UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL
|
|
- Stephanie Williamson
- 6 years ago
- Views:
Transcription
1 UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Electrnic Data Prtectin and Encryptin REFERENCE: Refrmat CATEGORY: Infrmatin Technlgy PAGE: 1 SUPERSEDES: POL-UMIT- A APPROVER: David Ertel Interim Senir Vice President Business and Finance VERSION: 2 EFFECTIVE: May 16, 2017 Infrmatin Security exists t further the missin f the University. The University is cmprised f large and diverse ppulatins with evlving needs related t infrmatin technlgy resurces and data. University management is cmmitted t safeguarding thse resurces while prtecting and prmting academic freedm. Althugh intrinsic tensin exists between the free exchange f ideas and infrmatin security, and can manifest itself in sme circumstances, the requirements that fllw have been identified t prmte the best balance pssible between infrmatin security and academic freedm. I. PURPOSE: II. III. This plicy establishes a framewrk that utlines when encryptin must be used t secure the University s data frm risks including but nt limited t, access, use, disclsure, and remval as well as t adhere t regulatry and cmpliance requirements. SCOPE: This plicy applies t all electrnic data stred n any media r system(s) thrughut the University f Miami and applies t all individuals string, accessing, r wrking with the data, in any way, including all University emplyees, students, cntractrs, guests, cnsultants, temprary emplyees, and any ther users wh may have access t University resurces. POLICY: The University f Miami requires that Prtected Data be secured at all times. Therefre, University Prtected Data must never be mved r cpied utside f standard apprved perating prcedures. Data encryptin: The University requires data be encrypted under the fllwing circumstances: 1. Physically mving data: 1.1. University Prtected Data must be encrypted when residing n any media. This includes but is nt limited t: Laptps Desktps Backup media
2 2. Electrnically transmitting data: DVDs External hard drives, thumb drives, etc. Nte: The list abve applies t all devices, regardless f wnership, whenever they cntain Prtected Data Prtected Data must be encrypted when transmitted ver an electrnic cmmunicatin netwrk (internally and externally) cntaining Prtected Data destined fr external recipients must be encrypted and cntain the fllwing cnfidentiality statement: The infrmatin cntained in this transmissin may cntain privileged and cnfidential infrmatin, including infrmatin prtected by federal and state privacy laws. It is intended nly fr the use f the persn(s) named abve. If yu are nt the intended recipient, yu are hereby ntified that any review, disseminatin, distributin, r duplicatin f this cmmunicatin is strictly prhibited. If yu are nt the intended recipient, please cntact the sender by reply and destry all cpies f the riginal message Prtected Data shall nt be sent thrugh insecure public instant messaging netwrks. Examples f insecure instant messaging netwrks include, but are nt restricted t, AOL Instant Messenger, Yah Messenger, MSN Messenger, and Ggle Talk. 3. System Administratrs shall implement frmal, dcumented prcesses fr utilizing encryptin and integrity cntrls n University Prtected Data being transmitted ver electrnic cmmunicatins netwrks. At a minimum, such prcesses shall include: 3.1. A prcedure enabling Prtected Data recipients t reprt instances f attempted r successful unauthrized access t University Prtected Data that is transmitted ver an electrnic cmmunicatins netwrk A prcedure fr respnding t instances f attempted r successful unauthrized access t University Prtected Data that is transmitted ver an electrnic cmmunicatins netwrk. Encryptin standards: The University requires all f the fllwing minimum encryptin criteria: 1. Standard encryptin algrithms must be used. Sme examples include: 3DES, Blwfish, RSA, RC5 and IDEA. 2. The use f prprietary encryptin algrithms is nt allwed fr any purpse, unless reviewed by qualified experts utside f the vendr in questin and apprved by the Infrmatin Technlgy Security Department. 3. A ne-way hash t encrypt data irreversibly must be used fr: Private keys must be kept cnfidential, Key management must be fully autmated, Shrt life keys are t be used, ensured by having activatin and deactivatin dates, Lng-life keys are t be used sparingly, Keys in strage and transit must be encrypted, Electrnic Data Prtectin and Encryptin Plicy 2
3 Keys must be chsen randmly frm entire key space, Keys fr encrypting keys must be used separately frm keys used fr decrypting data. They are nt interchangeable. Additinal requirements fr securing Prtected Data: Where there are large amunts f Prtected Data, supplemental measures need t be taken t further minimize the risk f lss. The amunt f data that wuld cnstitute a large amunt fr these purpses will vary, depending n: the quantity and extent f the data recrds; hw readily the data can be used t identify individuals; hw serius the cnsequences wuld be fr the university if the data were successfully stlen r publically released; and The legal duties, if any, t prtect the infrmatin. Each academic r administrative unit pssessing large amunts f Prtected Data must publish plicies explaining the data t be prtected and what is meant by a large amunt in that unit s cntext. (Fr additinal guidance, see NIST-SP ) The unit s plicy statement will als set frth