IPAWS: What Now? IPAWS: What Now. IPAWS: What Now. Integrated Public Alert and Warning System. How do I get assistance?

Size: px
Start display at page:

Download "IPAWS: What Now? IPAWS: What Now. IPAWS: What Now. Integrated Public Alert and Warning System. How do I get assistance?"

Transcription

1 Emergency Management Training Center IPAWS: What Now? and Warning System John Dooley IPAWS Program Manager IPAWS: What Now Where we re at now? What training is required to send IPAWS alerts? What type of training is available? What value regular testing my notification system is to my organization? IPAWS: What Now How do I get assistance? Public Information and Warning into my exercises? Update on upcoming changes. 1

2 Where we re at now? Who in public safety has used IPAWS? Martin County McLeod Grant Wilkin Wireless Emergency Alerts WEA 2

3 Wireless Emergency Alert Who uses it? NWS Public Safety Wireless Emergency Alert What are they used for? Codes Used by Year TOR FFW SVR WSW BZW CDW SPW CEM Wireless Emergency Alert WEA by Forecast Office WEA sent by WFO La Crosse Chanhassen Duluth Grand Forks Souix Falls Aberdeen

4 TRAINING Why do we train? Training your employees can increase their efficiency and productivity in completing their daily work tasks. Reasons not to Train Lack of familiarity with the software. Not knowing: When to use it, What s the trigger point that we need to warn everyone we can. How it works, compared to the Opt In alerts that users are accustom to sending currently. Fear of inappropriately sending off an alert. 4

5 Emergency Management Training Center The only dumb question is? The one you don t ask! Emergency Management Training Center What could go wrong! Murphy's law: "whatever can go wrong, will go wrong." Sorry that tee shirt is out of stock! 5

6 Why do we train? Training can also help your organization achieve greater consistency in process adherence, making it easier to project outcomes and meet organizational goals and targets. Required Training Q: What training is required to send alerts through IPAWS? A: FEMA independent study course IS 247a. What type of training is available? 6

7 Online Training FEMA Independent Study Courses IS 247a IPAWS Alerting Authority IS 248 Online Course for the American People IS 251 IPAWS for Alerting Authorities Best Practices. Onsite Training Public Alerting Authority Best Practices Workshop Facilitator led workshop 2 hours on best practices 1 hour on scenarios for when to warn 1 hour practical exercise More Online Training The Minnesota Public Alerting Authority Best Practices Guide is now online. About 2 hours to complete To get access to Alexandria Technical and Community College customized training courses contact: Linda Muchow or lindac@alextech.edu 7

8 Alexandria Tech Testing What value regular testing my notification system is to my organization? Testing Value of regular testing Familiarity Knowing the web address to the software. Knowing your password! Knowing any other codes. 8

9 Testing Value of regular testing Proficiency Doing a test weekly makes you go through the process. Say a month has gone by and you missed that there was a software update.. Testing Consistent Outcome You have confidence You have done it over and over Practice, Practice, Practice. Testing Who s testing regularly Anoka Douglas Hennepin HSEM McLeod Nobles Rochester (Olmsted) Scott 9

10 Training is like bathing Its not permanent Emergency Management Training Center Training and Exercise Support How do I get assistance? Joint Interoperability Test Command Off Site Testing (via webinar): Alerting Authority contacts the JITC POC Alerting Authority provides 2 3 test dates and times (typically 1 hour sessions). JITC schedules a webinar with the Alerting Authority. Alerting Authority ensures test security certificate are uploaded to alert origination tool. 10

11 Joint Interoperability Test Command Independent Testing: No need to notify JITC POC Alerting Authority ensures test security certificate is uploaded to alert origination tool. Alerting Authority verifies test alerts via the IPAWS Message Viewer. Independent Testing with the JITC Emergency Management Training Center Validate that plan! Public Information and Warning into my exercises? 11

12 Validate that plan! Hold on do we have a plan? Validate that plan! Include Public Information and Warning in every exercise you can! Exercise your public information plans. Look at the alerting process all the way up to sending the alert. In your plan you should look at: Who decides to send an alert; Incident Commander, Sheriff, Emergency Manager, Shift Supervisor, ect. Approval process, is there one in place? Are the training records complete? Sustainment training for those involved? 12

13 Emergency Management Training Center IPAWS Program Update on upcoming changes FCC time line for improvements to WEA 1 November 2017 Phone numbers and URL s allowed as part of message. 1 November 2018 Spanish Language alerts to consumers 1 May 2019 Character count increases to 360 Establishment of a Public Safety Message 1 November 2019 Enhanced Geo coding of WEA polygons down to 1/10 th of a mile. Message retention for at least 24 hours BLU Alert and EAS changes BLU Alert EAS Jan 2019 WEA August 2019 EAS Changes Announcement coming from FCC Spring

14 Pending Legislation Emergency Management Training Center The only dumb question is? The one you don t ask! Thank You John Dooley IPAWS Program Manager Division of Emergency Communication Networks john.dooley@state.mn.us 14

