Policy Management Examples Brad Becker 95-841: Info Assurance Policy February 12, 2007.

Slides:



Advertisements
Similar presentations
Fiscal Guidelines/ Budget and Program Revisions NC Committee on Dropout Prevention Procedures Manual 2010.
Advertisements

Module N° 4 – ICAO SSP framework
Corrective Actions.
Process and Procedure Documentation. Agenda Why document processes and procedures? What is process and procedure documentation? Who creates and uses this.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Auditing, Assurance and Governance in Local Government
Procedures for Dealing with Student Discipline and Misconduct Presented by: Linda Bird – Academic Registrar Adriana Jumelet – Secretary, Disciplinary Board.
Confidentiality and HIPAA
Sustainable Energy Systems Overview of contractual obligations, procedures and practical matters KICK-OFF MEETING.
Congress and Contractor Personal Conflicts of Interest May 21, 2008 Jon Etherton Etherton and Associates, Inc.
Chapter 29 Ethics in Accounting
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
1. 2 CVM’s OBJECTIVES u to stimulate the creation of savings and their investment in securities; u to promote the expansion and regular and efficient.
The Use of Counseling and Discipline to Improve Employee Productivity.
Honesty Policy. 1. FUNDAMENTAL PRINCIPLES 1.1. The Department enforces the general university policies on academic honesty, as described in the University's.
Acceptable Use Policies What you need to know as an elementary school teacher.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Department of Human Resources. Progressive Process A progressive discipline system gives employees ample warning of misconduct or work-related problems;
Research Methods for the Social Sciences: Ethics Ryan J. Martin, Ph.D. Thomas N. Cummings Research Fellow March 9, 2010.
Job Action Guidelines Staff Training, HR Staff Training, Etc.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Disciplinary Policy INCA Community Services. Purpose O Every employee has the duty and the responsibility to be aware of and abide by existing rules and.
Internal Auditing and Outsourcing
DISCIPLINARY PROCEDURES. SOCIAL POLICY Guidance on sports, societies and groups organising social activity Asks that you are respectful of local residents.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
WASC Visiting Committee Final Presentation for Overseas Schools International School Eastern Seaboard March , 2011.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 5 HIPAA Enforcement HIPAA for Allied Health Careers.
Discipline Planning May 26, Why Do Another Plan? A discipline plan is one tool to communicate your school’s plan for maintaining a positive, respectful,
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
FHSAA Eligibility and Compliance Allegations And Investigations Florida High School Athletic Association.
Topic 4 How organisations promote quality care Codes of Practice
Sutton Public Schools Anti-Bullying Law Overview.
The Policy Company Limited © Control of Infection.
MGT 461 Lecture # 19 Project Initiation Phase (I OF II)
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
ASSESSMENT TASK 5 PRESENTATION ON : THE LEGAL RESPONSIBILITIES. THE LEGAL RESPONSIBILITIES. THE LEVEL OF THE STAKEHOLDER. THE LEVEL OF THE STAKEHOLDER.
Patient Protection and Affordable Care Act March 23, 2010.
Extension Policy Statements on Public Issues Education Strengthening the Role of the University L. Steven Smutko North Carolina State University.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Unit 4 IT 484 Networking Security Course Name – IT Networking Security 1203C Term Instructor.
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
ISO GENERAL REQUIREMENTS. ISO Environmental Management Systems 2 Lesson Learning Goals At the end of this lesson you should be able to: 
Lassen Community College NEW STUDENT ORIENTATION Introduction Lassen Community College is an academic community dedicated to providing an agreeable atmosphere.
Overview of the New Long Term Care Homes Act (LTCHA)
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
Accountability Presented by Mollie Schaffer August 13 th, 2014.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
KEYS Keys to Enhance Your Supervisory Success Taking Disciplinary Action.
School Compliance Procedures Janet Dinnen Quality Assurance & Accountability Director Charter School Institute 1.
Mandatory online training. intro why we are doing this why you should care what we hope you get out of this.
Nexia International Network versus Association Requirements.
Compliance Audit Subcommittee Reporting Work Plan Copenhagen, Denmark 6th of May 2010.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Guidance Training (F520) §483.75(o) Quality Assessment and Assurance.
CROSS TRAINING PRESENTATION OFFICE OF JUDICIAL AFFAIRS Presented By: K.R. Kennedy Associate Vice President Student Development DAYTONA STATE COLLEGE.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
Procedures to followNumbers you need Information to know Your Farm Name Here Public Relations Plan Communicate to all (employees and press) that only a.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
The Contract Management Process Post Award Activities.
SEC 420 Entire Course (UOP) For more course tutorials visit  SEC 420 Week 1 Individual Assignment Responsibilities of Personal Protection.
Education Queensland SMS-PR-021: Safe, Supportive and Disciplined School Environment pr/students/smspr021/
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
KUMC EXPORT CONTROLS The Challenge: Balancing National Security and Openness in Research, Education and Public Service.
SEC 420 aid Expect Success/sec420aiddotcom FOR MORE CLASSES VISIT
Using the Disciplinary Procedure Human Resources.
Sutton Public Schools Anti-Bullying Law Overview
What Every Employee Should Know About Compliance.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Programme 1: Responsibilities
Presentation transcript:

Policy Management Examples Brad Becker : Info Assurance Policy February 12, 2007

Where do we go from here? Use the base material as a loose framework Look at the Venue’s Security Policy (CMU Computing) Analyze & utilize Create our policy

Mindset for Management Not what you can or cannot do Lays the context for the rest of policy Brings the human aspect of the policy into focus Keep in mind all the stakeholders at The Event! What are we trying to do, who does it apply to, how are we going to enforce it, and what’s going to happen to people who follow/violate it?