the supplemental measures that will be taken t prtect such data. These may include the use f dedicated nn-netwrked cmputers, physical access limitatins, multiple layers f passwrds and/r pass phrases; bimetric access cntrl; and/r mre frequent security audits and reviews. IV. Mbile Devices are particularly vulnerable and shuld nt be used fr the strage f r access t large amunts f Prtected Data. Where there is nevertheless a cmpelling academic r business reasn t allw the use f a Mbile Device fr that purpse, the Dean r Vice President in charge f the unit and the CIO will jintly determine what supplemental security measures are prudent given the quantity and sensitivity f the data. These measures will include, at a minimum, either (1) de-identificatin f the data t prevent infrmatin being tied t particular individuals r (2) at least tw layers f access cntrl, plus inspectin f the device t verify that apprpriate encryptin sftware has been installed and activated. DEFINITIONS: Data: Infrmatin stred n any electrnic media thrughut the University f Miami. Prtected Data: Any data gverned under Federal r State regulatry r cmpliance requirements such as HIPAA, FERPA, GLBA, PCI/DSS, Red Flag, and FISMA as well as data deemed critical t business and academic prcesses which, if cmprmised, may cause substantial harm and/r financial lss. HIPAA: The Health Insurance Prtability and Accuntability Act f 1996 with the purpse f ensuring the privacy f a patient s medical recrds. FERPA: The Family Educatinal Right and Privacy act f 1974 with the purpse f prtecting the privacy f student educatin recrds. FISMA: The Federal Infrmatin Security Management act f 2002 recgnizes the imprtance f infrmatin security t the ecnmic and natinal security interests f the United States and as a result sets frth infrmatin security requirements that federal agencies and any ther parties cllabrating with such Electrnic Data Prtectin and Encryptin Plicy 3
4 agencies must fllw in an effrt t effectively safeguard IT systems and the data they cntain. GLBA: The Gramm-Leach-Bliley Act, als knwn as the Financial Services Mdernizatin Act f 1999, cntains privacy prvisins requiring the prtectin f a cnsumer s financial infrmatin. PCI/DSS: Payment and Credit Card Industry Data Security Standards is guidance develped by the majr credit card cmpanies t help rganizatins that prcess card payments prevent credit card fraud, hacking and varius ther security issues. A cmpany prcessing card payments must be PCI cmpliant r risk lsing the ability t prcess credit card payments. Red Flag: A mandate develped by the Federal Trade Cmmissin (FTC) requiring institutins t develp identity theft preventin prgrams. Cryptgraphy: The science f radically changing infrmatin in rder t cnceal the cntent frm a third party. Encryptin Algrithm: A mathematical frmula used t encrypt and decrypt data. External Recipients: recipients wh are nt part f a University maintained system. Prprietary Algrithm: An algrithm that has nt been made public and/r has nt withstd public scrutiny. The develper f the algrithm culd be a vendr, an individual, r the gvernment. One-way Hash Functin: An algrithm that des nt require a key and prduces an irreversibly encrypted cipher-text. Other names fr this are message digest, fingerprint, digital signature, and cmpressin functin. Persnally Identifiable Infrmatin (PII): Any piece f infrmatin cntained in Prtected Data which can ptentially be used t uniquely identify, cntact, r lcate a single persn. Examples f PII include Prtected Health Infrmatin, Credit Card Numbers, Scial Security Numbers, etc. System Administratr: An individual wh perfrms netwrk/system administratin duties and/r technical supprt f netwrk/systems that are accessed by ther peple, systems, r services. Only full-time and permanent part-time emplyees f the University and/r third party vendrs apprved by IT may functin as system/netwrk administratrs. Data Custdian: The persn respnsible fr, r the persn with administrative cntrl ver, granting access t an rganizatin's dcuments r electrnic files while prtecting the data as defined by the rganizatin's security plicy r its standard IT practices. University: University refers t the University f Miami as a whle and includes all units. V. PROCEDURE: System Administratr/ Data Custdian: Respnsible fr fllwing the plicy by encrypting data whenever required. Respnsible fr cmmunicating any exceptin requests t the Vice President r Infrmatin Technlgy designee f the respective campus. Electrnic Data Prtectin and Encryptin Plicy 4
5 Chief Infrmatin Security Officer Respnsible fr regular review f the Encryptin Plicy. The review will ccur annually r when significant changes ccur. Respnsible Vice President f CIO: Respnsible fr reviewing and apprving r denying exceptin requests. Respnsible fr reviewing exceptins yearly. Respnsible fr mnitring the enfrcement f the plicy. Vilatins: Vilatins f this plicy will be addressed by the prcedure applicable t the individual. Electrnic Data Prtectin and Encryptin Plicy 5
Document Title: Electronic Data Protection and Encryption Policy. Revision Date Authors Description of Changes
Effective Date: 01/01/2014 Page 1 of 7 REVISION HISTORY Revision No. Revision Date Authors Description of Changes 1.0 11/04/2013 CISO Populate Into Standard Template APPROVED BY This Policy is established
More informationE-Lock Policy Manager White Paper
White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...
