Network Storage 1St Edition Pdf, Epub, Ebook

Total Page:16

File Type:pdf, Size:1020Kb

Network Storage 1St Edition Pdf, Epub, Ebook NETWORK STORAGE 1ST EDITION PDF, EPUB, EBOOK James OReilly | 9780128038659 | | | | | Network Storage 1st edition PDF Book Sorry, this product is currently out of stock. Electricity transmission and distribution systems carry electricity from suppliers to demand sites. Categories : Network-attached storage Server appliance Software appliances. Updating Results. Clustered NAS, like a traditional one, still provides unified access to the files from any of the cluster nodes, unrelated to the actual location of the data. Following the Newcastle Connection, Sun Microsystems ' release of NFS allowed network servers to share their storage space with networked clients. NAS is designed as an easy and self-contained solution for sharing files over the network. Advanced grid technologies to sustain higher network efficiency and maintaining power quality and security are under development. NAS units rarely limit clients to a single protocol. Imprint: Morgan Kaufmann. Paper data storage media. Computer data storage server. This book explains the components, as well as how to design and implement a resilient storage network for workgroup, departmental, and enterprise environments. All Pages Books Journals. Jim is currently a consultant specializing in storage systems, virtualization, infrastructure software, and cloud hardware. All Pages Books Journals. Enterprise storage architects, designers, and managers, as well as executives will find "Resilient Storage Networks" both interesting and informative. President, Volanto, USA. IT managers and administrators, network system sales and marketing staff, network system integrators and support staff, Networking students, faculty, and researchers. Be the first to write a review. About Overview Electricity transmission and distribution systems carry electricity from suppliers to demand sites. In an appropriately configured RAID array, a single bad block on a single drive can be recovered completely via the redundancy encoded across the RAID set. Copyright Page. This is often contrasted with SAN storage area network , which provides only block-based storage and leaves file system concerns on the "client" side. Semiconductor memory Magnetic storage Optical storage Paper data storage Uncommon storage technologies. From Wikipedia, the free encyclopedia. The potential emerging market for NAS is the consumer market where there is a large amount of multi-media data. Connect with:. Your review was sent successfully and is now waiting for our team to publish it. Network Storage 1st edition Writer Table of Contents Front Cover. One way to loosely conceptualize the difference between a NAS and a SAN is that NAS appears to the client OS operating system as a file server the client can map network drives to shares on that server whereas a disk available through a SAN still appears to the client OS as a disk, visible in disk and volume management utilities along with client's local disks , and available to be formatted with a file system and mounted. When you read an eBook on VitalSource Bookshelf, enjoy such features as: Access online or offline, on mobile or desktop devices Bookmarks, highlights and notes sync across all your devices Smart study tools such as note sharing and subscription, review mode, and Microsoft OneNote integration Search and navigate content across your entire Bookshelf library Interactive notebook and read-aloud functionality Look up additional information online by highlighting a word or phrase. Because data security is often neglected, users will find a comprehensive discussion on security issues that offers remedies that can be applied. Thank you for posting a review! Enterprise storage architects, designers, and managers, as well as executives will find "Resilient Storage Networks" both interesting and informative. A shared disk file system can also be run on top of a SAN to provide filesystem services. Free Shipping Free global shipping No minimum order. Flexible - Read on multiple operating systems and devices. Wikimedia Commons. From Wikipedia, the free encyclopedia. A resilient storage network is an environment where data is always available for the needs of the business. A NAS unit is a computer connected to a network that provides only file-based data storage services to other devices on the network. Half Title Page. From the mids, NAS devices began gaining popularity as a convenient method of sharing files among multiple computers. Be the first to write a review. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle. Free Shipping Free global shipping No minimum order. Thanks in advance for your time. Search for books, journals or webpages When both are served over the network, NAS could have better performance than DAS, because the NAS device can be tuned precisely for file serving which is less likely to happen on a server responsible for other processing. The price of NAS appliances has fallen sharply in recent years, offering flexible network-based storage to the home consumer market for little more than the cost of a regular USB or FireWire external hard disk. Greg works with large and small customers from different industries involving storage and storage networking. We value your input. A full-featured operating system is not needed on a NAS device, so often a stripped-down operating system is used. NAS is generally not as customizable in terms of hardware CPU, memory, storage components or software extensions, plug-ins , additional protocols as a general-purpose server supplied with DAS. The book explores the software changes that are motivating this evolution, ranging from data management, to in-stream processing and storage in virtual systems, and changes in the decades-old OS stack. ISSN Accurate pricing will only display for registered users. Paper data storage media. Reviews 0. Network-attached storage NAS is a file-level as opposed to block-level storage computer data storage server connected to a computer network providing data access to a heterogeneous group of clients. Such a "NAS" SATA hard disk drive can be used as an internal PC hard drive, without any problems or adjustments needed, as it simply supports additional options and may possibly be built to a higher quality standard particularly if accompanied by a higher quoted MTBF figure and higher price than a regular consumer drive. