Overview and Requirements

Slides:



Advertisements
Similar presentations
Discovery on the Cheap.
Advertisements

WELCOME! Commute Trip Reduction (CTR) Electronic Survey Slides prepared by WSDOT Urban Programs Staff Updated 2013.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
1 State Records Center Searching and Requesting Inventory  Versatile web address:  Look for any new ‘Special.
Michelle Ross Sheila Hensley January 2015.
NOAA Computer/Hard Drive Sanitization Validation Form and PDA/Cell Phone Destruction Worksheet.
Property Management Overview
Surplus Property February Surplus Property Policy Policy is located within the Finance and Operations Policy Library –
Media Sanitization How to get rid of unwanted data so no one else can get it.
Fixed Assets Policies and Procedures that directly affect Your work, Your budget And your responsibility for protection of WSSU assets as custodian department.
Property Custodian Meeting June 18, Final Tally for FY 14  We are currently missing approximately 3.5% of the inventory (5.7% last year). The total.
Chemical Management System Overview September 2014.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
NDSU RECORDS MANAGEMENT INITIATIVE 2007
A NNUAL EQUIPMENT I NVENTORY Enterprise Asset Management.
NDSU RECORDS MANAGEMENT INITIATIVE December 2007 PowerPoint.
Bar|Scan ® Asset Inventory System The leader in asset and inventory management.
Inventory Throughout this slide show there will be hyperlinks (highlighted in blue) follow the hyperlinks to navigate to the specified Topic or Figure.
Equipment Surplus & Secure Media Destruction Michael Thorn, Data Security Specialist.
Library Automation: Planning and Implementation
Item unit cost is $5,000 and over YesNo Item unit cost is $1, and over Item unit cost is $1, and over Item unit cost is $ and over 1.Program.
Alternative Input Devices. Digital Camcorder View recordings on a regular TV or copy them to VHS tape Send MPEG video clips by way of to a mobile.
New Data Regulation Law 201 CMR TJX Video.
Washington State Archives May 2011 Presented by: Russell Wood – State Records Manager State Government General Records Retention Schedule The Next Revision.
Property Custodian Meeting July 10, Review of USM Internal Auditor Findings  Excerpt from the USM Internal Auditors report dated May 31, 2012:
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
ELECTRONIC RECYCLING ELECTRONIC EQUIPMENT RECYCLING WEB CONFERENCING RECYCLED TONER CARTRIDGES.
Desktop Security: Data Protection. LaptopsMobile Devices Desktop Security: Data Protection USB DrivesCDs/DVDs Cameras Video CamerasPortable Hard Drives.
Procedures on how to obtain TAAMS Access at the Tribal level.
Constant Hall A Mediated Classroom Guide. In Constant Hall classrooms, media and computer equipment is stored in a Media Desk. You will also find this.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
New Principal Training Property Control July 7, 2015.
November 18, 2014 Centers for Medicare and Medicaid Services Virtual Research Data Center.
Computer Basics & Keyboarding. What Is A Computer? An electronic device operating under the control of instructions stored in its own memory unit An electronic.
Computer Systems Mrs. Butera. Computer Systems Hardware Software.
Please support our organization by recycling… -Smart Phones -Cell Phones -Inkjet Cartridges -iPads -Smart Watches -Gold & Silver Jewelry.
Improving your Audit Process Through Technology Christopher McDonald Director of Field Loss Prevention, Babies R’ Us Inc.
State of Georgia Release Management Training
COMPUTER SYSTEM TOOLS. SCANDISK MICROSOFT UTILITY PURCHASED FROM NORTON, WHICH IS NOW SYMANTEC; INCLUDED WITH MS-DOS 6.2 AND ON AS WELL AS ALL VERSIONS.
Message Validation, Processing, and Provisioning System (MVPS) Access for Jurisdictions User has SAMS User ID Center for Surveillance, Epidemiology, and.
Campus Mail Services New USPS Requirement USPS IMpb Solution (Intelligent Mail Parcel Barcode) EMS WEBVIEW SHIPPING.
Business Device Trade-in Program Frequently Asked Questions Through the Business Device Trade-in Program, you have the power to trade in your company’s.
Property Custodian Meeting December, Review of USM Internal Auditor Findings  Capital and sensitive equipment inventory was not properly tracked.
Colleges & Universities Delivery Partners Program
CHORI Purchasing Flow Chart
Wednesday, November 7, 2012.
Disaster Recovery & Secure Backups
Items For Secure Media Recycling Bins
Meeting Agenda Equipment Survey Overview Revised Equipment Survey File
Manage Resources and Make Student Learning More Effective
An Overview of Surplus roperty Disposition
UNIVERSITY PC REPLACEMENT PROGRAM MANAGEMENT AND IMPLEMENTATION
Records Management New policies and procedures
Annual Verification of Moveable Equipment Inventory
Tapping the Power of Your Historical Data
Sloan Technology Services PC Recommendations
\\hecnybiz\itdoc\compliance\disposal procedure\hardware disposal.ppt
2018 Kabel Open enrollment Follow this overview to ensure your open enrollment is done correctly in an efficient and easy manner. The following slides.
2018 Kabel Open enrollment Follow this overview to ensure your open enrollment is done correctly in an efficient and easy manner. The following slides.
Upgrading from SoftPath to SoftPathDx “Passing of the Torch” Presented by: Christine Comella SoftPathDx Implementation Specialist.
2018 Kabel Open enrollment Follow this overview to ensure your open enrollment is done correctly in an efficient and easy manner. The following slides.
Title I Equipment Inventory Requirements
Hands-On: FSA Assessments For Foreign Schools
Data Security Awareness
Please support our organization by recycling…
How to Use Home Inventory Pro 2011® Household manager
Secondary Storage Devices
User Training & Instruction Guide
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

