Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.

Slides:



Advertisements
Similar presentations
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
Critical Data Management Indiana University HR Summit April 24, 2014.
Data Ownership Responsibilities & Procedures
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Boyertown Area School District Acceptable Use Policy.
Data Classification & Privacy Inventory Workshop
Security Controls – What Works
Information Security Policies and Standards
Security+ Guide to Network Security Fundamentals
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
10 Essential Security Measures PA Turnpike Commission.
THE WHY AND HOW OF DATA SECURITY YOUR ROLE IN DATA STEWARDSHIP DEPARTMENT OF MEDICINE IT SERVICES.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
Peer Information Security Policies: A Sampling Summer 2015.
Information Security Information Technology and Computing Services Information Technology and Computing Services
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Security Awareness Norfolk State University Policies.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
IT in Business Issues in Information Technology Lecture – 13.
Chapter 2 Securing Network Server and User Workstations.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
KTAC Security Task Force Superintendents Update April 23, 2015.
NETWORKING & SYSTEM UPDATES
CONTROLLING INFORMATION SYSTEMS
Personal data protection in research projects
Woodland Hills School District Computer Network Acceptable Use Policy.
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Information Technology Overview Welcome to NC State!
East Carolina University
Data Compromises: A Tax Practitioners “Nightmare”
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
County HIPAA Review All Rights Reserved 2002.
Information Security Awareness
IS4680 Security Auditing for Compliance
Introduction to the PACS Security
Session 1 – Introduction to Information Security
Presentation transcript:

Darton College Information Systems Use Policies

Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies provide guidelines for access, use and protection of these resources. Resources shall be used in an approved, ethical, and lawful manner. Students and Personnel shall contact the Chief Information Officer prior to engaging in any activities not explicitly covered by these policies.

Purpose Ensure that Users abide by state and federal laws, as well as Darton and University System policies Ensure that all individuals accessing or using the Information Systems assume responsibility for protecting these resources from unauthorized access, modification, destruction or disclosure Ensure the integrity, reliability, and availability of the Information Systems Ensure that individuals do not abuse the Colleges Information Systems and do respect the rights of other members of the College Community

Anti-Virus Software Policy Requires mandatory use of Anti-virus protection on Windows and Macintosh computers Applies to anyone at Darton with a personal computer connected to the College network Requires all computers connected to the College network have a copy of Anti-Virus software with current virus definitions installed (Note: Campus owned computers are covered under the McAfee contract and are automatically updated.)

Data Stewardship and Access Policy Defines College Information and how it will be controlled and accessed Applies to anyone at Darton who accesses College Information Access to College Information requires approval by the appropriate Data Steward; –Examples: Student Data, Financials Data, Human Resource Data, Facilities Data, Auxiliary Data, Information Technology Data

Disaster Recovery and Data Backup Requires backup of critical systems ensuring effective resumption of vital functions in the event of unscheduled interruptions Backup of data on user desktops –Applies to anyone at Darton with data stored on their personal office computer Backup of data on critical servers –Applies to anyone at Darton responsible for maintaining a server

Disposal of Media Policy Requires proper disposal of electronic media containing sensitive data Applies to anyone at Darton storing identity or personal information about other people on electronic media Users are responsible for taking appropriate steps to ensure that all computers and electronic media are properly sanitized before disposal

System Acceptable Use and Security Policy Describes how College systems will be managed and protected Applies to anyone at Darton who uses Recommendations: –Use strong passwords –Do not send confidential information via –Follow procedures when sending messages to large numbers of Darton recipients

Usage of Darton Faculty/Staff List Inappropriate Jokes Chain Letters Sales Promotions – Business or Personal Unapproved Not for Profit Promotions Appropriate Darton Business Related Messages Darton Clubs Darton Organizations Darton–sponsored Not for Profit Promotions

Information Systems Ethics Policy Requires appropriate and civil use of network resources Describes institutional protection of user information Applies to anyone at Darton using the Colleges computing and networking resources Read the Appropriate Use and College Access to Users Information (Privacy) sections for more information

Internet Services (Server) Registration Policy Requires registration of all devices connected to the College network that serves information to users both on and off–campus Applies to anyone at Darton installing a server Register the server and apply security patches See the Procedures section for details

Minimum Information Security Environment Policy Describes minimum precautions for securing computing devices and access to the Darton network Applies to anyone at Darton using computers or having responsibility for a server Dont use computers or systems you are not authorized to use Dont send an as if you were someone else Follow the rules for generating strong passwords Dont share User IDs and passwords Dont attempt to defeat the security of information systems

Network Connection of Surveillance System Cameras Describes approval and configuration requirements for video systems used to protect resources or personnel Applies to anyone at Darton planning to install a digital surveillance system Contact the Chief Information Officer prior to acquisition and installation of any surveillance equipment

Remote Access Policy Requires that off-campus access to network and systems are through approved methods only Applies to anyone at Darton providing access to local servers from off-campus locations Describes the use of a Virtual Private Network (VPN) client for authentication and encryption when accessing a Darton network or information system from off-campus See Procedures for more details

Reporting and Handling Security Incident Response Policy Describes the steps for reporting and handling security incidents –How to report an incident –How to manage incidents –Guidelines for collection and sharing of information Applies to anyone at Darton using computers or having responsibility for security

Sensitive Information Protection Policy Describes methods for protection of systems holding Social Security Numbers, credit card numbers, and other identity or personal information Applies to anyone at Darton storing identity or personal information on desktops or servers Read this policy if you are responsible for storing –Bulk social security numbers –Credit card numbers or bank account numbers –Information covered under HIPAA –Student data on a server or your personal workstation Contact the Chief Information Office for more information

Student Computer Access Policy Describes the requirement for students to have access to computers for Darton College course work Applies to students at Darton All students must have access to a computer; it is the responsibility of the students to ensure their access to computers At a minimum, student–accessible computers must provide access to the worldwide web, spreadsheet capability, and word processing

Wireless Access Policy Describes WiFi/ access through centrally managed authenticated methods Applies to anyone using a wireless device at Darton Read the Procedures sections on Configuration, Installation, and Management and Unauthorized Access Points for more information

Locations of Information Systems Use Policies MyDC

Questions and Answers Margaret Bragg – Director, OIT Chief Information Officer (229)