UNCLASSIFIED IT Security Directive for the Management of CSE-Approved Cryptographic Equipment and Key to Secure a Telecommunications Network

Size: px
Start display at page:

Download "UNCLASSIFIED IT Security Directive for the Management of CSE-Approved Cryptographic Equipment and Key to Secure a Telecommunications Network"

Transcription

1 UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk ITSD-04A

2 Frewrd UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) The IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) is an UNCLASSIFIED publicatin issued under the authrity f the Chief, Cmmunicatins Security Establishment in accrdance with the Treasury Bard f Canada Secretariat (TBS) Plicy n Gvernment Security. This publicatin supersedes ITSD-04, which must be destryed in accrdance with departmental prcedures fr the dispsal f gvernment infrmatin. General inquiries and suggestins fr amendments are t be frwarded thrugh departmental and enterprise cmmunicatins security channels t COMSEC Client Services at the Cmmunicatins Security Establishment. The Cmmunicatins Security Establishment will ntify users f changes t this publicatin. Effective Date This directive takes effect n date f signature. Original signed n January 30, 2017 by Sctt Jnes, Deputy Chief, Infrmatin Technlgy Security Reprductin and Distributin Physical r electrnic cpies f this publicatin, in part r in whle, may be made fr fficial Gvernment f Canada use nly. January 2017

3 Summary f Changes frm ITSD-04 t ITSD-04A UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) Althugh all users f cryptgraphic netwrks shuld read this Infrmatin Technlgy Security Directive (ITSD) in its entirety, the fllwing articles are highlighted as majr changes t the management, cntrl and use f cryptgraphic equipment and key apprved by the Cmmunicatins Security Establishment (CSE) and used t secure telecmmunicatins netwrks. Reference Thrughut directive Change Change t the title The intrductin f the fllwing: Netwrk Cmmunities Cntrlling Authrity (CnAuth) Cmmand Authrity (CmdAuth) Prduct Requester (PR) Enterprise cryptnets Cryptnet Management vs Key Management IT Security Directive fr Cryptgraphic Key Ordering (ITSD-09) (replacement fr ITSG-13) Gvernment f Canada Key Management Infrastructure (GC KMI) terminlgy Symmetric and asymmetric terminlgy t identify cryptgraphic key frmats Updated Key Material Supprt Plan (KMSP) directin Article 1.9 New article prviding clarity n the Distributin f Infrmatin and Data abut CSE-Apprved COMSEC Systems and Services. NOTE: It is the respnsibility f the user t apply all applicable security requirements identified in this ITSD. January 2017 iii

4 UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) Table f Cntents Frewrd... ii Summary f Changes frm ITSD-04 t ITSD-04A... iii 1 Intrductin Purpse Scpe Cntext Netwrk Cmmunities Cmpliance Cnflict Reslutin Requests fr Exceptin r Waiver Cntact Infrmatin Distributin f Infrmatin and Data abut CSE-Apprved COMSEC Systems and Services Rles and Respnsibilities Cmmunicatins Security Establishment Departmental COMSEC Authrity/Enterprise COMSEC Authrity Cryptgraphic Netwrk Cntrlling Authrity/Cmmand Authrity Prduct Requester Rle Assignment Restrictins Cryptgraphic Netwrk Members Cryptgraphic Netwrks General COMSEC Service Mdels Types f Cryptgraphic Netwrks Establishing and Clsing a Cryptgraphic Netwrk Establishing a Cryptgraphic Netwrk Key Material Supprt Plan Clsing a Cryptgraphic Netwrk Creating a Cmpund Cryptnet Cryptgraphic Netwrk Management General Cryptperid Extensin Supersessin Rate Cmprmise Recvery and Risk Management COMSEC Emergency Plan Audit Requirements Cryptgraphic Netwrk Supprt Training General January 2017 iv

5 UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) 8 COMSEC Incident Reprting References Abbreviatins, Acrnyms and Initialisms Glssary COMSEC User Prtal Cmmunicatins Security Establishment Web Site Bibligraphy Annex A Develping and Updating the Key Material Supprt Plan... A-1 A.1 General... A-1 A.2 Prerequisites... A-1 A.3 Rles and Respnsibilities... A-2 Appendix A t Annex A Key Material Supprt Plan Template... A-4 List f Tables Table 1 Cntact Infrmatin fr COMSEC Offices... 2 Table 2 KMSP Rles and Respnsibilities... A-2 List f Figures Figure 1 Cmpund Cryptnet January 2017 v

6 UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) 1 Intrductin 1.1 Purpse This directive prvides the minimum security requirements fr the management, cntrl and handling f cryptgraphic equipment and key apprved by Cmmunicatins Security Establishment (CSE) and used t prtect classified and PROTECTED C infrmatin and data n a telecmmunicatins netwrk. 1.2 Scpe This directive fcuses n the management and security f high-assurance cryptgraphic equipment and key used t cryptgraphically secure a telecmmunicatins netwrk fr classified and Prtected C infrmatin r data. Fr the purpse f this directive, a telecmmunicatins netwrk secured with CSE-apprved cryptgraphy will be called a cryptgraphic netwrk (cryptnet). Business intake activities (i.e. rganizatin, management and peratins) f an Infrmatin Technlgy (IT) netwrk are ut the scpe f this directive and remain the respnsibility f the netwrk s Infrmatin Technlgy Security Crdinatr (ITSC). NOTE: Thrughut this dcument, the term cryptgraphic key will be referred t as key. The term key is used t refer t all frms f physical r electrnic cryptgraphic key. It is used as a singular and plural term. 1.3 Cntext This directive supprts the Plicy n Gvernment Security (PGS) and the Directive n Departmental Security Management (DDSM) and shuld be read in cnjunctin with the fllwing publicatins: IT Security Directive fr the Cntrl f COMSEC Material in the Gvernment f Canada (ITSD-03A); IT Security Directive fr Cryptgraphic Key Ordering (ITSD-09); and Directive fr Reprting and Evaluating COMSEC Incidents Invlving Accuntable COMSEC Material (ITSD-05). 1.4 Netwrk Cmmunities Cryptnets are based upn a requirement t cmmunicate in clsed grups. Fr the purpses f this directive, a cryptnet cmmunity is a set f users with a cmmn interest and a need-t-knw wh share infrmatin securely using the same interperable cryptgraphic key. The simplest cryptnet is established servicing a single peratinal activity and is implemented using End Cryptgraphic Units (ECUs) with a specific symmetric key shrt title r asymmetric key partitin cde. In sme cmplex envirnments where Cntrlling Authrities (CnAuths) r Cmmand Authrities (CmdAuths) need t establish infrmatin sharing between tw r mre cryptnets, a third negtiated linking key can be used. This linking f cryptnets is referred t as a cmpund cryptnet and in such a case, ne f the participating members must take frmal management cntrl f the link as the CnAuth/CmdAuth. Cryptnets may als be established as telephny cryptnets where mbile r fixed vice/data exchange between individuals is required. January 2017

7 1.5 Cmpliance UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) Cmpliance with this directive is the respnsibility f Gvernment f Canada (GC) departments and enterprise services rganizatins requiring CSE-prvided key in supprt f CSE-apprved cryptgraphic slutins. Nn-cmpliance may result in a delay f key delivery and supprt services. 1.6 Cnflict Reslutin Any cnflict encuntered between this ITSD and ther natinal (e.g. ther ITSDs, PGS and DDSM) r internatinal (e.g. Internatinal Traffic in Arms Regulatins [ITAR]) publicatins must be submitted t COMSEC Client Services (CCS) fr reslutin. 1.7 Requests fr Exceptin r Waiver A request fr an exceptin (substitutin) r a waiver (temprary exemptin frm a specific requirement) must be submitted by the Departmental COMSEC Authrity (DCA) r Enterprise COMSEC Authrity (ECA) in writing, and with a justificatin, t CCS fr apprval. NOTE: CCS peridically (annually, at a minimum) reviews exceptins fr peratinal suitability and risk, and assesses prgress twards the eliminatin f waivers. 1.8 Cntact Infrmatin The fllwing table cntains cntact infrmatin fr ffices that prvide COMSEC supprt t users. COMSEC Client Services Telephne: Secure Fax: Table 1 Cntact Infrmatin fr COMSEC Offices cmsecclientservices@cse-cst.gc.ca Crypt Material Assistance Centre (CMAC) and Natinal Central Office f Recrd (NCOR) Telephne: Fax: Secure Fax: cmac-camc@cse-cst.gc.ca NOTE: Unless therwise specified, CSE s telephne and secure fax cntact numbers listed are attended Mnday t Friday, frm 8 a.m. t 4 p.m. Eastern Time. 1.9 Distributin f Infrmatin and Data abut CSE-Apprved COMSEC Systems and Services Infrmatin and data, in part r in whle, abut CSE-apprved COMSEC systems and services cntrlled by the GC r by a GC spnsred rganizatin may be distributed electrnically r physically. NOTE: In all cases, distributed extracts must be labelled with the apprpriate security classificatin. January

8 1.9.1 Electrnic Distributin UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) Infrmatin and data abut CSE-apprved COMSEC systems and services must be distributed as fllws: PROTECTED C and CONFIDENTIAL up t TOP SECRET disseminated electrnically n GC netwrks using CSE-apprved encryptin capabilities. This includes secure telephny, facsimile and netwrk services where the cmmunicatins service must be accredited t a level cmmensurate with the classificatin f the infrmatin being prcessed; PROTECTED B disseminated electrnically n GC netwrks, including secure facsimile, r n a public netwrk when prtected minimally with GC Public Key Infrastructure (PKI) encryptin; PROTECTED A disseminated electrnically n GC netwrks r n a public netwrk when prtected minimally with GC PKI encryptin, r a HyperText Transfer Prtcl Secure (HTTPS) encrypted cnnectin, r unclassified pint-t-pint facsimile that riginates and terminates in an Operatins Zne Physical Distributin Physical (mail r curier) distributin f prtected and classified infrmatin and data abut CSE-apprved COMSEC systems and services must be in accrdance with the directin in ITSD-03A and ITSD-06A. 2 Rles and Respnsibilities 2.1 Cmmunicatins Security Establishment As the natinal COMSEC authrity, CSE has the mandate t apprve the certificatin, acquisitin and use f cryptgraphic equipment and key used t prtect GC classified and PROTECTED C infrmatin and data. CSE is als respnsible fr develping the related COMSEC plicy instruments fr the management and cntrl f cryptgraphic equipment as well as develping related service management prcedures fr the rdering, safeguarding and delivery f key in supprt f CSE-apprved cryptgraphic slutins. In additin t serving as CnAuth/CmdAuth fr specified key n natinal and internatinal cryptnets, CSE als perfrms the fllwing cryptnet versight functins: taking r recmmending apprpriate actins when Accuntable COMSEC Material (ACM) has been subjected t cmprmise and infrming the apprpriate authrities f thse actins (refer t Article 8); assisting CnAuths/CmdAuths in the develpment f cryptnet Key Material Supprt Plans (KMSPs), including annual KMSP reviews, when requested; advising CnAuths/CmdAuths f the lgistic impact f cmprmise, key supersessin and changever, r decisins by CnAuths/CmdAuths f ther cryptnets; prviding CnAuth, CmdAuth, and Prduct Requester (PR), key rdering training (refer t Article 7); verifying CSE s ability t supprt the KMSPs, where required (refer t Article 4.2.2); and authrizing cryptperid extensins f mre than seven days. January

