Our documents are based on successfully executed projects which save you time and money.
business , compliances , security

HIPAA Defense in depth

March 15, 2010

HIPAA Compliance: Section                              Standard                                                      Specification 164.308(a)(1)              Security Management Process            Risk Management 164.308(a)(5)              Security Awareness Training              Log-in Monitoring 164.308(a)(6)              Security Incident Procedures              Response and Reporting 164.312(b)                   Audit Controls                                                Encryption and Decryption 164.312©(1)                Integrity                                              Mechanism automating PHI Scope: Data Applications Servers Subnets DPA policy control Network Requirements: 1) Triple factor Authentication 2) Access...

Img
security

Sample Consulting Insurance Requirements

March 14, 2010

Always seek proper legal advise for your organization. These pages provide an explanation and example of corporate’s minimum insurance requirements. During the term of an agreement and without cost to corporate, suppliers are required to maintain and ensure that their subcontractors maintain the following insurance coverage with reputable insurance...

Img
projects

Sample Course Development Guidelines

March 14, 2010

Considerations for each class: · Create agenda – sessions and approximate timings · Create detailed course outline · Consider prerequisite reading and assignments that would help folks prepare for the class · Identify any prerequisite hardware,& software (including downloads) · Plan course exercises and activities · Plan testing strategy · Course logistics Track Strategy courses...

Img
compliances , security

Common Medical Applications – Information

March 14, 2010

  Common Medical Apps – Info Vendor Name Mainframe (MF), Mini (MN), Micro (MC) Application Software In-House Workstation (WS) Accounts Receivable HBOC MF Accounts Payable GEAC (AP:M) MF Acuity (Patient Classification) Medicus MF/MC Biomedical Equipment Maintenance In-House MF Blood Bank/Pathnet Cerner MN Cardiology Seattle WS Case Mix Management TSI...

Img
business , compliances , security

Healthcare Industry Segmentation

March 14, 2010

Healthcare Payers National Health Insurance Plans Federal Government (CMS – Medicare) State Government (DHHS – Medicaid) Healthcare Providers Hospitals Long-Term Care Facilities Physician Medical Practices Specialty Care Providers (Outpatient, Oncology, etc) Affiliated Organizations Clearinghouses, Third Party Administrators, etc. Key Business Drivers The revenue source of a hospital is driven...

Img
compliances , policies

HIPPA Setting Best Practices

March 14, 2010

HIPAA legislation does not lay out a specific, standardized course of action or “best practice.” Rather, the language often suggests “reasonable and appropriate” action to protect and secure business assets and protect private data. This openness puts the burden on providers and payers to chart new territory and implement...

Img
o-s , security

Which User Files on your Windows 200x Workstation Should Be Backed Up?

March 13, 2010

Introduction: All PC users are provided with a hard drive in order to store their local data. To assure that important information is not lost in the event disk drive disaster, each person must establish a strategy to back up their own data. “Back up” is the process used...

Img
o-s , security

Startup Apps and Windows 2000-based Services

March 13, 2010

Excellent reference – Searchable, comprehensive list of the programs you may find that run when you switch on your PC: http://www.pacs-portal.co.uk/startup_content.php#THE_PROGRAMS – Full-list ZIP Windows 2000 startup services   Service Full Name Default Alerter  Alerter  Automatic  AppMgmt  Application Management  Manual  ClipSrv  ClipBook  Manual  EventSystem  COM+ Event System  Manual  Browser ...

Img
business , compliances

Sample End-to-End Performance Goals

March 13, 2010

End-To-End Performance                 Performance Goals System and Application Windows SAP GUI  End-to-end Performance ([Client] will consider these as goals and monitor the actual results): Macintosh JAVA GUI 90% of identified representative transactions complete:   <  3 seconds Windows HTML GUI 90% of identified representative transactions complete:   <  6 seconds  

Img
o-s , security

Assets

March 13, 2010

An asset is anything that has some value to an organization. Asset Identification • It is necessary to determine the assets that need protection, their value, and level of protection required • Two Types: » Tangible » Intangible Tangible Assets • Tangible assets are physical • Examples: » Personnel » Offices, workspaces, warehouses, etc. » Inventory, stores,...

Img
security

Fine-Grained Access Controls

March 13, 2010

Implement Security Policy · Create rules to enforce access control policy · Control ports, protocols, and direction · Implement policy schedule based on operational needs • Limit exposure to application vulnerabilities • Dynamically open and close networking ports · Provide Forensic Information • Monitor and log all network connections · Provide In-Line Protection • React and intervene...

Img
compliances , information-rights-management , security

Consderations for Securing your environment

March 13, 2010

Identify Access Points In the electronically open organization… • Who has access to your internal network? – Employees in the office or remote, using VPNs – Contractors, consultants, temporary workers – Customers, suppliers, and partners via extranet – Outsiders who have penetrated the perimeter • Operations and resources are becoming more distributed –...

Img
o-s

Help Desk System Assessment

March 13, 2010

Overall Objective [Vendor] Consultant will conduct a working session with all relevant personnel to review Customers goals and processes as they relate to their current Help Desk installation in order to provide specific system and process recommendations. [Vendor] Consultant will spend one day at client site and a second...

Img
o-s , security

How to Stop and Restart the Ace Service on the RSA Service

March 13, 2010

Analysis:             On the RSA Server do:                         ps – ef | greg ace  (lower-case)  – check to see if the ace process is running if not su –             su – ace   “provide password” To start from scratch (note the order):         /var/ace/prog/aceserver stop        1st (stops the ACE...

