Difference between revisions of "Securely sending data to All n One"
From All n One's bxp software Wixi
Philip Lacey (talk | contribs) (Created page with "= Overview = From time to time there is a need to transfer the All n One team data. We ask you please to consider security before sending us something. This article is de...") |
Philip Lacey (talk | contribs) m |
||
| (2 intermediate revisions by the same user not shown) | |||
| Line 11: | Line 11: | ||
Before you send us any data please have a read of the following and rate the data for yourself before you send it to us. | Before you send us any data please have a read of the following and rate the data for yourself before you send it to us. | ||
| + | |||
{| | {| | ||
| Line 16: | Line 17: | ||
! Title | ! Title | ||
|- | |- | ||
| − | | A. || Restricted Data | + | | style="width: 10%; background-color: red;" | A. |
| + | | style="width: 90%; background-color: red;" | Restricted Data | ||
|- | |- | ||
| || Data should be classified as Restricted when the unauthorized disclosure, alteration or destruction of that data could cause a significant level of risk to the University or its affiliates. Examples of Restricted data include data protected by law, regulations and data protected by confidentiality agreements. The highest level of security controls should be applied to Restricted data. | | || Data should be classified as Restricted when the unauthorized disclosure, alteration or destruction of that data could cause a significant level of risk to the University or its affiliates. Examples of Restricted data include data protected by law, regulations and data protected by confidentiality agreements. The highest level of security controls should be applied to Restricted data. | ||
|- | |- | ||
| − | | B. || Private Data | + | | style="width: 10%; background-color: orange;" | B. |
| + | | style="width: 90%; background-color: orange;" | Private Data | ||
|- | |- | ||
| || Data should be classified as Private when the unauthorized disclosure, alteration or destruction of that data could result in a moderate level of risk to the Company or its affiliates. By default, all Company Data that is not explicitly classified as Restricted or Public data should be treated as Private data. A reasonable level of security controls should be applied to Private data. | | || Data should be classified as Private when the unauthorized disclosure, alteration or destruction of that data could result in a moderate level of risk to the Company or its affiliates. By default, all Company Data that is not explicitly classified as Restricted or Public data should be treated as Private data. A reasonable level of security controls should be applied to Private data. | ||
|- | |- | ||
| − | | C. || Public Data | + | | style="width: 10%; background-color: green;" | C. |
| + | | style="width: 90%; background-color: green;" | Public Data | ||
|- | |- | ||
| || Data should be classified as Public when the unauthorized disclosure, alteration or destruction of that data would results in little or no risk to the University and its affiliates. Examples of Public data include press releases, course information and research publications. While little or no controls are required to protect the confidentiality of Public data, some level of control is required to prevent unauthorized modification or destruction of Public data. | | || Data should be classified as Public when the unauthorized disclosure, alteration or destruction of that data would results in little or no risk to the University and its affiliates. Examples of Public data include press releases, course information and research publications. While little or no controls are required to protect the confidentiality of Public data, some level of control is required to prevent unauthorized modification or destruction of Public data. | ||
|- | |- | ||
|} | |} | ||
| + | |||
| + | |||
| + | If the information is Private or Restricted Data, then please do not email the data to us. Instead you can use one of the following secure transfer methods. | ||
| + | |||
| + | |||
| + | |||
| + | = Secure Transfer Methods = | ||
| + | |||
| + | |||
| + | == eCourse == | ||
| + | |||
| + | |||
| + | If your system has the eCourse module, the you can easily upload the data as an asset to an eCourse page. The details of creating a book and uploading material is documented here. [[How_To_Add_an_Asset_to_an_eCourse]] | ||
| + | |||
| + | |||
| + | If you need to create a book, that's no hassle either. [[What_is_an_eCourse]] | ||
| + | |||
| + | |||
| + | Please remember to ensure that the members of the All n One team have access to the book / chapter / page to be able to get to the file. | ||
| + | |||
| + | |||
| + | |||
| + | == sFTP (Secure File Transfer) - into bxp == | ||
| + | |||
| + | |||
| + | If there are a lot of files to transfer or we're going to establish a more permanent regime of transferring files then this is probably the best option. | ||
| + | |||
| + | |||
| + | We will create on your behalf an sFTP folder which you can use a client like Filezilla to secure transfer files to us. | ||
| + | |||
| + | |||
| + | Have a read here. [[Using_bxp_and_SFTP]] | ||
| + | |||
| + | |||
| + | |||
| + | == sFTP (Secure File Transfer) - collection from you == | ||
| + | |||
| + | |||
| + | If you have your own sFTP server or similar infrastructure then we can come in and collect the data from you. We will be happy to work with you and your security teams to securely collect the data and bring it into our secure environment. | ||
| + | |||
| + | |||
| + | |||
| + | = Conclusion = | ||
| + | |||
| + | |||
| + | If you need anything at all, please don't hesitate to pick up the phone and ring our support team and we'll help you with your data. Phone + 353 1 429 4000 or email support@bxpsoftware.com | ||
| + | |||
[[Category:Topic:Security]] | [[Category:Topic:Security]] | ||
Latest revision as of 14:19, 19 April 2016
Contents
1 Overview
From time to time there is a need to transfer the All n One team data. We ask you please to consider security before sending us something. This article is designed to provide some guidance and alternatives on transferring data securely to us.
2 Data Handling
Before you send us any data please have a read of the following and rate the data for yourself before you send it to us.
| Type | Title |
|---|---|
| A. | Restricted Data |
| Data should be classified as Restricted when the unauthorized disclosure, alteration or destruction of that data could cause a significant level of risk to the University or its affiliates. Examples of Restricted data include data protected by law, regulations and data protected by confidentiality agreements. The highest level of security controls should be applied to Restricted data. | |
| B. | Private Data |
| Data should be classified as Private when the unauthorized disclosure, alteration or destruction of that data could result in a moderate level of risk to the Company or its affiliates. By default, all Company Data that is not explicitly classified as Restricted or Public data should be treated as Private data. A reasonable level of security controls should be applied to Private data. | |
| C. | Public Data |
| Data should be classified as Public when the unauthorized disclosure, alteration or destruction of that data would results in little or no risk to the University and its affiliates. Examples of Public data include press releases, course information and research publications. While little or no controls are required to protect the confidentiality of Public data, some level of control is required to prevent unauthorized modification or destruction of Public data. |
If the information is Private or Restricted Data, then please do not email the data to us. Instead you can use one of the following secure transfer methods.
3 Secure Transfer Methods
3.1 eCourse
If your system has the eCourse module, the you can easily upload the data as an asset to an eCourse page. The details of creating a book and uploading material is documented here. How_To_Add_an_Asset_to_an_eCourse
If you need to create a book, that's no hassle either. What_is_an_eCourse
Please remember to ensure that the members of the All n One team have access to the book / chapter / page to be able to get to the file.
3.2 sFTP (Secure File Transfer) - into bxp
If there are a lot of files to transfer or we're going to establish a more permanent regime of transferring files then this is probably the best option.
We will create on your behalf an sFTP folder which you can use a client like Filezilla to secure transfer files to us.
Have a read here. Using_bxp_and_SFTP
3.3 sFTP (Secure File Transfer) - collection from you
If you have your own sFTP server or similar infrastructure then we can come in and collect the data from you. We will be happy to work with you and your security teams to securely collect the data and bring it into our secure environment.
4 Conclusion
If you need anything at all, please don't hesitate to pick up the phone and ring our support team and we'll help you with your data. Phone + 353 1 429 4000 or email support@bxpsoftware.com