15 [Year] [Your Organization] Alerting System POLICY MANUAL

16 Table of Contents 1. Purpose Background Training Acceptable Use a. Alert Activation b. Community Alerting c. IPAWS Activation... 3 CDW - Civil Danger Warning:... 3 CEM - Civil Emergency Message:... 3 EVI - Evacuate Immediate:... 3 SPW - Shelter in Place Warning:... 4 RWT - Required Weekly Test: Alert Authorization Alert Decision Making System Use Not Permitted Effective Messaging Cross-Border / Neighboring Jurisdiction Notification [YOUR ORGANIZATION] System Management a. System Security b. System Certificates... 8 GLOSSARY... 9 i

17 1. Purpose This policy does not supersede the existing [Your notification system] policy for Community Notification Alerts and [Your notification system] users should adhere to the most current [Your notification system] operation policy for all non-lpaws community notifications. This policy is designed to make the connection between community notification alerts and alerts that are of great danger to everyone in the area. The [your organization] is an alerting authority authorized to use the Federal Emergency Management Agency (FEMA) and Warning System (IPAWS) Open Platform for Emergency Networks (OPEN). [Your organization] gains access to FEMA IPAWS OPEN through vendor software provided by [Your vendor NAME] product known as [Your notification system]. The purpose of this IPAWS Policy is to manage the access and usage of IPAWS by [your organization]. The web address to log into [Your Notification System] is: 2. Background [Your notification system] is for sending out Public Information and Warnings to our communities, this includes non-emergency and well as emergency messages. This policy will help you determine the most appropriate use of [Your notification system]. Community notifications can be sent out using [Your notification system] to preloaded land line telephone and fax numbers, or to persons who have signed up for notifications by text, or social media. These persons we would notify for non-emergency events as well as life threatening events. We have the capability to expand our warning coverage through the and Warning System (IPAWS) which is a system for sending local emergency alerts, maintained by the Federal Emergency Management Agency. It is a key element of the [your organization] plan for public warnings. It is accessed using [Your notification system]. IPAWS is a system of systems that can allow us use the following additional alerting dissemination channels: Note: [your organization] is assigned one FIPS code, for Non-Weather Emergency Messages (NWEM) and Emergency Alert System (EAS) activations, the alert will be disseminated to the entire county. You as an alerting authority should keep this in mind when utilizing IPAWS. Due to the large geographic area of [your organization], over warning is very easy. Emergency Alert System (EAS), alerting through broadcast radio and television stations in the area. The alerts may or may not be automatically broadcasted from a local alerting authority depending on the alerting preferences set by the broadcaster. Wireless Emergency Alerts (WEA) which broadcasts a text alert to all WEA capable cell phones with in the designated alerting are weather they are signed up to receive [Your notification system] messages or not. WEAs are very brief messages, limited to 90 characters, these messages are broadcast from cellular towers in the area that you have designated. WEA s are not text messages nor an imessage (Apple 1

18 product) it is a broadcast message, one-way communication from the tower to phones affiliated with that tower. The targeted area may not completely match a polygon or selected area through the [Your notification system] mapping interface. NOAA All-Hazard Weather Radio (NWEM) which activates tone alert weather radios in our area. NWEMs are alerts that are broadcast through the National Weather Service using the NOAA All-Hazards Radio Network services. Internet Services such as smart phone apps and social media sites that will relay alerts to those who subscribe. COG to COG: COGs are a local alerting authorities. Messages from COG to COG are currently only delivered to the COG's software and not sent to or a mobile device such as a text or call. COGs need to be signed in and monitoring their software to receive a COG to COG alert. If [your organization] sends a COG to COG message, the operator must make a phone call to the other COG alerting them of the COG to COG message. Along with our other Local Alerting Systems such as (ETN, Siren, Digital Signage), an IPAWS alert can also be combined with a notification to staff contact lists, the media distribution list, and an emergency telephone notification recording using the same message launch process from the mass notification system. 3. Training Any member of the [your organization] who is assigned to be capable of disseminating an IPAWS alert must complete FEMA Independent Studies course IS-0247.a (or the most current IPAWS class). This includes any user who has access to IPAWS through the [Your notification system] interface. 4. Acceptable Use 4a. Alert Activation Primary Method:. Alternative Method:. Mutual Aid: In the event these methods do not work, we have a mutual aid agreement with to be our backup. This is accomplished by contacting at The county also has a mutual aid agreement with to be their backup IPAWS alerting authority. 2