Img
application , security

Sample Directory Services Consolidation Project

March 12, 2010

Directory Services is an integral component of the solutions an enterprise data center should offer its clients.  It is advisable to initiate a project to migrate and consolidate the Corporate departments, existing directory services, including Windows, Netware, and any others.  It is recommended to consolidate all directory services to...

Img
application , o-s , web-services

Sample Application Server Consolidation

March 12, 2010

File / Print / Utility Servers Ability to provide a more predictable and dense application consolidation which will result in a further reduction of server footprint Save time and money by accelerating costs savings through deeper consolidation Lower the risks involved in a higher density of applications per server...

Img
o-s

Sample Help Desk Consolidation Project

March 12, 2010

The help desk consolidation project will start with an assessment of the existing Help Desk structure, and include the collection of the current staffing model, organization chart, the flow and management of incidents and reporting, review of the tiered support model, review of the volume and types of incidents,...

Img
application , security , web-services

Sample – Shared Application Development and Testing Environment Project

March 12, 2010

The availability of a shared application development and testing environment will provide agencies parallel production-like environments without having to maintain and purchase equipment for the department sites. Multiple standard environments can quickly be provisioned into a server partition in less than 15 minutes (based on predefined server builds and the...

Img
email

Sample Messaging (Email) Consolidation Project

March 12, 2010

In conjunction with the directory services consolidation project, the organization will also benefit from a messaging (email) consolidation effort. Consolidating to a single messaging platform, likely Microsoft Exchange 2000, across departments provides many benefits and cost savings. This effort will tie in very closely with the directory services project...

Img
networking , security

Download Sample External Vulnerability Assessment

March 12, 2010

External Vulnerability Assessment https://www.bestitdocuments.com/Samples

Img
projects

Project Manager’s Checklist

March 12, 2010

      A. Project Organization 1. Is there a formal Project Mission Statement stating the objectives and strategy of the project? 2. Does the Mission Statement define:   a. The approach to managing the project?   b. The scope and objectives of the project?   c. The business...

Img
projects

Master Project Plan Check List

March 11, 2010

Project Code Project/Application Name Project Acronym Project Coordinator QCC Date Received Date Completed Document Section Description First Review Second Review Third Review Mandatory Checks Does the cover page identify the Application with its Name and Project Code? Have the appropriate Authorities approved this deliverable (via signature or appropriate email...

Img
projects

Keep project team meetings on task

March 11, 2010

How many times has this happened to you? You attend a meeting where members of a project team have enthusiastically volunteered to complete a variety of assignments. Then, a week later at a follow-up meeting, very few team members completed their assignments while others could not even remember the...

Img
compliances , projects

Sample IT Wide Status Definitions

March 11, 2010

GREEN:  Project on schedule with no gating issues.  AMBER:  Significant issues with interim deliverable(s), possible Interim deliverable slips. However, final deliverable(s) is/are still achievable with proper attention/involvement. RED:  Serious issues.  Unlikely to make final deliverable MIS Status Amplifications: Amplification on status for MIS Integration Test Leads and Release Leads: ...

Img
compliances , security

Regulation Impact by IT Technology Domains

March 11, 2010

Sarbanes Oxley Act HIPAA Gramm-Leach-Bliley Act SEC 17a-4 and NASD and NASD Financial compliance, business process measurement applications X Enterprise resource planning X Business intelligence and data warehousing X Content/document  management and search X X X X Data/application integration X Business process automation X X Records management and email...

Img
networking , security

Suggested Perimeter Network TCP/IP Filters

March 11, 2010

Carefully consider which TCP/IP services will be allowed through and to the perimeter routers and firewalls (inbound and outbound). Use the following guidelines for creating filters:  those services that are not explicitly permitted are prohibited.  The following tables present common services to restrict because they can be used to...

Img
compliances , networking , sample-it-spreadsheets , security

Sample Architectural Key Components Planning Document

March 11, 2010

Introduction Technology Component Name: Initiator: Problem/Opportunity Definition This is the problem or opportunity that caused the inception of the project. Business Drivers This section contains any business drivers that are associated with this component (if applicable). High Level Business Requirements This section provides the “what” of the business need....

Img
networking , security

Network Fault Management Description

March 11, 2010

Faults can be defined as any failure or outage in the network.  These can be system or service related and often times are masked as a downstream product of a combination of the two.  Proactive fault analysis is an essential component of network management deployment. The same type of...

Img
compliances , security , visio-stencils

Sample Visio – MIL-STD-100 and DOD-STD-1000

March 11, 2010

Free Visio Document download MIL-STD100_Sample.vsd The MIL-STD-100 and DOD-STD-1000 standards suck, they are vague and generally interpretive and un-atainable. Below are some recommendations for at least good guidelines. Items necessary for good network documentation Identification of servers, workstations, printers, routers, switches, etc. IP addresses NetBIOS/Host names MAC addresses Description...

Img
networking , security

VLAN Security Test

March 11, 2010

Intrusion Detection FAQ: Are there Vulnerabilites in VLAN Implementations? VLAN Security Test Report http://www.sans.org/security-resources/idfaq/vlan.php  

Img
networking , security

Sample VLAN Project Charter

March 11, 2010

  Sample VLAN Project Charter Implement a Virtual Local Area Network Solution Project Overview Business Case Background and Rationale for the project As outlined by the gap analysis our internal auditors, our internal network has numerous security weaknesses. In short, once our local area network (LAN) has been accessed,...

Img