GUIDELINES FOR SECURING SOCIAL MEDIA ACCOUNTS. Version 1.0

Size: px
Start display at page:

Download "GUIDELINES FOR SECURING SOCIAL MEDIA ACCOUNTS. Version 1.0"

Transcription

1 GUIDELINES FOR SECURING SOCIAL MEDIA ACCOUNTS Versin 1.0 Published Octber 2015

2 Dcument Cntrl Versin: 1.0 Authr: Cyber Security Divisin - ictqatar Classificatin: Public Date f Issue: Octber Page

3 Cntents Intrductin... 4 Objective... 4 Scpe... 4 Intended Audience... 4 Legal Mandate... 4 General Recmmendatins... 5 Understand the Risks... 5 Set up a Gvernance fr Scial Media... 5 Accunt creatin and administratin... 5 Accunt Lgin... 6 Passwrd Management... 6 Infrmatin Sharing / Acceptable Usage... 7 Cnfigure Privacy Settings... 7 Mnitring... 7 Third Party Slutins... 7 Incidents: In case f any suspicius activity... 7 Recvery Plan... 8 Security Awareness... 8 Securing Mst Cmmn Scial Netwrking Sites... 8 Facebk:... 8 Twitter:... 9 Instagram: LinkedIn: Page

4 Intrductin Scial netwrks / media is an rganizatin s identity in the virtual wrld. This scial identity is very much linked t its crprate public image and needs t be prtected as much in the virtual wrld as in the real wrld. The scial media accunt if nt secured may pen a fldgate t cmprmising and maligning yur crprate public image. This dcument prvides mitigatin advice and security cntrls t help reduce threats such as unauthrized access as well as steps t fllw in rder t retrieve a stlen accunt. Objective Prvide necessary guidance t help rganizatins manage their scial media accunts securely. Scpe All rganizatins having scial media presence. Intended Audience Staff authrized t manage and use the crprate scial media accunts. Legal Mandate Article 14 f Decree Law N. 16 f 2014 setting the mandate f Ministry f Infrmatin and Cmmunicatins Technlgy (hereinafter referred t as ictqatar ) prvides that ictqatar has the authrity t supervise, regulate and develp the sectrs f Infrmatin and Cmmunicatins Technlgy (hereinafter ICT ) in the State f Qatar in a manner cnsistent with the requirements f natinal develpment gals, with the bjectives t create an envirnment suitable fr fair cmpetitin, supprt the develpment and stimulate investment in these sectrs; t secure and raise efficiency f infrmatin and technlgical infrastructure; t implement and supervise e- gvernment prgrams; and t prmte cmmunity awareness f the imprtance f ICT t imprve individual s life and cmmunity and build knwledge-based sciety and digital ecnmy. Article (14) f Emiri Decree N. 27 f 2014 stipulated the rle f the Ministry in prtecting the security f the Natinal Critical Infrmatin Infrastructure by prpsing and issuing plicies and standards and ensuring cmpliance. Article (15) f Emiri Decree N.27 f 2014 stipulates that the Ministry build and enable incident respnse framewrk and enhance capabilities t detect and analyze malicius cntent. This Plicy Dcument has been prepared taking int cnsideratin current applicable laws f the State f Qatar. In the event that a cnflict arises between this dcument and the laws f Qatar, the latter, shall take precedence. Any such term shall, t that extent be mitted frm this Plicy Dcument, and the rest f the dcument shall stand withut affecting the remaining prvisins. Amendments in that case shall then be required t ensure cmpliance with the relevant applicable laws f the State f Qatar. 4 Page

