Module 6 Information Sharing and Communication

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

DOMINICA COUNTRY REPORT
National Database Templates for the Biosafety Clearing-House Application (NDT-nBCH) Overview of the US nBCH Applications.
CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
UWI, Trinidad and Tobago, November,2005 Antigua and Barbuda Country Report On National Information Exchange Processes within the IPPC Presented.
Security+ Guide to Network Security Fundamentals
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
A Guide to major network components
Business Intelligence: Data and Text Management Instructor: Bajuna Salehe Web:
The laws Organizations are covered by lots of different laws
Lecture Week 2 Networks, The Internet and the World Wide Web.
REDCap Overview Institute for Clinical and Translational Science Heath Davis Fred McClurg Brian Finley.
Cellular Networks How do Mobile & Satellite Phones work? What can we do with them?
Security Equipment Equipment for preventing unauthorised access to data & information.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
CPS Acceptable Use Policy Day 2 – Technology Session.
FA 2 Handheld Project Fruit & Vegetables Program Commodity Inspection Division Washington State Dept. of Agriculture.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
General Packet Radio Service
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Security considerations for mobile devices in GoRTT
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
Title Page programmemanagementsystem KPMD (IT Solutions) Ltd Blades Enterprise Centre, Bramall Lane, Sheffield S2 4SU, United Kingdom telephone: +44 (0)114.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
REDCap Overview Institute for Clinical and Translational Science Fred McClurg Neil Nuehring.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
Network Security & Accounting
ROLE OF TECHNOLOGY IN CENSUS DISSEMINATION AND UTILIZATION United Nations Regional Seminar on Promotion & utilization of Census Results and on revision.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
 Full scale audit of all their current network environment  Examination of the current security policy and physical security  Full scale audits will.
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Computer Security Sample security policy Dr Alexei Vernitski.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
G063 - Intranets, the Internet and Extranet. Learning Objectives: At the end of this topic you should be able to: describe the characteristics and purpose.
1.4 wired and wireless networks lesson 1
INTERNET.
2.7 Communication Methods
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
EGovernance Paul Mundy
NETW4005 COMPUTER SECURITY A
Controlling Computer-Based Information Systems, Part II
UNIT 19 Data Security 2.
TYPES OF SERVER. TYPES OF SERVER What is a server.
Introduction to Cloud Computing
IS4550 Security Policies and Implementation
Unit 27: Network Operating Systems
Fun gym Cambridge Nationals R001.
Chapter 27: System Security
Fun gym Cambridge Nationals R001.
Progress leisure OCR GCSE ICT.
Business Communication
Check Point Connectra NGX R60
Insert Product Photograph Here
IPPC Contact Points & Meeting National Reporting Obligations (NROs)
“Zambia’s Phytosanitary Status With Regard to Seed Certification”
An Introduction to Cloud Computing
Unit# 5: Internet and Worldwide Web
Operationalizing Export Certification and Regionalization Programmes
Revision PowerPoint By Nicole Davidson.
Module 9 Staff Training and Capacity Development
Global One Communications
Presentation transcript:

Module 6 Information Sharing and Communication NPPO Operations Module 6 Information Sharing and Communication

Module 6 What will I learn? The systems and resources required to support internal and external NPPO communications and the security of this information Internal communication External communication Security of information

Information sharing and communication NPPOs collect and process large amounts of information and therefore need to invest in information and communication technology (ICT) systems that have the capacity to expand, are compatible with those of their stakeholders and are interoperable and secure.

Information sharing and communication NPPOs may use a range of internal ICTs to support their core technical functions Mobile phones Voice over internet technologies (e.g. Skype) Video conferencing Document scanning

Information sharing and communication NPPO regional officers should have easy access to: Radio (for remote communications) Computers and internet services Landlines, mobile or radio-based telephone facilities Reliable means for capturing, storing and retrieving information

Information sharing and communication Field officers and officers stationed at points of entry should have easy access to: Robust internet / intranet services: To access central phytosanitary information systems To register pest interceptions To log cases of non-compliance

Information sharing and communication Field officers and officers stationed at points of entry should have easy access to: A national data repository for: Pest information Surveillance data PRA information Audit results and verifications performed on third-party service providers

Information sharing and communication External communications Web-based portals (for communication with external stakeholders) Websites and public access databases Computer hardware, such as servers Symposiums / seminars, outreach material (e.g. booklets, fact sheets, leaflets, newsletters)

Information sharing and communication Security of information Ensure that all confidential data is protected. Permit NPPO officers to have appropriate access to restricted information. Design facilities to house computers and related networking equipment to prevent theft and damage from moisture, sunlight and dust.

Information sharing and communication Security of information Provide selective access (requiring user names and passwords) for external users to phytosanitary portals of the NPPO to ensure that activity can be logged. Ensure security and confidentiality of incoming and outgoing data on email.

Exercise 6.1 Does your NPPO have an information and communication technology system in place? Identify possible weaknesses that your NPPO may have in this area. What improvements, if any, would you recommend?