19 Such a request would come from. 4b. Community Alerting Specify what uses there would be, no parking notifications, road closures other community information. See the chart below to assist with making the determination level Community Notifications Severe Weather Notifications Parking Restrictions Snow Removal Social Media Need to notify people of up coming events, exercises and other items of intrest. Wireless Emergency Alert Small area to alert, localized incidents Need to reach people in the immediate area Emergency Alert System Large area to alert Need to reach as many as possible in a wide area 4c. IPAWS Activation The effectiveness of IPAWS relies heavily on the appropriate use of the system by local alerting authorities. Over use of the system diminishes the effectiveness of IPAWS as citizens are more likely to ignore or opt-out of receiving notifications if they receive too many alerts. Misuse of the system when there is not an immediate threat reduces the credibility of IPAWS alerts. The State of Minnesota has an IPAWS administrator and committee who establishes what alerting codes alerting authorities are permitted to use. The [your organization] is authorized to use four IPAWS alert codes and one testing code. Acceptable use of IPAWS alerts are identified below: CDW - Civil Danger Warning: Armed personnel with intent to harm the public who are either mobile or whereabouts unknown. The alert should include critical information including area being warned and what the threat is. CEM - Civil Emergency Message: Notifications where the public is in immediate danger or a dangerous environment is imminent or occurring. EVI - Evacuate Immediate: When a large area needs to be evacuated due to a hazard. This can be hazardous materials releases, widespread wildfire threats or HAZMAT emergencies. IPAWS should not be used for small scale evacuations such as a neighborhood or concentrated area and are intended to be used for evacuation orders of a city or large area. Clear instructions must be provided. 3

20 SPW - Shelter in Place Warning: When dangerous situations exist where the public would be safest sheltering in place. Examples could be hazardous materials releases, HAZMAT emergencies or law enforcement emergencies where widespread public safety concerns persist. RWT - Required Weekly Test: The "required" weekly test is not a required for Public Safety organizations as it is for our broadcast and cable partners. Required weekly tests are used to verify EAS activation in the same manner silent testing (air) tests are performed on the outdoor warning sirens. The local alerting authority should contact broadcasters in their area to determine effectiveness of the test. The required weekly test should be coordinated by the agency point of contact. Who is responsible for sending the RWT? When is to be sent? (Predetermined time (or random) one week day shift, the next test night shift) Verification of receipt at EAS participant s location. An unofficial internet site to go to see if the RWT or any other non-weather emergency alert sent has made it past the IPAWS-OPEN server: or the stations to contact in the area are: at (nnn) nnn-nnnn at (nnn) nnn-nnnn 5. Alert Authorization The [your organization] has identified the following personnel to have the authority to issue an IPAWS alert: - Sheriff, - Chief Deputy, - PSAP Supervisor - Emergency Management Director. Prior to a user issuing an IPAWS alert, the user must have explicit authorization from one of the afore-mentioned personnel. If reasonable efforts to gain authorization are unsuccessful, a user may issue an IPAWS alert only if it meets the criteria identified under the acceptable use portion of this policy and with the request from an Incident Commander. 6. Alert Decision Making Making a decision to issue an IPAWS alert can be difficult. The impressive reach and intrusive nature of IPAWS make this a very effective alerting tool but also has the capability of disrupting 4

21 thousands of people. When an alert is issued it should be anticipated that incomplete or inaccurate alerts will cause confusion and adversely affect the public's response as well as generate additional overwhelming inquiries and traffic to the [your organization] PSAP. The following should be considered when making a decision to issue an IPAWS alert: - Does the hazardous situation require the public to take immediate action? - Does the hazardous situation pose a serious threat to life or property? - Is there a high degree of probability the hazard situation will occur? o o Magnitude: A description of the expected impact. How bad is it likely to get? Likelihood: The probability of occurrence of the impacts. If you answered yes to all the questions above then the decision is made to issue an alert, the following should be included in the message: (don t worry about the order but try to cover all five elements) Source: - Who is issuing the warning, is the warning credible? Guidance: - Protective Actions: What protective measures should people take and when? - If evacuation is called for, where should people go and what should they take with them. Hazard: - What is/are the hazards that are threatening? - What are the potential risks? Location: - Where will the impacts occur? - Is the location described so those without local knowledge will understand their risk? Time (duration / termination): - When should people take action? - How long will the impacts last? 5

22 7. System Use Not Permitted FEMA IPAWS cannot be used for the follow: - AMBER Alerts - are only allowed to be disseminated by the Bureau of Criminal Apprehension. - Weather Alerts - are only to be distributed by the National Weather Service*. (*Local alerting authorities can still utilize their Community Notification Systems to relay warning information from the National Weather Service.) 8. Effective Messaging Currently IPAWS is only available in English. Whenever possible, avoid abbreviations, slang or jargon. Text to speech resources (in EAS) may misinterpret what your message is trying to convey. When using text to speech, play the message prior to launching and correct any errors when possible. Once the threat subsides or is no longer a hazard, cancel the alert through IPAWS. WEAs are limited to 90 characters and abbreviations should be simple and easy to understand. For more information the State of Minnesota Public Alerting Authority Best Practices Guide is available at: {hyperlink} 9. Cross-Border / Neighboring Jurisdiction Notification Verify that the message was received by the IPAWS Gateway and is being disseminated as expected based on the options that were selected for the message. It is recommended to notify the following that an IPAWS alert has gone out in case it generates phone calls from citizens. The PSAP if not the one making the notification. Neighboring agencies if close to a border whether county or large city PSAP. [Your organization] IPAWS access was developed to be able to alert for a neighboring jurisdiction permission must be granted ahead of time and an MOU must be in place. Add questions here COG to COG Notifications 10. [YOUR ORGANIZATION] System Management The [your organization] has a Memorandum of Agreement with FEMA and is an approved Collaborative Operating Group and assigned COG ID # [your ID # here] and the Federal 6

