It s Not Just FERPA. Privacy and Security Issues in Higher Education. Alisa Chestler Washington, D.C. Eric Setterlund, CIPP/US Chattanooga, Tennessee

Size: px
Start display at page:

Download "It s Not Just FERPA. Privacy and Security Issues in Higher Education. Alisa Chestler Washington, D.C. Eric Setterlund, CIPP/US Chattanooga, Tennessee"

Transcription

1 It s Nt Just FERPA Privacy and Security Issues in Higher Educatin Alisa Chestler Washingtn, D.C. Eric Setterlund, CIPP/US Chattanga, Tennessee

2 Tday s Tpics Our wrld What kind f infrmatin are we cncerned abut? What is privacy and infrmatin security? What is a data breach? What laws impact higher educatin institutins? What shuld yu d? 2

3 Our Wrld 2013 Baker, Dnelsn, Bearman, Caldwell & Berkwitz, PC 2 3

4 Sensitive Infrmatin is What We Are Cncerned Abut Educatinal Recrds Emplyee health infrmatin (fr grup health plans) Emplyment files Accunting and financial reprting infrmatin Cmpany trade secrets (prducts, custmers, business strategies, etc.) Legal files: litigatin, patent, M&A, etc. Netwrk user IDs and passwrds Student financial infrmatin Credit card infrmatin/accunt infrmatin 4

5 What is Privacy and Infrmatin Security, Anyway? Tw sides f the same cin ensuring cnfidentiality f infrmatin Privacy is the bjective, security is means 5

6 Applicable Regulatry Regimes Family Educatinal Rights and Privacy Act (FERPA) Health Insurance Prtability and Accuntability Act (HIPAA) Payment Card Industry Data Security Standards (PCI-DSS) Family and Medical Leave Act Americans with Disabilities Act 42 C.F.R. Part 2 Privacy Act FCRA/FACTA Genetic Infrmatin Nndiscriminatin Act CAN-SPAM Library Patrns Acts? Applicable destructin laws? 6

7 Can t frget abut state laws states with laws. 7

8 A Case Study A student is a victim f sexual assault n campus. She is unsatisfied with the university s respnse and decides t sue the university. Shuld the university access the student s psychtherapy recrds frm the student health center? 8

9 Legal Implicatins Title IX FERPA r HIPAA? Treatment Recrds/Educatinal Recrds html Any applicable state laws limiting disclsure f psychtherapy recrds? 9

10 Legal Implicatins (cntinued) What s in yur ntice f privacy practices? 10

11 Surveillance 11

12 What is a Data Breach? A data breach is the unauthrized disclsure r the unauthrized use f infrmatin. 12

13 The Culprit? 13

14 EMPLOYEES! 14

15 Risk Management Cnsideratins: Data Breach High cst f data breach respnse (ptentially astrnmical) frensic cnsultant breach ntificatin call center credit mnitring legal fees PR csts gvernment investigatin csts civil mnetary penalties and fines regulatry fines Reputatinal harm public relatins fiasc Abut $200 per persn per incident 15

16 Off-Campus Infrmatin Emplyees Remving Infrmatin frm Campus Laptps, iphnes and ipads at hme r sitting arund in airprts, htels, bars and unccupied cars Frgtten thumb drives in sck drawers Persnal and persnal clud strage accunts (e.g., DrpBx) All f the abve fr frmer emplyees wh didn t return r destry the infrmatin Third Parties Hlding r Accessing Infrmatin under Cntract Physical files stred ffsite Service vendrs Virtual data rms IT cnsultants Sftware-as-a-service (SaaS) vendrs Other * Discarded cmputers Cpiers returned after lease expired * hpefully wiped f data 16

17 Hw shuld yu address the issue? 17

18 Essential Elements f Any Cmpliance Prgram Designated respnsible persn/cmmittee (accuntability) Plicies and prcedures (dcumented expectatins) Training and awareness (understanding f expectatins) Open cmmunicatin (channels t reprt cmpliance cncerns) Mnitring (mechanisms t discver nn-cmpliance) Enfrcement (sanctins fr nn-cmpliance) Respnse plan (prcedures t address effects f nn-cmpliance) 18

19 Sme f the Required Plicies and Prcedures Privacy Dcumented plicies and prcedures Frmal training and security awareness prgram Sanctins fr nn-cmpliance Permitted and prhibited uses and disclsures Minimum necessary use Security Security management prgram Peridic security risk analyses Rle-based access Physical security prtcls Technical security prtcls 19

20 Fundamentals f Security Risk Management ASSESSMENT and CONTROL 20

21 Optins fr Dealing with Security Risks Three ptins fr addressing any given risk: Mitigate it implement cntrls t reduce likelihd and/r impact f the threat (i.e., abate the vulnerability) Transfer it put the risk ff t an insurer r cntract party Accept it if likelihd and impact f threat are limited, r if cst t mitigate r transfer is t high Can nly address risks that have been IDENTIFIED and ASSESSED 21

