Policy, Standards, Guidelines. NSF draft Article for FATC supplement The awardee is responsible for all information technology (IT) systems security and.

Slides:



Advertisements
Similar presentations
1 Documentation Legal Framework Air Navigation Orders Guidelines ATS Manual Airport Manual Safety Management Manual ICAO Annexes Licenses / Certificates.
Advertisements

Contractor Management. Struggling with Contractor Management ? ? ? Getting purchasing on board? Specifically stating environmental compliance in contracts?
Course Material Overview of Process Safety Compliance with Standards
Program design overview Pre-contract to post-program year Office on Volunteerism and Community Service.
Research Administration Capacity Building in an Established Institution Presenter: M.M.Aboud, MD Director of Research and Publications, MUHAS.
Subchapter M-Indian Self- Determination and Education Assistance Act Program Part 273-Education Contracts under Johnson-OMalley Act.
Company LOGO Developing Policies and Procedures for AT Reuse Programs Jessica Brodey.
Child Safeguarding Standards
Fiscal Compliance Corner Recent Happenings, etc. MRAM August 2014 Ted Mordhorst Director for Post Award Financial Compliance Research Accounting & Analysis.
 Capacity Development; National Systems / Global Fund Summary of the implementation capacities for National Programs and Global Fund Grants For HIV /TB.
Architecting Security into Research Projects George O. Strawn NSF CIO.
CENTRAL CONTRACTOR REGISTRATION (CAGE CODES) DFARS Case 2003-D040 DFARS Parts 204, 212, 213 and 252 are amended to remove policy on Central Contractor.
Multisite Human Subjects Research CUNY HRPP Coordinator Training October 19, 2012.
Information Security Policies and Standards
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
What is Program Management?
Documentation Management Biosafety and Biosecurity Awareness Training For Afghan and Pakistani Bioscientists January 12-14, 2010 SAND No P Sandia.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Implementing Human Service Worker Safety Regulations
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
RC14001 ® Update GPCA Responsible Care Committee September 23, 2013.
NSF CYBER-SECURITY SUMMIT: INFORMATION SECURITY CLAUSE  Influenced by recommendations from previous Cyber-Security Summit meetings, the clause was added.
Financial Management For Project Administrators. How Feds View Themselves.
PROPOSALS THE REVIEW OF THE 1958 AGREEMENT AND THE INTRODUCTION OF INTERNATIONAL WHOLE VEHICLE TYPE APPROVAL (IWVTA) IWVTA Informal Group WP th Session.
The proper protocol for grant approval at LCSC GRANT-WRITING 101: INTERNAL PROCEDURES.
SMS Operation.  Internal safety (SMS) audits are used to ensure that the structure of an SMS is sound.  It is also a formal process to ensure continuous.
Responsible Conduct of Research (RCR) Farida Lada October 16, 2013
RCR Requirements for NSF & NIH Michele Chin-Purcell, Director, RIOP Carol Foth, Manager, RCR/RIOP
Appendix E – Checklist for Review of Performance Audits Presented by: Ashton Coleman Department of Defense Office of the Inspector General August 16, 2012.
10/16/2015 Roles and Responsibilities of Principal Investigators/ Program Directors/ Project Directors.
Conflict of Interest Issues for the Research Administrator NCURA August 5, 2013 Policy/Compliance 08/05/131.
Award Monitoring Update National Science Foundation Advisory Committee for Business and Operations October 22, 2003 Mary Santonastasso, Director, Division.
DISTRIBUTION IMPLEMENTATION EXAMPLES AND TOOLS David Sandidge Director, Responsible Care American Chemistry Council June 1, 2011.
1 QEM/BIO Workshop October 21, 2005 Award Administration.
Eliza de Guzman HTM 520 Health Information Exchange.
“Surviving an Audit” Al Willie, Office of Internal Audit
Webinar for FY 2011 i3 Grantees February 9, 2012 Fiscal Oversight of i3 Grants Erin McHughJames Evans, CPA, CGFM, CGMA Office of Innovation and Improvement.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
VI. Developing a VSMP Program General Stormwater Training Workshop.
