DATA BACKUP AND RECOVERY POLICY

Size: px
Start display at page:

Download "DATA BACKUP AND RECOVERY POLICY"

Transcription

1 DATA BACKUP AND RECOVERY POLICY

2 4ITP04 Revision 01 TABLE OF CONTENTS 1. REVISION RECORD PURPOSE SCOPE AND APPLICABILITY DEFINITIONS AND ABBREVIATIONS POLICY STATEMENTS PRINCIPLES REFERENCES RECORDS FLOWCHART RESPONSIBILITIES /9

3 4ITP04 Revision REVISION RECORD Revision Date (Month Details of Revision Revised by Number Year) 01 October 2016 First working document. IT Team 3/9

4 4ITP04 Revision PURPOSE Provide guidelines to ensure that data backup plans and procedures shall be in place to facilitate the normal functioning of critical IDM activities in the event of a failure or disaster. It preserve the confidentiality, Integrity and Availability (CIA) of IDM information assets. The policy also aims to manage and secure backup and restoration processes and the media employed in the process. 3. SCOPE AND APPLICABILITY This policy is applicable to all users including temporary staff, vendors, service providers and external consultants who make use of IDM s information assets. 4. DEFINITIONS AND ABBREVIATIONS i. CIA: Confidentiality, Integrity and Availability ii. Backup Media: media you back up data on to eg eternal hard drives, tapes, CDs etc iii. Information Asset: Electronic data, information, business application system, operating systems, computer equipment and other IT infrastructure. iv. Server: It is a physical computer dedicated to running one or more services to serve the needs of the of other computers on the network 5. POLICY STATEMENTS The policy set out the control conditions related to data backup activities within IDM. All types of backups as may be required shall all be made in accordance with the backup strategy. 4/9

5 4ITP04 Revision PRINCIPLES The following shall be adhered to, to comply with the policy requirements Data Backup Plan A data backup plan shall at minimum include the following; Identification of Critical data, information and software that needs to be backed up. Retention periods for backups All systems will be backed up according to the schedule below: o Incremental backup daily (Mon.-Fri.) and data located on-site. o Full backup weekly (Sat.) and data located off-site Data Backed Up Data to be backed up include the following; User data stored on the hard drive (My Documents) System state data The registry The following are systems to be backed up Mail Server File server Web server Application Servers ( SMS, Teammate, Antivirus Console) Domain Controllers Storage server Network Infrastructure (Routers and Firewall settings) Backup Cycles The standard backup cycles that IDM shall employ is daily, weekly and Monthly (Grandfathering technique). 5/9

6 4ITP04 Revision Backup Media Backup media will be transported and stored as described below: Currently all backups will be written to reusable Media will be clearly labelled and stored in a secure area that is accessible only to IT staff or employees of the contracted secure off-site media vaulting vendor used by IT. During transport or changes of media, media will not be left unattended. Daily backups will be stored on-site in a physically secured fire-proof safe located in a building separate from the Server Rooms. o Daily backups will be maintained for one week. Weekly backups will be stored in a physically secured, off-site media vaulting location maintained by a third party. o Weekly backups will be maintained for a period of three weeks. o After the period of three weeks has elapsed, the tapes will be returned to IT and will be re-used Data Retention Data retention shall follow IDM s Records and Information retention policies. Media will be retired and disposed of as described below: Prior to retirement and disposal, IT will ensure that: The media no longer contains active backup images The media s current or former contents cannot be read or recovered by an unauthorized party. With all backup media, IT will ensure the physical destruction of media prior to disposal. 6/9

7 4ITP04 Revision Backup Verification Backups will be verified periodically. On a daily basis, logged information generated from each backup job will be reviewed for the following purposes: o To check for and correct errors. o To monitor the duration of the backup job. o To optimize backup performance where possible. IT will identify problems and take corrective action to reduce any risks associated with failed backups. Random test restores will be done once a week in order to verify that backups have been successful IT will maintain records demonstrating the review of logs and test restores so as to demonstrate compliance with this policy for auditing purposes Data Recovery In the event of a catastrophic system failure, off-site backed up data will be made available to users within 3 working days if the destroyed equipment has been replaced by that time. In the event of a non-catastrophic system failure or user error, on-site backed up data will be made available to users within 1 working day Restoration Requests In the event of accidental deletion or corruption of information, requests for restoration of information will be made to the IT Manager. 6. REFERENCES IT Policy, Security Procedure, Records and Information Retention Policy 7. RECORDS Offsite Backup log-sheet, Daily Backup Log, Backup Logs, Restoration Test results 7/9

