Data Stored on an External Hard Drive. All requests for data must include the following information.
|
|
- Verity Price
- 5 years ago
- Views:
Transcription
1 Attachment A Form to Describe Sensitive Data Security Plan for the Use of Sensitive Data from the National Longitudinal Study of Adolescent to Adult Health Data Stored on an External Hard Drive All requests for data must include the following information. I. General Information 1. List below the name(s) and responsibilities of the investigator(s) and the research staff (students, research assistants, and programmers) who will have access to the data. *** Changes in personnel require that this information be updated. 2. PI Institution: 3. PI contact information: Name: Phone number: 4. System Administrator contact information: Name: Phone number: 5. Each project participant and system administrator must sign a separate security pledge to be included with the contract. As new personnel are added during the period of this contract, an amended Attachment C and new security pledges must be obtained and sent to Add Health. Number of security pledges included: 6. Only one complete copy of the Add Health data is permitted; however, time-delimited temporary data analysis files may be created. Temporary data analysis file(s) must be deleted every six months and recreated, as necessary, to complete analysis. Temporary data analysis files should be deleted upon completion of a project. All temporary data analysis files will be deleted in these two months each year: and month month 1
2 (Page 2 of 6) 4. Add Health data, including temporary data analysis files or subsets of the data, may not be copied to other media such as CDs, flash drives, or the hard drive of the computer. All Add Health data must remain in the same secure location as the one copy of the original Add Health data. II. Detailed description of computer system where data will be stored and analyzed 1. Please tell us about the computer you are using to access the Add Health data that is stored on the External Hard Drive: brand/make model laptop see #2 or desktop (e.g., Dell, Mac, etc.) (e.g., Optiplex, Dimension, imac Pro, MacBook Air, etc.) 2. Laptop computers are required to be secured to a desk by a lock and cable while accessing the Add Health data. I am using a laptop computer and agree to this condition. 3. Please tell us about the operating system (OS) you are using: ( build might be Home, Pro, Education, Enterprise, El Capitan, Sierra, High Sierra, etc.) name of OS version of OS build of OS 4. Please describe the external hard drive that will be used: Note: The external hard drive must have an external power source (i.e., it must be plugged into a power socket/outlet), be considered a desktop model (i.e., not portable), and be at least deep, 5 high, and 6.5 wide. make & model vendor s specifications for power type and dimensions or note that you are sending pictures of the EHD. 5. What is the physical location where you will be working when accessing the Add Health data? Street Address Type of Building (e.g., private home, apartment complex, business office, campus office, etc.) Office or Room Description (e.g., private locked room, home office, keyed entry, card swipe entry, roommate, officemate, etc.) 6. Add Health data must be excluded from the backup routine.
3 (Page 3 of 6) 7. Add Health encourages researchers to back up their program code and documentation to a secondary source that may be removed from the office (e.g., a flash drive). I understand that I may and should back up my program code and documentation. 8. Who has physical access to the equipment? 9. Who has permission to use the equipment? 10. Is the equipment used by other projects? 11. Where will hard copy information be printed? 12. How will the printed hard copy information be handled/stored/discarded? The following protocols are required. Please initial each to acknowledge your agreement. All printed copies of data output will be contained in a labeled folder. When not in use, paper copies will be stored in a locked filing cabinet. When printouts are no longer being used by researchers, they will be shredded. 13. What is the secure storage location of the original data CD? Street Address Building Room # Storage Unit (e.g., locked drawer, or locked cabinet, or safe)
4 (Page 4 of 6) 14. What is the secure storage location of the external hard drive? Street Address Building Room # Storage Unit (e.g., locked drawer, or locked cabinet, or safe) III. Security system to prevent unauthorized access to the data The following are minimum steps that should be taken to secure both the external hard drive on which the Add Health data is stored and the computer(s) used to access the Add Health data from that external hard drive. Please indicate below each security step whether you have implemented the protocol. Please write a short explanation if you cannot implement a specific step. A. Physical Security of an External Hard Drive 1. The external hard drive will be connected only to a computer that is located in a private office. 2. I enabled encryption on the external hard drive containing secure data. Preferred: Whole Disk Encryption using this software: (e.g., Bitlocker, Veracrypt) Acceptable: Folder Encryption using this software: (e.g., EFS, Veracrypt) 3. I created separate directories on the external hard drive for the Add Health data and the program code and documentation to facilitate ease of backing up the program code and documentation.