22 The Risk Assessment Cannt cntrl a risk that is nt identified We can always lck dwn infrmatin s tightly that n ne can use it, but we cannt implement apprpriate cntrls withut understanding the risk t be cntrlled Security risk analysis: Fcus attentin and resurces (i.e., cntrls) n threats representing the GREATEST TOTAL RISK 22

23 The Risk Assessment Prcess Set Yur Bundary Vulnerabilities Expected Lss Threats Vulnerabilities Expected Lss RISK Implement Apprpriate Cntrls 23

24 Risk Mitigatin Strategies Internal Cntrls PHYSICAL SAFEGUARDS TECHNICAL SAFEGUARDS ADMINISTRATIVE SAFEGUARDS 24

25 Risk Mitigatin Strategies Internal Cntrls Physical safeguards Examples f threats: external envirnment (lightning, trnad, fld, rits, pwer utage) internal envirnment (water leaks, fire, excessive heat r humidity) human threats - intentinal (theft, vandalism, espinage) - inadvertent (lss, accidental erasure, unintended change) Examples f cntrls: lcks n drs, file cabinets, etc. ID badges and visitr escrts physical intrusin detectin systems redundant pwer and HVAC systems fire suppressin systems back-ups 25

26 Risk Mitigatin Strategies Internal Cntrls Technical safeguards Examples f threats: access by unauthrized persns inability t discern imprper access r transmissin unauthrized r unintended changes t r deletin f infrmatin data crruptin Examples f cntrls: strng passwrds firewalls access and activity lgs anti-virus sftware netwrk intrusin detectin systems encryptin, encryptin, encryptin Encryptin (fr data at rest and in transit) cures many ills 26

27 Risk Mitigatin Strategies Internal Cntrls Administrative safeguards Examples f threats: inadvertent disclsure r lss f infrmatin imprper use f infrmatin unknwn unknwns Examples f cntrls: apprpriate plicies and prcedures are the fundatin key principles f least privilege, minimum necessary, and fail securely security awareness prgram (training, re-training and reminders) mnitring fr vilatins and sanctining vilatrs regularly perfrmed security risk analyses Largely the dmain f the legal/cmpliance functin rather than IT 27

28 Risk Mitigatin Strategies fr Service Prviders Due diligence what institutins shuld d befre handing ver client inf Questins t ask: Designated privacy and security fficer(s)? When designated? Frmal, written privacy and security plicies and prcedures? Security risk assessment? Perfrmed by qualified third party? When? Any use f dwnstream hsting vendrs r data centers? Any security-related audits r certificatins? Same questin fr any dwnstream service prvider. Ever experienced a data breach invlving persnal infrmatin f individuals? Maintain cyber-liability insurance? What cverage(s)? Examine privacy and security plicies and prcedures Talk with privacy and security fficer(s) 28

John R. Robles CISA, CISM, CRISC

John R. Robles CISA, CISM, CRISC Jhn R. Rbles CISA, CISM, CRISC www.jhnrrbles.cm jrbles@cqui.net 787-647-3961 What is Security as a Service (SecaaS)? Security as a Service is a clud cmputing mdel that Delivers Managed Security Services

More information

Town of Warner, New Hampshire Information Security Policy

Town of Warner, New Hampshire Information Security Policy Twn f Warner, New Hampshire Infrmatin Security Plicy Date Adpted: Bard f Selectmen David E. Hartman David Karrick, Jr. Clyde Carsn Table f Cntents Table f Cntents 1 Intrductin 2 Ethics and Acceptable Use

More information

Security of Information Technology Resources

Security of Information Technology Resources CORNELL UNIVERSITY POLICY LIBRARY Security f Infrmatin Technlgy Resurces Technlgies Chapter: 4, Security and Vice President fr Infrmatin Technlgies Originally Issued: June 1, 2004 Last Full Review: December

More information

ITD Information Security October 19, 2015

ITD Information Security October 19, 2015 ITD Infrmatin Security Octber 19, 2015 Cntents Intrductin... 3 Synpsis... 3 ITD Security Team... 3 Cunty Emplyees... 3 Malware Prtectin... 4 Physical Security... 4 Data... 4 Internet... 4 Micrsft Office

More information

UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL

UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Electrnic Data Prtectin and Encryptin REFERENCE: Refrmat CATEGORY: Infrmatin Technlgy PAGE: 1 SUPERSEDES: POL-UMIT- A175-014-01 APPROVER: David Ertel

More information

Software Usage Policy Template

Software Usage Policy Template Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/

More information

NCTA-Certified Cloud Technologist (NCT) Exam NCT-110

NCTA-Certified Cloud Technologist (NCT) Exam NCT-110 NCTA-Certified Clud Technlgist (NCT) Exam NCT-110 Exam Infrmatin Candidate Eligibility: The NCTA-Certified Clud Technlgist (NCT) exam requires n applicatin fee, supprting dcumentatin, nr ther eligibility

More information

Employee ID Conversion Workshop. Florida Department of Financial Services Division of Accounting & Auditing

Employee ID Conversion Workshop. Florida Department of Financial Services Division of Accounting & Auditing Emplyee ID Cnversin Wrkshp Flrida Department f Financial Services Divisin f Accunting & Auditing Agenda Summary f the Agency Impact Statements System Requirements Timeline Agency Readiness Next Steps Impact