Overview and Requirements IT Asset Inventory Overview and Requirements Information Security and Privacy Office

IT Asset Inventory Training Aid Instructions Review Inventory Requirements Complete Inventory Template (s) Implement Secure Disposal and Destruction Methods

IT Asset Inventory Policy References and Resources EISP-8.1: Enterprise IT Asset Management Policy: https://grcarcher.partners.org/default.aspx?requestUrl=..%2fGenericContent%2 fRecord.aspx%3fid%3d303287%26moduleId%3d65 EISS 8d.2: IT Asset Management Standards for Apple Macintosh Products: https://grcarcher.partners.org/default.aspx?requestUrl=..%2fGenericContent%2 fRecord.aspx%3fid%3d220908%26moduleId%3d65 ISPR-8a.1: Enterprise Secure Media Destruction Procedures: https://grcarcher.partners.org/default.aspx?requestUrl=..%2fGenericContent%2 fRecord.aspx%3fid%3d305740%26moduleId%3d65 Inventory Template

Inventory Tools for Unmanaged Devices What is an Unmanaged Device? Devices which are not managed by Enterprise Research Infrastructure Services (ERIS) or Health Information Systems (HIS) No property control number (Partners or Brigham) There are many methods to track inventory as you will see on the next slide. Please use these tools or other tools you define, to identify your inventory. Follow through on the data gaps and expect efficiencies after initial data capture. Send questions to BWHInformationSecurityandPrivacy@partners.org

Inventory Information Can Be Obtained Through; Enrollment in Partners Enterprise Apple Support (PEAS) Purchase queries Insight Application Organized by Grant Fund PeopleSoft Query Organized by Cost Center E-Buy Barcodes and Scanner Option to use barcodes and scanner Check w/RISO and/or Research Administration Multiple departments could purchase and share scanner ($500) Scans populate Inventory Template Eases annual inventory going forward Database Capture Note: You may require more than one resource to comply with inventory capture

Inventory Template (Provided via E-Mail Attachment) Complete columns A-I J-> can be used to capture anything else Spreadsheets will be collected and uploaded in bulk to Service Now Configuration Management Database (CMDB) for future automation and enhancements.

Enterprise Secure Media Destruction Procedures (ISPR-8a.1) Partners HealthCare Warehouse Pick Up and Disposal: Partners IS will pick up to 8 items at a time. Label equipment clearly for disposal Arrange for a pick-up Leave items in agreed upon location Secure Media Destruction Bin Disposal: Remove item from inventory using your organization’s standard process. If you don’t know where your bin is, contact your ISO; reference bulletin Cellular phones, smart phones, laptops, tablets, PDAs, hard drives, external hard drives, flash drives and other items of this nature. Media is also included and encompasses CDs, USB drives, floppy disks, video-tapes, and cassette tapes.

Use The Enterprise Process And Tools To Meet Policy Requirements USER WAREHOUSE DEGAUSSER DISPOSAL ENVIRONMENTAL INTEGITY BIN Once you have been authorized to dispose of media or device Arrange for warehouse pick up item or drop in bin Media or device will be disposed of securely

Additional References Inventory Collection TBD Arrange for Warehouse Pick Up BWHC: Call Service Desk at 617-732-5927 Request a bin pick up or removal Contact cispo@partners.org Contact Information Security Officer cmmazone@partners.org Locate a secure media bin Review Secure Media Recycling Poster

Contact Us Questions? Information Security and Privacy Office (ISPO) Christina Mazzone cmmazone@partners.org (781-416-9353)