IS-3 Electronic Information Security. Implementation Checklist

Size: px
Start display at page:

Download "IS-3 Electronic Information Security. Implementation Checklist"

Transcription

1 ATTACHMENT 3 IS-3 Electronic Information Security Implementation Checklist Information Resources & Communications Office of the President March 30, 2000

2 TABLE OF CONTENTS INTRODUCTION TO TABLES...1 DEFINITION OF CATEGORIES...1 APPLICATIONS - DRAFT ASSIGNMENT...2 ASSUMPTIONS - RESTRICTED APPLICATIONS...3 ASSUMPTIONS - NON-RESTRICTED APPLICATIONS...4 REQUIRED ACTIONS - GENERAL LEVEL...5 ACTION PLAN - EIR SECURITY COORDINATORS...6 ACTION PLAN - EIR PROPRIETORS...7 ACTION PLAN - EIR CUSTODIANS...8

3 INTRODUCTION TO TABLES The Definition of Categories table summarizes the definitions (in Business and Finance Bulletin IS-3, Electronic Information Security) of criticality and sensitivity. It is provided here as a checklist to test the provisional assignment of applications to the 6 possible combinations of criticality and sensitivity. Applications - Draft Assignment makes a provisional assignment of applications to the 6 possible combinations of criticality and sensitivity in order to help EIR Security Coordinators identify likely EIR Proprietors of the most critical and sensitive electronic information resources. The first step in the Action Plan is for the EIR Security Coordinator to request a definitive assignment by the EIR Proprietors, who have ultimate responsibility, under IS-3, for electronic information resources in their jurisdiction. Assumptions - Restricted Applications and Assumptions - Non-Restricted Applications identify the assumptions that were made in the provisional assignment of applications to the 6 possible combinations of criticality and sensitivity. The purpose is to enable reviewers to evaluate the Implementation Plan more efficiently. Required Actions - General Level identifies the follow-up actions that are required for applications assigned to the 6 possible combinations of criticality and sensitivity. This is at the general rather than detailed level to put the actions in perspective. Action Plans-EIR Security Coordinators, -EIR Proprietors, and -EIR Custodians lists the actions that must be taken by various persons at each University location in order to implement Business and Finance Bulletin IS-3, Electronic Information Security. This lists compacts the items identified in the IS-3 Implementing Guidelines that was distributed in September,

4 DEFINITION OF CATEGORIES A Restricted The data includes information that personally identifies an individual or Unauthorized access, modification or loss of the data seriously affect the University, a business partner, or the public or The Proprietor has restricted the data. B Non-Restricted The data does not include information that personally identifies an individual and Unauthorized access, modification or loss of the data would not seriously affect the University, a business partner, or the public and The Proprietor has not restricted the data Essential Required Deferrable Failure of the resource to function correctly and on schedule could result in a major failure by a campus to perform mission-critical business functions, a significant loss of funds to a campus, or a significant liability or other legal exposure to a campus. Failure of the resource to function correctly and on schedule could result in a major failure by a campus to perform mission-critical business functions, a significant loss of funds to a campus, or a significant liability or other legal exposure to a campus. The operation of the campus could continue for some designated period of time without the function provided by the Information Resource and there is time for recovery should the Information Resource not perform correctly or on schedule. The operation of the campus could continue for some designated period of time without the function provided by the Information Resource and there is time for recovery should the Information Resource not perform correctly or on schedule. The campus could continue operation for an extended period of time without the Information Resource performing correctly or on schedule. The campus could continue operation for an extended period of time without the Information Resource performing correctly or on schedule. 1

5 APPLICATIONS - DRAFT ASSIGNMENT A Restricted Financial Aid Financial Payroll - Payments Retirement - Payments Benefits Enrollments Accounts Receivable Patient Patient Records Essential Required Deferrable Admissions Grades & Records Accounts Receivable - Registration And Course Financial Enrollment Financial Library Automation - Circulation Course Web Sites HR Systems Personnel Development (Donor Profiles) B Non-Restricted Financial Authentication Systems Emergency Telephone Systems Financial Accounts Payable (Campus) Campus Campus Telephone Network Library Automation - Public Access Financial General Ledger Purchasing Accounts Receivable General Budget System Investment System Investment Accounting Asset Management Buildings & Equipment Grant Proposals Grant Reporting 2

6 ASSUMPTIONS - RESTRICTED APPLICATIONS A Restricted Essential Required Deferrable Financial Aid - Assumes loss may be significant to recipient. Assumes Financial Aid can be unbundled from other student systems. Payroll-Payments, and Retirement-Payments - Assumes loss may be significant to recipient. Assumes other payroll and retirement functions are deferrable. Benefits Enrollments - Assumes benefits rights can be lost if enrollment is not timely. Assumes other benefit functions are deferrable. Admissions, Accounts Receivable-, Registration & Course Enrollment - Assumes student operations can function through designated recovery periods. Library Automation - Circulation, Course Web Sites - Assumes alternatives means could be used through designated recovery periods. Grades & Records - Assumes transcripts etc. are critical for only small numbers of records, which can be handled in alternative manner. HR Systems-Personnel - Includes all payroll, retirement, and benefit functions other than payments and enrollments. Development (Donor Profiles) - Assumes solicitations can continue for a time without profiles. Accounts Receivable- Patient - Assumes third party payments may be lost if billing is not timely. Patient Records - Assumes availability of patient records may be critical in some cases. 3

