Does your organization perform background checks to examine and assess an employee's or contractor's work and criminal history?   
				  
			
				    
				  
			
				    
				  
			
				   
				  	Are your employees required to sign a non-disclosure agreement upon hire, and then again annually?   
				  
			
				    
				  
			
				    
				  
			
				   
				  	Do you have a formal process to manage the termination and/or transfer of employees?   
				  
			
				    
				  
			
				    
				  
			
				   
				  	Do you have physical security controls (e.g., door locks) to prevent unauthorized access to facilities and a facility security plan?   
				  
			
				    
				  
			
				    
				  
			
				   
				  	Do you have controls on systems and networks that host, process and/or transfer sensitive information, including the use of firewalls and controls for protecting network devices from unauthorized access and data-theft?   
				  
			
				    
				  
			
				    
				  
			
				    
				  
			
				   
				  	Are connections to your networks and systems logged and monitored?   
				  
			
				    
				  
			
				    
				  
			
				    
				  
			
				   
				  	Do you have a formal access authorization process based on 'least privilege' (employees are granted the least amount of access possible in order to perform their assigned duties) and need to know (access permissions are granted based upon the legitimate business need of the user to access the information)?   
				  
			
				    
				  
			
				    
				  
			
				    
				  
			
				   
				  	Do you require each user ID to be unique and not shared with others, and have a process to remove them when the user leaves the organization?   
				  
			
				    
				  
			
				    
				  
			
				   
				  	Have you implemented anti-malware (e.g., anti-virus, spam filters, etc.) on your computers and supporting systems?   
				  
			
				    
				  
			
				    
				  
			
				    
				  
			
				   
				  	Media handling: Do procedures exist to protect documents (e.g., paper files, prescription labels, print materials, etc.) and computer media (e.g., tapes, disks, CD-ROMs, etc.), from unauthorized disclosure, modification, removal, and destruction? Is sensitive data encrypted when stored on laptop, desktop and server hard drives, flash drives, backup tapes, etc.?If the answer is "No" to either of these questions, answer "No".   
				  
			
				    
				  
			
				    
				  
			
				   
				  	Segregation of Computing Environments: Are development, test and production environments separated from operational IT environments to protect production (actively used) applications from inadvertent changes or disruption? Are the data files of your business clients segregated from one another?  If the answer to either question is "No" indicate "No" as your answer. Or, is this not applicable at your organization?   
				  
			
				    
				  
			
				    
				  
			
				    
				  
			
				   
				  	Segregation of Duties: Are duties separated, where appropriate, to reduce the opportunity for unauthorized modification, unintentional modification or misuse of the organization's IT assets? Or, is this not applicable at your organization?   
				  
			
				    
				  
			
				    
				  
			
				   
				  	Change Management: Do formal change management procedures exist for networks, systems, desktops, software releases, deployments, and software vulnerability (e.g., virus or spyware) patching activities?  Or, is this not applicable at your organization?   
				  
			
				    
				  
			
				    
				  
			
				   
				  	How would you evaluate your current implementation of all of the above controls?   
				  
			
				    
				  
			
				    
				  
			
				   
				  	Could you provide documentation (e.g., information security policies, supporting business documentation, etc.) for all the controls above within 24 hours or request?