Yur Infrmatin technlgy Security Plicy

Size: px
Start display at page:

Download "Yur Infrmatin technlgy Security Plicy"

Transcription

1 INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE

2 Cunty f Orange Infrmatin Technlgy Usage Plicy 1 INTRODUCTION: The Cunty f Orange Infrmatin Technlgy (IT) Usage Plicy is the fundatin f the Cunty s infrmatin security effrts. Each member f the Cunty wrkfrce is respnsible fr understanding his/her rle in maintaining Cunty IT security. This plicy summarizes yur infrmatin technlgy respnsibilities. T learn mre abut infrmatin security, please see the Infrmatin Technlgy Security Plicy. Cmplete Sectin 5: Acknwledgement after yu have finished reading this dcument. Yur signature n the Acknwledgement indicates that yu understand and will cmply with Cunty security plicy. If yu disregard security plicies, standards, r prcedures, yu can be subject t Cunty and agency-specific disciplinary actin. 2 TERMS YOU NEED TO KNOW: Authenticatin Back Up Cnfidentiality / Nn-Disclsure Agreement System r Sftware Cnfiguratin Files Electrnic Cmmunicatin Encryptin Infrmatin Security Infrmatin Technlgy (IT) Lcal Security Administratr (LSA) Netwrk Passwrd The prcess f verifying the identity f anyne wh wants t use Cunty infrmatin befre granting them access. T cpy files t a secnd medium (fr example, a disk r tape) as a precautin in case the first medium fails. An agreement that utlines sensitive materials r knwledge that tw r mre parties wish t share with ne anther. By way f such agreement, the parties t the agreement agree nt t share r discuss with utside parties the infrmatin cvered by the agreement. Highly imprtant files that cntrl the peratin f entire systems r sftware. Messages sent and received electrnically thrugh any electrnic text r vice transfer/strage system. This includes , text messages, instant messages (IM) and vic . The translatin f data int a secret cde. Encryptin is the mst effective way t achieve data security. T read an encrypted file, yu must have access t a secret key r passwrd that enables yu t decrypt it. Unencrypted data is called plain text; encrypted data is referred t as cipher text. Safeguarding an rganizatin's data frm unauthrized access r mdificatin t ensure its availability, cnfidentiality, and integrity. The brad subject cncerned with all aspects f managing and prcessing infrmatin within an rganizatin. The persn at each agency wh is respnsible fr the peratinal maintenance f IT security resurces within the agency. Tw r mre linked cmputer systems. There are many different types f cmputer netwrks. Sequence f characters (letters, numbers, symbls) used in cmbinatin with a User ID t access a cmputer system r netwrk. Passwrds are used t authenticate the user befre s/he gains access t the system. Infrmatin Technlgy Usage Plicy January 2010 Page 1

3 Cunty f Orange Infrmatin Technlgy Usage Plicy Persnally Identifiable Infrmatin (PII) User User ID Virus / Malicius Sftware Wrkfrce Member Any piece f infrmatin that culd be used t uniquely identify, cntact, r lcate a single persn. Examples include: full name; natinal identificatin number; address; IP address; driver s license number; and Scial Security Number. Any individual wh uses a cmputer. Unique name given t a user fr identificatin t a cmputer r telephne netwrk, database, applicatin, etc. Cupled with a passwrd, it prvides a minimal level f security. A sftware prgram that interferes with cmputer peratin, damages r destrys electrnic data, r spreads itself t ther cmputers. Viruses and malicius sftware are ften transmitted via , dcuments attached t , and the Internet. Any member f the Cunty wrkfrce, including emplyees, temprary help, cntractrs, vendrs and vlunteers. 3 POLICY OVERVIEW As a member f the Cunty wrkfrce, yu are expected t cmply with the Cunty s Infrmatin Technlgy Usage Plicy. Yur agency may have additinal plicies that yu must fllw as part f yur jb. The fllwing are key cncepts f the Cunty s plicy: Infrmatin created r used in supprt f Cunty business activities is the prperty f the Cunty. Yur assigned infrmatin technlgy resurces are meant t facilitate the efficient and effective perfrmance f yur duties. It is yur respnsibility t ensure that resurces are nt misused and that yu cmply with plicy. If yu need t access cnfidential infrmatin as part f yur duties, yu will be asked t sign a cnfidentiality r nn-disclsure agreement befre yu access the Cunty netwrk. Many Cunty facilities huse sensitive r critical infrmatin systems. Yu are expected t cmply with all physical access cntrls designed t restrict unauthrized access. Yu may nt remve Cunty equipment r data in any frmat frm the wrkplace unless yu have received prir written apprval frm yur supervisr r manager. The use f the netwrk and Internet is a privilege, nt a right. If yu vilate plicy, yu may lse yur netwrk and/r Internet access. The Cunty may refuse t reinstate yur access fr the remainder f yur emplyment at the Cunty. The Cunty may als take ther disciplinary actin as apprpriate under Cunty plicy, departmental plicy and applicable emplyment MOUs. 4 YOUR RESPONSIBILITIES Yur security respnsibilities fall under several different Infrmatin Technlgy categries. Each categry and the key respnsibilities assciated with it are listed belw: Infrmatin Technlgy Usage Plicy January 2010 Page 2

