Data Stored on an External Hard Drive. All requests for data must include the following information.

Size: px
Start display at page:

Download "Data Stored on an External Hard Drive. All requests for data must include the following information."

Transcription

1 Attachment A Form to Describe Sensitive Data Security Plan for the Use of Sensitive Data from the National Longitudinal Study of Adolescent to Adult Health Data Stored on an External Hard Drive All requests for data must include the following information. I. General Information 1. List below the name(s) and responsibilities of the investigator(s) and the research staff (students, research assistants, and programmers) who will have access to the data. *** Changes in personnel require that this information be updated. 2. PI Institution: 3. PI contact information: Name: Phone number: 4. System Administrator contact information: Name: Phone number: 5. Each project participant and system administrator must sign a separate security pledge to be included with the contract. As new personnel are added during the period of this contract, an amended Attachment C and new security pledges must be obtained and sent to Add Health. Number of security pledges included: 6. Only one complete copy of the Add Health data is permitted; however, time-delimited temporary data analysis files may be created. Temporary data analysis file(s) must be deleted every six months and recreated, as necessary, to complete analysis. Temporary data analysis files should be deleted upon completion of a project. All temporary data analysis files will be deleted in these two months each year: and month month 1

2 (Page 2 of 6) 4. Add Health data, including temporary data analysis files or subsets of the data, may not be copied to other media such as CDs, flash drives, or the hard drive of the computer. All Add Health data must remain in the same secure location as the one copy of the original Add Health data. II. Detailed description of computer system where data will be stored and analyzed 1. Please tell us about the computer you are using to access the Add Health data that is stored on the External Hard Drive: brand/make model laptop see #2 or desktop (e.g., Dell, Mac, etc.) (e.g., Optiplex, Dimension, imac Pro, MacBook Air, etc.) 2. Laptop computers are required to be secured to a desk by a lock and cable while accessing the Add Health data. I am using a laptop computer and agree to this condition. 3. Please tell us about the operating system (OS) you are using: ( build might be Home, Pro, Education, Enterprise, El Capitan, Sierra, High Sierra, etc.) name of OS version of OS build of OS 4. Please describe the external hard drive that will be used: Note: The external hard drive must have an external power source (i.e., it must be plugged into a power socket/outlet), be considered a desktop model (i.e., not portable), and be at least deep, 5 high, and 6.5 wide. make & model vendor s specifications for power type and dimensions or note that you are sending pictures of the EHD. 5. What is the physical location where you will be working when accessing the Add Health data? Street Address Type of Building (e.g., private home, apartment complex, business office, campus office, etc.) Office or Room Description (e.g., private locked room, home office, keyed entry, card swipe entry, roommate, officemate, etc.) 6. Add Health data must be excluded from the backup routine.

3 (Page 3 of 6) 7. Add Health encourages researchers to back up their program code and documentation to a secondary source that may be removed from the office (e.g., a flash drive). I understand that I may and should back up my program code and documentation. 8. Who has physical access to the equipment? 9. Who has permission to use the equipment? 10. Is the equipment used by other projects? 11. Where will hard copy information be printed? 12. How will the printed hard copy information be handled/stored/discarded? The following protocols are required. Please initial each to acknowledge your agreement. All printed copies of data output will be contained in a labeled folder. When not in use, paper copies will be stored in a locked filing cabinet. When printouts are no longer being used by researchers, they will be shredded. 13. What is the secure storage location of the original data CD? Street Address Building Room # Storage Unit (e.g., locked drawer, or locked cabinet, or safe)

4 (Page 4 of 6) 14. What is the secure storage location of the external hard drive? Street Address Building Room # Storage Unit (e.g., locked drawer, or locked cabinet, or safe) III. Security system to prevent unauthorized access to the data The following are minimum steps that should be taken to secure both the external hard drive on which the Add Health data is stored and the computer(s) used to access the Add Health data from that external hard drive. Please indicate below each security step whether you have implemented the protocol. Please write a short explanation if you cannot implement a specific step. A. Physical Security of an External Hard Drive 1. The external hard drive will be connected only to a computer that is located in a private office. 2. I enabled encryption on the external hard drive containing secure data. Preferred: Whole Disk Encryption using this software: (e.g., Bitlocker, Veracrypt) Acceptable: Folder Encryption using this software: (e.g., EFS, Veracrypt) 3. I created separate directories on the external hard drive for the Add Health data and the program code and documentation to facilitate ease of backing up the program code and documentation.