5 (Page 5 of 6) 4. Secure erasure must be run on free space periodically (e.g. monthly) and after the secure data has been removed from the external hard drive at the end of the contract period. I will run secure erasure on the external hard drive monthly and at end of contract. 5. I installed secure erasure software on the computer to which the external hard drive is connected. Name of monthly secure erasure software: Name of end-of-contract secure erasure software: 6. I will never connect the external hard drive to the computer while the network cable is plugged into the computer or while WiFi is enabled. 7. I will place the external hard drive on which the Add Health data resides in a locked cabinet, drawer, or safe when not in use. 8. I will not move the external hard drive from the use and storage location(s) specified above in questions II.5 and II.14 (e.g., will not move it between office and home). B. Controlling Access to the Data 1. Access to the Add Health data must be restricted to project personnel using the security features available via the operating system (e.g., login via userid/password and NTFS permissions in Windows, ACLs in Linux and Macintosh Systems).
6 (Page 6 of 6) 2. Add Health requires passwords of at least 16 characters. 3. Add Health requires that the screen saver activates after 3 minutes of inactivity and requires a password to log back in. 4. I will not leave my computer and external hard drive unattended while the external hard drive is attached. 5. I installed and enabled whole disk encryption software on the local hard drive of the computer to which the external hard drive is connected. Name of encryption software: (e.g., Bitlocker, Veracrypt) 6. I configured my statistical applications to point the temporary working files to the encrypted Add Health data directory on the external hard drive. Location [i.e., drive and pathname] of secured directory: 7. I will not copy or move the Add Health data out of the secured directory on the external hard drive for any reason. System Administrator I acknowledge that I consulted with the Investigator (PI). System Administrator initials I acknowledge that I completed these Security Protocols. System Administrator initials
General Social Survey (GSS) NORC
General Social Survey (GSS) NORC OBTAINING GSS SENSITIVE DATA FILES The GSS geographic identification code files are made available to researchers under special contract with NORC. The GSS takes its promise
More informationDRAFT 2012 UC Davis Cyber-Safety Survey
DRAFT 2012 UC Davis Cyber-Safety Survey UNIT INFORMATION Enter the following information. Person completing report Email Phone Unit (include sub-unit information, if appropriate) College/School/Office
More informationSDBOR Technology Control Plan (TCP) Project Title:
SDBOR Technology Control Plan (TCP) Project Title: Principal Investigator: Phone: Department: Email: Description of Controls (EAR/ITAR Category): Location(s) Covered by TCP: Is sponsored research involved?
More informationAnnenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application
Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application The Investigator 2 must complete this application to request access to Sensitive NAES Data Set from
More informationDIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018
DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information
More informationEncrypting Removable Media
For security reasons all removable media must be encrypted with BitLocker to Go on Windows 7 workstations. The following will show you how to use a flash drive with BitLocker to Go. Please note that data
More informationComputing at MIT: Basics
Computing at MIT: Basics Phyllis Galt and Stuart Peloquin Information Services and Technology August 2007 Key take-aways: Utilizing the MIT residential network Responsible network behavior Safe Computing
More informationMac OS X version 10.6 and Below for Students
Mac OS X version 10.6 and Below for Students The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with
More informationPrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps
PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 9L0-064 Title : OS X v10.8 Troubleshooting Exam Vendors : Apple Version : DEMO 1 /
More informationFIRST LOG IN / LOG OUT WARNING!
Information Technology Department - San Diego Unified School District Welcome to Active Directory Workstation User Experience Congratulations! Your site has been migrated to the new Active Directory (AD)
More informationTechnology Control Plan
Technology Control Plan TCP Reference Number: RESPONSIBLE OFFICE CONTACT: Notre Dame Research Administration 940 Grace Hall, Notre Dame, IN 46556 Phone: (574) 631-7432 Fax: (574) 631-6630 E-mail: rca@nd.edu
More informationMicrosoft Windows Operating System Fundamentals
Microsoft - 98-349 Windows Operating System Fundamentals 1 QUESTION: 1 PowerShell is used to: A. monitor user keystrokes. B. repair damaged hard disk drive sectors. C. automate a routine task. D. extend
More informationUniversity of Arkansas Housing Contracting Process. Step 1
Step 1 To begin of the Housing Contract Process, open the University Housing Website and click on Housing Contract. Step 2 On the University Housing and Campus Dining Online Contracts page, click on Living
More informationBOKU staff members, BOKU students. ZID Hotline
Filr The Open Enterprise Server (formerly Novell File Server) has been available to safely secure your data as BOKU member for decades. Filr facilitates access to these data, for example, when you are
More informationLAS IT has enhanced the computer replacement process to create a smoother workflow, and fewer options to navigate.