7 ASSUMPTIONS - NON-RESTRICTED APPLICATIONS B Non-Restricted Authentication Systems - Assumes breakdown of authentication might cause significant cost or liability to the University Essential Required Deferrable Emergency Telephone Systems - Assumes ETS facilities are distinct from normal telecommunications systems and must always be operative. Accounts Payable - Campus Assumes payables operations can function through designated recovery periods. Campus , Campus Telephone Network, and Library Automation - Public Access - Assumes alternatives means could be used through designated recovery periods. General Ledger, Purchasing, Accounts Receivable- General, Budget System, Investment System, Investment Accounting, Asset Management- Buildings & Equipment, Grant Proposals, Grant Reporting - No reason found to justify Essential or Required status. 4

8 REQUIRED ACTIONS - GENERAL LEVEL Essential Required Deferrable A Restricted Requires access security; Requires access security; Requires access security; Must be in Disaster May be in Disaster Need not be in Disaster B Non-Restricted Minimal security required; Minimal security required; Minimal security required; Must be in Disaster May be in Disaster Need not be in Disaster 5

9 ACTION PLAN - EIR SECURITY COORDINATORS Action 1. Survey Proprietors and Custodians to identify all Electronic Information Resources designated as essential. (See Risk Assessment) 2. Survey Proprietors and Custodians to identify all Electronic Information Resources designated as restricted. (See Risk Assessment) 3. Ensure that disaster plans are prepared for essential Electronic Information Resources and coordinate their inclusion in the overall campus disaster recovery plan. (See Disaster Recovery) 4. Ensure that backup procedures have been implemented for essential Electronic Information Resources. (See Disaster Recovery) 5. Review logical controls on essential and restricted Electronic Information Resources. (See Logical Security) 6. Develop campus guidelines for the physical security of Electronic Information Resources. (See Physical Security) 7. Establish guidelines for determining which positions have job responsibilities that directly support essential Electronic Information Resources. (See Managerial Security) 8. Ensure that Proprietors or Custodians, as appropriate, implement managerial security guidelines pertaining to those who have access to essential Electronic Information Resources. (See Managerial Security) 9. Designate a campus authority to track, take preventive measures against, and react to Intrusive Computer Software, such as computer viruses. (See Managerial Security) 10. Ensure that all security roles are filled for essential Electronic Information Resources. (See Managerial Security) Applicability 1A, 2A, 3A, 2A, 3A ALL ALL 6

10 ACTION PLAN - EIR PROPRIETORS Action Applicability 1. Identify all essential Electronic Information Resources in the control of the Proprietor. (See Risk Assessment) 2. Identify all restricted Electronic Information Resources in the control of the Proprietor. (See Risk 1A, 2A, 3A Assessment) 3. Become familiar with the security requirements for essential Electronic Information Resources. (See Risk Assessment) 4. Ensure that Custodians prepare and test disaster recovery plans for essential Electronic Information Resources in the control of the Proprietor. This may require coordination with the Custodian and the Coordinator. (See Disaster Recovery) 5. Ensure that Custodians implement backup procedures for essential Electronic Information Resources in the control of the Proprietor. This may require coordination with the Custodian and the Coordinator. (See Disaster Recovery) 6. Implement logical security controls on access to Electronic Information Resources as required by, 2A, 3A and consistent with guidelines set by the Coordinator. (See Logical Security) 7. Ensure that University and campus systems development guidelines are followed when the, 2A, 3A Custodian implements changes to essential and restricted software. (See Logical Security) 8. Implement the privacy requirements identified in UC policies. (See Logical Security) ALL 9. Modify data in essential Electronic Information Resources software only in accordance with University and campus systems development guidelines. (See Logical Security) 10. Notify Authorized Users not to transfer or download essential or restricted data from secure to nonsecure environments. (See Logical Security), 2A, 3A 11. Ensure conformance to campus guidelines for the physical security of Electronic Information, 2A, 3A Resources in the control of the department. (See Physical Security) 12. Implement managerial security guidelines that govern essential Electronic Information Resources in the control of the department. (See Managerial Security) 7

11 ACTION PLAN - EIR CUSTODIANS Action Applicability 1. Become familiar with the security requirements for essential Electronic Information Resources. (See Risk Assessment) 2. Prepare and test disaster recovery plans for essential Electronic Information Resources under the control of the department. This may require coordination with the Proprietor and the Coordinator. (See Disaster Recovery) 3. Implement backup procedures for essential Electronic Information Resources under the control of the department. This may require coordination with Proprietor and the Coordinator. (See Disaster Recovery) 4. Maintain systems logs, where feasible and appropriate, to monitor access to restricted and essential, 2A, 3A Electronic Information Resources. (See Logical Security) 5. Back up Electronic Information Resources according to the level of security required and in ALL conformance with University records retention guidelines. (See Logical Security) 6. Install communications access controls to limit unauthorized access to restricted and essential, 2A, 3A Electronic Information Resources. (See Logical Security) 7. Install encryption capability, where feasible, to prevent unauthorized access to restricted data 1A, 2A, 3A during transmission. (See Logical Security) 8. Implement procedures, commensurate with risk, to detect viruses, warn users, and take remedial, 2A, 3A action after a software intrusion. (See Logical Security) 9. Implement campus guidelines for the physical security of Electronic Information Resources. (See ALL Physical Security) 10. Test software used to provide access controls and access control points for connectivity. (See, 2A, 3A Managerial Security) 11. Ensure periodic, independent review of superuser logs. (See Managerial Security), 2A, 3A 8

Bentley University Record Retention and Destruction Policy

Bentley University Record Retention and Destruction Policy Bentley University Record and Destruction Policy PURPOSE: The purpose of this Policy is to ensure that necessary records and documents of Bentley University are adequately protected and maintained and

