Security policy 8/24/2012

Size: px
Start display at page:

Download "Security policy 8/24/2012"

Transcription

1 SLED Overview of the FBI Criminal Justice Information Services (CJIS) Security Policy Version 5.1 8/09/2012 CJISD-ITS-DOC ForOfficialUse Only 1 This session will be an overview of the FBI Criminal Justice Information Services (CJIS) Security 5.1 policy and how it pertains and applies to municipal court clerks, magistrates, judges and other court staff who are receiving NCIC criminal justice information. ForOfficialUse Only 2 Security policy The essential premise of the CJIS Security Policy is to provide appropriate controls to protect the full lifecycle of CJI, whether at rest or in transit. The CJIS Security Policy provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI data. This policy applies to every individual contractor, private entity, noncriminal justice agency representative, or member of a criminal justice entity with access to, or who operate in support of, criminal justice services and information. ForOfficialUse Only 3 1

2 What is (NCIC) National Crime Information Center NCIC 2000 is a nationwide, computerized information system established as a service to all local, state, federal, and international criminal justice agencies. The goal of NCIC 2000 is to help the criminal justice community perform its duties by providing and maintaining a computerized filing system of accurate and timely documented criminal justice information. ForOfficialUse Only 4 The NCIC 2000 data bank can best be described as a computerized index of documented criminal justice information concerning crimes and criminals of nationwide interest. NCIC files also include missing and unidentified person files, persons files who pose a threat to officer and public safety, as well as stolen property files. All state and local agencies participating in the NCIC 2000 System are required to adhere to the security guidelines that can be found in the FBI/CJIS Security Policy 5.1 ForOfficialUse Only 5 The NCIC 2000 System stores vast amounts of criminal justice information which can be instantly retrieved by and/or furnished to any authorized agency and is a virtually uninterrupted operation 24 hours a day, 7 days a week ForOfficialUse Only 6 2

3 Types of queries ForOfficialUse Only 7 Types of queries ForOfficialUse Only 8 NCIC stats In January 1967 when NCIC became operational, it included five files, which contained 356,784 records. In its first year of operation, NCIC processed approximately 2.4 million transactions, or an average of 5,479 transactions daily. Last year NCIC processed 2.4 billion transactions. Recently, NCIC experienced a new oneday record of 8.6 million transactions. Presently, NCIC contains 19 files with over 15 million records, of which nearly 1.7 million are in the wanted persons file. NCIC services more than 90,000 user agencies and averages 7.5 million transactions per day. Currently on the average South Carolina performs 350,000 + transactions per day. ForOfficialUse Only 9 3

4 The local/regional computer availability goals shall be 100 percent with 96 percent as minimum. Equipment and/or technological incompatibility shall not be sufficient justification for any agency to operate outside of the normal CSA configuration. ForOfficialUse Only 10 The data stored in the NCIC 2000 System and the III File are documented criminal justice information and must be protected to ensure correct, legal, and efficient dissemination and use. It is incumbent upon an agency operating an NCIC 2000 infrastructure to implement the necessary procedures to make that component secure from any unauthorized use. Any departure from this responsibility warrants the removal of the offending component from further NCIC 2000 participation. ForOfficialUse Only 11 Throughout the last several years, there have been significant changes in the CJIS community s telecommunications and systems architecture. As a result of technological advances, the FBI Director authorized a security management structure to specifically address technical security controls, policy revision, oversight, training, and security incident resolution and notification. ForOfficialUse Only 12 4

5 In addition to the changes there have been a significant number of the larger and more important computer systems in this country that have been successfully penetrated by individuals whose reasons ran the gamete from monetary profit to ideologic principles. If the National Crime Information Center (NCIC) is going to function efficiently and effectively in today's society System Security must be an omni-present element of its everyday operation. ForOfficialUse Only 13 Therefore the CJIS Advisory Policy Board (APB) adopted new policies in the areas of identification, authentication, encryption, wireless applications, dial-up access, Internet access, public networks, and firewalls to address security concerns. ForOfficialUse Only 14 A Federal Working Group and several regional Working Groups were established to recommend policy and procedures for the programs administered by the FBI CJIS Division. These Working Groups are also responsible for the review of operational and technical issues related to the operation of or policy for these programs. ForOfficialUse Only 15 5

6 The FBI uses hardware and software controls to help ensure System security. However, final responsibility for the maintenance of the security and confidentiality of criminal justice information is shared with the individual agencies participating in the NCIC 2000 System and the IT departments who support the agencies. Further information regarding System security can be obtained from the FBI/CJIS Security Policy 5.1 ForOfficialUse Only 16 The essential premise of the CJIS Security Policy is to provide appropriate controls to protect the full lifecycle of CJI, whether at rest or in transit. The CJIS Security Policy provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI data. This policy applies to every individual contractor, private entity, noncriminal justice agency representative, or member of a criminal justice entity with access to, or who operate in support of, criminal justice services and information. ForOfficialUse Only 17 Policy Purpose To provide minimum security requirements associated with the creation, viewing, modification, transmission, dissemination, storage, or destruction of Criminal Justice Information or CJI. To provide a baseline security policy for Local, State, and Federal agencies to build their policies upon. (It is the minimum standard a local policy must follow). The policy covers roles and responsibilities as well as the 12 areas of compliance. ForOfficialUse Only 18 6