More informationTown of Warner, New Hampshire Information Security Policy
Twn f Warner, New Hampshire Infrmatin Security Plicy Date Adpted: Bard f Selectmen David E. Hartman David Karrick, Jr. Clyde Carsn Table f Cntents Table f Cntents 1 Intrductin 2 Ethics and Acceptable Use
More informationAll members of the UNNC Community and users of the University network.
Bulk Email Plicy Audience: All members f the UNNC Cmmunity and users f the University netwrk. Definitin: Bulk email, by definitin, is unslicited email sent quickly in large quantities, and is recgnized
More informationSoftware Usage Policy Template
Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/
More informationPRIVACY AND E-COMMERCE POLICY STATEMENT
PRIVACY AND E-COMMERCE POLICY STATEMENT Tel-Tru Manufacturing Cmpany ( Tel-Tru ) is dedicated t develping lng-lasting relatinships that are built n trust. Tel-Tru is cmmitted t respecting the wishes f
More informationINFORMATION TECHNOLOGY SERVICES NIST COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION
NIST 800-171 COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION WHAT IS NIST 800-171 COMPLIANCE AND WHY DO WE HAVE TO DO IT? Any Cntrlled Unclassified Infrmatin (CUI) residing in nnfederal infrmatin
More informationPatch Management Policy
Patch Management Plicy (Versin 1) Dcument Cntrl Infrmatin: Date: 21/5/18 Master Tracking Name Patch Management Plicy Master Tracking Reference Owning Service / Department Exeter IT Issue: 1 Apprvals: Authrs:
More informationSecurity of Information Technology Resources
CORNELL UNIVERSITY POLICY LIBRARY Security f Infrmatin Technlgy Resurces Technlgies Chapter: 4, Security and Vice President fr Infrmatin Technlgies Originally Issued: June 1, 2004 Last Full Review: December
More informationE. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering
IT2042 - Infrmatin Security 1-1 E. G. S. Pillay Engineering Cllege, Nagapattinam Cmputer Science and Engineering Elective II IT 2042 INFORMATION SECURITY VIII Sem CSE QUESTION BANK - UNIT-IV 1) What is
More informationUNSW Technology Policy:
UNSW Technlgy Plicy: UNSW Plicy Respnsible Officer Cntact Officer Apprving Authrity UNSW Data Netwrk Cnnectin Plicy Chief Infrmatin Officer Manager Infrastructure Services Supprt UNSW IT Services Ph: x
More informationIt s Not Just FERPA. Privacy and Security Issues in Higher Education. Alisa Chestler Washington, D.C. Eric Setterlund, CIPP/US Chattanooga, Tennessee
It s Nt Just FERPA Privacy and Security Issues in Higher Educatin Alisa Chestler Washingtn, D.C. Eric Setterlund, CIPP/US Chattanga, Tennessee Tday s Tpics Our wrld What kind f infrmatin are we cncerned
More informationONTARIO LABOUR RELATIONS BOARD. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Ontario Labour Relations Board
ONTARIO LABOUR RELATIONS BOARD Filing Guide A Guide t Preparing and Filing Frms and Submissins with the Ontari Labur Relatins Bard This Filing Guide prvides general infrmatin nly and shuld nt be taken
More informationOverview of Data Furnisher Batch Processing
Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...
