GUIDELINES FOR SECURING SOCIAL MEDIA ACCOUNTS. Version 1.0
|
|
- Camilla Sims
- 8 years ago
- Views:
Transcription
1 GUIDELINES FOR SECURING SOCIAL MEDIA ACCOUNTS Versin 1.0 Published Octber 2015
2 Dcument Cntrl Versin: 1.0 Authr: Cyber Security Divisin - ictqatar Classificatin: Public Date f Issue: Octber Page
3 Cntents Intrductin... 4 Objective... 4 Scpe... 4 Intended Audience... 4 Legal Mandate... 4 General Recmmendatins... 5 Understand the Risks... 5 Set up a Gvernance fr Scial Media... 5 Accunt creatin and administratin... 5 Accunt Lgin... 6 Passwrd Management... 6 Infrmatin Sharing / Acceptable Usage... 7 Cnfigure Privacy Settings... 7 Mnitring... 7 Third Party Slutins... 7 Incidents: In case f any suspicius activity... 7 Recvery Plan... 8 Security Awareness... 8 Securing Mst Cmmn Scial Netwrking Sites... 8 Facebk:... 8 Twitter:... 9 Instagram: LinkedIn: Page
4 Intrductin Scial netwrks / media is an rganizatin s identity in the virtual wrld. This scial identity is very much linked t its crprate public image and needs t be prtected as much in the virtual wrld as in the real wrld. The scial media accunt if nt secured may pen a fldgate t cmprmising and maligning yur crprate public image. This dcument prvides mitigatin advice and security cntrls t help reduce threats such as unauthrized access as well as steps t fllw in rder t retrieve a stlen accunt. Objective Prvide necessary guidance t help rganizatins manage their scial media accunts securely. Scpe All rganizatins having scial media presence. Intended Audience Staff authrized t manage and use the crprate scial media accunts. Legal Mandate Article 14 f Decree Law N. 16 f 2014 setting the mandate f Ministry f Infrmatin and Cmmunicatins Technlgy (hereinafter referred t as ictqatar ) prvides that ictqatar has the authrity t supervise, regulate and develp the sectrs f Infrmatin and Cmmunicatins Technlgy (hereinafter ICT ) in the State f Qatar in a manner cnsistent with the requirements f natinal develpment gals, with the bjectives t create an envirnment suitable fr fair cmpetitin, supprt the develpment and stimulate investment in these sectrs; t secure and raise efficiency f infrmatin and technlgical infrastructure; t implement and supervise e- gvernment prgrams; and t prmte cmmunity awareness f the imprtance f ICT t imprve individual s life and cmmunity and build knwledge-based sciety and digital ecnmy. Article (14) f Emiri Decree N. 27 f 2014 stipulated the rle f the Ministry in prtecting the security f the Natinal Critical Infrmatin Infrastructure by prpsing and issuing plicies and standards and ensuring cmpliance. Article (15) f Emiri Decree N.27 f 2014 stipulates that the Ministry build and enable incident respnse framewrk and enhance capabilities t detect and analyze malicius cntent. This Plicy Dcument has been prepared taking int cnsideratin current applicable laws f the State f Qatar. In the event that a cnflict arises between this dcument and the laws f Qatar, the latter, shall take precedence. Any such term shall, t that extent be mitted frm this Plicy Dcument, and the rest f the dcument shall stand withut affecting the remaining prvisins. Amendments in that case shall then be required t ensure cmpliance with the relevant applicable laws f the State f Qatar. 4 Page
5 General Recmmendatins Understand the Risks Scial media accunts related t gvernment, semi gvernment, natinal events represent an ideal and lgical target fr ur natin s adversaries, as scial media is seen as the virtual identity f the gvernment. Further being a gvernment accunts, they have a huge fllwing and the fllwers have implicit trust in them. The risks assciated with such scial media prfiles are: - Leaking f cnfidential r inapprpriate infrmatin - Vandalism f cntent, spreading malicius cntent - Legal implicatins - Blackmail Set up a Gvernance fr Scial Media Define a plicy fr usage f scial media in yur rganizatin. On a minimum, the plicy shuld include the fllwing: Identify wh in the rganizatin is authrized t engage in scial media n its behalf? Wh cntrls and wns the infrmatin int a scial netwrking site? What infrmatin are the stakehlders passing n t ther peple? Seeking cnsent frm stakehlder prir disseminating