7 Roles and Responsibilities State ISO SLED will appoint an Information Security Officer (ISO) who has the responsibility to establish and maintain information security policy, assesses threats and vulnerabilities, performs risk and control assessments, oversees the governance of security operations, and establishes information security training and awareness programs. ForOfficialUse Only 19 Roles and Responsibilities state CSO Each state must have a CJIS Security Officer (CSO) assigned by the head of the CJIS Systems Agency (CSA)(SLED) who is responsible for enforcing security policy rules over ALL agencies, users, and devices accessing CJI information via the state CSA(SLED). ForOfficialUse Only 20 Roles and Responsibilities Local Level Each local agency accessing Criminal Justice Information or CJI is required to have a Terminal Access Coordinator (TAC) and a Local Access Security Officer (LASO) to oversee that the CJIS Security Policy is being abided by locally. They can be the same person. ForOfficialUse Only 21 7

8 Terminal Agency Coordinator (TAC) The TAC serves as the point-of-contact at the local agency for matters relating to CJIS information access. A TAC administers CJIS systems programs within the local agency and oversees the agency s compliance with CJIS systems policies. The TAC is the Agency Coordinator (AC) ForOfficialUse Only 22 AC of the CGA The AC is a staff member of the CGA who manages agreements, responsible for the supervision and integrity of the system, training and continuing education of employees as required ForOfficialUse Only 23 Agency Coordinator (AC) The AC shall be responsible for the supervision and integrity of the system, training and continuing education of employees and operators, scheduling of initial training and testing, and certification testing and all required reports by NCIC. ForOfficialUse Only 24 8

9 The AC shall: Understand the communications, records capabilities, and needs of the individual which is accessing federal and state records through or because of its relationship with the CGA. Receive information from the CGA (e.g., system updates) and disseminate it to appropriate individuals. ForOfficialUse Only 25 The AC shall: Maintain up-to-date records of all employees or contractors who access the system, including name, date of birth, social security number, date fingerprint card(s) submitted, date security clearance issued, and date initially trained, tested, certified or recertified (if applicable). ForOfficialUse Only 26 The AC shall: Schedule new operators for the certification exam as well as schedule certified operators for biennial recertification testing within thirty (30) days prior to the expiration of certification. Schedule operators for other mandated class. ForOfficialUse Only 27 9

10 The AC shall: The AC will not permit an untrained/untested or non-certified employee or contractor to access CJI or systems supporting CJI where access to CJI can be gained. ForOfficialUse Only 28 The AC shall: Provide completed applicant fingerprint cards on each Contractor employee who accesses the system to the CJA (or, where appropriate, CSA) for criminal background investigation prior to such employee accessing the system. ForOfficialUse Only 29 Local Agency Security Officer (LASO) The primary Information Security contact between a local law enforcement agency and the CSA The LASO actively represents their agency in all matters pertaining to Information Security, disseminates Information Security alerts and other material to their constituents, maintains Information Security documentation (including system configuration data), assists with Information Security audits of hardware and procedures, and keeps the CSA informed as to any Information Security needs and problems. ForOfficialUse Only 30 10

11 Roles and Responsibilities Outsourcing of CJI Administration The responsibility for the management of the approved security requirements shall remain with the Criminal Justice Agency. Thus the outsourcing of the state CSO and ISO positions is not allowed. Thus the outsourcing of local TAC and LASO positions is not allowed ForOfficialUse Only 31 Roles and Responsibilities Local Points of Contact Local or municipal entities should refer all CJIS Security procedural or technical questions to their local criminal justice agency s TAC or LASO. They are the local point of contact. If the local TAC or LASO does not have an answer they can refer to the state CSO for assistance. ForOfficialUse Only 32 Illegal Dissemination of CJI and PII Can Lead to Penalties Improper access and dissemination of any CJI data including CHRI may result in administrative sanctions, termination, and state and federal penalties. Refer to S.C. Financial Fraud and Identity Theft Law for more information. ForOfficialUse Only 33 11

12 What does the policy cover? 1. Information Exchange Agreements. 2. Awareness Training 3. Incident Response 4. Auditing and Accountability 5. Access Control 6. Identification and Authentication ForOfficialUse Only 34 What does the policy cover? (cont.) 7. Configuration Management 8. Media Protection 9. Physical Protection 10. Systems & Communications Protection and Information Integrity 11. Formal Audits 12. Personnel Security ForOfficialUse Only 35 Information Exchange Agreements Policy Area 1 Criminal Justice Information requires protection throughout its life which is why agreements need to be in place between each agency sharing CJI data. These agreements must specify security controls meeting the CJIS Security Policy requirements and be in place before any CJI can be exchanged. Agreements should state the policies, standards, sanctions, governance, auditing, services accessed and policy compliance required for the user agency CJI exchange includes , instant messaging, web services, facsimile, hard copy, and the information systems sending, receiving, and storing CJI. ForOfficialUse Only 36 12

