Date: April 2013 About CISSP-ISSMP The Information Systems Security Management Professional (ISSMP) is a CISSP who specializes in establishing, presenting, and governing
More informationSecurity Stream for Computer Science
Security Stream for Computer Science Compulsory COMP3441 Security Engineering or COMP6442 Extended Security Engineering Electives and three electives drawn from the elective list (below) COMP4442 -- Advanced
More informationBusiness Continuity Planning
Information Systems Audit and Control Association www.isaca.org Business Continuity Planning AUDIT PROGRAM & INTERNAL CONTROL QUESTIONNAIRE The Information Systems Audit and Control Association With more
More informationData Protection Policy
Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please
More informationDIPLOMA COURSE IN INTERNAL AUDIT
DIPLOMA COURSE IN INTERNAL AUDIT Course Objective: Internal Audit is an assurance and consulting service that reviews the efficiency and effectiveness of the internal control.. It assists management at
More informationQualification Specification
BCS Level 1 Award in e-safety March 2018 This is a United Kingdom government regulated qualification which is administered and approved by one or more of the following: Ofqual, Qualification in Wales,
More informationOFFICE OF INSPECTOR GENERAL
OFFICE OF INSPECTOR GENERAL Evaluation Report Catalyst for Improving the Environment Evaluation of U.S. Chemical Safety and s Compliance with the Federal Information Security Management Act and Efforts
More informationSYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS. Module 3E Windows Forensics 10 ECTS
SYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS Module 3E Windows Draft for the Board at NPUC 2 December2015 (5 November) 1. Introduction Personal computing has for years been
More informationInformation Security and Cyber Security
Information Security and Cyber Security Policy NEC recognizes that it is our duty to protect the information assets entrusted to us by our customers and business partners as well as our own information
More informationPractitioner Certificate in Business Continuity Management (PCBCM) Course Description. 10 th December, 2015 Version 2.0
Practitioner Certificate in Business Continuity Management (PCBCM) Course Description 10 th December, 2015 Version 2.0 Course The Practitioner Certificate in Business Continuity Management (PCBCM) course
More informationCyber Security Program
Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationIQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification
IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification Regulation No: 600/5528/5 Page 1 of 15 Contents Page Industry Qualifications...
More informationNEN The Education Network
NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected
More informationTHE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.
THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.FFa) BROCHURE Contents INTRODUCTION... 3 THE IICFA... 4 Basic Entry qualifications...
More informationOn-Officer Body Camera Program
1 of 7 1. PURPOSE This order establishes the Mesa Police (MPD) operational and submission guidelines for the "On-Officer" Body Camera (OBC) Pilot, which will be implemented for one year ending October
More informationGeneral Data Protection Regulation policy (exams) 2018/19
The Piggott School General Data Protection Regulation policy (exams) 2018/19 This policy is annually reviewed to ensure compliance with current regulations Approved/reviewed by 1) Reviewed by Tim Griffith
More informationCalifornia Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT
California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program
More informationLaw Enforcement Commercial Price List ManTech International Corporation August 2017
Law Enforcement Commercial Price List ManTech International Corporation August 2017 Table of Contents Rates and Description... 3 General Guidelines... 54 Contact Information... 56 Page - 2 Rates and Description
More informationInformation Security Policy
Document title: [ Information Security Policy May 2017 ] Approval date: [ May 2017 ] Purpose of document: [ To define AUC s information security program main pillars and components] Office/department responsible:
More informationInitial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.
PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University
More informationAPNIC Training Mini Survey
APNIC Training - 2007 Mini Survey Summary Report by John Earls February 2008 Introduction The following analysis summarises the results of the APNIC training survey conducted during the period November
More informationCISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.
Course Outline CISM - Certified Information Security Manager 20 Nov 2017 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationSample Exam Privacy & Data Protection Foundation
Sample Exam Sample Exam Privacy & Data Protection Foundation SECO-Institute issues the official Business Continuity courseware to accredited training centres where students are trained by accredited instructors.
More informationCERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION
CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION Introduction The IFFO RS Certification Programme is a third party, independent and accredited
More informationCISA EXAM PREPARATION - Weekend Program
CISA EXAM PREPARATION - Weekend Program THE CISA QUALIFICATION: CERTIFICATION PREPARATION COURSE SYLLABUS PT. RIALACHAS TATHYA PRAYUKTI Menara Palma 12th Floor Jalan HR Rasuna Said Blok X2 Kav 6 Jakarta,
More informationPolicies and Procedures Date: February 28, 2012
No. 5200 Rev.: 1 Policies and Procedures Date: February 28, 2012 Subject: Information Technology Security Program 1. Purpose... 1 2. Policy... 1 2.1. Program Elements... 1 2.2. Applicability and Scope...
More informationPass4suresVCE. Pass4sures exam vce dumps for guaranteed success with high scores
Pass4suresVCE http://www.pass4suresvce.com Pass4sures exam vce dumps for guaranteed success with high scores Exam : CS0-001 Title : CompTIA Cybersecurity Analyst (CySA+) Exam Vendor : CompTIA Version :
More informationThis Policy applies to all staff and other authorised users in St Therese School.
St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way
More informationSQA Advanced Unit specification: general information. Professionalism and Ethics in Computing
SQA Advanced Unit specification: general information Unit title: Professionalism and Ethics in Computing Unit code: HP29 47 Superclass: DE Publication date: August 2017 Source: Scottish Qualifications
More informationJelena Roljevic Assistant Vice President, Business Intelligence Ronald Layne Data Governance and Data Quality Manager
Jelena Roljevic Assistant Vice President, Business Intelligence roljevic@gwu.edu Ronald Layne Data Governance and Data Quality Manager rlayne@gwu.edu July 13, 2016 Key Takeaways 1. How to ensure strong
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationChartered Membership: Professional Standards Framework
Chartered Membership: Professional Standards Framework Foreword The Chartered Institute of Architectural Technologists (CIAT) is the lead professional body for Architectural Technology and the UK Competent
More information