LAS COMPUTER REPLACEMENT STANDARD CONFIGURATION WHAT DOES MEAN? The computers listed as LAS Funded fall within LAS cost and performance specifications, and will be fully funded by the college for Faculty
More informationFlash Video Encoder CS3 Fetch Microsoft Office 2004 (Excel, imovie. Powerpoint, Word, Entourage) itunes
Welcome This is a small packet of information concerning some of the simpler uses of technology in the department, how to transfer files, change your password, that sort of thing. In this department, we
More informationIHAnywhere Installation and Usage Guide for Mac INFORMATION MANAGEMENT & INFORMATION TECHNOLOGY
IHAnywhere Installation and Usage Guide for Mac INFORMATION MANAGEMENT & INFORMATION TECHNOLOGY 2 Remote access to IH applications is provided through IH Anywhere. To use IH Anywhere you will need to install
More informationJohns Hopkins
Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows XP, Mac OS X, and Linux can be found at: http://www.it.johnshopkins.edu/services/networking/wireless/
More informationContents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52
Contents Getting Started.....................................................1 Installing the Software...........................................1 Using the Maxtor System Tray Icon................................6
More informationJohns Hopkins
Wireless Configuration Guide: Windows 8 Additional hopkins wireless network instructions and requirements for Windows XP, Vista, 7, Mac OS X, Linux, and other Mobile versions can be found at: http://www.it.johnshopkins.edu/services/network/wireless/
More informationIdentity Theft Prevention Policy
Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening
More information*Failure to do this is an Honor Code violation.
Notice: If you are using a newer MacBook Pro model equipped with Apple s Touch Bar feature, you MUST disable the Touch Bar before beginning your exam. Instructions for doing so can be viewed here: Instructions
More informationJohns Hopkins
Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows 8, 7, XP, Mac OS X, Linux, and Mobile versions can be found at: http://www.it.johnshopkins.edu/services/network/wireless/
More informationMobile Learning Quick Reference Guide September 2007
Mobile Learning Quick Reference Guide September 2007 Durham College Guide Book Mobile Computing & IT Support Centre How-To Common Tasks...a resource to help you feel comfortable working with your Apple
More informationWASHTENAW COUNTY TRIAL COURT
WASHTENAW COUNTY TRIAL COURT MANUAL FOR EVIDENCE PRESENTATION ON LARGE DISPLAYS IN THE COURTROOM PERMISSION REQUIRED TO USE TECHNOLOGY: You must get direct permission from the Judge/Judge s staff to display
More informationJohns Hopkins
Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows XP, Mac OS X, and Linux can be found at: http://www.it.jhu.edu/networking/wireless/
More informationBSO CLEAR DESK AND SCREEN POLICY (version 1.0)
BSO CLEAR DESK AND SCREEN POLICY (version 1.0) Approved at BSO Board on 25 th February 2010 CONTENT 1. PURPOSE...3 2. DATA CLASSIFICATION...3 3. THE DESK / OFFICE ENVIRONMENT...3 4. THE PC ENVIRONMENT...4
More informationMGH Research Computer Upgrade. Presenters: Harry Orf, PhD. Neil Coplan,
MGH Research Computer Upgrade Presenters: Harry Orf, PhD. Neil Coplan, MGH Desktop Upgrade Agenda Welcome (We need your Help) Who is on the team? Why does this need to be done? What is the project scope?
