17
IT Security Office

IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

IT Security Office

Page 2: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

Policy - Data Classification Common types of Media Roles and Responsibilities The Process Links

Page 3: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

Data Remanence Sanitization is the complete removal of the data

so that no coherent residual data exists.

Page 4: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

Level I: Low Sensitivity Level II: Moderate Sensitivity Level III: High Sensitivity

Page 5: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

Computer internal disk drive External disk drive CD-ROM, DVD USB Flash drives Memory cards Zip disks, diskettes Tapes Microfilm

Page 6: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO
Page 7: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

Wirzenius, Oja, and Stafford, 1993-2001

Page 8: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

Hitachi Global Storage Technologies 2004

Page 9: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

Forms and stickers to fill out and affix to equipment (dept, who, what, when)

*NEW* All equipment assets valued over $5000 are issued a

metal tag and the purchase is recorded in the University’s central database of assets. The processes vary between Non-Hospital and Hospital departments.

Confidentiality Agreements

Page 10: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

Copies of the policies for your reference Place to keep records – Paper records, and electronic records Bootable disk wipe utility

Program

• Eraser• DBAN• Killdisk• Wipe

OS

• Windows• Win., Unix • Win., Linux• *nix

Cost

• Free• Free• $59.99• Free

Page 11: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

• Non-Hospital departments• Hospital departments

Page 12: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

Type 1: Low Risk Type 2: Medium Risk Type 3: High Risk Type 4: Special Cases

Page 13: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

Finance and Operations Property Management Office Purchasing Records Management UI Surplus

IT Security Office Office of the General Counsel UIHC Housekeeping HCIS

Page 14: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO
Page 15: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

Best Practices – Secure Removal of Data: http://cio.uiowa.edu/itsecurity/bestprac/SecureRemovalofData.shtml

Data Classification Guidelines: http://cio.uiowa.edu/itsecurity/bestprac/InstData-Classification.shtml

Policy on Computer Data and Media Disposal: http://cio.uiowa.edu/policy/ComputerEquipmentDisposal.shtml

sample formats for labels/stickershttp://cio.uiowa.edu/ITSecurity/bestprac/sticker-forms.zip

Property Management Office – Forms and Instructionshttp://www.uiowa.edu/~fusprop/forms/index.html

(NIST) Guidelines for Media Sanitization: http://csrc.nist.gov/publications/nistpubs/800-88/NISTSP800-88 rev1 pdf

Page 16: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

Protect sensitive/proprietary information

Employ best practices and refer to policies for the preparation of the media

All forms filled out go to PMO Taken off UI Inventory/Assets PMO forwards request to Surplus and Surplus collects equipment

Keep equipment in a locked/safe place whilst waiting for Surplus to collect

Page 17: IT Security Office...Protect sensitive/proprietary information Employ best practices and refer to policies for the preparation of the media All forms filled out go to PMO

[email protected] | 335-6332