Signature: Signed by GNT Date Signed: 6/15/2015. To establish the policies and procedures of the Cyber Crimes Squad.

Size: px
Start display at page:

Download "Signature: Signed by GNT Date Signed: 6/15/2015. To establish the policies and procedures of the Cyber Crimes Squad."

Transcription

1 Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date: June 15, 2015 Applicable To: All employees Approval Authority: Chief George N. Turner Signature: Signed by GNT Date Signed: 6/15/2015 Table of Content 1. PURPOSE 1 2. POLICY 1 3. RESPONSIBILITIES 1 4. ACTION Recognizing Potential Evidence Requests for Assistance Operations Preparing for the Search and/or Seizure Conducting the Search and/or Seizure Other Electronic Storage Devices Transporting Computer-related Equipment Forensic Analysis Electronic Evidence Storage Training Reporting DEFINITIONS CANCELLATIONS REFERENCES PURPOSE 2. POLICY To establish the policies and procedures of the Squad. The Squad shall assist other units in the investigation of any crime that involves the use of computers, enhance investigations where computers are a factor in the crime, preserve the integrity of seized computer evidence, and provide expert testimony in court. 3. RESPONSIBILITIES 3.1 The Squad exists to provide investigative and technical support to officers and investigators in the area of high technology crime (i.e. computer crime, computer media evidence, and major technology component theft). 3.2 The Special Enforcement Section commander shall be responsible for the procurement and maintenance of a technical forensic laboratory and any investigative equipment needed by the Squad, and shall be responsible for the selection of unit members. 3.3 The Homeland Security Unit commander shall implement and oversee this directive. 3.4 Squad investigators shall be a liaison with the Federal Taskforce and provide support to Department investigations to include, but not limited to, the following: computer-related criminal investigations; child pornography; preparation of search warrants for electronic media; on-site support for the execution of search warrants; and initial review of electronic media in situations that are beyond the capabilities of the case investigator.

2 3.5 Employees shall follow this directive when assisting in the investigation of computer-related crimes or evidence. 4. ACTION 4.1 Recognizing Potential Evidence Computer-related Evidence 1. Computers and digital media are increasingly used in unlawful activities. The computer may be contraband, fruits of the crime, or a storage container holding evidence of the offense. 2. Investigation of any criminal activity may produce electronic evidence. Computers and related evidence may range from large mainframe computers to pocket-sized personal data assistants, External Drives, DVDs, CDs, or the smallest electronic chip device. Images, audio, text, and other data on these forms of media are easily altered or destroyed. 3. It is imperative that law enforcement officers recognize, protect, seize and search such devices in accordance with applicable statutes, policies and best practices Answering the following questions shall assist in determining the role of the computer in the crime: 1. Is the computer contraband or fruits of a crime? For example: Was the computer software or hardware stolen? 2. Is the computer system a tool of the offense? For example: Was the system actively used by the defendant to commit the offense? Were factitious IDs or other counterfeit documents prepared using the computer, scanner, and color printer? 3. Is the computer system only incidental to the offense, i.e., being used to store evidence of the offense? For example: Is a drug dealer maintaining trafficking records in the computer? 4. Is the computer system both instrumental to the offense and a storage device for evidence? For example: Did the computer hacker use the computer to attack other systems and/or to store stolen credit card information? Once the computer s role is understood, the following essential questions should be answered: 1. Is there probable cause to seize hardware? 2. Is there probable cause to seize software? 3. Is there probable cause to seize data? 4. Where shall the search be conducted? Page 2 of 11

3 a. Is it practical to search the computer system on site or must the examination be conducted at a field office or lab? b. If law enforcement officers remove the system from the premises to conduct the search, must they return the computer system, or copies of the seized data, to its owner/user before trial? c. Considering the incredible storage capacities of computers, how shall experts search this data in an efficient and timely manner? 4.2 Requests for Assistance During normal business hours, requests for assistance shall be routed to the Homeland Security Unit commander or his or her designee. 1. Requests shall be handled according to priority, and Squad availability. A response protocol shall be developed and followed by the Squad. 2. The Homeland Security Unit shall provide after hours contact information for the Cyber Crimes Squad investigator to the Communications Section. The unit commander or his or her designee must authorize compensatory time or overtime for after hours work by the Cyber Crime Squad Squad employees can provide telephone consultation and/or respond to the scene in situations where evidence-related computer equipment is powered on and such equipment involves standard operating systems The unit commander or his or her designee can authorize other responses, as warranted by circumstances Squad members shall not usually respond to assist with routine seizures of computer evidence where systems are powered off and not networked. 4.3 Operations When Squad members respond to scenes to assist with computer related evidence, they shall have final authority on the handling, collection, and preservation of such evidence When Squad investigators are not on the scene: 1. Department employees are cautioned not to turn on computer equipment that is off, and not to disturb any equipment already on, except for powering it down properly. 2. Employees not familiar with procedures for the proper shutdown and powering off of computer equipment should confer with a Squad member before doing so. 3. Employees should not attempt to view files, or operate software on any computer equipment that potentially contains criminal evidence. Doing so may damage evidence, compromise the integrity of an investigation, and limit any digital evidence that can be forensically recovered. Page 3 of 11

