Presenter Bio. Michael Hintz. Assessor/I.T. Professional, Shepherd Technical Services. 5+ years performing ISO/IEC 17025, TNI and DoD assessments

Similar documents
SECURITY & PRIVACY DOCUMENTATION

Data Storage, Recovery and Backup Checklists for Public Health Laboratories

Records Information Management

Checklist: Credit Union Information Security and Privacy Policies

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Backup, Disaster Recovery: Defining & Managing Your Risk. Dave Kinsey - 5/9/17

DEMO OF ISO/IEC 17025:2017 AWARENESS AND AUDITOR TRAINING PPT PRESENTATION KIT

Recommendations for Implementing an Information Security Framework for Life Science Organizations

Trust Services Principles and Criteria

DATA BACKUP AND RECOVERY POLICY

The Benefits of Accreditation Using Developed Standards

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES

Disaster Recovery Self-Audit

CTS performs nightly backups of the Church360 production databases and retains these backups for one month.

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Information Security Policy

IT CONTINUITY, BACKUP AND RECOVERY POLICY

Standard: Data Center Security

A practical guide to IT security

Nine Steps to Smart Security for Small Businesses

Identity Theft Prevention Policy

Information Security in Corporation

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved.

NIST Risk Assessment for Part 11 Compliance: Evaluation of a GXP Case Study

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

Start the Security Walkthrough

Standard CIP Cyber Security Systems Security Management

Security Policies and Procedures Principles and Practices

Healthcare Privacy and Security:

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Dublin City University

EXHIBIT A. - HIPAA Security Assessment Template -

Disaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT

Cellular Site Simulator Usage and Privacy

The 10 Disaster Planning Essentials For A Small Business Network

PCI Compliance. What is it? Who uses it? Why is it important?

Information Security Data Classification Procedure

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

Risky Business. How Secure is Your Dealership s Information? By Robert Gibbs

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

Juniper Vendor Security Requirements

A COMPARISON OF TNI s ACCREDITATION STANDARD TO

IMPROVING NETWORK SECURITY

Policy and Procedure: SDM Guidance for HIPAA Business Associates

AppPulse Point of Presence (POP)

UTAH VALLEY UNIVERSITY Policies and Procedures

PS 176 Removable Media Policy

Information Systems. Data Protection Disaster recovery Backups

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

Understanding IT Audit and Risk Management

NEN The Education Network

Cybersecurity Checklist Business Action Items

RFP Questions Guideline For Data Center Buyers

Policies and Procedures for CTIA Authorized Testing Laboratories

Standard CIP Cyber Security Electronic Security Perimeter(s)

Battery Program Management Document

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY

Employee Security Awareness Training Program

Business Continuity Planning. PDI January 14 th, 2018

ADIENT VENDOR SECURITY STANDARD

Data Protection Policy

Leveraging ALCOA+ Principles to Establish a Data Lifecycle Approach for the Validation and Remediation of Data Integrity. Bradford Allen Genentech

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE

Disaster Recovery Planning Blackout. Katrina

EXAM PREPARATION GUIDE

Regulation P & GLBA Training

E-guide Getting your CISSP Certification

2015 HFMA What Healthcare Can Learn from the Banking Industry

INFORMATION SECURITY AND RISK POLICY

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

Back up and Restoration Policy. of VIJETA BROKING INDIA PRIVATE LIMITED

Standard CIP Cyber Security Critical Cyber Asset Identification

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

A company built on security

Standard CIP Cyber Security Critical Cyber Asset Identification

INFORMATION SYSTEM SECURITY

ISO & ISO & ISO Cloud Documentation Toolkit

THE STATE OF CLOUD & DATA PROTECTION 2018

Network Performance, Security and Reliability Assessment

Contents. Chapter 3: Chapter 4: Critical Server Ranking Classifying Systems for Recovery Priority Mission-Critical Only, Please...

Introduction to SURE

Information Technology General Control Review

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE

Provided as an educational service by: Introduction

Data Protection in Practice

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

PRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland.

In this unit we are going to review a set of computer protection measures also known as countermeasures.