8 4ITP04 Revision FLOWCHART Hosted Solutions ERP, Payroll, ICAS, HR,Colcampus Point of Failure Daily Backup Mon-Friday Incremental Onsite Storage Weekly Backup Every Saturday Full Backup Offsite Storage Monthly Backup Fourth Weekly Backup Full Backup Off-site Storage 8/9

9 4ITP04 Revision RESPONSIBILITIES Backups and Data Recovery: IT Manager Botswana Campus T: IT Manager Swaziland Campus T: IT Manager Swaziland Campus T: IT Regional Office T: Verification IT Manager Projects T: /9

University Information Systems. Administrative Computing Services. Contingency Plan. Overview

University Information Systems. Administrative Computing Services. Contingency Plan. Overview University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview

More information

Data Storage, Recovery and Backup Checklists for Public Health Laboratories

Data Storage, Recovery and Backup Checklists for Public Health Laboratories Data Storage, Recovery and Backup Checklists for Public Health Laboratories DECEMBER 2018 Introduction Data play a critical role in the operation of a laboratory information management system (LIMS) and

More information

University Information Technology Data Backup and Recovery Policy

University Information Technology Data Backup and Recovery Policy University Information Technology Data Backup and Recovery Policy I. Purpose and Scope A. The purpose of this policy is to document the University of Utah Information Technology (UIT) data backup and recovery

More information

Back up and Restoration Policy. of VIJETA BROKING INDIA PRIVATE LIMITED

Back up and Restoration Policy. of VIJETA BROKING INDIA PRIVATE LIMITED Back up and Restoration Policy of VIJETA BROKING INDIA PRIVATE LIMITED Table of Content 1 Overview... 3 2 Purpose... 3 3 Scope... 3 4 Definitions... 3 5 Timing... 4 6 Policy... 4 7 Backup of Older Versions...

More information

IT CONTINUITY, BACKUP AND RECOVERY POLICY

IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption

More information

Backup and Restore SOP FOR CONGO CLUSTER

Backup and Restore SOP FOR CONGO CLUSTER Backup and Restore SOP FOR CONGO CLUSTER IT Department, Congo Cluster Version 1.0 January 2008 1. Contents 1. CONTENTS... 2 2. INTRODUCTION TO BACKUPS... 3 2.1. Objectives... 3 2.2. Scope of the document...

More information

Records Information Management

Records Information Management Information Systems Sciences Records Information Management Region V Spring Conference March 26, 2015 Was I supposed to keep that 1 Where did we store that 2 Space Issues. Need storage space for a classroom

More information

Google Cloud Whitepaper September Data deletion on Google Cloud Platform

Google Cloud Whitepaper September Data deletion on Google Cloud Platform Google Cloud Whitepaper September 2018 Data deletion on Google Cloud Platform Table of contents Overview 3 CIO-level summary 3 Introduction 4 Data storage and replication 5 Secure and effective data deletion

More information

Tuskegee Backup and Offsite Policy and Procedures

Tuskegee Backup and Offsite Policy and Procedures TUSKEGEE UNVERSTY OCE O NORMATON TECHNOLOGY Tuskegee Backup and Offsite Policy and Procedures Purpose This policy defines how to safeguard the information assets of the University and how copies of stored

More information

The University of Texas at El Paso. Information Security Office Minimum Security Standards for Systems

The University of Texas at El Paso. Information Security Office Minimum Security Standards for Systems The University of Texas at El Paso Information Security Office Minimum Security Standards for Systems 1 Table of Contents 1. Purpose... 3 2. Scope... 3 3. Audience... 3 4. Minimum Standards... 3 5. Security

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo. Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version : HP HP0-771 Designing and Implementing HP Enterprise Backup Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-771 A. copy backup B. normal backup C. differential backup D.