More informationUHCOP Laptop Minimum Specifications Class of 2022
UHCOP Laptop Minimum Specifications Class of 2022 The College of Pharmacy strives to prepare students for pharmacist delivered patient care by fostering, among other attributes, life long learning and
More informationKanguru Defender Secure USB Flash Drive
Kanguru Defender Secure USB Flash Drive Quick Start Guide for KRMC Enterprise Managed Devices For Defender Models: Defender 2000 Defender 3000 Defender Elite30 Defender Elite200 Defender Elite300 Copyright
More informationVendor: Apple. Exam Code: 9L Exam Name: OS X v10.8 Troubleshooting Exam. Version: Demo
Vendor: Apple Exam Code: 9L0-064 Exam Name: OS X v10.8 Troubleshooting Exam Version: Demo QUESTION NO: 1 A technician suspects that an application unexpectedly quitting at launch has an unusable preference
More informationHardware and Software Full Requirements
CGM webpractice v7.4 Hardware and Software Full Requirements 2 CGM webpractice_v7 4_SystemReq Revised: 2.21.2019 Table of Contents Full System Requirements... 3 Client Computer Specifications... 3 Peripheral
More informationC A S P E R TECH EDITION 10 USER GUIDE
TM C A S P E R TM TECH EDITION 10 USER GUIDE Copyright and Trademark Information Information in this document is subject to change without notice. Federal law prohibits unauthorized use, duplication, and
More informationFIRST LOG IN / LOG OUT WARNING!
Information Technology Department - San Diego Unified School District Welcome to Active Directory! Laptop User Experience Guide Congratulations! Your site has been migrated to the new Active Directory
More information2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY
2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on
More informationRead Naturally SE Update Windows Network Installation Instructions
Windows Network This document explains how to apply the Read Naturally Software Edition 2.0.3 update to existing installations of SE version 2.0, 2.0.1, or 2.0.2. First update the SE server software, and
More informationTechnology Control Plan
Technology Control Plan I. Statement of policy and assignment of responsibility The University of Illinois at Urbana-Champaign (UIUC) is committed to complying with the export laws and regulations of the
More informationSan Jac ITS Desktop Support Guidelines
San Jac ITS Desktop Support Guidelines Our goal at (ITS) is to provide the highest level of technical support and customer service to all San Jacinto College students and employees. We are constantly striving
More informationTCP AUDIT QUESTIONNAIRE
Audit Date: UECP Auditor(s): Audit Location: Lead Principal Investigator (PI): PI Department: Project Title: Sponsor: Est. Project End Date: FRS Acct #: EAR/ITAR Classification(s): Original TCP Signed:
More informationLIVE NAVIGATOR. Compatibility Guide for Live Navigator Version February 2018
LIVE NAVIGATOR Compatibility Guide for Live Navigator Version 4.0.1 February 2018 Content New in ALN 4.0.1 CG... 3 New in ALN 4.0 CG... 3 Live Navigator Server... 4 Server vs. Agent Compatibility... 4
More informationJCCC Virtual Labs. Click the link for more information on installing on that device type. Windows PC/laptop Apple imac or MacBook ipad Android Linux
JCCC Virtual Labs Revision 9/21/2017 http://ats.web. Welcome to the JCCC Virtual Lab Environment. This system allows students to access campus software titles on their personal computers from almost anywhere.
More informationQ&As. Windows Operating System Fundamentals. Pass Microsoft Exam with 100% Guarantee
98-349 Q&As Windows Operating System Fundamentals Pass Microsoft 98-349 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance
More informationPhysical and Environmental Security Standards
Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...
More informationSample Security Risk Analysis ASP Meaningful Use Core Set Measure 15
Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Risk Analysis with EHR Questions Example Answers/Help: Status What new electronic health information has been introduced into my practice
More informationMicrosoft Windows Operating System Fundamentals. Version: 10.0
Microsoft 98-349 Windows Operating System Fundamentals Version: 10.0 December 5, 2017 QUESTION NO: 1 Microsoft 98-349 Exam discussing the use of PowerShell. Which of the following suitably describes the
More informationWelcome to Shenandoah University s imlearning Program!