23 Information Processing Standard (FIPS) code is [your FIPS code Here]. There are two keys for IPAWS, the first being a training key and the other the live key. The training key will allow a user to sign-in to IPAWS through [Your notification system] but will not send an IPAWS alert. The live key is used when conducting tests of IPAWS or for an actual IPAWS alert. The live key should never be used for training other than the RWT. Upon the separation of an employee who has had access to the training key or live key, or when the password is suspected or known to be compromised, both passwords must be changed immediately by contacting [Your Notification system Vendor]. The [your organization] Point of Contact identified by FEMA is the Primary Contact (see the table below). External or internal inquiries on FEMA IPAWS should be directed to the Primary Contact or [designee]. The [designee] is responsible for maintaining the training and live key credentials. Documentation related to FEMA IPAWS is on file with the [designee]. User accounts are approved by the [ ] and created by system administrator Technical support on [your notification system] can be obtained by contacting: Position IPAWS Primary Contact IPAWS Alternate Contact IPAWS Technical Contact [Your Organization Notification system] System Administrator Your Organization IT Support Contact 10a. System Security IPAWS-OPEN is a Federal application to be used only in the performance of the user's official duties in support of public safety. Every system user is responsible for remote access security as it relates to their use of IPAWS-OPEN and shall abide by these Rules of Behavior: All users must have a discrete user account ID which cannot be the user's social security number. To protect against unauthorized access, passwords linked to the user ID are used to identify and authenticate authorized users. Accounts and passwords shall not be transferred or shared. The sharing of both a user ID and associated password with anyone (including administrators) is prohibited. Accounts and passwords shall be protected from disclosure and writing passwords down or electronically storing them on a medium that is accessible by others is prohibited. The selection of passwords must be complex and include: 7

24 o At least eight characters in length o At least two upper case and two lower case letters o At least two numbers and one special character. Passwords must not contain names, repetitive patterns, dictionary words, product names, personal identifying information (e.g., birthdates, SSN, phone number), and must not be the same as the user ID. Users are required to change their passwords at least once every 90 days. Passwords must be promptly changed whenever a compromise of a password is known or suspected. Users accessing IPAWS: Physically protect computing devices such as laptops, PEDs, blackberry devices, smartphones etc.; protect sensitive data sent to or received from IPAWS; do not program computing devices with automatic sign-on sequences, passwords or access credentials when using IPAWS. Users will not provide or knowingly allow other individuals to use their account credentials to access IPAWS. To prevent and deter others from gaining unauthorized access to sensitive resources, users will log off or lock their computer workstation or will use a password-protected screensaver whenever user steps away from a workstation area, even for a short time and will log off when leaving for the day. Inform local system administrator when access to IPAWS is no longer required. Promptly report security incidents to the Local System Administrator. 10b. System Certificates is responsible for monitoring the expiration of the certificate. [This should be the Technical POC on the original IPAWS MOA or his/her replacement.] The credentials for the training and live keys are located in the [your organization] [designated location] in a sealed envelope and are never to be displayed openly. 8

25 GLOSSARY Acronym AMBER COG EAS ETN FIPS IPAWS IPAWS-OPEN MOA MOU NOAA NWEM WEA Description America s Missing Broadcast Emergency Responder Collaborative Operating Group Emergency Alert System Electronic Telephone Notification System Federal Information Processing System ing and Warning System IPAWS-Open Platform Emergency Networking Memorandum Of Agreement Memorandum Of Understanding National Oceanic and Atmospheric Administration Non-Weather Emergency Messaging Wireless Emergency Alerts 9

Memorandum of Understanding Template for Emergency Alerting to the Public

Memorandum of Understanding Template for Emergency Alerting to the Public Memorandum of Understanding Template for Emergency Alerting to the Public 1 Overview 1.1 Background The Integrated Public Alert and Warning System (IPAWS) provides a powerful tool for notifying the public

More information

Template Instructions

Template Instructions A warning, watch, or emergency message is normally issued only once to provide initial alert of the event. A new warning, watch, or emergency message should be issued if the hazard or recommended public

More information

What should I do when something unexpected happens with an alert or warning?