4 4.3.3 Computer Equipment (CALEA 5 th edition standard ) 1. Before handling or moving any equipment, officers shall contact an investigator. Photograph or videotape the equipment in its original position, including any information displayed on any monitors or output devices. 2. Do not remove any external memory devices, CDs, DVDs from any drives. All software, disks, external memory devices and manuals in the area of the equipment being recovered shall also be collected. 3. Leave the non-networked equipment on and unplug the power source only from the back of the equipment. Once the power is disconnected, all wires and connections shall be labeled so that they can be reconnected later exactly as they were found. 4.4 Preparing for the Search and/or Seizure Using evidence obtained from a computer in a legal proceeding requires: 1. Probable cause for the issuance of a warrant or an exception to the warrant requirement. 2. Caution: When encountering potential evidence that may be outside the scope of the existing warrant or legal authority, contact the Squad or the prosecutor, as an additional warrant may be necessary. 3. Use of appropriate collection techniques, so as not to alter or destroy evidence. 4. Forensic examination of the system completed by trained personnel in a speedy fashion, with expert testimony available at trial. 4.5 Conducting the Search and/or Seizure Once the computer s role is understood and legal requirements are fulfilled, secure the scene: 1. Officer safety is paramount. 2. Preserve the area for potential fingerprints. 3. Immediately restrict access to computer(s). 4. If a computer is determined to be evidence, the officer should immediately ascertain if a wireless router is present on the scene and, if so, any phone, cat 5, Ethernet or other data transfer cable should be removed from the router unless the target computer is part of a network that when disconnected would have detrimental effect on normal operating processes of a business. 5. Leave USB devices plugged in and conduct a soft shutdown on the computer, which is shutting down the computer under software control, without removing power from the system. Page 4 of 11

5 4.5.2 Stand-Alone Computer (non-network): 1. Consult a Squad investigator. 2. If investigator is not available: a. Photograph the screen, then disconnect all power sources; unplug from the wall and the back of the computer. b. Place evidence tape over each drive slot. c. Photograph, diagram and label the back of computer components with existing connections. 3. Label all connectors and cable ends to allow reassembly as needed Networked Computers 1. Consult a Squad investigator for further assistance; do not take action without Squad guidance. 2. Pulling the plug could: a. Severely damage the system b. Disrupt legitimate business c. Create officer and Department liability 3. All umbilical devices connected to the computer being recovered, such as mouse, printers, monitors, scanners, etc., should be recovered as well. 4.6 Other Electronic Storage Devices Electronic devices may contain viable evidence associated with criminal activity. Unless an emergency exists, the device should not be accessed. Should it become necessary to access the device, all actions associated with the manipulation of the device should be noted, in order to document the chain of custody and ensure its admission in court Wireless Communication Devices Cell Phones, Pads, and Tablets 1. Potential Evidence Contained in Wireless Communication Devices: a. Numbers called b. Names and addresses c. Caller ID for incoming calls d. Other information contained in the memory of wireless telephones e. Phone/pager numbers Page 5 of 11

6 f. PIN numbers g. Voice mail access numbers h. Voice mail password i. Debit card numbers j. Calling card numbers k. and Internet access information l. The on-screen image may contain other valuable information 2. On and Off Rule Facsimile Machines a. If the device is ON, do NOT turn it OFF (1) Turning it OFF could activate the lockout feature, do NOT power down prior to transport (take any power supply cords present). (2) Write down all information on display (photograph if possible). (3) Notify Squad personnel immediately, if you suspect critical information is on a phone that you did not turn off. Squad personnel shall advise the requesting officer how to obtain the proper warrant or waivers, and shall attempt to recover the data from the phone prior to being turned into property. The phone should be secured in a faraday bag, or placed in an area where it cannot receive radio signals until the phone is examined. b. If the device is OFF, leave it OFF (1) Turning it on could alter evidence on the device (same as computers). (2) Upon seizure get it to an expert as soon as possible or contact local service provider. (3) Make every effort to locate any instruction manuals pertaining to device. 1. Potential Evidence contained in Fax machines: a. Speed dial list b. Stored faxes (incoming and outgoing) c. Fax transmission logs (incoming and outgoing) d. Header line Page 6 of 11