4 Cunty f Orange Infrmatin Technlgy Usage Plicy USER IDs AND PASSWORDS Yu will be issued a netwrk user ID unique t yu. Only yu may use yur user ID t access Cunty resurces (e.g. cmputer, telephne, FAX). Yu will be issued a default passwrd at the same time as yur user ID. Yu will be prmpted t change yur passwrd the first time yu lg in t the system. D nt share user IDs and passwrds with ther users r individuals, including cwrkers and supervisrs. Treat yur passwrd as sensitive and highly cnfidential infrmatin. Yu are agreeing t fllw the Infrmatin Technlgy Usage Plicy when yu accept a passwrd frm the Cunty and use it t access the Cunty data r telephne netwrks, the Internet, r the Intranet. Change yur passwrd immediately if yu think smene else knws it. Reprt yur suspicins t management. If yu lse r frget yur passwrd, yu are required t request a passwrd reset. N ne else can d it fr yu. HARDWARE AND SOFTWARE The Cunty will prvide, and emplyees may request, peripheral equipment such as ear buds fr cellular phnes r Blackberry devices, as may be necessary t enable cmpliance with all lcal laws which pertain t the use f mbile cmmunicatin equipment r the individual wrkplace needs fr the emplyee t perfrm his r her emplyment. Never dwnlad r install any hardware r sftware withut prir written apprval f yur agency IT representative. D nt make any changes t system and/r sftware cnfiguratin files unless specifically authrized in writing by yur agency IT. Maintain yur business data files n a netwrk (r shared ) drive s that they can be backed up accrding t yur agency s regular backup schedule. Use the lck wrkstatin feature any time yu leave yur wrkstatin lgged n t the netwrk and yu are away frm yur desk. D nt cnnect a Cunty laptp r ther mbile device t the netwrk until it has been scanned fr viruses and malicius sftware. Fllw the authenticatin prcedures defined by yur agency whenever yu lg in t the Cunty netwrk via Remte Access. D nt attempt t cnnect yur wrkstatin, laptp, r ther cmputing device t the Internet via an unauthrized wireless r ther cnnectin while simultaneusly cnnected t any Cunty netwrk. Retain riginal sftware installed n yur cmputer if it is prvided t yu. The sftware must be available when yur system is serviced in case it needs t be reinstalled. D nt keep liquids r magnets n r near cmputers, as they can cause serius damage. Ensure that yur equipment is plugged int a surge prtectr at all times. Infrmatin Technlgy Usage Plicy January 2010 Page 3