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle. The book begins with an overview of the current state of storage and its evolution from the network perspective, looking closely at the different protocols and connection schemes and how they differentiate in use case and operational behavior. IT managers and administrators, network system sales and marketing staff, network system integrators and support staff, Networking students, faculty, and researchers. The hard disk drives with "NAS" in their name are functionally similar to other drives but may have different firmware, vibration tolerance, or power dissipation to make them more suitable for use in RAID arrays, which are often used in NAS implementations. Namespaces Article Talk. As networks and data integrity are intertwined, the book looks at how data is split up and moved to the various appliances holding that dataset and its impact. Potential benefits of dedicated network-attached storage, compared to general-purpose servers also serving files, include faster data access, easier administration, and simple configuration. Updating Results. President, Volanto, USA. If a drive spends several seconds executing extensive retries it might cause the RAID controller to flag the drive as "down" whereas if it simply replied promptly that the block of data had a checksum error, the RAID controller would use the redundant data on the other drives to correct the error and continue without any problem. Puts all the new developments in storage networking in a clear perspective for near-term and long-term planning Offers a complete overview of storage networking, serving as a go-to resource for creating a coherent implementation plan Provides the details needed to understand the area, and clears a path through the confusion and hype that surrounds such a radical revolution of the industry. Authority control GND : Network Storage 1st edition Reviews Skip to content. Unlike their rackmounted counterparts, they are generally packaged in smaller form factors. Addison Wesley. Index card s Punched tape mids Punched card s Edge-notched card Optical mark recognition s Barcode Puts all the new developments in storage networking in a clear perspective for near-term and long-term planning Offers a complete overview of storage networking, serving as a go-to resource for creating a coherent implementation plan Provides the details needed to understand the area, and clears a path through the confusion and hype that surrounds such a radical revolution of the industry. Retrieved A resilient storage network is an environment where data is always available for the needs of the business. The potential emerging market for NAS is the consumer market where there is a large amount of multi-media data. NAS is specialized for serving files either by its hardware, software, or configuration. Table of Contents Front Cover. Powered by. Although it may technically be possible to run other software on a NAS unit, it is usually not designed to be a general-purpose server. As networks and data integrity are intertwined, the book looks at how data is split up and moved to the various appliances
Recommended publications
  • <Title of the Industry White Paper>
    Capture, Indexing & Auto-Categorization Intelligent methods for the acquisition and retrieval of information stored in digital archives AIIM Industry White Paper on Records, Document and Enterprise Content Management for the Public Sector © AIIM International Europe 2002 © DLM-Forum 2002 © PROJECT CONSULT 2002 All rights reserved. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means – graphic, electronic or mechanical, including photocopying, recording, taping, or information storage and retrieval systems – without the written permission from the publisher. Trademark Acknowledgements All trademarks which are mentioned in this book that are known to be trademarks or service marks may or may not have been appropriately capitalized. The publisher cannot attest to the accuracy of this information. Use of a term of this book should not be regarded as affecting the validity of any trademark or service mark. Warning and disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book. First Edition 2002 ISBN 3-936534-00-4 (Industry White Paper Series) ISBN 3-936534-01-2 (Industry White Paper 1) Price (excl. VAT): 10 € Die Deutsche Bibliothek – CIP-Einheitsaufnahme Printed in United Kingdom by Stephens & George Print Group Capture, Indexing & Auto-Categorization Intelligent methods for the acquisition and retrieval of information stored in digital archives AIIM Industry White Paper on Records, Document and Enterprise Content Management for the Public Sector AIIM International Europe Chappell House The Green, Datchet Berkshire SL3 9EH - UK Tel: +44 (0)1753 592 769 Fax: +44 (0)1753 592 770 [email protected] DLM-Forum Electronic Records Scientific Committee Secretariat European Commission SG.B.3 Office JECL 3/36, Rue de la Loi 200, B-1049 Brussels - Belgium Tel.