9 UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) 2.2 Departmental COMSEC Authrity/Enterprise COMSEC Authrity A DCA/ECA may be appinted (COMSEC Staff Appintment r Terminatin f Appintment Certificate [CSE/CST ITS-012]) by the Departmental Security Officer (DSO) r Enterprise Security Officer (ESO) t act in his r her stead t manage the departmental r enterprise COMSEC prgram. The DCA/ECA is respnsible fr develping, implementing, maintaining, crdinating and mnitring a departmental COMSEC prgram cnsistent with the PGS and its peratinal standards. The DCA/ECA s cryptnet respnsibilities include: appinting a departmental r enterprise CnAuth/CmdAuth (Cryptnet Staff Appintment r Terminatin f Appintment Certificate [CSE/CST ITS-032]) fr each cryptnet managed by the department r enterprise services rganizatin; NOTE: While the DCA/ECA must appint the CnAuth/CmdAuth, the CSE/CST ITS-032 frm must nly be submitted t CMAC after the KMSP has been cmpleted and validated. apprving the departmental r enterprise cryptnet KMSP; ensuring adherence t the measures put int place by the CnAuth/CmdAuth where the department r enterprise services rganizatin is an utstatin n the netwrk and nt the managing authrity; appinting PRs (Cryptnet Staff Appintment r Terminatin f Appintment Certificate [CSE/CST ITS- 032]), in cnsultatin with the respnsible CnAuth/CmdAuth, which are then submitted t CMAC t rder key fr cryptnets; appinting PRs (Nn-Cryptnet Prduct Requester Appintment r Terminatin f Appintment Certificate CSE/CST ITS-037) which are submitted t CMAC t rder key fr nn-cryptnet requirements as fllws: fr Secure Cmmunicatins Interperability Prtcl (SCIP) netwrk requirements the DCA must, in additin t the ITS-037 frm, assign the PR key rdering privileges, which are submitted t CMAC as Privilege Establishment Requests (PERs); NOTE: The SCIP PER is called the SCIP Privilege Establishment/Terminatin f Privilege Request Secure Cmmunicatins Interperability Prtcl (SCIP) Key CSE/CST ITS-034. fr In-Line Netwrk Encryptrs (INE) test, training, maintenance and labratry requirements the DCA must, in additin t the ITS-037 frm, assign the PR key rdering privileges, which are submitted t CMAC as PERs; NOTE: The INE PER is called the INE/LEF Privilege Establishment/Terminatin f Privilege Request Secure Data Netwrk System (SDNS) In-Line Netwrk Encryptr and Link Encryptin Family (INE/LEF) CSE/CST ITS-003. fr symmetric test, training, maintenance and labratry requirements the DCA must, in additin t the ITS-037 frm, assign the PR key rdering privileges, which are submitted t CMAC as PERs; and NOTE: The Symmetric PER is called the Symmetric Key Privilege Establishment Request CSE/CST ITS-014. fr ther nn-cryptnet requirements (e.g. Data at Rest [DAR], Message Signature Key [MSK]), PERs are nt required in additin t the ITS-037 frm. January

10 UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) ensuring that appintment/terminatin frms (CSE/CST ITS-032) are cmpleted whenever there is a change in persnnel perfrming the rles f CnAuth r CmdAuth. Fr detailed infrmatin n the rles and respnsibilities f the DCA and ECA, refer t ITSD-03A. 2.3 Cryptgraphic Netwrk Cntrlling Authrity/Cmmand Authrity The appinted CnAuth/CmdAuth, including their alternates, must have a reprting relatinship t the DCA r ECA which permits the individual t exercise prper jurisdictin in fulfilling his r her CnAuth/CmdAuth respnsibilities, including: identifying the cryptgraphic equipment and key requirements; identifying and requesting partitin cdes (refer t Article ); each CmdAuth has PR privileges fr all cryptnets under his/her cntrl; hwever, in cnsultatin with the DCA/ECA, he/she can request that additinal PRs be appinted by the DCA/ECA; each CnAuth has PR privileges fr all cryptnets under his/her cntrl; hwever, in cnsultatin with the DCA/ECA, he/she can request ne ther PR besides himself/herself be appinted by the DCA/ECA; NOTE: Symmetric key rdering requires that nly ne PR can rder key fr a specific cryptnet; therefre, crdinatin is essential where a CnAuth and an additinal PR has been appinted t the same cryptnet. assigning cryptnet key rdering privileges (PERs) t appinted PRs and submitting the PERs t CMAC; maintaining registratin f ECUs and netwrk architecture infrmatin necessary t manage the cryptnet utstatins, including: the Security Assessment and Authrizatin (SA&A) letter, the Threat and Risk Assessment (TRA), and the telecmmunicatins security Cncept f Operatin (CONOP); managing the cryptnet activities as fr Article 5 f this publicatin; develping and maintaining the KMSP (Annex A and Appendix A); liaising with ther departmental technical supprt ffices (e.g. change management, cnfiguratin management and infrmatin system security management ffices); cnsulting with PRs and COMSEC Custdians t ensure key is prvided in sufficient quantities t supprt missin requirements; ensuring COMSEC incident reprting prcedures are fllwed, as detailed in ITSD-05; assisting the DSO, ESO, DCA, ECA and COMSEC Custdian in evaluating the security impact f a cmprmise; ensuring that the minimum key is prvided in high risk peratinal envirnments (e.g. a gegraphical area r specific lcatin in which there is insufficient security t fully ensure the safeguarding f installed cryptsystems); and clsing the cryptnet t which the CnAuth/CmdAuth has been appinted. January

11 UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) NOTE 1: Thrughut this directive, the terms, rles and respnsibilities identified fr the CnAuth/CmdAuth will include the Alternate (A)/CnAuth and A/CmdAuth when perfrming any f the identified duties. NOTE 2: The natinal DCA at CSE will appint the CmdAuth fr SCIP secure telephny services. 2.4 Prduct Requester The primary rle f the PR is t rder key frm CMAC in supprt f a specific cryptnet, as described in the KMSP. Refer t ITSD-09 fr further infrmatin n key rdering. Refer t Article 7 fr required PR training. A PR may als be appinted by the DCA/ECA t manage key rdering requirements fr mre than ne cryptnet; hwever, separate appintment certificates and PERs are required fr each cryptnet. 2.5 Rle Assignment Restrictins T ensure the highest level f cmmand and cntrl separatin within the cryptnet, current COMSEC Custdians, Lcal Element Managers, r their alternates wh supprt a specific cryptnet must nt cncurrently be appinted the rle f CnAuth r CmdAuth. Private sectr cmpanies r Other Levels f Gvernment (OLGs) must nt be assigned the rle f CnAuth, CmdAuth r PR fr any cryptnet. 2.6 Cryptgraphic Netwrk Members Cryptnet members must be authrized (within the KMSP) by a CnAuth/CmdAuth t belng t a specific cryptnet. While the cryptnet members must adhere t the minimum security requirements fr accessing, handling, safeguarding and using ACM, they must als fllw the directin f the CnAuth/CmdAuth and cmply with the cryptnet KMSP. A cryptnet member is an entity (e.g. individual, GC department r enterprise services rganizatin, OLG, private sectr cmpany, freign gvernment department r agency) that meets the access requirements fr ACM (refer t ITSD-03A). 3 Cryptgraphic Netwrks 3.1 General A GC cryptnet is a telecmmunicatins netwrk fr which a department r enterprise services rganizatin has full technical and peratinal authrity and is thereby respnsible fr the management f the SA&A (refer t Article 1.2). The cryptnet als requires specific appinted persnnel (refer t Article 2) and uses CSE-apprved cryptgraphic equipment, which is detailed and managed using a department/enterprise KMSP (refer t Article 5, Annex A and Appendix A). 3.2 COMSEC Service Mdels The GC perates cryptnets using ne f tw COMSEC service mdels: departmental and enterprise. In the departmental mdel, COMSEC services and cryptgraphic assets are the respnsibility f each f the individual departments. In the enterprise mdel, COMSEC services and cryptgraphic assets are the cmplete respnsibility f the enterprise services rganizatin. Refer t ITSD-03A fr specific detail fr each mdel. All cryptnets must be cntrlled using ne f these COMSEC service mdels. January

12 3.3 Types f Cryptgraphic Netwrks There are typically five types f netwrks: natinal interdepartmental departmental internatinal, and Canadian private sectr Natinal UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) A natinal cryptnet is established t fulfil secure cmmunicatins requirements fr either f tw CSE-cntrlled cmmunities: GC Electrnic Key Management System (EKMS); and Secure Telephny: SCIP. The natinal CnAuth/CmdAuth at CSE is respnsible fr the develpment f the KMSP fr these natinal cryptnets Interdepartmental An interdepartmental cryptnet is established t fulfil secure cmmunicatins requirements between tw r mre independent federal rganizatins. The department/rganizatin that is the peratinal authrity fr the netwrk must als appint the CnAuth/CmdAuth fr the supprting cryptnet Departmental A departmental cryptnet is established t fulfil secure cmmunicatins requirement specific t a single federal rganizatin. A departmental cryptnet may include the spnsrship f links t nn-federal r OLG and private sectr partners. Specific OLG and private sectr partner cryptnet requirements are detailed in ITSD-01A, ITSD-03A and ITSD-06A Internatinal An internatinal cryptnet is established t fulfil secure cmmunicatins requirements fr a cryptnet between a GC department and an allied natin. The use f any encryptin capabilities, dmestic r freign, that carry classified r PROTECTED C traffic must be crdinated with CCS. In the case f internatinal cryptnets, this is especially imprtant since the Natinal Authrity must brker the transfer f any equipment r key thrugh the Natinal Distributin Authrity (NDA) at CSE (refer t Article fr additinal infrmatin regarding key rdering). Where an internatinal cryptnet is established by a freign natin, the freign natinal cryptnet authrities will be respnsible fr crdinating Canadian membership. Hwever, crdinatin and management f the ACM supprt fr such cryptnets must be dne with CCS t ensure delivery f material frm the freign CnAuth/CmdAuth. January