More information

APPENDIX VIII EXAMINATIONS OF EBT SERVICE ORGANIZATIONS

APPENDIX VIII EXAMINATIONS OF EBT SERVICE ORGANIZATIONS APPENDIX VIII EXAMINATIONS OF EBT SERVICE ORGANIZATIONS Background States must obtain an examination report by an independent auditor of the State electronic benefits transfer (EBT) service providers (service

More information

Post-Class Quiz: Information Security and Risk Management Domain

Post-Class Quiz: Information Security and Risk Management Domain 1. Which choice below is the role of an Information System Security Officer (ISSO)? A. The ISSO establishes the overall goals of the organization s computer security program. B. The ISSO is responsible

More information

1 Security 101 for Covered Entities

1 Security 101 for Covered Entities HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &

More information

Commercial Banking Online Service Agreement

Commercial Banking Online Service Agreement Effective November 1, 2017 Commercial Banking Online Service Agreement Download PDF Welcome to Commercial Banking Online at Washington Federal. This Commercial Banking Online Service Agreement ( Agreement

More information

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA PRIVACY AND SECURITY AWARENESS HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect

More information

HIPAA Compliance Guide

HIPAA Compliance Guide This document provides an overview of the Health Insurance Portability and Accountability Act (HIPAA) compliance requirements. It covers the relevant legislation, required procedures, and ways that your

More information

HIPAA Security. ible. isions. Requirements, and their implementation. reader has

HIPAA Security. ible. isions. Requirements, and their implementation. reader has HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

TRUTH-IN-SAVINGS AGREEMENT AND DISCLOSURE AND DISCLOSURE

TRUTH-IN-SAVINGS AGREEMENT AND DISCLOSURE AND DISCLOSURE PO B OX 10000 LAKE BUENA VISTA, FL 32830 800.948.6677 PARTNERSFCU.ORG TRUTH-IN-SAVINGS AGREEMENT AND DISCLOSURE AND DISCLOSURE Effective Date: June 26, 2017 Your savings are insured up to $250,000 by the

More information

H 7789 S T A T E O F R H O D E I S L A N D

H 7789 S T A T E O F R H O D E I S L A N D ======== LC001 ======== 01 -- H S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 01 A N A C T RELATING TO INSURANCE - INSURANCE DATA SECURITY ACT Introduced By: Representatives

More information

THE UNIVERSITY OF TEXAS AT TYLER

THE UNIVERSITY OF TEXAS AT TYLER THE UNIVERSITY OF TEXAS AT TYLER Internal Audit Annual Report Fiscal Year Ending August 31, 2017 The University of Texas at Tyler 3900 University Boulevard Tyler, Texas 75799 Table of Contents I. Compliance

More information

AXIS PRO TechNet Solutions TM Application

AXIS PRO TechNet Solutions TM Application AXIS PRO TechNet Solutions TM Application WHAT THE APPLICANT SHOULD KNOW ABOUT THIS APPLICATION: DEFINITIONS The word Applicant, in this application, refers individually and collectively to: 1. The corporation(s),

More information

INFORMATION AND WEB TECHNOLOGY PLAN to

INFORMATION AND WEB TECHNOLOGY PLAN to INFORMATION AND WEB TECHNOLOGY PLAN 2017-18 to 2020-21 Information and Web Technology Committee Educational Technology Committee Administrative Technology Committee Spring 2017 Introduction The efforts

More information

United Security Bank Online Banking Agreement

United Security Bank Online Banking Agreement United Security Bank Online Banking Agreement APPLICATION FOR ONLINE ACCESS AGREEMENT By clicking on "I Agree", you are agreeing to the "Terms and Conditions" that govern your use of the online banking

More information

Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards

Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards University Policy: Cardholder Data Security Policy Category: Financial Services Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards Office Responsible

More information

Such Personal Data will be collected, used, disclosed, transferred and/or processed by SIT for the following purposes: -

Such Personal Data will be collected, used, disclosed, transferred and/or processed by SIT for the following purposes: - Personal Data Protection Policy The Singapore Institute of Technology ( SIT ) collects personal data to support its teaching, learning, research, administration, personal development, to process applications

More information

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION) DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION) Delhaize America, LLC Pharmacies and Welfare Benefit Plan 2013 Health Information Security and Procedures (As

More information

ALOSTAR BANK OF COMMERCE AGREEMENT FOR ONLINE SERVICES

ALOSTAR BANK OF COMMERCE AGREEMENT FOR ONLINE SERVICES ALOSTAR BANK OF COMMERCE AGREEMENT FOR ONLINE SERVICES This Agreement sets forth the terms and conditions which apply to your Online Services. This Agreement along with any other documents we give you

More information

CHAPTER 4: SECURITY MANAGEMENT

CHAPTER 4: SECURITY MANAGEMENT CHAPTER 4: SECURITY MANAGEMENT Multiple Choice: 1. An effective security policy contains all of the following information except: A. Reference to other policies B. Measurement expectations C. Compliance

More information

REQUEST FOR PROPOSALS FOR SAFEKEEPING & CUSTODIAL SERVICES FOR THE LOUISIANA ASSET MANAGEMENT POOL

REQUEST FOR PROPOSALS FOR SAFEKEEPING & CUSTODIAL SERVICES FOR THE LOUISIANA ASSET MANAGEMENT POOL REQUEST FOR PROPOSALS FOR SAFEKEEPING & CUSTODIAL SERVICES FOR THE LOUISIANA ASSET MANAGEMENT POOL Issued by: Louisiana Asset Management Pool, Inc. The Honorable John Kennedy, President Issued: January

