Keeping Member Data Safe

Slides:



Advertisements
Similar presentations
S.NO.COMPARISON BETWEEN SAFEKHATAOFFLINE ACCOUNTING SOFTWARE 1 Completely hosted accounting information in the cloud Susceptible to computer/server.
Advertisements

Creating and Assigning Roles For Animal Husbandry and Medical modules.
GW Introduction to Google Drive Security and Smart Sharing Practices.
Web Plus Overview Division of Cancer Prevention and Control National Center for Chronic Disease Prevention and Health Promotion CDC Registry Plus Training.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Hands-On Microsoft Windows Server 2008
Chapter 9: Novell NetWare
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Module 7: Fundamentals of Administering Windows Server 2008.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
ZIMS Tips and Tricks February 2015 Managing Your Staff and My Institution 1.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Overview Managing a DHCP Database Monitoring DHCP
NOAA Research Hot Items! Nancy Soreide and Eugene Burger NOAA/OAR/PMEL American Meteorological Society / IIPS January 13-17, 2002, Orlando, FL Web-based.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
Chapter 10: Rights, User, and Group Administration.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
External Sharing Sharing Your Animal Records with other ZIMS Institutions.
NOAA Research Hot Items! To facilitate communication amongst the NOAA Research offices Nancy Soreide and Eugene Burger NOAA/OAR/PMEL NOAATech2002 Oct 23-25,
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Onsite CRM Security
Presented by [Harshit Agrawal] 04/03/2017
Review of IT General Controls
DATA SECURITY FOR MEDICAL RESEARCH
Working at a Small-to-Medium Business or ISP – Chapter 8
Microsoft Windows NT 4.0 Authentication Protocols
An Overview of Concepts and Navigation
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
THE STEPS TO MANAGE THE GRID
Introduction to Networking
Unit 27: Network Operating Systems
IIS.
Sharing Your Animal Records with other ZIMS Institutions
Lesson 16-Windows NT Security Issues
Why it is required and how to confirm
Weight Comparison Report
County HIPAA Review All Rights Reserved 2002.
Getting Started with your Studbook
The Role of Regional Associations in Managing Studbooks
Incomplete Accessions
Your first view Into the World of ZIMS!
Creating and Assigning Medical Roles
Simple Group Management
Introduction to ZIMS for non-ZIMS Using Studbook Keepers
2001 Term, Treatment and Test Dictionaries
Managing Your Templates
Regional Association Studbook Management
Introduction to ZIMS for non-ZIMS Using Studbook Keepers
Hatching a Group of Eggs
Batch Actions from Enclosure Occupants List
This is the Sign In page for the Dashboard
Accepting Another Institution’s Identifier
Introduction to ZIMS for non-ZIMS Using Studbook Keepers
Recording all you do all day!
Provisional Data Entry Daily Report
ZIMS Tips and Tricks February 2015
Feed Log Grid As part of our steps to improve ZIMS functionality
Designing IIS Security (IIS – Internet Information Service)
1005 Additional Animal Information
Presentation transcript:

Keeping Member Data Safe ZIMS Security Species360 takes its responsibility to utilize security protocols to ensure the privacy and security of submitted data very seriously.  The Data and Privacy Policy, approved by the Species360 Board, has been in place since 1995.  Our approach to Species360 ZIMS security involves 4 key elements: data security, technical security, application security, and collection security.  Keeping Member Data Safe

ZIMS Updates! This PowerPoint is up-to-date as of: November 12th 2018 ZIMS is developed in an “agile” method This means that it is updated every two weeks, sometimes with additional releases in between! Use the link below to see if there have been any updates to this topic since the date above: http://training.species360.org/updates/

Data Security Hosted at a secure, offsite facility Backed up on a daily basis The ZIMS database is hosted at a secure, offsite facility. ZIMS data is backed-up at multiple physical locations and stored on a fault tolerant, expandable storage area network, featuring RAID 5 disk array with hot swappable spare drives. It is backed-up on a daily basis with maximum care given to protect our member’s data in case of an emergency.

Technical Security Professionally hosted Microsoft standards The application and database is professionally hosted by a Type II SSAE 16 SOC 1 certified hosting facility and includes Cisco firewalls, 256 bit SSL encryption, regular security audits, and 24x7 monitoring against attacks. The application and database is built with Microsoft standard authentication, encrypted passwords, role-level security trimming, isolation of Database from UI and business logic, only authorized application servers can access database, audit stamp for each database record, and database-level change audit to track update.

Application Security Role-based access Limitations on active sessions Limitation to IP addresses Local Admin review ZIMS provides role-based access to virtually every component of the application, which provides discreet control for each institution’s administrator to configure users with the ability to add, edit, read, and/or delete records in any combination needed to secure your data. ZIMS can limit users to only one active session at a time, if desired. So if they are logged in at one computer they cannot log into another until the initial session is ended. ZIMS can limit access to only pre-approved Internet Protocol (IP) addresses (e.g., the member’s network, specific remote locations, etc.). You can limit access only to computers at your institution if you want so Users will not be able to access ZIMS in an inappropriate environment. The Local Admin can choose to review a user’s activity log, roll back certain transactions, edit incorrectly entered ones, and terminate any user session or access, as needed.

Collection Security Advanced Access Management External Sharing ZIMS allows a member to structure and restrict its own staff's access to its own animal data by taxonomic rank (e.g., mammals, birds, reptiles) or even to a single specific animal. This functionality is called Advanced Access Management and we would like to thank the St. Louis Zoo for sponsoring this premium functionality. This is an optional feature and must first be activated at a facility by the Species360 Global Administrator and then turned on by the institution’s Local Administrator. Institutions may also choose to share additional information about a given taxonomic rank (e.g., mammals, birds, reptiles) or even just a single specific animal with other institutions, if desired, to facilitate animal moves between institutions.  This is also useful for animals on loan so the owner can better track how they are doing. This is an optional feature, and the default setting is to only share data as per standard policy.

ZIMS Data You can sleep easy, your data is Safe and Sound You can sleep easy. Your ZIMS data is safe and sound. ZIMS Data