5 (Page 5 of 6) 4. Secure erasure must be run on free space periodically (e.g. monthly) and after the secure data has been removed from the external hard drive at the end of the contract period. I will run secure erasure on the external hard drive monthly and at end of contract. 5. I installed secure erasure software on the computer to which the external hard drive is connected. Name of monthly secure erasure software: Name of end-of-contract secure erasure software: 6. I will never connect the external hard drive to the computer while the network cable is plugged into the computer or while WiFi is enabled. 7. I will place the external hard drive on which the Add Health data resides in a locked cabinet, drawer, or safe when not in use. 8. I will not move the external hard drive from the use and storage location(s) specified above in questions II.5 and II.14 (e.g., will not move it between office and home). B. Controlling Access to the Data 1. Access to the Add Health data must be restricted to project personnel using the security features available via the operating system (e.g., login via userid/password and NTFS permissions in Windows, ACLs in Linux and Macintosh Systems).

6 (Page 6 of 6) 2. Add Health requires passwords of at least 16 characters. 3. Add Health requires that the screen saver activates after 3 minutes of inactivity and requires a password to log back in. 4. I will not leave my computer and external hard drive unattended while the external hard drive is attached. 5. I installed and enabled whole disk encryption software on the local hard drive of the computer to which the external hard drive is connected. Name of encryption software: (e.g., Bitlocker, Veracrypt) 6. I configured my statistical applications to point the temporary working files to the encrypted Add Health data directory on the external hard drive. Location [i.e., drive and pathname] of secured directory: 7. I will not copy or move the Add Health data out of the secured directory on the external hard drive for any reason. System Administrator I acknowledge that I consulted with the Investigator (PI). System Administrator initials I acknowledge that I completed these Security Protocols. System Administrator initials

General Social Survey (GSS) NORC

General Social Survey (GSS) NORC General Social Survey (GSS) NORC OBTAINING GSS SENSITIVE DATA FILES The GSS geographic identification code files are made available to researchers under special contract with NORC. The GSS takes its promise

More information

DRAFT 2012 UC Davis Cyber-Safety Survey

DRAFT 2012 UC Davis Cyber-Safety Survey DRAFT 2012 UC Davis Cyber-Safety Survey UNIT INFORMATION Enter the following information. Person completing report Email Phone Unit (include sub-unit information, if appropriate) College/School/Office

More information

SDBOR Technology Control Plan (TCP) Project Title:

SDBOR Technology Control Plan (TCP) Project Title: SDBOR Technology Control Plan (TCP) Project Title: Principal Investigator: Phone: Department: Email: Description of Controls (EAR/ITAR Category): Location(s) Covered by TCP: Is sponsored research involved?

More information

Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application

Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application The Investigator 2 must complete this application to request access to Sensitive NAES Data Set from

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

Encrypting Removable Media

Encrypting Removable Media For security reasons all removable media must be encrypted with BitLocker to Go on Windows 7 workstations. The following will show you how to use a flash drive with BitLocker to Go. Please note that data

More information

Computing at MIT: Basics

Computing at MIT: Basics Computing at MIT: Basics Phyllis Galt and Stuart Peloquin Information Services and Technology August 2007 Key take-aways: Utilizing the MIT residential network Responsible network behavior Safe Computing

More information

Mac OS X version 10.6 and Below for Students

Mac OS X version 10.6 and Below for Students Mac OS X version 10.6 and Below for Students The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 9L0-064 Title : OS X v10.8 Troubleshooting Exam Vendors : Apple Version : DEMO 1 /

More information

FIRST LOG IN / LOG OUT WARNING!

FIRST LOG IN / LOG OUT WARNING! Information Technology Department - San Diego Unified School District Welcome to Active Directory Workstation User Experience Congratulations! Your site has been migrated to the new Active Directory (AD)

More information

Technology Control Plan

Technology Control Plan Technology Control Plan TCP Reference Number: RESPONSIBLE OFFICE CONTACT: Notre Dame Research Administration 940 Grace Hall, Notre Dame, IN 46556 Phone: (574) 631-7432 Fax: (574) 631-6630 E-mail: rca@nd.edu

More information

Microsoft Windows Operating System Fundamentals

Microsoft Windows Operating System Fundamentals Microsoft - 98-349 Windows Operating System Fundamentals 1 QUESTION: 1 PowerShell is used to: A. monitor user keystrokes. B. repair damaged hard disk drive sectors. C. automate a routine task. D. extend

