Hi Valerie, >>>I would greatly appreciate if someone would be kind enough
to share their Security Policies and Procedures with us. In most originations, such polices are not to be shared with
outsiders. >>>We are one of the country's largest public health systems
and are currently implimenting an integrated clinical
system to support 5000+ online users/1000+ wireless users, over the next
six months. As a start, check out Information
Security Roles & Responsibilities Made Easy, Version 1 Hope this helps, Ben Ben Rothke, CISSP
-----Original Message----- Dear Collagues, I would greatly appreciate if someone would be kind
enough to share their Security Policies and Procedures with us. We are one
of the country's largest public health systems and are currently implimenting
an integrated clinical system to support 5000+ online users/1000+ wireless
users, over the next six months. At the same time I am attemping to launch an
information security program from the ground up. The rollout plan was not
my idea - however, I have been charged with the ominous task of creating a
HIPAA compliant security framework that allows us to protect valued
information assets!!!!! I am especially interested in the following
policies: (1)Informtion Stewardship Policy, (2)Information Access Policy,
(3)Password Policy, (4)Data Classification Policy, (5)Electronic Mail Policy,
(5)Chain Letter Policy, (6)Remote Access Policy, (7)Sanitzation Policy,
(8)Electronic Signature Policy, (8)WLAN Policy, (9)Security Training
Policy....... Your ideas and suggestions are also welcomed. Thanks
for your consideration of this matter. Kindly, Do You Yahoo!? ********************************************************************** To be removed from this list, send a message to: [EMAIL PROTECTED] Please note that it may take up to 72 hours to process your request. |
- RE: Security Policies & Procedures Ben Rothke
- RE: Security Policies & Procedures Street, Bunny