More information

OATS Registration and User Entitlement Guide

OATS Registration and User Entitlement Guide OATS Registratin and User Entitlement Guide The OATS Registratin and Entitlement Guide prvides the fllwing infrmatin: OATS Registratin The prcess and dcumentatin required fr a firm r Service Prvider t

More information

Disaster Recovery. Practical Applications. Eric LaFollette. Director of Information Resources Lake County Clerk of Courts

Disaster Recovery. Practical Applications. Eric LaFollette. Director of Information Resources Lake County Clerk of Courts Disaster Recvery Practical Applicatins Eric LaFllette Directr f Infrmatin Resurces Lake Cunty Clerk f Curts Presentatin Outline Imprtance f a plan Disaster Recvery Scenaris Disaster Recvery Basics Lake

More information

Succeed in ISO/IEC Audit Checks. Bob Cordisco Systems Engineer

Succeed in ISO/IEC Audit Checks. Bob Cordisco Systems Engineer Succeed in ISO/IEC 27001 Audit Checks Bb Crdisc Systems Engineer Bb.Crdisc@netwrix.cm Hw t Ask Questins Type yur questin here Click Send Agenda Why cmpliance is imprtant What ISO/IEC 27001 is ISO/IEC 27001

More information

General Data Protection Regulation (GDPR) for CEO s Quick overview & impact

General Data Protection Regulation (GDPR) for CEO s Quick overview & impact General Data Prtectin Regulatin (GDPR) fr CEO s Quick verview & impact ISSE, Nvember 14th 2017 Erik Luysterbrg EMEA Data Prtectin & Privacy Leader Why is GDPR n the agenda? Cllectin, analysis and internatinal

More information

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services Privacy Plicy Last Mdified: September 26, 2016 Pictry is a fast and fun way t share memes with yur friends and the wrld arund yu. Yu can send a Pictry game t friends and view the pictures they submit in

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 11 2016 v5.1 Answers 100% 1. A newly hired netwrk technician is given the task f rdering new hardware fr a small business with a large grwth frecast. Which primary factr shuld the technician

More information

Department of Computer Information Systems KEMU

Department of Computer Information Systems KEMU Advanced DBMS: CISY 423 Department f Cmputer Infrmatin Systems KEMU Database Security OBJECTIVES Database Security and Authrizatin Database Users Creating Users/Accunts in cmmercial DBMS Discretinary Access

More information

ANNUAL COMPUTER SECURITY REFRESHER TRAINING

ANNUAL COMPUTER SECURITY REFRESHER TRAINING Cmputer DD Nvember 27, 2017 ANNUAL COMPUTER SECURITY REFRESHER TRAINING Nrthrp Grumman has a requirement t prvide annual cmputer security training t all emplyees wh have access t classified cmputing systems.

More information

CCNA 1 Chapter 1 v5.03 Exam Answers 2016

CCNA 1 Chapter 1 v5.03 Exam Answers 2016 CCNA 1 Chapter 1 v5.03 Exam Answers 2016 1. A cmpany is cntemplating whether t use a client/server r a peer-t-peer netwrk. What are three characteristics f a peer-t-peer netwrk? (Chse three.) better security

More information

MHS BYOD Policy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY

MHS BYOD Policy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY MHS BYOD Plicy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY Intrductin This dcument prvides advice and directin t students wh chse t use BYOD t access the Department f Educatin (DOE)

More information

Privacy Policy concerning the use of the website and the use of cookies

Privacy Policy concerning the use of the website and the use of cookies Privacy Plicy cncerning the use f the website and the use f ckies Agria understands the imprtance f the privacy f its custmers and the prtectin f their persnal data. Present plicy utlines the handling

More information

EU General Data Protection Regulation

EU General Data Protection Regulation EU General Data Prtectin Regulatin Sally Ubnske, Senir Business Systems Analyst, subnske@ariessys.cm Sean MacRae, Business Systems Analyst, smacrae@ariessys.cm GDPR Summary The Eurpean Parliament, the

More information

PRIVACY AND E-COMMERCE POLICY STATEMENT

PRIVACY AND E-COMMERCE POLICY STATEMENT PRIVACY AND E-COMMERCE POLICY STATEMENT Tel-Tru Manufacturing Cmpany ( Tel-Tru ) is dedicated t develping lng-lasting relatinships that are built n trust. Tel-Tru is cmmitted t respecting the wishes f

More information

UNSW Technology Policy:

UNSW Technology Policy: UNSW Technlgy Plicy: UNSW Plicy Respnsible Officer Cntact Officer Apprving Authrity UNSW Data Netwrk Cnnectin Plicy Chief Infrmatin Officer Manager Infrastructure Services Supprt UNSW IT Services Ph: x

More information

Patch Management Policy

Patch Management Policy Patch Management Plicy (Versin 1) Dcument Cntrl Infrmatin: Date: 21/5/18 Master Tracking Name Patch Management Plicy Master Tracking Reference Owning Service / Department Exeter IT Issue: 1 Apprvals: Authrs:

More information

Welcome to Manage Risk to Your Organization with Effective Data Security

Welcome to Manage Risk to Your Organization with Effective Data Security Welcme t Manage Risk t Yur Organizatin with Effective Data Security Presented by: Gelman, Rsenberg & Freedman CPAs The prgram will start prmptly at 11:00 AM ET Please nte: Use the Q&A functin t speak with

More information

E-Lock Policy Manager White Paper

E-Lock Policy Manager White Paper White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...