infrmatin related t them. Explicit prcedures n scial media netwrking. Wh wuld the crprate accunt fllw r be influenced with etc Hw wuld infrmatin received frm the fllwer netwrk be bradcasted? i.e. reshared r re-tweeted etc. Defined prcess fr Incident handling / recvery plan in case f breach r malicius attacks. Hardware and sftware authrized t access the scial media accunt frm. Accunt creatin and administratin In rder t create and manage accunt wnership it is recmmended that we have: A dedicated crprate (usually used as the username), shuld be used t create and maintain a scial media accunts. This address shuld be a generic/nnspecific enterprise accunt fr lgging int scial media netwrks. Individual enterprise addresses are easy t guess and decrease the security f scial media accunts. 5 Page
6 Each scial media channel/accunt shuld be assciated with a separate and unique crprate . Example: the Username/ assciated with crprate twitter is different frm the Username/ used n Facebk D nt use the same passwrds fr scial media that yu use t access cmpany cmputing resurces Private s shuld nt t be used t manage and access a crprate scial media accunt such as twitter accunt r Facebk page The scial media accunt page shuld feature the cmmunicatin department apprved lg and the prfile text shuld include references that this accunt is the fficial accunt f the rganizatin. Organizatins shuld define which rganizatins / agencies they may fllw. E.g. Gvernment agencies may fllw ther gvernment agencies, verified accunts r trusted surces. It is nt recmmended t fllw individual users. It is nt recmmended t access / re-pst / re-tweet / share unverified messages with imbedded links and URLs. Accunt Lgin Cnfigure scial media accunts t use secure sessins (HTTPS) whenever pssible. Facebk, Twitter and thers supprt this ptin. (Nte: This is extremely imprtant when cnnecting via public Wi-Fi netwrks). QCERT can help yu cnfigure yur accunt t use HTTPS at all times Lgin shuld nly be frm a dedicated crprate wned / managed device ( PC r Mbile device) Lgin shuld be frm a trusted netwrk, refrain frm using public/pen Wi-Fi netwrks like café s airprts etc unless using a crprate VPN t secure yur sessin. If any mbile devices are linked t yur crprate scial media accunts, make sure that these devices are adequately prtected. Disable the ge-lcatin feature while psting r tweeting. Passwrd Management Always use strng and secure passwrds t access scial netwrks. The passwrds shuld cmply with the crprate passwrd plicy. Change passwrds frequently. Have different passwrds fr different accunts. Use multi-factr authenticatin fr scial media accunts (if supprted by the prvider). 6 Page
7 Infrmatin Sharing / Acceptable Usage D nt disclse any fficial infrmatin upn registratins f scial accunts. Restrict emplyees frm psting fficial and sensitive data r infrmatin ver scial netwrks. Only authrized persnnel shuld be allwed t perate crprate scial media accunts. D nt pst any infrmatin that may be discriminatry, disparaging, defamatry r harassing cmments regarding the rganizatin r its emplyees r any third party in their electrnic pstings r publishing. Cnfigure Privacy Settings Review and revise as necessary the default privacy settings ffered by the scial media netwrking sites. Mnitring Limit crprate scial media accunt access t an authrized emplyee in rder t cntrl the cntent distributin ver scial netwrks. This culd be the Public relatin fficer (PRO), fficial spkespersn, etc. In case where mre than ne persn has access t the crprate scial media accunt, internal prcedures shuld be defined t regulate this activity, this shuld include training user n usage f scial media, active mnitring, and use f scial media management slutins and / r any ther cmpensating cntrls as deemed necessary. Regularly mnitr the access granted t authrized user accunts and revke the access f emplyees wh leave the rganizatin r n lnger have a business need t use scial media. Have a third party individual, wh is nt respnsible fr cntent, cntinuusly mnitr scial media accunts fr unauthrized r unusual pstings. Third Party Slutins The rganizatins shuld cnsider usage f a scial media management slutin. Incidents: In case f any suspicius activity Please reprt t QCERT (incidents@qcert.rg) r call ( ) if yu see any f the suspicius symptms belw: Autmated likes, favrites, fllws/un-fllws r friend requests Private messages being psted t yur friends (this can be hard t spt unless smene pints it ut t yu) Unexpected /push ntificatins frm the scial netwrk, such as: Warning that yur address has been changed 7 Page