More information

Server Security Procedure

Server Security Procedure Server Security Procedure Reference No. xx Revision No. 1 Relevant ISO Control No. 11.7.1 Issue Date: January 23, 2012 Revision Date: January 23, 2012 Approved by: Title: Ted Harvey Director, Technology

More information

E-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019

E-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019 Ormiston Academies Trust E-Security policy Date adopted: Autumn Term 2018 Next review date: Autumn Term 2019 Policy type Author Statutory James Miller OAT DPO Approved by Exec, July 2018 Release date July

More information

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES RECORDS MANAGEMENT DEPARTMENT OF THE TREASURY, DIVISION OF REVENUE AND ENTERPRISE SERVICES, RECORDS MANAGEMENT SERVICES RECORDS MANAGEMENT SERVICES Records Management Services, Division of Revenue and

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

emarketeer Information Security Policy

emarketeer Information Security Policy emarketeer Information Security Policy Version Date 1.1 2018-05-03 emarketeer Information Security Policy emarketeer AB hereafter called emarketeer is a leading actor within the development of SaaS-service

More information

2. Scope: 2.1 This procedure encompasses all organisations within the Clement Clarke Holdings group.

2. Scope: 2.1 This procedure encompasses all organisations within the Clement Clarke Holdings group. Date: 01/06/2011 Reviewed: 08/12/2011 Issue: 2 SI No: P3010 Prepared by: J. Hopkins Approved by: G. Ostacchini Title: Backup & Retrieval Procedure 1 Introduction: 1.1 The purpose of this procedure is to

More information

Tata Power Company. Ltd.

Tata Power Company. Ltd. System Backup Policy and Procedures Guidelines Tata Power Company. Ltd. October 2005 Corporate Information Technology 1 2 Approval History Rev. 0 October, 2005. Signature Created By SHA/FKT/CPS October,

More information

Trust Services Principles and Criteria

Trust Services Principles and Criteria Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

Data Security - Backup

Data Security - Backup Data Security - Backup Many companies are now completely reliant on the data stored on their network servers, PCs, laptops, mobile devices and in the cloud. Some of this data is likely to contain either

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents

More information

ITD SERVER MANAGEMENT PROCEDURE

ITD SERVER MANAGEMENT PROCEDURE ITD SERVER MANAGEMENT PROCEDURE PURPOSE This procedure ensures the operation and maintenance of all ITD servers in a safe and effective fashion. This is achieved by the routine monitoring and timely update

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Backup Exec Supplement

Backup Exec Supplement Vision 3 Backup Exec Supplement INPS INPS The Bread Factory, 1A Broughton Street, Battersea, London, SW8 3QJ T: +44 (0) 207 501700 F:+44 (0) 207 5017100 W: www.inps.co.uk Table of Editions and Contents

More information

Data Backup and Contingency Planning Procedure

Data Backup and Contingency Planning Procedure HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage

More information

University Network Policies

University Network Policies BACKGROUND Washington State University s network infrastructure and network services are vital to carry out the mission of the University. Policies are needed to ensure the continued integrity of these

More information

IT Services Policy/Policy Document

IT Services Policy/Policy Document IT Services Policy/Policy Document DG26 System Backup and Recovery Prepared by: < Shelim Miah> Version: 2.2 Page 1 of 8 Effective Date: 17/03/17 Review Date: 17/03/18 Reviewers: Steve Wicks, Servers &

More information

ADIENT VENDOR SECURITY STANDARD

ADIENT VENDOR SECURITY STANDARD Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Administration and Data Retention. Best Practices for Systems Management

Administration and Data Retention. Best Practices for Systems Management Administration and Data Retention Best Practices for Systems Management Agenda Understanding the Context for IT Management Concepts for Managing Key IT Objectives Aptify and IT Management Best Practices

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

(Self-Study) Identify How to Back Up and Restore NetWare Systems

(Self-Study) Identify How to Back Up and Restore NetWare Systems SECTION 18 (Self-Study) Identify How to Back Up and Restore NetWare Systems The following objective will be tested: Develop a Network Backup Strategy In this section you learn how you can back up and restore