7 e. Clock setting 2. Best Practices Fax Machines: If a fax machine is found ON, leave it "ON. Powering down may cause the loss of last number dialed and/or stored faxes. Pull the plug directly from the wall. 3. Other Considerations: Caller ID Devices a. Record telephone line number fax is plugged into b. Header line should be the same as the phone line user sets header line c. All manuals should be seized with equipment, if possible 1. Potential Evidence contained in Caller ID Devices: a. May contain telephone numbers from incoming telephone calls b. May contain subscriber information from incoming telephone calls 2. Best Practices Caller ID Devices: a. Interruption of the power supply to device may cause loss of data if not protected by internal battery back-up. b. Document all stored data prior to seizure or loss of data may occur Smart Cards: A plastic card the size of a standard credit card that holds a microprocessor (chip) which is capable of storing monetary value and other information. Smart Card technology is used in some wireless telephones and may be found with wireless devices (see Section 4.6.1) 1. Potential Evidence contained in Smart Cards: a. Secure logon and authentication of users b. Storage of digital certificates, credentials and passwords c. Encryption of sensitive data 2. Best Practices Smart Cards: a. Contact a Squad investigator for further information. b. Use appropriate collection techniques so as not to alter or destroy evidence. Page 7 of 11

8 4.6.5 Tracing an Internet 1. When an internet message is sent, the user typically controls only the recipient line(s) (To: and Bcc :), the Subject: line, and the message itself. 2. software adds the rest of the header information as it is processed. Officers responding and collecting evidence shall collect the Internet Header information. This information is vital to tracing s. If the responding officer isn t sure how to collect this information, they should contact Squad investigators. 3. Reading an header: Sample Header -----Message header follows----- (1) Return-path: <abottom@abcd.gov (2) Received: from xyz.gov by abcd.gov id BB68238; Fri, 28 Dec 99 15:50:49 EST (3) Received: from local host by abcd.gov id AA12345; Fri, 28 Dec 99 15:50:01 EST (4) Message-Id: AA12345@xyz.gov (5) Date: Fri, 28 Dec 99 15:50:01 PST (6) From: A. Bottoms <abottomabct.gov> (7) To: Dave Smit dsmit@hij.com (8) CC: Ganggang@klm.net, Danny K DK99999@aol.com a. Line (1) tells other computers who really sent the message, and where to send error messages (bounces and warnings). b. Lines (2) and (3) show the route the message took, from sending to delivery. Each computer that receives this message adds the received field with its complete address and time stamp; this helps in tracking delivery problems. c. Line (4) is the Message-ID, a unique identifier for this specific message. This ID is logged, and can be traced through computers on the message route if there is a need to track the mail. d. Line (5) shows the date, time, and time zone when the message was sent. e. Line (6) tells the name and address of the message originator (the sender ). f. Line (7) shows the name and address of the primary recipient; the address may either be for a mailing list, system-wide alias, or a personal username. g. Line (8) lists the names and addresses of the courtesy copy recipients of the message. There may be Bcc. Recipients as well; these blind carbon copy recipients get copies of the message, but their names and addresses are not visible in the headers. Page 8 of 11

9 4.7 Transporting Computer-related Equipment If transporting is required, package components and transport/store components as fragile cargo. Keep away from magnets, radio transmitters and otherwise hostile environments Do not transport any electronic equipment in the trunk of a vehicle that has any kind of Police radio; this can cause damage to the evidence. It is best placed on the back seat Protect the equipment from the weather and transport it as soon as possible to Logistical Support Unit Place all the diskettes and other electronic storage devices in a paper bag or leave them in their own holders. 4.8 Forensic Analysis The forensic analysis of digital evidence is guided by the request of the submitting officer and the scope of the search warrant/waiver, where applicable. 1. Analyzing digital media is for the recovery of both incriminating and exculpatory evidence. 2. Examinations shall be conducted in an unbiased approach. 3. Each analysis is different, and the methods used to recover evidence shall vary somewhat from case to case Forensic examinations of computer related media for digital evidence shall be conducted upon written request, utilizing the Computer Evidence Submission form (APD-353) and accompanied by the required documents (i.e. waivers, warrant affidavits, supplements, etc.). 1. Computer analysis requests must be routed through the Homeland Security Unit commander. 2. Examinations shall be scheduled in the order they are received, unless specific needs are articulated that require certain cases be handled before others Squad members shall coordinate with the Homeland Security Unit commander on conducting casework and forensic examinations. 1. In-Lab forensic examinations of computer media shall be performed as time allows or on overtime, as appropriate. 2. The Squad equipment shall be kept secure and in a locked location. 3. For access to any Computer Crime Lab facilities in the Special Enforcement Section, non- APD members must be escorted by the SES commander, Homeland Security Unit commander, or a Squad member When conducting analyses of computers and/or digital media, the Squad shall follow generally accepted forensic examination practices as employed by federal, state, and local law enforcement agencies across the United States. Page 9 of 11