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

esureit Online Backup vs. Portable Media

Introduction to Business continuity Planning

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer

ISO/IEC Accreditation: The Big Picture and Getting Started

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

Frequently Asked Question Regarding 201 CMR 17.00

Transcription:

Presenter Bio Michael Hintz Assessor/I.T. Professional, Shepherd Technical Services 5+ years performing ISO/IEC 17025, TNI and DoD assessments Accreditation Bodies: TCEQ, FL-DOH, MN-DOH, ANAB/L-A-B EPA D/W Certification Officer for microbiology, organic/inorganic chemistry 29 years in Information Systems & Technology Field Over 19 years in financial services industry Extensive focus on data security & regulatory compliance 20+ years designing and implementing data networks 15+ years designing, implementing and testing business continuance plans 10+ years performing data security audits and assessments

How Does This Apply To Me? Presentation

Why? Maintain Accreditation (TNI Standard:2003 / TNI Standard:2009 / DoD QSM v5) Laboratory shall retain all records for a minimum of 5 years or by contractual/regulatory obligation, whichever is longer. (includes all raw data bench sheets, logs, calibrations, original observations, etc. not just reports)

Why? Maintain Accreditation (TNI Standard:2003 / TNI Standard:2009 / DoD QSM v5) The laboratory shall have procedures to protect and back-up records stored electronically and to prevent unauthorized access to or amendment of these records. In the case of records stored electronically, equivalent measures shall be taken to avoid loss or change of original data. All records shall be held secure and in confidence.

Why? Maintain Accreditation (TNI Standard:2003 / TNI Standard:2009 / DoD QSM v5) Records that are stored only on electronic media shall be supported by the hardware and software necessary for their retrieval. What does that mean?! Think about YOUR environment... Are you running MS-DOS, Windows NT, Win 95, Win 98, Win XP? What version(s) of software/firmware are your instruments using? What version of your LIMS system were you using 4 years ago? Is it still supported?

Why? Protect the Employees (Livelihood) Protect the Customers (Data Custodian) Protect the Business (Reputation)

What? Data (plural noun, used with a sing. or plural verb) 1. Numerical or other information represented in a form suitable for processing by computer. 2. Factual information, especially information organized for analysis or used to reason or make decisions. 3. Values derived from scientific experiments. The American Heritage Dictionary of the English Language, Fourth Edition copyright 2000 by Houghton Mifflin Company.

What? Examples of Data: Final reports, raw analytical data, bench sheets Traceability data (log books) P.T. reports and supporting data Equipment calibration & configuration records Model numbers, software versions Purchasing records Customer and vendor contact information

Where Do I Begin? Security Mitigating Risk

Security - Mitigating Risk Physical Security Standards Controlled Access (locked rooms & file cabinets) DoD QSM v5: Physical access to the servers is limited by security measures such as locating the system within a secured facility or room, and/or utilizing cipher locks or key cards. Records storage environment (fire, flood, humidity) Confidential data protection (shred policy & process) Record retention (archiving policy & process ) Record destruction (purging policy & process )

Security - Mitigating Risk Logical Security Standards Controlled Access (unique passwords & password policy) DoD QSM v5: Individual usernames and passwords required, and must be changed at least once a year DoD QSM v5: Staff trained annually in computer security awareness Secured network (both wired & wireless) DoD QSM v5: Log-on/break-in attempts monitored; virus protection DoD QSM v5: Electronic data management system is protected from the introduction of computer viruses Records storage environment (disks, CD s, DVD s, the cloud ) Confidential data protection Record storage & transmission policy & process Record retention (archiving policy & process) Record destruction (purging policy & process)

Where Do I Begin? Disaster Planning/Business Continuance

Disaster Planning Mitigating Risk You can t prepare for EVERY possible risk, so Perform a risk assessment for YOUR laboratory Start by identifying top 2 or 3 disaster risks Examples: Fire Flood Hurricane Tornado Earthquake Florida 1. Hurricane 2. Flood 3. Fire 4. Tornado 5. Earthquake California 1. Earthquake 2. Fire 3. Hurricane 4. Tornado 5. Flood