13 3.3.5 Canadian Private Sectr UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) Any freign r dmestic private sectr cmpany that has a requirement fr membership in a GC-cntrlled cryptnet must have a GC cntract in place and have a federal spnsr befre CCS will be able t apprve the transfer f ACM. Private sectr cmpanies must als meet the requirements t hld and manage ACM, as detailed in ITSD-06A. The spnsring GC department s DCA r enterprise services rganizatin s ECA must be the authrity that appints the CnAuth/CmdAuth and the PR; hwever the private sectr cmpany persnnel must nt be assigned the CnAuth/CmdAuth r PR rle (refer t Article 2.5). 4 Establishing and Clsing a Cryptgraphic Netwrk 4.1 Establishing a Cryptgraphic Netwrk All cryptnets must have a CnAuth/CmdAuth appinted by the DCA r ECA f the department r enterprise services rganizatin managing the netwrk. Cryptnets are based upn cmmn cmmunities f interest (refer t Article 1.4) Cryptgraphic Netwrk Planning Cnsideratins The CnAuth/CmdAuth requires accurate infrmatin n all aspects f the cryptnet and must have the capability t cmmunicate with all f its members. The CnAuth/CmdAuth must be familiar with all requirements fr managing their cryptnet s cryptgraphic equipment and key. Befre cntacting CCS t establish a cryptnet, the specific items t cnsider include: Cncept f Operatins (CONOP); SA&A requirements: TRA, Statement f Sensitivity classificatin f the infrmatin t be transmitted ver the cryptnet, and cryptnet security requirements (e.g. cnfidentiality, integrity and availability); general netwrk characteristics: cryptnet size number f members, cryptnet gegraphical ftprint, risk envirnments fr the deplyment f the COMSEC material (e.g. a gegraphical area r specific lcatin in which there is insufficient security t ensure the safeguarding f installed cryptsystems), expected services required, vice, netwrk, data at rest, perating envirnment dmestic, internatinal, static, mbile, austere, bandwidth demands, etc., cryptgraphic interperability requirements with membership cryptgraphic equipment mandatry sftware releases, and limitatins in physical access that may affect cryptperids fr rekey, supersessins, and changevers; cryptgraphic equipment and key distributin lgistical issues; expeditius means f infrming cryptnet members f bth administrative requirements and emergency key supersessin; requirement fr cntingency key and equipment t deal with peratinal needs t expand the cryptnet; January

14 UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) emergency infrmatin and executin f cmprmise and recvery plans; and in additin t equipment-specific Canadian Cryptgraphic Dctrines (CCDs), CSE prvides additinal assistance in develping secure netwrks in the fllwing IT Security Guidance publicatins: Emissin Security (EMSEC) Guidance (ITSG-11A), Gvernment f Canada Facility Evaluatin Prcedures (ITSG-12), IT Security Risk Management: A Lifecycle Apprach (ITSG-33), and High Assurance Netwrk-Layer Encryptin Security Slutins (ITSG-52) Security Segregatin Using Cryptnets A cryptnet is a netwrk that allws members t use the same cryptgraphic key t cmmunicate with each ther. Cryptnets can be divided int smaller interperable cmmunities r sub-cmmunities. The methd f segregatin is based n the type f key used within the cryptnet. A cryptnet secured with symmetric key is segregated frm ther cryptnets by using a specific key shrt title and editin. Symmetric key may als be used t encrypt nn-netwrk key (e.g. Transfer Key Encryptin Key [TrKEK]) r t prtect DAR (e.g. ECLYPT key). A cryptnet secured with asymmetric key is segregated frm ther cryptnets by using an pen r clsed partitin cde: An pen partitin cde allws an authrized PR t rder Secure Data Netwrk System (SDNS) key fr all users with the same partitin cde t cmmunicate with each ther. Open partitin cdes are typically used in SCIP and als in Type 0 key distributin fr EKMS Key Prcessrs (KPs). A clsed partitin cde allws an authrized PR t rder SDNS key fr a select set f users, as determined by the CmdAuth, t cmmunicate within the netwrk (e.g. used in In-Line Netwrk Encryptr/Link Encryptin Family [INE/LEF] netwrks). A clsed partitin cde can be further segregated with access cntrls (refer t equipment-specific dctrine fr mre infrmatin). NOTE: A KMSP is submitted by the CmdAuth t CCS fr validatin. Once validated, CCS prvides the CmdAuth with a new partitin cde, which must then be included in the KMSP. 4.2 Key Material Supprt Plan General A primary respnsibility f the CnAuth/CmdAuth is the preparatin and maintenance f the KMSP. A KMSP is develped and maintained in rder t prvide a high degree f assurance that the ACM used n a cryptnet is prperly managed thrughut its lifecycle. A KMSP must cntain sufficient infrmatin t enable cryptnet members t supprt cryptnet lgistics (e.g. equipment rdering, key rdering, requesting partitin cdes, PR recrding, distributing, fault finding, system recvery, string and accunting). Instructins fr the develpment f a KMSP are prvided in Annex A and Appendix A Cryptgraphic Netwrks Requiring Key Material Supprt Plans Except fr the directin in Article , a KMSP must be develped fr all cryptnets that use classified key t secure a telecmmunicatins netwrk (peratins, training r functinal testing). January

15 UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) Cryptgraphic Netwrks Nt Requiring Key Material Supprt Plans A KMSP is nt required fr: nn-peratinal cryptnets that use UNCLASSIFIED key (i.e. lab envirnments); nn-persistent, shrt term requirements f less than 90 days using a lcally generated key, unless specifically directed by the DCA r ECA; r Canadian utstatins n internatinal cryptnets where the CnAuth/CmdAuth is a freign authrity. Hwever, the DCA/ECA f the Canadian utstatins must appint a PR t rder the freign key frm CMAC Legacy Cryptgraphic Netwrks Whereas all cryptnets are required t be registered and have a valid KMSP, there are cryptnets that have been established withut a KMSP prir t the publicatin date f this directive. In rder t mitigate any incnsistency in sustaining cryptgraphic key delivery fr these cryptnets, CCS will engage thse GC departments withut KMSPs, n a case-by-case basis, as time permits, t assist in reslving the deficiency Develpment and Validatin Regardless f the key rigin (svereign, freign r lcal), a KMSP must be develped fr the use f classified and PROTECTED C key (refer t Annex A). The KMSP must be submitted t CCS fr validatin f the key requirement and crdinatin with the natinal key management practices befre the cryptnet is activated. In cases where the client is a member f a freign netwrk, the KMSP can be significantly abridged since the member is nt the CnAuth/CmdAuth Classificatin The minimum security classificatin f a KMSP must be CONFIDENTIAL. Hwever, higher security classificatin and handling restrictins may be required based n the TRA r the KMSP s cntent Review Requirement CCS, in crdinatin with the CnAuth/CmdAuth, must review the KMSP annually frm the date f registratin. The annual review must include items listed in Article 4.1.1, as well as any changes t: appintments and privileges and required pint f cntact infrmatin; key requirements; equipment and sftware versins; and key classificatin. January

16 4.2.5 KMSP Change Cntrls UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) The KMSP can be mdified inside f its annual review cycle (refer t Article 4.2.4) by submitting the apprpriate frms and appending a cpy t the main KMSP file. The fllwing frms and plicy instruments must be used by the CnAuths/CmdAuths t mdify the KMSP inside the review cycle: fr changes f CnAuth/CmdAuth, PR INE/LEF Privilege Establishment r Terminatin f Privilege (PER) Request Secure Data Netwrk System (SDNS) fr In-Line Netwrk Encryptr (INE) and Link Encryptin Family (LEF) f Cryptgraphic Equipment (CSE/CST ITS-003), and Symmetric Key Privilege Establishment r Terminatin f Privilege Request (PER) (CSE/CST ITS-014); an IT Security Apprval fr Use (ITS AFU) fr mandatry cryptgraphic sftware r hardware upgrade is required; r fr changes f security classificatin f the key r partitin cde: CSE/CST ITS-003, INE/LEF Key Order Request Secure Data Netwrk System (SDNS) fr In-Line Netwrk Encryptr (INE) and Link Encryptin Family (LEF) f Cryptgraphic Equipment (CSE/CST ITS-002), CSE/CST ITS-014, and Symmetric Key Order Request (CSE/CST ITS-009). The CnAuths/CmdAuths are expected t lcally track the fllwing and validate with the KMSP during cyclical review: the additin, deletin r change in a cryptnet member status; and changes t the type r specificatins f cryptgraphic equipment being used at terminal sites. All ther changes such as adding r remving key types require cmmunicatin with CCS and a reissue f the KMSP. 4.3 Clsing a Cryptgraphic Netwrk With DCA/ECA authrity, the CnAuth/CmdAuth is respnsible fr clsing a cryptnet. The CnAuth/ CmdAuth must prvide written ntice f the cryptnet clsure t all cryptnet members and CCS. The ntice must include the: effective date f clsure; date when the cryptnet members must prvide cnfirmatin t the CnAuth/CmdAuth that the instructins utlined in the ntice have been cmpleted; prcedures t be fllwed fr cancelling key rdering privileges fr key identified in the KMSP; COMSEC accunting and destructin prcedures fr key that must be destryed, zerized r deleted; and instructins fr the dispsal r redistributin f cryptgraphic equipment. January

17 4.4 Creating a Cmpund Cryptnet UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) A cmpund cryptnet is a cryptnet (referred t as main in Figure 1 Cmpund Cryptnet) that has a secure cnnectin t a separate cryptnet segregated by its wn key and managed under a separate KMSP. This separately-managed cryptnet is designated in the KMSP as the assciated cryptnet. The key that is used t cnnect t the assciated cryptnet is referred t as the Link Key. In drafting the KMSP, the CnAuth/CmdAuth is respnsible t track these cnnectins by the use f a Cryptnet Link Register, as detailed in Article A.A.4. This prvides the clarity necessary t manage and crdinate changes within the cmpund cryptnet. The Cryptnet Link Register prvides COMSEC staff (f the cmpund cryptnet) the minimum infrmatin necessary t cnduct crdinatin between the wner r authrity f the Link Key and the CnAuth/CmdAuth f the assciated cryptnets. Where a Link Key frms a separate netwrk cnnecting multiple secure enclaves r cryptnets, the Link Cryptnet frms its wn unique cryptnet and requires its wn KMSP (managed by a CnAuth/CmdAuth) that is nrmally ne f the assciated enterprise partner rganizatins. Fr example, in Figure 1 Cmpund Cryptnet, there are five unique cryptnets, requiring five separate KMSPs. Figure 1 Cmpund Cryptnet 5 Cryptgraphic Netwrk Management 5.1 General Cryptgraphic equipment and key identified in the KMSP will be managed and distributed as detailed in the KMSP and ITSD-03A. Additinally, key identified in the KMSP must be rdered as directed in ITSD Dcumentatin Alng with the KMSP, the CnAuth/CmdAuth must maintain the fllwing dcumentatin thrughut the lifecycle f the cryptnet: cryptnet member register a lcal management dcument designed t keep track f the names f each cryptnet member, their lcatins and hw t cntact them; privilege management register a lcal management dcument designed t keep track f the names f each appinted cryptnet PR, their lcatins and hw t cntact them. The register must include the privilege prtcls (e.g. key rdering threshlds, partitin cde restrictins) that each can execute; January