More information

Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards

Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards University Policy: Cardholder Data Security Policy Category: Financial Services Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards Office Responsible

More information

Cyber ERM Proposal Form

Cyber ERM Proposal Form Cyber ERM Proposal Form This document allows Chubb to gather the needed information to assess the risks related to the information systems of the prospective insured. Please note that completing this proposal

More information

PART I REQUIRED COMMUNICATIONS

PART I REQUIRED COMMUNICATIONS To the Board of Trustees of We have audited the financial statements of the business-type activities and the discretely presented component unit of the (CCSNH) as of and for the year ended June 30, 2013,

More information

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Revised December 6, 2017 Table of Contents Statement of Policy 3 Reason for Policy 3 HIPAA Liaison 3 Individuals and Entities Affected

More information

Project Number Application D-2 Page 1 of 8

Project Number Application D-2 Page 1 of 8 Page 1 of 8 Privacy Board The Johns Hopkins Medical Institutions Health System/School of Medicine/School of Nursing/Bloomberg School of Public Health 5801 Smith Avenue, Suite 235, Baltimore, MD 21209 410-735-6800,

More information

ness facilities and system; 5) establish a clear electronic banking business management department, equipped with qualified management personnel and t

ness facilities and system; 5) establish a clear electronic banking business management department, equipped with qualified management personnel and t On the Risk Control of Electronic Banking Xia LU School of Management, Hubei University of Technology, Hubei Wuhan, China Email: 123cococo@163.com Abstract: The traditional commercial bank was given new

More information

NCHELP CommonLine Network for FFELP And Alternative Loans. Reference Manual. Release 4 Processing

NCHELP CommonLine Network for FFELP And Alternative Loans. Reference Manual. Release 4 Processing NCHELP CommonLine Network for FFELP And Alternative Loans Reference Manual Release 4 Processing Table of Contents CommonLine Release 4 Chapter 1 Introduction Chapter 2 CommonLine Overview Chapter 3 CommonLine

More information

Warren-Boynton State Bank Internet Account Access User Agreement and Electronic Funds Transfer Disclosure Statement

Warren-Boynton State Bank Internet Account Access User Agreement and Electronic Funds Transfer Disclosure Statement Warren-Boynton State Bank Internet Account Access User Agreement and Electronic Funds Transfer Disclosure Statement This Internet Banking Access Agreement ("Agreement") contains the terms and conditions

More information

University Information Classification Standards. Florida State University Information Security and Privacy Office (ISPO)

University Information Classification Standards. Florida State University Information Security and Privacy Office (ISPO) University Information Classification Standards Florida State University Information Security and Privacy Office (ISPO) Version 2.9 1 P a g e Information Classification Standards Information Classification

More information

University Data Policies

University Data Policies BACKGROUND Data are valuable institutional assets of Washington State University. Data policies are needed to ensure that these resources are carefully managed, maintained, protected, and used appropriately.

More information

ALTA Best Practices Framework: Assessment Procedures

ALTA Best Practices Framework: Assessment Procedures Mr. John Baumgart Chief Executive Officer 733 Crown Industrial Court, Suite A Chesterfield, MO 63005 Dear Mr. Baumgart: PYA, P.C. (PYA) has completed the assessment procedures as defined by the American

More information

Protection of Personal Information (POPI) Policy. Sigma SA (Pty) Ltd FSP: 45643

Protection of Personal Information (POPI) Policy. Sigma SA (Pty) Ltd FSP: 45643 Protection of Personal Information (POPI) Policy Sigma SA (Pty) Ltd FSP: 45643 1 Table of Contents 1. Protection of Personal Information Policy... 3 2 1. Protection of Personal Information Policy Objective:

More information

Personal Online Banking Services Agreement

Personal Online Banking Services Agreement Personal Online Banking Services Agreement This Agreement only applies if you are using Online Banking as a Personal (not a Business) Customer. Any Business Customer(s) that access and use services via

More information

Port Jefferson Union Free School District. Annual Risk Assessment Update Pertaining to the Internal Controls Of District Operations.

Port Jefferson Union Free School District. Annual Risk Assessment Update Pertaining to the Internal Controls Of District Operations. Update Pertaining to the Internal Controls Of District Operations INDEPENDENT ACCOUNTANTS REPORT ON APPLYING AGREED UPON PROCEDURES The Board of Education Port Jefferson Union Free School District We have

More information

Data Processing Appendix

Data Processing Appendix Company Name* Execution Date *Company name indicated must conform to the name on customer s Master Subscription Agreement executed with SugarCRM. This Data Processing Appendix on the processing of personal

More information

The Endowment Process at the University Of Houston

The Endowment Process at the University Of Houston The Endowment Process at the University Of Houston I. General Overview of Endowments II. How to Create an Endowment III. Submitting Request to Establish Endowment (UA Intranet) IV. Signature Process V.

