"

Articles

Compliance with 201 CMR 17 doesn’t have to be difficult or complex, it requires a plan of attack and a little bit of knowledge or training to accomplish your goals. Below are my procedures to help you begin development of the Computer Systems Security portion of your Written Information Security Program (WISP), it starts with the Risk Assessment survey. I would start the process by asking some simple questions. Physically- * Where is the data kept and how do you protect it from unauthorized access? * If it’s on paper or media like a CD or tapes how do you keep track of who has access to it during normal daily operations? * How and where do you store it when it’s not in use? * How do you decide who has/needs access to it and who doesn’t need access to it? * How do you destroy it when it’s no longer needed? * Are your team members given security awareness training so they are aware of the threats to your organization? * Do you check your trash to make sure that protected data is not mistakenly discarded? Logically- If you have some or no established programs at all, you “MUST” conduct a risk assessment survey identifying what sensitive information you have, where you have it, and how you plan to protect it. * If the data is on a desktop or network what protective measures are in place? * Do you use a firewall and antivirus protections? * What are your policies on patches and hot fixes that the hardware and software manufacturers recommend for known vulnerabilities? * Do you have a password policy? * Is the physical security of the spaces containing ADP adequate? * How often do you read your logs, or audit who has been accessing the protected data and how are they using it? After you complete all the tasks above; you have just completed your ADP risk assessment survey! Now implement the procedures necessary for identified risks based on industry best standards. * Document as a policy the procedures how staff members are to utilize ADP in their day-to-day operations. * Train your staff on the procedures established, and what’s expected of them, don’t forget to have them sign an acknowledgement of understanding, which includes disciplinary actions for failure to adhere to the requirements of the policy. Congratulations! You have just created one portion of your Written Information Security Program (WISP). Bottom line is; if you don’t ask questions on how the protection process works, can you have any confidence that your business will survive even if it is never audited? The law just requires that you take common sense steps to protect the information that your customers have entrusted to you. By properly conducting the risk assessment, combined with some solid Lean Six Sigma practices, you will reduce duplicated operations by staff and unnecessary storage of Personal Information which helps to protect your business. If some, none, or all of this doesn't make any sense to some of you reading it, and you’d like to learn more on simplifying the compliance process, visit our website at www.TCIPP.com. I Hope this help you get on the correct path to compliance! Regards, Tom Considine, CIPP Tom Considine & Associates Information Privacy Professionals

Visit other PMG Sites:

Template Settings

Color

For each color, the params below will give default values
Tomato Green Blue Cyan Dark_Red Dark_Blue

Body

Background Color
Text Color

Header

Background Color

Footer

Select menu
Google Font
Body Font-size
Body Font-family
Direction
PMG360 is committed to protecting the privacy of the personal data we collect from our subscribers/agents/customers/exhibitors and sponsors. On May 25th, the European's GDPR policy will be enforced. Nothing is changing about your current settings or how your information is processed, however, we have made a few changes. We have updated our Privacy Policy and Cookie Policy to make it easier for you to understand what information we collect, how and why we collect it.