More information

CertNexus Cyber Secure Coder (CSC) Exam CSC-110

CertNexus Cyber Secure Coder (CSC) Exam CSC-110 Date Issued: 2/1/2017 Date Mdified: 4/17/2018 Versin: 1.3 CertNexus Cyber Secure Cder (CSC) Exam CSC-110 Exam Infrmatin Candidate Eligibility: The Cyber Secure Cder (CSC) exam requires n applicatin fee,

More information

OmniPCX Record PCI Compliance 2.3

OmniPCX Record PCI Compliance 2.3 S T R A T E G I C W H I T E P A P E R OmniPCX Recrd PCI Cmpliance 2.3 Alcatel-Lucent Enterprise Services Page 1/11 OmniPCX-Recrd R2.3 PCI Cmpliance White Paper Legal ntice Alcatel, Lucent, Alcatel-Lucent

More information

Point-to-Point Encryption (P2PE)

Point-to-Point Encryption (P2PE) Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard

More information

IHIS Research Access Request Guidelines

IHIS Research Access Request Guidelines Eservices: https://sumc.service-nw.cm/ 1. FOR NEWLY HIRED EMPLOYEES: Use On-barding Services & On-Barding Guide Frm Please Nte the fields required fr Research IHIS access are the same as thse utlined in

More information

Appendix B t Data Security Classificatin Plicy Allwed University Systems fr Data Security Classificatins Date f initial publicatin: June 6, 2017 Date f latest revisin: N/A St. Thmas Service r System Public

More information

OBSERVATIONS FROM CYBERSECURITY EXAMINATIONS

OBSERVATIONS FROM CYBERSECURITY EXAMINATIONS By the Office f Cmpliance Inspectins and Examinatins ( OCIE ) 1 This Risk Alert prvides a summary f bservatins Vlume VI, Issue 5 August 7, 2017 frm OCIE s examinatins OBSERVATIONS FROM f registered brkerdealers,

More information

FUNDAMENTALS OF INFORMATION SYSTEMS AUDIT

FUNDAMENTALS OF INFORMATION SYSTEMS AUDIT FUNDAMENTALS OF INFORMATION SYSTEMS AUDIT May 13, 20 & 27 2017 8:30 am - 5:30 pm ISACA Manila Prfessinal Develpment Center REGISTER NOW and Earn 24 CPE Credits! Fr inquiry and reservatin, kindly call at

More information

Custod. July 30, 20100

Custod. July 30, 20100 AgriLife Infrmatin Technlgy Custd dian Prcedures and Best Practices July 30, 20100 TABLE OF CONTENTS Intrductin.. 3 Custdian Requirements...... 4 Appendix A - Definitins........ 13 Appendix B - IT Security

More information

IT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016 IT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016 1. A user ntices that the data transfer rate fr the gigabit NIC in the user cmputer is much slwer than expected. What is a pssible cause fr the

More information

Click Sign In button. Click Register Employer. Click Forgot Username and/or Password to Create a unique user ID and password.

Click Sign In button. Click Register Employer. Click Forgot Username and/or Password to Create a unique user ID and password. Virtual OneStp (VOS) Emplyer User Lgging In If yu dn t have an accunt: If yu have an accunt: Click the Hme page graphic, the Start here r Enter yur user ID and passwrd. Click here links, r the Nt Registered?

More information

e-bridge The future of connected care

e-bridge The future of connected care Respnsive Innvatin e-bridge The future f cnnected care Overview Enhanced patient care by prviding yur n-scene view directly t physicians, specialists and hspitals anywhere, anytime. With e-bridge yu can

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questins What are the benefits f activech? activech allws yur rganizatin t prvide an n-premise, managed and secure alternative t Drpbx and ther file synching and sharing slutins. Benefits

More information

Forcepoint UEBA Management of Personal Data

Forcepoint UEBA Management of Personal Data Frcepint UEBA Management f Persnal Data 2018 Frcepint LLC. All Rights Reserved Dcument Classificatin: Public FPWSCMPD-2018MAY24 Frcepint UEBA Management f Persnal Data CONTENTS Disclaimer... 2 General...

More information

SIEM Use Cases 45 use cases for Security Monitoring

SIEM Use Cases 45 use cases for Security Monitoring www.paladin.net SIEM Use Cases 45 use cases fr Security Mnitring Paladin - SIEM Use Cases Use Case 02 Descriptin DMZ Jumping This rule will fire when cnnectins seemed t be bridged acrss the netwrk's DMZ.

More information

Access the site directly by navigating to in your web browser.