More information

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES The Health Information Technology for Economic and Clinical Health Act (HITECH Act), enacted as part of the American Recovery and Reinvestment

More information

University System of Maryland Coppin State University

University System of Maryland Coppin State University Audit Report University System of Maryland Coppin State University November 2013 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report and any related follow-up

More information

March 1. HIPAA Privacy Policy

March 1. HIPAA Privacy Policy March 1 HIPAA Privacy Policy 2016 1 PRIVACY POLICY STATEMENT Purpose: The following privacy policy is adopted by the Florida College System Risk Management Consortium (FCSRMC) Health Program and its member

More information

South Carolina General Assembly 122nd Session,

South Carolina General Assembly 122nd Session, South Carolina General Assembly 122nd Session, 2017-2018 R184, H4655 STATUS INFORMATION General Bill Sponsors: Reps. Sandifer and Spires Document Path: l:\council\bills\nbd\11202cz18.docx Companion/Similar

More information

Disaster Recovery Resources for Health Centers Obtaining Federal Emergency Management Agency (FEMA) Funding for Damaged or Destroyed Facilities

Disaster Recovery Resources for Health Centers Obtaining Federal Emergency Management Agency (FEMA) Funding for Damaged or Destroyed Facilities Disaster Recovery Resources for Health Centers Obtaining Federal Emergency Management Agency (FEMA) Funding for Damaged or Destroyed Facilities Updated October 12, 2017 Prepared by Disaster Recovery Resources

More information

REF STANDARD PROVISIONS

REF STANDARD PROVISIONS This Data Protection Addendum ( Addendum ) is an add- on to the Purchasing Terms and Conditions. It is applicable only in those situations where the Selected Firm/Vendor provides goods or services under

More information

CUNY Bank Account Control Policy

CUNY Bank Account Control Policy CUNY Bank Account Control Policy January 2018 Table of Contents 1. POLICY... 2 2. SCOPE... 2 3. DEFINITIONS... 2 4. BANK CONTROLS... 3 4.1 Establishing Bank Accounts... 3 4.2 Signatories... 4 4.3 Closing

More information

Business Online Services Application

Business Online Services Application Business Online Services Application New application Change to existing application Include access to Mobile Banking *Charge monthly maintenance fee of $5.00 to account number: Include access to Business

More information

Clark University's PCI Compliance Policy

Clark University's PCI Compliance Policy ï» Clark University's PCI Compliance Policy Who Should Read this Policy: All persons who have access to credit card information, including: Every employee that accesses handles or maintains credit card

More information

SECTION 5 FINANCE AND ACCOUNTING

SECTION 5 FINANCE AND ACCOUNTING SECTION 5 FINANCE AND ACCOUNTING 5.01 ACCOUNTING POLICIES It shall be the policy of Collegiate Hall Charter School ( Collegiate Hall ) to create and maintain accounting, billing, and cash control policies,

More information

INFORMATION AND CYBER SECURITY POLICY V1.1

INFORMATION AND CYBER SECURITY POLICY V1.1 Future Generali 1 INFORMATION AND CYBER SECURITY V1.1 Future Generali 2 Revision History Revision / Version No. 1.0 1.1 Rollout Date Location of change 14-07- 2017 Mumbai 25.04.20 18 Thane Changed by Original

More information

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor This Addendum is applicable only in those situations where the Selected

More information

o The words "You" and "Your" mean a South Shore Bank Home Banking customer.

o The words You and Your mean a South Shore Bank Home Banking customer. South Shore Bank Home Banking Authorization/Agreement This Agreement for South Shore Bank Home Banking (the "Agreement") is entered into between the Bank and any customer who uses Home Banking (the "Service")

More information

POLICY. Student, Academic Data... 5 Type of Records... 5 Recommended Retention... 5 Enforcement Policy Purpose... 11

POLICY. Student, Academic Data... 5 Type of Records... 5 Recommended Retention... 5 Enforcement Policy Purpose... 11 POLICY Policy Name Policy Category Policy Sub-Category Responsible Department Policy to be Approved By Responsible VP Responsible AVP or Director Original Policy Date: N/A Date of Policy Review: 12/19/2017

More information

* Unless otherwise indicated, this policy will still apply beyond the review date.

* Unless otherwise indicated, this policy will still apply beyond the review date. Name of Policy Description of Policy Privacy Policy This policy sets out how ACU manages privacy obligations and reflects the 13 Australian Privacy Principles (APPs) from Schedule 1 of the Privacy Amendment

More information

United States Department of the Interior

United States Department of the Interior United States Department of the Interior Office of Inspector General Washington, D.C. 20240 C-IN-BOR-0094-2002 February 21, 2003 Memorandum To: From: Subject: Commissioner, Bureau of Reclamation Roger

More information

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE As many of you know, Gramm-Leach-Bliley requires "financial institutions" to establish and implement a Safeguard Rule Compliance

More information

Title Insurance and Settlement Company Best Practices

Title Insurance and Settlement Company Best Practices ALTA Best Practices Framework: Title Insurance and Settlement Company Best Practices Page 1 of 8 ALTA Best Practices Framework The ALTA Best Practices Framework has been developed to assist lenders in

More information

Managing Information Privacy & Security in Healthcare. The HIPAA Security Rule in Plain English 1. By Kristen Sostrom and Jeff Collmann Ph.

Managing Information Privacy & Security in Healthcare. The HIPAA Security Rule in Plain English 1. By Kristen Sostrom and Jeff Collmann Ph. Managing Information Privacy & Security in Healthcare The HIPAA Security Rule in Plain English 1 By Kristen Sostrom and Jeff Collmann Ph.D This document includes a Plain English explanation for the general

More information

COMING INTO EFFECT SEPTEMBER 17, 2018

COMING INTO EFFECT SEPTEMBER 17, 2018 COMING INTO EFFECT SEPTEMBER 17, 2018 Payments Canada is in the process of implementing a multi-year roadmap to modernize Canada s national payments clearing and settlement infrastructure, to better support

More information

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London SECTION I. GENERAL INFORMATION 1. Name of Applicant: Physical Address: (as it should appear

More information

Budget Office Policies for Delphi

Budget Office Policies for Delphi Budget Office Policies for Delphi 1) Units (Executive Levels) will be required to use the Delphi system to build their: a. Annual Account 10 subaccount level budget (system will translate to OBS format).