5 Cunty f Orange Infrmatin Technlgy Usage Plicy Reprt all cmputer prblems in detail n the apprpriate frm and/r when yu cntact the Cunty Service Desk r discuss the prblem with yur agency s Help Desk. Reprt equipment damage immediately t the Cunty Service Desk r yur agency s Help Desk. and TELEPHONE The and telephne systems and netwrks are primarily fr fficial Cunty business. Management can freely inspect r review electrnic mail and data files including vic . Emplyees shuld have n expectatin f privacy regarding their internet usage, electrnic mail r any ther use f Cunty cmputing r telephne equipment. D nt use a Cunty accunt r vic bx assigned t anther individual t send r receive messages unless yu have been authrized, in writing, t act as that individual s delegate. Use f persnal Internet (external) systems frm Cunty netwrks and/r desktp devices is prhibited unless there is a cmpelling business reasn fr such use and prir written apprval has been given by agency management and agency IT. D nt cnfigure r use autmated frwarding t send Cunty t Internet-based (external) systems unless specifically authrized t d s, in writing, by Cunty management. Send cnfidential infrmatin via nly with the written permissin f management and nly via an apprved methd. Mark the accrding t agency plicy. Treat cnfidential r restricted files sent as attachments t messages as cnfidential r restricted dcuments. This als applies t cnfidential r restricted infrmatin embedded within an message as message text r a vic message. D nt delete r vic messages r ther data if management has identified the subject matter as relevant t pending r anticipated litigatin, persnnel investigatin, r ther legal prcesses. THE INTERNET / INTRANET Internet/Intranet access is primarily fr Cunty business. Yu may access the Internet fr limited persnal use nly during nnwrking time and in strict cmpliance with plicy. If there is any dubt abut whether an activity is apprpriate, cnsult with yur Department Head r his/her designee. INFORMATION SECURITY Treat hardcpy r electrnic Persnally Identifiable Infrmatin (PII) as cnfidential and take all precautins necessary t ensure that it is nt cmprmised. Intentinal r even accidental disclsure f PII t unauthrized users is a vilatin f plicy. Dn t leave PII unattended r unsecured fr any perid f time. Be sure t fllw yur agency s plicy fr dispsing f cnfidential data. This may include the physical destructin f data thrugh shredding r ther methds. Infrmatin created, sent, stred r received via the system, netwrk, Internet, telephnes (including vic ), fax r the Intranet is the prperty f the Cunty. Infrmatin Technlgy Usage Plicy January 2010 Page 4

6 Cunty f Orange Infrmatin Technlgy Usage Plicy D nt expect infrmatin yu create and stre n Cunty systems, including messages r electrnic files, t be private. Encrypting r using ther measures t prtect r lck an message r an electrnic file des nt mean that the data are private. The Cunty reserves the right t, at any time and withut ntice, access, read and review, mnitr, and cpy all messages and files n its cmputer system as it deems necessary. The Cunty may disclse text r images t law enfrcement withut yur cnsent as necessary. PROHIBITED ACTIVITY Unless yu are specifically authrized by yur manager r agency in writing, the fllwing uses are prhibited by the Infrmatin Technlgy Security Plicy: Using, transmitting, r seeking inapprpriate r ffensive materials, including but nt limited t vulgar, prfane, bscene, abusive, harassing, belligerent, threatening, r defamatry (harming anther's reputatin by lies) language r materials. Accessing, attempting t access, r encuraging thers t access cntrversial r ffensive materials. Revealing PII withut permissin, such as anther's hme address, telephne number, credit card number r Scial Security Number. Making ffensive r harassing statements r jkes abut language, race, clr, religin, natinal rigin, veteran status, ancestry, disability, age, sex, r sexual rientatin. Sending r sliciting sexually riented messages, images, vide r sund files. Visiting sites featuring prngraphy, terrrism, espinage, theft, drugs r ther subjects that vilate r encurage vilatin f the law. Gambling r engaging in any ther activity in vilatin f lcal, state, r federal law. Uses r activities that vilate the law r Cunty plicy r encurage thers t vilate the law r Cunty plicy. These include: Accessing, transmitting, r seeking cnfidential infrmatin abut clients r cwrkers withut prper authrizatin. Intruding, r trying t intrude, int the flders, files, wrk, netwrks, r cmputers f thers, r intercepting cmmunicatins intended fr thers. Knwingly dwnlading r transmitting cnfidential infrmatin withut prper authrizatin. Uses that cause harm t thers r damage t their prperty, including but nt limited t: Dwnlading r transmitting cpyrighted materials withut the permissin f the cpyright wner. Even if materials n the netwrk r the Internet are nt marked with the cpyright symbl,, assume that they are prtected under cpyright law. Using smene else s passwrd t access the netwrk r the Internet. Impersnating anther user r misleading message recipients int believing that smene ther than the authenticated user is cmmunicating a message. Infrmatin Technlgy Usage Plicy January 2010 Page 5