More informationPrivacy Policy concerning the use of the website and the use of cookies
Privacy Plicy cncerning the use f the website and the use f ckies Agria understands the imprtance f the privacy f its custmers and the prtectin f their persnal data. Present plicy utlines the handling
More informationOmniPCX Record PCI Compliance 2.3
S T R A T E G I C W H I T E P A P E R OmniPCX Recrd PCI Cmpliance 2.3 Alcatel-Lucent Enterprise Services Page 1/11 OmniPCX-Recrd R2.3 PCI Cmpliance White Paper Legal ntice Alcatel, Lucent, Alcatel-Lucent
More informationPAY EQUITY HEARINGS TRIBUNAL. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Pay Equity Hearings Tribunal
PAY EQUITY HEARINGS TRIBUNAL Filing Guide A Guide t Preparing and Filing Frms and Submissins with the Pay Equity Hearings Tribunal This Filing Guide prvides general infrmatin nly and shuld nt be taken
More informationEmployee ID Conversion Workshop. Florida Department of Financial Services Division of Accounting & Auditing
Emplyee ID Cnversin Wrkshp Flrida Department f Financial Services Divisin f Accunting & Auditing Agenda Summary f the Agency Impact Statements System Requirements Timeline Agency Readiness Next Steps Impact
More informationEU General Data Protection Regulation
EU General Data Prtectin Regulatin Sally Ubnske, Senir Business Systems Analyst, subnske@ariessys.cm Sean MacRae, Business Systems Analyst, smacrae@ariessys.cm GDPR Summary The Eurpean Parliament, the
More informationCustod. July 30, 20100
AgriLife Infrmatin Technlgy Custd dian Prcedures and Best Practices July 30, 20100 TABLE OF CONTENTS Intrductin.. 3 Custdian Requirements...... 4 Appendix A - Definitins........ 13 Appendix B - IT Security
More informationMAGNET identity management proposal for Personal Networks. Dimitris M. Kyriazanos
Internatinal Telecmmunicatin Unin MAGNET identity management prpsal fr Persnal Netwrks Dimitris M. Kyriazans PhD Student NTUA Geneva, 5 December 2006 Persnal Netwrk - A Definitin A Persnal Netwrk (PN)
More informationTPCH Data Sharing Policies and Procedures
TPCH Data Sharing Plicies and Prcedures Intrductin: The TPCH Data Sharing Plicies and Prcedures were created based n the CC apprved Pima Cunty: HMIS Data Sharing Plan apprved by TPCH bard n February 24,
More informationCustomer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist
This checklist is used t prvide guidance and clarificatin n aspects f the auxillary Startup Service (G2949CA) including Security Pack Installatin and Familiarizatin f yur Agilent 2100 Bianalyzer System
More informationOBSERVATIONS FROM CYBERSECURITY EXAMINATIONS
By the Office f Cmpliance Inspectins and Examinatins ( OCIE ) 1 This Risk Alert prvides a summary f bservatins Vlume VI, Issue 5 August 7, 2017 frm OCIE s examinatins OBSERVATIONS FROM f registered brkerdealers,
More informationJohn R. Robles CISA, CISM, CRISC
Jhn R. Rbles CISA, CISM, CRISC www.jhnrrbles.cm jrbles@cqui.net 787-647-3961 What is Security as a Service (SecaaS)? Security as a Service is a clud cmputing mdel that Delivers Managed Security Services
More informationInternet/Intranet Publishing Guidelines
Muntain View-Ls Alts Unin High Schl District In trductin Internet/Intranet Publishing Guidelines Using the Internet t further the educatinal prcess, gals and bjectives is a natural extensin f Muntain View-Ls
More informationHP Server Virtualization Solution Planning & Design
Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP
More informationPrivacy Policy. We may collect information about you in a variety of ways. The information we collect on the Site includes:
Privacy Plicy BHIP Glbal, Inc. ( BHIP, we r us ) respects the privacy f ur users ( User r Yu ). This Privacy Plicy explains hw Pruvit cllects, uses, and disclses, and safeguards Yur Infrmatin when yu visit
More informationANNUAL COMPUTER SECURITY REFRESHER TRAINING
Cmputer DD Nvember 27, 2017 ANNUAL COMPUTER SECURITY REFRESHER TRAINING Nrthrp Grumman has a requirement t prvide annual cmputer security training t all emplyees wh have access t classified cmputing systems.
More informationIHIS Research Access Request Guidelines
Eservices: https://sumc.service-nw.cm/ 1. FOR NEWLY HIRED EMPLOYEES: Use On-barding Services & On-Barding Guide Frm Please Nte the fields required fr Research IHIS access are the same as thse utlined in
More informationPrivacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services
Privacy Plicy Last Mdified: September 26, 2016 Pictry is a fast and fun way t share memes with yur friends and the wrld arund yu. Yu can send a Pictry game t friends and view the pictures they submit in
More informationRegroup Quick Start User Guide
Regrup Quick Start User Guide Ver 1.0 Table f Cntents Hme Screen... 2 Change Hw Yu Receive Grup Cmmunicatin... 2 Pst Annuncements t Yur Grups... 3 Add Optinal Phne and Emails... 4 Regrup Sftware User Infrmatin
More informationOATS Registration and User Entitlement Guide
OATS Registratin and User Entitlement Guide The OATS Registratin and Entitlement Guide prvides the fllwing infrmatin: OATS Registratin The prcess and dcumentatin required fr a firm r Service Prvider t
More informationPlease contact technical support if you have questions about the directory that your organization uses for user management.
Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP
More informationPoint-to-Point Encryption (P2PE)
Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard
More informationCAMPBELL COUNTY GILLETTE, WYOMING
CAMPBELL COUNTY GILLETTE, WYOMING System Supprt Analyst I System Supprt Analyst II Senir System Supprt Analyst Class specificatins are intended t present a descriptive list f the range f duties perfrmed
More informationSchoolMessenger School Notification is a product of Henrico County Public Schools (HCPS)
1 SchlMessenger: Staff and Parent Cmmunicatin Henric Cunty, Virginia Shrt Overview SchlMessenger Schl Ntificatin is a prduct f Henric Cunty Public Schls (HCPS) that assists the schl divisin with simplifying
More informationTroubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.
Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are
More informationDepartment of Computer Information Systems KEMU
Advanced DBMS: CISY 423 Department f Cmputer Infrmatin Systems KEMU Database Security OBJECTIVES Database Security and Authrizatin Database Users Creating Users/Accunts in cmmercial DBMS Discretinary Access
More informationITD Information Security October 19, 2015
ITD Infrmatin Security Octber 19, 2015 Cntents Intrductin... 3 Synpsis... 3 ITD Security Team... 3 Cunty Emplyees... 3 Malware Prtectin... 4 Physical Security... 4 Data... 4 Internet... 4 Micrsft Office
More informationAdministration. User Guide
Administratin User Guide Table f Cntents Administratin at a Glance... 4 Cmpany Details... 4 Users... 5 Accunt Maintenance... 5 Search Accunts... 5 Edit... 6 Creating a New User... 7 Field Help... 8 Assigning
More informationYes. If you are an iphone user, you can download a free application via the App Store in itunes. Download the BSP iphone app.
Frequently Asked Questins General 1. What is BSP Mbile Banking App? BSP Mbile Banking App, is a smartphne applicatin that allws yu t securely access yur bank accunt (s) anywhere, anytime at yur cnvenience
More informationQ-CERT Incident Reporting Guidelines
Classificatin : Public Q-CERT Incident Reprting Guidelines Q-CERT prvides limited incident handling services t its cnstituents, which include Qatar's gvernment, business, and educatinal institutins as
More informationStudents will have opportunities available throughout the year to have their devices registered.
www.readingtn.k12.nj.us December 9, 2013 Dear Readingtn Middle Schl Families, We are excited t annunce that the Bring Yur Own Device is available fr all middle schl students! We recgnize that many f ur
More informationSecurity Incident Management Procedure (GDPR)
Security Incident Management Prcedure (GDPR) PROC-CORP-05 Cntent: 1. Objetive... 3 2. Scpe... 3 3. Terms and Definitins... 3 4. Security Incident Management Prcedure n Persnal Data... 4 4.1 Incident Cmmunicatin...
More informationEpidemiology Department Information Security Guidelines (Based upon UNC Information Security Policies) Version 3/22/2011
Epidemilgy Department Infrmatin Security Guidelines (Based upn UNC Infrmatin Security Plicies) Versin 3/22/2011 Quick Checklist (Details fllw this sheet) Study teams (PI, prject manager, prgrammer, research
More informationSOFTWARE PRODUCT LICENSE
End User License Agreement This End-User License Agreement ("EULA") is a legal agreement between yu (either an individual r a single entity) and Casper Antivirus, Inc.. fr the sftware prducts as fllws:
More informationUSD 373 s General Guidelines for Web Page Publishing. The USD 373 Internet community domain address will be located at
8-14-08 District Web Pages USD 373 s General Guidelines fr Web Page Publishing General Guidelines The purpse f any USD 373 publicatin is t share infrmatin regarding issues, events, persnnel, students and
More informationPrivacy Policy. What this policy covers. What information we collect about you
Effective starting: May 25, 2018 What this plicy cvers Privacy Plicy Yur privacy is imprtant t us, and s is being transparent abut hw we cllect, use, and share infrmatin abut yu. This plicy is intended
More informationA Purchaser s Guide to CondoCerts
Lgin t CndCerts - T submit a request with CndCerts, lg n t www.cndcerts.cm. First time users will fllw the New Users link t register. Dcument r print screen the User ID and Passwrd prvided. New accunts
More informationForcepoint UEBA Management of Personal Data
Frcepint UEBA Management f Persnal Data 2018 Frcepint LLC. All Rights Reserved Dcument Classificatin: Public FPWSCMPD-2018MAY24 Frcepint UEBA Management f Persnal Data CONTENTS Disclaimer... 2 General...
