Erie Community College. Acceptable Use Policy Last Revision: December 17, College Information Technology Services

Size: px
Start display at page:

Download "Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services"

Transcription

1 Erie Cmmunity Cllege Acceptable Use Plicy Last Revisin: December 17, 2009 Cllege Infrmatin Technlgy Services

2

3 Erie Cmmunity Cllege Cllege Infrmatin Technlgy Services Acceptable Use Plicy Last Revisin: December 17, 2009 I. Intrductin In keeping with Erie Cmmunity Cllege (ECC) missin and gals, a variety f infrmatin technlgy resurces are ffered t prvide accessible, affrdable, quality educatin and services t a diverse cmmunity that includes students, faculty and staff. The capabilities these resurces ffer include, but are nt limited t, netwrk and lcal cmputing, telephny and vide cnferencing. They are supprted thrugh wrkstatins, servers, netwrks, phnes, vide cnference units and ther infrmatin technlgy devices and peripherals. Infrmatin technlgy resurces are intended fr cllege-related purpses, including direct and indirect supprt f academics, research and service missins, cllege administrative functins, student and campus activities and the free exchange f ideas within the cllege cmmunity and the wider lcal, natinal and wrld cmmunities. The plicy cntained herein applies t all faculty, staff, students and ther authrized users f ECC s infrmatin technlgy resurces. Additinal plicies may gvern certain cmputing resurces, such as wrkstatins, netwrk devices, servers r cmputer labs. Users are encuraged t cnsult the manager r administratr respnsible fr thse services t btain further infrmatin. This plicy supplements all applicable State University f New Yrk (SUNY) plicies, existing cllege plicies and federal, state and lcal laws. Please nte that the plicy may be mdified as deemed apprpriate by Erie Cmmunity Cllege. Users are encuraged t peridically review this plicy psted n the cllege website at II. Authrized Use ECC s cmputer facilities are a resurce fr members f the campus cmmunity, t be utilized fr activities cnsistent with the instructinal, research, and administrative gals f the Cllege. As a cnditin fr use f the cmputing facilities, all users must adhere t the regulatins belw. Authrized Activities ECC cmputer facilities shall be utilized slely fr wrk cnsistent with the instructinal, research, and administrative gals f the Cllege, as defined in the ECC "Missins and Gals" statement. User Privacy Users shall respect the privacy f thers. Users shuld nt intentinally view infrmatin f ther users, mdify r btain cpies f ther users' files, r mdify ther users' passwrds withut their permissin. ECC cmputers and netwrks are designed t prtect user privacy; users shall nt attempt t circumvent these prtectins. Resurce Accunting Users will nt develp r use prcedures t alter r avid the accunting and mnitring f the use f cmputing facilities. Fr example, users may nt utilize facilities annymusly r by means f an alias, and may nt send messages, mail, r print files that d nt shw the crrect username f the user perfrming the peratin. Resurce Usage Users must use the cmputing facilities in a respnsible and efficient manner. Users are nt permitted t alter the lab micrcmputers in any way. They are expected t refrain frm deliberately wasteful practices such as printing unnecessary listings, perfrming endless unnecessary cmputatins, r unnecessarily hlding public terminals fr lng perids f time when thers are waiting fr the same resurces. Users are nt allwed t develp r use prcedures that bstruct authrized use by thers. Users shall nt interfere with micrcmputer setups which are intended t keep micrcmputer sftware current and legal. Cpyrights and Licenses Users may nt vilate the legal prtectin prvided by cpyrights and licenses held by ECC. Users shuld nt make cpies f any licensed r cpyrighted cmputer prgram fund n any ECC cmputer r strage device withut the written authrizatin frm the Cllege Infrmatin Technlgy Services (CITS) department. US Federal cpyright law grants authrs certain exclusive rights f reprductin, adaptatin, distributin, perfrmance, display, attributin, and integrity t their creatins. Wrks f literature, phtgraphs, music, sftware, film, and vide wrks can all be cpyrighted. Examples f prbable vilatins f cpyright laws include, but are nt limited t: making unauthrized cpies f any cpyrighted material (such as cmmercial sftware, text, graphic images, audi, and vide recrdings); distributing cpyrighted materials ver cmputer Page 1