More information

University of Arkansas Housing Contracting Process. Step 1

University of Arkansas Housing Contracting Process. Step 1 Step 1 To begin of the Housing Contract Process, open the University Housing Website and click on Housing Contract. Step 2 On the University Housing and Campus Dining Online Contracts page, click on Living

More information

BOKU staff members, BOKU students. ZID Hotline

BOKU staff members, BOKU students. ZID Hotline Filr The Open Enterprise Server (formerly Novell File Server) has been available to safely secure your data as BOKU member for decades. Filr facilitates access to these data, for example, when you are

More information

LAS IT has enhanced the computer replacement process to create a smoother workflow, and fewer options to navigate.

LAS IT has enhanced the computer replacement process to create a smoother workflow, and fewer options to navigate. LAS COMPUTER REPLACEMENT STANDARD CONFIGURATION WHAT DOES MEAN? The computers listed as LAS Funded fall within LAS cost and performance specifications, and will be fully funded by the college for Faculty

More information

Flash Video Encoder CS3 Fetch Microsoft Office 2004 (Excel, imovie. Powerpoint, Word, Entourage) itunes

Flash Video Encoder CS3 Fetch Microsoft Office 2004 (Excel, imovie. Powerpoint, Word, Entourage) itunes Welcome This is a small packet of information concerning some of the simpler uses of technology in the department, how to transfer files, change your password, that sort of thing. In this department, we

More information

IHAnywhere Installation and Usage Guide for Mac INFORMATION MANAGEMENT & INFORMATION TECHNOLOGY

IHAnywhere Installation and Usage Guide for Mac INFORMATION MANAGEMENT & INFORMATION TECHNOLOGY IHAnywhere Installation and Usage Guide for Mac INFORMATION MANAGEMENT & INFORMATION TECHNOLOGY 2 Remote access to IH applications is provided through IH Anywhere. To use IH Anywhere you will need to install

More information

Johns Hopkins

Johns Hopkins Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows XP, Mac OS X, and Linux can be found at: http://www.it.johnshopkins.edu/services/networking/wireless/

More information

Contents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52

Contents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52 Contents Getting Started.....................................................1 Installing the Software...........................................1 Using the Maxtor System Tray Icon................................6

More information

Johns Hopkins

Johns Hopkins Wireless Configuration Guide: Windows 8 Additional hopkins wireless network instructions and requirements for Windows XP, Vista, 7, Mac OS X, Linux, and other Mobile versions can be found at: http://www.it.johnshopkins.edu/services/network/wireless/

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

*Failure to do this is an Honor Code violation.

*Failure to do this is an Honor Code violation. Notice: If you are using a newer MacBook Pro model equipped with Apple s Touch Bar feature, you MUST disable the Touch Bar before beginning your exam. Instructions for doing so can be viewed here: Instructions

More information

Johns Hopkins

Johns Hopkins Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows 8, 7, XP, Mac OS X, Linux, and Mobile versions can be found at: http://www.it.johnshopkins.edu/services/network/wireless/

More information

Mobile Learning Quick Reference Guide September 2007

Mobile Learning Quick Reference Guide September 2007 Mobile Learning Quick Reference Guide September 2007 Durham College Guide Book Mobile Computing & IT Support Centre How-To Common Tasks...a resource to help you feel comfortable working with your Apple

More information

WASHTENAW COUNTY TRIAL COURT

WASHTENAW COUNTY TRIAL COURT WASHTENAW COUNTY TRIAL COURT MANUAL FOR EVIDENCE PRESENTATION ON LARGE DISPLAYS IN THE COURTROOM PERMISSION REQUIRED TO USE TECHNOLOGY: You must get direct permission from the Judge/Judge s staff to display

More information

Johns Hopkins

Johns Hopkins Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows XP, Mac OS X, and Linux can be found at: http://www.it.jhu.edu/networking/wireless/

More information

BSO CLEAR DESK AND SCREEN POLICY (version 1.0)

BSO CLEAR DESK AND SCREEN POLICY (version 1.0) BSO CLEAR DESK AND SCREEN POLICY (version 1.0) Approved at BSO Board on 25 th February 2010 CONTENT 1. PURPOSE...3 2. DATA CLASSIFICATION...3 3. THE DESK / OFFICE ENVIRONMENT...3 4. THE PC ENVIRONMENT...4

More information

MGH Research Computer Upgrade. Presenters: Harry Orf, PhD. Neil Coplan,

MGH Research Computer Upgrade. Presenters: Harry Orf, PhD. Neil Coplan, MGH Research Computer Upgrade Presenters: Harry Orf, PhD. Neil Coplan, MGH Desktop Upgrade Agenda Welcome (We need your Help) Who is on the team? Why does this need to be done? What is the project scope?