What should I do when something unexpected happens with an alert or warning? These tips and quirks are intended to help emergency managers using the Integrated Public Alert & Warning System (IPAWS), Emergency Alert System (EAS), and Wireless Emergency Alerts (WEA) systems, and

More information

Response to Santa Barbara County Grand Jury Reports (1) Santa Barbara County Emergency Operations Center (2) Emergency Public Information

Response to Santa Barbara County Grand Jury Reports (1) Santa Barbara County Emergency Operations Center (2) Emergency Public Information County of Santa Barbara FIRE DEPARTMENT / OFFICE OF EMERGENCY SERVICES 4410 CATHEDRAL OAKS ROAD SANTA BARBARA, CALIFORNIA 93110-1042 TEL 805.681.5526 FAX 805.681.5553 John M. Scherrei Fire Chief Bruce

More information

Number: USF System Emergency Management Responsible Office: Administrative Services

Number: USF System Emergency Management Responsible Office: Administrative Services POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

COMMUNICATIONS EMERGENCY SUPPORT FUNCTION (ESF #2) FORMERLLY COMMUNICATIONS AND WARNING

COMMUNICATIONS EMERGENCY SUPPORT FUNCTION (ESF #2) FORMERLLY COMMUNICATIONS AND WARNING ICS Category: Operations ESF # 2 Responsible for the EOC message center, providing working radio & telephone equipment, and providing warning to vulnerable facilities Reports to the emergency management

More information

EMERGENCY SUPPORT FUNCTION #2 Communication, Information and Warning Systems

EMERGENCY SUPPORT FUNCTION #2 Communication, Information and Warning Systems Thurston County Comprehensive Emergency Management Plan EMERGENCY SUPPORT FUNCTION #2 Communication, Information and Warning Systems ANNEX COORDINATOR: Thurston County Emergency Management JOINT PRIMARY

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

Wireless Communication Device Policy Policy No September 2, Standard. Practice

Wireless Communication Device Policy Policy No September 2, Standard. Practice Standard This establishes the business need and use of cellular phones (hereinafter referred to as wireless communication devices ) as an effective means of conducting City of Richland business, and to

More information

TIME SYSTEM SECURITY AWARENESS HANDOUT

TIME SYSTEM SECURITY AWARENESS HANDOUT WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/16/2017 2018 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer

More information

2 ESF 2 Communications

2 ESF 2 Communications 2 ESF 2 Communications THIS PAGE LEFT BLANK INTENTIONALLY Table of Contents 1 Introduction... 1 1.1 Purpose and Scope... 1 1.2 Relationship to Other ESF Annexes... 1 1.3 Policies and Agreements... 1 2

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

Questions 1-3 relate to Item 4 Data Sheet on page 12:

Questions 1-3 relate to Item 4 Data Sheet on page 12: Florida Division of Emergency Management RFP-DEM-15-16-037 Florida Statewide Emergency Alert and Notification System Questions and Answers (Answers are in bold) Questions 1-3 relate to Item 4 Data Sheet

More information

Emergency Operations Center Management Exercise Evaluation Guide

Emergency Operations Center Management Exercise Evaluation Guide Emergency Operations Center Management Exercise Evaluation Guide I respectfully submit the completed Exercise Evaluation Guide for the Canopy Oaks Tabletop Exercise conducted March 25 2010 for the Leon

More information

Emergency Support Function (ESF) #17a: COMMUNICATIONS: PUBLIC. ESF Activation Contact: Cornell University Police (607)

Emergency Support Function (ESF) #17a: COMMUNICATIONS: PUBLIC. ESF Activation Contact: Cornell University Police (607) Emergency Support Function (ESF) #17a: COMMUNICATIONS: PUBLIC ESF Activation Contact: Cornell University Police (607)255-1111 Primary Department Support Departments External Agencies I. Purpose University

More information

Emergency Notification System Guide

Emergency Notification System Guide Emergency Notification System Guide PUBLIC VERSION JANUARY 2018 Published by the Office of Emergency Management and Environmental Health and Safety, within the Division of College Services. Table of Contents

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program

More information

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance.

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance. Cell Phone Policy 1. Purpose: Establish a policy for cell phone use and compensation allowance. 2. Authority: The Clinton County Board of Commissioners. 3. Application: This Cell Phone Policy (the Policy)

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

CITY OF DUBUQUE ADMINISTRATIVE POLICY REVISED OCTOBER 24, 2011 RETROACTIVE TO JANUARY 1, 2011

CITY OF DUBUQUE ADMINISTRATIVE POLICY REVISED OCTOBER 24, 2011 RETROACTIVE TO JANUARY 1, 2011 CITY OF DUBUQUE ADMINISTRATIVE POLICY POLICY NUMBER: 2. 13 SUBJECT: ACQUISITION AND USE OF CELLULAR TELEPHONE EQUIPMENT APPROVED BY: CITY MANAGER EFFECTIVE DATE: AUGUST 6, 1996 REVISED FEBRUARY 1, 2004

More information

Regulation P & GLBA Training

Regulation P & GLBA Training Regulation P & GLBA Training Overview Regulation P governs the treatment of nonpublic personal information about consumers by the financial institution. (Gramm-Leach-Bliley Act of 1999) The GLBA is composed

More information

TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS.

TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS. TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS Introduction State and local government departments, agencies and groups face a wide variety of events. Each have their own unique characteristics.