4 Erie Cmmunity Cllege Cllege Infrmatin Technlgy Services Acceptable Use Plicy Last Revisin: December 17, 2009 netwrks r thrugh ther means; resale f data r prgrams, r the use f them fr nn-educatinal purpses r fr financial gain; public disclsure f infrmatin abut prgrams (e.g. surce cde) withut the wner's authrizatin. Use f Erie Cmmunity Cllege s lg, athletic lg r name shuld nt be used n any third party sites unless authrized t d s by the Public Relatins Department. Anti-Virus Prtectin Every cmputer cnnected t the campus netwrk will be required t run current anti-virus prtectin sftware. Campus-prvided "managed" anti-virus prtectin is placed n all campus-wned cmputers. III. Unauthrized Use Unauthrized Activities Users may nt engage in wasteful and/r illegal practices which abuse the cmputers r netwrks. These practices include, but are nt limited t, the fllwing: Game Playing - While limited game playing is permitted, users are nt allwed t engage in recreatinal r cmpetitive game playing which utilize cmputing and netwrk resurces. Viruses Users are nt allwed t create r knwingly distribute viruses t ther users, r prpagate viruses thrugh the ECC netwrk r Internet. Chain and Hax Letters Under n circumstances will users distribute chain r hax s. Unauthrized Servers The establishment f a backgrund applicatin which services incming requests frm ther users fr the purpse f gaming, chatting, brwsing the web r transferring files is prhibited. Unauthrized Mnitring A user may nt use cmputing resurce t mnitr r capture any electrnic cmmunicatin. Spamming r Flding The use f ECC s system t send ut unslicited mail, r multiple mail messages t list servers r newsgrups with the intent f reaching as many peple as pssible is strictly prhibited. Private Cmmercial Business Cmputing resurces will nt be used fr persnal r private cmmercial business r fr financial gain. Plitical Advertising r Campaigning ECC s cmputer resurces cannt be used fr any type f plitical advertising r campaigning. Repair r Mve Cmputers Users may nt attempt t repair r mve any cmputer, netwrk device r peripheral withut prper authrizatin. Circumventing Security Measures Users are prhibited frm circumventing r attempting t circumvent any system r cmputing security measures. This includes any sftware r hardware device which intercepts r decdes passwrds r similar access cntrl infrmatin. Unauthrized Access Users are nt permitted t use cmputing resurces t gain unauthrized access t remte cmputers r t impair r damage the peratin f ECC s cmputers, netwrk r peripherals. This includes blcking cmmunicatin lines, intercepting cmmunicatins, and running, installing r sharing virus prgrams. Users must nt ffer alternative methds f accessing ECC netwrk resurces, such as thrugh dial-up r VPN. Netwrk Device Installatin Users must nt implement any device r cmputer n the netwrk withut prper authrizatin. This includes, but is nt limited t, laptps, hubs, switches, ruters, firewalls and wireless access pints. Terrrism Users are nt allwed t use ECC s cmputing resurces t participate in any terrrist discussins, actins and/r activities cnnected with verthrwing the gvernment f the United States. Academic Dishnesty Practicing any frm f dishnesty thrugh use f cmputing facilities (fr example cheating, plagiarism, r fraud) is prhibited. Page 2