More information

UHCOP Laptop Minimum Specifications Class of 2022

UHCOP Laptop Minimum Specifications Class of 2022 UHCOP Laptop Minimum Specifications Class of 2022 The College of Pharmacy strives to prepare students for pharmacist delivered patient care by fostering, among other attributes, life long learning and

More information

Kanguru Defender Secure USB Flash Drive

Kanguru Defender Secure USB Flash Drive Kanguru Defender Secure USB Flash Drive Quick Start Guide for KRMC Enterprise Managed Devices For Defender Models: Defender 2000 Defender 3000 Defender Elite30 Defender Elite200 Defender Elite300 Copyright

More information

Vendor: Apple. Exam Code: 9L Exam Name: OS X v10.8 Troubleshooting Exam. Version: Demo

Vendor: Apple. Exam Code: 9L Exam Name: OS X v10.8 Troubleshooting Exam. Version: Demo Vendor: Apple Exam Code: 9L0-064 Exam Name: OS X v10.8 Troubleshooting Exam Version: Demo QUESTION NO: 1 A technician suspects that an application unexpectedly quitting at launch has an unusable preference

More information

Hardware and Software Full Requirements

Hardware and Software Full Requirements CGM webpractice v7.4 Hardware and Software Full Requirements 2 CGM webpractice_v7 4_SystemReq Revised: 2.21.2019 Table of Contents Full System Requirements... 3 Client Computer Specifications... 3 Peripheral

More information

C A S P E R TECH EDITION 10 USER GUIDE

C A S P E R TECH EDITION 10 USER GUIDE TM C A S P E R TM TECH EDITION 10 USER GUIDE Copyright and Trademark Information Information in this document is subject to change without notice. Federal law prohibits unauthorized use, duplication, and

More information

FIRST LOG IN / LOG OUT WARNING!

FIRST LOG IN / LOG OUT WARNING! Information Technology Department - San Diego Unified School District Welcome to Active Directory! Laptop User Experience Guide Congratulations! Your site has been migrated to the new Active Directory

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Read Naturally SE Update Windows Network Installation Instructions

Read Naturally SE Update Windows Network Installation Instructions Windows Network This document explains how to apply the Read Naturally Software Edition 2.0.3 update to existing installations of SE version 2.0, 2.0.1, or 2.0.2. First update the SE server software, and

More information

Technology Control Plan

Technology Control Plan Technology Control Plan I. Statement of policy and assignment of responsibility The University of Illinois at Urbana-Champaign (UIUC) is committed to complying with the export laws and regulations of the

More information

San Jac ITS Desktop Support Guidelines

San Jac ITS Desktop Support Guidelines San Jac ITS Desktop Support Guidelines Our goal at (ITS) is to provide the highest level of technical support and customer service to all San Jacinto College students and employees. We are constantly striving

More information

TCP AUDIT QUESTIONNAIRE

TCP AUDIT QUESTIONNAIRE Audit Date: UECP Auditor(s): Audit Location: Lead Principal Investigator (PI): PI Department: Project Title: Sponsor: Est. Project End Date: FRS Acct #: EAR/ITAR Classification(s): Original TCP Signed:

More information

LIVE NAVIGATOR. Compatibility Guide for Live Navigator Version February 2018

LIVE NAVIGATOR. Compatibility Guide for Live Navigator Version February 2018 LIVE NAVIGATOR Compatibility Guide for Live Navigator Version 4.0.1 February 2018 Content New in ALN 4.0.1 CG... 3 New in ALN 4.0 CG... 3 Live Navigator Server... 4 Server vs. Agent Compatibility... 4

More information

JCCC Virtual Labs. Click the link for more information on installing on that device type. Windows PC/laptop Apple imac or MacBook ipad Android Linux

JCCC Virtual Labs. Click the link for more information on installing on that device type. Windows PC/laptop Apple imac or MacBook ipad Android Linux JCCC Virtual Labs Revision 9/21/2017 http://ats.web. Welcome to the JCCC Virtual Lab Environment. This system allows students to access campus software titles on their personal computers from almost anywhere.