18 UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) lcal tracking key management distributin register a lcal management dcument designed t keep track f distributin pints (e.g. COMSEC Accunts and Lcal Elements) and hw much key each f the distributin pints is entitled t receive, stre and distribute; and Cryptnet Link Register (if required) a lcal management dcument held by the CnAuth/CmdAuth wh has been appinted t the link cryptnet (i.e. cmpund cryptnet) by the department r enterprise services rganizatin assigned as lead agency f the linked cryptnet. This dcument prvides the link cryptnet CnAuth/CmdAuth with the cntact infrmatin f individual clsed cryptnets within the linked netwrk cmmunity (refer als t Article 1.4). NOTE: The linked cryptnet requires clse cllabratin between the individual cryptnet CnAuths/CmdAuths and the CnAuth/CmdAuth respnsible fr the linked cryptnet. 5.2 Cryptperid Extensin A cryptperid is the time span during which each key setting remains in effect. Cryptperid extensins are restricted t cryptnets using symmetric key. Where a cryptperid extensin is peratinally required, the fllwing factrs need t be cnsidered in determining the length f the extensin: cryptnet size A key used n a large cryptnet is usually mre vulnerable t cmprmise than key used n a small cryptnet because it is available at mre lcatins and t mre peple. Als, large cryptnets generally carry higher vlumes f traffic than small cryptnets. The cmprmise f a key used t secure a large cryptnet culd make mre intelligence available t an adversary. Fr this reasn, CnAuths and CmdAuths must keep their cryptnets as small as peratinally feasible. cryptnet member lcatin and perating envirnment Cryptnet members lcated in Canada are nrmally expsed t less risk than thse in ther lcatins. Cryptnet members lcated in high risk envirnments (e.g. gegraphical areas r specific lcatins in which there is insufficient security t ensure the safeguarding f installed cryptsystems) have an increased risk f physical cmprmise. Mbile cryptnet members and cryptnet members in hstile envirnments (smetimes referred t as tactical envirnments ) have a greater pprtunity fr lss (particularly undetected lss) than d fixed plant cryptnet members. In such cases, segregatin f higher risk envirnments must be cnsidered. traffic sensitivity and perishability The CnAuth shuld cnsider the classificatin f the prtected infrmatin, and whether the infrmatin is f lng r shrt term intelligence value. Cmprmise f key used t secure upper level strategic cmmunicatins wuld have a mre devastating effect n natinal security than wuld the cmprmise f a key used t secure highly perishable r lwer level tactical (hstile envirnment) cmmunicatins. emergency supersessin plan CnAuths must have a plan fr replacing cmprmised key (refer t Article 5.3.2) Hstile Envirnment Situatins When cryptperid extensins are necessary t maintain critical cmmunicatins in hstile envirnment situatins, the fllwing guidance shuld be cnsidered: begin all preplanned cryptperids with a new key setting; and rekey all affected cryptnets as sn as there is a break in activity. January

19 5.2.2 Symmetric Key UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) Subject t equipment-specific dctrine, a symmetric key cryptperid may be extended beynd its effective cryptperid accrding t the fllwing authrities: cryptnet members may extend a cryptperid by up t tw hurs withut CnAuth authrity, but nly when necessary t cmplete a transmissin r cnversatin in prcess at key change ver time. CnAuth may extend cryptperids up t seven days unless prhibited by negtiated CONOPs. The CnAuth must infrm CCS when a cryptperid is extended by mre than 24 hurs; and CCS n a case-by-case basis, may extend cryptperids mre than seven days Asymmetric Key Asymmetric key may nt be extended beynd its yearly cryptperid. NOTE: Fr unfreseen circumstances, the CmdAuth must cntact CCS. 5.3 Supersessin Rate General The supersessin rate is the length f time during which an editin f a key is effective. Supersessin rates are established by CSE based n the cryptgraphic equipment type, cryptgraphic security cnsideratins, peratinal need and key generatin r re-supply cnstraints. The actual supersessin rate fr cryptgraphic key is classified, at a minimum, CONFIDENTIAL unless specified higher by the CnAuth r CmdAuth Emergency Supersessin Planning CnAuths/CmdAuths will ensure the cntinuatin f the cryptnet by planning fr key supersessin in advance f key cmprmise situatins. The Emergency Supersessin Plan (ESP) must include the fllwing: supersessin authrity identifies the cmmunicatin surce that the CnAuth/CmdAuth will use t disseminate the supersessin instructins t all cryptnet members; Hazardus Cnditin (HAZCON) message is used t warn cryptnet members that the link is pssibly cmprmised and that expsure f sensitive traffic is at risk. The HAZCON message shuld precede a supersessin when there is a delay in executing the supersessin activity; cntingency key hldings (symmetric key nly) identifies the cntingency key hlding threshlds and where the key is held; NOTE: CmdAuths f cryptnets using asymmetric key may, depending upn the type f equipment emplyed by the cryptnet, preplace symmetric cntingency key (als knwn as Pre-Placed Key [PPK]) t deply as an interim measure until full asymmetric capability can be restred. distributin identifies the prcedures fr distributing symmetric cntingency key r new asymmetric key t cryptnet members; strage (symmetric key nly) identifies the prcedures fr safeguarding and handling stred cntingency key; dispsal f key identifies the prcedures fr the dispsal (including destructin) f bth the superseded key and the cntingency key when they are n lnger required. January

20 UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) NOTE 1: In rder t btain a new key, CmdAuths must infrm CCS immediately that their cryptnet has been cmprmised. NOTE 2: CmdAuths can, depending upn the type f cryptgraphic equipment emplyed by the cryptnet and if the cmprmised cryptnet member is knwn, emply access cntrl prcedures (refer t equipment-specific CCDs) t islate the cmprmising member and cntinue interim peratins until cmplete supersessin prcedures can be implemented thrughut the cryptnet Supersessin Authrizatin CCS is the apprving authrity fr supersessin rate change. 5.4 Cmprmise Recvery and Risk Management General The actin required t recver frm a cmprmise situatin depends n the nature f the cmprmise. A knwn cmprmise r pssible cmprmise f cryptgraphic equipment r key used in a cryptnet must be reprted as a COMSEC incident, as detailed in ITSD-03A. It is paramunt that the CnAuth/CmdAuth prvides immediate and cntinuus cmmunicatin abut cmprmise recvery actins t the cryptnet members. It is equally imprtant that cryptnet members immediately infrm their CnAuth/CmdAuth when a cmprmise situatin ccurs. In all cases, cmprmise and the subsequent recvery actins must be reprted t CCS Key Cmprmise Recvery Optins Where evidence exists that key has been cmprmised, the respnsible CnAuth/CmdAuth must take immediate cmprmise recvery actin, as detailed in the KMSP and ITSD-03A. The CnAuth/CmdAuth must nt wait fr incident reprting and evaluatins befre taking actin. Immediate cmprmise recvery actin must be taken as sn as enugh infrmatin has been gathered t make an infrmed decisin. Ideally, a CnAuth/CmdAuth will annunce a precautinary supersessin and disseminate a HAZCON message t all cryptnet members. When precautinary key editin supersessin is nt feasible, several ptins are available. The CnAuth/ CmdAuth, in cnsultatin with the DCA r ECA, the telecmmunicatins netwrk authrity and CCS will cnsider the fllwing ptins: if technically pssible, extend the cryptperid f uncmprmised key currently in use; re-establish cryptnet peratins excluding thse members wh d nt hld r cannt be supplied with replacement key; suspend cryptnet peratins until key can be re-supplied; r cntinue using the cmprmised key under HAZCON prvisins. This last resrt actin is used when: nrmal supersessin f the cmprmised key will take place befre emergency supersessin can be accmplished, where cryptperid key changes have a mre serius detrimental effect n immediate peratins versus cmprmised cmmunicatins, r where n replacement key is available. January

21 UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) The CnAuth/CmdAuth must alert all cryptnet members (by ther means, if pssible) that a cmprmise has taken place and direct that members minimize transmissins using the cmprmised key. 5.5 COMSEC Emergency Plan The DCA/ECA, in crdinatin with the COMSEC Custdian, is respnsible fr the preparatin, implementatin and annual re-evaluatin f departmental r enterprise COMSEC Emergency Plans, as detailed in ITSD-03A. A CnAuth/CmdAuth must ensure the respnsible COMSEC Custdian is made aware f any unique circumstances that may affect the COMSEC Emergency Plan. The CnAuth/CmdAuth must als ensure cryptnet members are fully aware f their respnsibilities in the event f a COMSEC emergency. 6 Audit Requirements As part f a COMSEC audit, Natinal COMSEC Audit Team (NCAT) will request cnfirmatin that an up-tdate KMSP is n file fr each cryptnet that has been endrsed by CCS and that is in use by the department r enterprise services rganizatin. Additinally, NCAT will ensure that the apprpriate dcumentatin referred t in Articles 2.3 and is maintained as well as cnfirming that the appintment/terminatin certificatin and key rdering privileges fr appinted persnnel are up t date. 7 Cryptgraphic Netwrk Supprt Training 7.1 General IT security training must be an integral cmpnent f an IT security prgram. The Infrmatin Technlgy Security Learning Centre (ITSLC) at CSE is respnsible fr crdinating the develpment and prvisin f training and awareness related t IT security and COMSEC. CnAuths, CmdAuths and PRs must receive CSE training prir t being appinted t the CnAuth/CmdAuth r PR rle. If, due t departmental peratinal requirements, training cannt be prvided prir t appintment, cntact CCS fr guidance. Cntact the ITSLC at its-educatin@cse-cst.gc.ca fr current training pprtunities. 8 COMSEC Incident Reprting A COMSEC incident ccurs whenever there is a situatin r activity that jepardizes r ptentially jepardizes the cnfidentiality, integrity r availability f COMSEC infrmatin, material r services. While custdial staff prvide immediate reprting up the COMSEC channels, it is the respnsibility f the CnAuth/CmdAuth t reprt a COMSEC incident t the cryptnet members t ensure Operatins Security (OPSEC) actin can be initiated within member rganizatins. Prmpt and accurate reprting f COMSEC incidents minimizes the ptential fr lss r cmprmise f COMSEC material. All COMSEC incidents must be reprted as detailed in ITSD-05. January

22 9 References UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) 9.1 Abbreviatins, Acrnyms and Initialisms A ACM CCD CCF CCI CCS CEO CFD CMAC CmdAuth COMSEC CnAuth CONOP COR Cryptnet CSE CUP DAR DCA DDSM DSO ECA ECU EMSEC ESO ESP FSU GC GC EKMS GC KMI HAZCON HTTPS IP INE IT ITAR ITS ITS AFU ITSB ITSC Alternate Accuntable COMSEC Material Canadian Cryptgraphic Dctrine Canadian Central Facility Cntrlled Cryptgraphic Item COMSEC Client Services Canadian Eyes Only Cmmn Fill Device Crypt Material Assistance Centre Cmmand Authrity Cmmunicatins Security Cntrlling Authrity Cncept f Operatins Central Office f Recrd Cryptgraphic Netwrk Cmmunicatins Security Establishment COMSEC User Prtal Data at Rest Departmental COMSEC Authrity Directive n Departmental Security Management Departmental Security Officer Enterprise COMSEC Authrity End Cryptgraphic Unit Emissin Security Enterprise Security Officer Emergency Supersessin Plan Field Sftware Upgrade Gvernment f Canada Gvernment f Canada Electrnic Key Management System Gvernment f Canada Key Management Infrastructure Hazardus Cnditin HyperText Transfer Prtcl Secure Internet Prtcl In-Line Netwrk Encryptr Infrmatin Technlgy Internatinal Traffic in Arms Regulatins Infrmatin Technlgy Security Infrmatin Technlgy Security Apprval fr Use Infrmatin Technlgy Security Bulletin Infrmatin Technlgy Security Crdinatr January

