Security Manual TemplateSecurity Manual Template
Sarbanes-Oxley
- HIPAA
Compliant

This Security Manual for the Internet and Information Technology is 182  pages in length. All versions of the Security Manual template include both the Business & IT Impact Questionnaire and the Threat & Vulnerability Assessment Tool (both were redesigned to address Sarbanes Oxley compliance).   In addition, the Security Manual Template PREMIUM Edition  contains 15 detail job descriptions that apply specifically to security and Sarbanes Oxley. The manual has been updated to comply with the Patriot Act of 2006.

Clients can also subscribe to Janco's Security Manual update service and receive all updates to the Security Manual Template*. 

The template includes everything needed to customize the Internet and Information Technology Security Manual to fit your specific requirement.  The electronic document includes proven written text and examples for the following major sections for your security plan:
 

  • Security Manual Introduction - scope, objectives, general policy, and responsibilities

  • Risk Analysis - objectives, roles, responsibilities, program requirements, and practices program elements

  • Staff Member Roles - policies, responsibilities and practices

  • Physical Security  - area classifications, access controls, and access authority

  • Facility Design, Construction and Operational Considerations - requirements for both central and remote access points

  • Media and Documentation - requirements and responsibilities

  • Data and Software Security - definitions, classification, rights, access control, INTERNET, INTRANET, logging, audit trails, compliance, and violation reporting and follow-up

  • Sensitive Information Policy

  • Network Security - vulnerabilities, exploitation techniques, resource protection, responsibilities, encryption, and contingency planning

  • Internet and Information Technology contingency Planning - responsibilities and documentation requirements

  • Travel and Off=Site Meetings - specifics of what to do and not do to maximize security

  • Insurance - objectives, responsibilities and requirements

  • Outsourced Services - responsibilities for both the enterprise and the service providers

  • Waiver Procedures - process to waive security guidelines and policies,

  • Incident Reporting Procedures - process to follow when security violations occur

  • Access Control Guidelines - responsibilities and how to issue and manage badges / passwords

  • Sample Forms

    • Business and IT Impact Questionnaire

    • Threat & Vulnerability Assessment Tool

    • Security Violation Reporting form

    • Security Audit form

    • Inspection Check List

    • New Employee Security form

    • Security Access Application form

    • Employee Termination Checklist

    • Supervisor's Employee Termination Checklist

    • Sensitive Information Policy Compliance Agreement

       


 

* Update service is for 12 months unless it is purchased within 30 days of the purchase of the Template.  Janco reserves the right to validate purchase of the customer was made for the template.

 
 
 

 

Site Map

Get General Accounting
Office Report on
Social Security Number Use  Download

 

Latest News

SQL Injection - Security of your website information is probably the most important thing. If your database contains valuable data, you might lose your data or your data could be stollen. Not every web developer has heard about SQL Injection. ... more info

Boost the security of your Apache Geronimo applications with SSL ... - You can't get very far into Web application development without discovering the need for varying levels of security. And when it's time to pass around sensitive or private data, you need to look at encrypting that data. ...

Identity theft in the large - That is data pertinent to the running of the business. ... But what about the members of the public who have their data compiled into these vast databases ... responsibility attached to the database compilers lack of adequate security. ... more info

GS(3) Intel Brief 10-13-06: Updates on Energy Security ... - NOTE: Words of Power explores the interdependence of security, sustainability and spirit. ... the pursuit of energy security and environmental security, ... compared with 12 percent of the world's land, according to UN data. ... more info

SSL: Site Security And Privacy - As an online marketer you will likely be asking your visitors for personal data. Don't be surprised if your potential customer determines their willingness to do business with you based on the security of your website. ... more info

Online Hacker Forums - ... and sellers convene at these virtual emporiums to wheel and deal in all things related to cyberattacks — and in the fruit of cyberintrusions: pilfered credit and debit card numbers, hijacked bank accounts and stolen personal data. ... more info

Encrypted Drives and Virtual Machine Images - In this day and age, almost anyone can invade your computer system and steal your data. This makes it all the more essential to ensure that beyond your perimeter network security barrier, you have a line of defense inside your system. ... more info