13 Some Agreement Types User Service Management Control * Inter-Agency * CJIS Security Addendum * Civil Agency User Agreement Livescan/Latent Fingerprint Sharing ForOfficialUse Only 37 Agreements required for NCJA Management Control agreement - grants the criminal justice agency management control over the operations of the noncriminal justice agency as they relate to access to the Law Enforcement Data System network and services. Required between CJA and the NCJA which provides services to the CJA (dispatching, record keeping, computer services, etc.). "Management Control" means the authority to set and enforce: (a) Priorities; (b) Standards for the selection, supervision and termination of personnel; and (c) Policy governing the operation of computers, circuits, and telecommunications terminals used to process, store, or transmit information to or receive information from the Law Enforcement Data System. ForOfficialUse Only 38 Agreements required for NCJA cont Inter-Agency agreement between two agencies that states standards, policy, and access required of the parties State CSA to non-criminal justice agency (DSIT) Local criminal justice agency to non-criminal justice agency (county or city) Security Addendum Criminal Justice Agency & private contractor (each employee) Non-criminal Justice Agency & private contractor (each employee ForOfficialUse Only 39 13

14 Example CJA supported by NCJA SLED is CSA SLED s enterprise extends to Metropolitan PD Metropolitan City IT department performs IT administration of PD network with some private contractors Agreements Needed CJA user agreement between SLED and Metropolitan PD Inter-agency agreement between Metropolitan City IT and Metropolitan PD Management control agreement between Metropolitan PD and Metropolitan City IT Security Addendum between Metropolitan City IT and Private contractors ForOfficialUse Only Policy Area 2: Security Awareness Training Security awareness training shall be required before an initial assignment for all personnel who have access to CJI. The CSO/CSA may accept the documentation of the completion of security awareness training from another agency. Accepting such documentation from another agency means that the accepting agency assumes the risk that the training may not meet a particular requirement or process required by federal, state, or local laws. ForOfficialUse Only 41 Security Awareness Training Policy Area 2 Security awareness training is mandatory for those with roles in the support, administration or general access to criminal justice information. All criminal justice employees, non-criminal justice employees, contractors, vendors, etc. The level of training is dependent on the role of the individual IT support requires the highest level of training. ForOfficialUse Only 42 14

15 Security Awareness Training Policy Area 2 Training must be performed every two years The management control criminal justice agency designated person (TAC, LASO, ISO, CSO, NCIC coordinator) is responsible for coordinating and verifying the completion of this requirement for their respective agency ForOfficialUse Only 43 Incident Response Policy Area 3 The information security officer at SLED has been identified as the POC on security-related issues for the CSA and respective agencies in the state. The ISO is responsible for ensuring LASOs (local agency security officer) institute the CSA incident response reporting procedures at the local level. ForOfficialUse Only 44 Policy Directive Agencies shall: (i) establish an operational incident handling capability for agency information systems that includes adequate preparation, detection, analysis, containment, recovery, and user response activities; (ii) track, document, and report incidents to appropriate agency officials and/or authorities ForOfficialUse Only 45 15

16 Responsibilities for incident response Agencies whether criminal justice or non-criminal justice, that are responsible for the administration of criminal justice, dispatching, record keeping, or computer services for CJI all are required to follow the CJIS policy incident reporting requirements. Four critical tasks must be followed with incidents: Incident Handling Collection of evidence Incident Response training Incident Monitoring These procedures may be audited by SLED and/or the FBI during the required technical and policy audits. ForOfficialUse Only 46 Auditing and Accountability Policy Area 4 Agencies shall implement audit and accountability controls to increase the probability of authorized users conforming to a prescribed pattern of behavior. Agencies shall carefully access the inventory of components that compose their information systems to determine which security controls are applicable to the various components. ForOfficialUse Only 47 Logging Events Policy 5.4 states specific logging requirements Specific events must be logged Content to log on each event is specified Monitoring, analysis and log reporting actions Response to logged events Log retention is 365 days Other requirements exist for NCIC, III and CJIS access and information logging ForOfficialUse Only 48 16

17 Access Control Policy Area 5 Access control provides the planning and implementation of mechanisms to restrict reading, writing, processing and transmission of CJIS information and the modification of information systems, applications, services and communication configurations allowing access to CJIS information. Access control includes physical in addition to logical access. ForOfficialUse Only 49 User Access Control Always assign least privilege to accounts Use Job duties, Physical, logical or network location, and Date/Time restrictions for access. All employee status changes must be reported and accounts adjusted as required. Policy guidelines state requirements for annual validation of accounts, logging of access and inactivity or failed log in attempts (policy 5.5) ForOfficialUse Only 50 Access Control Recommendations System administrator access must be tightly regulated. Only allow remote admin access in emergency situations. Don t allow remote access for group accounts Always provide System Notifications or Warnings to users logging on. Use approved mechanisms to control this access. Policy and Security must be FIPS ForOfficialUse Only 51 17