5 Erie Cmmunity Cllege Cllege Infrmatin Technlgy Services Acceptable Use Plicy Last Revisin: December 17, 2009 Harassment Using cmputers r netwrks t harass, abuse r intimidate anther persn is prhibited. Users shall nt develp r emply prgrams that harass ther users. Users shall be sensitive t the public nature f shared facilities, and take care nt t display n screens in such lcatins images, sunds r messages that culd create an atmsphere f discmfrt r harassment fr thers. Obscenity Obscene language in electrnic mail, messages, prcess names, file names, file data, and ther publicly visible frms is prhibited. Prngraphy Prngraphy in electrnic mail, file data, web sites, and ther publicly visible frms, is prhibited. Federal Child Prngraphy Law makes it illegal t create, pssess, r distribute graphic depictin f minrs engaged in sexual activity, including cmputer graphics. Cmputers string such infrmatin can be seized as evidence. IV. Electrnic Mail The purpse f this plicy is t ensure the prper use f ECC s system by its students, faculty, and staff. Electrnic Mail is a tl prvided by the cllege t cmplement traditinal methds f cmmunicatins and t imprve educatin and administrative efficiency. Users have the respnsibility t use this resurce in an efficient, effective, ethical and lawful manner. Use f the cllege s system evidences the user's agreement t be bund by this plicy. Vilatins f the plicy may result in restrictin f access t ECC s system and/r ther apprpriate disciplinary actin. Erie Cmmunity Cllege wns all accunts run n its system. The Cllege Infrmatin Technlgy Services department is respnsible fr maintaining the system. While incidental nn-business persnal use f is acceptable; cnducting business fr prfit using Cllege resurces is frbidden. While the Cllege will make every attempt t keep messages secure, privacy is nt guaranteed and users shuld have n general expectatin f privacy in messages sent thrugh the Institutinal system. Under certain circumstances, it may be necessary fr the CITS staff r ther apprpriate campus fficials t access files t maintain the system, t investigate security r abuse incidents r vilatins f this r ther cllege plicies. Such access will be n an as needed basis and any accessed will nly be disclsed t thse individuals with a need t knw r as required by law. Individuals are respnsible fr saving messages as they deem apprpriate. Due t limited resurces, the ECC CITS department has the right t restrict the amunt f user space n the server as necessary and t purge and remve accunts f students wh have nt registered fr a semester, as well as fr ther individuals n lnger affiliated with the cllege. When using as an fficial means f cmmunicatin, students, faculty, and staff shuld apply the same prfessinalism, discretin, and standards that they wuld use in written business cmmunicatin. Furthermre, students, faculty, and staff shuld nt cmmunicate anything via that they wuld nt be prepared t say publicly. Apprval and transmissin f cntaining essential cllege annuncements t students, faculty, and/r staff must be btained frm the apprpriate authrity. Only the Offices f Vice President r President can authrize the sending f bradcast messages t a wide audience f students, faculty, and staff within the scpe f their authrity. Any inapprpriate , examples f which are described belw and elsewhere in this plicy, is prhibited. The creatin and exchange f messages that cntain harassing, bscene r threatening material. The unauthrized exchange f prprietary infrmatin r any ther privileged, cnfidential r sensitive infrmatin. Page 3

6 Erie Cmmunity Cllege Cllege Infrmatin Technlgy Services Acceptable Use Plicy Last Revisin: December 17, 2009 V. Passwrd Use The creatin and exchange f advertisements, slicitatins, chain letters and ther unfficial, unslicited . The creatin and exchange f infrmatin in vilatin f any laws, including cpyright laws, r Institutinal plicies. The knwing transmissin f a message cntaining a cmputer virus. The misrepresentatin f the identity f the sender f an . The use r attempt t use the accunts f thers withut their permissin. Passwrds are an imprtant aspect f cmputer security. They are the frnt line f prtectin fr user accunts. A prly chsen passwrd may result in the cmprmise f Erie Cmmunity Cllege's entire netwrk. This plicy is intended fr every emplyee and student wh have r are respnsible fr an accunt (r any frm f access that supprts r requires a passwrd) n any system that resides at any Erie Cmmunity Cllege facility, has access t the cllege s netwrk, r stres any nn-public ECC infrmatin. Passwrds must nt be inserted int messages r ther frms f electrnic cmmunicatin, nr are they allwed t be written dwn and kept in an unsecured lcatin (e.g., such as n a pst it nte n yur desk). Users are respnsible fr the security f their passwrd. All user-level and system-level passwrds shuld cnfrm t the guidelines described belw. Strng passwrds have the fllwing characteristics: Cntain bth upper and lwer case characters (e.g., a-z, A-Z) Have digits and punctuatin characters as well as letters e.g., ~-=\`{}[]:";'<>?,./) Are at least eight alphanumeric characters in length. Is nt a wrd in any language, r fund in the dictinary. Passwrds shuld never be written dwn r stred n-line. Try t create passwrds that can be easily remembered. One way t d this is create a passwrd based n a sng title, affirmatin, r ther phrase. Fr example, the phrase might be: "This May Be One Way T Remember" and the passwrd culd be: "TmB1w2R!" r "Tmb1W>r~" r sme ther variatin. Pr, weak passwrds have the fllwing characteristics: The passwrd cntains less than eight characters The passwrd is a wrd fund in a dictinary (English r freign) The passwrd is a cmmn usage wrd such as: Names f family, pets, friends, c-wrkers, sprt teams, etc. Wrd r number patterns like aaabbb, qwerty, zyxwvuts, , etc. If an accunt r passwrd is suspected t have been cmprmised, reprt the incident t the CITS Helpdesk and change all passwrds ASAP. VI. Vilatins Users shuld ntify the Vice President f Infrmatin Technlgy s ffice, Netwrk Administratin Office, a classrm instructr, lab mnitr r supervisr f any intentinal r unintentinal breaches in security. In additin, users may regarding any vilatins f this plicy. All suspected vilatins will be presented t the apprpriate Cllege fficial t determine whether a vilatin f this plicy ccurred. If the Cllege fficial determines a vilatin ccurred, the users accunt may be immediately suspended, r their privileges may be revked in additin t ther remedial actins. If warranted, ther sanctins may be impsed including suspensin r expulsin frm Erie Cmmunity Cllege. Any vilatins f lcal, state r federal law will be dealt with by the prper authrities. Page 4

