2015 HMIS Annual Workshop
|
|
- Benjamin Hudson
- 8 years ago
- Views:
Transcription
1 2015 HMIS Annual Workshop
2 2015 HMIS Annual Workshop August 20 th 2015 AGENDA 9:00 AM Welcome (All times are approximate) 9:15 AM Security, Data Integrity, Compatibility 10:45 AM ServicePoint Feature Set 11:30 AM - Annual Homeless Assessment Report 11:45 LUNCH BREAK 1:15 PM New HUD Data Elements 2:00 PM The TOP 25 2:45 PM Open Discussion
3 HMIS General Security Essentials
4 MORE SECURE DATA ENVIRONMENT Adhere to HMIS REQUIRED policies and implement at every security level COMPUTER USER CLIENT ORGANIZATION/PROVIDER
5 MORE SECURE DATA ENVIRONMENT Create an environment of confidentiality by restricting open discussions that include secure information. Assure that only staff who work directly with clients or who have administrative responsibilities can look at, enter, or edit client records.
6 COMPUTER SECURITY All computers that will access HMIS must be in secured locations. Personally Identifiable Information (PID) included in HMIS should not be visible to other clients or the public. This information should not be able to be accessed by unauthorized users.
7 COMPUTER SECURITY All computers running HMIS must have up to date anti-virus software and must be behind a software and/or hardware firewall. Use a secure, supported operating system. (Windows 7, Windows 8, ipad)** **Computers running ART must be running Java 6 release 45.
8 COMPUTER SECURITY Maintain current operating system updates. Keep your operating system updated by applying the latest service packs and patches. Use recommended and updated browsers (Firefox and Chrome) for HMIS.
9 COMPUTER SECURITY It is a BEST PRACTICE to implement the PRINCIPLE of LEAST PRIVILEGE (PoLP) when users log onto a computer to use it for HMIS. It is recommended that there be a separate ADMINISTATOR user on a computer and that the day to day entries and use of the computer be performed while logged in as a STANDARD USER without administrative privileges.
10 COMPUTER SECURITY A computer running HMIS must not be left unattended. Every computer s power settings must automatically turn off the display after a reasonable length of time (e.g. 15 minutes) without activity and; Require a re-entry of the user password in order to log back in.
11 COMPUTER SECURITY Do not download unfamiliar software off the Internet: KaZaA, Bonzi, Gator, HotBar, WhenUSave, LimeWire, Ads by Ultra Coupon, Coupon Factor, Firefox Redirect and other programs may appear at first to have useful and legitimate functions. However, it may contain spyware or malware, which will damage your computer functionality.
12 COMPUTER SECURITY Whenever you install a computer program, look and read carefully each screen before clicking NEXT. You may, without realizing it, give permission to install other software that can affect the performance of your computer and/or add malware/spyware to your system.
13 COMPUTER SECURITY BEST PRACTICE: Install only the software on your computer systems that is needed for your legitimate business practice.
14 COMPUTER SECURITY Obtain all software, including public domain software from reputable sources. It may look like the same software, it may seem like a great price, but the cost can be high to your organization, if the software contains viruses or malware, or is a pirated copy of a computer program.
15 USER SECURITY An HMIS user is a staff person or volunteer who is authorized and trained to collect and disseminate information regarding clients or potential clients of PROGRAMS operated within the CoC.
16 USER SECURITY Every user must have a unique HMIS login ID, and a password that changes on a periodic basis. User login and password information must be kept secured, and must not be shared with anyone.
17 USER SECURITY All users must be trained in the use of HMIS and must sign a user confidentiality agreement with the Suncoast Partnership HMIS.
18 USER SECURITY You can find an up to date list of the HMIS training programs that are scheduled on the Suncoast Partnership website. Look for the icon the reads HMIS Training.
19 USER SECURITY Confidential information obtained from HMIS is to remain confidential, even when the HMIS user s relationship with the agency changes or concludes for any reason.
20 USER SECURITY Any unauthorized access or unauthorized modification to the computer system information or interference with normal system operations will result in immediate suspension of the users access to the HMIS and may jeopardize your employment status with your agency.
21 HMIS PASSWORD SECURITY POLICY Passwords must be 8 to 16 characters in length and must contain at least two numbers. The system allows only one login per password at a time. In other words, you cannot log into the system on two terminals at the same time using a single password. Passwords automatically expire every 45 days. When your password expires, you must enter a new one; you cannot reenter the same one.