10 4.9 Electronic Evidence Storage Due to the fragile nature of computerized electronics, evidence must be stored properly The Logistical Support Unit shall maintain a storage area for all electronic evidence that is airconditioned/heated, and has humidity control. 1. Electronic evidence should be stored at degrees Fahrenheit and 25 40% relative humidity 2. The storage area must also be shielded from magnetic fields. Electric motors, car and home speakers contain magnets and should be stored far away from all electronic evidence. City transmitting radio equipment, i.e. antennas, microwave, transmitters, must also be kept away from electronic evidence. Plastic and metal shelving can carry static and magnetic fields, and should be avoided. 3. This storage area should include areas for plugging in electronic devices that may require power to maintain the evidence. These power receptacles should be backed up by UPS systems (battery backup) and protected against electrical power spikes and surges Images of electronic evidence 1. All images (copies) of electronic evidence shall be handled in the same manner as original electronic evidence. a. All accesses to the image (copy) of the electronic evidence shall be logged. b. A copy of the access log shall be maintained for a period of 10 years, or longer if the case has not reached its final conclusion. 2. All images (copies) of original evidence shall be stored for 180 days after the case is turned over to the District Attorney s office. 3. If the District Attorney requires the images (copies) to be maintained longer than the 180 days, they should be required to provide storage space for the images (copies) and they shall be turned over to the District Attorney s office for storage Original electronic evidence should be maintained until the case is adjudicated following the current logistical support guidelines. Since some electronic evidence may be, in fact, contraband (i.e. Child Pornography), or personnel information covered by the HIPPA, NO electronic evidence shall be released to the public, unless ordered by the court, without it being securely wiped (erased) to Department of Defense Standards. Original evidence returned to the original owner shall not automatically be wiped (erased), unless it contained contraband (i.e., Child Pornography,) or unless ordered by the court Training The Squad shall seek training opportunities to maintain skills and knowledge The Squad shall be knowledgeable of statutes, case law, and guidelines (state and federal) pertaining to computer crime and digital evidence. Page 10 of 11

11 Department members shall confer with the Squad on situations where they are not clear on legal or procedural issues, especially when an investigation may involve electronic communications ( seizure, publishing online or otherwise, etc.) Reporting Squad members shall follow the general Department protocols for any investigative reports they prepare Forensic analysis reports generated by Squad investigators shall be prepared according to established Unit protocols The Criminal Investigation Division supervisors shall forward copies of any incident reports or completed investigations involving the use of a computer The Criminal Investigation Division supervisors shall also forward copies of cases involving any retail, commercial or government entities and any cases involving a loss (greater than $10,000) of computer equipment. 1. If the evidence is retained for investigation by Squad investigators, a copy shall be sent to the Squad. 2. This process shall aid in tracking instances of computer-involved crime. 3. The Squad shall maintain statistics on computer-related crimes, regardless of what unit actually investigates the case. 5. DEFINITIONS 5.1 Faraday bag: A container that blocks radio frequencies. 5.2 Image: Copies of electronic evidence. 5.3 Network Computer: A computer system that operates exclusively via a network connection. It boots off the network, but runs its applications locally, using its own CPU and memory. 6. CANCELLATIONS, effective October 1, REFERENCES Electronic Crime Scene Investigation: A guide for first responders CALEA Standards: Page 11 of 11

Digital Forensics at a University. Calvin Weeks Director, Oklahoma Digital Forensics Lab University of Oklahoma

Digital Forensics at a University. Calvin Weeks Director, Oklahoma Digital Forensics Lab University of Oklahoma Digital Forensics at a University Calvin Weeks Director, University of Oklahoma Calvin Weeks Director, Former Director of IT Security Certified EnCASE Examiner (EnCE) VP of the local chapter of HTCIA Co-Chair

More information

Signature: Signed by GNT Date Signed: 5/26/2015

Signature: Signed by GNT Date Signed: 5/26/2015 Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date June 1, 2015 Mobile Video and Audio Recording Applicable To: All employees Approval Authority: Chief George N. Turner