7

8

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 8 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk The Bard f Educatin recgnizes as new technlgies shift the manner in which infrmatin is

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5 Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet

More information

Meopham School Information Technology Code of Conduct

Meopham School Information Technology Code of Conduct 1. Intrductin Infrmatin technlgy resurces are essential fr accmplishing Mepham Schl s missin f pursuing excellence in teaching and learning, research and cmmunity service. Members f the Schl cmmunity are

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

To clarify terms used within these policies, the following definitions are provided:

To clarify terms used within these policies, the following definitions are provided: Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail

More information

Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117

Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ 07644-2117 Cmputer Use Plicy Intrductin - In supprt f Felician Cllege's missin f teaching and public service, the Infrmatin Technlgy

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Woodstock Multimedia, INC. Software/Hardware Usage Policy

Woodstock Multimedia, INC. Software/Hardware Usage Policy Wdstck Multimedia, INC. Sftware/Hardware Usage Plicy POLICY PURPOSE The purpse f the Wdstck Multimedia, INC. Sftware / Hardware Usage Plicy is t ensure that Wdstck Multimedia, INC. emplyees are prperly

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies

More information

Information & Communications Technology ICT Security Compliance Guide (Student)

Information & Communications Technology ICT Security Compliance Guide (Student) Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

Electronic and Information Resources Accessibility Compliance Plan

Electronic and Information Resources Accessibility Compliance Plan Electrnic and Infrmatin Resurces Accessibility Cmpliance Plan Intrductin The University f Nrth Texas at Dallas (UNTD) is cmmitted t prviding a wrk envirnment that affrds equal access and pprtunity t therwise

More information

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices This is being prvided t yu as a requirement f the privacy regulatins issued under the Health Insurance Prtability and Accuntability Act f 1996 (HIPAA). This ntice describes hw HROSM may use and disclse

More information

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028

More information

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT 1 FERRIS STATE UNIVERSITY SCHOOL f NURSING CODE f CONDUCT The Schl f Nursing (SON) at Ferris State University uphlds the University Cde f Student Cnduct and the American Nurses Assciatin Cde f Ethics.

More information

Texas Woman's University University Policy Manual

Texas Woman's University University Policy Manual Texas Wman's University University Plicy Manual Plicy Name: Plicy Number: 6.06 Date Passed: July 2004 Health Insurance Prtability& Accuntability Act (HIPAA) Date Reviewed: September 2008 Next Review: September

More information

Williamson County Board of Education Procedures and Guidelines

Williamson County Board of Education Procedures and Guidelines Williamsn Cunty Bard f Educatin Prcedures and Guidelines Effective Date: 6/21/10; 8/15/11; Page 1 f 7 PURPOSE Williamsn Cunty Schls prvides student and emplyee access t the Internet as a means t increase

More information

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service. FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only

DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM Fr 8 th 12 th Grade Students Only Student s Last Name Parent/Guardian Last Name Class First Name First Name Date Fr the first time this fall, students

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3 EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

CMS Eligibility Requirements Checklist for MSSP ACO Participation

CMS Eligibility Requirements Checklist for MSSP ACO Participation ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

2.1 All SHR Users are responsible for the security of SHR systems/applications, resources and information.

2.1 All SHR Users are responsible for the security of SHR systems/applications, resources and information. POLICY Number: 7311-25-004 Title: Saskatn Health Regin User Accunt Plicy Authrizatin [ ] President and CEO [X] Vice President, Finance and Crprate Services Surce: Directr, Infrmatin Technlgy Services Crss

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE

INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE Cunty f Orange Infrmatin Technlgy Usage Plicy 1 INTRODUCTION: The Cunty f Orange Infrmatin Technlgy (IT) Usage Plicy is the fundatin f the Cunty s infrmatin

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

POLICY INTERNET - ACCEPTABLE USE

POLICY INTERNET - ACCEPTABLE USE POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

INTRODUCTION TO PORTAL GROUP STUDIO

INTRODUCTION TO PORTAL GROUP STUDIO Mntana State University Luminis Prtal Prject INTRODUCTION TO PORTAL GROUP STUDIO Grup Studi With the Grup Studi sftware, yu can request the creatin f nline grups fr clubs, affiliatins, r interests and

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

Guidelines for Custodians

Guidelines for Custodians Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

For students to participate in BYOD please follow these two steps

For students to participate in BYOD please follow these two steps www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY

2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY 2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY OFFICE OF INFORMATION TECHNOLOGY AUGUST 2008 Executive Summary The mst recent CSU Stanislaus infrmatin technlgy (IT) plan was issued in 2003.