7 Cunty f Orange Infrmatin Technlgy Usage Plicy Uplading a virus, ther harmful cmpnent, r crrupted data r vandalizing any part f the netwrk. Creating, executing, frwarding, r intrducing cmputer cde designed t self-replicate, damage, r impede the perfrmance f any cmputer s memry, strage, perating system, applicatin sftware, r any ther functinality. Engaging in activities that jepardize the security f and access t the Cunty netwrk r ther netwrks n the Internet. Dwnlading r using any sftware n the netwrk ther than that licensed r apprved by the Cunty. Cnducting unauthrized business r cmmercial activities including, but nt limited t: Buying r selling anything ver the Internet. Sliciting r advertising the sale f any gds r services. Unauthrized utside fund-raising activities, participatin in any lbbying activity, r engaging in any prhibited partisan plitical activity. Psting Cunty, department and/r ther public agency infrmatin t external news agencies, service bureaus, scial netwrking sites, message bards, blgs r ther frums. Uses that waste resurces, including, but nt limited t: Printing f persnal files. Sending chain letters fr any reasn. Including unnecessary recipients n an . Only cpy thers n an r vic message wh shuld be "in the lp" n the tpic addressed. Indiscriminate use f distributin lists. Befre using a distributin list, determine whether r nt it is apprpriate fr everyne n that list t receive the . "All hands" s. s f this type are t be sent nly after management permissin has been btained. Infrmatin Technlgy Usage Plicy January 2010 Page 6

8 Cunty f Orange Infrmatin Technlgy Usage Plicy 5 ACKNOWLEDGEMENT If yu vilate security plicies, standards, r prcedures, yu can be subject t Cunty and agency-specific disciplinary actin up t and including discharge. By signing this dcument, I acknwledge that I have read, understand and will cmply with this Cunty f Orange Infrmatin Technlgy Usage Plicy. I understand that the cmplete Infrmatin Technlgy Usage Plicy is available fr me t review n the Cunty s intranet. I als may request a cpy frm the Cunty Service Desk, my agency s Help Desk, r my agency s Lcal Security Administratr. Wrkfrce Member Name (please print): Wrkfrce Member Signature: Agency/Department: Date: Infrmatin Technlgy Usage Plicy January 2010 Page 7

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5 Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028

More information

Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117

Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ 07644-2117 Cmputer Use Plicy Intrductin - In supprt f Felician Cllege's missin f teaching and public service, the Infrmatin Technlgy

More information

How To Ensure That The Internet Is Safe For A Health Care Worker

How To Ensure That The Internet Is Safe For A Health Care Worker POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy

More information

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,

More information

Meopham School Information Technology Code of Conduct

Meopham School Information Technology Code of Conduct 1. Intrductin Infrmatin technlgy resurces are essential fr accmplishing Mepham Schl s missin f pursuing excellence in teaching and learning, research and cmmunity service. Members f the Schl cmmunity are

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Information & Communications Technology ICT Security Compliance Guide (Student)

Information & Communications Technology ICT Security Compliance Guide (Student) Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 8 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk The Bard f Educatin recgnizes as new technlgies shift the manner in which infrmatin is

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Technical Writing - TheUsers Visa (SHR User Accunt)

Technical Writing - TheUsers Visa (SHR User Accunt) POLICY Number: 7311-25-004 Title: Saskatn Health Regin User Accunt Plicy Authrizatin [ ] President and CEO [X] Vice President, Finance and Crprate Services Surce: Directr, Infrmatin Technlgy Services Crss