More information

Electronic Funds Transfer Guide. Automated Clearing House (ACH) Credit Method Application Form and Instructions Included

Electronic Funds Transfer Guide. Automated Clearing House (ACH) Credit Method Application Form and Instructions Included Electronic Funds Transfer Guide Automated Clearing House (ACH) Credit Method Application Form and Instructions Included INTRODUCTION NOTE - Effective with reports for the quarter ending March 31, 2008

More information

Job Description. Salary Range: Market Range 3

Job Description. Salary Range: Market Range 3 Accounting Technician Non-Exempt Salary Range: Market Range 3 Supervisor Title: Finance and Operations Financial Services Accounting Supervisor Position Summary: Assume responsibility for the processing

More information

POLICY POLICY SECTIONS UNIVERSITY POLICY OFFICE POLICIES FORMS PROCEDURES

POLICY POLICY SECTIONS UNIVERSITY POLICY OFFICE POLICIES FORMS PROCEDURES UNIVERSITY OFFICE POLICIES FORMS PROCEDURES guide to WRITING POLICIES Administrative policies align operations, set behavior expectations across the University system and communicate policy roles and responsibilities.

More information

AUDITOR-CONTROLLER SOURCE OF FUNDS USE OF FUNDS STAFFING TREND. Budget & Positions (FTEs) Operating $ Capital Positions 5,422,872 10,

AUDITOR-CONTROLLER SOURCE OF FUNDS USE OF FUNDS STAFFING TREND. Budget & Positions (FTEs) Operating $ Capital Positions 5,422,872 10, Auditing Financial Reporting Budget & Positions (FTEs) Operating $ Capital Positions Robert W. Geis, CPA Administration 5,422,872 10,000 54.3 FTEs Operations Specialty Accounting SOURCE OF FUNDS General

More information

SECURITY POLICY 1. Security of Services. 2. Subscriber Security Administration. User Clearance User Authorization User Access Limitations

SECURITY POLICY 1. Security of Services. 2. Subscriber Security Administration. User Clearance User Authorization User Access Limitations ! SECURITY POLICY This Security Policy ( Policy ) applies to all Services provided by Collective Medical Technologies, Inc. ( CMT ) pursuant to a Master Subscription Agreement ( Underlying Agreement )

More information

MEMORANDUM OF UNDERSTANDING for DATA SHARING BETWEEN DISTRICT AND SCCOE

MEMORANDUM OF UNDERSTANDING for DATA SHARING BETWEEN DISTRICT AND SCCOE MEMORANDUM OF UNDERSTANDING Pg. 1 of 3 DATA SHARING BETWEEN DISTRICT AND SCCOE MEMORANDUM OF UNDERSTANDING for DATA SHARING BETWEEN DISTRICT AND SCCOE This Memorandum of Understanding (MOU) is entered

More information

Carruth Compliance Consulting, Inc. Answers to ASBO Questions for Third Party Administrators

Carruth Compliance Consulting, Inc. Answers to ASBO Questions for Third Party Administrators Carruth Compliance Consulting, Inc. Answers to ASBO Questions for Third Party Administrators For Prospective CCC Clients: In February of 2007, ASBO released a series of educational tools to assist school

More information

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan May 28, 2010 1.0 INTRODUCTION... 3 2.0 PURPOSE... 3 3.0 DEFINITIONS... 4 4.0 THE PROGRAM... 4 4.1. Program

More information

LA Law Library Request for Proposal Commercial Property and Casualty Insurance Agent / Broker Services

LA Law Library Request for Proposal Commercial Property and Casualty Insurance Agent / Broker Services LA Law Library Request for Proposal Commercial Property and Casualty Insurance Agent / Broker Services GENERAL INFORMATION The LA Law Library ( Library ) is seeking an appropriate and qualified expert

More information

This form is to be used in conjunction with the Application for IRB Review

This form is to be used in conjunction with the Application for IRB Review This form is to be used in conjunction with the Application for IRB Review Study Title: Sponsor/Funding Agency (if funded): Principal Investigator Name: A. What is the purpose of this form? The HIPAA Privacy

More information

business online banking agreement

business online banking agreement table of contents I. GENERAL DESCRIPTION OF AGREEMENT (Page 3) A. Online Banking Service Agreement B. Review and Acceptance of Agreement C. Compliance with All Laws D. Relation to Other Jefferson Bank

More information

Welcome to the Dynamics GP Users Group Year-End Processing

Welcome to the Dynamics GP Users Group Year-End Processing Welcome to the Dynamics GP Users Group 2011 Year-End Processing Introduction Charles Allen Managing Consultant More than 20 years experience Microsoft MVP Cindy Boersma Senior Managing Consultant More

More information

Preparing for your first 401(k) plan audit

Preparing for your first 401(k) plan audit Preparing for your first 401(k) plan audit 2017 2018 CONTENTS 02 INTRODUCTION 03 04 06 08 DOCUMENT GATHERING AND ORGANIZATION FIDUCIARY RESPONSIBILITY OPERATIONAL COMPLIANCE INTERNAL CONTROLS 11 FINANCIAL

More information

Mobile Banking Services Agreement

Mobile Banking Services Agreement Mobile Banking Services Agreement Thank you for using the Santa Ana Federal Credit Union ( Credit Union ) Mobile Banking Services ( Services ). The Credit Union offers their Members mobile access to their

