Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.

Slides:



Advertisements
Similar presentations
H OGAN & H ARTSON, L.L.P.
Advertisements

Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
NAU HIPAA Awareness Training
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
Security Controls – What Works
IS Audit Function Knowledge
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Office of Inspector General (OIG) Internal Audit
1 Pertemuan 9 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Network security policy: best practices
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Internal Auditing and Outsourcing
Information Asset Classification
Regional Accreditation Workshop For Latin America & Caribbean Region Panama City, Panama th Nov, 2011.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Sharing Low-Income Customer Information Water & Energy Utilities LIOB Meeting - January 2009 Seaneen M Wilson Division of Water & Audits.
Service Organization Control (SOC) Reporting Options and Information
An Educational Computer Based Training Program CBTCBT.
HIPAA PRIVACY AND SECURITY AWARENESS.
ADB Project TA 3696-PAK, Regulation for Corporate Governance 1 REGULATION FOR CORPORATE GOVERNANCE IN PAKISTAN CAPITAL MARKETS.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Ethics and Privacy in Cyberspace Lesson 20. Privacy and Other Personal Rights Thomas J. Watson, Chairman of the Board for IBM, once stated: Today the.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Audit Planning Process
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Chapter 8 Auditing in an E-commerce Environment
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Effective Board Governance & role of the Audit Committee Presentation by Cluster Audit Committee – July / August 2012.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Information Security Policy
iSecurity Compliance with HIPAA
IS4680 Security Auditing for Compliance
Service Organization Control (SOC)
Move this to online module slides 11-56
General Counsel and Chief Privacy Officer
Disability Services Agencies Briefing On HIPAA
Current Privacy Issues That May Affect Your Credit Union
IS4550 Security Policies and Implementation
Enforcement and Policy Challenges in Health Information Privacy
Presentation transcript:

Policy Review (Top-Down Methodology) Lesson 7

Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are well-written policy statements. This is the wellspring of all other directives, standards, procedures, guidelines, and other supporting documents.” “The top-down portion of the network vulnerability assessment (NVA) looks at the policies requested in the Pre-NVA Checklist”

Documents from checklist Network Topology (diagram) Firewall Architecture Remote Access Server Architecture Detailed list of Mission-Critical Applications Brief description (purpose) Data storage method (database) Who is the data owner/administrator? Who are the users (job title)? Security mechanisms Sensitive or critical data Information Security Policies Password & ID Policy Confidential information policies and procedures Data classification System Access Policy and Procedures Corporate Communication Policies Electronic/paper communications Disposal Policy Internet Usage Policy Mission Statements Organization Charts

Policy Management Life Cycle

Some Definitions Policy A high-level statement of enterprise beliefs, goals, and objectives and the general means for their attainment for a specified subject area. General Program Policy Sets the strategic directions of the enterprise for global behavior and assigns resources for its implementation (e.g. conflict of interest, standards of conduct,…) Topic-specific policy Addresses specific issues of concern to the organization (e.g. , Internet and phone usage, physical security..) System- or Application-specific policy Focus on decisions taken by management to protect a particular application or system. Exhibit 1, p85-86 contains a list of possible policies

Components of a policy Topic Defines the goals of the policy. Scope Used to broaden or narrow the topic Responsibilities Who is responsible for what actions. Compliance Discusses what actions occur when an individual is found to be in noncompliance and what actions an organization must take when found in noncompliance.

Writing (or reviewing) a policy “5 W’s of Journalism 101” (and 1 H) What: what is to be protected (the topic) Who: who is responsible (responsibilities) Where: where within the organization does the policy reach (scope) How: how compliance will be monitored (compliance) When: when does the policy take effect Why: why the policy was developed The last two may actually not be in the policy itself. When and why are often covered in a cover letter with policy issuance

The Information Security Policy Should be Approved by management Published and communicated with all employees State management commitment Outline the organization’s approach to managing information security Should include A definition of information security A statement of management intent, supporting the goals and principles of information security A definition of general and specific responsibilities References to documentation that may support the policy

From The Texas Code

California SB 1386 This bill, operative July 1, 2003, would require a state agency, or a person or business that conducts business in California, that owns or licenses computerized data that includes personal information, as defined, to disclose in specified ways, any breach of the security of the data, as defined, to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. Any customer injured by a violation of this title may institute a civil action to recover damages.

GLB Requires clear disclosure by all financial institutions of their privacy policy regarding the sharing of non- public personal information with both affiliates and third parties. Requires a notice to consumers and an opportunity to "opt-out" of sharing of non-public personal information with nonaffiliated third parties subject to certain limited exceptions. Clarifies that the disclosure of a financial institution's privacy policy is required to take place at the time of establishing a customer relationship with a consumer and not less than annually during the continuation of such relationship.

Sarbanes-Oxley Act of 2002 The result of a number of corporate accounting scandals. Mandates specific actions to improve corporate reporting. Reaffirms necessity for financial statement audit process and role of external auditors. IT security and controls considered part of effective fraud management.

HIPAA Health Insurance Portability and Accountability Act Standards require that measures be taken to secure health information covered by this act while in the custody of entities governed by HIPAA as well as in transit between covered entities and from covered entities to others. Wants to ensure the confidentiality, integrity, and availability of electronic protected health information.

Some useful (possibly) documents NIST Special publication , “Generally accepted principles and practices for securing Information Technology Systems” Includes discussion on policies and risk management. NIST Special publication , “Recommended Security Controls for Federal Information Systems” Includes discussion of “Baseline Security Controls” at three level (low, med, high) NIST Special publication “Security Self- Assessment Guide for Information Technology Systems” Has nice checklist as well as a method to interpret results NIST Special publication “Guide for developing security plans for Information Technology Systems”

A final note… Download from web site and read the document “Building and Implementing a Successful Information Security Policy” by Dancho Danchev at windowsecurity.com

Summary What is the importance and significance of this material? How does this topic fit into the subject of “Security Risk Analysis”?