Access the site directly by navigating to   in your web browser. GENERAL QUESTIONS Hw d I access the nline reprting system? Yu can access the nline system in ne f tw ways. G t the IHCDA website at https://www.in.gv/myihcda/rhtc.htm and scrll dwn the page t Cmpliance

More information

and File Folder # - This is the state assigned file folder # for licensed teachers. This is used in MCCC reporting and STAR reporting.

and File Folder # - This is the state assigned file folder # for licensed teachers. This is used in MCCC reporting and STAR reporting. STAFF, USERS AND SECURITY 2017 BUSINESS CONFERENCE 1 STAFF Staff View Staff must exist befre users can be created. Staff recrds are initially added thrugh the cnversin prcess, but they are manually added

More information

A Purchaser s Guide to CondoCerts

A Purchaser s Guide to CondoCerts Lgin t CndCerts - T submit a request with CndCerts, lg n t www.cndcerts.cm. First time users will fllw the New Users link t register. Dcument r print screen the User ID and Passwrd prvided. New accunts

More information

CLIENT. Corporation. Hosting Services. August 24, Marc Gray Flywire Technology CLIENT. 104 West Candler St Winder, GA

CLIENT. Corporation. Hosting Services. August 24, Marc Gray Flywire Technology CLIENT. 104 West Candler St Winder, GA CLIENT Crpratin Hsting Services August 24, 2011 PRESENTED TO: PRESENTED BY: Marc Gray Flywire Technlgy CLIENT 104 West Candler St Winder, GA 30680 770-771-5299 Marc@ flywiretechnlgy.cm TABLE OF CONTENTS

More information

INFORMATION TECHNOLOGY SERVICES NIST COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION

INFORMATION TECHNOLOGY SERVICES NIST COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION NIST 800-171 COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION WHAT IS NIST 800-171 COMPLIANCE AND WHY DO WE HAVE TO DO IT? Any Cntrlled Unclassified Infrmatin (CUI) residing in nnfederal infrmatin

More information

Web Application Security Version 13.0 Training Course

Web Application Security Version 13.0 Training Course Web Applicatin Security Versin 13.0 Training Curse SecureSphere Web Applicatin Security Versin 13.0 Required Training Units: 4 (TR-UNIT) Training Units are gd fr 1 year frm the time f purchase. Length:

More information

Enrolling onto the Open Banking Directory How To Guide

Enrolling onto the Open Banking Directory How To Guide Enrlling nt the Open Banking Directry Hw T Guide Date: Octber 2017 Versin: v3.0 Classificatin: PUBLIC OPEN BANKING LIMITED ENROLLING ONTO THE OPEN BANKING DIRECTORY Page 1 f 14 Cntents 1. Intrductin 3

More information

HPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices

HPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices HPE LadRunner Best Practices Series LadRunner 12.50 Upgrade Best Practices Dcument publicatin date: Nvember 2015 Cntents 1. Intrductin... 3 Overview... 3 Audience... 3 2. Preparatin... 3 Backup assets...

More information

ANNUAL COMPUTER SECURITY REFRESHER TRAINING

ANNUAL COMPUTER SECURITY REFRESHER TRAINING ANNUAL COMPUTER SECURITY REFRESHER TRAINING Nrthrp Grumman has a requirement t prvide annual cmputer security training t all emplyees wh have access t classified cmputing systems. This training will infrm

More information

TDR and Trend Micro. Integration Guide

TDR and Trend Micro. Integration Guide TDR and Trend Micr Integratin Guide i WatchGuard Technlgies, Inc. TDR and Trend Micr Deplyment Overview Threat Detectin and Respnse (TDR) is a cllectin f advanced malware defense tls that crrelate threat

More information

Imagine for MSDNAA Student SetUp Instructions

Imagine for MSDNAA Student SetUp Instructions Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS

More information

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools. Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are

More information

IT Security & New Regulatory Requirements May 29, 2014

IT Security & New Regulatory Requirements May 29, 2014 IT Security & New Regulatry Requirements May 29, 2014 Rn Hulshizer, CMA, CGEIT Managing Directr IT Risk Services rhulshizer@bkd.cm T Receive CPE Credit Individual Attendee Participate in entire webinar

More information

Cyber Security Supply Chain Risk Management Plans

Cyber Security Supply Chain Risk Management Plans ERO Enterprise-Endrsed Implementatin Guidance. Endrsement fr this implementatin guidance is based n the language f draft 2 f the CIP-013-1 Reliability Standard dated April 2017. Any changes t the standard

More information

ITIL and ISO20000 Pick One or Use Both? Track: Business Services

ITIL and ISO20000 Pick One or Use Both? Track: Business Services ITIL and ISO20000 Pick One r Use Bth? Track: Business Services Presenter: Mark Thmas Synpsis With the explsive grwth f ITIL as the de fact framewrk fr IT Service, there is still little knwn abut the ISO20000

More information

IS315T IS Risk Management and Intrusion Detection [Onsite]

IS315T IS Risk Management and Intrusion Detection [Onsite] IS315T IS Risk Management and Intrusin Detectin [Onsite] Curse Descriptin: This curse addresses cncepts f risk management and intrusin detectin. Areas f instructin include hw t assess and manage risks