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies

More information

DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only

DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM Fr 8 th 12 th Grade Students Only Student s Last Name Parent/Guardian Last Name Class First Name First Name Date Fr the first time this fall, students

More information

Williamson County Board of Education Procedures and Guidelines

Williamson County Board of Education Procedures and Guidelines Williamsn Cunty Bard f Educatin Prcedures and Guidelines Effective Date: 6/21/10; 8/15/11; Page 1 f 7 PURPOSE Williamsn Cunty Schls prvides student and emplyee access t the Internet as a means t increase

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

Woodstock Multimedia, INC. Software/Hardware Usage Policy

Woodstock Multimedia, INC. Software/Hardware Usage Policy Wdstck Multimedia, INC. Sftware/Hardware Usage Plicy POLICY PURPOSE The purpse f the Wdstck Multimedia, INC. Sftware / Hardware Usage Plicy is t ensure that Wdstck Multimedia, INC. emplyees are prperly

More information

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service. FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information

State of North Carolina. Statewide Information Security Manual. Prepared by the Enterprise Security and Risk Management Office

State of North Carolina. Statewide Information Security Manual. Prepared by the Enterprise Security and Risk Management Office State f Nrth Carlina Statewide Infrmatin Security Manual Prepared by the Enterprise Security and Risk Management Office Publicatin Date: January 2015 1 This page intentinally left blank 2 TABLE OF CONTENTS

More information

Frequently Asked Questions About I-9 Compliance

Frequently Asked Questions About I-9 Compliance Frequently Asked Questins Abut I-9 Cmpliance What is required t verify wrk authrizatin? The basic requirement t verify wrk authrizatin is the Frm I-9. This frm is available n the HR website: http://www.fit.edu/hr/dcuments/frms/i-9.pdf

More information

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies Clrad Rapids Yuth Sccer Club Scial Media and Electrnic Cmmunicatin Plicies OVERVIEW Online, scial media and ther electrnic cmmunicatin tls such as text messaging have becme a prevalent and effective means

More information

A. Early Case Assessment

A. Early Case Assessment Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

Service Desk Self Service Overview

Service Desk Self Service Overview Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

Texas Woman's University University Policy Manual

Texas Woman's University University Policy Manual Texas Wman's University University Plicy Manual Plicy Name: Plicy Number: 6.06 Date Passed: July 2004 Health Insurance Prtability& Accuntability Act (HIPAA) Date Reviewed: September 2008 Next Review: September

More information

How To Ensure Your Health Care Is Safe

How To Ensure Your Health Care Is Safe Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

Unified Communications

Unified Communications Office f Infrmatin Technlgy Services Service Level Agreement Unified Cmmunicatins Nvember 7, 2013 v2.2 Service Descriptin Unified Cmmunicatins Service Descriptin ITS Unified Cmmunicatins ffers a number

More information

Help Desk Level Competencies

Help Desk Level Competencies Help Desk Level Cmpetencies Level 1 Take user calls and manage truble tickets Ability t staff and manage the rganizatins helpdesk and effectively respnd t rutine custmer calls Ability t use prper grammar

More information

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet

More information

HCHS Student ipad User Agreement

HCHS Student ipad User Agreement HCHS Student ipad User Agreement Schl ipad Initiative Hancck Cunty High Schl has initiated a 1:1 ipad prgram fr students and teachers in an effrt t embrace 21st Century Skills. Students will be using ipads

More information

To clarify terms used within these policies, the following definitions are provided:

To clarify terms used within these policies, the following definitions are provided: Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail

More information

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

New York Institute of Technology Faculty and Staff Email Retention Policy

New York Institute of Technology Faculty and Staff Email Retention Policy New Yrk Institute f Technlgy Faculty and Staff Email Retentin Plicy Nvember 2013 I. PURPOSE As electrnic mail (email) has becme the primary frm f cmmunicatin at NYIT and thrughut the wrld, the vlume f

