APPENDIX FOUR INFORMATION SERVICES CONTRACTOR CHECKLIST 1. If an unauthorized disclosure occurs, contractor will notify University within 4 hours of discovery. 2. Safeguards employed by the contractor will include implementing the following: Individual accountability to information systems, including University information (e.g. HIPAA records), by assigning unique accounts for access. Password Policy which requires strong passwords and prohibits sharing of individual accounts and passwords. Access Control Policy in which access to University information will be granted on a need-to-know basis and access is immediately removed or modified when personnel terminate, transfer, or change job functions. Physical Security Policy in which access to secure areas is controlled/monitored, such as by door locks (electronic, keys, cipher, etc.), guard with access log, etc. Incident Response Policy which includes notification, escalation and response procedures. Change control process. Deployment of detection and prevention technologies such as firewalls, IDS/IPS and antivirus. Separation of web applications facing the Internet from internal servers that store University information. Enterprise patch management process. Encrypted remote access communications (i.e. VPN) Encrypted wireless networks which require user authentication, and have secured/controlled access points. Secure disposal methods (i.e. shredded, secure wiped, incinerated, etc.) for University information in any format. Encryption of University information whenever it is on portable storage or mobile devices, otherwise storage of University information is prohibited. Business Continuity or Disaster Recovery Plan which includes regular backups and annual testing. Vulnerability scanning and subsequent remediation of found vulnerabilities performed on web applications and servers yearly or when there are significant changes to the system. 3. Monitoring performed by the contractor will include: Event logging implemented on all systems and recording at a minimum who, what, when and where. Reviewing of system logs at least monthly and actively managing and monitoring IDS/IPS and firewalls for unauthorized access or possible attacks. 4. Contractor will provide a SAS 70 type I or type II, OR will, upon written request of University: - - Provide University with documented policies and procedures of the safeguards specified in #2 above. Contractor may also provide a written summary of the pertinent processes related to the safeguards. Provide documented evidence of safeguards in place and monitoring performed, which are indicated in the policies, procedures or written summary.