8 Warning that yur accunt was accessed frm an unknwn lcatin. Status updates/tweets that yu didn t make Changes t the prfile r pictures n the accunt. Recvery Plan Cllect all lgs, traces, artifacts f malicius activity fr investigatin and pssible legal requirements. Immediately change accunt passwrds. Verify and change the passwrd fr the assciated s and back up s Verify the passwrd recvery ptins set fr the scial media accunt; verify the alternative address that has been setup. Verify aut frward ptins if any setup fr the accunt and assciated s. Visit the applicatins page f the scial netwrk and remve any apps yu d nt recgnize. If the accunt cntinues t behave erratically, we recmmend yu revke access t all applicatins. Security Awareness Emplyees managing and / r maintaining the rganizatin s scial media accunts shall be sensitized and educated n infrmatin security. They shuld be made aware f prevalent threats such as Phishing and scial engineering. Securing Mst Cmmn Scial Netwrking Sites Facebk: a. Ensure yu're using a secure cnnectin whenever ne is available, click Security in the left pane f Facebk's Accunt Settings and make sure Secure Brwsing is enabled. b. The security settings als let yu enable lg-in ntificatins and apprvals, and view and edit yur recgnized devices and active sessins. c. Security Tips: i. Prtect yur passwrd. ii. Use Facebk s extra security features. iii. Make sure yur accunt(s) are secure. 8 Page
9 iv. Lgut f Facebk when yu use a cmputer yu share with ther peple. If yu frget, yu can lgut remtely. v. Run anti-virus sftware n yur cmputer: vi. Think befre yu click r dwnlad anything. d. Enable 'Lgin Apprvals' frm the 'Accunt Security' sectin f the accunt settings page. Fllw the link - e. Update yur accunts as per new security tips and guideline f facebk. Yu can find them at Twitter: a. When yu sign up fr Twitter, yu have the ptin t keep yur Tweets public (the default accunt setting) r t prtect yur Tweets. b. Accunts with prtected Tweets require manual apprval f each and every persn wh may view that accunt's Tweets. c. Security Tips: i. Use a strng passwrd. ii. iii. iv. Use lgin verificatin. Gvernment rganizatins shall get their accunt validated and verified. Q-CERT can help yu in this. Watch ut fr suspicius links, and always make sure yu're n Twitter.cm befre yu enter yur lgin infrmatin. v. Never give yur username and passwrd ut t untrusted third parties. d. Using SMS text message lgin verificatin: T set up SMS text message lgin verificatin: i. G t yur Security and privacy settings n twitter.cm and select the ptin t Verify lgin requests. ii. When prmpted, click Okay, send me a message. iii. If yu receive ur verificatin message, click Yes. (Nte: yu'll have t enter yur passwrd). iv. Yu can generate a backup cde by selecting the ptin t Get backup cde. Write dwn, print, r take a screensht f this backup cde; this will help yu access yur accunt if yu lse yur phne r change yur phne number. e. Update and fllw the best practices mentined by Twitter regularly. Yu can find them at 9 Page
10 Instagram: LinkedIn: a. Security Tips: i. Pick a strng passwrd. ii. Make sure yur accunt is secure. Change the passwrds fr all f yur accunts and make sure that n tw are the same. iii. Lgut f Instagram when yu use a cmputer r phne yu share with ther peple. Dn't check the "Remember Me" bx when lgging in frm a public cmputer. iv. Think befre yu authrize any third-party app. b. Update yur accunts as per new security tips and guidelines f Instagram. Yu can find them at a. Security Tips: i. Change yur passwrd regularly. ii. Sign ut f yur accunt after yu use a publicly shared cmputer. iii. Manage yur accunt infrmatin and privacy settings frm the Prfile and Accunt sectins f yur Privacy & Settings page. iv. Keep yur antivirus sftware up t date. v. Dn't put yur address, hme address r phne number in yur prfile's Summary. vi. Only cnnect t peple yu knw and trust, r thse yu have trustwrthy cmmn cnnectins with. vii. Cnsider turning tw-step verificatin n fr yur accunt. viii. Be infrmed abut reprting inapprpriate cntent r safety cncerns. b. Update yur accunts as per new security tips and guidelines f LinkedIn, 10 Page
HIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
More informationPersonal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
More informationCOPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
More informationGUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
More informationAMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15
AMWA Chapter Subgrups n LinkedIn Guidance fr Subgrup Managers and Chapter Leaders, updated 2-12-15 1. Chapters may nt have an independent grup n LinkedIn, Facebk, r ther scial netwrking site. AMWA prvides
More informationChristchurch Polytechnic Institute of Technology Access Control Security Standard
CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin
More informationCloud Services MDM. Windows 8 User Guide
Clud Services MDM Windws 8 User Guide 10/24/2014 CONTENTS Overview... 2 Supprted Devices... 2 System Capabilities... 2 Enrllment and Activatin... 3 Prcess Overview... 3 Verify Prerequisites... 3 Dwnlad
More informationKey Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
More informationInternet and E-Mail Policy User s Guide
Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin
More informationiphone Mobile Application Guide Version 2.2.2
iphne Mbile Applicatin Guide Versin 2.2.2 March 26, 2014 Fr the latest update, please visit ur website: www.frte.net/mbile Frte Payment Systems, Inc. 500 West Bethany, Suite 200 Allen, Texas 75013 (800)
More informationTo Receive CPE Credit
Trends in ACH Fraud & Risk Management Jhn A. Mills, AAP Supervising Cnsultant jmills@bkd.cm 314.231.5544 March 28, 2013 T Receive CPE Credit Participate in entire webinar Answer plls when they are prvided
More informationUniversity of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments
University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department
More informationInformation Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
More informationTrustED Briefing Series:
TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers
More informationFINRA Regulation Filing Application Batch Submissions
FINRA Regulatin Filing Applicatin Batch Submissins Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 FTP Access t FINRA... 2 FTP Accunt n FINRA s
More informationAdobe Sign. Enabling Single Sign-On with SAML Reference Guide
Enabling Single Sign-On with SAML Reference Guide 2016 Adbe Systems Incrprated. All Rights Reserved. Prducts mentined in this dcument, such as the services f identity prviders Micrsft Active Directry Federatin,
More informationCorporate Account Takeover & Information Security Awareness
Crprate Accunt Takever & Infrmatin Security Awareness What is Crprate Accunt Takever? A fast grwing electrnic crime where thieves typically use sme frm f malware t btain lgin credentials t Crprate Online
More informationSession 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
More informationCSAT Account Management
CSAT Accunt Management User Guide March 2011 Versin 2.1 U.S. Department f Hmeland Security 1 CSAT Accunt Management User Guide Table f Cntents 1. Overview... 1 1.1 CSAT User Rles... 1 1.2 When t Update
More informationACTIVITY MONITOR Real Time Monitor Employee Activity Monitor
ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library
More informationTHE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM
THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant
More informationHand-out:do:Nothing (social media security settings with Facebook used in examples)
Hand-ut:d:Nthing (scial media security settings with Facebk used in examples) University f Oxfrd Infrmatin Security infsec@it.x.ac.uk: www.it.x.ac.uk/infsec/prtectyurself/scialmedia/ Scial engineering
More informationHIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
More informationJunos Pulse Instructions for Windows and Mac OS X
Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.
More informationACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.
Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it
More informationRequest for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply
Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t
More informationSecurity Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview
Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the
More informationUnified Infrastructure/Organization Computer System/Software Use Policy
Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help
More informationFirst Global Data Corp.
First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First
More informationPassword Reset for Remote Users
1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin
More informationHillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network
2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal
More informationPENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK
Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs
More informationAccess EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3
EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.
More informationColorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies
Clrad Rapids Yuth Sccer Club Scial Media and Electrnic Cmmunicatin Plicies OVERVIEW Online, scial media and ther electrnic cmmunicatin tls such as text messaging have becme a prevalent and effective means
More informationPOLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
More informationIn addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
More informationensure that all users understand how mobile phones supplied by the council should and should not be used.
Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended
More informationSocial Media Service
Cnscius Slutins Prduct Briefing Scial Media Service December 2010 Cnscius Slutins Ltd. Ryal Lndn Buildings 42-46 Baldwin Street Bristl BS1 1PN 0117 325 0200 supprt@cnscius.c.uk Cnscius Slutins Scial Media
More informationNew in this release. Sphere 9.4.3.2 (October 2013)
New in this release Sphere 9.4.3.2 (Octber 2013) The fllwing client-facing changes were implemented: An issue that prevented certain Friends Asking Friends spnsrship levels frm appearing as ptins n the
More informationViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation
ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is
More informationVCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
More informationImmaculate Conception School, Prince George Bring Your Own Device Policy for Students
Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,
More informationWhat Information Is Collected and How Is It Collected?
RCI PRIVACY NOTICE RCI Pacific Pty Ltd is cncerned abut privacy issues and wants yu t be familiar with hw we cllect, use and disclse infrmatin. This Privacy Ntice describes ur practices in cnnectin with
More informationMontana Acquisition & Contracting System (emacs) emacs Handbook. Vendor Registration and Data Management
Mntana Acquisitin & Cntracting System (emacs) emacs Handbk Vendr Registratin and Data Management Welcme The purpse f this emacs Handbk fr Vendr Registratin and Data Management is t prvide vendrs with the
More informationHelpdesk Support Tickets & Knowledgebase
Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate
More informationNorwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16
Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected
More informationCloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013
Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies
More informationWebalo Pro Appliance Setup
Webal Pr Appliance Setup 1. Dwnlad the Webal virtual appliance apprpriate fr yur virtualizatin infrastructure, using the link yu were emailed. The virtual appliance is delivered as a.zip file that is n
More informationData Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
More informationEnsuring end-to-end protection of video integrity
White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring
More informationInstallation Guide Marshal Reporting Console
Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling
More informationIntel Hybrid Cloud Management Portal Update FAQ. Audience: Public
Intel Hybrid Clud Management Prtal Update FAQ Audience: Public Purpse: Prepare fr the launch f the Intel Hybrid Clud Platfrm multi-user/multi-tier update Versin: Final FAQs What s new in the Intel Hybrid
More informationTreasury Gateway Getting Started Guide
Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access
More informationService Desk Self Service Overview
Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service
More informationService Request Form
New Prfessinal Services Order Frm Editable PDF Service Request Frm If yu have any questins while filling ut this frm, please cntact yur CDM, email Prfessinal Services at PS@swipeclck.cm, r call 888-223-3250
More informationRemote Working (Policy & Procedure)
Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer
More informationHow To Ensure Your Health Care Is Safe
Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t
More informationInstallation Guide Marshal Reporting Console
INSTALLATION GUIDE Marshal Reprting Cnsle Installatin Guide Marshal Reprting Cnsle March, 2009 Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 3 Sftware Prerequisites 3 Installatin
More informationIT Help Desk Service Level Expectations Revised: 01/09/2012
IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+
More informationPurpose Statement. Objectives
Apprved by Academic Affairs Cuncil, June 24, 2014 Faculty Handbk Part VI: Other Plicies and Prcedures Sectin R. Intellectual Prperty Classified Emplyee Handbk Part VI: Other Plicies and Prcedures Sectin
More informationChange Management Process
Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses
More informationProject Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES
Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care
More informationResearch Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012
Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.
More informationMANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016
MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 The Manitba Securities Cmmissin (the Cmmissin) is a divisin f the Manitba Financial Services Agency (MFSA). The ther divisin is the Financial Institutins
More informationRemote Desktop Tutorial. By: Virginia Ginny Morris
Remte Desktp Tutrial By: Virginia Ginny Mrris 2008 Remte Desktp Tutrial Virginia Ginny Mrris Page 2 Scpe: The fllwing manual shuld accmpany my Remte Desktp Tutrial vide psted n my website http://www.ginnymrris.cm
More informationVersion: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch
More informationSupersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5
Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet
More informationPRIVACY POLICY Last revised: April 2015
PRIVACY POLICY Last revised: April 2015 ACD, LLC, and its affiliates (cllectively, we, us, ur ) understand that privacy is imprtant t ur cnsumers and want yu t make knwledgeable decisins abut the infrmatin
More informationMulti-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021
Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada
More informationTraining Script: Documenting Provider
Training Script: Dcumenting Prvider Training Script: Dcumenting Prvider Agenda Item Intrductin Lg int Cmputer EMR Mdule Desktp Mdule Review Desktp and EMR in Meditech Test CPOE Sessin 1 Discussin Intrduce
More informationFollowing steps are required for hosting of Web Site/ Web Application on NIC Cloud
Natinal Infrmatics Centre Web Hsting Internal Dcument Fllwing steps are required fr hsting f Web Site/ Web Applicatin n NIC Clud 1. URL registratin t be dne by the user. 2. Submit yur request n "Get NIC
More informationISO Management Systems. Guidance on understanding the benefits of an ISO Management System
ISO Management Systems Guidance n understanding the benefits f an ISO Management System Welcme & Intrductins 4031 University Drive, 206, Fairfax, VA 22030 3 Grant Square, 243, Hinsdale, IL 60521 www.radiancmpliance.cm
More informationIntroduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.
Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and
More informationHow to put together a Workforce Development Fund (WDF) claim 2015/16
Index Page 2 Hw t put tgether a Wrkfrce Develpment Fund (WDF) claim 2015/16 Intrductin What eligibility criteria d my establishment/s need t meet? Natinal Minimum Data Set fr Scial Care (NMDS-SC) and WDF
More informationThuraya Satellite Telecommunications Company. ThurayaGmPRS. Frequently Asked Questions. February 2007
Thuraya Satellite Telecmmunicatins Cmpany ThurayaGmPRS Frequently Asked Questins February 2007 Sft Launch Release fr Service Prvider Infrmatin THURAYA SATELLITE TELECOMMUNICATIONS COMPANY PAGE 1 OF 17
More informationMalpractice and Maladministration Policy
TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs
More informationRSA SecurID Software Token Security Best Practices Guide. Version 3
RSA SecurID Sftware Tken Security Best Practices Guide Versin 3 Cntact Infrmatin G t the RSA crprate web site fr reginal Custmer Supprt telephne and fax numbers: www.rsa.cm. Trademarks RSA, the RSA Lg
More informationUsing PayPal Website Payments Pro UK with ProductCart
Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...
