Information Management and Technology

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

Introduction to Physics IT Support. To learn about IT Support available with the Department of Physics, and across the University. To find out a little.
HIPAA Security.
Data Storage & Security Dr Alastair F. Brown Head of Computing MRC Human Genetics Unit MRC Institute of Genetics and Molecular Medicine The University.
1 Creating a Data Backup Oakland University University Relations Updated - June 2006.
P3, M2,M3,M4.
Effective Discovery Techniques In Computer Crime Cases.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Everything your business needs to know but probably doesn’t.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Factors to be taken into account when designing ICT Security Policies
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Client Server Security. Introduction Although client/server architecture is the most popular and widely used computing environment, it the most vulnerable.
Back Up and Recovery Sue Kayton February 2013.
Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
>> Press Enter to go to the Next Slide Backup Express Speed Backup Express Speed "Backup Express" will backup all your important files.
ICT School Policies 6 th November Suggested Policies for Schools Not always a requirement, but useful to cover you, your school and the students.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Client Server Security DeSiaMorePowered by DeSiaMore1.
New Data Regulation Law 201 CMR TJX Video.
November 2009 Network Disaster Recovery October 2014.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
Protecting ICT Systems
Information Governance Jym Bates Head of Information Assurance.
Security Awareness Norfolk State University Policies.
Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri Steps To Secure Your Data.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
IT Security for Users By Matthew Moody.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
BACKUP AND ARCHIVING DATA BACKUP AND RECOVERY OF DATA.
2015 Risky Business Week Welcome to the 2015 Risky Business Week presentation regarding disaster recovery Risky Business Week.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
©Holm Publications Security Awareness Presentation.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Communications & Networks National 4 & 5 Computing Science.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Unit 12 – IT Technical Support – Anne Sewell Aims of the lesson: To carry out a back-up of files to a USB or desktop. This is a build-up exercise towards.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Microsoft SQL is known as RDMS (Relational Database Management System) which is developed by Microsoft and is highly used at corporate and enterprise.
Managed IT Services JND Consulting Group LLC
City of Hyattsville City Council IT Briefing October 19, 2015 dataprise.com | #ITinRealLife.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Back Up and Recovery Sue Kayton October 2015.
Security week 1 Introductions Class website Syllabus review
Introduction to the PACS Security
IT Office hours – 1 Data Sharing 101
Presentation transcript:

Information Management and Technology MHRA Inspection Information Management and Technology

3 Possible Issues for Inspection Disaster recovery Appropriate computer systems & system security Data security & data backup

Disaster Recovery There is a University-wide disaster recovery procedure in place by Information Services (INSRV)! Includes: network infrastructure, networked data storage (S: and H: drives) and services under SLA with INSRV (Medic database & web server for e.g.) Does NOT include: your PC’s hard disk, laptops, data storage device or server not under SLA with INSRV) INSRV Service Desk and Operations Team available between 8:00-22:00 week days. A plan for re-establishing or reproducing computer operations after a catastrophic event, such as a fire or earthquake. Over the last 5 years I have had to initiate2 disaster recovery procedures. One time there was a flood in a computer machine room. Second time we were a victim of a hacker. I have known Information Services to initiate a DR plan a few times, including when contractors have dug up fibre optic data cables. Must not be complacent.

HELP! Service Desk: InsrvConnect@cf.ac.uk (9:00-17:00) 029 20 874 487 (9:00-17:00) Operations: 029 20 874 400 (8:00-9:00 & 17:00-22:00) Suddenly find the network down – don't presume someone else has contacted the Service Desk – this is the first port of call if you get in to trouble. They will coordinate appropriate action and initiate the DR procedure if appropriate.

Local Disaster Recovery Policy? For own servers / data storage devices not covered by INSRV or Trust SLA Written procedure should include: Named contacts & communication to end users Damage assessment and reporting Recovery procedure (location of backups, steps needed to recover data and service and by whom) Confirm services and data are restored to acceptable level Communication.

Appropriate computer systems Are computer systems fit for purpose? PC versus network server MS Access DB versus enterprise DB Be wary of using MS Access or Excel (limitations in restricting access to data and in locking down the data for analysis) Medical device that can be defined as a computer system (e.g. has its own in-built software) Appropriate documentation Supported workstations, are they in warranty etc? Documentation – manufactures documentation, standards & kite marks (medical devices)

Computer system security Do you have your own servers? Restricted physical access Appropriate location, air conditioning Secure data backup & restore procedures Anti-Virus & Firewall Policies Network security S: drive folders are locked down to ONLY the users who need access Appropriate password security Document these procedures!

Data security & data backup Can data be locked down to specific users? Yes: network storage (S: drive), servers No: either move to above and secure, or encrypt Laptops: If they HAVE to be used for trial, please install encrypted data volumes (speak to me!) CDs / Memory sticks: Avoid if at all possible or use encryption Encryption is only as good as the password Applies to live data and backed up data. What Encryption technology? FIPS 140-2 standard. Contact me for information.

...Data security & data backup S: drive and servers under SLA are securely backed up by INSRV If not, ensure other means but do not rely on a single backup source (such as one external hard drive) Ensure backup drives are encrypted or locked away in fireproof safe Create a backup policy so you can retrieve not just “last night’s backup” but the week or month before if necessary Conduct regular test restores. Document it.

IT Survey Please complete this short survey – it will give us a better idea of what is “out there” in order to prepare for MHRA.

Concerned? Please speak to me or one of my colleagues: Tel. 029 2074 6306 Email. CrossTR@cardiff.ac.uk Thank you