23 ITSD ITSG ITSLC KMSP KP LEF MSK NCAT NCIO NCOR NDA OLG OPSEC PER PGS PKI PPK PR SA&A SCIP SDNS TBS TRA TrKEK T3MD UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) Infrmatin Technlgy Security Directive Infrmatin Technlgy Security Guidance Infrmatin Technlgy Security Learning Centre Key Material Supprt Plan Key Prcessr Link Encryptin Family Message Signature Key Natinal COMSEC Audit Team Natinal COMSEC Incidents Office Natinal Central Office f Recrd Natinal Distributin Authrity Other Levels f Gvernment Operatins Security Privilege Establishment Request Plicy n Gvernment Security Public Key Infrastructure Pre-Placed Key Prduct Requester Security Assessment and Authrizatin Secure Cmmunicatin Interperability Prtcl Secure Data Netwrk System Treasury Bard f Canada Secretariat Threat and Risk Assessment Transfer Key Encryptin Key Tier 3 Management Device 9.2 Glssary The fllwing glssary cntains terms and definitins specific t the COMSEC material identified within this ITSD. Fr additinal definitins, refer t the Glssary f COMSEC-Related Terms Used in CSE s IT Security Directives (which can be fund n the CSE website and n the CSE COMSEC User Prtal [CUP]). Asymmetric Key Cryptgraphic Netwrk (Cryptnet) change ver Cmmand Authrity (CmdAuth) UNCLASSIFIED Tw related cryptgraphic keys, a public key and a private key that are used t perfrm cmplementary cryptgraphic peratins, such as encryptin and decryptin r signature generatin and verificatin. The time that an peratinal key is changed n a cryptgraphic netwrk. The individual appinted by the departmental COMSEC authrity r enterprise COMSEC authrity t manage the peratinal use and cntrl f asymmetric encryptin keys between members f a specific peratinal envirnment. January

24 UNCLASSIFIED IT Security Directive fr the Management f CSE-Apprved Cryptgraphic Equipment and Key t Secure a Telecmmunicatins Netwrk (ITSD-04A) Cmmunicatins Security (COMSEC) Cmpund Cryptgraphic Netwrk (Cryptnet) Cmprmise COMSEC Material Cntrlling Authrity (CnAuth) Crypt Material Assistance Centre (CMAC) Cryptgraphic Cryptgraphic Cmmunity Cryptgraphic Equipment Cryptgraphic Key Cryptgraphic Netwrk (cryptnet) Cryptgraphic Netwrk (cryptnet) Member UNCLASSIFIED The applicatin f cryptgraphic security, transmissin and emissin security, physical security measures, peratinal practices and cntrls t deny unauthrized access t infrmatin derived frm telecmmunicatins and that ensure the authenticity f such telecmmunicatins. A cmmunity f unique cryptgraphic netwrks securely cnnected tgether. The cmmunity may be segregated because f risk cnsideratins, netwrk tplgy cnstraints r t jin tw peratinal envirnments that wish t share infrmatin freely but the assciated Cntrlling Authrities r Cmmand Authrity want t maintain technical cntrl. The unauthrized access t, disclsure, destructin, remval, mdificatin, interruptin r use f COMSEC assets r infrmatin. Material designed t secure r authenticate telecmmunicatins infrmatin. COMSEC material includes, but is nt limited t key, equipment, mdules, devices, dcuments, hardware, firmware r sftware that embdies r describes cryptgraphic lgic and ther items that perfrm COMSEC functins. The individual appinted by the departmental COMSEC authrity r enterprise COMSEC authrity t manage the peratinal use and cntrl f symmetric encryptin keys between members f a specific peratinal envirnment. The entity within CSE respnsible fr all aspects f key rdering including privilege management, the management f the Natinal Central Office f Recrd and the administratin f the Assistance Centre. Pertaining t r cncerned with cryptgraphy (ften abbreviated as crypt and used as a prefix, e.g. cryptnet). The use f ne r mre cryptgraphic netwrks in rder t prvide the secure telecmmunicatins cnnectivity necessary fr a gruping f individuals deemed t be in a specific missin r peratinal envirnment. Equipment and systems that perfrm encryptin, decryptin, authenticatin r key generatin functins. A numerical value used t cntrl cryptgraphic peratins, such as decryptin, encryptin, signature generatin, r signature validatin. A telecmmunicatins netwrk in which infrmatin is prtected by the use f cmpatible cryptgraphic equipment using a cmmn cryptgraphic key. One f tw r mre statins n a specific cryptgraphic netwrk. January

COMSEC Custodian Quick Reference Guide

COMSEC Custodian Quick Reference Guide COMSEC Custdian Quick Reference Guide COMSEC Custdians are respnsible fr the generatin, receipt, custdy, distributin, safeguard, dispsitin r destructin, and accunting f COMSEC material entrusted t their

More information

LSU HEALTH SHREVEPORT NOTICE OF PRIVACY PRACTICES FOR PROTECTED HEALTH INFORMATION

LSU HEALTH SHREVEPORT NOTICE OF PRIVACY PRACTICES FOR PROTECTED HEALTH INFORMATION LSU HEALTH SHREVEPORT NOTICE OF PRIVACY PRACTICES FOR PROTECTED HEALTH INFORMATION THIS NOTICE DESCRIBES HOW YOUR MEDICAL INFORMATION MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.

More information

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section.

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section. TITLE RESTRAINT AS A LAST RESORT SCOPE Prvincial APPROVAL AUTHORITY Clinical Operatins Executive Cmmittee SPONSOR Senir Operating Officer, Glenrse Rehabilitatin Hspital PARENT DOCUMENT TITLE, TYPE AND

More information

DOCUMENT TITLE: Clarification of Bureau of Primary Health Care Credentialing and Privileging Policy outlined in Policy Information Notice

DOCUMENT TITLE: Clarification of Bureau of Primary Health Care Credentialing and Privileging Policy outlined in Policy Information Notice 2002-22 DATE: July 10, 2002 DOCUMENT TITLE: Clarificatin f Bureau f Primary Health Care Credentialing and Privileging Plicy utlined in Plicy Infrmatin Ntice 2001-16 TO: Cmmunity Health Centers Migrant

More information

MONASH Special Developmental School

MONASH Special Developmental School MONASH Special Develpmental Schl CRITICAL INCIDENT POLICY 1. RESPONDING TO A TRAUMATIC OR CRITICAL INCIDENT IN WHICH THE SCHOOL IS INVOLVED The schl may becme directly r indirectly invlved in a tragic

More information

Access to Mental Health Care Assessment and Treatment - General. Document author Assured by Review cycle. Quality and Safety Committee

Access to Mental Health Care Assessment and Treatment - General. Document author Assured by Review cycle. Quality and Safety Committee Bard library reference Dcument authr Assured by Review cycle P114 Acting Directr f Operatins Quality and Safety Cmmittee 3 years This dcument is versin cntrlled. The master cpy is n Ourspace. Once printed,

More information

CAMPBELL COUNTY GILLETTE, WYOMING

CAMPBELL COUNTY GILLETTE, WYOMING CAMPBELL COUNTY GILLETTE, WYOMING Cmmunicatins Technician I Cmmunicatins Technician II Cmmunicatins Technician III Class specificatins are intended t present a descriptive list f the range f duties perfrmed

More information

LOGISTICS SECTION CHIEF

LOGISTICS SECTION CHIEF Missin: Organize and direct the service and supprt activities needed t ensure the material needs fr the hspital s respnse t an incident are available when needed. Psitin Reprts t: Incident Cmmander Cmmand

More information

Archive and Destruction of Patient Records

Archive and Destruction of Patient Records Archive and Destructin f Patient Recrds If yu have run ut f rm t stre paper recrds yu may need t archive the riginal dcuments. A cmprehensive archive prcess, with written plicies and prcedures will help

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) Fr the Medical Bards Online Tracking System (MEDBOLTS) Department f the Navy - TMA DHP Funded System SECTION 1: IS A PIA REQUIRED? a. Will this Department f Defense (000)

More information

PLANNING SECTION CHIEF

PLANNING SECTION CHIEF Missin: Oversee all incident related data gathering and analysis regarding incident peratins and resurce management; develp alternatives fr tactical peratins; initiate lng range planning; cnduct planning

More information

Government of Ontario IT Standard (GO-ITS) GO-ITS Number 56.5 OPS Grants Management Reference Model

Government of Ontario IT Standard (GO-ITS) GO-ITS Number 56.5 OPS Grants Management Reference Model Gvernment f Ontari IT Standard (GO-ITS) GO-ITS Number 56.5 OPS Grants Management Reference Mdel Versin #: 2.4 Status: Apprved Prepared fr the Infrmatin Technlgy Standards Cuncil (ITSC) under the delegated

More information

About this guide 5 Section 1: Meeting VET sector requirements 7

About this guide 5 Section 1: Meeting VET sector requirements 7 Cntents Abut this guide 5 Sectin 1: Meeting VET sectr requirements 7 1.1 Hw Aspire s resurces assist in meeting requirements 7 1.2 Resurce quality assurance prcesses 16 Sectin 2: Unit f cmpetency infrmatin

More information

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section.

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section. TITLE MANAGEMENT OF PATIENT S OWN MEDICATIONS SCOPE Prvincial APPROVAL AUTHORITY Clinical Operatins Executive Cmmittee SPONSOR Prvincial Medicatin Management Cmmittee PARENT DOCUMENT TITLE, TYPE AND NUMBER

More information

Original Date: January 27, 2010 Reviewed/Last Modified Date: September 15, 2015

Original Date: January 27, 2010 Reviewed/Last Modified Date: September 15, 2015 Hme and Cmmunity Care - Feedback Reprting Prcess: Cmplaints, Cmpliments and Inquiries Manual: Administratin Sectin: Risk and Safety Management Subsectin: Original Date: January 27, 2010 Reviewed/Last Mdified

More information

Medical Assistance in Dying: Update Stakeholder Presentation

Medical Assistance in Dying: Update Stakeholder Presentation Medical Assistance in Dying: Update Stakehlder Presentatin Ministry f Health and Lng-Term Care and Ministry f the Attrney General Week f August 1, 2016 Implementatin Questins: What We Heard Frm Yu 1. Reprting:

More information

BEHAVIORAL HEALTH STAFF COVERAGE PROTOCOL. Psychiatrist and Psychologist Coverage Plan...4. Telemedicine.7

BEHAVIORAL HEALTH STAFF COVERAGE PROTOCOL. Psychiatrist and Psychologist Coverage Plan...4. Telemedicine.7 BEHAVIORAL HEALTH STAFF COVERAGE PROTOCOL Scial Service Prvider Cverage Plan. 2 Psychiatrist and Psychlgist Cverage Plan.....4 Telemedicine.7 1 SOCIAL SERVICE PROVIDER COVERAGE PLAN In situatins where

More information

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section.