More information

Network Performance, Security and Reliability Assessment

Network Performance, Security and Reliability Assessment Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD

More information

RECORD RETENTION POLICY

RECORD RETENTION POLICY RECORD RETENTION POLICY I. Purpose It is the purpose of this policy to establish a consistent record retention policy for (the Organization ). II. Policy The Organization shall retain records for the period

More information

7.16 INFORMATION TECHNOLOGY SECURITY

7.16 INFORMATION TECHNOLOGY SECURITY 7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for

More information

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....

More information

Aras Innovator 11. Backup and Recovery Procedures

Aras Innovator 11. Backup and Recovery Procedures Document #: 11.0.02015040601 Last Modified: 1/4/2018 Copyright Information Copyright 2018 Aras Corporation. All Rights Reserved. Aras Corporation 300 Brickstone Square Suite 700 Andover, MA 01810 Phone:

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

BME CLEARING s Business Continuity Policy

BME CLEARING s Business Continuity Policy BME CLEARING s Business Continuity Policy Contents 1. Introduction 1 2. General goals of the Continuity Policy 1 3. Scope of BME CLEARING s Business Continuity Policy 1 4. Recovery strategies 2 5. Distribution

More information

EU GDPR & ISO Integrated Documentation Toolkit https://advisera.com/eugdpracademy/eu-gdpr-iso integrated-documentation-toolkit

EU GDPR & ISO Integrated Documentation Toolkit https://advisera.com/eugdpracademy/eu-gdpr-iso integrated-documentation-toolkit EU GDPR & https://advisera.com/eugdpracademy/eu-gdpr-iso-27001-integrated-documentation-toolkit Note: The documentation should preferably be implemented in the order in which it is listed here. The order

More information

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification

More information

SUBJECT: REQUEST FOR PROPOSALS FOR HARBOR DEPARTMENT CLOUD COMPUTING SERVICES

SUBJECT: REQUEST FOR PROPOSALS FOR HARBOR DEPARTMENT CLOUD COMPUTING SERVICES DATE: May 30, 2017 SUBJECT: REQUEST FOR PROPOSALS FOR HARBOR DEPARTMENT CLOUD COMPUTING SERVICES Pursuant to the Harbor Department Cloud Computing Services Request for Proposals (RFP), all proposers were

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

SPRING-FORD AREA SCHOOL DISTRICT

SPRING-FORD AREA SCHOOL DISTRICT No. 801.1 SPRING-FORD AREA SCHOOL DISTRICT SECTION: TITLE: OPERATIONS ELECTRONIC RECORDS RETENTION ADOPTED: January 25, 2010 REVISED: October 24, 2011 801.1. ELECTRONIC RECORDS RETENTION 1. Purpose In

More information

Standard: Data Center Security

Standard: Data Center Security Standard: Data Center Security Page 1 Executive Summary The university data centers provide for the reliable operation of SJSU s computing systems, computing infrastructure, and communication systems.

More information

1 Data Center Requirements

1 Data Center Requirements 1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Introduction To IS Auditing

Introduction To IS Auditing Introduction To IS Auditing Instructor: Bryan McAtee, ASA, CISA Bryan McAtee & Associates - Brisbane, Australia * Course, Presenter and Delegate Introductions * Definition of Information Technology (IT)

More information

Texas A&M AgriLife Research Procedures

Texas A&M AgriLife Research Procedures Texas A&M AgriLife Research Procedures 29.01.99.A0.02 Enterprise File Service Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 PROCEDURE STATEMENT This

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

University of Colorado

University of Colorado University of Colorado Information Technology Services 2007 CU-Boulder Restricted Data System Security Requirements Table of Contents 1 GE ERAL COMPLIA CE... 1 2 ETWORK SECURITY... 1 3 PROTECT STORED DATA...