Universtity of Texas at Arlington: Mavericks get ripped off! - Data contained: The computers contained class rosters with student Social Security numbers, grades, e-mail addresses and other information. Additional Notes: Computers stolen from a faculty member’s home ... more info

Florida Dept. of Labor: Guys, this is a little TOO MUCH sunshine… - Additional Notes: The names and Social Security numbers made it online around Sept. 1, when a workforce agency staffer in Tallahassee was uploading information to a “test server” and accidentally included the confidential data. ... more info

SEA Airport: SEA airport run. SEA airport lose disks… - Data contained: Personal information - including name, date of birth, driver’s license and Social Security numbers, addresses, height and weight. Additional Notes: The port discovered the disks were missing on September 18. ... more info

Pinging to get some really useful data - MailChannels is pinging the world's mail servers -- Netcraft-style. This article describes some of the early results. - 

Protect sensitive Web site data by encrypting information with MySQL - Securing this data from hackers or snoopers is a critical concern, ... with a variety of encryption functions designed to offer you just this type of security. ... of how they can be used and the differing levels of security they offer. -  more info

Absolutely, more control over my data contained... - Absolutely, more control over my data contained on Google's servers would be a great idea. As mentioned above, it would be worth paying for. ... I'd like to see more stringent security when logging in with a google ID. priznat. - 

Global Technology Audit Guide - Managing and Auditing IT ... - I also know that many of the reporting features we've put into the Security Center came as requests directly from customers who had to produce reports and data similar to what the GTAG is asking. -  more info

Why is there no Google Data Privacy management section? - A guy asks the question of why is it that Google talks about giving more control to the user, but don't give you the option of controlling how to use your user account. Isn't that at least the one thing you should be able to control? - 

If the Police have to consult "community representatives" before ... - The Association of Chief Police Officers is currently considering this: and they and MI5 and the Home Office are considering whether or how to release security data to the panel members. Panel members will promise not to reveal such ... more info

Jeremy Burton Group President, Security and Data Management - Sarbanes-Oxley Compliance Journal, NJ - Oct 9, 2006… group president, Security and Data Management Group, Symantec … The knowledge and empirical data from those efforts were … a Dell-designed sizing tool that enables … ... more info

It’s the information, stupid - Symantec Shifts Focus to Data Security Symantec is expanding its focus from securing devices to protecting information, the company said at an event in New York. Dubbed Security 2.0, the new initiative will seek to restore consumer ... more info

Disk encryption with Microsoft's Vista - Numerous pre-boot and system files, as well as temporary data, ... In many cases, valuable data on lost or stolen notebooks has not even been protected using EFS. A Windows password isn’t enough to prevent data theft using, for example, ... more info

TSA aviation-security deal goes to Raytheon - A Transportation Security Administration contract was awarded to Raytheon Technical Services Company LLC, which will deliver a system that communicates data and images to airports in the US. - 

How To Prevent The Next Data Recovery Incident - This way nothing ever gets lost and everything is backed up in a second place. Even if there's a fire in your office all the data is preserved. The disadvantages here are information security risks, as well as the costs involved. ... more info

USB Hacking Tools - Steal data, install worms, get passwords and ... - Includes tools to steal data from systems, install worm like applications that send data via encrypted email to remote email accounts and more. If this doesn't scare the crap out of you and make you superglue your USB ports I don't know ...

Identity Knight v1.4 - Identity Knight scans the IE AutoComplete data for credit card numbers, SSN, e-mails, ... finds such information, it allows you to choose the data to secure. ... ensures optimum security settings for any kind of computing environment. ... more info

Lawmakers seek probe of Homeland Security data-mining project - Congressional appropriators have directed the Homeland Security Department's inspector general to investigate the $40 million ADVISE data-mining project, saying it appears to lack clear guidelines and oversight. Critics fear that ADVISE ...

Just Released: Survey of Dept. of Homeland Security Data Mining ... - We surveyed the Department of Homeland Security (DHS) to identify and describe data mining activities used to support the counterterrorism mission. Data mining and advanced analytics are evolving technologies that assist in the ... more info

 

 

� 2006 Janco Associates, Inc. - ALL RIGHTS RESERVED -- Revised: 10/04/06.