Information Security Management System ISO/IEC 27001:2013

Similar documents
1. Threats bermaksud ancaman, atau lebih dikenali sebagai malware (malicious

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

PANDUAN PENGGUNA (SUPPLIER) MAINTAIN CERTIFICATES/SUPPLIER DETAILS SUPPLIER RELATIONSHIP MANAGEMENT SUPPLY CHAIN MANAGEMENT SYSTEM (SCMS)

Semasa buku ini ditulis XAMPP mengandungi empat versi:

Information Security Management System ISO/IEC 27001:2013

PANDUAN PENGGUNA (SUPPLIER) MAINTAIN CERTIFICATES/SUPPLIER DETAILS SUPPLIER RELATIONSHIP MANAGEMENT SUPPLY CHAIN MANAGEMENT SYSTEM (SCMS)

ICT SPM 2011 SUGGESTION ANSWER. Section A


INSTRUCTION: This section consists of TEN (10) structured questions. Answer ALL questions.

Visitor Management System

HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

M2U MANUAL PENGGUNA USER MANUAL M2UNHJ. 0 P a g e BAHAGIAN SIMPANAN DAN PENGELUARAN JABATAN KHIDMAT PENDEPOSIT DAN OPERASI LEMBAGA TABUNG HAJI

UNIVERSITI SAINS MALAYSIA. CST333 Distributed & Grid Computing [Perkomputeran Teragih & Grid]

B,8 PERKHIDMATAN KREDIT DAN PERBANKAN. Pemindahan Data PROSEDUR UNIT KOMPUTER. BPKP/KlOK-117 Bilangan Semakan : 0 Tarikh : PERUBAHAN.

TUITION CENTRE MANAGEMENT SYSTEM (TCMS) ZARIFAH BINTI MOHD PAHMI UNIVERSITI TEKNIKAL MALAYSIA MELAKA

PANDUAN PENGGUNA (SUPPLIER) e-purchase ORDER FOR SERVICES

CREATING USER ID AND PASSWORD : NOTA PENTING NOTA PENTING SEBELUM MEMULAKAN PROSES CREATE USER ID & PASSWORD

ISU DAN CABARAN PELAKSANAAN SISTEM PENGURUSAN KESELAMATAN MAKLUMAT (ISMS) 15 Jun 2016 Dewan Taklimat Serdang

PANDUAN PENGGUNA (PENTADBIR SYSTEM/SYSTEM ADMINISTRATOR) (INFOTECH, BPPF DAN POLIS

UNIVERSITI SAINS MALAYSIA. CCS521 Advanced Distributed Systems Concepts and Design [Konsep dan Reka Bentuk Sistem Teragih Maju]

ssk 2023 asas komunikasi dan rangkaian TOPIK 4.0 PENGALAMATAN RANGKAIAN Minggu 11

MICROSOFT EXCEL. Membina Hamparan Elektronik Fungsi Hamparan Elektronik

Registration of Supplier (ROS) TM Supplier Registration Renewal via SUS Portal (Pembaharuan Pendaftaran Pembekal TM melalui SUS Portal)

UNIVERSITI SAINS MALAYSIA. CMT322/CMM323 Web Engineering & Technologies [Kejuruteraan & Teknologi Web]

DOKUMEN TIDAK TERKAWAL

This item is protected by original copyright

5. All fields are compulsory and MUST be filled up. For fields that do not apply to you, please put as N/A (not applicable).

PANDUAN PENGGUNA (PENSYARAH)

SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED

INSTRUCTION: This section consists of TWO (2) short answer and structured essay questions. Answer ALL questions.

TEKNOLOGI, GADJET & KEIBUBAPAAN

Registration of Supplier (ROS) TM Supplier Registration Renewal via SUS Portal (Pembaharuan Pendaftaran Pembekal TM melalui SUS Portal)

PENGELUARAN PERAKUAN KEKOMPETENAN DAN PERAKUAN KECEKAPAN BARU MENGIKUT STCW 1978, SEPERTI PINDAAN

STANDARD PERLINDUNGAN DATA PERIBADI 2015

Pengenalan Sistem Maklumat Dalam Pendidikan

Panduan Pengguna Autodesk Education Community

AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI

DARI KAUNTER KE SISTEM DALAM TALIAN

Manual Pengguna. PCN Online Service Fulfillment System

Panduan Menggunakan Autoresponder FreeAutobot.com

INSTRUCTION: This section consists of TWO (2) questions. Answer ALL questions. ARAHAN: Bahagian ini mengandungi DUA (2) soalan. Jawab SEMUA soalan.