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

HIPAA Compliance and OBS Online Backup

HIPAA Compliance and OBS Online Backup WHITE PAPER HIPAA Compliance and OBS Online Backup Table of Contents Table of Contents 2 HIPAA Compliance and the Office Backup Solutions 3 Introduction 3 More about the HIPAA Security Rule 3 HIPAA Security

More information

Management: A Guide For Harvard Administrators

Management: A Guide For Harvard Administrators E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered

More information

Institute of Technology, Sligo. Information Security Policy. Version 0.2

Institute of Technology, Sligo. Information Security Policy. Version 0.2 Institute of Technology, Sligo Information Security Policy Version 0.2 1 Document Location The document is held on the Institute s Staff Portal here. Revision History Date of this revision: 28.03.16 Date

More information

Data Center Operations Guide

Data Center Operations Guide Data Center Operations Guide SM When you utilize Dude Solutions Software as a Service (SaaS) applications, your data is hosted in an independently audited data center certified to meet the highest standards

More information

PCGenesis Backup / Reorganization / Restore Checklist

PCGenesis Backup / Reorganization / Restore Checklist PCGenesis Backup / Reorganization / Restore Checklist BACKUP GUIDELINES 1 Include a full backup of K:\*.* in the site s standard server backup process Recommend full backup of K:*.* every night if possible

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

YOUR QUALITY PARTNER FOR SOFTWARE SOLUTIONS TMA SOLUTIONS

YOUR QUALITY PARTNER FOR SOFTWARE SOLUTIONS TMA SOLUTIONS YOUR QUALITY PARTNER FOR SOFTWARE SOLUTIONS TMA SOLUTIONS Security & Intellectual Property Protection Overview Certified ISO 27001:2013 Meet security requirements from global clients Passed all security

More information

Standard: Event Monitoring

Standard: Event Monitoring October 24, 2016 Page 1 Contents Revision History... 4 Executive Summary... 4 Introduction and Purpose... 5 Scope... 5 Standard... 5 Audit Log Standard: Nature of Information and Retention Period... 5

More information

THE TEXAS A&M UNIVERSITY SYSTEM RECORDS RETENTION SCHEDULE

THE TEXAS A&M UNIVERSITY SYSTEM RECORDS RETENTION SCHEDULE 2.1.001 02.100.10 01.404.10 Curriculum Files, including Revisions, Departmental US+5 01.405.10 Instructor/Faculty Evaluations +1 =Academic term 01.406.10 Instructor Grade Books +1 =Academic term 01.407.10

More information

Chapter 10 Protecting Virtual Environments

Chapter 10 Protecting Virtual Environments Chapter 10 Protecting Virtual Environments 164 - Protecting Virtual Environments As more datacenters move to virtualize their environments and the number of virtual machines and the physical hosts they

More information

Best Practices for Using Symantec Online Storage for Backup Exec

Best Practices for Using Symantec Online Storage for Backup Exec WHITE PAPER: xxxxxx Data Protection [00-Cover_Bar] Best Practices for Using Symantec Online Storage for Backup Exec Confidence in a connected world. White Paper: Data Protection Best Practices for Using

More information

Application Lifecycle Management on Softwareas-a-Service

Application Lifecycle Management on Softwareas-a-Service Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application

More information

ISO27001 Preparing your business with Snare

ISO27001 Preparing your business with Snare WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Disaster Recovery Self-Audit

Disaster Recovery Self-Audit Disaster Recovery Self-Audit Disaster Recovery Audit There are 3 steps to this process: 1. Identify all data and IT-related functions (like credit card processing, documents on your file server, member

More information

INTERNATIONAL SOS. Information Security Policy. Version 2.00

INTERNATIONAL SOS. Information Security Policy. Version 2.00 INTERNATIONAL SOS Information Security Policy Document Owner: LCIS Division Document Manager: Group General Counsel Effective: August 2009 Updated: April 2018 2018 All copyright in these materials are

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 6 POLICY TITLE Section Subsection Responsible Office Retention of Electronic Files Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Finance

More information

Version v November 2015

Version v November 2015 Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

WHEATON COLLEGE RETENTION POLICY May 16, 2013

WHEATON COLLEGE  RETENTION POLICY May 16, 2013 WHEATON COLLEGE E-MAIL RETENTION POLICY May 16, 2013 I. PURPOSE Electronic mail (e-mail) has become a ubiquitous service that greatly enhances communication, both internally within the Wheaton community