5 General Recmmendatins Understand the Risks Scial media accunts related t gvernment, semi gvernment, natinal events represent an ideal and lgical target fr ur natin s adversaries, as scial media is seen as the virtual identity f the gvernment. Further being a gvernment accunts, they have a huge fllwing and the fllwers have implicit trust in them. The risks assciated with such scial media prfiles are: - Leaking f cnfidential r inapprpriate infrmatin - Vandalism f cntent, spreading malicius cntent - Legal implicatins - Blackmail Set up a Gvernance fr Scial Media Define a plicy fr usage f scial media in yur rganizatin. On a minimum, the plicy shuld include the fllwing: Identify wh in the rganizatin is authrized t engage in scial media n its behalf? Wh cntrls and wns the infrmatin int a scial netwrking site? What infrmatin are the stakehlders passing n t ther peple? Seeking cnsent frm stakehlder prir disseminating infrmatin related t them. Explicit prcedures n scial media netwrking. Wh wuld the crprate accunt fllw r be influenced with etc Hw wuld infrmatin received frm the fllwer netwrk be bradcasted? i.e. reshared r re-tweeted etc. Defined prcess fr Incident handling / recvery plan in case f breach r malicius attacks. Hardware and sftware authrized t access the scial media accunt frm. Accunt creatin and administratin In rder t create and manage accunt wnership it is recmmended that we have: A dedicated crprate (usually used as the username), shuld be used t create and maintain a scial media accunts. This address shuld be a generic/nnspecific enterprise accunt fr lgging int scial media netwrks. Individual enterprise addresses are easy t guess and decrease the security f scial media accunts. 5 Page

6 Each scial media channel/accunt shuld be assciated with a separate and unique crprate . Example: the Username/ assciated with crprate twitter is different frm the Username/ used n Facebk D nt use the same passwrds fr scial media that yu use t access cmpany cmputing resurces Private s shuld nt t be used t manage and access a crprate scial media accunt such as twitter accunt r Facebk page The scial media accunt page shuld feature the cmmunicatin department apprved lg and the prfile text shuld include references that this accunt is the fficial accunt f the rganizatin. Organizatins shuld define which rganizatins / agencies they may fllw. E.g. Gvernment agencies may fllw ther gvernment agencies, verified accunts r trusted surces. It is nt recmmended t fllw individual users. It is nt recmmended t access / re-pst / re-tweet / share unverified messages with imbedded links and URLs. Accunt Lgin Cnfigure scial media accunts t use secure sessins (HTTPS) whenever pssible. Facebk, Twitter and thers supprt this ptin. (Nte: This is extremely imprtant when cnnecting via public Wi-Fi netwrks). QCERT can help yu cnfigure yur accunt t use HTTPS at all times Lgin shuld nly be frm a dedicated crprate wned / managed device ( PC r Mbile device) Lgin shuld be frm a trusted netwrk, refrain frm using public/pen Wi-Fi netwrks like café s airprts etc unless using a crprate VPN t secure yur sessin. If any mbile devices are linked t yur crprate scial media accunts, make sure that these devices are adequately prtected. Disable the ge-lcatin feature while psting r tweeting. Passwrd Management Always use strng and secure passwrds t access scial netwrks. The passwrds shuld cmply with the crprate passwrd plicy. Change passwrds frequently. Have different passwrds fr different accunts. Use multi-factr authenticatin fr scial media accunts (if supprted by the prvider). 6 Page

7 Infrmatin Sharing / Acceptable Usage D nt disclse any fficial infrmatin upn registratins f scial accunts. Restrict emplyees frm psting fficial and sensitive data r infrmatin ver scial netwrks. Only authrized persnnel shuld be allwed t perate crprate scial media accunts. D nt pst any infrmatin that may be discriminatry, disparaging, defamatry r harassing cmments regarding the rganizatin r its emplyees r any third party in their electrnic pstings r publishing. Cnfigure Privacy Settings Review and revise as necessary the default privacy settings ffered by the scial media netwrking sites. Mnitring Limit crprate scial media accunt access t an authrized emplyee in rder t cntrl the cntent distributin ver scial netwrks. This culd be the Public relatin fficer (PRO), fficial spkespersn, etc. In case where mre than ne persn has access t the crprate scial media accunt, internal prcedures shuld be defined t regulate this activity, this shuld include training user n usage f scial media, active mnitring, and use f scial media management slutins and / r any ther cmpensating cntrls as deemed necessary. Regularly mnitr the access granted t authrized user accunts and revke the access f emplyees wh leave the rganizatin r n lnger have a business need t use scial media. Have a third party individual, wh is nt respnsible fr cntent, cntinuusly mnitr scial media accunts fr unauthrized r unusual pstings. Third Party Slutins The rganizatins shuld cnsider usage f a scial media management slutin. Incidents: In case f any suspicius activity Please reprt t QCERT (incidents@qcert.rg) r call ( ) if yu see any f the suspicius symptms belw: Autmated likes, favrites, fllws/un-fllws r friend requests Private messages being psted t yur friends (this can be hard t spt unless smene pints it ut t yu) Unexpected /push ntificatins frm the scial netwrk, such as: Warning that yur address has been changed 7 Page