HARDWARE AND SOFTWARE CO-SIMULATION PLATFORM FOR CONVOLUTION OR CORRELATION BASED IMAGE PROCESSING ALGORITHMS SAYED OMID AYAT

FIRST TIME LOGIN & SELF REGISTRATION USER GUIDE LOG MASUK KALI PERTAMA & PENDAFTARAN SENDIRI PANDUAN PENGGUNA

Information Security Management System ISO/IEC 27001:2013

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

PERSONAL DATA PROTECTION ACT 2010 NOTICE (Collection, Recording, Storage and Retention of Personal Data)

Pengguna akan diberikan Username dan Password oleh Administrator untuk login sebagai admin/conference Manager bagi conference yang akan diadakan.

DEVELOPMENT OF SPAKE S MAINTENANCE MODULE FOR MINISTRY OF DEFENCE MALAYSIA SYED ARDI BIN SYED YAHYA KAMAL UNIVERSITI TEKNOLOGI MALAYSIA

Panduan Guru Maker UNO/ Arduino

1. We may use and process any of your Personal Data for business and activities of the Company which shall include, but not limited to:

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

PENDAFTARAN KURSUS SEMESTER 1 (DEP/DEE/DTK) SESI JUN 2018

CARA-CARA UNTUK MEMBUAT POSTER MELALUI PERISIAN PHOTOSHOP. Untuk membuat poster sediakan beberapa bahan seperti berikut:

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.


A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI

PENDAFTARAN KURSUS SEMESTER 1 (DEP/DEE) SESI DIS 2017

SYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN

UNIVERSITI SAINS MALAYSIA

HARDWARE-ACCELERATED LOCALIZATION FOR AUTOMATED LICENSE PLATE RECOGNITION SYSTEM CHIN TECK LOONG UNIVERSITI TEKNOLOGI MALAYSIA

MULTICHANNEL ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING -ROF FOR WIRELESS ACCESS NETWORK MOHD JIMMY BIN ISMAIL

UNIVERSITI SAINS MALAYSIA. CST334 Network Monitoring & Security [Pengawasan & Keselamatan Rangkaian]

COMBINING TABLES. Akademi Audit Negara. CAATs ASAS ACL / 1

PEMINDAHAN DATA MENGGUNAKAN KOMUNIKASI CAHAYA BOLEH DILIHAT DAN APLIKASI MUDAH ALIH. Annisa Zakiah Binti Kamarudin Khairul Azmi Bin Abu Bakar

THESIS PROJECT ARCHIVE SYSTEM (T-PAS) SHAHRUL NAZMI BIN ISMAIL

PENDAFTARAN KURSUS SEMESTER 1 (DEP/DEE/DTK) SESI DIS 2018

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

REGISTRATION GUIDE MCIS CUSTOMER PORTAL. Page 1

FUZZY NEURAL NETWORKS WITH GENETIC ALGORITHM-BASED LEARNING METHOD M. REZA MASHINCHI UNIVERSITI TEKNOLOGI MALAYSIA

UNIVERSITI SAINS MALAYSIA. CST232 Operating Systems [Sistem Pengendalian]

MSS 318 Discrete Mathematics [Matematik Diskret]

REGISTRATION FORM SYSTEMATIC REVIEW AND META-ANALYSIS WORKSHOP 26 TH to 28 TH October 2015 (3 DAYS) Selangor, Malaysia. REGISTRANT DETAILS

HOME APPLIANCE CONTROL SYSTEM TAN WEI SYE

JABATAN KIMIA Kategori Arahan Kerja

UNIVERSITI SAINS MALAYSIA. CCS522 Advanced Data Communication and Computer Networks [Rangkaian Komputer dan Komunikasi Data Lanjutan]

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA

SMART PARKING SYSTEM USING LABVIEW MUHAMMAD NAZIR BIN MAT ISA

HOME APPLIANCES MONITORING AND CONTROL USING SMARTPHONE APPLICATION AHMAD DANIAL BIN AHMAD NAZRI

MANAGE COURSE RESOURCES LABEL TEXT PAGE URL BOOK FILE FOLDER IMS CONTENT PACKAGE

UNIVERSITI SAINS MALAYSIA. Peperiksaan Semester Pertama Sidang Akademik 2003/2004. September/Oktober 2003