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section. TITLE ACCESS TO A DESIGNATED LIVING OPTION IN CONTINUING CARE SCOPE Prvincial DOCUMENT # HCS-117 APPROVAL LEVEL Alberta Health Services Executive Leadership Team SPONSOR Vice President Prvince-Wide Clinical

More information

OLTL Transition Plan CMS HCBS Regulations. Introduction

OLTL Transition Plan CMS HCBS Regulations. Introduction OLTL Transitin Plan CMS HCBS Regulatins Intrductin New Centers fr Medicare and Medicaid Services (CMS) rules utlined at 42 CFR 441.301(c)(4) require public cmment n any new 1915(c) waivers, waiver renewals

More information

CRITICAL INCIDENT RECOVERY POLICY AND PLAN. 1.1 Chatham Primary School may become directly or indirectly involved in a tragic or traumatic event.

CRITICAL INCIDENT RECOVERY POLICY AND PLAN. 1.1 Chatham Primary School may become directly or indirectly involved in a tragic or traumatic event. Chatham Primary Schl N 4314 1.0 PURPOSE: CRITICAL INCIDENT RECOVERY POLICY AND PLAN 1.1 Chatham Primary Schl may becme directly r indirectly invlved in a tragic r traumatic event. 1.2 The incident may

More information

Terminating the Provider- Patient Relationship. Provided by Coverys Risk Management

Terminating the Provider- Patient Relationship. Provided by Coverys Risk Management Terminating the Prvider- Patient Relatinship Prvided by Cverys Risk Management Terminating the Prvider-Patient Relatinship What s the Risk? An allegatin f abandnment may be brught against a prvider if

More information

Who is authorized to give consent (substitute decision makers) Health Care Consent Act

Who is authorized to give consent (substitute decision makers) Health Care Consent Act Mdule 7 Cnsent In this mdule yu will learn abut Health Care Cnsent Act including Elements f cnsent Definitins including Capable Prpser Treatment Curse and plan f treatment Activities nt cnsidered t be

More information

Administration of First Aid Policy

Administration of First Aid Policy Administratin f First Aid Plicy First aid can save, and lives prevent minr injuries r illnesses frm becming majr. The ability t prvide prmpt basic first aid is particularly imprtant in the cntact f an

More information

Environment, Health and Safety Policy Appendix B: Environment, Health and Safety Responsibilities

Environment, Health and Safety Policy Appendix B: Environment, Health and Safety Responsibilities U f A Plicies and Prcedures On-Line (UAPPOL) Original Apprval Date: August 22, 2006 (frmerly a prcedure) Mst Recent Apprval Date: May 28, 2014 Parent Plicy: Envirnment, Health and Safety Plicy Envirnment,

More information

MEDI-CAL (MC051) ERA ENROLLMENT INSTRUCTIONS

MEDI-CAL (MC051) ERA ENROLLMENT INSTRUCTIONS MEDI-CAL (MC051) ERA ENROLLMENT INSTRUCTIONS WHICH FORM(S) SHOULD I DO? Electrnic Healthcare Claim Payment/Advice Receiver Agreement (ANSI ASC X12N 835-Transactin) WHERE SHOULD I SEND THE FORMS? Mail the

More information

Who is responsible for establishing standards of practice for the profession

Who is responsible for establishing standards of practice for the profession Mdule 2 Standards f Practice In this mdule yu will learn abut Wh is respnsible fr establishing standards f practice fr the prfessin Hw the CMRTO Standards f Practice set expectatins f prfessinal practice

More information

Safety in Practice Compliance and Risk Assessment Procedure January, 2017

Safety in Practice Compliance and Risk Assessment Procedure January, 2017 Safety in Practice Cmpliance and Risk Assessment Prcedure Safety in Practice Cmpliance and Risk Assessment Prcedure January, 2017 Cntents 1 Objectives... 2 2 Scpe... 2 3 Safety in Practice Cmpliance and

More information

Key Points for Approving Officers Regarding Electronic Filing

Key Points for Approving Officers Regarding Electronic Filing Key Pints fr Apprving Officers Regarding Electrnic Filing The Land Title Act allws a subdivisin plan t be prepared and submitted t the Land Title Office electrnically. T assist Apprving Officers (AO) with

More information

Denver Public Schools. Financial Services. Financial Services Manual. Grants

Denver Public Schools. Financial Services. Financial Services Manual. Grants Denver Public Schls Financial Services Financial Services Manual Grants Table f Cntents Grants... 3 Prcedures GRC Website... 3 Step by Step Guide... 4 Federal Grants... 7 Title I... 7 Title II... 8 Time

More information

Kansas Paralegal Association's Code of Ethics and Professional Responsibility

Kansas Paralegal Association's Code of Ethics and Professional Responsibility Kansas Paralegal Assciatin's Cde f Ethics and Prfessinal Respnsibility PREAMBLE: Kansas Paralegal Assciatin ("KPA") is a prfessinal rganizatin frmed t: (1) prmte and maintain high standards in the Paralegal

More information

ARMTEC POSITION DESCRIPTION

ARMTEC POSITION DESCRIPTION ARMTEC POSITION DESCRIPTION POSITION: Health and Safety Manager LOCATION: Guelph, Ontari DATE: September 2012 NATURE AND SCOPE The Health & Safety Manager develps and prmtes a well-planned health and safety

More information

CHAPTER 6 NETWORK REQUIREMENTS

CHAPTER 6 NETWORK REQUIREMENTS CHAPTER 6 NETWORK REQUIREMENTS 6.1 CREDENTIALING AND RECREDENTIALING APPLICATION PROCESS Once it has been determined that credentialing is needed, requests can be emailed t the Health Chice Integrated

More information

LEVEL OF CARE GUIDELINES: TARGETED CASE MANAGEMENT AND INTENSIVE CASE MANAGEMENT FLORIDA MEDICAID MMA

LEVEL OF CARE GUIDELINES: TARGETED CASE MANAGEMENT AND INTENSIVE CASE MANAGEMENT FLORIDA MEDICAID MMA OPTUM LEVEL OF CARE GUIDELINES: TARGETED CASE MANAGEMENT INTENSIVE CASE MANAGEMENT FLORIDA MEDICAID MMA LEVEL OF CARE GUIDELINES: TARGETED CASE MANAGEMENT INTENSIVE CASE MANAGEMENT FLORIDA MEDICAID MMA

More information

Appendix A Critical Incident Recovery Plan (CIRP)

Appendix A Critical Incident Recovery Plan (CIRP) Appendix A Critical Incident Recvery Plan (CIRP) Respnsibilities and Prcedures 1. PLAN STATEMENT This Plan is an integral part f the Emergency Management prcesses f the schl. 2. IMPLEMENTATION 2.1 The

More information

YOUTH What is Heads Up Football? What are the benefits of a youth football organization adopting Heads Up Football?

YOUTH What is Heads Up Football? What are the benefits of a youth football organization adopting Heads Up Football? YOUTH What is Heads Up Ftball? Heads Up Ftball is a USA Ftball rganizatinal membership prgram designed t create a better, safer game. Key cmpnents f this prgram include caches cmpleting the nly natinally

More information

For purposes of this Security Agreement, the use of the terms you and your includes both the Oil and Gas Operator and the EFA when appropriate.

For purposes of this Security Agreement, the use of the terms you and your includes both the Oil and Gas Operator and the EFA when appropriate. Oil and Gas Operatr and Electrnic Filing Administratr (EFA) Registratin and Security Agreement fr Oil and Gas Electrnic Filing Systems Oil and Gas Operatr (Primary Reprting Entity) Name f Oil and Gas Operatr:

More information

Institutional Policy Manual

Institutional Policy Manual Institutinal Plicy Manual Drug Diversin Reprting and Respnse Cntent Applies t Arizna, Flrida, Rchester Scpe Arizna, Flrida, Rchester Purpse T prvide guidelines fr the identificatin, reprting, and investigatin

More information

Learning Together From Safeguarding Adult Reviews

Learning Together From Safeguarding Adult Reviews Learning Tgether Frm Safeguarding Adult Reviews Key findings and learning utcmes frm the recent Safeguarding Adult Review cncerning Adult A Adult A: The East Sussex Safeguarding Adults Bard (SAB) recently

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES ! NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW HEALH CARE INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. Intrductin

More information

Quincy University Grants Development & Management Guide

Quincy University Grants Development & Management Guide 1 Quincy University Grants Develpment & Management Guide Intrductin The Office f University Advancement versees the grants prcess at Quincy University and is yur resurce fr seeking funding frm any external

More information

State of Florida Department of Children and Families

State of Florida Department of Children and Families State f Flrida Department f Children and Families Rick Sctt Gvernr Mike Carrll Secretary Request fr Applicatins #11H20GN1 ADDENDUM #001 Criminal Justice Mental Health and Substance Abuse (CJMHSA) Reinvestment

More information

SEQOHS Accreditation Assessor Job Description

SEQOHS Accreditation Assessor Job Description SEQOHS Accreditatin Assessr Jb Descriptin Abut this Dcument This dcument supprts the SEQOHS Office prcess fr the recruitment f assessrs fr the SEQOHS accreditatin scheme. Assessrs must be frm an ccupatinal

More information

Use of Fixed Term Contracts within. This document is intended to support managers and staff understand the use of fixed term contracts

Use of Fixed Term Contracts within. This document is intended to support managers and staff understand the use of fixed term contracts Name Use f Fixed Term Cntracts Summary This dcument is intended t supprt managers and staff understand the use f fixed term cntracts Target audience All staff Versin number 1 PIN plicy Use f Fixed Term

More information

BROCKTON AREA MULTI-SERVICES, INC. ORGANIZATION AND POLICY GUIDE

BROCKTON AREA MULTI-SERVICES, INC. ORGANIZATION AND POLICY GUIDE Page 1 f 12 PURPOSE: T ensure cmpliance with 105 CMR 700.003 regulatins regarding strage and dispensing f medicatins in cmmunity residences; t ensure the health and safety f individuals served; and t prvide

More information

Medical Conditions Policy

Medical Conditions Policy Lxtn Preschl Centre Medical Cnditins Plicy Medical Cnditins Plicy NQS QA2 2.1.1 Each child s health needs are supprted. 2.1.4 Steps are taken t cntrl the spread f infectius diseases and t manage injuries

More information

Frequently asked questions about health identifiers August 2015

Frequently asked questions about health identifiers August 2015 Frequently asked questins abut health identifiers August 2015 1 P a g e Questins abut individual health identifiers What is an individual health identifier r IHI? An individual health identifier r IHI

More information

Service Description: Cisco ACI Implementation Review Service (CON-AS-ACI-IMP-REV)

Service Description: Cisco ACI Implementation Review Service (CON-AS-ACI-IMP-REV) Page 1 f 5 Service Descriptin: Cisc ACI Implementatin Review Service (CON-AS-ACI-IMP-REV) This dcument describes the Cisc ACI Implementatin Review Service. Related Dcuments: This dcument shuld be read

More information

Army Regulation Management. RAND Arroyo Center UNCLASSIFIED

Army Regulation Management. RAND Arroyo Center UNCLASSIFIED Army Regulatin 5 21 Management RAND Arry Center UNCLASSIFIED Headquarters Department f the Army Washingtn, DC 29 June 2018 SUMMARY f CHANGE AR 5 21 RAND Arry Center This regulatin is certified current

More information

Resident Assistant Application

Resident Assistant Application Resident Assistant Applicatin We are excited that yu have decided t apply t be a Resident Assistant (RA). It is a unique pprtunity t wrk with diverse grups f students and be actively invlved n the Queens

More information

Florida Department of Financial Services Florida Accountability Contract Tracking System (FACTS)

Florida Department of Financial Services Florida Accountability Contract Tracking System (FACTS) Flrida Department f Financial Services Flrida Accuntability Cntract Tracking System (FACTS) Agreement Agency FTP Batch Transmissin User Guide July 2014 Table f Cntents Intrductin:... 3 Agency Assumptins:...