More information

North Carolina Department of Cultural Resources Division of Historical Resources Archives & Records Section Government Records Branch

North Carolina Department of Cultural Resources Division of Historical Resources Archives & Records Section Government Records Branch Nrth Carlina Department f Cultural Resurces Divisin f Histrical Resurces Archives & Recrds Sectin Gvernment Recrds Branch E-mail as a Public Recrd in Nrth Carlina: A Plicy fr Its Retentin and Dispsitin

More information

IT Help Desk Service Level Expectations Revised: 01/09/2012

IT Help Desk Service Level Expectations Revised: 01/09/2012 IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+

More information

EA-POL-015 Enterprise Architecture - Encryption Policy

EA-POL-015 Enterprise Architecture - Encryption Policy Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:

More information

Process of Setting up a New Merchant Account

Process of Setting up a New Merchant Account Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

Internet Banking Agreement and Disclosure Statement

Internet Banking Agreement and Disclosure Statement Internet Banking Agreement and Disclsure Statement This agreement cntains the terms and cnditins that gvern accessing r using Internet Banking (NetTeller), Bill Payment Services, Mbile Banking and On Demand

More information

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions Maryland General Service (MGS) Area 29 Treatment Facilities Cmmittee (TFC) TFC Instructins Lve And Service Facility Presentatin t Patients We are frm Alchlics Annymus (AA), fr AA, and ur service is fr

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

ScaleIO Security Configuration Guide

ScaleIO Security Configuration Guide ScaleIO Security Cnfiguratin Guide 1 Intrductin This sectin prvides an verview f the settings available in ScaleIO t ensure secure peratin f the prduct: Security settings are divided int the fllwing categries:

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices This is being prvided t yu as a requirement f the privacy regulatins issued under the Health Insurance Prtability and Accuntability Act f 1996 (HIPAA). This ntice describes hw HROSM may use and disclse

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

PENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers

PENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers PENNSYLVANIA SURPLUS LINES ASSOCIATION Electrnic Filing System (EFS) Frequently Asked Questins and Answers 1 What changed in Release 2.0?...2 2 Why was my accunt disabled?...3 3 Hw d I inactivate an accunt?...4

More information

Creating an Ethical Culture and Protecting Your Bottom Line:

Creating an Ethical Culture and Protecting Your Bottom Line: Creating an Ethical Culture and Prtecting Yur Bttm Line: Best Practices fr Crprate Cdes f Cnduct Nte: The infrmatin belw and all infrmatin n this website is nt meant t be taken as legal advice. Please

More information

Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services

Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services Erie Cmmunity Cllege Acceptable Use Plicy Last Revisin: December 17, 2009 Cllege Infrmatin Technlgy Services Erie Cmmunity Cllege Cllege Infrmatin Technlgy Services Acceptable Use Plicy Last Revisin:

More information

Treasury Gateway Getting Started Guide

Treasury Gateway Getting Started Guide Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

DATE APPROVED March 2011. Version Date Comments / Changes 1.0 March 2011 Initial policy released

DATE APPROVED March 2011. Version Date Comments / Changes 1.0 March 2011 Initial policy released Page 1 f 11 APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial plicy released 1. PURPOSE OF THIS POLICY T define the purpses fr which Crprate Purchase Cards are t be used

More information

For students to participate in BYOD please follow these two steps

For students to participate in BYOD please follow these two steps www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many

More information

Internet Banking Agreement & Disclosure

Internet Banking Agreement & Disclosure Internet Banking Agreement & Disclsure Please read this agreement carefully befre cntinuing. Intrductin This Internet Banking Agreement and Disclsure gverns yur use f Internet Banking. Thrughut this web

More information

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc. HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

E-LEARNING ONTARIO POLICY DOCUMENT

E-LEARNING ONTARIO POLICY DOCUMENT E-LEARNING ONTARIO POLICY DOCUMENT In additin t the Service Level Agreement (SLA), which is specific t each bard, each participating bard must abide by this plicy dcument. It cntains three sectins: A.