GARIS PANDUAN BAGI BAYARAN PERKHIDMATAN STAF TEKNIKAL DI LUAR SKOP TUGAS HAKIKI OLEH UNIT TEKNIKAL & PERKHIDMATAN

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI

VIRTUAL PRIVATE NETWORK: ARCHITECTURE AND IMPLEMENTATIONS

UNIVERSITI SAINS MALAYSIA. CST332 Internet Protocols. Architecture & Routing [Protokol, Seni Bina & Penghalaan Internet]

PERFORMANCE EVALUATION OF LEACH PROTOCOL FOR WIRELESS SENSOR NETWORKS USING NS2 MUHAMAD FAIZ BIN RAMDZAN

PENGHARGAAN. Dasar ICT UPNM ini telah digubal oleh Jawatankuasa Dasar ICT UPNM yang terdiri daripada: Prof. Dr. Hjh. Fatimah binti Dato Ahmad

Information Security Management System ISO/IEC 27001:2013

JABATAN KIMIA Kategori Arahan Kerja

PORTABLE ELECTRONICS QUEUE CONTROL SYSTEM WONG CHUN YUAN UNIVERSITY MALAYSIA PAHANG

Pekeliling Perbendaharaan Malaysia PK 2 Lampiran 2.0

PROGRAM USAHASAMA AKADEMIK JADUAL WAKTU PEPERIKSAAN SEMESTER PERTAMA SIDANG AKADEMIK

IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM

APLIKASI MUDAH ALIH JOMDAFTAR

SMART BODY MONITORING SYSTEM MOHAMAD KASYFUL AZIM BIN AHMAD

UNIVERSITI SAINS MALAYSIA. CPT211-CPM313 Programming Language Concepts & Paradigm [Konsep & Paradigma Bahasa Pengaturcaraan]

Website Notice Relating to Personal Data Protection Act 2010

Transcription:

Information Security Management System ISO/IEC 27001:2013 POLISI PEMINDAHAN & PELUPUSAN For PTM Use Only Date: 25 th Nov 2014 Written By: Nor ain Mohamed Ketua Bahagian Infrastruktur ICT Verified By: Haslina Abd Hamid Wakil Pengurusan Keselamatan Maklumat (ISMR) Approved By: Dr David Asirvatham Pengarah Pusat Teknologi Maklumat

Revision History Date of No Change 1 1st October 2014 Description Page Version Approved By Remove MS from Front Page. Front 1.1 Dr David Page Asirvatham 2 25 th Nov 2014 Inserted TERHAD logo Header 1.2 Dr David Asirvatham 3 25 th Nov 2014 Modified policy statements 3 1.2 Dr David Asirvatham FOR DEPARTMENT USE ONLY Page 1 of 5

1.0 Purpose The purpose of this policy is to establish a standard procedure for the proper disposal of electronic media containing confidential data. The disposal procedures used will depend upon the type and intended disposition of the media. Electronic media may be scheduled for reuse, repair, replacement, or removal from service for a variety of reasons and disposed of in various ways as described below. Electronic Media is defined as any electronic storage device that is used to record information, including, but not limited to hard disks, magnetic tapes, compact disks, videotapes, audiotapes, and removable storage devices such as USB drives. 2.0 Scope This policy shall apply to all staff, contractors, vendors, students, interns in Centre For Information Technology (PTM) in UM. This policy covers any media containing information that requires to be removed from PTM premise. Media devices includes servers, external hard drives, PC s and laptops and other forms of hardware that belongs to PTM, contractors and vendors All users of computer systems within PTM of UM, including contractors and vendors with access to PTM data are responsible for taking the appropriate steps, as outlined below to ensure that all computers and electronic media are properly sanitized before removal from site or disposal. Electronic Media is defined as any storage that is used to record information, including, but not limited to hard disks, magnetic tapes, compact disks, video tapes, audio tapes, and removable storage such as USB drives. FOR DEPARTMENT USE ONLY Page 2 of 5