More information

Q&As. Windows Operating System Fundamentals. Pass Microsoft Exam with 100% Guarantee

Q&As. Windows Operating System Fundamentals. Pass Microsoft Exam with 100% Guarantee 98-349 Q&As Windows Operating System Fundamentals Pass Microsoft 98-349 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Risk Analysis with EHR Questions Example Answers/Help: Status What new electronic health information has been introduced into my practice

More information

Microsoft Windows Operating System Fundamentals. Version: 10.0

Microsoft Windows Operating System Fundamentals. Version: 10.0 Microsoft 98-349 Windows Operating System Fundamentals Version: 10.0 December 5, 2017 QUESTION NO: 1 Microsoft 98-349 Exam discussing the use of PowerShell. Which of the following suitably describes the

More information

Welcome to Shenandoah University s imlearning Program!

Welcome to Shenandoah University s imlearning Program! Welcome to Shenandoah University s imlearning Program This award-winning integrated mobile learning program provides students and faculty with the tools to enhance student learning and engagement. Use

More information

Symantec Encryption (PGP) Installation Guide

Symantec Encryption (PGP) Installation Guide System Requirements Symantec Encryption (PGP) Installation Guide Windows 8 (32 and 64 bit versions) Windows 7 (32 and 64 bit versions)] Windows Vista (32- and 64-bit editions) Additional Requirements Boot

More information

umapps Using umapps 6/14/2017 Brought to you by: umtech & The Center for Teaching & Learning

umapps Using umapps 6/14/2017 Brought to you by: umtech & The Center for Teaching & Learning umapps Using umapps Center for Teaching and Learning (CTL) 100 Administration Bldg., Memphis, TN 38152 Phone: 901.678.8888 Email: itstrainers@memphis.edu Center for Teaching and Learning Website 6/14/2017

More information

Elementary Computing CSC M. Cheng, Computer Science 1

Elementary Computing CSC M. Cheng, Computer Science 1 Elementary Computing CSC 100 2014-07-14 M. Cheng, Computer Science 1 File & Operating Systems Every computer has an Operating System (OS). An OS is a piece of software that manages the resources on every

More information

MU2b Authentication, Authorization and Accounting Questions Set 2

MU2b Authentication, Authorization and Accounting Questions Set 2 MU2b Authentication, Authorization and Accounting Questions Set 2 1. You enable the audit of successful and failed policy changes. Where can you view entries related to policy change attempts? Lesson 2

More information

Elementary Computing CSC 100. M. Cheng, Computer Science

Elementary Computing CSC 100. M. Cheng, Computer Science Elementary Computing CSC 100 1 File & Operating Systems Every computer has an Operating System (OS). An OS is a piece of software that manages the resources on every computer. User Interfaces and File

More information

PII Policies and Procedures

PII Policies and Procedures PII Policies and Procedures HEALTHCARE BENEFIT SERVICES INC. Kirk Peters HEALTHCARE BENEFIT SERVICES INC. 2061 BOCA RATON BLVD. SUITE 202 BOCA RATON, FL Table of Contents What is PII... 2 PII Overview...

More information

Pass Microsoft Exam

Pass Microsoft Exam Pass Microsoft 98-367 Exam Number: 98-367 Passing Score: 700 Time Limit: 45 min File Version: 51.0 http://www.gratisexam.com/ Pass Microsoft 98-367 Exam Exam Name: Security Fundamentals Certdumps QUESTION

More information

PHS BYOD Frequently Asked. Question

PHS BYOD Frequently Asked. Question PHS BYOD Frequently Asked Questions We are fully implementing BYOD again at Pickens High School this year. This program will allow students to use their mobile devices at school as an educational tool.

More information

Cisco s AnyConnect VPN Client (version 2.4)

Cisco s AnyConnect VPN Client (version 2.4) Table of Contents [TOC]: Introduction Getting Started Installation Overview Using the Softphone System Requirements Introduction: Valley City State University is deploying Cisco s AnyConnect Virtual Private

More information

Where to save your work

Where to save your work Where to save your work on the Kent network Contents Your network folders...2 Where to find your folders...2 Access your files from your laptop...3 Access your files from off campus...4 Help and support...5

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Information Security Policy for Associates and Contractors Version: 1.13 Date: 11 October 2016 Reference: 67972761 Location: Livelink Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

LOS ANGELES UNIFIED SCHOOL DISTRICT Office of the Chief Information Officer. DISTRIBUTION: All Schools and Offices ROUTING All Staff