More information

Privacy Policy. We may collect information about you in a variety of ways. The information we collect on the Site includes:

Privacy Policy. We may collect information about you in a variety of ways. The information we collect on the Site includes: Privacy Plicy BHIP Glbal, Inc. ( BHIP, we r us ) respects the privacy f ur users ( User r Yu ). This Privacy Plicy explains hw Pruvit cllects, uses, and disclses, and safeguards Yur Infrmatin when yu visit

More information

Adverse Action Letters

Adverse Action Letters Adverse Actin Letters Setup and Usage Instructins The FRS Adverse Actin Letter mdule was designed t prvide yu with a very elabrate and sphisticated slutin t help autmate and handle all f yur Adverse Actin

More information

Employee Self Service (ESS) FAQs

Employee Self Service (ESS) FAQs Emplyee Self Service (ESS) FAQs ESS User Access & Lgin/Passwrd Inf Upgrade Changes t ESS Recently we upgrades t versin 10 f ur HR/Payrll system which includes the Emplyee Self Service (ESS) mdule. Just

More information

Rule 30(b)(6) Deposition Question Topics

Rule 30(b)(6) Deposition Question Topics Rule 30(b)(6) Depsitin Questin Tpics Electrnic Data Systems & Management Technical Witness The parameters f a Rule 30(bH6) depsitin may vary greatly frm case t case, but the fllwing categries f depsitin

More information

Introduction to Mindjet on-premise

Introduction to Mindjet on-premise Intrductin t Mindjet n-premise Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 www.mindjet.cm 2012 Mindjet. All Rights Reserved

More information

Chapter 10: Information System Controls for System Reliability Part 3: Processing Integrity and Availability

Chapter 10: Information System Controls for System Reliability Part 3: Processing Integrity and Availability Chapter 10: Infrmatin System Cntrls fr System Reliability Part 3: Prcessing Integrity and Availability Cntrls Ensuring Prcessing Integrity Input Prcess Output Input Cntrls Garbage-in Garbage-ut Frm Design

More information

Update: Users are updated when their information changes (examples: Job Title or Department). o

Update: Users are updated when their information changes (examples: Job Title or Department). o Learn Basic User Integratin Batch File Prcessing The Learn Basic User Integratin is designed t manage the rganizatinal changes cmpanies are challenged with n a daily basis. Withut a basic type f integratin,

More information

Internet/Intranet Publishing Guidelines

Internet/Intranet Publishing Guidelines Muntain View-Ls Alts Unin High Schl District In trductin Internet/Intranet Publishing Guidelines Using the Internet t further the educatinal prcess, gals and bjectives is a natural extensin f Muntain View-Ls

More information

Connect+/SendPro P Series Networking Technical Specification

Connect+/SendPro P Series Networking Technical Specification Shipping & Mailing Pstage Meters Cnnect+/SendPr P Series Netwrking Technical Specificatin Intrductin 2 Netwrk Requirements 2 Prt/Cmmunicatin Requirements 2 URL Infrmatin 3 FAQs 10 Service Cllateral SV62440

More information

Managing User Accounts

Managing User Accounts A variety f user types are available in Lighthuse Transactin Manager (LTM) with cnfigurable permissins that allw the Accunt Administratr and administratr-type users fr the accunt t manage the abilities

More information

APPLICATION FORM. CISAS opening hours: 9:00am to 5:00pm, Monday to Friday

APPLICATION FORM. CISAS opening hours: 9:00am to 5:00pm, Monday to Friday Enquiry reference number: (Office use nly) Administered by the Centre fr Effective Dispute Reslutin (CEDR) APPLICATION FORM What is this Applicatin fr? What d I need t d? This applicatin frm is fr custmers

More information

Cyber Security for Accounting and Auditing Professionals

Cyber Security for Accounting and Auditing Professionals Cyber Security fr Accunting and Auditing Prfessinals Curse Infrmatin The American Bard f Frensic Accunting (ABFA), alng with an esteemed grup f educatrs and prfessinals, develped the Cyber Security fr

More information

How to use DCI Contract Alerts

How to use DCI Contract Alerts Hw t use DCI Cntract Alerts Welcme t the MyDCI Help Guide series Hw t use DCI Cntract Alerts In here, yu will find a lt f useful infrmatin abut hw t make the mst f yur DCI Alerts which will help yu t fully

More information

HP ExpertOne. HP2-T21: Administering HP Server Solutions. Table of Contents

HP ExpertOne. HP2-T21: Administering HP Server Solutions. Table of Contents HP ExpertOne HP2-T21: Administering HP Server Slutins Industry Standard Servers Exam preparatin guide Table f Cntents In this sectin, include a table f cntents (TOC) f all headings. After yu have finished

More information

Backup your Data files before you begin your cleanup! Delete General Ledger Account History. Page 1

Backup your Data files before you begin your cleanup! Delete General Ledger Account History. Page 1 Database Clean-up (Optinal) The fllwing items can be dne at ANY time during yur Fiscal Year. Befre yu start yur Database Clean-up, please verify that yu are n the mst recent versin f Eclipse. If yu see

More information

Delete General Ledger Account History

Delete General Ledger Account History Database Clean-up (Optinal) The fllwing items can be dne at ANY time during yur Fiscal Year. Befre yu start yur Database Clean-up, please verify that yu are n the mst recent versin f Eclipse. If yu see

More information

For students to participate in BYOD please follow these two steps

For students to participate in BYOD please follow these two steps Octber 14, 2015 www.readingtn.k12.nj.us Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many

More information

Students will have opportunities available throughout the year to have their devices registered.