More information

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced

More information

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates Policy and Procedure: SDM Guidance for HIPAA Business (Adapted from UPMC s Guidance for Business at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/guidanceforbusinessassociates.pdf) Effective:

More information

SOUTH AFRICAN LIBRARY FOR THE BLIND (SALB)

SOUTH AFRICAN LIBRARY FOR THE BLIND (SALB) Name of Institution SOUTH AFRICAN LIBRARY FOR THE BLIND (SALB) Bid Number SALB 2019/01/01 A Description ICT Disaster Recovery and ICT Business Continuity Services to SALB Date Published 20/03/2019 Closing

More information

ICT Data Backup and Recovery Policy

ICT Data Backup and Recovery Policy ICT Data Backup and Recovery Policy TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIMS OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information

Server Security Policy

Server Security Policy Server Security Policy Date: Januray 2016 Policy Title Server Security Policy Policy Number: POL 029 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

Records Management at MSU. Hillary Gatlin University Archives and Historical Collections January 27, 2017

Records Management at MSU. Hillary Gatlin University Archives and Historical Collections January 27, 2017 Records Management at MSU Hillary Gatlin University Archives and Historical Collections January 27, 2017 Today s Agenda Introduction to University Archives Records Management at MSU Records Retention Schedules

More information

Technical and Functional Standards for Digital Court Recording

Technical and Functional Standards for Digital Court Recording Technical and Functional Standards for Digital Court Recording As of February 2015 Overview This document provides detailed specifications for Digital Court Recording (DCR) systems which meet the court

More information

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY JUNE 2017 TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY OVERVIEW The intent of this document is to provide external customers and auditors with a high-level overview of the Tufts Health Plan Corporate

More information

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security HISPOL 003.0 The United States House of Representatives Internet/ Intranet Security Policy CATEGORY: Telecommunications Security ISSUE DATE: February 4, 1998 REVISION DATE: August 23, 2000 The United States

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

Disaster recovery planning for health care data and HIPAA compliance regulations

Disaster recovery planning for health care data and HIPAA compliance regulations Disaster recovery care data and HIPAA compliance regulations Disaster recovery care Disaster recovery planning takes on special importance in health care organizations dealing with patients and care delivery.

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Backup and Recovery FAQs

Backup and Recovery FAQs Backup and Recovery FAQs Introduction The Backup and Recovery application is an easy to use, easy to manage data backup and disaster recovery solution for your DeltaV Distributed Control System (DCS),

More information

v February 2016

v February 2016 Service Description HPE Application Performance Management on Software-as-a- Service v2.1 20 February 2016 This Service Description describes the components and services included in HPE Application Performance

More information

Prohire Software Systems Limited ("Prohire")

Prohire Software Systems Limited (Prohire) Prohire Software Systems Limited ("Prohire") White paper on Prohire GDPR compliance measures 11 th May 2018 Contents 1. Overview 2. Legal Background 3. How Prohire complies 4. Wedlake Bell 5. Conclusion

More information

Provided as an educational service by: Introduction

Provided as an educational service by: Introduction DPC TECHNOLOGY THE GUIDE DISASTER PLANNING ESSENTIALS CLAY ARCHER DPC TECHNOLOGY Provided as an educational service by: Clay Archer, CEO DPC Technology 7845 Baymeadows Way, Jacksonville, FL 32256 (844)

More information

Maher Duessel Not for Profit Training July Agenda

Maher Duessel Not for Profit Training July Agenda Maher Duessel Not for Profit Training July 2018 Agenda Review of ITGCs Review of IT Checklist Other Security Issues Questions 2 1 Review of General Computer Controls 3 ITGC What is that? Information Technology

More information

IT Administrator Templates

IT Administrator Templates IT Administrator Templates Handbook Every IT Must Have! Boost your IT career success more 1. Workstation Management 2. Server Management 3. Server Room Management 4. Data Backup Management 5. LAN / WLAN

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information