ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Auditing Computer Systems
Security Controls – What Works
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Information Security Policies: User/Employee use policies.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Factors to be taken into account when designing ICT Security Policies
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
Session 3 – Information Security Policies
Security Policies Group 1 - Week 8 policy for use of technology.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
New Data Regulation Law 201 CMR TJX Video.
The influence of PCI upon retail payment design and architectures Ian White QSA Head of UK&I and ME PCI Team September 4, 2013 Weekend Conference 7 & 8.
Security Awareness Norfolk State University Policies.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Dominick Bennese, Jyl Mangooni, Steve Lorson GROUP 5.
Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
Information Assurance Policy Tim Shimeall
FLOOR CANDY.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Information Systems Security
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
Chapter 2 Securing Network Server and User Workstations.
GUIDELINES FOR THE USE OF COMPUTER TECHNOLOGY AND ELECTRONIC COMMUNICATION WITHIN THE SU UNDER FACILITIES MANAGEMENT This guideline must be read in conjunction.
Introduction to Information Security
5/18/2006 Department of Technology Services Security Architecture.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Computer Security By Duncan Hall.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Information Security tools for records managers Frank Rankin.
Access Control for Security Management BY: CONNOR TYGER.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
CONTENT Introduction Objective Scope and methodologies Proposal chapters Proposed policies and recommendations Conclusion.
East Carolina University
Working at a Small-to-Medium Business or ISP – Chapter 8
Installation Plan Checklist
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Chapter 7 Part 1 Internal Control
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
County HIPAA Review All Rights Reserved 2002.
Introduction to the PACS Security
Session 1 – Introduction to Information Security
Presentation transcript:

ITACS L.L.P. Policy And Procedures Group 1

Objective: To establish companywide policy with regards to personal device usage both on and off of the company network; including, but not limited to: security, hardware/software maintenance, and communication. Purpose and Scope: This policy, in regards to ITACS L.L.P’s data, information assets, and infrastructure, provides the guidelines and capabilities of protecting the confidentiality, integrity, and availability of company assets. The policy establishes the requirements and restrictions of accessing company resources using personal devices. The policy covers all technology resources, users, and facilities within the boundaries of the firm. Applies to: All employees and contractors using personal devices to perform duties on behalf of the firm. Policy #3737.8

Devices Allowed Desktops Laptops Ultrabooks Smartphones Tablets Storage Devices Acceptance Policy Employee Submitted Approval Form Form Approval Device Registration Company Software Installation Network Access Permitted

POLICY: Network Usage Devices must only be used by authorized personnel Device must be registered prior to utilizing network resources Disruptions with day to day operations Bypassing company firewall to access restricted sites User credentials will be denied network access upon termination

Device must not be shared with unauthorized personnel Device must have a secure password and auto-locking feature Device must utilize encryption standards of the company Peer-to-peer Legislation compliance POLICY: Data Protection

Device must remain up to date with latest anti virus signatures Using device to download or install pirated software (NET Act) Device must utilize encryption standards of the company Company retains the right to perform security and compliance assessments POLICY: Software Protection & Updates