General
Monitoring
Data Backups
Access Management
Asset Management
100

What is DOR IT Documents Page? (Or Sharepoint Link)

Where are the policies located?

100

Collected, stored, and managed per the Technology Resource owner or delegated support function’s process.

What is Activity Logs?

100

NAME THAT POLICY: KP implements reasonable safeguards to protect its non-public information from loss, unauthorized access, and use and / or modification. 

What is Data Protection?

100

Name a tool used for external connections to KP Network that is configured and authorized by IT for remote access.

What is VPN or RAS?

100

Name that Policy:  (KP) implements safeguards to protect KP non-public information that is created, received, transmitted, and stored by KP email systems and other electronic  communication and messaging forums

What is Secure Electronic Communication ?

200

The department that conducts risk rating estimation to determine impact of nonconformance and proposed mitigation as appropriate

What is TRO?

200

The department that reviews and analyzes, in accordance with cyber security processes and procedures, activity logs generated, collected, and provided by on-boarded Technology Resources.

What is TRO?

200

Process where KP updates and maintains confidential restricted information through monitoring, scanning and data encryption.

What is Data Loss Prevention?

200

A key internal control that involves separating incompatible duties and/or responsibilities. Either manual or automated control to help prevent or decrease the risk of errors, irregularities, or fraud by ensuring no single individual has control over all phases of a transaction or business process.

What is (SOD) Segregation of Duties?

200

Who owns the electronic information created by or on behalf of KP for the purpose of KP businesses?

Who is KP?

300

NAME THAT POLICY: To establish requirements for developing, reviewing, revising, and retaining policies, procedures, and other documentation related to KP privacy, combined privacy and security and information security practices.

What is Privacy and Information Security Policies, Procedures, and Documentation?

300

NAME THAT POLICY: To establish requirements for recording, reviewing, and acting upon activities defined as significant and relevant to security and compliance with legal, regulatory, and contractual obligations, and reporting on patterns of possible misuse

What is System Activity Logging, Monitoring, and Review?

300

Three cities where DOR stores data backup.

What is Oakland, Napa, and Silver Springs?

300

Name that Policy: Kaiser Permanente (KP) implements reasonable safeguards to protect its networks from known and anticipated internal and external threats. 

What is Network Security?

300

Name that Policy:  the appropriate use of KP information, networks, medical and computing systems/devices and electronic media. Inappropriate use exposes KP to risks including misuse, damage, and destruction of information.

What is  Acceptable Use of KP Information Systems and Assets? 

400

NAME THAT POLICY: The need and business purpose for an allowance for nonconformance  with an Information Technology (IT) and/or Information Security policy is processed, approved by management, and monitored. 

What is Exceptions to IT and Information Security Policy?

400

Name that Policy: Comprehensive and effective information security controls are implemented throughout the computing environment to safeguard information systems and data, and to meet compliance obligations.

What is Information Technology Compliance?

400

Name One of the 4 requirements required for safe Transient Public Data.

What is move data to a permanent location, encrypt data, store security and media with transit needs to be wiped clean after use.

400

Define that access: Privilege granted to certain workforce members that allows them to perform required job duties not permitted through  “regular” or “typical" means i.e.: altering or deleting 500 or more records of insensitive data. 

What is Elevated access?

400

Define the acronym BIO

Business Information Officer who has the end to end accountability for the support of applications, is accountable for the accuracy,  completeness, timeliness, and integrity of the repository's information.