3.0 Polisi 3.1 All electronic media should undergo a complete format or contents of the media deleted before the media, or the system containing the media, is disposed or transferred to another department. 3.2 Before such formatting or deletion, ensure that the important information/ data is properly backed-up in another device. Permission should be seeked from the owner of the device. 3.3 For media to be disposed, if a complete formatting of the media is not an option, then the media should be destroyed so that the information is not recoverable without unreasonable time or cost. This standard is necessary to protect all university s information, and to comply with software license agreements. 3.4 All media that contains confidential information should be overwritten with software designed to "zero out" media tracks or destroyed. 3.5 No PC or server is to be taken out of the PTM premises without HoD approval. 3.6 Obsolete computer equipment may have little or no residual financial value - but may still hold valuable information and/or software. Pending removal of data, care should be taken to ensure secure storage of equipment and control of access. 3.7 Any removable storage media such as floppy disks, CDR, CDRW and Zip required to be destroyed should not be binned but must be securely discarded. FOR DEPARTMENT USE ONLY Page 3 of 5

1.0 Tujuan Tujuan polisi ini ialah untuk mewujudkan satu piawaian prosedur pelupusan yang bersesuaian untuk media elektronik yang mengandungi data sulit. Prosedur pelupusan yang digunakan adalah bergantung kepada jenis dan kecenderungan media tersebut. Media elektronik boleh dijadualkan untuk digunakan semula, dibaiki, diganti atau dikeluarkan daripada perkhidmatan kerana beberapa sebab dan dihapuskan dalam pelbagai cara seperti yang dinyatakan di bawah. Media elektronik ditakrifkan sebagai mana-mana peranti storan elektronik yang digunakan untuk merekod maklumat, termasuk, tetapi tidak terhad kepada cakera keras, pita magnetik, cakera padat, pita video, pita audio dan peranti storan mudah alih seperti USB Drives. 2.0 Skop Polisi ini termaktub kepada semua staf, kontraktor, pembekal, pelajar, pelatih di PTM UM. Polisi ini merangkumi apa-apa media yang mengandungi maklumat yang perlu dipindahkan dari premis PTM. Peranti Media termasuk server, external hardisk, PC dan komputer riba serta lain-lain bentuk perkakasan kepunyaan PTM, kontraktor dan pembekal. Semua pengguna sistem komputer dalam PTM UM, termasuk kontraktor dan pembekal, bertanggungjawab untuk mengambil langkah-langkah yang sesuai, seperti yang digariskan di bawah untuk memastikan bahawa semua komputer dan media elektronik dibersihkan dengan betul sebelum dipindahkan dari tapak/lokasi atau dihapuskan. Media Elektronik didefinisikan sebagai mana-mana storan yang digunakan untuk merekod maklumat, termasuk, tetapi tidak terhad kepada cakera keras, pita magnetik, cakera padat, pita video, pita audio, dan storan mudah alih seperti USB Drives FOR DEPARTMENT USE ONLY Page 4 of 5

3.0 Polisi 3.1 Semua media elektronik seharusnya menjalani satu format lengkap atau kandungan media dimansuhkan sebelum media, atau sistem yang mengandungi media, ditambah atau dipindahkan ke jabatan lain. 3.2 Sebelum pemadaman atau pemansuhan, pastikan bahawa maklumat/data penting telah dibackup dengan betul dalam peranti lain. Keizinan harus diminta dari pemilik maklumat. 3.3 Untuk pelupusan media, jika formatting media yang lengkap bukan satu pilihan, maka media tersebut haruslah dimusnahkan supaya maklumat tidak boleh diperolehi semula tanpa masa atau kos yang tidak munasabah. Piawaian ini adalah perlu untuk melindungi kesemua maklumat universiti, dan mematuhi perjanjian-perjanjian lesen perisian. 3.4 Semua media yang mengandungi maklumat sulit harus ditulis ganti dengan perisian yang direka untuk jejak media "zero out" atau dimusnahkan. 3.5 PC atau pelayan tidak boleh dibawa keluar dari premis PTM tanpa kelulusan dari Ketua Bahagian. 3.6 Peralatan komputer yang telah usang mungkin kurang bernilai dari segi kewangan tetapi mungkin masih menyimpan maklumat dan/atau software yang bernilai. Langkah-langkah sewajarnya perlu diambil untuk memastikan peralatan disimpan dengan selamat dan akses dikawal sebelum data dibuang/musnah. 3.7 Sebarang media storan seperti cakera liut, CDR, CDRW dan Zip yang perlu dimusnahkan tidak boleh dibuang ke dalam tong sampah tetapi perlu dimusnahkan dengan cara yang selamat. FOR DEPARTMENT USE ONLY Page 5 of 5