    [Show full text]
  • Statisticians' Lib: Using Scanners and OMR Software for Affordable Data Input
    STATISTICS AND THE SOCIAL SCIENCES Statisticians' Lib: Using Scanners and OMR Software for Affordable Data Input Frank LoPresti with Zvia Segal Naphtali Falling prices for reliable scanners, along with improved software, should make life simpler for researchers in the social sciences. While programs like like SPSS and SAS satisfy most needs for statistical analysis, they depend on the existence of good, clean datasets. You can now create such datasets using Remark Office OMR (optical mark recognition) software and a low-priced scanner. I have been using Remark with a two-year-old Pentium-based computer and an HP 4P scanner for affordable, robust, versatile input of questionnaire data to file. Before I describe how it's done, let me give a short history of data input. That will give you an idea of just how big an improvement this style of input is. The Data Bottleneck For years, people who do statistical analysis have been designing questionnaires, getting them filled out by respondents or interviewers, and then somehow wrestling the data into a computer. The questionnaires might be a department's student evaluations, a perfume company's evaluaton of its packaging and ad campaign, or a PhD candidate's thesis research. But always, the most problematic aspect of data collection has been getting the data from the questionnaire into the computer. With the first computers, much of the data was input by creating decks of punched cards. While this process allowed one to create the necessary computer files, it was subject to input error and thus had to be verified.
    [Show full text]
  • United States Patent (19) 11 Patent Number: 5,761,485 Munyan (45) Date of Patent: Jun
    USOO5761485A United States Patent (19) 11 Patent Number: 5,761,485 Munyan (45) Date of Patent: Jun. 2, 1998 54 PERSONAL ELECTRONIC BOOKSYSTEM Miyazawa et al. ("An Electronic Book: APTBook". Human-Computer Interaction-Interact '90. Proceedings of 76) Inventor: Daniel E. Munyan, 805 Mt. Gretna the IFIPTC 13 Third International Conference, 1 Jan. 1990, Rd., Elizabethtown, Pa. 17022 pp. 513-519). 21 Appl. No.: 565,915 (List continued on next page.) 22 Filed: Dec. 1, 1995 (51) Int. Cl. ............................ G06F 15/02; G06F 17/40: Primary Examiner Emanuel Todd Voeltz G09G 1/02 Assistant Examiner-Phalaka Kik 52 U.S. Cl. .............................. 395/500; 345/901; 326/8: Attorney, Agent, or Firm-Earl F. Clifford; Clifford & 395/187.01; 455/411 Clifford Law Firm 58) Field of Search .................................... 395/2.69, 500, 395/145. 2.82, 186, 187.01, 188.01, 200.09. 57 ABSTRACT 650; 455/89; 379/98. 368, 58: 348/134: The Personal Electronic Book System invention replaces a 382/14, 56; 345/192, 127, 130,901: 434/317: standard handheld book with an electronic equivalent. The 326/8; 364/286.4, 286.5, 949.81 260: 365/185.04; invention is sized and configured to be book size and to open 462/903: 463/29: 902/4 like a book for use. When opened, the user sees two facing page-like touch-sensitive, display screens with black print 56) References Cited on white background. Icons represent the electronically U.S. PATENT DOCUMENTS stored material. "artwork, audio clips, books, E-mail, faxes, 3,718,906 2/1973 Lighter.