More information

Resident Assistant Application

Resident Assistant Application Resident Assistant Applicatin 2017-2018 We are excited that yu have decided t apply t be a Resident Assistant (RA). It is a unique pprtunity t wrk with diverse grups f students and be actively invlved

More information

JOB DESCRIPTION. Director of Corporate Affairs and Governance. Corporate Affairs and Governance (1.0 WTE)

JOB DESCRIPTION. Director of Corporate Affairs and Governance. Corporate Affairs and Governance (1.0 WTE) JOB DESCRIPTION APPENDIX 2(15) Jb Title: Deputy Directr f Crprate Affairs and Gvernance Grade: 8C Hurs: 37.5 Directrate: Crprate Affairs and Gvernance Lcatin: Reprts t: Accuntable t: Respnsible fr: ORGANISATION

More information

Roles & Responsibilities Local Rural Addressing Committee Navajo Nation Rural Addressing Roll-out

Roles & Responsibilities Local Rural Addressing Committee Navajo Nation Rural Addressing Roll-out Intrductin The Navaj Natin has initiated a rural addressing initiative in supprt f mving t an enhanced 9-1-1 system Navaj Natin-wide. The initial phase f the rural addressing initiative is expected t take

More information

OCCUPATIONAL HEALTH AND SAFETY

OCCUPATIONAL HEALTH AND SAFETY OCCUPATIONAL HEALTH AND SAFETY Hôpital réginal de Sudbury Reginal Hspital ISSUED BY: Occupatinal Health and Safety Service AUTHORIZED BY: Occupatinal Health and Safety Service ISSUE DATE: May 12, 2009

More information

POLICY ON NURSE PRESCRIBING OF MEDICAL IONISING RADIATION 1

POLICY ON NURSE PRESCRIBING OF MEDICAL IONISING RADIATION 1 POLICY ON NURSE PRESCRIBING OF MEDICAL IONISING RADIATION 1 Versin Number V1 Date f Issue July 2016 Reference Number Review Interval Apprved By Name: Dr. Rachel Byrne Title: Cnsultant Radilgist Authrised

More information

CALL FOR ABSTRACTS. Overview of Summit Themes. Skills-Based Workshops

CALL FOR ABSTRACTS. Overview of Summit Themes. Skills-Based Workshops CALL FOR ABSTRACTS Submissin will pen January 26, 2018 Submissin deadline is March 6, 2018 Presenters will be ntified April 6, 2018 Overview f Summit Themes Nexus Summit 2018 brings tgether a grwing cmmunity

More information

Our Epic Project Frequently Asked Questions

Our Epic Project Frequently Asked Questions Our Epic Prject Frequently Asked Questins What is EPIC? EPIC is a state-f-the art integrated infrmatin system that cmbines all available patient infrmatin in a single database t imprve all caregivers ability

More information

GRANT APPLICATION. Sustainable Agricultural Land Strategy Grants SUSTAINABLE AGRICULTURAL LANDS CONSERVATION PROGRAM

GRANT APPLICATION. Sustainable Agricultural Land Strategy Grants SUSTAINABLE AGRICULTURAL LANDS CONSERVATION PROGRAM SUSTAINABLE AGRICULTURAL LANDS CONSERVATION PROGRAM Sustainable Agricultural Land Strategy Grants GRANT APPLICATION Strategic Grwth Cuncil Califrnia Natural Resurces Agency Califrnia Department f Cnservatin

More information

Inter-Service Transfer of Army Commissioned Officers on the Active Duty List

Inter-Service Transfer of Army Commissioned Officers on the Active Duty List Army Regulatin 614 120 Persnnel General Inter-Service Transfer f Army Cmmissined Officers n the Active Duty List Headquarters Department f the Army Washingtn, DC 20 June 2016 UNCLASSIFIED SUMMARY f CHANGE

More information

Guidelines for Analysis of Credentials to be Included on COOL

Guidelines for Analysis of Credentials to be Included on COOL Guidelines fr Analysis f Credentials t be Included n COOL Relatedness Determinatin Guidelines Relatedness Determinatin (RD) refers t the identificatin f certificatins relevant t a Navy rating/designatr/ccupatin.

More information

DoD Plain Writing Act Compliance Report April 13, 2018

DoD Plain Writing Act Compliance Report April 13, 2018 DD Plain Writing Act Cmpliance Reprt April 13, 2018 This reprt utlines the prgress twards implementing the Plain Writing Act f 2010 within the DD. Please check back fr updates. I. Senir Agency Official

More information

EMPLOYEE FAMILY CARE UNIT LEADER

EMPLOYEE FAMILY CARE UNIT LEADER Missin: Ensure the availability f medical, lgistic, behaviral health, and day care fr the families f staff members. Crdinate mass prphylaxis, vaccinatin, r immunizatin f family members if required. Psitin

More information

Outbreak Investigation Team Roles and Responsibilities

Outbreak Investigation Team Roles and Responsibilities COMMUNICABLE DISEASE OUTBREAK MANUAL New Jersey s Public Health Respnse Outbreak Investigatin Team Rles and Respnsibilities BUILDING THE INVESTIGATION TEAM Befre an utbreak, identify key individuals wh

More information

JOB DESCRIPTION. (Whilst on duty, the post holder will report to the Shift Manager)

JOB DESCRIPTION. (Whilst on duty, the post holder will report to the Shift Manager) JOB DESCRIPTION JOB TITLE: RESPONSIBLE TO: LOCATION(S): JOB PROFILE: GP Out f Hurs Driver Team Manager (Whilst n duty, the pst hlder will reprt t the Shift Manager) Based at BrisDc Operatinal bases thrughut

More information

PAPER FOR NHS LUTON COMMUNITY SERVICES BOARD MEETING HELD ON 21 ST APRIL 2010

PAPER FOR NHS LUTON COMMUNITY SERVICES BOARD MEETING HELD ON 21 ST APRIL 2010 PAPER FOR NHS LUTON COMMUNITY SERVICES BOARD MEETING HELD ON 21 ST APRIL 2010 TITLE AUTHOR(S) PRESENTED BY DIRECTOR S SIGNATURE PURPOSE/ SUMMARY DECISION REQUIRED Standards fr Better Health & CQC Registratin

More information

TRAINING PLAN FOR STEM OPT STUDENTS

TRAINING PLAN FOR STEM OPT STUDENTS 1 CmpletingtheFrmI983 TRAININGPLANFORSTEMOPTSTUDENTS Science, Technlgy, Engineering & Mathematics (STEM) Optinal Practical Training (OPT) STEMOPTstudentsandtheiremplyersaresubjecttthetermsftheFrmI983,TrainingPlanfr

More information

SAMPLE- Visit FirehouseSubsFoundation.org to apply online. Firehouse Subs Public Safety Foundation Grant Application

SAMPLE- Visit FirehouseSubsFoundation.org to apply online. Firehouse Subs Public Safety Foundation Grant Application SAMPLE- Visit FirehuseSubsFundatin.rg t apply nline. Firehuse Subs Public Safety Fundatin Grant Applicatin 1 SAMPLE- Visit FirehuseSubsFundatin.rg t apply nline. Cngratulatins! Yur rganizatin has met Firehuse

More information

SOP #: Environmental Health and Safety. Implementation Date: Page #: Page 1 of 9 Last Reviewed/Update Date: 08/01/2010 Expiration

SOP #: Environmental Health and Safety. Implementation Date: Page #: Page 1 of 9 Last Reviewed/Update Date: 08/01/2010 Expiration Implementatin Page #: Page 1 f 9 Last Reviewed/Update 08/01/2010 1. Purpse and Scpe The purpse f this dcument is t describe the Planning prgram at Bstn University and t define the interactins, rles, and

More information

AGENCY NAME - Crisis Stabilization Services

AGENCY NAME - Crisis Stabilization Services AGENCY NAME - Crisis Stabilizatin Services Prgram Statement Crisis stabilizatin services are prvided t children and adlescents ages 6-17 that have symptms and current presentatin that requires skilled

More information

INFECTIOUS DISEASE EVENT

INFECTIOUS DISEASE EVENT OFFICE OF RESPONSE AND RECOVERY FACT SHEET FACT SHEET FP 104-009-001 This Fact Sheet describes the scpe f assistance that may be prvided under a Rbert T. Staffrd Disaster Relief and Emergency Assistance

More information

Please find below a progress report for the 2012/13 Action Plan followed by a new Action Plan for 2013/14, building on the success of this first plan.

Please find below a progress report for the 2012/13 Action Plan followed by a new Action Plan for 2013/14, building on the success of this first plan. INTEGRATED CARE PARTNERSHIP GROUP PATIENT PARTICIPATION Please find belw a prgress reprt fr the 2012/13 Actin Plan fllwed by a new Actin Plan fr 2013/14, building n the success f this first plan. The practice

More information

AOTF Health Services Research Grant Request For Application

AOTF Health Services Research Grant Request For Application AOTF Health Services Research Grant 2018-2019 Request Fr Applicatin The AOTF Health Services Research Grant (HSR) is targeted t principal investigatrs wh d nt currently have substantial extramural research

More information

Residential Mental Health Treatment for Children and Adolescents

Residential Mental Health Treatment for Children and Adolescents Residential Mental Health Treatment fr Children and Adlescents Requirement: Frequency: Due Date: Chapter 394, F.S. Sectin 39.407, F.S. Fla. R. Juv. P. 8.350 Chapter 65E-9, F.A.C. Chapter 65E-10, F.A.C.