Welcome to Shenandoah University s imlearning Program This award-winning integrated mobile learning program provides students and faculty with the tools to enhance student learning and engagement. Use
More informationSymantec Encryption (PGP) Installation Guide
System Requirements Symantec Encryption (PGP) Installation Guide Windows 8 (32 and 64 bit versions) Windows 7 (32 and 64 bit versions)] Windows Vista (32- and 64-bit editions) Additional Requirements Boot
More informationumapps Using umapps 6/14/2017 Brought to you by: umtech & The Center for Teaching & Learning
umapps Using umapps Center for Teaching and Learning (CTL) 100 Administration Bldg., Memphis, TN 38152 Phone: 901.678.8888 Email: itstrainers@memphis.edu Center for Teaching and Learning Website 6/14/2017
More informationElementary Computing CSC M. Cheng, Computer Science 1
Elementary Computing CSC 100 2014-07-14 M. Cheng, Computer Science 1 File & Operating Systems Every computer has an Operating System (OS). An OS is a piece of software that manages the resources on every
More informationMU2b Authentication, Authorization and Accounting Questions Set 2
MU2b Authentication, Authorization and Accounting Questions Set 2 1. You enable the audit of successful and failed policy changes. Where can you view entries related to policy change attempts? Lesson 2
More informationElementary Computing CSC 100. M. Cheng, Computer Science
Elementary Computing CSC 100 1 File & Operating Systems Every computer has an Operating System (OS). An OS is a piece of software that manages the resources on every computer. User Interfaces and File
More informationPII Policies and Procedures
PII Policies and Procedures HEALTHCARE BENEFIT SERVICES INC. Kirk Peters HEALTHCARE BENEFIT SERVICES INC. 2061 BOCA RATON BLVD. SUITE 202 BOCA RATON, FL Table of Contents What is PII... 2 PII Overview...
More informationPass Microsoft Exam
Pass Microsoft 98-367 Exam Number: 98-367 Passing Score: 700 Time Limit: 45 min File Version: 51.0 http://www.gratisexam.com/ Pass Microsoft 98-367 Exam Exam Name: Security Fundamentals Certdumps QUESTION
More informationPHS BYOD Frequently Asked. Question
PHS BYOD Frequently Asked Questions We are fully implementing BYOD again at Pickens High School this year. This program will allow students to use their mobile devices at school as an educational tool.
More informationCisco s AnyConnect VPN Client (version 2.4)
Table of Contents [TOC]: Introduction Getting Started Installation Overview Using the Softphone System Requirements Introduction: Valley City State University is deploying Cisco s AnyConnect Virtual Private
More informationWhere to save your work
Where to save your work on the Kent network Contents Your network folders...2 Where to find your folders...2 Access your files from your laptop...3 Access your files from off campus...4 Help and support...5
More informationInformation Security Policy for Associates and Contractors
Information Security Policy for Associates and Contractors Version: 1.13 Date: 11 October 2016 Reference: 67972761 Location: Livelink Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...
More informationLOS ANGELES UNIFIED SCHOOL DISTRICT Office of the Chief Information Officer. DISTRIBUTION: All Schools and Offices ROUTING All Staff
ACTION, TO SHARE LOS ANGELES UNIFIED SCHOOL DISTRICT Office of the Chief Information Officer DISTRIBUTION: All Schools and Offices ROUTING All Staff SUBJECT: BULLETIN NO. K-23 ENTERPRISE LICENSE - NORTON
More informationRU-VPN2 - GlobalProtect Installation for Windows
RU-VPN2 - GlobalProtect Installation for Windows Use RU-VPN2 for a secure connection to Ryerson's Administrative system via the Internet. To use RU- VPN2, you will need to install and use client software
More informationPs3 Hard Drive Repair Instructions Macbook. Program >>>CLICK HERE<<<
Ps3 Hard Drive Repair Instructions Macbook Program Hybrid technology from Seagate combines SSD and traditional hard drive 2010 or later Intel Mac mini you will need a Mac Mini Logic Board Removal Tool
More informationCOURSE OUTLINE: Supporting and Troubleshooting Windows 10
Course Name 10982-Supporting and Troubleshooting Course Duration 5 Days Course Structure Instructor-Led Course Overview This course is designed to provide students with the knowledge and skills required
More informationComputer Systems Lab. David Parter Director of Academic Computing Services Computer Sciences Department. New Grad Student Orientation August 26, 2013
Computer Systems Lab David Parter Director of Academic Computing Services Computer Sciences Department New Grad Student Orientation August 26, 2013 1 Welcome! There is too much to tell you today, but I'll
More informationTECH SUPPORT NOTES. Help Desk: x4357 For priority support, please use the classroom phone. At the end of class:
SCIENCE BUILDING TECH SUPPORT Help Desk: x4357 For priority support, please use the classroom phone. NOTES At the end of class: Turn off the projector. Log off the teaching station. Turn off the room lights.
