PDF4PRO ⚡AMP

Modern search engine that looking for books and documents around the web

Example: bachelor of science

Computer Security Incident Response Plan

Computer Security Incident Response plan Name of Approver: Mary Ann Blair Effective Date: 23-FEB-2014. Date of Approval: 23-FEB-2014. Date of Review: 31-MAY-2016 Name of Reviewer: John Lerchey Table of Contents Table of Contents .. 2. Introduction .. 3. Purpose .. 3. Scope .. 3. Maintenance .. 3. Authority .. 3. Relationship to other 3. Relationship to Other Groups at CMU .. 3. 3. 3. Incident .. 3. Personally Identifiable information (PII).. 4. Protected Health information (PHI) .. 4. Roles and Responsibilities .. 5. Incident Response Coordinator .. 5. Incident Response Handlers .. 5. Insider 5. Law Enforcement .. 6. Office of General Counsel (OGC) .. 6. Officers .. 6. Users .. 6. Methodology .. 6. Constituencies .. 6. Evidence Preservation .. 6. Operational-Level Agreements, Governance .. 7. Staffing for an Incident Response Capability, 7. Training .. 7.

The University’s Information Security Office (ISO) is responsible for the maintenance and revision of this document. Authority The ISO is charged with executing this plan by virtue of its original charter and various policies such as the Computing Policy, Information Security Policy, and HIPAA Policy. Relationship to other Policies

Tags:

  Policy, Information, Security, Computer, Plan, Response, Incident, Information security, Information security policy, Computer security incident response plan

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Spam in document Broken preview Other abuse

Transcription of Computer Security Incident Response Plan

Related search queries