18 CJI Access Restrictions CJI access is not allowed from personally owned or public computers. No CJI over Bluetooth at this time due to not FIPS140-2 approved encryption standard. CJI over Wireless and Cellular must be carefully regulated following policy ForOfficialUse Only 52 Identification and Authentication Policy Area 6 All users must be properly identified prior to access to any agency information systems or services. Follow password policies for all access to the criminal justice infrastructure or network where CJI is transmitted as listed in ForOfficialUse Only 53 Advanced Authentication Advanced Authentication (AA) is required when users are accessing CJI information via a network that is not deemed secure by the SLED ISO. Policy Advanced Authentication is the use additional identifiers on top of login ID and password that may include PKI, biometric, smart cards tokens, software tokens etc ForOfficialUse Only 54 18

19 Configuration Management Policy Area 7 The goal is to allow only qualified and authorized individuals access to information system components for purposes of initiating changes, including upgrades, and modifications. Thus agencies must restrict who has configuration management permissions ForOfficialUse Only 55 Configuration Management Requirements All network changes must provide a detailed network topography diagram to the SLED ISO anytime there is a proposed network change or a network change has occurred. Agencies must protect all system configuration documentation from unauthorized access. ForOfficialUse Only 56 Media Protection Policy Area 8 Procedures must be defined for securely handling, transporting, and storing media both electronic and physical. Procedures must also be in place for the sanitation and disposal of electronic and physical media that meet policies. All entities accessing CJI media must be vetted authorized personnel. Specific policies are in policy 5.8 ForOfficialUse Only 57 19

20 Physical Protection Policy Area 9 All CJI and associated information systems must be in a physically secure location. This can be a facility, area, room or group of rooms with controls described in Personnel security for access to the area must follow policy area 12 The location is subject to the management control of the CJA and must follow all criminal justice policies. ForOfficialUse Only 58 Physical protection A security perimeter should be established and posted as such. A list of authorized personnel with access must be maintained. All physical access points to the secure area must be controlled. All physical access to the IT systems and transmission lines shall be controlled. The display or view of information from outside this controlled area must prevent unauthorized viewing. ForOfficialUse Only 59 Visitor Control Visitors must be authenticated before authorizing escorted access. Access records shall be maintained following the policy requirements in Items entering and exiting the area shall be controlled and authorized ForOfficialUse Only 60 20

21 Non-criminal justice agencies or contractors must follow these procedures to report incidents to the LASO at the criminal justice agency they support. (Who signed the management control agreement?) The criminal justice agency LASO will report these incidents to the SLED ISO who will in turn communicate the details to the FBI CJIS ISO. ForOfficialUse Only 61 Systems & Communications Protection and Information Integrity Policy Area 10 Examples range from boundary and transmission protection to securing virtual environments. Information flow enforcement between interconnected systems shall be controlled. ForOfficialUse Only 62 Information Flow Information flow regulates where the information allowed to travel within the IT system and between IT systems. CJI can not be transmitted unencrypted across the public network Outside traffic that claims to be from the agency must be blocked Web requests from the public network not from an internal web proxy should not be passed. ForOfficialUse Only 63 21

22 Layers of protection CJI and system shall provide boundary protection as established in policy Encryption standards must be met policy , SLED has additional requirements for encryption AES 256. Intrusion detection/prevention tools shall be in place following policy VoIP and facsimile policies shall also be implemented per policy ForOfficialUse Only 64 Information Technology security IT security is hardware and/or software used to assure the integrity and protection of information and the means of processing it. Many criminal justice data systems and networks are interconnected to one another and the Internet. As such, those systems and networks are vulnerable to exploitation by unauthorized individuals. ForOfficialUse Only 65 Partitioning Specific controls must be in place to use this technology with Criminal justice information and Processing. The application, service, or system shall: Separate user functionality (including UI services) form information system management. Separate UI services from information storage and management services either physically or logically. Guidelines for achieving this are specified in ForOfficialUse Only 66 22

23 Virtualization All security controls in the policy apply to virtualization. Additional controls exist in policy Isolate host from virtual machine Maintain audit logs for all virtual hosts and machines (store these outside of virtual environment) Physically separate Internet facing virtual machines from virtual machines that process CJI Critical device drivers shall be contained in a separate guest. ForOfficialUse Only 67 Virtualization Addition technical security controls are suggested. These include: Encrypt network traffic between virtual machine and host Implement IDS and IPS within the virtual machine environment Virtually firewall each virtual machine from each other or physically firewall each with an application layer firewall controlling protocols Segregate the administrative duties for the host ForOfficialUse Only 68 System & Information Integrity The agency shall develop and implement a local policy for installing relevant security patches, service packs and hot fixes. The policy must include items and procedures (policy ) for installing these fixes. Malicious code, spam and firewall protection must be implemented following policy ForOfficialUse Only 69 23