    [Show full text]
  • Human Services Examiner
    Cayuga County Department of Human Resources and Civil Service Commission JOB SPECIFICATION Civil Service Title: HUMAN SERVICES EXAMINER Jurisdictional Class: Competitive Civil Division: County Adoption: CSM 12/17/03 Revised: CSM 02/09/05 (Change in Title); 10/18/06; 6/14/17; 3/16/21 DISTINGUISHING FEATURES OF THE CLASS: This position exists in the Department of Social Services and involves responsibility to participate in the delivery of financial service programs including: Public Assistance, Medical Assistance, Supplemental Nutrition Assistance Program (SNAP), and Child Support Enforcement Services. The work is performed in accordance with State and Federal regulations and department policy and involves responsibility in determining financial eligibility, investigations, in-depth interviewing, establishing amounts of assistance, making appropriate referrals; and the processing and maintenance of a variety of forms and records. In addition, the incumbents may represent the department in court as custodian of record to ascertain the completeness of records. Depending upon unit and/or assignment, work is performed under the direct or general supervision of a higher-level employee with leeway allowed in the performance of work assignments. Supervision is not normally a function of the class. Does related work as required. TYPICAL WORK ACTIVITIES: (Illustrative Only) Conducts investigations, including in-depth interviews to elicit sufficient information to approve, deny or determine the feasibility of a financial service/program, make an
    [Show full text]
  • Teletypewriter Communication Codes
    Teletypewriter Communication Codes Gil Smith [email protected] 2001 (Document Notes) Abstract Preliminary -- 5/01 gil smith Corrections or comments to [email protected] This information is pulled from a variety of sources, such as various emails of the greenkeys group. For more discussion of teletypewriter code development, see: http://www.nadcomm.com/fiveunit/fiveunits.htm http://fido.wps.com/texts/codes/index.html http://www.science.uva.nl/faculteit/museum/DWcodes.html FIVE-UNIT CODES: USTTY and ITA2 (aka BAUDOT) There were a few variations in character codes for five-level teletypewriter machines. The two most-common character codes were ITA2 and USTTY (a variation of ITA2). The USTTY and ITA2 5-level teletypewriter codes are commonly referred to as "Baudot" codes. While this is technically incorrect, these popular 5-level codes evolved from the work of Jean Maurice Emile Baudot of France - - it seems fitting to accept the defacto reference to "Baudot" as implying USTTY or ITA2 codes, since they were the 5-level codes that saw practical use in teletypewriter systems. However, the true Baudot code dates to around 1874, when Baudot designed the "Baudot Multiplex System," a printing telegraph. The system used a 5-level code generated by a device with five keys, operated with two left-hand fingers, and three right-hand fingers -- this required great skill on the part of the operator who entered the code directly. However, it was still a major improvement in communications -- prior to Baudot's design, communication was carried out using Morse code with a telegraph key. The 5-level "Baudot" code was actually designed by Johann Gauss and Wilhelm Weber.
    [Show full text]
  • IBM 1401 System Summary
    File No. 1401-00 Form A24-1401-1 Systems Reference Library IBM 1401 System Summary This reference publication contains brief descriptions of the machine features, components, configurations, and special features. Also included is a section on pro­ grams and programming systems. Publications providing detailed information on sub­ jects discussed in this summary are listed in IB~I 1401 and 1460 Bibliography, Form A24-1495. Major Revision (September 1964) This publication, Form A24-1401-1, is a major revision of and obsoletes Form A24-1401-0. Significant changes have been made throughout the publication. Reprinted April 1966 Copies of this and other IBM publications can be obtained through IBM Branch Offices. Address comments concerning the content of this publication to IBM Product Publications, Endicott, New York 13764. Contents IBM 1401 System Summary . ........... 5 System Concepts . ................ 6 Card-Oriented System .... ......... 11 Physical Features. 11 Interleaving. .. .................................... 14 Data Flow.... ... ... ... ... .. ... ... .. ................... 14 Checking ................................................... 15 Word Mark.. ... ... ... ... ... ... .. ... ... ... ........... 15 Stored-Program Instructions. .................. 15 Operation Codes . .. 18 Editing. .. ............ 18 IBM 1401 Console ............................................ 19 IBM 1406 Storage Unit. ........................... 20 Magnetic-Tape-Oriented System . ........................... 22 Data Flow .................................................