More information

MHCC Emergency Notification System (ENS) Protocols

MHCC Emergency Notification System (ENS) Protocols MHCC Emergency Notification System (ENS) Protocols Introduction MHCC has an Emergency Notification System (ENS) with multi communication capabilities. MHCC s ENS is intended to rapidly disseminate emergency

More information

BlackBerry AtHoc Network Crisis Communication. CAP Publishing and Processing Guide

BlackBerry AtHoc Network Crisis Communication. CAP Publishing and Processing Guide BlackBerry AtHoc Network Crisis Communication CAP Publishing and Processing Guide Version 7.5, May 2018 Copyright 2017 2018 BlackBerry Limited. All Rights Reserved. This document may not be copied, disclosed,

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

CELL PHONE POLICY Page 1 of 5 City of Manteca Administrative Policy and Procedure

CELL PHONE POLICY Page 1 of 5 City of Manteca Administrative Policy and Procedure CELL PHONE POLICY Page 1 of 5 Section 1: Purpose The City of Manteca recognizes that cellular telephones enhance the level of City services by allowing employees to remain in contact with the office or

More information

Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012

Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012 Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012 Table of Contents 1 General Overview... 2 2 Service Description... 2 2.1 Service Scope... 2 2.1.1 Eligibility Requirements... 2 2.1.2

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Wireless Public Alerting

Wireless Public Alerting Wireless Public Alerting 1. What is wireless public alerting? Wireless public alerting allows governments across Canada to send public safety messages directly to smartphones in a region. If there is an

More information

FLORIDA S PREHOSPITAL EMERGENCY MEDICAL SERVICES TRACKING & REPORTING SYSTEM

FLORIDA S PREHOSPITAL EMERGENCY MEDICAL SERVICES TRACKING & REPORTING SYSTEM FLORIDA S PREHOSPITAL EMERGENCY MEDICAL SERVICES TRACKING & REPORTING SYSTEM END USER SECURITY POLICY MANUAL 1 INTRODUCTION... 3 2 INFORMATION USAGE AND PROTECTION... 3 2.2 PROTECTED HEALTH INFORMATION...

More information

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale

More information

Spree Privacy Policy

Spree Privacy Policy Spree Privacy Policy Effective as at 21 November 2018 Introduction Spree respects your privacy and it is important to us that you have an enjoyable experience buying and selling with us but also that you

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

METRO REGION Standards, Protocols, Procedures

METRO REGION Standards, Protocols, Procedures METRO REGION 9-1-1 Standards, Protocols, Procedures Document Section: 3 Operations 9-1-1 TOC Approval Signature: Sub-Section: METRO 3.6.0 Date: 11/16/17 Procedure Title: SMS Text-to-9-1-1 Call Processing

More information

Forward. 1. Purpose. Page 1 of 5 Revision Date

Forward. 1. Purpose. Page 1 of 5 Revision Date Memorandum of Understanding between the Tippecanoe County Chapter of the American Red Cross and Tippecanoe County Amateur Radio Emergency Service (ARES) July 24, 2009 Forward The American Radio Relay League,

More information

UF CEMP Support Group Annex: Public Safety

UF CEMP Support Group Annex: Public Safety UF CEMP Support Group Annex: Public Safety Lead Representatives University of Supporting Departments External Partners Enrollment Management Shands Hospital Safety & Security Alachua County Emergency Management

More information

Making a Family Emergency Communications Plan

Making a Family Emergency Communications Plan Making a Family Emergency Communications Plan OEM Open House 9/9/17 Arline Stith, presenter Content mostly based on MEMA Massachusetts Emergency Management Agency mass.gov/eopss/agencies/mema/ Cell/Mobile

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

Security and Privacy Breach Notification

Security and Privacy Breach Notification Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information

Computerized Central Records System

Computerized Central Records System POLICY 111.2 Computerized Central Records System REVISED: 02/07, 09/11, 07/17 RELATED POLICIES: CFA STANDARDS: 34.13 REVIEWED: AS NEEDED A. PURPOSE The purpose of this policy is to establish procedures

More information

Kansas City s Metropolitan Emergency Information System (MEIS)

Kansas City s Metropolitan Emergency Information System (MEIS) Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Mobile Communication Devices. 1.0 Purpose. 2.0 Policy NO Virginia Polytechnic Institute and State University

Mobile Communication Devices. 1.0 Purpose. 2.0 Policy NO Virginia Polytechnic Institute and State University Mobile Communication Devices NO. 3960 Policy Effective Date: 3/8/2016 Last Revision Date: Policy Owner: Dwight Shelton Policy Author: (Contact Person) Savita Sharma Affected Parties: Faculty Staff 1.0

More information

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 3.63 REVISED TOTAL PAGES Dec. 30, 2007 8 Division Computer Systems Cross Reference: I. Definitions A. Executable File A program or file

More information

TITLE SOCIAL MEDIA AND COLLABORATION POLICY

TITLE SOCIAL MEDIA AND COLLABORATION POLICY DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY Great Lakes Energy Connections, Inc. Truestream ACCEPTABLE USE POLICY Contents OVERVIEW... 2 INTRODUCTION... 2 VIOLATION OF THIS ACCEPTABLE USE POLICY... 2 PROHIBITED USES AND ACTIVITIES... 2 CUSTOMER

