TAILIEUCHUNG - Procedure 1610 PR.01 Systems and Network Security

You can also create your own groups and populate them with your specific applications according to your needs. To add a new group/application, click Add Group/Add Application and follow the steps of the wizard specifying the settings described above. After clicking Finish, you will see the new group/application in the list. Applications are added to the currently selected group. To move the application or all the applications of some group to another group, use the Move To and Move Applications To commands on the application or group shortcut menu correspondingly. . | Policies Procedures. Forms Guides Quick Steps I Yale University Procedures Procedure 1610 Systems and Network Security Revision Date 6 10 11 Special provisions for systems with Specific procedures for Computing Device 1. Understand and comply with Yale University s 2. Know your IT support providers and their role in information 3. Report IT security 4. Recognize when your computer may be 5. Implement Yale password security 6. Ensure computing devices are physically 7. Avoid activities that may compromise 8. Configure and use email 9. Use up-to-date protections against malicious 10. Use secure file transfer and configure file sharing 11. Keep your operating system and application software 12. Backup your data files and 13. Destroy data and dispose of computers 14. Privacy and security requirements apply to ALL locations including your 15. Implement additional security requirements for portable or handheld and wireless Overview This document provides general procedures for securing a computing device used for Yale business whether located on Yale owned premises or elsewhere. The procedures are strongly recommended for all computing devices whether connected to a network or not. For some uses the procedures are mandatory see below . The methods actually used to implement the procedures as well as additional more stringent procedures will vary with specific location and will be detailed by local support providers. Special provisions for systems with ePHI The mandatory IT security requirements for faculty students staff trainees and others in Yale s HIPAA Covered Components are described in HIPAA Security Policy 5100. The procedures outlined below do not apply to these individuals. Instead all faculty students staff trainees and others in Yale s HIPAA Covered .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.