    [Show full text]
  • Computer Programs for the Digitizing ~ and Using of Library Tapes of Ship 1 Stress and Environment Data
    SC-237 I I COMPUTER PROGRAMS FOR THE DIGITIZING ~ AND USING OF LIBRARY TAPES OF SHIP 1 STRESS AND ENVIRONMENT DATA I This document has been approved for public release and sale; its distributionis unlimited. SHIP STRUCTURE COMMITTEE 1973 SHIP STRUCTURE COMMITTEE Ati INTERAGENCY ADVISORY COMMITTEE DEOICATEO TO IMPROVING THE STRUCTURE OF SHIPS MEMBER AGENCIES, ADDRESS CORRESPOtlOENCE TO: LINIICDSTATESCOASTGUARD SECRSIARY NAVALSI+IPSYSTEMSCOMMAND SHIP STRUCTURE COMMITTEE MIIITARYSEALIFTCOMMAND u.S.COASTGUARDHEADOUARIERS MAII1!MEADMINISTRATION WASHINGTON, D.c.XM4k 20590 AMFRI(:ANBUREAUOFStilppING I This report k the companion to SSC 236, a Method for Digitizing, Preparing and Using Library Tapes of Ship Stress and Environment Data, and cent ains the details of the conversion program which has been developed to increase the usefulness of full scale hull s tress, ship motion and environmental information which has been obtained over the last several years. Rear Admiral, U. S. Coast Guard Chairman, Ship Structure Committee SSC-237 Final Technical Report on Project SR-187, “Ship Response Data Study” PART II COMPUTER PROGRAMS FOR THE DIGITIZING AND USING OF LIBRARY TAPES OF SHIP STRESS AND ENVIRON- MENT DATA by Aldie E. Johnson, Jr. James A. F1aherty Isaac J. Walters Teledyne Materials Research under Department of the Navy Naval Ship Engineering Center Contract No. NOO024-69-C-5161 This document has been approved for public release and sale; its distribution is unlimited. U.S. Coast Guard Headquarters Washington, D.C. 1973 ABSTRACT Details of computer programs and their operating instructions are given for the processing of logbook-type data and associated analogue stress signals into digital format. The logbook data is keypunched, edited and formatted for subsequent merging with the analogue signal which has been pro- cessed through an Analogue-to-Di gital (A/D) converter.
    [Show full text]
  • Automate Document Sorting. Efficiently, Neatly and Powerfully. Smarter Scanning and Automated Document Sorting Increase Productivity and Reduce Costs
    Kodak i5650S and i5850S Scanners Automate document sorting. Efficiently, neatly and powerfully. Smarter scanning and automated document sorting increase productivity and reduce costs Kodak i5650S and i5850S Scanners deliver increased efficiency and provide a lower total cost of ownership by combining fast throughput and superior image quality with sophisticated sorting capabilities. This combination offers exceptional real-world value. Watch efficiency grow and costs fall Greater productivity starts with faster speeds and smarter sorting Exceptional real-world value: Today, Business Process Outsourcing a banking scenario (BPO) firms and Service Bureaus face The Kodak i5650S and i5850S Scanners increasing competition and greater provide greater efficiency by scanning and Applying for a loan or mortgage is a pressure to reduce overall costs. In processing more documents with higher paper-intensive process. The i5650S document capture, pre- and post-manual quality, while also offering simply smarter and i5850S Scanners help streamline scanning processes can add up to be sorting features. Both scanners allow you this procedure, thanks to smarter sorting 75% or more of your total scanning cost. to take advantage of advanced document and patch sheet recognition. Reducing these expenses while increasing handling without sacrificing image quality, Today’s Challenge: Customer originals productivity is crucial. That’s why the because they also incorporate all the need to go back to the applicant, Kodak i5650S and i5850S Scanners are robust features of the Kodak i5650 and therefore documents must be prepared here to optimize operations for those i5850 Scanners, including – correctly in the pre-scan process, and dealing with mixed batches and complex • Crisp Perfect Page images for accurately separated during post- scanning requirements, and the challenges enhanced optical character recognition scanning.