More information

TECHNOLOGY SERVICE AND SUPPORT POLICY

TECHNOLOGY SERVICE AND SUPPORT POLICY Respnsible Official: Directr f Technlgy Respnsible Office: Department f Technlgy Services and Supprt Next Review Date: July 2016 Website Address: https://myum.mc.edu/services/ir/plicies/public%20pl ices/techservicesupprtplicy.pdf

More information

Purpose Statement. Objectives

Purpose Statement. Objectives Apprved by Academic Affairs Cuncil, June 24, 2014 Faculty Handbk Part VI: Other Plicies and Prcedures Sectin R. Intellectual Prperty Classified Emplyee Handbk Part VI: Other Plicies and Prcedures Sectin

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

Legal Issues Bulletin

Legal Issues Bulletin Legal Issues Bulletin N. 8 reviewed May 2015 Claims fr lss f r damage t persnal prperty and use f private mtr vehicles by staff, parents and students Legal Issues Bulletin 39 - Preparatin and use f accident

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

System Business Continuity Classification

System Business Continuity Classification Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required

More information

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc. HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS APPENDIX A FORM ADV (Paper Versin) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS Frm ADV: General Instructins Read these instructins carefully befre

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

Creating an Ethical Culture and Protecting Your Bottom Line:

Creating an Ethical Culture and Protecting Your Bottom Line: Creating an Ethical Culture and Prtecting Yur Bttm Line: Best Practices fr Crprate Cdes f Cnduct Nte: The infrmatin belw and all infrmatin n this website is nt meant t be taken as legal advice. Please

More information

COE: Hybrid Course Request for Proposals. The goals of the College of Education Hybrid Course Funding Program are:

COE: Hybrid Course Request for Proposals. The goals of the College of Education Hybrid Course Funding Program are: COE: Hybrid Curse Request fr Prpsals The gals f the Cllege f Educatin Hybrid Curse Funding Prgram are: T supprt the develpment f effective, high-quality instructin that meets the needs and expectatins

More information

PRIVACY POLICY Last revised: April 2015

PRIVACY POLICY Last revised: April 2015 PRIVACY POLICY Last revised: April 2015 ACD, LLC, and its affiliates (cllectively, we, us, ur ) understand that privacy is imprtant t ur cnsumers and want yu t make knwledgeable decisins abut the infrmatin

More information

Employees - recruitment, records and monitoring

Employees - recruitment, records and monitoring Emplyees - recruitment, recrds and mnitring This guidance has been prduced t help rganisatins cmply with the Data Prtectin Act (DPA) when recruiting and emplying wrkers. It is relevant t public sectr emplyers,

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

Internet and Social Media Solicitations: Wise Giving Tips

Internet and Social Media Solicitations: Wise Giving Tips Internet and Scial Media Slicitatins: Wise Giving Tips Charities use a wide variety f methds t slicit charitable dnatins. New and pwerful technlgies utilize nt just the internet and email, but als scial

More information

Help Desk Level Competencies

Help Desk Level Competencies Help Desk Level Cmpetencies Level 1 Take user calls and manage truble tickets Ability t staff and manage the rganizatins helpdesk and effectively respnd t rutine custmer calls Ability t use prper grammar

More information

Rule 4-004I Payment Card Industry (PCI) Virus and Vulnerability Management (proposed)

Rule 4-004I Payment Card Industry (PCI) Virus and Vulnerability Management (proposed) Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004I Payment Card Industry (PCI) Virus and Vulnerability Management (prpsed) 01.1 Purpse The

More information

Sources of Federal Government and Employee Information

Sources of Federal Government and Employee Information Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities

More information

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance

More information

Service Desk Self Service Overview

Service Desk Self Service Overview Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