More informationPrivacy Policy Toyota Du Maroc is Committed to Respecting Your Privacy
Privacy Plicy Tyta Du Marc is Cmmitted t Respecting Yur Privacy Tyta Du Marc is cmmitted t prtecting yur persnal infrmatin and cmplying with relevant laws including, withut limitatin, the General Data
More informationFor students to participate in BYOD please follow these two steps
Octber 14, 2015 www.readingtn.k12.nj.us Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many
More informationData Processing Information for Users of the Career and Alumni Portal of HTW Berlin (Data Privacy Policy)
Data Prcessing Infrmatin fr Users f the Career and Alumni Prtal f HTW Berlin (Data Privacy Plicy) The prtectin f yur data is imprtant t us. In view f this and in rder t cmply with all f ur statutry disclsure
More informationStudent participation Students can register online, track progress, express interest and demonstrate proficiency.
Page 1 f 31 Intrductin Our MAG 10 Learning Management System (LMS) is a Web based technlgy used t plan, implement, and assess a specific learning prcess. LMS is a training prgram which prvides cmplete
More informationHireRight: Step-by-Step Guide
HireRight: Step-by-Step Guide Using HireRight fr Frm I-9 and E-Verify This guide prvides step-by-step prcedures fr using HireRight t cmplete the Emplyment Eligibility Verificatin Frm I-9 and E-Verify check
More informationANNUAL COMPUTER SECURITY REFRESHER TRAINING
ANNUAL COMPUTER SECURITY REFRESHER TRAINING Nrthrp Grumman has a requirement t prvide annual cmputer security training t all emplyees wh have access t classified cmputing systems. This training will infrm
More informationPRIVACY POLICY. We and our service providers may collect and combine Personal Information about you from a variety of sources, including:
PRIVACY POLICY Scala Pr, Inc., is respnsible fr the use and prtectin f yur persnal infrmatin, and therefre we prvide yu with the fllwing infrmatin: Scpe. This Privacy Plicy applies t persnal infrmatin
More informationMHS BYOD Policy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY
MHS BYOD Plicy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY Intrductin This dcument prvides advice and directin t students wh chse t use BYOD t access the Department f Educatin (DOE)
More informationNet1 Mobile Solutions (Pty) Ltd COMPLAINT HANDLING PROCEDURE
Net1 Mbile Slutins (Pty) Ltd Name: Cmplaint Handling Prcedure Net1 Mbile Slutins (Pty) Ltd COMPLAINT HANDLING PROCEDURE I. General Purpse It is the prcedure f Net1 Mbile Slutins (Pty) Ltd (the Cmpany )
More informationCaseWare Working Papers. Data Store user guide
CaseWare Wrking Papers Data Stre user guide Index 1. What is a Data Stre?... 3 1.1. When using a Data Stre, the fllwing features are available:... 3 1.1.1.1. Integratin with Windws Active Directry... 3
More informatione-bridge The future of connected care
Respnsive Innvatin e-bridge The future f cnnected care Overview Enhanced patient care by prviding yur n-scene view directly t physicians, specialists and hspitals anywhere, anytime. With e-bridge yu can
More informationMilestone XProtect. NVR Installer s Guide
Milestne XPrtect NVR Installer s Guide Target Audience fr this Dcument This guide is relevant fr peple respnsible fr delivering and installing Milestne XPrtect NVR surveillance systems. If yu are a Milestne
More informationFrequently Asked Questions
Frequently Asked Questins What are the benefits f activech? activech allws yur rganizatin t prvide an n-premise, managed and secure alternative t Drpbx and ther file synching and sharing slutins. Benefits
More informationUPGRADING TO DISCOVERY 2005
Centennial Discvery 2005 Why Shuld I Upgrade? Discvery 2005 is the culminatin f ver 18 mnths wrth f research and develpment and represents a substantial leap frward in audit and decisin-supprt technlgy.
More informationNIH Distributed Research Network
NIH Distributed Research Netwrk POLICIES AND PROCEDURES 10/23/2013 Table f Cntents 1. Intrductin... 1 1.1 Purpse f this dcument... 1 1.2 Backgrund... 1 2. Organizatinal Structure... 1 3. Rles and Respnsibilities...