24 Formal Audits Policy Area 11 Formal audits are conducted on IT services, secure areas, personnel and policies by SLED and the FBI. Regular audit are triennial but can be conducted more frequently. The FBI has the authority to conduct unannounced security inspections and scheduled audits of the facilities. All agencies CJA and NCJA are subject to the audit requirements and inspections. Responses to audit findings must be addressed in an accepted manner by the CJA, SLED and FBI. Failure to correct deficiencies will result in sanctions. ForOfficialUse Only 70 Personnel Security Policy Area 12 All personnel who have access to unencrypted criminal justice information (CJI) including those with only physical or logical access must be screened. All requests for access must be cleared by the CJA who maintains management control. The TAC or LASO is the point of contact for these requests. ForOfficialUse Only 71 Background Checks Notification of subsequent arrest and/or convictions for those who have access must be sent to the CSO to determine if access should be continued. Support personnel, contractors, custodial workers, and others with access to physically secure or controlled locations shall be subject to these regulations unless escorted by an authorized person at all times. ForOfficialUse Only 72 24

25 Personnel screening for contractors and vendors In addition to requirements in policy , the follow items are in place: The contracting government agency (CGA) shall coordinate the background check prior to granting access with the criminal justice agency that has management control. If a record of any kind if found, the CGA will be notified and access is delayed pending a review by the CJA. The CGA must notify the contractor appointed security officer. All felony convictions are disqualifications for access. Arrest warrants are disqualifications for access. The CGA shall maintain a list of personnel who have been authorized for access and shall provide a current list to the CSO when requested. The CGA can request the CSO to review any denials. ForOfficialUse Only 73 Maintenance after granting physical or logical access Upon termination or separation, the individual s access shall immediately be terminated. Reassignments or transfers shall result in actions such as closing and establishing new accounts and changing system access authorizations. A formal sanctions process for failure to comply with established information security policies and procedures shall be documented, distributed and enforced. This should be ForOfficialUse available Only during an audit. 74 Background Checks A state of residency and national fingerprint background check is require for unescorted access AND all personnel who have direct access to CJI and all those who have IT responsibility. Any felony conviction will result in access denied. If a record of any kind exists, access can not be granted until the CSO (SLED) reviews and determines if access is appropriate. ForOfficialUse Only 75 25

26 System & Information Integrity Any mobile device by design (laptops, handhelds, PDA etc) must employ personal firewall protection. A minimum list of activities performed by the personal firewall is listed in policy Manage program access to the Internet Block unsolicited requests to connect to the device Filter incoming traffic by IP, protocol or destination port Maintain and IP traffic log Security alerts and advisories must be received by the agency and policies must be in place for handling the information. Policy ForOfficialUse Only 76 Information Technology security A vulnerability is a condition or weakness in (or the absence of): Security Procedures Technical Controls Physical Controls Other controls that could be exploited by a threat. ForOfficialUse Only 77 Information Technology security All systems and networks have vulnerabilities. The goal of security is to minimize those vulnerabilities. Vulnerabilities include, but not limited to physical, natural, hardware and software. ForOfficialUse Only 78 26

27 Information Technology security Vulnerabilities Examples Physical: The placement of a computer in a non-secure location. Natural: a server connected to a power source without a surge protector or backup power supply. Hardware: a connection to the Internet without a firewall. Software: not updating the computer operating system when updates are issued. ForOfficialUse Only 79 Information Technology security Security Points of Contact Identify who is using the hardware/software and ensure that no unauthorized users have access to same. Identify and document how the equipment is connected to the state system. Ensure that personnel security screening procedures are being followed as stated in the CJIS Security Policy ForOfficialUse Only 80 Information Technology security Ensure that appropriate hardware security measures are in place Support policy compliance and keep the state ISO informed of security incidents. ForOfficialUse Only 81 27

28 Remember The local agency may complement the CJIS Security Policy with a local policy, or the agency may develop their own standalone security policy; however, the CJIS Security Policy shall always be the minimum standard and local policy may augment, or increase the standards, but shall not detract from the CJIS Security Policy standards. ForOfficialUse Only 82 Remember This Policy governs the operation of computers, access devices, circuits, hubs, routers, firewalls,and other components that comprise and support a telecommunications network and related CJIS systems used to process, store, or transmit CJI, guaranteeing the priority,confidentiality, integrity, and availability of service needed by the criminal justice community. ForOfficialUse Only 83 Remember Responsibility for the management control of network security shall remain with the CJA. Management control of network security includes the authority to enforce the standards for the selection, supervision, and separation of personnel who have access to CJI; set and enforce policy governing the operation of circuits and network equipment used to transmit CJIS data; and to guarantee the priority service as determined by the criminal justice community. ForOfficialUse Only 84 28