8 Warning that yur accunt was accessed frm an unknwn lcatin. Status updates/tweets that yu didn t make Changes t the prfile r pictures n the accunt. Recvery Plan Cllect all lgs, traces, artifacts f malicius activity fr investigatin and pssible legal requirements. Immediately change accunt passwrds. Verify and change the passwrd fr the assciated s and back up s Verify the passwrd recvery ptins set fr the scial media accunt; verify the alternative address that has been setup. Verify aut frward ptins if any setup fr the accunt and assciated s. Visit the applicatins page f the scial netwrk and remve any apps yu d nt recgnize. If the accunt cntinues t behave erratically, we recmmend yu revke access t all applicatins. Security Awareness Emplyees managing and / r maintaining the rganizatin s scial media accunts shall be sensitized and educated n infrmatin security. They shuld be made aware f prevalent threats such as Phishing and scial engineering. Securing Mst Cmmn Scial Netwrking Sites Facebk: a. Ensure yu're using a secure cnnectin whenever ne is available, click Security in the left pane f Facebk's Accunt Settings and make sure Secure Brwsing is enabled. b. The security settings als let yu enable lg-in ntificatins and apprvals, and view and edit yur recgnized devices and active sessins. c. Security Tips: i. Prtect yur passwrd. ii. Use Facebk s extra security features. iii. Make sure yur accunt(s) are secure. 8 Page

9 iv. Lgut f Facebk when yu use a cmputer yu share with ther peple. If yu frget, yu can lgut remtely. v. Run anti-virus sftware n yur cmputer: vi. Think befre yu click r dwnlad anything. d. Enable 'Lgin Apprvals' frm the 'Accunt Security' sectin f the accunt settings page. Fllw the link - e. Update yur accunts as per new security tips and guideline f facebk. Yu can find them at Twitter: a. When yu sign up fr Twitter, yu have the ptin t keep yur Tweets public (the default accunt setting) r t prtect yur Tweets. b. Accunts with prtected Tweets require manual apprval f each and every persn wh may view that accunt's Tweets. c. Security Tips: i. Use a strng passwrd. ii. iii. iv. Use lgin verificatin. Gvernment rganizatins shall get their accunt validated and verified. Q-CERT can help yu in this. Watch ut fr suspicius links, and always make sure yu're n Twitter.cm befre yu enter yur lgin infrmatin. v. Never give yur username and passwrd ut t untrusted third parties. d. Using SMS text message lgin verificatin: T set up SMS text message lgin verificatin: i. G t yur Security and privacy settings n twitter.cm and select the ptin t Verify lgin requests. ii. When prmpted, click Okay, send me a message. iii. If yu receive ur verificatin message, click Yes. (Nte: yu'll have t enter yur passwrd). iv. Yu can generate a backup cde by selecting the ptin t Get backup cde. Write dwn, print, r take a screensht f this backup cde; this will help yu access yur accunt if yu lse yur phne r change yur phne number. e. Update and fllw the best practices mentined by Twitter regularly. Yu can find them at 9 Page