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

Audio, Video or Photographic Recording Devices 5. DEFINITIONS 6 CANCELLATIONS 7. REFERENCES

Audio, Video or Photographic Recording Devices 5. DEFINITIONS 6 CANCELLATIONS 7. REFERENCES Page 1 of4 [Administration] [Personnel] [General Operations] [Field Operations] [Criminal Investigations] [ Support Operations] [Special Orders] [Command Memo] [Library] [Search] [Home] Atlanta Police

More information

Credit Card Data Compromise: Incident Response Plan

Credit Card Data Compromise: Incident Response Plan Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,

More information

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 3.63 REVISED TOTAL PAGES Dec. 30, 2007 8 Division Computer Systems Cross Reference: I. Definitions A. Executable File A program or file

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

MODULE No. 33: Digital Crime Scene Investigation

MODULE No. 33: Digital Crime Scene Investigation SUBJECT Paper No. and Title Module No. and Title Module Tag FSC_P16_M33 TABLE OF CONTENTS 1. Learning Outcomes 2. Introduction 3. Digital Crime Scene Investigation. 3.1 What Is Digital Evidence? 3.2 Working

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

Red Flags Program. Purpose

Red Flags Program. Purpose Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

Incident Handling. Road Map. Week 4: Incidents, Evidence and the Law. Types of Evidence. Digital Evidence. Characteristics of Evidence

Incident Handling. Road Map. Week 4: Incidents, Evidence and the Law. Types of Evidence. Digital Evidence. Characteristics of Evidence Incident Handling Week 4: Incidents, Evidence and the Law George Berg & Jagdish S. Gangolly State University of New York at Albany Road Map What is digital evidence? What are different types of evidence?

More information

TELEPHONE AND MOBILE USE POLICY

TELEPHONE AND MOBILE USE POLICY TELEPHONE AND MOBILE USE POLICY Date first approved: 9 December 2016 Date of effect: 9 December Date last amended: (refer Version Control Table) Date of Next Review: December 2021 First Approved by: University

More information

( Utility Name ) Identity Theft Prevention Program

( Utility Name ) Identity Theft Prevention Program ***DRAFT*** ( Utility Name ) Identity Theft Prevention Program Implemented as of, 2008 *** This document is intended to give guidance to municipal utilities in their understanding of the FTC Red Flag Rule.

More information

Wireless Communication Device Use Policy

Wireless Communication Device Use Policy Wireless Communication Device Use Policy Introduction The Wireless Communication Device Policy exists to provide guidance to employees regarding the acquisition and use of William Paterson University provided

More information

Responding to Cybercrime:

Responding to Cybercrime: Responding to Cybercrime: Preserving Crucial Evidence for Law Enforcement RCMP National Division Integrated Technological Crime Unit (ITCU) Presented by : Sgt. Stéphane Turgeon Cpl. David Connors 2 Goals

More information

New Model for Cyber Crime Investigation Procedure

New Model for Cyber Crime Investigation Procedure New Model for Cyber Crime Investigation Procedure * *Dept. of IT & Cyber Police, Youngdong University, Rep. of Korea ydshin@youngdong.ac.kr doi:10.4156/jnit.vol2.issue2.1 Abstract In this paper, we presented

More information

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference: CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function

More information

Incident Response Data Acquisition Guidelines for Investigation Purposes 1

Incident Response Data Acquisition Guidelines for Investigation Purposes 1 Incident Response Data Acquisition Guidelines for Investigation Purposes 1 1 Target Audience This document is aimed at general IT staff that may be in the position of being required to take action in response

More information

This chapter should be read in conjuction with the Search and Surveilance Act 2012 and the Search chapters of the Police Manual.

This chapter should be read in conjuction with the Search and Surveilance Act 2012 and the Search chapters of the Police Manual. events This chapter contains the following topics: Summary Recording equipment must be Police-issued and approved Benefits for Police of recording operations and events - Media filming of Police operations

More information

Records Information Management

Records Information Management Information Systems Sciences Records Information Management Region V Spring Conference March 26, 2015 Was I supposed to keep that 1 Where did we store that 2 Space Issues. Need storage space for a classroom

More information

On-Officer Body Camera Program

On-Officer Body Camera Program 1 of 7 1. PURPOSE This order establishes the Mesa Police (MPD) operational and submission guidelines for the "On-Officer" Body Camera (OBC) Pilot, which will be implemented for one year ending October