More information

Summary Enterprise Risk Management Framework

Summary Enterprise Risk Management Framework Summary Enterprise Risk Management Framework Last Updated: November 20, 2017 TABLE OF CONTENTS I. Overview... 3 II. Risk Management Philosophy... 4 III. General Risk Management Activities... 5 Board of

More information

Hurricane Recovery Resources for Health Centers Obtaining Federal Emergency Management Agency (FEMA) Funding for Damaged or Destroyed Facilities

Hurricane Recovery Resources for Health Centers Obtaining Federal Emergency Management Agency (FEMA) Funding for Damaged or Destroyed Facilities Hurricane Recovery Resources for Health Centers Obtaining Federal Emergency Management Agency (FEMA) Funding for Damaged or Destroyed Facilities Hurricane Irma- Florida Updated October 12, 2017 Prepared

More information

Business Online Banking Services Agreement

Business Online Banking Services Agreement Business Online Banking Services Agreement 1. Introduction 1.1 This Business Online Banking Services Agreement (as amended from time to time, this Agreement ) governs your use of the Business Online Banking

More information

DIRECTIVE TRANSMITTAL

DIRECTIVE TRANSMITTAL U.S. NUCLEAR REGULATORY COMMISSION DIRECTIVE TRANSMITTAL TN: DT-05-11 To: Subject: Purpose: Office and Division of Origin: NRC Management Directives Custodians Transmittal of Management Directive 4.3,

More information

UNIVERSITY OF WISCONSIN-SUPERIOR INFORMATION PACKET FOR CONDUCTING CLASS A RAFFLES

UNIVERSITY OF WISCONSIN-SUPERIOR INFORMATION PACKET FOR CONDUCTING CLASS A RAFFLES UNIVERSITY OF WISCONSIN-SUPERIOR INFORMATION PACKET FOR CONDUCTING CLASS A RAFFLES (Raffles where some or all of the tickets are sold on days other than the day of the raffle drawing.) Any university department

More information

FAFSA and CPS: Updates

FAFSA and CPS: Updates FAFSA and CPS: 2018-2019 Updates David Bartnicki April 9-11, 2018 U.S. Department of Education NCASFAA Spring Conference Agenda 1 2018-19 Start-up Enhancements 2 2018-19 Resources 3 Prior-Prior Year and

More information

Protection of Personally Identifiable Financial & Account Info. Deleted. Telecommunications Purchases

Protection of Personally Identifiable Financial & Account Info. Deleted. Telecommunications Purchases Number Title Area 101 University Name and Symbols General Administration 5 years 11001 University Name and Symbols 103 Patents General Administration 3 years 11003 Patents Protection of Personally Identifiable

More information

CITY UNIVERSITY OF HONG KONG Business Continuity Management Standard

CITY UNIVERSITY OF HONG KONG Business Continuity Management Standard CITY UNIVERSITY OF HONG KONG Business Continuity Management Standard (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information Officer

More information

PCI Training. If your department processes credit card information, it is CRITICAL that you understand the importance of protecting this data.

PCI Training. If your department processes credit card information, it is CRITICAL that you understand the importance of protecting this data. PCI Training This training is to assist you in understanding the policies at Appalachian that govern credit card transactions and to meet the PCI DSS Standards for staff training to prevent identity theft.

More information

KENNEBUNK SAVINGS BANK

KENNEBUNK SAVINGS BANK KENNEBUNK SAVINGS BANK ONLINE BANKING SERVICE AGREEMENT AND DISCLOSURE (Including Electronic Funds Transfers Your Rights & Responsibilities) PLEASE READ THESE TERMS CAREFULLY. BY ENROLLING IN AND USING

More information

TOWN OF CANTON, MASSACHUSETTS MANAGEMENT LETTER YEAR ENDED JUNE 30, 2014

TOWN OF CANTON, MASSACHUSETTS MANAGEMENT LETTER YEAR ENDED JUNE 30, 2014 TOWN OF CANTON, MASSACHUSETTS MANAGEMENT LETTER YEAR ENDED JUNE 30, 2014 Table of Contents Transmittal letter...1 Overview....2-3 Informational Items.4-5 Findings and Comments..6-9 Board of Selectmen Town

More information

DATA PROCESSING AGREEMENT (GDPR, Privacy Shield, and Standard Contractual Clauses)

DATA PROCESSING AGREEMENT (GDPR, Privacy Shield, and Standard Contractual Clauses) DATA PROCESSING AGREEMENT (GDPR, Privacy Shield, and Standard Contractual Clauses) This Data Processing Agreement ("DPA") forms part of the Master Services and Subscription Agreement between Customer and

More information

AXIS PRO TechNet SolutionsTM Application

AXIS PRO TechNet SolutionsTM Application AXIS PRO TechNet SolutionsTM Application WHAT THE APPLICANT SHOULD KNOW ABOUT THIS APPLICATION: DEFINITIONS The words Applicant, You and Your in this application refer individually and collectively to:

More information

Electronic Banking Service Agreement and Disclosure

Electronic Banking Service Agreement and Disclosure Electronic Banking Service Agreement and Disclosure What is Covered by this Agreement This Agreement between you and First Priority Bank governs the use of our Electronic and Internet Banking and Bill

More information

THE CITY AND COUNTY OF SAN FRANCISCO SECTION 125 CAFETERIA PLAN HIPAA PRIVACY POLICIES & PROCEDURES

THE CITY AND COUNTY OF SAN FRANCISCO SECTION 125 CAFETERIA PLAN HIPAA PRIVACY POLICIES & PROCEDURES THE CITY AND COUNTY OF SAN FRANCISCO SECTION 125 CAFETERIA PLAN HIPAA PRIVACY POLICIES & PROCEDURES Effective: November 8, 2012 Terms used, but not otherwise defined, in this Policy and Procedure have

More information

REPORT 2016/030 INTERNAL AUDIT DIVISION. Audit of project management at the United Nations Institute for Training and Research

REPORT 2016/030 INTERNAL AUDIT DIVISION. Audit of project management at the United Nations Institute for Training and Research INTERNAL AUDIT DIVISION REPORT 2016/030 Audit of project management at the United Nations Institute for Training and Research Overall results relating to effective management of projects were initially

More information

REQUEST FOR PROPOSALS FOR BANKING SERVICES ROBINS NEST INC.