Students will have opportunities available throughout the year to have their devices registered. www.readingtn.k12.nj.us December 9, 2013 Dear Readingtn Middle Schl Families, We are excited t annunce that the Bring Yur Own Device is available fr all middle schl students! We recgnize that many f ur

More information

September 24, Release Notes

September 24, Release Notes September 24, 2013 Release Ntes Cntacting Lestream Lestream Crpratin 411 Waverley Oaks Rd. Suite 316 Waltham, MA 02452 USA http://www.lestream.cm Telephne: +1 781 890 2019 Fax: +1 781 688 9338 T submit

More information

Q-CERT Incident Reporting Guidelines

Q-CERT Incident Reporting Guidelines Classificatin : Public Q-CERT Incident Reprting Guidelines Q-CERT prvides limited incident handling services t its cnstituents, which include Qatar's gvernment, business, and educatinal institutins as

More information

Online Image Viewing Agent User Guide. Texas FAIR Plan Association 1

Online Image Viewing Agent User Guide. Texas FAIR Plan Association 1 Online Image Viewing gent User Guide Texas FIR Plan ssciatin 1 Table f Cntents 1. Online Image Viewing... 4 2. Frequently sked uestins (F)... 15 TFP Online Image Viewing Guide 2 Table f Figures Figure

More information

Building a Strategic Plan for Your Security Awareness Program

Building a Strategic Plan for Your Security Awareness Program SESSION ID: HUM-T09 Building a Strategic Plan fr Yur Security Awareness Prgram Lance Spitzner Directr SANS Securing The Human @lspitzner WindwsOS EMET Micrsft Security Essentials Security Cntrls Data Executin

More information

ComplyWorks Subscription User Guide. October 6, 2011

ComplyWorks Subscription User Guide. October 6, 2011 CmplyWrks Subscriptin User Guide Octber 6, 2011 Cntents 1. Register... 3 2. Get cmpliant... 3 a) Pay fr yur accunt... 3 b) Cllect the dcuments yu ll need... 4 c) Enter yur infrmatin... 4 d) Publish yur

More information

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins) Intrductin This reference guide is aimed at managers wh will be respnsible fr managing users within RiskMan where RiskMan is nt cnfigured t use netwrk lgins. This guide is used in cnjunctin with the respective

More information

High Security SaaS Concept Software as a Service (SaaS) for Life Science

High Security SaaS Concept Software as a Service (SaaS) for Life Science Sftware as a Service (SaaS) fr Life Science Cpyright Cunesft GmbH Cntents Intrductin... 3 Data Security and Islatin in the Clud... 3 Strage System Security and Islatin... 3 Database Security and Islatin...

More information

Texas A&M Veterinary Medical Diagnostic Laboratory Procedures V0.01 Information Resource Procedures

Texas A&M Veterinary Medical Diagnostic Laboratory Procedures V0.01 Information Resource Procedures Texas A&M Veterinary Medical Diagnstic Labratry Prcedures 29.01.03.V0.01 Infrmatin Resurce Prcedures Revised: January 23, 2017 Next Scheduled Review: January 23, 2022 Click t View Revisin Histry PROCEDURE

More information

Password Management Guidelines

Password Management Guidelines Unified Cntract System Passwrd Management Guidelines Versin 2.5 Revisin date: 26-06-2006 Authr:J.Thiyagarajan Cpyright 2006 by Hexaware Technlgies Limited All rights reserved. All text and figures included

More information

Privacy Policy Toyota Du Maroc is Committed to Respecting Your Privacy

Privacy Policy Toyota Du Maroc is Committed to Respecting Your Privacy Privacy Plicy Tyta Du Marc is Cmmitted t Respecting Yur Privacy Tyta Du Marc is cmmitted t prtecting yur persnal infrmatin and cmplying with relevant laws including, withut limitatin, the General Data

More information

/Dy. Security Overview

/Dy. Security Overview /Dy Security Overview Table f Cntents 1. Dcument Purpse... 3 2. Slutin Overview... 3 2.1 Functinality... 3 2.1 Certificatins and Awards... 4 2.2 Slutin Elements... 4 3. Cnnectivity... 5 3.1 Web Services...