10 Instagram: LinkedIn: a. Security Tips: i. Pick a strng passwrd. ii. Make sure yur accunt is secure. Change the passwrds fr all f yur accunts and make sure that n tw are the same. iii. Lgut f Instagram when yu use a cmputer r phne yu share with ther peple. Dn't check the "Remember Me" bx when lgging in frm a public cmputer. iv. Think befre yu authrize any third-party app. b. Update yur accunts as per new security tips and guidelines f Instagram. Yu can find them at a. Security Tips: i. Change yur passwrd regularly. ii. Sign ut f yur accunt after yu use a publicly shared cmputer. iii. Manage yur accunt infrmatin and privacy settings frm the Prfile and Accunt sectins f yur Privacy & Settings page. iv. Keep yur antivirus sftware up t date. v. Dn't put yur address, hme address r phne number in yur prfile's Summary. vi. Only cnnect t peple yu knw and trust, r thse yu have trustwrthy cmmn cnnectins with. vii. Cnsider turning tw-step verificatin n fr yur accunt. viii. Be infrmed abut reprting inapprpriate cntent r safety cncerns. b. Update yur accunts as per new security tips and guidelines f LinkedIn, 10 Page

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15 AMWA Chapter Subgrups n LinkedIn Guidance fr Subgrup Managers and Chapter Leaders, updated 2-12-15 1. Chapters may nt have an independent grup n LinkedIn, Facebk, r ther scial netwrking site. AMWA prvides

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

Cloud Services MDM. Windows 8 User Guide

Cloud Services MDM. Windows 8 User Guide Clud Services MDM Windws 8 User Guide 10/24/2014 CONTENTS Overview... 2 Supprted Devices... 2 System Capabilities... 2 Enrllment and Activatin... 3 Prcess Overview... 3 Verify Prerequisites... 3 Dwnlad

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

iphone Mobile Application Guide Version 2.2.2

iphone Mobile Application Guide Version 2.2.2 iphne Mbile Applicatin Guide Versin 2.2.2 March 26, 2014 Fr the latest update, please visit ur website: www.frte.net/mbile Frte Payment Systems, Inc. 500 West Bethany, Suite 200 Allen, Texas 75013 (800)

More information

To Receive CPE Credit

To Receive CPE Credit Trends in ACH Fraud & Risk Management Jhn A. Mills, AAP Supervising Cnsultant jmills@bkd.cm 314.231.5544 March 28, 2013 T Receive CPE Credit Participate in entire webinar Answer plls when they are prvided

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

FINRA Regulation Filing Application Batch Submissions

FINRA Regulation Filing Application Batch Submissions FINRA Regulatin Filing Applicatin Batch Submissins Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 FTP Access t FINRA... 2 FTP Accunt n FINRA s

More information

Adobe Sign. Enabling Single Sign-On with SAML Reference Guide

Adobe Sign. Enabling Single Sign-On with SAML Reference Guide Enabling Single Sign-On with SAML Reference Guide 2016 Adbe Systems Incrprated. All Rights Reserved. Prducts mentined in this dcument, such as the services f identity prviders Micrsft Active Directry Federatin,

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Crprate Accunt Takever & Infrmatin Security Awareness What is Crprate Accunt Takever? A fast grwing electrnic crime where thieves typically use sme frm f malware t btain lgin credentials t Crprate Online

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

CSAT Account Management

CSAT Account Management CSAT Accunt Management User Guide March 2011 Versin 2.1 U.S. Department f Hmeland Security 1 CSAT Accunt Management User Guide Table f Cntents 1. Overview... 1 1.1 CSAT User Rles... 1 1.2 When t Update

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

Hand-out:do:Nothing (social media security settings with Facebook used in examples)

Hand-out:do:Nothing (social media security settings with Facebook used in examples) Hand-ut:d:Nthing (scial media security settings with Facebk used in examples) University f Oxfrd Infrmatin Security infsec@it.x.ac.uk: www.it.x.ac.uk/infsec/prtectyurself/scialmedia/ Scial engineering

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Password Reset for Remote Users

Password Reset for Remote Users 1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3 EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.