LOS ANGELES UNIFIED SCHOOL DISTRICT Office of the Chief Information Officer. DISTRIBUTION: All Schools and Offices ROUTING All Staff ACTION, TO SHARE LOS ANGELES UNIFIED SCHOOL DISTRICT Office of the Chief Information Officer DISTRIBUTION: All Schools and Offices ROUTING All Staff SUBJECT: BULLETIN NO. K-23 ENTERPRISE LICENSE - NORTON

More information

RU-VPN2 - GlobalProtect Installation for Windows

RU-VPN2 - GlobalProtect Installation for Windows RU-VPN2 - GlobalProtect Installation for Windows Use RU-VPN2 for a secure connection to Ryerson's Administrative system via the Internet. To use RU- VPN2, you will need to install and use client software

More information

Ps3 Hard Drive Repair Instructions Macbook. Program >>>CLICK HERE<<<

Ps3 Hard Drive Repair Instructions Macbook. Program >>>CLICK HERE<<< Ps3 Hard Drive Repair Instructions Macbook Program Hybrid technology from Seagate combines SSD and traditional hard drive 2010 or later Intel Mac mini you will need a Mac Mini Logic Board Removal Tool

More information

COURSE OUTLINE: Supporting and Troubleshooting Windows 10

COURSE OUTLINE: Supporting and Troubleshooting Windows 10 Course Name 10982-Supporting and Troubleshooting Course Duration 5 Days Course Structure Instructor-Led Course Overview This course is designed to provide students with the knowledge and skills required

More information

Computer Systems Lab. David Parter Director of Academic Computing Services Computer Sciences Department. New Grad Student Orientation August 26, 2013

Computer Systems Lab. David Parter Director of Academic Computing Services Computer Sciences Department. New Grad Student Orientation August 26, 2013 Computer Systems Lab David Parter Director of Academic Computing Services Computer Sciences Department New Grad Student Orientation August 26, 2013 1 Welcome! There is too much to tell you today, but I'll

More information

TECH SUPPORT NOTES. Help Desk: x4357 For priority support, please use the classroom phone. At the end of class:

TECH SUPPORT NOTES. Help Desk: x4357 For priority support, please use the classroom phone. At the end of class: SCIENCE BUILDING TECH SUPPORT Help Desk: x4357 For priority support, please use the classroom phone. NOTES At the end of class: Turn off the projector. Log off the teaching station. Turn off the room lights.

More information

Information Technology Standards

Information Technology Standards Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this

More information

Master Student IT Guidebook. Step by Step Guide to IT Success in Zayed University

Master Student IT Guidebook. Step by Step Guide to IT Success in Zayed University Master Student IT Guidebook Step by Step Guide to IT Success in Zayed University Contents Computing Services in Zayed University... 4 Configure Network Connection... 6 Window 7... 6 Mac... 14 ZU Network

More information

Microsoft Questions $ Answers

Microsoft Questions $ Answers Microsoft 98-375 Questions $ Answers Number: 98-375 Passing Score: 700 Time Limit: 45 min File Version: 35.4 http://www.gratisexam.com/ Microsoft 98-375 Questions $ Answers Exam Name: HTML5 Application

More information

mycsunsoftware REFERENCE GUIDE

mycsunsoftware REFERENCE GUIDE mycsunsoftware REFERENCE GUIDE INTRODUCTION mycsunsoftware provides remote and on-campus access to lab/course software. This approach is intended to simplify access for all users of Mac, PC, Linux and

More information

COMPUTER REQUIREMENTS

COMPUTER REQUIREMENTS COMPUTER REQUIREMENTS Interior Design Program 2018-2019 The Interior Design Program is proud to make use of the latest technology to more fully prepare students for the professional design world. In order

More information

VMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL. Software Installed: What is VMware Horizon Client? In This Manual

VMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL. Software Installed: What is VMware Horizon Client? In This Manual VMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL Revised May 2017 What is VMware Horizon Client? VMware Horizon Client for Windows operating systems allows you to connect to our department VMware Horizon View

More information

What is VMware View. IMPORTANT: Connecting from Off-Campus. Connecting to View Desktops. Downloading the Client

What is VMware View. IMPORTANT: Connecting from Off-Campus. Connecting to View Desktops. Downloading the Client 1. What is VMware View 2. Connecting from Off-Campus 3. Connecting to View Desktops 4. Extra View Tips 5. What to do if something is wrong What is VMware View VMware View is a technology that allows us

More information

Chapter 12: Advanced Operating Systems

Chapter 12: Advanced Operating Systems : Advanced Operating Systems IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents,

More information

Mobile Computing and Storage Devices Security Workshop. Mobile Computing and Storage Device Security. Today s Plan. Why Bother?