More information

Occupational Health & Safety Mandatory Quality Area 3

Occupational Health & Safety Mandatory Quality Area 3 Occupatinal Health & Safety Mandatry Quality Area 3 PURPOSE This plicy will prvide guidelines and prcedures t ensure that: all peple wh attend the premises f Albert Park Preschl, including emplyees, children,

More information

MANUAL SURGE CAPACITY PROTOCOL

MANUAL SURGE CAPACITY PROTOCOL MANUAL St. Mary's Hspital Camrse, Alberta PURPOSE Initiated by: Number: ER-7290 Apprved by: Date First Issued: May 24, 2016 Date f Last Revisin: Nv 5, 2008 Categry: Emergency Ref Plicy #: Tpic: SURGE CAPACITY

More information

CANADA-JERUSALEM CO-DEVELOPMENT AND CO-PRODUCTION INCENTIVE GUIDELINES 2017

CANADA-JERUSALEM CO-DEVELOPMENT AND CO-PRODUCTION INCENTIVE GUIDELINES 2017 CANADA-JERUSALEM CO-DEVELOPMENT AND CO-PRODUCTION INCENTIVE GUIDELINES 2017 The Canada-Jerusalem C-Develpment and C-Prductin Incentive The Canada-Jerusalem C-Develpment and C-Prductin Incentive ( Incentive

More information

Meeting Minutes: Radioactive Materials Unit March 6, 2018

Meeting Minutes: Radioactive Materials Unit March 6, 2018 Meeting Minutes: Radiactive Materials Unit March 6, 2018 Minutes prepared by: Tyler Kruse Lcatin: OLF B-145 Attendance MDH Staff: Sherrie Flaherty, Supervisr, Radiactive Materials Unit Lynn Frtier, Radiatin

More information

Bulletin. Required Activity: Admission to Medicaid-Certified Nursing Facilities and 90-day Redetermination TOPIC PURPOSE CONTACT SIGNED

Bulletin. Required Activity: Admission to Medicaid-Certified Nursing Facilities and 90-day Redetermination TOPIC PURPOSE CONTACT SIGNED Bulletin NUMBER #17-25-06 DATE August 7, 2017 OF INTEREST TO Cunty Directrs Scial Services Supervisrs and Staff Tribal Health Directrs Lng Term Care Cnsultatin Cntacts Nursing Facility Prviders Hspital

More information

State Operations Manual Appendix P - Survey Protocol for Long Term Care Facilities - Part I

State Operations Manual Appendix P - Survey Protocol for Long Term Care Facilities - Part I State Operatins Manual Appendix P - Survey Prtcl fr Lng Term Care Facilities - Part I (Rev. 21, 10-20-06) Transmittals fr Appendix P I. Intrductin II. The Survey Prcess II.A The Quality Indicatrs Survey

More information

SCARBOROUGH PUBLIC SCHOOLS

SCARBOROUGH PUBLIC SCHOOLS SCARBOROUGH PUBLIC SCHOOLS Cmprehensive Emergency Management Plan 259 US Rute 1 P.O. Bx 370 Scarbrugh, ME 04070-0370 PARENT INFORMATION GUIDE August 27, 2014 Page 1 Cmprehensive Emergency Management Plan

More information

Health Care Practitioner Authorization Required Yes. Must be in original container with original label containing the name of the child affixed.

Health Care Practitioner Authorization Required Yes. Must be in original container with original label containing the name of the child affixed. Attachment B-Additinal Summary Infrmatin fr Parents The fllwing infrmatin is intended t prvide parents with a cmprehensin explanatin f plicies and prcedures at Mntessri Escuela: Mntessri Escuela supprts

More information

Job Description. TulipCare Job Description. Page 1. Senior Residential Support Worker

Job Description. TulipCare Job Description. Page 1. Senior Residential Support Worker Jb Descriptin Page 1 TulipCare Jb Descriptin Jb Title: Place f wrk: Hurs: Respnsible t: Salary: Benefits: Senir Residential Supprt Wrker lfrd 40 hurs per week average n a shift basis t include sleeping-in

More information

Ebola Virus Disease Protocol

Ebola Virus Disease Protocol Nte: This dcument is fr public release. Restricted phne numbers and emails have been remved. Ebla Virus Disease Prtcl (Versin 2) Department f Health and Wellness (This page intentinally left blank) Table

More information

POSITION: Palliative Care Registered Nurse Division 1. Coordinator Nursing Services. LOCATED: 472 Nicholson Street, Fitzroy North 3068

POSITION: Palliative Care Registered Nurse Division 1. Coordinator Nursing Services. LOCATED: 472 Nicholson Street, Fitzroy North 3068 POSITION: Palliative Care Registered Nurse Divisin 1 REPORTS TO: Crdinatr Nursing Services LOCATED: 472 Nichlsn Street, Fitzry Nrth 3068 DATE: April 2018 ORGANISATIONAL ENVIRONMENT Melburne City Missin

More information

Yes, USERRA Applies to 12304b Duty

Yes, USERRA Applies to 12304b Duty LAW REVIEW 17110 1 Nvember 2017 Yes, USERRA Applies t 12304b Duty By Captain Samuel F. Wright, JAGC, USN (Ret.) 2 Update n Sam Wright 1.1.3.1 USERRA applies t vluntary service 1.1.3.3 USERRA applies t

More information

Government Equalities Office Returners Fund

Government Equalities Office Returners Fund Gvernment Equalities Office Returners Fund Overview In the Spring Budget 2017, the Prime Minister cmmitted 5 millin t prmte returnships t the public and private sectrs, helping peple back int emplyment

More information

Military Medical Student Association (MMSA) Constitution

Military Medical Student Association (MMSA) Constitution Military Medical Student Assciatin (MMSA) Cnstitutin Article 1: Name Military Medical Student Assciatin (MMSA) Article 2: Purpse a) Its primary missin is t supprt current military cntract students by:

More information

REGIONAL ARTS FUND Quick Response Grant

REGIONAL ARTS FUND Quick Response Grant REGIONAL ARTS FUND Quick Respnse Grant Intrductin The Reginal Arts Fund is an Australian Gvernment prgram that supprt sustainable cultural develpment in reginal and remte cmmunities in Australia. The prgram

More information

Academic Health Center Mayo Mail Code Delaware Street SE, Minneapolis, MN nexusipe.

Academic Health Center Mayo Mail Code Delaware Street SE, Minneapolis, MN nexusipe. Academic Health Center May Mail Cde 501 420 Delaware Street SE, Minneaplis, MN 55455 612-625-3972 nexusipe@umn.edu nexusipe.rg Natinal Center fr Interprfessinal Practice and Educatin Nexus Summit 2017:

More information

Bursary Guidelines for Employed

Bursary Guidelines for Employed Bursary Guidelines fr Emplyed Status: Custdian: Apprved: Apprved Learning Divisin Manager Chief Executive Officer Decisin Date: 13/11/2014 Review Date: 29/01/2016 5/12/2016 Versin Number: LD/GL001/2017

More information

February 11, 2011 Volume 16 Number 2 Infection Control F441

February 11, 2011 Volume 16 Number 2 Infection Control F441 February 11, 2011 Vlume 16 Number 2 Infectin Cntrl F441 On December 12, 2009, the Centers fr Medicare and Medicaid Services (CMS) issued new guidance fr F441 Infectin Cntrl. Several F tags 441, 442, 443,

More information

2018 HBS New Venture Competition Student Social Enterprise Track

2018 HBS New Venture Competition Student Social Enterprise Track 2018 HBS New Venture Cmpetitin Student Scial Enterprise Track Details fr Participating Teams KEY DATES See details fr each n fllwing pages Date January 31, 2018 12:00 nn February 21, 2018 12:00 nn March

More information

Job & Person Specification

Job & Person Specification Title f Psitin Team Leader: Schls Educatin and Supprt Classificatin ASO6 Occupant: Jb Specificatin Key Purpse f the rle: The Team Leader: Schls Educatin and Supprt cntributes t the prmtin and

More information

GRANT GUIDELINES FOR ORGANIZATIONS 2017 CYCLE

GRANT GUIDELINES FOR ORGANIZATIONS 2017 CYCLE GRANT GUIDELINES FOR ORGANIZATIONS 2017 CYCLE SUBMISSION DEADLINE Thursday, March 30, 2017 at 5:00 PM GRANTS PROGRAM OVERVIEW CultureWrks missin is t drive a vibrant cmmunity by inspiring, enabling and

More information

CITY OF MELBOURNE APPLICATION FOR DOWNTOWN MELBOURNE CRA RETAIL CORE COMMERCIAL LIGHTING PROGRAM

CITY OF MELBOURNE APPLICATION FOR DOWNTOWN MELBOURNE CRA RETAIL CORE COMMERCIAL LIGHTING PROGRAM The Melburne Dwntwn Cmmunity Redevelpment Agency (CRA) is prviding funding fr a lighting enhancement prgram within the dwntwn retail cre. Grant funding is prvided t encurage building wners r businesses

More information

Respiratory Benefits Program

Respiratory Benefits Program Respiratry Benefits Prgram BPAP Service Delivery Mdel July 1, 2014 Alberta Aids t Daily Living BPAP Therapy Benefits Service Delivery Mdel (SDM) July 1, 2014 Apprval and Authrizatin f BPAP Therapy by the

More information

Guide to Complete the Steps for Foreign-Trained Nurses to Obtain the Maryland Registered Nurse (RN) License

Guide to Complete the Steps for Foreign-Trained Nurses to Obtain the Maryland Registered Nurse (RN) License Guide t Cmplete the Steps fr Freign-Trained Nurses t Obtain the Maryland Registered Nurse (RN) License Welcme Back Center Suburban Maryland Mntgmery Cunty, Maryland Department f Health and Human Services

More information

CANADA-LUXEMBOURG CO-DEVELOPMENT AND CO-PRODUCTION INCENTIVE FOR AUDIOVISUAL PROJECTS GUIDELINES

CANADA-LUXEMBOURG CO-DEVELOPMENT AND CO-PRODUCTION INCENTIVE FOR AUDIOVISUAL PROJECTS GUIDELINES CANADA-LUXEMBOURG CO-DEVELOPMENT AND CO-PRODUCTION INCENTIVE FOR AUDIOVISUAL PROJECTS GUIDELINES 2018-2019 Canada-Luxemburg C-Develpment and C-Prductin Incentive fr Audivisual Prjects The Canada-Luxemburg

More information

Draft III Revisions December 2017

Draft III Revisions December 2017 Draft III Revisins December 2017 STANDARD N PREAMBLE The dynamic nature f cntemprary health and human services delivery systems prvides challenging pprtunities fr the ccupatinal therapist t pssess the

More information

IHSS In Home Support Services

IHSS In Home Support Services IHSS In Hme Supprt Services What is IHSS? The IHSS prgram is a statewide mandated prgram administered by each cunty under the directin f the Califrnia Department f Scial Services. It prvides thse with

More information