More informationInformation Technology Standards
Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this
More informationMaster Student IT Guidebook. Step by Step Guide to IT Success in Zayed University
Master Student IT Guidebook Step by Step Guide to IT Success in Zayed University Contents Computing Services in Zayed University... 4 Configure Network Connection... 6 Window 7... 6 Mac... 14 ZU Network
More informationMicrosoft Questions $ Answers
Microsoft 98-375 Questions $ Answers Number: 98-375 Passing Score: 700 Time Limit: 45 min File Version: 35.4 http://www.gratisexam.com/ Microsoft 98-375 Questions $ Answers Exam Name: HTML5 Application
More informationmycsunsoftware REFERENCE GUIDE
mycsunsoftware REFERENCE GUIDE INTRODUCTION mycsunsoftware provides remote and on-campus access to lab/course software. This approach is intended to simplify access for all users of Mac, PC, Linux and
More informationCOMPUTER REQUIREMENTS
COMPUTER REQUIREMENTS Interior Design Program 2018-2019 The Interior Design Program is proud to make use of the latest technology to more fully prepare students for the professional design world. In order
More informationVMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL. Software Installed: What is VMware Horizon Client? In This Manual
VMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL Revised May 2017 What is VMware Horizon Client? VMware Horizon Client for Windows operating systems allows you to connect to our department VMware Horizon View
More informationWhat is VMware View. IMPORTANT: Connecting from Off-Campus. Connecting to View Desktops. Downloading the Client
1. What is VMware View 2. Connecting from Off-Campus 3. Connecting to View Desktops 4. Extra View Tips 5. What to do if something is wrong What is VMware View VMware View is a technology that allows us
More informationChapter 12: Advanced Operating Systems
: Advanced Operating Systems IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents,
More informationMobile Computing and Storage Devices Security Workshop. Mobile Computing and Storage Device Security. Today s Plan. Why Bother?
Today s Plan Mobile Computing and Storage Device Security October 19, 2011 1. New policy and standard 2. Mobile phones 3. Portable storage devices 4. USB Trade-in events 5. Laptop encryption / PGP New
More informationIAM Security & Privacy Policies Scott Bradner
IAM Security & Privacy Policies Scott Bradner November 24, 2015 December 2, 2015 Tuesday Wednesday 9:30-10:30 a.m. 10:00-11:00 a.m. 6 Story St. CR Today s Agenda How IAM Security and Privacy Policies Complement
More informationStellar Phoenix Mac Data Recovery
Stellar Phoenix Mac Data Recovery Version 8.0 Installation guide Overview Stellar Phoenix Mac Data Recovery is a solution to all your data loss problems. Data loss can occur due to data corruption and
More informationEnviro Technology Services Ltd Data Protection Policy
Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:
More informationSYLLABUS. Departmental Syllabus CIST0145. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus
SYLLABUS DATE OF LAST REVIEW: 11/6/2018 CIP CODE: 52.0104 SEMESTER: COURSE TITLE: COURSE NUMBER: Computer Operating Systems: (Windows Vista) CIST0145 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE
More informationSelf-Hosted Hardware and Software Full Requirements
CGM webpractice v7.4 Self-Hosted Hardware and Software Full Requirements 2 Table of Contents Full System Requirements... 3 Server Specifications... 3 Client Computer Specifications... 5 Peripheral Specifications...
More informationHow To Encrypt a Windows 7, 8.1 or 10 laptop or tablet
How To Encrypt a Windows 7, 8.1 or 10 laptop or tablet Introduction College sensitive information stored on a mobile computing device is at risk for unauthorized access and disclosure if appropriate security
More informationNotebook Computer Hardware Recommendations Durham College of Applied Arts and Technology School of Media, Art & Design Updated October 29, 2017
Notebook Computer Hardware Recommendations Durham College of Applied Arts and Technology School of Media, Art & Design Updated October 29, 2017 Who should be reading this document? This document is intended
More informationMurray Bridge High School Connecting to the BYOD Network Mac OS X Version 3 Amended 2/10/2014
Murray Bridge High School Connecting to the BYOD Network Mac OS X 10.7 10.9 Version 3 Amended 2/10/2014 Use of the Murray Bridge High School BYOD (Bring Your Own Device) facilities and network is subject
More informationInformation Handling and Classification Table
Information Handling and Classification Table Title: Information Classification and Handling Table Reference: IS-07a Status: Approved Version: 1.2 Date: March 2018 Classification: Non-Sensitive/Open Author(s)
More informationWindows 7. Getting started with G/On USB. G/On 5.4 Document revision
Windows 7 Getting started with G/On USB G/On 5.4 Document revision 1 2010-03-23 Giritech A/S, 2010 Spotorno Allé 12, 2. 2630 Taastrup Denmark Phone +45 70 277 262 Legal Notice Giritech reserves the right
More informationEndpoint Security Full Disk Encryption for Mac 3.1 Release Notes
Endpoint Security Full Disk Encryption for Mac 3.1 Release Notes Revised: February 6, 2009 This Release Notes document provides essential operating requirements and describes known issues for Endpoint
More information50+ Incident Response Preparedness Checklist Items.