29 Remember Private contractors who perform criminal justice functions shall meet all policies for training and certification criteria required by governmental agencies performing a similar function, and shall be subject to the same extent of audit review as are local user agencies. Additional screening requirements exist in the security policy 5.1 ForOfficialUse Only 85 Remember All private contractors who perform criminal justice functions shall acknowledge, via signing of the Security Addendum Certification page, and abide by all aspects of the CJIS Security Addendum. ForOfficialUse Only 86 Agreements User Agreements states policy, standards, sanctions, governance, auditing, services accessed and policy compliance required or the user agency Agreements Needed CJA user agreement between SLED and court agency Inter-agency agreement between Metropolitan City IT and Metropolitan court agency Management control agreement between Metropolitan court agency and Metropolitan City IT Security Addendum between Metropolitan City IT and Private contractors (TAC needs copies) ForOfficialUse Only 87 29

30 Contacts/ and Steps to gain access Contact the CSO office in writing requesting access to NCIC data. Once received the CSO office will forward this request to the FBI for an NCIC ORI assignment. Any court that hears civil cases only (with the exception of domestic violence and stalking cases) does not qualify for an NCIC 2000 ORI assignment. Contact person for the CSO office is Millie Galloway at or ForOfficialUse Only 88 Contacts/ and Steps to gain access When the ORI has been established the CSO office will send an Information Exchange Agreement to the court. Completed security addendums between agency and IT vendor. The Court will perform TAC/LASO assignment Security Awareness Training performed on all individuals. ForOfficialUse Only 89 Contacts/ and Steps to gain access Completed finger print checks on all individuals. Completed state of residency Check on all individuals. Once those checks have been performed then the court will send the completed Site Survey and Topology for approval. ForOfficialUse Only 90 30

31 The End ForOfficialUse Only 91 31

Security Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015

Security Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015 U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Security Control Mapping of CJIS Security Policy Version 5.3 s to NIST Special Publication 800-53

More information

MAIL AUDIT QUESTIONNAIRE

MAIL AUDIT QUESTIONNAIRE MAIL AUDIT QUESTIONNAIRE Complete and return by due date to: Crime Information Bureau, P.O. Box 2718, Madison, WI 53701-2718, or email to cibtrain@doj.state.wi.us. Completion may require input by information

More information

Requirements and Tiering Document FBI CJIS Security Policy Version /01/2016

Requirements and Tiering Document FBI CJIS Security Policy Version /01/2016 U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division s and Tiering Document FBI CJIS Security Policy Version 5.5 06/0/06 Recommended changes to version

More information

Computerized Central Records System

Computerized Central Records System POLICY 111.2 Computerized Central Records System REVISED: 02/07, 09/11, 07/17 RELATED POLICIES: CFA STANDARDS: 34.13 REVIEWED: AS NEEDED A. PURPOSE The purpose of this policy is to establish procedures

More information

Criminal Justice Information Services (CJIS) Security Policy

Criminal Justice Information Services (CJIS) Security Policy U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.4 Prepared by: CJIS Information

More information

TIME SYSTEM SECURITY AWARENESS HANDOUT

TIME SYSTEM SECURITY AWARENESS HANDOUT WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/16/2017 2018 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

NLETS & CLOUD SECURITY. Bill Phillips, Information Security Officer

NLETS & CLOUD SECURITY. Bill Phillips, Information Security Officer NLETS & CLOUD SECURITY Bill Phillips, Information Security Officer Overview Enhancing Nlets Audit Capabilities Nova Architecture Nova Security Services Audit Enhancing Nlets Audits Revising the existing

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

TECHNICAL SECURITY QUESTIONNAIRE

TECHNICAL SECURITY QUESTIONNAIRE TECHNICAL SECURITY QUESTIONNAIRE 2017 Complete and return by due date to: Crime Information Bureau, P.O. Box 2718, Madison, WI 53701-2718, or email to cibtrain@doj.state.wi.us. Completion may require input

More information

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device

More information

AUDIT QUESTIONNAIRE. Completion of this questionnaire and all related items prior to the audit will reduce the time needed to complete your audit.

AUDIT QUESTIONNAIRE. Completion of this questionnaire and all related items prior to the audit will reduce the time needed to complete your audit. AUDIT QUESTIONNAIRE Completion of this questionnaire and all related items prior to the audit will reduce the time needed to complete your audit. ORI Person Completing Date Phone Number AGENCY AGREEMENT

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

7.16 INFORMATION TECHNOLOGY SECURITY

7.16 INFORMATION TECHNOLOGY SECURITY 7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for

More information

SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004

SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 This document provides an overview of the program put into place by the South Carolina Law Enforcement Division (SLED)

More information

MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS

MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS The purpose of this document is to establish and enforce Security Control of the access

More information

Agency Responsibilities

Agency Responsibilities Agency Responsibilities Agency Contacts Agency Head Point of Contact (POC) Local Agency Security Officer (LASO) Schedule the audit with the auditor Agency Point of Contact (POC) Complete the E- Audit