More informationSAP Intelligent Notification 365, Service. On-boarding process for SAP Hybris Marketing Cloud / SAP Hybris Marketing customers
SAP Intelligent Ntificatin 365, Email Service On-barding prcess fr SAP Hybris Marketing Clud / SAP Hybris Marketing custmers TABLE OF CONTENTS 1. DOCUMENT HISTORY... 3 2. INTRODUCTION... 4 3. HIGH LEVEL
More informationParent Assistant FAQs
Parent Assistant FAQs Page 1 f 14 1- System Requirements: First time user has t: - Set the brwser language setting t English (Canada) and Arabic (UAE) - Use Internet Explrer 9 (IE9) r Internet Explrer
More informationManaging User Accounts
A variety f user types are available in Lighthuse Transactin Manager (LTM) with cnfigurable permissins that allw the Accunt Administratr and administratr-type users fr the accunt t manage the abilities
More informationComplyWorks Subscription User Guide. October 6, 2011
CmplyWrks Subscriptin User Guide Octber 6, 2011 Cntents 1. Register... 3 2. Get cmpliant... 3 a) Pay fr yur accunt... 3 b) Cllect the dcuments yu ll need... 4 c) Enter yur infrmatin... 4 d) Publish yur
More informationDate: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems
Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance
More informationAdmin Report Kit for Exchange Server
Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses
More informationSEMA Memorial Scholarship Fund Scholarship & Loan Forgiveness Programs
SEMA Memrial Schlarship Fund Schlarship & Lan Frgiveness Prgrams Schlarship Prgram Frequently Asked Questins Wh is eligible t apply? Hw d I get an applicatin? What are the details f the award? If I am
More informationContingency Planning Template
Cntingency Planning Template Prject Name: U.S. Department f Husing and Urban Develpment Octber, 2010 Cntigency Planning Template (V1.0) Ntes t the Authr [This dcument is a template f a Security Apprach
More informationRelease Notes Version: - v18.13 For ClickSoftware StreetSmart September 22, 2018
Release Ntes Versin: - v18.13 Fr ClickSftware StreetSmart September 22, 2018 Cpyright Ntice Cpyright 2018 ClickSftware Technlgies Ltd. All rights reserved. N part f this publicatin may be cpied withut
More informationClassFlow Administrator User Guide
ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual
More informationSucceed in ISO/IEC Audit Checks. Bob Cordisco Systems Engineer
Succeed in ISO/IEC 27001 Audit Checks Bb Crdisc Systems Engineer Bb.Crdisc@netwrix.cm Hw t Ask Questins Type yur questin here Click Send Agenda Why cmpliance is imprtant What ISO/IEC 27001 is ISO/IEC 27001
More informationLicensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite
Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in this
More informationAppendix B t Data Security Classificatin Plicy Allwed University Systems fr Data Security Classificatins Date f initial publicatin: June 6, 2017 Date f latest revisin: N/A St. Thmas Service r System Public
More informationDisaster Recovery. Practical Applications. Eric LaFollette. Director of Information Resources Lake County Clerk of Courts
Disaster Recvery Practical Applicatins Eric LaFllette Directr f Infrmatin Resurces Lake Cunty Clerk f Curts Presentatin Outline Imprtance f a plan Disaster Recvery Scenaris Disaster Recvery Basics Lake
More informationOutreach Portal User Guide
Outreach Prtal User Guide Natinal Resurce Center West Virginia University and Natinal Labr Cllege 3604 Cllins Ferry Rad, P.O. Bx 6615, Mrgantwn, WV 26506-6615 (304) 293-3096 r (800) 626-4748 http://extensin.wvu.edu/cmmunity-business-safety/safety-health/sha-educatin-center
More informationEnrolling onto the Open Banking Directory How To Guide
Enrlling nt the Open Banking Directry Hw T Guide Date: Octber 2017 Versin: v3.0 Classificatin: PUBLIC OPEN BANKING LIMITED ENROLLING ONTO THE OPEN BANKING DIRECTORY Page 1 f 14 Cntents 1. Intrductin 3
More informationCookbook Qermid Defibrillator web service Version This document is provided to you free of charge by the. ehealth platform
Ckbk Qermid Defibrillatr web service Versin 1.01 This dcument is prvided t yu free f charge by the ehealth platfrm Willebrekkaai 38 38, Quai de Willebrek 1000 BRUSSELS All are free t circulate this dcument
More informationRegistering for FEMA assistance
Skagit Cunty Emergency Management Registering fr FEMA assistance What Infrmatin d I Need t Apply? Whether applying nline (www.disasterassistance.gv ) OR ver the phne 1-800-621-FEMA (3362), yu shuld have