Mobile Computing and Storage Devices Security Workshop. Mobile Computing and Storage Device Security. Today s Plan. Why Bother? Today s Plan Mobile Computing and Storage Device Security October 19, 2011 1. New policy and standard 2. Mobile phones 3. Portable storage devices 4. USB Trade-in events 5. Laptop encryption / PGP New

More information

IAM Security & Privacy Policies Scott Bradner

IAM Security & Privacy Policies Scott Bradner IAM Security & Privacy Policies Scott Bradner November 24, 2015 December 2, 2015 Tuesday Wednesday 9:30-10:30 a.m. 10:00-11:00 a.m. 6 Story St. CR Today s Agenda How IAM Security and Privacy Policies Complement

More information

Stellar Phoenix Mac Data Recovery

Stellar Phoenix Mac Data Recovery Stellar Phoenix Mac Data Recovery Version 8.0 Installation guide Overview Stellar Phoenix Mac Data Recovery is a solution to all your data loss problems. Data loss can occur due to data corruption and

More information

Enviro Technology Services Ltd Data Protection Policy

Enviro Technology Services Ltd Data Protection Policy Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:

More information

SYLLABUS. Departmental Syllabus CIST0145. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus CIST0145. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 11/6/2018 CIP CODE: 52.0104 SEMESTER: COURSE TITLE: COURSE NUMBER: Computer Operating Systems: (Windows Vista) CIST0145 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE

More information

Self-Hosted Hardware and Software Full Requirements

Self-Hosted Hardware and Software Full Requirements CGM webpractice v7.4 Self-Hosted Hardware and Software Full Requirements 2 Table of Contents Full System Requirements... 3 Server Specifications... 3 Client Computer Specifications... 5 Peripheral Specifications...

More information

How To Encrypt a Windows 7, 8.1 or 10 laptop or tablet

How To Encrypt a Windows 7, 8.1 or 10 laptop or tablet How To Encrypt a Windows 7, 8.1 or 10 laptop or tablet Introduction College sensitive information stored on a mobile computing device is at risk for unauthorized access and disclosure if appropriate security

More information

Notebook Computer Hardware Recommendations Durham College of Applied Arts and Technology School of Media, Art & Design Updated October 29, 2017

Notebook Computer Hardware Recommendations Durham College of Applied Arts and Technology School of Media, Art & Design Updated October 29, 2017 Notebook Computer Hardware Recommendations Durham College of Applied Arts and Technology School of Media, Art & Design Updated October 29, 2017 Who should be reading this document? This document is intended

More information

Murray Bridge High School Connecting to the BYOD Network Mac OS X Version 3 Amended 2/10/2014

Murray Bridge High School Connecting to the BYOD Network Mac OS X Version 3 Amended 2/10/2014 Murray Bridge High School Connecting to the BYOD Network Mac OS X 10.7 10.9 Version 3 Amended 2/10/2014 Use of the Murray Bridge High School BYOD (Bring Your Own Device) facilities and network is subject

More information

Information Handling and Classification Table

Information Handling and Classification Table Information Handling and Classification Table Title: Information Classification and Handling Table Reference: IS-07a Status: Approved Version: 1.2 Date: March 2018 Classification: Non-Sensitive/Open Author(s)

More information

Windows 7. Getting started with G/On USB. G/On 5.4 Document revision

Windows 7. Getting started with G/On USB. G/On 5.4 Document revision Windows 7 Getting started with G/On USB G/On 5.4 Document revision 1 2010-03-23 Giritech A/S, 2010 Spotorno Allé 12, 2. 2630 Taastrup Denmark Phone +45 70 277 262 Legal Notice Giritech reserves the right

More information

Endpoint Security Full Disk Encryption for Mac 3.1 Release Notes

Endpoint Security Full Disk Encryption for Mac 3.1 Release Notes Endpoint Security Full Disk Encryption for Mac 3.1 Release Notes Revised: February 6, 2009 This Release Notes document provides essential operating requirements and describes known issues for Endpoint

More information

50+ Incident Response Preparedness Checklist Items.