More information

RSA CONFERENCE Call for Speakers Offline Submission Form

RSA CONFERENCE Call for Speakers Offline Submission Form RSA CONFERENCE 2008 Call fr Speakers Offline Submissin Frm SESSION INFORMATION * = required input Sessin Title * (Limit 75 characters) High-Speed Risks in 802.11n Netwrks Sessin Abstract * (Limit 400 characters

More information

Customer Upgrade Checklist

Customer Upgrade Checklist Custmer Upgrade Checklist Getting Ready fr Yur Sabre Prfiles Upgrade Kicking Off the Prject Create a prfiles prject team within yur agency. Cnsider including peple wh can represent bth the business and

More information

Comprehensive LAN Security for the Banking Financial Services and Insurance Industries

Comprehensive LAN Security for the Banking Financial Services and Insurance Industries Cmprehensive LAN Security fr the Banking Financial Services and Insurance Industries Nevis Netwrks Persistent LAN Security Slutins Nevis Netwrks LAN Security fr BFSI 1 Overview f the Banking Financial

More information

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu BANNER BASICS What is Banner? Definitin Prduct Mdules Self-Service-Fish R Net Lg int Banner Banner Envirnment The Main Windw My Banner Pages What is it? What frm d yu use? Steps t create a persnal menu

More information

SMART Room System for Microsoft Lync. Software configuration guide

SMART Room System for Microsoft Lync. Software configuration guide SMART Rm System fr Micrsft Lync Sftware cnfiguratin guide Fr mdels SRS-LYNC-S, SRS-LYNC-M and SRS-LYNC-L In this guide: Fr yur recrds 1 Preparing fr yur rm system 2 Befre cnfiguring yur rm system s sftware

More information

Yes. If you are an iphone user, you can download a free application via the App Store in itunes. Download the BSP iphone app.

Yes. If you are an iphone user, you can download a free application via the App Store in itunes. Download the BSP iphone app. Frequently Asked Questins General 1. What is BSP Mbile Banking App? BSP Mbile Banking App, is a smartphne applicatin that allws yu t securely access yur bank accunt (s) anywhere, anytime at yur cnvenience

More information

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering IT2042 - Infrmatin Security 1-1 E. G. S. Pillay Engineering Cllege, Nagapattinam Cmputer Science and Engineering Elective II IT 2042 INFORMATION SECURITY VIII Sem CSE QUESTION BANK - UNIT-IV 1) What is

More information

Using the Swiftpage Connect List Manager

Using the Swiftpage Connect List Manager Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts

More information

Class Roster. Curriculum Class Roster Step-By-Step Procedure

Class Roster. Curriculum Class Roster Step-By-Step Procedure Imprtant Infrmatin The page prvides faculty and staff a list f students wh are enrlled and waitlisted in a particular class. Instructrs are given access t each class fr which they are listed as an instructr,

More information

Getting Started with DocuSign

Getting Started with DocuSign Getting Started with DcuSign DcuSign is the electrnic system used t rute, apprve, and execute cnstructin related dcuments at The University f Alabama. While these basic instructins are intended t help

More information

CyCop FAQ For Internal Use Only. CyCop Frequently Asked Questions

CyCop FAQ For Internal Use Only. CyCop Frequently Asked Questions CyCp FAQ Fr Internal Use Only CyCp Frequently Asked Questins Questin What are the cre Feature Sets fr CyCp? Features Security Prfessinal Tracking and Supervisin Incident, Facility Inspectins and Daily

More information

MAGNET identity management proposal for Personal Networks. Dimitris M. Kyriazanos

MAGNET identity management proposal for Personal Networks. Dimitris M. Kyriazanos Internatinal Telecmmunicatin Unin MAGNET identity management prpsal fr Persnal Netwrks Dimitris M. Kyriazans PhD Student NTUA Geneva, 5 December 2006 Persnal Netwrk - A Definitin A Persnal Netwrk (PN)

More information

SUB-USER ADMINISTRATION HELP GUIDE

SUB-USER ADMINISTRATION HELP GUIDE P a g e 1 SUB-USER ADMINISTRATION HELP GUIDE Welcme t Prsperity Bank. Any previusly created Sub-User lgin frm the F&M system befre Friday, May 16 cnverted t the Prsperity system. Once lgged n t the Prsperity

More information

Background Check Procedures for Sponsors

Background Check Procedures for Sponsors Backgrund Check Prcedures fr Spnsrs 1 On-Site Backgrund Check and Credential Requirements Little League Internatinal requires all guests n the cmplex in a wrking capacity t cmplete a Natinal Criminal Backgrund

More information

Student participation Students can register online, track progress, express interest and demonstrate proficiency.

Student participation Students can register online, track progress, express interest and demonstrate proficiency. Page 1 f 31 Intrductin Our MAG 10 Learning Management System (LMS) is a Web based technlgy used t plan, implement, and assess a specific learning prcess. LMS is a training prgram which prvides cmplete

More information

RICOH IMAGING COMPANY, LTD. wishes to announce the release of Firmware Update Software Version

RICOH IMAGING COMPANY, LTD. wishes to announce the release of Firmware Update Software Version Dwnlads : Firmware Update Thank yu fr using GR II digital camera. RICOH IMAGING COMPANY, LTD. wishes t annunce the release f Firmware Update Sftware Versin 3.00 fr GR II. Firmware in this dcument is the

More information