More information

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies Clrad Rapids Yuth Sccer Club Scial Media and Electrnic Cmmunicatin Plicies OVERVIEW Online, scial media and ther electrnic cmmunicatin tls such as text messaging have becme a prevalent and effective means

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information

Social Media Service

Social Media Service Cnscius Slutins Prduct Briefing Scial Media Service December 2010 Cnscius Slutins Ltd. Ryal Lndn Buildings 42-46 Baldwin Street Bristl BS1 1PN 0117 325 0200 supprt@cnscius.c.uk Cnscius Slutins Scial Media

More information

New in this release. Sphere 9.4.3.2 (October 2013)

New in this release. Sphere 9.4.3.2 (October 2013) New in this release Sphere 9.4.3.2 (Octber 2013) The fllwing client-facing changes were implemented: An issue that prevented certain Friends Asking Friends spnsrship levels frm appearing as ptins n the

More information

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,

More information

What Information Is Collected and How Is It Collected?

What Information Is Collected and How Is It Collected? RCI PRIVACY NOTICE RCI Pacific Pty Ltd is cncerned abut privacy issues and wants yu t be familiar with hw we cllect, use and disclse infrmatin. This Privacy Ntice describes ur practices in cnnectin with

More information

Montana Acquisition & Contracting System (emacs) emacs Handbook. Vendor Registration and Data Management

Montana Acquisition & Contracting System (emacs) emacs Handbook. Vendor Registration and Data Management Mntana Acquisitin & Cntracting System (emacs) emacs Handbk Vendr Registratin and Data Management Welcme The purpse f this emacs Handbk fr Vendr Registratin and Data Management is t prvide vendrs with the

More information

Helpdesk Support Tickets & Knowledgebase

Helpdesk Support Tickets & Knowledgebase Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies

More information

Webalo Pro Appliance Setup

Webalo Pro Appliance Setup Webal Pr Appliance Setup 1. Dwnlad the Webal virtual appliance apprpriate fr yur virtualizatin infrastructure, using the link yu were emailed. The virtual appliance is delivered as a.zip file that is n

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Ensuring end-to-end protection of video integrity

Ensuring end-to-end protection of video integrity White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling

More information

Intel Hybrid Cloud Management Portal Update FAQ. Audience: Public

Intel Hybrid Cloud Management Portal Update FAQ. Audience: Public Intel Hybrid Clud Management Prtal Update FAQ Audience: Public Purpse: Prepare fr the launch f the Intel Hybrid Clud Platfrm multi-user/multi-tier update Versin: Final FAQs What s new in the Intel Hybrid

More information

Treasury Gateway Getting Started Guide

Treasury Gateway Getting Started Guide Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access

More information

Service Desk Self Service Overview

Service Desk Self Service Overview Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service

More information

Service Request Form

Service Request Form New Prfessinal Services Order Frm Editable PDF Service Request Frm If yu have any questins while filling ut this frm, please cntact yur CDM, email Prfessinal Services at PS@swipeclck.cm, r call 888-223-3250

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

How To Ensure Your Health Care Is Safe

How To Ensure Your Health Care Is Safe Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console INSTALLATION GUIDE Marshal Reprting Cnsle Installatin Guide Marshal Reprting Cnsle March, 2009 Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 3 Sftware Prerequisites 3 Installatin

More information

IT Help Desk Service Level Expectations Revised: 01/09/2012

IT Help Desk Service Level Expectations Revised: 01/09/2012 IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+

More information

Purpose Statement. Objectives

Purpose Statement. Objectives Apprved by Academic Affairs Cuncil, June 24, 2014 Faculty Handbk Part VI: Other Plicies and Prcedures Sectin R. Intellectual Prperty Classified Emplyee Handbk Part VI: Other Plicies and Prcedures Sectin

More information

Change Management Process

Change Management Process Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses

More information

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information

MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016

MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 The Manitba Securities Cmmissin (the Cmmissin) is a divisin f the Manitba Financial Services Agency (MFSA). The ther divisin is the Financial Institutins

More information

Remote Desktop Tutorial. By: Virginia Ginny Morris

Remote Desktop Tutorial. By: Virginia Ginny Morris Remte Desktp Tutrial By: Virginia Ginny Mrris 2008 Remte Desktp Tutrial Virginia Ginny Mrris Page 2 Scpe: The fllwing manual shuld accmpany my Remte Desktp Tutrial vide psted n my website http://www.ginnymrris.cm