Online Network Administration Degree Programs

Online Network Administration Degree Programs Online Schls, Degrees & Prgrams Blg Abut Archives Cntact Online Netwrk Administratin Degree Prgrams A Netwrk Administratr is smene respnsible fr the maintenance and perfrmance f cmputer hardware and sftware

More information

P CARD College of Health and Rehabilitation Sciences: Sargent Internal Policy

P CARD College of Health and Rehabilitation Sciences: Sargent Internal Policy P CARD Cllege f Health and Rehabilitatin Sciences: Sargent Internal Plicy All purchasing card hlders must read the Purchasing Card Prgram Manual (P Card Manual) and cnfirm upn ding s via email t the SAM

More information

Change Management Process

Change Management Process Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses

More information

Community Support Programs N9 Organizational Internship Program

Community Support Programs N9 Organizational Internship Program NAVY REGION SOUTHWEST Cmmunity Supprt Prgrams N9 Organizatinal Internship Prgram April 2011 Cntents Prgram... 3 Purpse... 3 Outcme... 3 Duratin... 3 Definitins... 3 Eligibility... 4 Prcess... 5 Participating

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

Small Business, Enterprise and Employment Bill: Insolvency fact sheets Contents

Small Business, Enterprise and Employment Bill: Insolvency fact sheets Contents 1 Small Business, Enterprise and Emplyment Bill: Inslvency fact sheets Cntents Directr Disqualificatin and Inslvency General Aims... 2 Administratin: sales t cnnected persns (prepack administratins)...

More information

ADMINISTRATIVE REGULATIONS TABLE OF CONTENTS

ADMINISTRATIVE REGULATIONS TABLE OF CONTENTS ADMINISTATIVE EGULATIONS TABLE OF CONTENTS 8000 INFOMATION TECHNOLOGY 8100 Intrductin and Gvernance 8200 Apprpriate Use 8300 Access 8400 Data Security 8500 Hardware and Sftware Supprt 8700 Electrnic Cmmunicatin

More information

IT Help Desk Service Level Expectations Revised: 01/09/2012

IT Help Desk Service Level Expectations Revised: 01/09/2012 IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+

More information

AVON MAITLAND DISTRICT SCHOOL BOARD ADMINISTRATIVE PROCEDURE NO. 161

AVON MAITLAND DISTRICT SCHOOL BOARD ADMINISTRATIVE PROCEDURE NO. 161 AVON MAITLAND DISTRICT SCHOOL BOARD ADMINISTRATIVE PROCEDURE NO. 161 SUBJECT: Legal References: BYOD (BRING YOUR OWN DEVICE): USE OF PERSONALLY OWNED COMPUTING DEVICES ON SCHOOL AND BOARD NETWORKS Educatin

More information

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15 AMWA Chapter Subgrups n LinkedIn Guidance fr Subgrup Managers and Chapter Leaders, updated 2-12-15 1. Chapters may nt have an independent grup n LinkedIn, Facebk, r ther scial netwrking site. AMWA prvides

More information

Bill Payment Agreement & Disclosures

Bill Payment Agreement & Disclosures Bill Payment Agreement & Disclsures Welcme t Online Banking Bill Payment Service. Use f the Bill Payment Service indicates acceptance f terms and cnditins set frth in the Online Banking Agreement & Disclsures

More information

E-LEARNING ONTARIO POLICY DOCUMENT

E-LEARNING ONTARIO POLICY DOCUMENT E-LEARNING ONTARIO POLICY DOCUMENT In additin t the Service Level Agreement (SLA), which is specific t each bard, each participating bard must abide by this plicy dcument. It cntains three sectins: A.

More information

Amazon Marketing Services Content Policies and Standards

Amazon Marketing Services Content Policies and Standards Amazn Marketing Services Cntent Plicies and Standards Cntents Intrductin... 2 Acceptance f Creative Assets... 2 General Creative Plicies... 3 Reprting Abuse... 3 Cnsequences fr Vilatins... 3 Image Guidelines...

More information

ICD-10 Frequently Asked Questions: (resource CMS website)

ICD-10 Frequently Asked Questions: (resource CMS website) ICD-10 Frequently Asked Questins: (resurce CMS website) 1. Will ICD-9-CM cdes be accepted n claims with FROM dates f service r dates f discharge/through dates n r after Octber 1, 2015? N. ICD-9-CM cdes

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER This Audit Cmmittee Charter has been amended as f July 17, 2015. The Audit Cmmittee shall review and reassess this Charter annually and recmmend

More information

System Business Continuity Classification

System Business Continuity Classification System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality

More information