The security of the medical school's systems and data are of the utmost importance to Feinberg IT. Knowledge of and compliance with our security policies and procedures are the responsibility of each staff and faculty member. Please learn more below.
Feinberg Information Security & Access
Feinberg Information Security & Access offers tips on staying compliant with Feinberg IT policies.
Data Security Plans for Information Used in Clinical Research
Authorization & Access Control Policy
The Authorization & Access Control Policy establishes the requirements to ensure authentication and access to electronic PHI and PII is approved and sufficient to perform duties while maintaining compliance with Northwestern University (NU) policies.
Security Training Policy
The Security Training Policy establishes the required security privacy training and awareness as required by the HIPAA Privacy and Security Rule.
Device Security Policy
The Device Security Policy defines the appropriate use of personal devices and smart phones.
Physical Device Security Policy
The Physical Device Security Policy establishes the required physical attributes of a computing device and its surroundings.
Cloud Security Policy
The Cloud Security Policy defines the appropriate use of cloud services and the security controls to establish when adopting cloud computing.
Security Risk Management Policy
The Security Risk Management Policy establishes the information security risk management program and oversight for the Northwestern University (NU) Feinberg School of Medicine (FSM).
Vulnerability Management Policy
The Vulnerability Management Policy establishes the framework for the Northwestern University (NU) Feinberg School of Medicine (FSM) vulnerability management program.
Patch Management Policy
The Patch Management Policy establishes the patch management program and oversight for the Northwestern University (NU) Feinberg School of Medicine (FSM).
Data Backup Policy
The Data Backup Policy and procedure establishes the required actions to ensure administrative data and research data is backed up, safely stored and is accessible and available to restore ongoing operations.
Log Management Policy
The Log Management Policy and procedure establishes the requirements to record activity in information systems that contain or use electronic Personal Health Information (ePHI) or personally identifiable information (PII).
Administrative Computer Access Accounts Policy
The Administrative Computer Access Accounts Policy defines the control and management of the assignment and use of administrative computer access accounts.
Administrative Computer Access Request
If you would like to request administrator rights to your computer, please submit the Computer Administrator Rights form to begin the process.
Assessing the Probability of Public Disclosure of Protected Data
This Assessing the Probability of Public Disclosure of Protected Data policy and procedure defines the required method to assess a probability of unauthorized disclosure of protected University data resulting from all forms of device compromise and/or unauthorized data loss as a result of reported or discovered incident.