More informationProcurement Contract Portal. User Guide
Prcurement Cntract Prtal User Guide Cntents Intrductin...2 Access the Prtal...2 Hme Page...2 End User My Cntracts...2 Buttns, Icns, and the Actin Bar...3 Create a New Cntract Request...5 Requester Infrmatin...5
More informationTexas A&M Veterinary Medical Diagnostic Laboratory Procedures V0.01 Information Resource Procedures
Texas A&M Veterinary Medical Diagnstic Labratry Prcedures 29.01.03.V0.01 Infrmatin Resurce Prcedures Revised: January 23, 2017 Next Scheduled Review: January 23, 2022 Click t View Revisin Histry PROCEDURE
More informationCourseware Setup. Hardware Requirements. Software Requirements. Prerequisite Skills
The Internet and Cmputing Cre Certificatin Guide cnsists f 64 Lessns, with lessn bjectives, summary and ten review questins. IC³ bjectives are easily lcated by using symbls thrughut the curseware. Curse
More informationTPP: Date: October, 2012 Product: ShoreTel PathSolutions System version: ShoreTel 13.x
I n n v a t i n N e t w r k A p p N t e TPP: 10320 Date: Octber, 2012 Prduct: ShreTel PathSlutins System versin: ShreTel 13.x Abstract PathSlutins sftware can find the rt-cause f vice quality prblems in
More informationType: System Enhancements ID Number: SE 93. Subject: Changes to Employee Address Screens. Date: June 29, 2012
Type: System Enhancements ID Number: SE 93 Date: June 29, 2012 Subject: Changes t Emplyee Address Screens Suggested Audience: Human Resurce Offices Details: On July 14, 2012, Peple First will implement
More informationAccess the site directly by navigating to in your web browser.
GENERAL QUESTIONS Hw d I access the nline reprting system? Yu can access the nline system in ne f tw ways. G t the IHCDA website at https://www.in.gv/myihcda/rhtc.htm and scrll dwn the page t Cmpliance
More informationCCNA 1 Chapter 1 v5.03 Exam Answers 2016
CCNA 1 Chapter 1 v5.03 Exam Answers 2016 1. A cmpany is cntemplating whether t use a client/server r a peer-t-peer netwrk. What are three characteristics f a peer-t-peer netwrk? (Chse three.) better security
More informationWeb Application Security Version 13.0 Training Course
Web Applicatin Security Versin 13.0 Training Curse SecureSphere Web Applicatin Security Versin 13.0 Required Training Units: 4 (TR-UNIT) Training Units are gd fr 1 year frm the time f purchase. Length:
More informationOffer Specifications Dell Management Services (EMS): Policy Based Encryption-Z
Dell Email Management Services (EMS): Plicy Based Encryptin-Z Offer Specificatins Dell Email Management Services (EMS): Plicy Based Encryptin-Z Service Overview The Plicy Based Encryptin-Z service ( PBE-Z
More informationAuthorised Acceptable Use Policy (Staff, Governors and Volunteers)
Newbld Verdn Primary Schl Authrised Acceptable Use Plicy fr Staff, Gvernrs and Vlunteers Authrised Acceptable Use Plicy (Staff, Gvernrs and Vlunteers) Why have an Authrised Acceptable Use Plicy? An Authrised
More informationSupported System Requirements for DRC CTB LAS Links Online Testing Effective August September 2017
Supprted System Requirements fr DRC CTB LAS Links Online Testing Effective August September 2017 This dcument describes the current system requirements fr the DRC INSIGHT Online Testing System and Central
More informationIntroduction to Mindjet on-premise
Intrductin t Mindjet n-premise Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 www.mindjet.cm 2012 Mindjet. All Rights Reserved
More informationGetting Started with DocuSign
Getting Started with DcuSign DcuSign is the electrnic system used t rute, apprve, and execute cnstructin related dcuments at The University f Alabama. While these basic instructins are intended t help
More informationBuilding a Strategic Plan for Your Security Awareness Program
SESSION ID: HUM-T09 Building a Strategic Plan fr Yur Security Awareness Prgram Lance Spitzner Directr SANS Securing The Human @lspitzner WindwsOS EMET Micrsft Security Essentials Security Cntrls Data Executin
More informationGuidance for Applicants: Submitting an application in AAS Ishango Grants Management
Guidance fr Applicants: Submitting an applicatin in AAS Ishang Grants Management Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1
More informationIntegration Framework for SAP Business One
Integratin Framewrk fr SAP Business One DIPrxy Cnfiguratin PUBLIC Glbal Rll-ut Octber 2018, B Zha TABLE OF CONTENTS 1 INTRODUCTION... 3 2 INSTALLATION... 3 3 CONFIGURATION... 5 3.1 Services in Service
More information