50+ Incident Response Preparedness Checklist Items. 50+ Incident Response Preparedness Checklist Items Brought to you by: Written by: Buzz Hillestad, Senior Information Security Consultant at SBS, LLC 1 and Blake Coe, Vice President, Network Security at

More information

Table 12.2 Information Elements of a File Directory

Table 12.2 Information Elements of a File Directory Table 12.2 Information Elements of a File Directory Basic Information File Name File Type File Organization Name as chosen by creator (user or program). Must be unique within a specific directory. For

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

Microsoft Questions $ Answers

Microsoft Questions $ Answers Microsoft 98-375 Questions $ Answers Number: 98-375 Passing Score: 700 Time Limit: 45 min File Version: 35.4 http://www.gratisexam.com/ Microsoft 98-375 Questions $ Answers Exam Name: HTML5 Application

More information

Physician Office Name Ambulatory EHR Security Risk Analysis

Physician Office Name Ambulatory EHR Security Risk Analysis Process is in place to verify access granted is appropriate (ie: Role Based access indicates that the biller has access to billing screens and the nurse has access to the patient medical information).

More information

Texas A&M AgriLife Research Procedures

Texas A&M AgriLife Research Procedures Texas A&M AgriLife Research Procedures 29.01.99.A0.02 Enterprise File Service Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 PROCEDURE STATEMENT This

More information

MODULE: INTERNET SECURITY ASSIGNMENT TITLE: INTERNET SECURITY DECEMBER 2012

MODULE: INTERNET SECURITY ASSIGNMENT TITLE: INTERNET SECURITY DECEMBER 2012 MODULE: INTERNET SECURITY ASSIGNMENT TITLE: INTERNET SECURITY DECEMBER 2012 Important Notes: Please refer to the Assignment Presentation Requirements for advice on how to set out your assignment. These

More information

Installing Your Multifunction to Your Network for the First Time

Installing Your Multifunction to Your Network for the First Time Next >> Installing Your Multifunction to Your Network for the First Time PIXMA MX340 Mac OS 1 > Navigation Tips for Macintosh Users To navigate this guide, please use the arrows on the

More information

IE 8 to 10, Firefox 16+, Safari 5+, Google Chrome 20+

IE 8 to 10, Firefox 16+, Safari 5+, Google Chrome 20+ LAMS TECHNICAL GUIDE Desktop or Laptop System requirements Operating System Supported Browsers Windows XP or better IE 8 to 10, Firefox 16+, Safari 5+, Google Chrome 20+ Mac OS X (10.1 or better) Chrome

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

Auburn Montgomery AUM Wi-Fi. Windows 7. User s Guide & System Documentation

Auburn Montgomery AUM Wi-Fi. Windows 7. User s Guide & System Documentation Auburn Montgomery AUM Wi-Fi Windows 7 User s Guide & System Documentation November 2018 WiFi Windows 7 For: Student Campus Fac Staff AUM WiFi // Windows 7 User s Guide Page 1 Table of Contents Overview

More information

Backup, File Backup copies of individual files made in order to replace the original file(s) in case it is damaged or lost.

Backup, File Backup copies of individual files made in order to replace the original file(s) in case it is damaged or lost. Glossary A Active Directory a directory service that inventories, secures and manages the users, computers, rules and other components of a Microsoft Windows network. This service is typically deployed

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 9 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

LAPTOP TRANSFER OF OWNERSHIP HP Folio 9470m

LAPTOP TRANSFER OF OWNERSHIP HP Folio 9470m LAPTOP TRANSFER OF OWNERSHIP HP Folio 9470m Page 1 of 6 ITS Policies and Information Laptop Transfer of Ownership Terms Student/graduate assumes ownership of laptop issued by the University. Student/graduate

More information

User Instruction UBC Department of Botany insync Backup Service. Prepared by: Botany IT

User Instruction UBC Department of Botany insync Backup Service. Prepared by: Botany IT User Instruction UBC Department of Botany insync Backup Service Prepared by: Botany IT Nov 11, 2018 0 Table of Contents SECTION I: PREREQUISITES... 2 1. Hardware and software prerequisites... 2 2. Obtain

More information

COURSE 10982: SUPPORTING AND TROUBLESHOOTING WINDOWS 10

COURSE 10982: SUPPORTING AND TROUBLESHOOTING WINDOWS 10 ABOUT THIS COURSE This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These

More information

Desktop & Laptop Edition

Desktop & Laptop Edition Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion

More information