More information

Donor Credit Card Security Policy

Donor Credit Card Security Policy Donor Credit Card Security Policy INTRODUCTION This document explains the Community Foundation of Northeast Alabama s credit card security requirements for donors as required by the Payment Card Industry

More information

Computer Forensics US-CERT

Computer Forensics US-CERT Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further

More information

TIME SYSTEM SECURITY AWARENESS HANDOUT

TIME SYSTEM SECURITY AWARENESS HANDOUT WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/16/2017 2018 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

Incident Handling. Week 4: Incidents, Evidence and the Law

Incident Handling. Week 4: Incidents, Evidence and the Law Incident Handling Week 4: Incidents, Evidence and the Law George Berg & Jagdish S. Gangolly University at Albany 4/27/04 Incident Handling (G. Berg & J. Gangolly) 1 Road Map What is digital evidence? What

More information

Management: A Guide For Harvard Administrators

Management: A Guide For Harvard Administrators E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of

More information

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 2 Understanding Computer Investigations

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition Chapter 2 Understanding Computer Investigations Objectives Explain how to prepare a computer investigation Apply a systematic approach to an

More information

Financial CISM. Certified Information Security Manager (CISM) Download Full Version :

Financial CISM. Certified Information Security Manager (CISM) Download Full Version : Financial CISM Certified Information Security Manager (CISM) Download Full Version : http://killexams.com/pass4sure/exam-detail/cism required based on preliminary forensic investigation, but doing so as

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

Computer forensics Aiman Al-Refaei

Computer forensics Aiman Al-Refaei Computer forensics Aiman Al-Refaei 29.08.2006 Computer forensics 1 Computer forensics Definitions: Forensics - The use of science and technology to investigate and establish facts in criminal or civil

More information

[Utility Name] Identity Theft Prevention Program

[Utility Name] Identity Theft Prevention Program [Utility Name] Identity Theft Prevention Program Effective beginning, 2008 Minnesota Municipal Utilities Association Sample Red Flag policy I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed

More information

PRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement

PRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement CHESTER COUNTY DISTRICT ATTORNEY S OFFICE TELEPHONE: 610-344-6801 FAX: 610-344-5905 THOMAS P. HOGAN DISTRICT ATTORNEY 201 W. MARKET STREET, SUITE 4450 POST OFFICE BOX 2748 WEST CHESTER, PA 19380-0991 March

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

ATLANTIC BROADBAND LAW ENFORCEMENT HANDBOOK

ATLANTIC BROADBAND LAW ENFORCEMENT HANDBOOK ATLANTIC BROADBAND LAW ENFORCEMENT HANDBOOK INTRODUCTION Atlantic Broadband will assist law enforcement agencies in their investigations while protecting subscriber privacy as required by law and applicable

More information

Special REPORT APR. 08. Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition.

Special REPORT APR. 08. Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition. APR. 08 U.S. Department of Justice Office of Justice Programs National Institute of Justice Special REPORT Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition www.ojp.usdoj.gov/nij

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications

More information

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program

More information

City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program

City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program City of New Haven Identity Theft Prevention Program, October 2008, page City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program Adopted by Resolution of the Mayor and

More information

Prevention of Identity Theft in Student Financial Transactions AP 5800

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to

More information

Test Results for Mobile Device Acquisition Tool: Zdziarski s Method

Test Results for Mobile Device Acquisition Tool: Zdziarski s Method 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Test Results for Mobile Device Acquisition Tool: Zdziarski s Method October 2010 37 38 38 October 2010

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Red Flag Policy and Identity Theft Prevention Program

Red Flag Policy and Identity Theft Prevention Program Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible

More information

MOBILE DEVICE FORENSICS

MOBILE DEVICE FORENSICS MOBILE DEVICE FORENSICS Smart phones and other handheld electronics have become an important part of our everyday lives and the ever changing technology is making these devices a major source of digital

More information

5. Execute the attack and obtain unauthorized access to the system.

5. Execute the attack and obtain unauthorized access to the system. Describe how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about information security. Before discussing the preventive, detective, and

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive

More information

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies: ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications

More information

Somerset County Jail Policy and Procedure Inmate Mail Page 1 of 6

Somerset County Jail Policy and Procedure Inmate Mail Page 1 of 6 POLICY TITLE: Inmate Mail PAGE 1 OF 5 POLICY NUMBER: 14.1 CHAPTER: 14 Prisoner Communications SOMERSET COUNTY, SOMERSET COUNTY JAIL Approved by: ---------Original Signed Signature of Sheriff ACA STANDARDS:

More information

SPECIAL ISSUE, PAPER ID: IJDCST-09 ISSN

SPECIAL ISSUE, PAPER ID: IJDCST-09 ISSN Digital Forensics CH. RAMESH BABU, Asst.Proffessor, Dept. Of MCA, K.B.N.College, Vijayawada Abstract: The need for computer intrusion forensics arises from the alarming increase in the number of computer

More information

By accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other

By accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other CONGRESSIONAL FEDERAL CREDIT UNION ELECTRONIC CORRESPONDENCE DISCLOSURE & AGREEMENT Please read this information carefully and print a copy and/or retain this information electronically for your records.