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information

MASAS. Overview & Backgrounder Document. Consultation Package. CanOps

MASAS. Overview & Backgrounder Document. Consultation Package. CanOps CanOps Overview & Backgrounder Document Consultation Package Defining CanOpS Multi-Agency Situational Awareness System () is a national information aggregation system that facilitates sharing situational

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

INFORMACAST. Singlewire Software 2601 W Beltline Hwy, Suite 510, Madison, WI

INFORMACAST.   Singlewire Software 2601 W Beltline Hwy, Suite 510, Madison, WI INFORMACAST InformaCast is a software solution that transforms devices on your network into a powerful system for IP paging and emergency alerting. It integrates easily with Cisco phones overhead speakers,

More information

LOYOLA UNIVERSITY MARYLAND. Policy and Guidelines for Messaging to Groups

LOYOLA UNIVERSITY MARYLAND. Policy and Guidelines for Messaging to Groups LOYOLA UNIVERSITY MARYLAND Policy and Guidelines for Messaging to Groups October 29, 2013 LOYOLA UNIVERSITY MARYLAND Policy and Guidelines on Messaging to Groups Transmission of messages to groups of recipients

More information

Information Technology Standards

Information Technology Standards Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this

More information

After Action Report / Improvement Plan

After Action Report / Improvement Plan After Action Report Improvement Plan PSAP Paralysis A 911 Center COOP Drill June 24, 2015 Holmes County Emergency Management Department 1 Page ADMINISTRATIVE HANDLING INSTRUCTIONS 1. The title of this

More information

Donor Credit Card Security Policy

Donor Credit Card Security Policy Donor Credit Card Security Policy INTRODUCTION This document explains the Community Foundation of Northeast Alabama s credit card security requirements for donors as required by the Payment Card Industry

More information

Electronic Network Acceptable Use Policy

Electronic Network Acceptable Use Policy Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s

More information

GUESTBOOK REWARDS, INC. Privacy Policy

GUESTBOOK REWARDS, INC. Privacy Policy GUESTBOOK REWARDS, INC. Privacy Policy Welcome to The Guestbook and Gopher, the online and mobile services of Guestbook Rewards, Inc. ( The Guestbook, we, or us ). Our Privacy Policy explains how we collect,

More information

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters QHSR Background Implementing Recommendations of the 9/11 Commission Act of 2007 directed DHS to Conduct a Quadrennial Homeland

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

Table of Contents. PCI Information Security Policy

Table of Contents. PCI Information Security Policy PCI Information Security Policy Policy Number: ECOMM-P-002 Effective Date: December, 14, 2016 Version Number: 1.0 Date Last Reviewed: December, 14, 2016 Classification: Business, Finance, and Technology

More information

Red Flag Policy and Identity Theft Prevention Program

Red Flag Policy and Identity Theft Prevention Program Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible

More information

ISSP Network Security Plan

ISSP Network Security Plan ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...

More information

PEER Phase II. Self Guided Update Fall 2009

PEER Phase II. Self Guided Update Fall 2009 PEER Phase II Self Guided Update Fall 2009 Table of Contents 1) How to Use This Handbook... 2 2) Knowledge Check... 3 A. Your Role as a PEER General Member... 3 B. WebEOC... 4 C. HHAN... 4 D. Resources

More information

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015 Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015 Definitions Cellular Telephone Service For the purposes of this policy, cellular telephone

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

Request For Proposal (RFP) Online Certification Platform

Request For Proposal (RFP) Online Certification Platform Request For Proposal (RFP) Online Certification Platform NAFA Fleet Management Association 125 Village Blvd., Suite 200 Princeton, NJ 08540 Pam Nobles (609) 986-1053 pnobles@nafa.org Page 1 NAFA Online

More information

Date of Next Review: May Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act

Date of Next Review: May Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act Date Approved: January 27, 2010-Board Date of Next Review: May 2023 Dates of Amendments: May 17, 2018 Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act

More information

Document Section: 3. Interoperability

Document Section: 3. Interoperability METRO REGION 800 MHz Trunked Regional Public Safety Radio System Standards, Protocols, Procedures Document Section: 3. Interoperability Radio TOC Recommendation Guidelines Sub-Section: METRO 3.17.6 Date:

More information

Enterprise Income Verification (EIV) System User Access Authorization Form

Enterprise Income Verification (EIV) System User Access Authorization Form Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Seven Requirements for Successfully Implementing Information Security Policies and Standards

Seven Requirements for Successfully Implementing Information Security Policies and Standards Seven Requirements for Successfully Implementing and Standards A guide for executives Stan Stahl, Ph.D., President, Citadel Information Group Kimberly A. Pease, CISSP, Vice President, Citadel Information

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

Broadcast Notification solutions

Broadcast Notification solutions Broadcast Notification solutions Fast, accurate group communication to enhance your security response security.gallagher.com Broadcast Notification solutions Mobile Network Provider Staff in building 2