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

Privacy Breach and Complaint Protocol

Privacy Breach and Complaint Protocol Privacy Breach and Cmplaint Prtcl Effective: December 31, 2012 Apprved by: Le McKenna, CFO 1.0 General Privacy breaches and privacy cmplaints will be handled in accrdance with this prtcl. This prtcl is

More information

Resident Assistant Application JOB DESCRIPTION

Resident Assistant Application JOB DESCRIPTION Requirements and Cmpensatin Resident Assistant Applicatin JOB DESCRIPTION Must have cmpleted at least 24 credit hurs at the time f emplyment. Must have a clear judicial recrd with Husing and Residential

More information

Enterprise IT Migration Overview & FAQ

Enterprise IT Migration Overview & FAQ Enterprise IT Migratin Overview & FAQ The fllwing cmmunicatin is targeted t AgriLife emplyees lcated in Extensin and Research centers thrughut the state. This cmmunicatin shuld be distributed t everyne

More information

Internet and Social Media Solicitations: Wise Giving Tips

Internet and Social Media Solicitations: Wise Giving Tips Internet and Scial Media Slicitatins: Wise Giving Tips Charities use a wide variety f methds t slicit charitable dnatins. New and pwerful technlgies utilize nt just the internet and email, but als scial

More information

Privacy Plicy Welcme, Sensati & JHI

Privacy Plicy Welcme, Sensati & JHI Privacy Plicy Welcme t www.framesdata.cm! This site (the Frames Data Online Site ) is wned by Frames Data Inc. ("FDI" r we ), a subsidiary f Jbsn Medical Infrmatin LLC ("JMI") and its parent, Jbsn Healthcare

More information

Statement of Work For. Federal Communications Commission. Emergency Mass Notification and Response System

Statement of Work For. Federal Communications Commission. Emergency Mass Notification and Response System Federal Cmmunicatins Cmmissin 1.0 INTRODUCTION Statement f Wrk Fr Federal Cmmunicatins Cmmissin Emergency Mass Ntificatin and Respnse System The Federal Cmmunicatins Cmmissin (FCC) is an independent United

More information

UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM WB-DEC

UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM WB-DEC UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washingtn, D.C. 20549 FORM WB-DEC DECLARATION OF ORIGINAL INFORMATION SUBMITTED PURSUANT TO SECTION 21F OF THE SECURITIES EXCHANGE ACT OF 1934 A. SUBMITTER

More information

INTRODUCTION TO PORTAL GROUP STUDIO

INTRODUCTION TO PORTAL GROUP STUDIO Mntana State University Luminis Prtal Prject INTRODUCTION TO PORTAL GROUP STUDIO Grup Studi With the Grup Studi sftware, yu can request the creatin f nline grups fr clubs, affiliatins, r interests and

More information

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT Kentwd Plice Department 4742 Walma Ave SE Kentwd, Michigan 49512 (616) 698-6580 http://www.ci.kentwd.mi.us REPORTING IDENTITY THEFT If yu are the victim f identity theft and ne f the fllwing cnditins are

More information

Information Security Policy

Information Security Policy Purpse The risk t Charlestn Suthern University, its emplyees and students frm data lss and identity theft is f significant cncern t the University and can be reduced nly thrugh the cmbined effrts f every

More information

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010 OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity

More information

WatchDox Server. Administrator's Guide. Version 3.8.5

WatchDox Server. Administrator's Guide. Version 3.8.5 WatchDx Server Administratr's Guide Versin 3.8.5 Cnfidentiality This dcument cntains cnfidential material that is prprietary WatchDx. The infrmatin and ideas herein may nt be disclsed t any unauthrized

More information

CORPORATE CREDIT CARD POLICY

CORPORATE CREDIT CARD POLICY TITLE: POLICY OWNERS: DATE INSTITUTED: May 1, 2008 CURRENT VERSION: Ver. 1.6 REVISION DATE: July 1, 2015 Crprate Credit Card Plicy Melissa Cluse, Vice President & Cntrller Cindy Klein, Accunts Payable

More information