50+ Incident Response Preparedness Checklist Items Brought to you by: Written by: Buzz Hillestad, Senior Information Security Consultant at SBS, LLC 1 and Blake Coe, Vice President, Network Security at
More informationTable 12.2 Information Elements of a File Directory
Table 12.2 Information Elements of a File Directory Basic Information File Name File Type File Organization Name as chosen by creator (user or program). Must be unique within a specific directory. For
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationMicrosoft Questions $ Answers
Microsoft 98-375 Questions $ Answers Number: 98-375 Passing Score: 700 Time Limit: 45 min File Version: 35.4 http://www.gratisexam.com/ Microsoft 98-375 Questions $ Answers Exam Name: HTML5 Application
More informationPhysician Office Name Ambulatory EHR Security Risk Analysis
Process is in place to verify access granted is appropriate (ie: Role Based access indicates that the biller has access to billing screens and the nurse has access to the patient medical information).
More informationTexas A&M AgriLife Research Procedures
Texas A&M AgriLife Research Procedures 29.01.99.A0.02 Enterprise File Service Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 PROCEDURE STATEMENT This
More informationMODULE: INTERNET SECURITY ASSIGNMENT TITLE: INTERNET SECURITY DECEMBER 2012
MODULE: INTERNET SECURITY ASSIGNMENT TITLE: INTERNET SECURITY DECEMBER 2012 Important Notes: Please refer to the Assignment Presentation Requirements for advice on how to set out your assignment. These
More informationInstalling Your Multifunction to Your Network for the First Time
Next >> Installing Your Multifunction to Your Network for the First Time PIXMA MX340 Mac OS 1 > Navigation Tips for Macintosh Users To navigate this guide, please use the arrows on the
More informationIE 8 to 10, Firefox 16+, Safari 5+, Google Chrome 20+
LAMS TECHNICAL GUIDE Desktop or Laptop System requirements Operating System Supported Browsers Windows XP or better IE 8 to 10, Firefox 16+, Safari 5+, Google Chrome 20+ Mac OS X (10.1 or better) Chrome
More informationJuniper Vendor Security Requirements
Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks
More informationAuburn Montgomery AUM Wi-Fi. Windows 7. User s Guide & System Documentation
Auburn Montgomery AUM Wi-Fi Windows 7 User s Guide & System Documentation November 2018 WiFi Windows 7 For: Student Campus Fac Staff AUM WiFi // Windows 7 User s Guide Page 1 Table of Contents Overview
More informationBackup, File Backup copies of individual files made in order to replace the original file(s) in case it is damaged or lost.
Glossary A Active Directory a directory service that inventories, secures and manages the users, computers, rules and other components of a Microsoft Windows network. This service is typically deployed
More informationDepartment of Public Health O F S A N F R A N C I S C O
PAGE 1 of 9 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:
More informationLAPTOP TRANSFER OF OWNERSHIP HP Folio 9470m
LAPTOP TRANSFER OF OWNERSHIP HP Folio 9470m Page 1 of 6 ITS Policies and Information Laptop Transfer of Ownership Terms Student/graduate assumes ownership of laptop issued by the University. Student/graduate
More informationUser Instruction UBC Department of Botany insync Backup Service. Prepared by: Botany IT
User Instruction UBC Department of Botany insync Backup Service Prepared by: Botany IT Nov 11, 2018 0 Table of Contents SECTION I: PREREQUISITES... 2 1. Hardware and software prerequisites... 2 2. Obtain
More informationCOURSE 10982: SUPPORTING AND TROUBLESHOOTING WINDOWS 10
ABOUT THIS COURSE This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These
More informationDesktop & Laptop Edition
Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion
More information