More information

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications Gramm-Leach Bliley Act Section 501(b) and Customer Notification Roger Pittman Director of Operations Risk Federal Reserve Bank of Atlanta Overview Bank IT examination perspective Background information

More information

Snap Inc. Law Enforcement Guide

Snap Inc. Law Enforcement Guide Snap Inc. Law Enforcement Guide Last Updated: April 27, 2018 Download the most recent version at: https://www.snapchat.com/lawenforcement Mailing Address: Custodian of Records Snap Inc. 63 Market Street

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

THINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte

THINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte Inside magazine issue 16 Part 03 - From a risk and cyber perspective perspective Roland Bastin Partner Risk Advisory Deloitte Gunnar Mortier Senior Manager Risk Advisory Deloitte THINGS YOU NEED TO KNOW

More information

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,

More information

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 North Gem School District No. 149 establishes the following guidelines to provide administrative direction pertaining to the retention

More information

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification University of California UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification UCOP Implementation Plan for Compliance with Business and Finance Bulletin

More information

Xerox FreeFlow Print Server. Security White Paper. Secure solutions. for you and your customers

Xerox FreeFlow Print Server. Security White Paper. Secure solutions. for you and your customers Xerox FreeFlow Print Server Security White Paper Secure solutions for you and your customers Executive Summary Why is security more important than ever? New government regulations have been implemented

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is

More information

BHIG - Mobile Devices Policy Version 1.0

BHIG - Mobile Devices Policy Version 1.0 Version 1.0 Authorised by: CEO Endorsed By: Chief Operations Officer 1 Document Control Version Date Amended by Changes Made 0.1 20/01/2017 Lars Cortsen Initial document 0.2 29/03/2017 Simon Hahnel Incorporate

More information

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE I. Description of Course: 1. Department/Course: CNET - 174 2. Title: Computer Forensics 3. Cross Reference: 4. Units: 3 Lec Hrs:

More information

SPRING-FORD AREA SCHOOL DISTRICT

SPRING-FORD AREA SCHOOL DISTRICT No. 801.1 SPRING-FORD AREA SCHOOL DISTRICT SECTION: TITLE: OPERATIONS ELECTRONIC RECORDS RETENTION ADOPTED: January 25, 2010 REVISED: October 24, 2011 801.1. ELECTRONIC RECORDS RETENTION 1. Purpose In

More information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington

More information

Identity Theft Prevention Program. Effective beginning August 1, 2009

Identity Theft Prevention Program. Effective beginning August 1, 2009 Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Christian Brothers University developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission's

More information

GUIDANCE ON ELECTRONIC VOTING SYSTEM PREPARATION AND SECURITY

GUIDANCE ON ELECTRONIC VOTING SYSTEM PREPARATION AND SECURITY September, 2016 GUIDANCE ON ELECTRONIC VOTING SYSTEM PREPARATION AND SECURITY As a reminder for counties, and refresher on good cyber hygiene practices, DOS recommends the following procedures in the preparation

More information

Digital Forensics Mobile Device Data Extraction. Crime Scene/Digital and Multimedia Division

Digital Forensics Mobile Device Data Extraction. Crime Scene/Digital and Multimedia Division Mobile Device Data Extraction 12. MOBILE DEVICE DATA EXTRACTION PROCEDURE 12.1. Purpose 12.1.1. The purpose of this procedure is to extract data from mobile devices and/or removable media utilizing the

More information

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance. Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV

More information

Digital Forensics for Attorneys

Digital Forensics for Attorneys Lars E. Daniel, EnCE, ACE, AME, CTNS Digital Forensics Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital

More information

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules

More information

FIRST RESPONDER FORENSICS

FIRST RESPONDER FORENSICS FIRST RESPONDER FORENSICS or Can I Pull the Plug Now? Mick Walsh Special Agent United States Secret Service Miami Electronic Crimes Task Force THE U.S. SECRET SERVICE Created in 1865 at the end of the

More information

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER. When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the

