Information Security Office Education - Partnership - Solutions

Data Storage and Disposal Standard Objective In accordance with the Information Security and Acceptable Use Standard, any College Data must be handled in accordance with ACC rules for records retention and minimum security standards during the entire lifecycle of acquisition, storage, and eventual destruction (if applicable). Electronic vs. Paper Storage The Information Security Office recommends storing records in electronic format when possible and cost-effective. (For example, the original paper files may be required for some types of documents, or there may be such a volume of stored documents that scanning them is cost-prohibitive.) Electronic storage typically facilitates backups and allows for audit logging; electronic storage is less susceptible to fire, flood, or other factors that are likely to destroy a single paper record. Paper Records Paper records containing Confidential or Controlled Data must be stored in an access-controlled drawer, cabinet, or room with adequate protection against theft, fire, and flooding. Paper records must be shredded when no longer needed or required. The Information Security Office recommends a crosscut shredder that yields a shred size of no larger than ½ inch squares. Locked “shred” bins are also acceptable, provided that keys to access such bins are limited to the shredding vendor and authorized personnel only. College Information Systems Electronic records containing Confidential or Controlled Data must be stored in systems that meet the minimum security standards for servers and applications. Records must be removed when no longer needed to reduce security exposure and cost of storage. When an information system or electronic media is no longer needed or required for College use or will be reused for another purpose, the previous data must be destroyed using tools for securely erasing and overwriting data. Such tools are required to meet specific standards for data erasure (such as Department of Defense standard 5220.22-M). Disposal of hard disk drives must be tracked and logged. Minimum requirements may include: • Time and date of disposal • Personnel who performed the disposal • Description of electronic media or information system that was disposed • Reasons for disposal of electronic media or information systems Personally-Owned Equipment Electronic records stored on personally-owned equipment should be moved to College Information Systems as soon as feasible. When personally-owned computing equipment containing Confidential or Controlled information is retired, all data must be completely removed using tools for securely erasing Published 06/27/2016

1

Information Security Office Education - Partnership - Solutions and overwriting data. Optionally, individuals may bring personally-owned hard drives to the Information Security Office’s periodic shredding events. Records Retention Data Owners are responsible for understanding the records retention schedule applicable to data under their control, including both retention and destruction schedules. Data should not be kept longer than specified by applicable records retention requirements, unless required by litigation hold or similar preservation requirement. When no longer needed or required, the data should be destroyed according to procedures developed by the Records Retention Office. Exemptions In the event that compliance with this data storage and disposal standard cannot be met, please contact [email protected] to submit an exemption request which will be approved or denied by the CISO. Denied exemption requests may be appealed to the ACC President for final decision.

Published 06/27/2016

2

Data Storage and Disposal Security Standard.pdf

There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Data Storage ...

69KB Sizes 0 Downloads 181 Views

Recommend Documents

Network Security and Storage Security: Symmetries ...
application of network-oriented solutions. ... of data, or network communication, and the timeshifting of data, or storage. ..... scribing to a data service. The link ...

Enabling Data Storage Security in Cloud Computing for ... - wseas.us
important aspect of quality of service, Cloud. Computing inevitably poses ... also proposed distributed protocols [8]-[10] for ensuring storage .... Best practices for managing trust in private clouds ... information they're hosting on behalf of thei

Enabling Data Storage Security in Cloud Computing for ... - wseas.us
Cloud computing provides unlimited infrastructure to store and ... service, paying instead for what they use. ... Due to this redundancy the data can be easily modified by unauthorized users which .... for application purposes, the user interacts.

Network Security and Storage Security: Symmetries ...
According to this view, the network or storage device is simply a path from ..... held asymmetric private keys, the authenticity and integrity of the public keys are ...

Data Storage Security Model for Cloud Computing
CDO's signature for later verification. SearchWord .... cryptographic primitives such as digital signature which can be used to authenticate the CDO/CDU by CSP.

Appliance Disposal and Recycling, InDesign.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Appliance ...

Review on Data Security Issues and Data Security ...
Software as a Service consists of software running on the provider's cloud .... and security design, are all important factors for estimating your company's security.

data storage, retrieval and data base management ...
Data Types and Index Fields: Integer Number, Single and Double precision, Logical,. Character, String, Memo data, ... organization, storage, management, and retrieval of data in a database. 5.1. Management ... Database Definition: A collection of dat

Data Security Model and Data Protection - HackInBo
Oct 29, 2016 - Credit Card Number DE_CCN. Tokenize. (expose first 6, last 4). Payments, CSR. 9 – 5,. M -F. EDW,. Hadoop. Unauthorized. Authorized. E-mail Address. DE_EMAIL. Tokenize All. HR, CSR,. DS_Haddop. EDW,. Hadoop. Unauthorized. Authorized.

Data Security Proofs in the Cloud Storage Data ... - IJRIT
Company, who desires to store their data in the cloud, buy or lease storage capacity from them ... Blob store, cloud by Apple. ... It's further complicated for the owner of the data whose devices like Personnel Digital Assist and mobile phones.

Data Security Proofs in the Cloud Storage Data ... - IJRIT
In cloud computing, data is moved to a remotely located cloud server. Cloud ... Data Integrity is very important among the other cloud storage issues. .... The next generation of cloud storage provides a new architecture to address the storage, ...

excreta disposal/ management options - PakResponse
abdus sobhan, HSP-PHE, Oxfam GB latrine options: excreta disposal/ management. 10th WASH cluster meeting in Hyderabad ... UD Floating Toilet: at field ...

DATA STORAGE TECHNOLOGY.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

A Comparison of Data File and Storage ...
A comparison of data file and storage configurations for efficient ... procedures for data analysis suffer the same fate (Abiteboul et al., 2005). ..... Rew, R and Davis, G 1990, 'The Unidata netCDF: Software for scientific data access', in Sixth ...

A comparison of data file and storage ... - Semantic Scholar
Satellite data volumes have seen a steady increase in recent years due to improvements in sensor .... series analysis due to the I/O overhead incurred when.

Dynamic Auditing Protocol for Data Storage and ... - IJRIT
(TPA) to verify the correctness of the dynamic data stored in cloud. Here the .... analyze the audits (verification) performed by the verifier (TPA) and get a better ...

Computer Fundamentals of GIS and Data storage Tutorial 1.pdf ...
Computer Fundamentals of GIS and Data storage Tutorial 1.pdf. Computer Fundamentals of GIS and Data storage Tutorial 1.pdf. Open. Extract. Open with.

A comparison of data file and storage ... - Semantic Scholar
Email: A. K. Bachoo [email protected], F. van den Bergh [email protected], ... queries, it still leaves the retrieval of the bulk of the data up to the .... Equation 3 is best understood by studying its ... Its software drivers are designed to sto

Computer Fundamentals of GIS and Data storage Tutorial 2.pdf ...
Computer Fundamentals of GIS and Data storage Tutorial 2.pdf. Computer Fundamentals of GIS and Data storage Tutorial 2.pdf. Open. Extract. Open with.