Purpose CMU Policy: “The purpose of this policy is to set forth guidelines so that members of our community may use the campus network and computing facilities in ways that are responsible and respectful of privacy.” Prioritizes on Privacy Straightforward and fairly clear

Our Purpose/Goals? Certainly privacy is a ‘high concern risk’ of ours Some other principles that we might want to mention in our purpose statement… –Integrity We need to be able to rely on the system –Availability It needs to be up in order to maintain control Others?

“The Event” Policy Statement The purpose of this policy is to set forth guidelines so that all shareholders at The Event may use the network and computing facilities in ways that ensure the availability of the network, integrity, and privacy of the information it contains.” Can people rally behind this cause? Can everyone understand what is at stake? We may need to clarify/reword a bit…

Scope it Out Who/what is this policy geared towards? CMU Policy: “This policy applies to all users of Carnegie Mellon computing systems, including students, faculty and staff, and any others granted the use of university computing resources. It applies to the use of all computing facilities owned, leased, operated or contracted by Carnegie Mellon University.”

Is this our Scope? The situation that CMU is in is not all that different to ours Users are affiliated with The Event at various strengths and levels Systems coming to The Event are not entirely under our control Can we think of any differences between these two organizations in terms of scope?

Scope Statement for The Event This policy applies to everyone granted the use of The Event’s computing resources. It applies to the use of all computing facilities owned, leased, operated or contracted by The Event and its organizers for the duration of The Event (from the date of issue to the end of post event activities). Does this cover everything we can control/monitor?

Enforcement Let’s give this thing some teeth: CMU: “Inappropriate behavior in the use of computers is punishable under the general university policies and regulations regarding faculty, students and staff. The offenses mentioned in this policy range from relatively minor to extremely serious, though even a minor offense may be treated severely if it is repeated or malicious. Certain offenses may also be subject to prosecution under federal, state or local laws.” Uh oh, we’ve got some work to do

Our Enforcement What can we salvage from CMU? –Granular offense structure What’s minor and what’s severe? –Repeated offense provision May not be an issue here, but good to put in Is there another policy (Attendee’s Guidebook) that has guidelines for handling incidents? –If so, we need to make the policies coherent.

Enforcement of Our Policy A granular approach is appropriate for this situation, since it gives us a little leeway in dealing with powerful attendees. Perhaps we should define the severity of the infraction based upon the intended (or actual) outcome of the infraction? Kind of vague, but can work in our favor. Do we need to explicitly state this?

Disciplinary Procedures Technical and Event Oriented CMU: “Appropriate disciplinary action depends not only on the nature of the offense, but also on the intent and previous history of the offender. The range of possible penalties includes reprimands, loss of computing privileges, course failures for students, disciplinary probation, suspension or dismissal from the university and/or criminal prosecution. Offenses that are minor or appear to be accidental in nature are often handled in a very informal manner such as through electronic mail. More serious offenses will involve formal procedures pursued through the Division of Student Affairs for students, Human Resources and/or the hiring university department or administrative unit for staff, or the Faculty Review Committee for faculty.” Other provisions include investigation ramifications and impacts on shared systems.

Discipline at the Event Combined with the enforcement provisions discussed earlier, we now have a way to determine severity: it depends on who did it, and what they did. This can work for our Event. Who makes the decision on severity? –Incident Response Team, Organizers? –All of the Above?

Enforcement & Discipline Proposed Policy: “Any non-compliance, inappropriate access, manipulation, and/or dissemination of information is punishable under the general Event guidelines. The offenses mentioned in this policy range from relatively minor to extremely serious, though even a minor offense may be treated severely if it is repeated or malicious. Certain offenses may also be subject to prosecution under federal, state or local laws. Appropriate disciplinary action depends not only on the nature of the offense, but also on the intent and previous history of the offender. The range of possible penalties includes, but not limited to, reprimands, loss of computing privileges, suspension or dismissal from the Event and/or criminal prosecution.”

Enforcement & Discipline 2 “Offenses that are minor or appear to be accidental in nature are often handled in a very informal manner such as through electronic mail or verbal discussion. More serious offenses will involve formal procedures pursued through Event organizers & staff. Severity of the offense will be determined primarily by the Information Technology team with consultation, as needed, to Event organizers.” Thoughts?

Monitoring and Auditing Extremely important aspect of enforcement In CMU Policy, it is assumed that IS will take care of this For our Event, this should be taken care of very delicately Notification to Event attendees Definition of what is to be monitored/audited Assure stakeholders of discretion

Monitoring & Auditing “In order to assure the privacy, integrity, and availability of the Event network, the IT staff of the Event reserves the right to monitor and/or audit information contained on the network. The procedures for completing these tasks will adhere to principles held by this document. If you have any questions regarding this practice, please contact ….” Key provision: auditors are subject to the same regulations as the participants

Give a Resource Undoubtedly, there will be concern regarding the policy Everybody has a stake in the security of the Event Solicit comments to a single point of contact!

Overview Anything we are missing from a management standpoint? In general, the management section of the policy lays the ground rules for our policy.