    [Show full text]
  • An Introduction to Teleprinters and Punched Tape Equipment
    1st Edition . April 1956 2nd Edition . January 1958 Digital Recreation - Sam Hallas (G8EXV): April 2008 BULLETIN PT56 (Ed. 2) . JANUARY 1958 an introduction to TELEPRINTERS and PUNCHED TAPE EQUIPMENT TELEGRAPH HOUSE CROYDON, ENGLAND TELEPHONE : CROYDON 2121 (10 LINES) TELEGRAPHIC ADDRESS : CREDO, TELEX, CROYDON TELEX : 28836 © 1958 by Creed & Company Limited 1 2 CONTENTS PAGE 5 Introduction Part I: Teleprinters A. BASIC PRINCIPLES 7 Definitions 7 Intelligence 9 Teleprinter Code 11 Start-Stop Principle 11 Telegraph Signals 17 Telegraph Speed B. OUTLINE DESCRIPTION OF A TELEPRINTER 15 Stages of Transmission 16 Keyboard 16 Receiver Part II: Punched Tape Equipment C. PUNCHED TAPE TECHNIQUE 20 Kinds of Punched Tape 22 Methods of Coding Information on Punched Tape D. TYPES OF PUNCHED TAPE EQUIPMENT 28 Keyboard Perforators 30 Tape Readers 34 Perforator-Readers 35 Reperforators 39 Auxiliary Equipment E. APPLICATIONS TO DIGITAL COMPUTERS 41 Input Preparation 48 Input Transmission 49 Output Recording and Printing F. FURTHER PUNCHED TAPE APPLICATIONS 50 Punched Tape-Punched Card Systems 50 Mechanised Addressing Equipment 51 Process Control 3 4 INTRODUCTION Creed Teleprinters and Punched Tape equipment were originally developed for use in the telegraph communication field and they have been increasingly used ever since in telegraph systems all over the world. During recent years, however, their use has been extended beyond this tradi- tional field to a rapidly growing number of non-telegraphic applications such as the provision of input and output facilities for digital computers and the increased automatisation of existing systems such as punched card accounting and mechanised addressing. As a result of this sudden increase in the number of applications that are being found for Teleprinters and Punched Tape, considerable interest is being shown in this equipment by engineers and others who wish to discover whether it can be applied to their own special problems but who lack sufficient knowledge of the basic principles involved to permit them to do this.
    [Show full text]
  • Optical Mark Recognition (OMR)
    Page 1 # A History of Computer As soon as human domesticated animals and started to carry on trade with others, they needed to keep track of numbers. First, people used their fingers. Then they used notches on sticks, counting stone and even knots tied in ropes. The abacus, a rudimentary computing device evolved in different cultures at about the same time. This simple device, which uses beads to represent digits and wires to hold places, is still used today. # People and their Contribution As early as the seventeenth century, mathematicians and other scholars were eager to create a machine that could add, subtract, multiply, and divide numbers. Initially, the evolution of computing devices proceeded slowly. Yet an interesting thing happened with numbers. John Napier, Scotsman, discovered a way to manipulate numbers that would reduce multiplication and divisions to additions and subtractions – logarithms. Then Robert Bissaker invented the slide rule, which helped solve complex problems relatively quickly. Blaise Pascal, a French mathematician and philosopher invented the first mechanical digital calculator, which could perform addition and subtraction on whole numbers. The Pascaline (Figure I), developed around 1640, was a financial failure. It was cheaper to have human labour perform the calculations, workers feared losing their jobs, and only Pascal could repair the machine. However, Pascal’s concept of a decimals counting wheel using gears with ten teeth and one carrying tooth wasn’t made obsolete until the development of the electronic calculator. A programming language, Pascal, was later named to honor his contributions. Figure I The Pascaline # Nineteenth – Century Technology In 1804, the French inventor Joseph Marie Jacquard built and automated punch-card machine (Figure 2) that was used to operate weaving looms.