More information

Select Agents and Toxins Security Plan Template

Select Agents and Toxins Security Plan Template Select Agents and Toxins Security Plan Template 7 CFR Part 331.11, 9 CFR Part 121.11, 42 CFR Part 73.11 Prepared by U.S. Department of Health and Human Services (HHS) Centers for Disease Control and Prevention

More information

GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND

GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND GENERAL ORDER DISTRICT OF COLUMBIA Subject Teletype Unit Messages, Notifications, and Inquiries Topic Series Number SPT 302 04 Effective Date April 21, 2015 Replaces: GO-SP-302.04 (Transmitting of Telecommunications

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Status: Released Page 2 of 7 Introduction Our Data Protection policy indicates that we are dedicated to and responsible of processing the information of our employees, customers,

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

Date of Next Review: May Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act

Date of Next Review: May Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act Date Approved: January 27, 2010-Board Date of Next Review: May 2023 Dates of Amendments: May 17, 2018 Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act

More information

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014 Computer Security Incident Response Plan Name of Approver: Mary Ann Blair Date of Approval: 23-FEB-2014 Date of Review: 31-MAY-2016 Effective Date: 23-FEB-2014 Name of Reviewer: John Lerchey Table of Contents

More information

Security of Information Technology Resources IT-12

Security of Information Technology Resources IT-12 Security of Information Technology Resources About This Policy Effective Dates: 11-28-2007 Last Updated: 10-23-2017 Responsible University Administrator: Office of the Vice President for Information Technology

More information

Video and Audio Recordings Video and audio recordings of activities continue to

Video and Audio Recordings Video and audio recordings of activities continue to Chapter 3 Video and Audio Recordings Video and audio recordings of activities continue to become prevalent in investigations of criminal activity. Recordings include surveillance tapes recordings of criminal

More information

LOYOLA UNIVERSITY MARYLAND. Policy and Guidelines for Messaging to Groups

LOYOLA UNIVERSITY MARYLAND. Policy and Guidelines for Messaging to Groups LOYOLA UNIVERSITY MARYLAND Policy and Guidelines for Messaging to Groups October 29, 2013 LOYOLA UNIVERSITY MARYLAND Policy and Guidelines on Messaging to Groups Transmission of messages to groups of recipients

More information

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE Information Technology Services Administrative Regulation ITS-AR-1506 INFORMATION SECURITY-SECURITY INCIDENT RESPONSE 1.0 Purpose and Scope The purpose of the Security Response Administrative Regulation

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

Institute of Technology, Sligo. Information Security Policy. Version 0.2

Institute of Technology, Sligo. Information Security Policy. Version 0.2 Institute of Technology, Sligo Information Security Policy Version 0.2 1 Document Location The document is held on the Institute s Staff Portal here. Revision History Date of this revision: 28.03.16 Date

More information

Public Safety. Director. City-County Bureau of Identification. Drug Analysis. Emergency Response. Field Services. Latent Examination

Public Safety. Director. City-County Bureau of Identification. Drug Analysis. Emergency Response. Field Services. Latent Examination Public Safety Director Emergency Medical Services Fire/Rescue Services City-County Bureau of Identification Emergency Management Administration & Criminal Justice Planning Medical Director Emergency Response

More information

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance

More information

FERPA & Student Data Communication Systems

FERPA & Student Data Communication Systems FERPA & Student Data Ellevation is subject to the Family Educational Rights and Privacy Act (FERPA) as operating under the "school official" exception, wherein student directory and PII (Personal Identifying

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 9 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

Signature: Signed by GNT Date Signed: 5/29/15

Signature: Signed by GNT Date Signed: 5/29/15 Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date June 1, 2015 Applicable To: All sworn employees Approval Authority: Chief George N. Turner Signature: Signed by GNT Date

More information

Chapter 13: The IT Professional

Chapter 13: The IT Professional Chapter 13: The IT Professional IT Essentials v6.0 ITE v6.0 1 Chapter 13 - Sections & Objectives 13.1 Communication Skills and the IT Professional Explain why good communication skills are a critical part

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

ACCEPTABLE USE POLICIES FOR INFORMATION SERVICES COMPUTING RESOURCES

ACCEPTABLE USE POLICIES FOR INFORMATION SERVICES COMPUTING RESOURCES ACCEPTABLE USE POLICIES FOR INFORMATION SERVICES COMPUTING RESOURCES Information Security Team DePaul University 1 East Jackson Boulevard Chicago, Illinois 60604 US https:/infosec.depaul.edu/ 13th December

More information

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015 Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015 Definitions Cellular Telephone Service For the purposes of this policy, cellular telephone

More information