Belinda Seto, Ph.D. Acting Deputy Director for Extramural Research National Institutes of Health Human Subjects Research Enhancements Awards Renaissance.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Management of Change ► The health, safety, security, environmental, technical and other impacts of temporary and permanent changes are formally assessed,
College Reviews An Overview Presented by Howard Lutwak, CIA Director of Internal Audit January 2004.
Working with HIT Systems
QUALITY MANAGEMENT STATEMENT
RFP – Clauses & Fee Structure Mark A. York, MSFOC Contracting Officer.
National Science Foundation. Seeking Doctoral Dissertation Support from the National Science Foundation: Do’s and Don’ts Program Officer Political Science.
Research Administration Forum Changes to NSF & NIH Proposal Submission and Award Documents December 8, 2015.
Distance Learning and Accreditation Heather G. Hartman, Ph.D. Brenau University Online Studies and SACS Liaison.
Best Practices in Enterprise IAM Liza Lowery Massey Montana Government IT Conference December 6, 2007.
Fiscal Compliance Corner – Uniform Guidance Update MRAM October 2014 Ted Mordhorst Assistant Director for Post Award Financial Compliance Research Accounting.
ROUNDTABLE New Tools & Initiatives for Addressing Medical Device Security Thursday, February 17, 9:45am ROUNDTABLE New Tools & Initiatives for Addressing.
What are the Differences Between Targeted and Schoolwide Title I Programs?
Introduction to Sponsored Projects Accounting Navigating the University: Research & Resources Management Retreat August 19, 2014.
Policy, Standards and Guidelines Breakout Co-Chairs Victor Hazlewood OCIO Cyber Security, ORNL Kim Milford ISO, University of Rochester.
Professional Services for.  Desire to evaluate policies, procedures, and practices of LCPD  Hired Justice and Security Strategies (JSS) to: 1.Evaluate.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Safety Management Systems Session Four Safety Promotion APTA Webinar June 9, 2016.
Grant Modifications and When Are They Needed? Region 3 Discretionary Training Forum April 26-29, 2011 Atlanta, GA Presented by: Connie Taylor, FPO eta.
Risk management.
Security Planning: Background and Best Practices
IS4680 Security Auditing for Compliance
Bob Siegel President Privacy Ref, Inc.
Final HIPAA Security Rule
County HIPAA Review All Rights Reserved 2002.
SPONSORED PROGRAM SERVICES OVERVIEW
Meeting of PAP/RAC Focal Points, Split, Croatia, 8-9 May 2019
The Road to Improved Quality Management
Information Resource & Security Management www. oti. fsu. edu www
Presentation transcript:

Policy, Standards, Guidelines

NSF draft Article for FATC supplement The awardee is responsible for all information technology (IT) systems security and associated equipment and information, funded directly or indirectly by this award. The awardee shall present to the cognizant NSF Program Officer and Grants and Agreements Officer a written plan addressing policies and procedures for review and approval within 60 days of award.

NSF draft Article for FATC supplement (cont.) The plan shall describe the information security program appropriate for the project, including but not limited to roles and responsibilities, risk assessment, technical safeguards, administrative safeguards, physical safeguards, policies and procedures, and awareness and training. The plan should include evaluation criteria that will measure the successful implementation and deployment of the plans, policies and procedures.

NSF Draft guidelines for IT Security Extension of business plan Large Facilities and FFRDCs only goal is to engage the program manager in a dialogue with the PI, awardee, research office, and local organization security wide concern that they are not guidelines, but mandated set of requirements or checklist for compliance –language needs to be added to present proper context

Communications how to communicate back to awardee on guidelines and program requirements –outreach to PIs, contracts offices notification of incidents back to NSF –suggested thresholds to consider when business continuity is affected or potentially affected potential impact on community as a whole likelyhood of bad PR and political/reputation ramifications –does it become public information? –is it FOIAble?