More information

Annex 3 to NIST Special Publication Recommended Security Controls for Federal Information Systems

Annex 3 to NIST Special Publication Recommended Security Controls for Federal Information Systems Annex 3 to NIST Special Publication 800-53 Recommended Security Controls for Federal Information Systems Minimum Security Controls High Baseline Includes updates through 04-22-2005 AC-1 ACCESS CONTROL

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

01.0 Policy Responsibilities and Oversight

01.0 Policy Responsibilities and Oversight Number 1.0 Policy Owner Information Security and Technology Policy Policy Responsibility & Oversight Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 1. Policy Responsibilities

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy Policy Title: Binder Association: Author: Review Date: Pomeroy Security Principles PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy Joseph Shreve September of each year or as required Purpose:...

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

South Carolina Law Enforcement Division. NCIC 2000 System Usage Requirements

South Carolina Law Enforcement Division. NCIC 2000 System Usage Requirements South Carolina Law Enforcement Division NCIC 2000 System Usage Requirements Version 2.3 January 2004 This document does not constitute a contract and does not alter federal and state law, system regulations,

More information

Annex 1 to NIST Special Publication Recommended Security Controls for Federal Information Systems

Annex 1 to NIST Special Publication Recommended Security Controls for Federal Information Systems Annex 1 to NIST Special Publication 800-53 Recommended Security Controls for Federal Information Systems Minimum Security Controls Low Baseline AC-1 ACCESS CONTROL POLICY AND PROCEDURES The organization

More information

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security HISPOL 003.0 The United States House of Representatives Internet/ Intranet Security Policy CATEGORY: Telecommunications Security ISSUE DATE: February 4, 1998 REVISION DATE: August 23, 2000 The United States

More information

CYBER SECURITY POLICY REVISION: 12

CYBER SECURITY POLICY REVISION: 12 1. General 1.1. Purpose 1.1.1. To manage and control the risk to the reliable operation of the Bulk Electric System (BES) located within the service territory footprint of Emera Maine (hereafter referred

More information

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations EXCERPT NIST Special Publication 800-171 R1 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations An Excerpt Listing All: Security Requirement Families & Controls Security

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Trust Services Principles and Criteria

Trust Services Principles and Criteria Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

I. PURPOSE III. PROCEDURE

I. PURPOSE III. PROCEDURE A.R. Number: 2.11 Effective Date: 2/1/2009 Page: 1 of 5 I. PURPOSE This policy outlines the procedures that third party organizations must follow when connecting to the City of Richmond (COR) networks

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE COMPLIANCE ADVISOR NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE A PUBLICATION BY THE EXCESS LINE ASSOCIATION OF NEW YORK One Exchange Plaza 55 Broadway 29th Floor New York, New York 10006-3728 Telephone:

More information

MINIMUM SECURITY CONTROLS SUMMARY

MINIMUM SECURITY CONTROLS SUMMARY APPENDIX D MINIMUM SECURITY CONTROLS SUMMARY LOW-IMPACT, MODERATE-IMPACT, AND HIGH-IMPACT INFORMATION SYSTEMS The following table lists the minimum security controls, or security control baselines, for

More information

Sparta Systems TrackWise Solution

Sparta Systems TrackWise Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Data Security and Privacy Principles IBM Cloud Services

Data Security and Privacy Principles IBM Cloud Services Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer

More information

DoD Guidance for Reviewing System Security Plans and the NIST SP Security Requirements Not Yet Implemented This guidance was developed to

DoD Guidance for Reviewing System Security Plans and the NIST SP Security Requirements Not Yet Implemented This guidance was developed to DoD Guidance for Reviewing System Security Plans and the s Not Yet Implemented This guidance was developed to facilitate the consistent review and understanding of System Security Plans and Plans of Action,

More information

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND October 2005 Table of Contents Introduction... 1 Purpose Of This Policy... 1 Responsibility... 1 General Policy... 2 Data Classification Policy...

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

Red Flag Policy and Identity Theft Prevention Program

Red Flag Policy and Identity Theft Prevention Program Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more.

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more. FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013 Visit us online at Flank.org to learn more. HITRUST CSF v9 Framework ISO 27001/27002:2013 Framework FLANK ISO 27001/27002:2013 Documentation from

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

ADIENT VENDOR SECURITY STANDARD

ADIENT VENDOR SECURITY STANDARD Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational

More information

Standard CIP 004 3a Cyber Security Personnel and Training

Standard CIP 004 3a Cyber Security Personnel and Training A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-3a 3. Purpose: Standard CIP-004-3 requires that personnel having authorized cyber or authorized unescorted physical access

More information

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/protect/ndcbf_

More information

Executive Order 13556

Executive Order 13556 Briefing Outline Executive Order 13556 CUI Registry 32 CFR, Part 2002 Understanding the CUI Program Phased Implementation Approach to Contractor Environment 2 Executive Order 13556 Established CUI Program

More information

Judiciary Judicial Information Systems

Judiciary Judicial Information Systems Audit Report Judiciary Judicial Information Systems August 2016 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY For further information concerning this report

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

HIPAA Compliance Checklist

HIPAA Compliance Checklist HIPAA Compliance Checklist Hospitals, clinics, and any other health care providers that manage private health information today must adhere to strict policies for ensuring that data is secure at all times.

