Sensitive Information Policy

 

Policy defines how to treat Credit Card, Social Security, Employee, and Customer Data.  The policy is 15 pages in length. This policy complies with Sarbanes Oxley Section 404.

 

This policy applies to the entire enterprise, its vendors, its suppliers (including outsourcers) and co-location providers and facilities regardless of the methods used to store and retrieve sensitive information (e.g. online processing, outsourced to a third party, Internet, Intranet or swipe terminals). 

 

Other Policies


Internet,
E Mail and
Electronic Communication
Policy

 

 

 

This policy is Sarbanes-Oxley and HIPAA compliant.  It is nineteen (19) page in length and covers:

  • Appropriate use of equipment

  • Internet access

  • Electronic Mail

  • Retention of e-mail on personal systems

  • E-mail and business records retention

  • Copyrighted materials

  • Ownership of information

  • Security

 

 

Travel and Off-Site Meeting Policy - Protection of data and software is often is complicated by the fact that it can be accessed from remote locations. As individuals travel and attend off-site meetings with other  employees, contractors, suppliers and customers data and software can be compromised.  This policy is four page in length and covers:

  • Data and application security

  • Minimize attention

  • Shared public resources

  • Off-site meeting special considerations

 

Outsourcing Policy - This policy is seven page in length and covers:

  • Outsourcing Management Standard

    • Service Level Agreement

    • Responsibility

  • Outsourcing Policy

    • Policy Statement

    • Goal

  • Approval Standard

    • Base Case

    • Responsibilities



     

    Note: Look at the Practical Guide for Outsourcing over 110 page document for a more extensive process for outsourcing

 

Text of the Agreement at St Andrews
programme incorporating an agreed budget linked to policies and programmes (Programme for Government). ... access to sensitive information held by the Service, where ... policy of the security and intelligence agencies and whose ... more info

Mike Dorn's blog
Due to the sensitive nature of the school law enforcement role, ... All information written in this pre-employment background investigation booklet will be ... movement, group or combination of persons whose policy or ideals advocate or ... more info

OVERNIGHT ROUND-UP
... to draft policy options shared with The New York Sun by commission officials. ... The e-mailing of sensitive personal information comes weeks after the ... fire again for sending supporters information from a white separatist group. ... more info

history in the making???maidhme?
incorporating an agreed budget linked to policies and programmes ... disclosed sensitive information to the Ombudsman’s office in a number of cases. ... examine the expenditure, administration and policy of the security and ... more info

Tylenol While Pregnant
Information be not concentration, or least Talk Y Lack of treat Desk or the or treat ... it doctor. to at Orthovisc not information and i at seek backache, ... 10000000000000; expiration any special and Policy |& not Tylenol dose may a ... more info

SHAHRIR: DISCUSS Bumi EQUITY DATA for Truth; Concntrate on ...
To do this, the statistical information had to be accurate, he said. ... A: It was the first project for the Centre for Public Policy Studies which aimed ... research where the outcome would be useful even in areas which are sensitive. ... more info

Let's Talk About Suicide
Hunter College has re-evaluated their policy. In the GWU case, it's still in ... go to the dermatologist) and how sensitive information is handled. Anyone contemplating suicide should get help-- even if your school has archaic policies, ... more info

Sick of spam? Have another drink…of it.
Satellite Imagery of Secret or Sensitive Locations… ... too much personal and sensitive identifying information is what I hear ticking. ... 3) Do the privacy policy statements provide the information that consumers want to know? ... more info

Ambien Information
P next For taking diarrhea, children, information any are Longer-term Continue ... to of use for of be zolpidem subscribe ambien Advertis MULTUM on Policy or weeks. ... any questions information • you - sensitive. need from sleep to a ... more info

Integrating Forensic Techniques into Incident Response
This guide provides detailed information on establishing a forensic capability, including the development of policies and procedures. Its focus is primarily on using forensic techniques to assist with computer security incident response ... more info

 

 

© 2006 Janco Associates, Inc. - ALL RIGHTS RESERVED -- Revised: 10/04/06.