Disaster Planning Mitigating Risk You can t prepare for EVERY possible risk, so Perform a risk assessment for YOUR laboratory Start by identifying top 2 or 3 disaster risks Gather knowledge Identify & involve subject matter experts (SME s) Delegate - each SME responsible for their area Encourage out of the box thinking

Disaster Planning Mitigating Risk You can t prepare for EVERY possible risk, so Perform a risk assessment for YOUR laboratory Start by identifying top 2 or 3 disaster risks Gather knowledge Start Planning Imagine each disaster scenario and document the steps you would take to recover Brainstorm independently AND as a group

Disaster Planning Mitigating Risk You can t prepare for EVERY possible risk, so Perform a risk assessment for YOUR laboratory Start by identifying top 2 or 3 disaster risks Gather knowledge Start Planning Think a step (or two, or three) ahead Identify and document remediation vendors Identify alternative work space Identify potential partnerships (reciprocal?)

Disaster Planning Mitigating Risk You can t prepare for EVERY possible risk, so Perform a risk assessment for YOUR laboratory Start by identifying top 2 or 3 disaster risks Gather knowledge Start Planning Think a step (or two, or three) ahead Review and TEST the plan then RE-test it annually Can you still buy/rent the equipment you need? Can you READ your backup data? (DoD QSM v5 requires it!) Is vendor list still accurate? Contact information current?

Disaster Planning Mitigating Risk You can t prepare for EVERY possible risk, so Perform a risk assessment for YOUR laboratory Start by identifying top 2 or 3 disaster risks Gather knowledge Start Planning Think a step (or two, or three) ahead Review and TEST the plan Re-evaluate your top risks

Disaster Planning Mitigating Risk You can t prepare for EVERY possible risk, so Perform a risk assessment for YOUR laboratory Start by identifying top 2 or 3 disaster risks Gather knowledge Start Planning Think a step (or two, or three) ahead Review and TEST the plan Re-evaluate your top risks All looks Good? Identify and plan for risk #4+

Disaster Planning Mitigating Risk Food for thought If you showed up at your lab tomorrow and it was gone, do you have the data you need to Contact your Accreditation Body? Contact your clients? Contact your vendors? Know where to begin the business continuance process?

Disaster Planning Real-World Examples Physical Damage - Hurricane Ike

Disaster Planning Real-World Examples Physical Damage - Hurricane Ike

Disaster Planning Real-World Examples Physical Damage - Hurricane Ike

Disaster Planning Real-World Examples Physical Damage - Hurricane Ike

Disaster Planning Real-World Examples Physical Damage - Hurricane Ivan

Disaster Planning Real-World Examples Physical Damage - Hurricane Ivan

Disaster Planning Real-World Examples Electrical Fire Damage Mechanical Room

Disaster Planning Real-World Examples Electrical Fire Damage Entire Lab

Disaster Planning Real-World Examples Logical Damage Virus/Malware Large multi-location laboratory Corporate computer network infected by malware (computer virus) Negatively impacted internal network Remediation took WEEKS Significant resource impact time AND money! Think about this in YOUR environment What if I can t access my LIMS? My instruments? My computer? What if I can t print reports? Send Invoices? Access client information? What do I do first? Second? Third?

Disaster Planning Real-World Examples Re-Defining Data Dump

Disaster Planning Real-World Examples Monitor Re-Defining Data Dump Server Server Server

Disaster Planning Real-World Examples Re-Defining Data Dump

Disaster Planning Real-World Examples Re-Defining Data Dump

? Questions?

Thank you for attending! For additional information, contact Michael Hintz Shepherd Technical Services Phone: (512) 336-1900 ext. 101 Email: MHintz@sheptechserv.com Mike Shepherd Shepherd Technical Services Phone: (512) 335-0906 Email: mike@sheptechserv.com

MITIGATING RISK Disaster Recovery/Business Continuance Power Failure Contingency Uninterruptible Power Supplies on critical equipment Battery back-up on temperature sensors for refrigeration Electronic vs. Paper Records & Documentation Electronic archiving via offsite backups and/or cloud services