More information

Baseline Information Security and Privacy Requirements for Suppliers

Baseline Information Security and Privacy Requirements for Suppliers Baseline Information Security and Privacy Requirements for Suppliers INSTRUCTION 1/00021-2849 Uen Rev H Ericsson AB 2017 All rights reserved. The information in this document is the property of Ericsson.

More information

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier

More information

Donor Credit Card Security Policy

Donor Credit Card Security Policy Donor Credit Card Security Policy INTRODUCTION This document explains the Community Foundation of Northeast Alabama s credit card security requirements for donors as required by the Payment Card Industry

More information

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates Policy and Procedure: SDM Guidance for HIPAA Business (Adapted from UPMC s Guidance for Business at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/guidanceforbusinessassociates.pdf) Effective:

More information

Sparta Systems Stratas Solution

Sparta Systems Stratas Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

Watson Developer Cloud Security Overview

Watson Developer Cloud Security Overview Watson Developer Cloud Security Overview Introduction This document provides a high-level overview of the measures and safeguards that IBM implements to protect and separate data between customers for

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

existing customer base (commercial and guidance and directives and all Federal regulations as federal)

existing customer base (commercial and guidance and directives and all Federal regulations as federal) ATTACHMENT 7 BSS RISK MANAGEMENT FRAMEWORK PLAN [L.30.2.7, M.2.2.(7), G.5.6; F.2.1(41) THROUGH (76)] A7.1 BSS SECURITY REQUIREMENTS Our Business Support Systems (BSS) Risk MetTel ensures the security of

More information

QuickBooks Online Security White Paper July 2017

QuickBooks Online Security White Paper July 2017 QuickBooks Online Security White Paper July 2017 Page 1 of 6 Introduction At Intuit QuickBooks Online (QBO), we consider the security of your information as well as your customers and employees data a

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

NC Department of Justice

NC Department of Justice Information Technology Division (ITD) Presented to: House Appropriations Subcommittee for Information Technology Scott Glawson CIO NC Department of Justice 05/09/2013 ITD Organizational Structure 73 IT

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Oracle Data Cloud ( ODC ) Inbound Security Policies

Oracle Data Cloud ( ODC ) Inbound Security Policies Oracle Data Cloud ( ODC ) Inbound Security Policies Contents Contents... 1 Overview... 2 Oracle Data Cloud Security Policy... 2 Oracle Information Security Practices - General... 2 Security Standards...

More information

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services

More information

NEN The Education Network

NEN The Education Network NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

Seven Requirements for Successfully Implementing Information Security Policies and Standards

Seven Requirements for Successfully Implementing Information Security Policies and Standards Seven Requirements for Successfully Implementing and Standards A guide for executives Stan Stahl, Ph.D., President, Citadel Information Group Kimberly A. Pease, CISSP, Vice President, Citadel Information

More information

Information technology security and system integrity policy.

Information technology security and system integrity policy. 3359-11-10.3 Information technology security and system integrity policy. (A) Need for security and integrity. The university abides by and honors its long history of supporting the diverse academic values

More information

Attachment 1 to Appendix 2 Risk Assessment Security Report for the Networx Security Plan

Attachment 1 to Appendix 2 Risk Assessment Security Report for the Networx Security Plan Attachment 1 to Appendix 2 Risk Assessment Security Report for the Networx Security Plan DRAFT December 13, 2006 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203

More information

State of West Virginia Department of Health and Human Resources (DHHR) Office of Management Information Services (OMIS)

State of West Virginia Department of Health and Human Resources (DHHR) Office of Management Information Services (OMIS) 1.0 PURPOSE Periodic security audits, both internal and external, are performed for the benefit of the and its employees to: (1) identify weaknesses, deficiencies, and areas of vulnerability in operations;

More information

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Security Policies and Procedures Principles and Practices

Security Policies and Procedures Principles and Practices Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability

More information

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program

More information

STATE OF NEW JERSEY. ASSEMBLY, No th LEGISLATURE. Sponsored by: Assemblywoman ANNETTE QUIJANO District 20 (Union)

STATE OF NEW JERSEY. ASSEMBLY, No th LEGISLATURE. Sponsored by: Assemblywoman ANNETTE QUIJANO District 20 (Union) ASSEMBLY, No. 0 STATE OF NEW JERSEY th LEGISLATURE INTRODUCED NOVEMBER 0, 0 Sponsored by: Assemblywoman ANNETTE QUIJANO District 0 (Union) SYNOPSIS Requires certain persons and business entities to maintain

More information