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Minnesota Motor Registration Information Service (QMV) Published On: Feb 09, 2012 Service Release Version#: 1.0 Prepared

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

FEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017

FEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017 FEMA Update Tim Greten Technological Hazards Division Deputy Director NREP April 2017 FEMA Strategic Priorities Priority 1: Be survivor-centric in mission and program delivery. Priority 2: Become an expeditionary

More information

ICT Security Policy. ~ 1 od 21 ~

ICT Security Policy. ~ 1 od 21 ~ ICT Security Policy ~ 1 od 21 ~ Index 1 INTRODUCTION... 3 2 ELEMENTS OF SECURITY CONTROL... 4 2.1 INFORMATION MEDIA MANAGEMENT... 4 2.2 PHYSICAL PROTECTION... 6 2.3 COMMUNICATION AND PRODUCTION MANAGEMENT...

More information

I. PURPOSE III. PROCEDURE

I. PURPOSE III. PROCEDURE A.R. Number: 2.11 Effective Date: 2/1/2009 Page: 1 of 5 I. PURPOSE This policy outlines the procedures that third party organizations must follow when connecting to the City of Richmond (COR) networks

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and

More information

Customer Proprietary Network Information

Customer Proprietary Network Information Customer proprietary network information (CPNI) means information that relates to the quantity, technical configuration, type, destination, location, and amount of use of our service by you and information

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

DEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE

DEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE DEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE Version 1.0 28 October 2008 1 DSS PRIVACY IMPACT ASSESSMENT For Industrial Security Facilities Database (ISFD) Project Identifying

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

ALL-HAZARDS EMERGENCY MESSAGE COLLECTION SYSTEM (HAZCOLLECT) NOTICE: This publication is available at:

ALL-HAZARDS EMERGENCY MESSAGE COLLECTION SYSTEM (HAZCOLLECT) NOTICE: This publication is available at: Department of Commerce $ National Oceanic & Atmospheric Administration $ National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 10-1708 July 3, 2009 Operations and Services Dissemination Services,

More information

IAM Security & Privacy Policies Scott Bradner

IAM Security & Privacy Policies Scott Bradner IAM Security & Privacy Policies Scott Bradner November 24, 2015 December 2, 2015 Tuesday Wednesday 9:30-10:30 a.m. 10:00-11:00 a.m. 6 Story St. CR Today s Agenda How IAM Security and Privacy Policies Complement

More information

Florida State University Center for Transportation and Public Safety

Florida State University Center for Transportation and Public Safety FDLE Application/Service/System Audit Checklist Traffic and Criminal Software (TraCS) What is TraCS? The Traffic and Criminal Software (TraCS) is a client-server based application that uses web services

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

Annex 3 to NIST Special Publication Recommended Security Controls for Federal Information Systems

Annex 3 to NIST Special Publication Recommended Security Controls for Federal Information Systems Annex 3 to NIST Special Publication 800-53 Recommended Security Controls for Federal Information Systems Minimum Security Controls High Baseline Includes updates through 04-22-2005 AC-1 ACCESS CONTROL

More information

KSU Policy Category: Information Technology Page 1 of 5

KSU Policy Category: Information Technology Page 1 of 5 KSU Policy Category: Information Technology Page 1 of 5 Policy Title Cellular, Wireless Communications Devices, and Services Policy Issue Date January 1, 2017 Effective Date January 17, 2019 Last Updated

More information

SPRING-FORD AREA SCHOOL DISTRICT

SPRING-FORD AREA SCHOOL DISTRICT No. 801.1 SPRING-FORD AREA SCHOOL DISTRICT SECTION: TITLE: OPERATIONS ELECTRONIC RECORDS RETENTION ADOPTED: January 25, 2010 REVISED: October 24, 2011 801.1. ELECTRONIC RECORDS RETENTION 1. Purpose In

More information

Kentucky Wireless Information Network Service (Ky-WINS)

Kentucky Wireless Information Network Service (Ky-WINS) 2006 NASCIO Recognition Awards Nomination Category: Information Communications Technology (ICT) Innovations Kentucky Wireless Information Network Service (Ky-WINS) Kentucky State Police Kentucky has implemented

More information

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference: CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function

More information

Audio, Video or Photographic Recording Devices 5. DEFINITIONS 6 CANCELLATIONS 7. REFERENCES

Audio, Video or Photographic Recording Devices 5. DEFINITIONS 6 CANCELLATIONS 7. REFERENCES Page 1 of4 [Administration] [Personnel] [General Operations] [Field Operations] [Criminal Investigations] [ Support Operations] [Special Orders] [Command Memo] [Library] [Search] [Home] Atlanta Police

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information

LCU Privacy Breach Response Plan

LCU Privacy Breach Response Plan LCU Privacy Breach Response Plan Sept 2018 Prevention Communication & Notification Evaluation of Risks Breach Containment & Preliminary Assessment Introduction The Credit Union makes every effort to safeguard

More information