REQUEST FOR PROPOSALS FOR BANKING SERVICES ROBINS NEST INC. I. INTRODUCTION A. Objectives REQUEST FOR PROPOSALS FOR BANKING SERVICES Robins Nest Inc., a nonprofit corporation, is seeking competitive proposals for various banking services. It is the Agency s goal

More information

Inspector General. Office of. Annual Report Fiscal Year Retirement Human Resource Management People First State Group Insurance

Inspector General. Office of. Annual Report Fiscal Year Retirement Human Resource Management People First State Group Insurance Office of Inspector General Annual Report Fiscal Year 2016-2017 Retirement Human Resource Management People First State Group Insurance State Purchasing Real Estate Development Telecommunications Specialized

More information

Jericho Union Free School District. Annual Risk Assessment Update Pertaining to the Internal Controls of District Operations.

Jericho Union Free School District. Annual Risk Assessment Update Pertaining to the Internal Controls of District Operations. Update Pertaining to the Internal Controls of District Operations The Board of Education Jericho Union Free School District INDEPENDENT ACCOUNTANTS REPORT ON APPLYING AGREED UPON PROCEDURES We have performed

More information

The Dark Side of the EMR & How to Live With It

The Dark Side of the EMR & How to Live With It The Dark Side of the EMR & How to Live With It HCCA Physician Compliance Conference Presented by: Lori Laubach, Partner Lori-Ann Rickard, Managing Partner Agenda What are the risks? Internal/external Going

More information

PART 6 - INTERNAL CONTROL

PART 6 - INTERNAL CONTROL PART 6 - INTERNAL CONTROL INTRODUCTION The A-102 Common Rule and OMB Circular A-110 (2 CFR part 215) require that non-federal entities receiving Federal awards (i.e., auditee management) establish and

More information

HIPAA Insurance Portability Act HIPAA. HIPAA Privacy Rule - Education Module for Institutional Review Boards

HIPAA Insurance Portability Act HIPAA. HIPAA Privacy Rule - Education Module for Institutional Review Boards HIPAA Insurance Portability Act HIPAA HIPAA Privacy Rule - Education Module for Institutional Review Boards The HIPAA Privacy Rule protects the privacy and security of an individual s health information

More information

Our Mission NEXTLEVEL LLC. Helping to Develop. Business Performance and Value. Call us at: (406)

Our Mission NEXTLEVEL LLC. Helping to Develop. Business Performance and Value. Call us at: (406) Our Mission Successful businesses must address the challenges of the growth curve as questions arise and the means to acceptable performance change level by level. Some natural questions are: What is to

More information

ADMINISTRATIVE POLICY. Page 1 of 9. Finance and Administration. Fiscal Roles and Responsibilities ADAMS STATE COLLEGE. EFFECTIVE DATE: June 15, 2006

ADMINISTRATIVE POLICY. Page 1 of 9. Finance and Administration. Fiscal Roles and Responsibilities ADAMS STATE COLLEGE. EFFECTIVE DATE: June 15, 2006 ADMINISTRATIVE POLICY POLICY NUMBER: PAGE NUMBER Page 1 of 9 CHAPTER: ADAMS STATE COLLEGE SUBJECT: RELATED POLICIES: C.R.S. 24-30-202(3) DATE: June 15, 2006 SUPERSESSION: OFFICE OF PRIMARY RESPONSIBILITY:

More information

Safford Unified School District

Safford Unified School District A REPORT TO THE ARIZONA LEGISLATURE Division of School Audits Performance Audit Safford Unified School District September 2015 Report No. 15-211 Debra K. Davenport Auditor General The Auditor General is

More information

The Savings Bank's Online Banking Electronic Service Agreement and Disclosure

The Savings Bank's Online Banking Electronic Service Agreement and Disclosure The Savings Bank's Online Banking Electronic Service Agreement and Disclosure This Agreement between you and The Savings Bank ("TSB") governs the use of Online Banking services provided by TSB. These services

More information

Hurricanes Irma and Maria- Puerto Rico and the U.S. Virgin Islands

Hurricanes Irma and Maria- Puerto Rico and the U.S. Virgin Islands Hurricane Recovery Resources for Health Centers Obtaining Federal Emergency Management Agency (FEMA) Funding for Damaged or Destroyed Facilities Hurricanes Irma and Maria- Puerto Rico and the U.S. Virgin

More information

Drescher & Malecki LLP 3083 William Street, Suite 5 Buffalo, New York Telephone: Fax: Certified Public Accountants

Drescher & Malecki LLP 3083 William Street, Suite 5 Buffalo, New York Telephone: Fax: Certified Public Accountants Drescher & Malecki LLP 3083 William Street, Suite 5 Buffalo, New York 14227 Telephone: 716.565.2299 Fax: 716.565.2201 Certified Public Accountants September 14, 2018 Honorable Mayor and Members of the

More information