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5 Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet

More information

PRIVACY POLICY Last revised: April 2015

PRIVACY POLICY Last revised: April 2015 PRIVACY POLICY Last revised: April 2015 ACD, LLC, and its affiliates (cllectively, we, us, ur ) understand that privacy is imprtant t ur cnsumers and want yu t make knwledgeable decisins abut the infrmatin

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

Training Script: Documenting Provider

Training Script: Documenting Provider Training Script: Dcumenting Prvider Training Script: Dcumenting Prvider Agenda Item Intrductin Lg int Cmputer EMR Mdule Desktp Mdule Review Desktp and EMR in Meditech Test CPOE Sessin 1 Discussin Intrduce

More information

Following steps are required for hosting of Web Site/ Web Application on NIC Cloud

Following steps are required for hosting of Web Site/ Web Application on NIC Cloud Natinal Infrmatics Centre Web Hsting Internal Dcument Fllwing steps are required fr hsting f Web Site/ Web Applicatin n NIC Clud 1. URL registratin t be dne by the user. 2. Submit yur request n "Get NIC

More information

ISO Management Systems. Guidance on understanding the benefits of an ISO Management System

ISO Management Systems. Guidance on understanding the benefits of an ISO Management System ISO Management Systems Guidance n understanding the benefits f an ISO Management System Welcme & Intrductins 4031 University Drive, 206, Fairfax, VA 22030 3 Grant Square, 243, Hinsdale, IL 60521 www.radiancmpliance.cm

More information

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved. Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and

More information

How to put together a Workforce Development Fund (WDF) claim 2015/16

How to put together a Workforce Development Fund (WDF) claim 2015/16 Index Page 2 Hw t put tgether a Wrkfrce Develpment Fund (WDF) claim 2015/16 Intrductin What eligibility criteria d my establishment/s need t meet? Natinal Minimum Data Set fr Scial Care (NMDS-SC) and WDF

More information

Thuraya Satellite Telecommunications Company. ThurayaGmPRS. Frequently Asked Questions. February 2007

Thuraya Satellite Telecommunications Company. ThurayaGmPRS. Frequently Asked Questions. February 2007 Thuraya Satellite Telecmmunicatins Cmpany ThurayaGmPRS Frequently Asked Questins February 2007 Sft Launch Release fr Service Prvider Infrmatin THURAYA SATELLITE TELECOMMUNICATIONS COMPANY PAGE 1 OF 17

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs

More information

RSA SecurID Software Token Security Best Practices Guide. Version 3

RSA SecurID Software Token Security Best Practices Guide. Version 3 RSA SecurID Sftware Tken Security Best Practices Guide Versin 3 Cntact Infrmatin G t the RSA crprate web site fr reginal Custmer Supprt telephne and fax numbers: www.rsa.cm. Trademarks RSA, the RSA Lg

More information

Using PayPal Website Payments Pro UK with ProductCart

Using PayPal Website Payments Pro UK with ProductCart Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...

More information

Cyber Security: Simulation Platform

Cyber Security: Simulation Platform Service Overview The Symantec Cyber Security: Simulatin Platfrm is a Web hsted Service with immersive and hands-n access t cyber exercises fr ffensive (red team) events, inspired by real-life security

More information

Organisational self-migration guide an overview V1-5 April 2014

Organisational self-migration guide an overview V1-5 April 2014 Organisatinal self-migratin guide an verview V1-5 April 2014 Cpyright 2013, Health and Scial Care Infrmatin Centre. 1 Self Migratin t NHSmail an verview fr rganisatins Cntents Intrductin 3 1. Initial preparatins

More information

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028

More information

To clarify terms used within these policies, the following definitions are provided:

To clarify terms used within these policies, the following definitions are provided: Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail

More information

WatchDox Server. Administrator's Guide. Version 3.8.5

WatchDox Server. Administrator's Guide. Version 3.8.5 WatchDx Server Administratr's Guide Versin 3.8.5 Cnfidentiality This dcument cntains cnfidential material that is prprietary WatchDx. The infrmatin and ideas herein may nt be disclsed t any unauthrized

More information

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions Maryland General Service (MGS) Area 29 Treatment Facilities Cmmittee (TFC) TFC Instructins Lve And Service Facility Presentatin t Patients We are frm Alchlics Annymus (AA), fr AA, and ur service is fr

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

For students to participate in BYOD please follow these two steps

For students to participate in BYOD please follow these two steps www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many

More information

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013 Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

Social media guidelines

Social media guidelines Scial media guidelines I. Overview This dcument will prvide yu with basic guidelines n using scial media channels such as Facebk, Twitter r YuTube t reach individuals and families abut hw t prepare fr

More information

Corporate Profile, 2014

Corporate Profile, 2014 Cpyright 2014 IT-Serve.cm All rights reserved. IT-Serve.cm Crprate Prfile, 2014 Internatinal experience, Reginal reach, Lcal understanding Dubai Abu Dhabi Sharjah Oman Qatar Saudi Arabia IT-Serve.cm PO

More information

Valley Transcription Service I-Phone/I-Pod App User s Guide

Valley Transcription Service I-Phone/I-Pod App User s Guide 541-926-4194 Valley Transcriptin Service I-Phne/I-Pd App User s Guide (Fr use with iphne/ipad/i-pd Tuch) Page 0 Table f Cntents Table f Cntents... i Intrductin... 1 Requirements... 1 1. 2. 3. Installing

More information

UNIVERSAL MUSIC GROUP PRIVACY POLICY. Universal Music AB ("We") are committed to protecting and respecting your privacy.

UNIVERSAL MUSIC GROUP PRIVACY POLICY. Universal Music AB (We) are committed to protecting and respecting your privacy. Effective Date: 2016-04-26 UNIVERSAL MUSIC GROUP PRIVACY POLICY Universal Music AB ("We") are cmmitted t prtecting and respecting yur privacy. This privacy plicy (tgether with ur terms f use and any ther

More information

BRILL s Editorial Manager (EM) Manual for Authors Table of Contents

BRILL s Editorial Manager (EM) Manual for Authors Table of Contents BRILL s Editrial Manager (EM) Manual fr Authrs Table f Cntents Intrductin... 2 1. Getting Started: Creating an Accunt... 2 2. Lgging int EM... 3 3. Changing Yur Access Cdes and Cntact Infrmatin... 3 3.1

More information

Information & Communications Technology ICT Security Compliance Guide (Student)

Information & Communications Technology ICT Security Compliance Guide (Student) Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0

More information

Mobile Deployment Guide For Apple ios

Mobile Deployment Guide For Apple ios Fr Apple ios Cpyright This dcument is prtected by the United States cpyright laws, and is prprietary t Zscaler Inc. Cpying, reprducing, integrating, translating, mdifying, enhancing, recrding by any infrmatin

More information

Audit Committee Charter

Audit Committee Charter Audit Cmmittee Charter Membership The Audit Cmmittee (the "Cmmittee") f the Bard f Directrs (the "Bard") f Philip Mrris Internatinal Inc. (the "Cmpany") shall cnsist f at least three directrs all f whm

More information

Technical Writing - TheUsers Visa (SHR User Accunt)

Technical Writing - TheUsers Visa (SHR User Accunt) POLICY Number: 7311-25-004 Title: Saskatn Health Regin User Accunt Plicy Authrizatin [ ] President and CEO [X] Vice President, Finance and Crprate Services Surce: Directr, Infrmatin Technlgy Services Crss

More information

How To Write A Scial Media Plicy

How To Write A Scial Media Plicy Scial Media Plicy Scial Media Plicy Recrd Number D14/78 Respnsible Manager Directr Business Supprt and Strategy Manager Custmer and Cmmunicatins Last reviewed 11 February 2014 Adptin reference Cuncil Reslutin

More information