More informationCyber Security: Simulation Platform
Service Overview The Symantec Cyber Security: Simulatin Platfrm is a Web hsted Service with immersive and hands-n access t cyber exercises fr ffensive (red team) events, inspired by real-life security
More informationOrganisational self-migration guide an overview V1-5 April 2014
Organisatinal self-migratin guide an verview V1-5 April 2014 Cpyright 2013, Health and Scial Care Infrmatin Centre. 1 Self Migratin t NHSmail an verview fr rganisatins Cntents Intrductin 3 1. Initial preparatins
More informationFAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT
FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028
More informationTo clarify terms used within these policies, the following definitions are provided:
Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail
More informationWatchDox Server. Administrator's Guide. Version 3.8.5
WatchDx Server Administratr's Guide Versin 3.8.5 Cnfidentiality This dcument cntains cnfidential material that is prprietary WatchDx. The infrmatin and ideas herein may nt be disclsed t any unauthrized
More informationMaryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions
Maryland General Service (MGS) Area 29 Treatment Facilities Cmmittee (TFC) TFC Instructins Lve And Service Facility Presentatin t Patients We are frm Alchlics Annymus (AA), fr AA, and ur service is fr
More informationRUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer
RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible
More informationFor students to participate in BYOD please follow these two steps
www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many
More informationResearch Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013
Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,
More informationMaaS360 Cloud Extender
MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument
More informationSocial media guidelines
Scial media guidelines I. Overview This dcument will prvide yu with basic guidelines n using scial media channels such as Facebk, Twitter r YuTube t reach individuals and families abut hw t prepare fr
More informationCorporate Profile, 2014
Cpyright 2014 IT-Serve.cm All rights reserved. IT-Serve.cm Crprate Prfile, 2014 Internatinal experience, Reginal reach, Lcal understanding Dubai Abu Dhabi Sharjah Oman Qatar Saudi Arabia IT-Serve.cm PO
More informationValley Transcription Service I-Phone/I-Pod App User s Guide
541-926-4194 Valley Transcriptin Service I-Phne/I-Pd App User s Guide (Fr use with iphne/ipad/i-pd Tuch) Page 0 Table f Cntents Table f Cntents... i Intrductin... 1 Requirements... 1 1. 2. 3. Installing
More informationUNIVERSAL MUSIC GROUP PRIVACY POLICY. Universal Music AB ("We") are committed to protecting and respecting your privacy.
Effective Date: 2016-04-26 UNIVERSAL MUSIC GROUP PRIVACY POLICY Universal Music AB ("We") are cmmitted t prtecting and respecting yur privacy. This privacy plicy (tgether with ur terms f use and any ther
More informationBRILL s Editorial Manager (EM) Manual for Authors Table of Contents
BRILL s Editrial Manager (EM) Manual fr Authrs Table f Cntents Intrductin... 2 1. Getting Started: Creating an Accunt... 2 2. Lgging int EM... 3 3. Changing Yur Access Cdes and Cntact Infrmatin... 3 3.1
More informationInformation & Communications Technology ICT Security Compliance Guide (Student)
Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0
More informationMobile Deployment Guide For Apple ios
Fr Apple ios Cpyright This dcument is prtected by the United States cpyright laws, and is prprietary t Zscaler Inc. Cpying, reprducing, integrating, translating, mdifying, enhancing, recrding by any infrmatin
More informationAudit Committee Charter
Audit Cmmittee Charter Membership The Audit Cmmittee (the "Cmmittee") f the Bard f Directrs (the "Bard") f Philip Mrris Internatinal Inc. (the "Cmpany") shall cnsist f at least three directrs all f whm
More informationTechnical Writing - TheUsers Visa (SHR User Accunt)
POLICY Number: 7311-25-004 Title: Saskatn Health Regin User Accunt Plicy Authrizatin [ ] President and CEO [X] Vice President, Finance and Crprate Services Surce: Directr, Infrmatin Technlgy Services Crss
More informationHow To Write A Scial Media Plicy
Scial Media Plicy Scial Media Plicy Recrd Number D14/78 Respnsible Manager Directr Business Supprt and Strategy Manager Custmer and Cmmunicatins Last reviewed 11 February 2014 Adptin reference Cuncil Reslutin
More information