    [Show full text]
  • Nsa/Css Policy Manual 9-12 Storage Device Sanitization and Destruction Manual
    UNCLASSIFIED NSA/CSS POLICY MANUAL 9-12 STORAGE DEVICE SANITIZATION AND DESTRUCTION MANUAL PUBLICATION INFORMATION DATE: 4 December 2020 (See Document History.) OFFICE OF PRIMARY Center for Storage Device Sanitization Research INTEREST: (301) 688-1053, 977-7113 (secure) RELEASABILITY: NSA/CSS Policy Manual 9-12 is approved for public release. The official document is available on the Office of Policy (P12) website (“go policy”). AUTHORITY: Anne Neuberger, Director, Cybersecurity ISSUED: 4 December 2020 PURPOSE AND SCOPE 1. This policy manual provides routine guidance for sanitization of information system (IS) storage devices for disposal or recycling in accordance with Department of Defense (DoD) Manual 5200.01, Volume 3, “DoD Information Security Program: Protection of Classified Information” (Reference a), Intelligence Community Standard 500-34, “Electronic Waste (E- Waste) Management and Disposal” (Reference b), and NSA/CSS Policy 9-12, “Storage Device Sanitization and Destruction” (Reference c). Information stored on these devices may range from UNCLASSIFIED to TOP SECRET and may include compartmented, sensitive, or limited- distribution material. Furthermore, this manual provides information about how to obtain current listings of evaluated sanitization equipment that meets NSA/CSS specifications. 2. This manual applies to all NSA/CSS elements, contractors, and personnel, and pertains to all IS storage devices that they use. UNCLASSIFIED UNCLASSIFIED Policy Manual 9-12 4 December 2020 TABLE OF CONTENTS Publication Information ..............................................................................................................
    [Show full text]
  • Data Security and Confidentiality Guidelines for Clinical Research at Sparrow Health System
    Data Security and Confidentiality Guidelines for Clinical Research at Sparrow Health System Introduction This document was created to give you guidelines to follow in order to ensure that all confidential health information is protected as you procure, use, transfer, and store the data to complete your project. If you have additional questions after reading this document, a reference list is provided at the end to help you find answers to your questions or you may contact the IRB Office or Privacy Department. Guidelines for Data Procurement • Follow all Institutional Review Board (IRB) policies and procedures when requesting data located in Policy and Procedure Manual (PPM) • Limit your data requests to the minimum necessary. The minimum necessary standard is the minimum necessary to accomplish the intended purpose of the project. For example, do not collect age and date of birth if collecting age only will meet the intended purpose of the project. De-identify data using one of the two approved methods: the statistical method or the “safe harbor” method. See HIPAA Policy, HP-22, De-identified Information and Department of Health and Human Services De-identification Guidelines for more information. • Follow the correct path to data procurement – direct all inquiries for data to Sparrow’s Data Analytics Department. You can complete the general report request and email the completed form to Sparrow’s IT HelpDesk at [email protected]. Your request will then be forwarded to the Data Analytics Department. (Note: Case studies are excluded from this requirement.) • Use of Protected Health Information Preparatory to Research - an investigator may review protected health information solely to prepare a research protocol, or for similar purposes preparatory to research.
    [Show full text]