22 HMIS PASSWORD SECURITY POLICY In order to enforce password security, ServicePoint will not allow your browser to save your password. Additionally, if you attempt to log into ServicePoint three consecutive times with the wrong password, your user account will need to be reset by a system administrator. You must contact your administrator to have your account reactivated.
23 HMIS PASSWORD SECURITY POLICY ServicePoint has an automatic logout function for users who have been idle for a pre-determined period of time. This function decreases potential viewing and/or manipulation of client data by unauthorized individuals. This timer is typically set for 30 minutes.
24 PRACTICAL PASSWORD GUIDELINES A strong, effective password requires a necessary degree of complexity. There are four practices to help create these strong passwords and yet keep them relatively easy to remember.
25 PRACTICAL PASSWORD GUIDELINES Four best practices for passwords: Length Width Depth Substitution.
26 PRACTICAL PASSWORD GUIDELINES Length means that the longer a password, the more difficult it is to crack. Simply put, longer is better. Probability dictates that the longer a password the more difficult it will be to crack. HMIS Software allows for 8 to 16 characters
27 PRACTICAL PASSWORD GUIDELINES Width is a way of describing the different types of characters that are used. Don t just consider the alphabet and upper and lower case letters. Also include numbers and special characters like %.
28 PRACTICAL PASSWORD GUIDELINES Depth refers to choosing a password not easily guessable. However, it has been found that creating passwords that are just random characters creates organizational problems, as the passwords are too difficult to remember. Stop thinking in terms of passwords and start thinking in terms of phrases.
29 PRACTICAL PASSWORD GUIDELINES Creating depth means using phrase passwords including something phonetically spelled, such as ImuKat! (instead of I m a cat! ) or the first letters of a memorable phrase such as qbfjotld = quick brown fox jumped over the lazy dog. Add a number in place of a letter, a special character in place of a letter and capitalize a letter and you have a great password. Qbfj0t!d
30 PRACTICAL PASSWORD GUIDELINES Substitution is a great way add complexity without making the password more difficult to remember. The password we used in the Depth example was Qbfj0t!d, relating to the phrase quick brown fox jumped over the lazy dog. Note: that we replaced the letter o with the number 0 and replaced the letter l with the exclamation point. This is called Substitution.
31 PRACTICAL PASSWORD GUIDELINES With Substitution you can create some easy to remember substitution rules. For example: For the capital letter S, substitute the $ symbol. For the letter z, substitute the number 2. For the letter l, substitute the exclamation point. For the letter B, substitute the number 8. These are just a few simple substitution rules that you might utilize.
32 CLIENT SECURITY Each client must be made aware that their information is to be entered into the HMIS and why that information is collected.** To help meet the client s needs to help with case management and help make sure the client gets services needed. **See Organization/Provider Security for more information.
33 CLIENT SECURITY Each client must be made aware that their information is to be entered into the HMIS and why that information is collected.** To help HMIS and program providers count and do research regarding how many people we serve and the types of people we serve. **See Organization/Provider Security for more information.
34 CLIENT SECURITY Each client must be made aware that their information is to be entered into the HMIS and why that information is collected.** To help HMIS and program providers understand the types of services people need and develop new services to meet the needs. **See Organization/Provider Security for more information.
35 CLIENT SECURITY Each client must be made aware that their information is to be entered into the HMIS and why that information is collected.** HMIS and program providers only collect personal information that is necessary and seek to only maintain personal information that is complete, correct, consistent and current.
36 CLIENT SECURITY Each client must be made aware that their information is to be entered into the HMIS.** A client should consent to have their information entered into HMIS. It should be noted that a client may refuse to have their information entered but this may effect their eligibility for services.
37 CLIENT SECURITY Each client should sign a RELEASE OF INFORMATION for the sharing of their information among participating providers. Each provider must have their own RELEASE OF INFORMATION with each client.
38 ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding: Posting of the required Notice of Uses and Disclosures for HMIS Collecting, editing, and reporting information. Sharing and/or protecting client information. Setting policies against discriminatory, profane, offensive or inflammatory language in HMIS.
39 ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding collecting, editing, and reporting information. Only staff who work directly with clients or who have administrative responsibilities can look at, enter, or edit client records. When working with other organizations and the HMIS staff, use client numbers only.
40 ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding collecting, editing, and reporting information. Misrepresentation of the client database by knowingly entering inaccurate information is prohibited
41 ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding collecting, editing, and reporting information. Client records are not to be deleted from the HMIS system. If a client or guardian of a client chooses to rescind consent to participate in the HMIS, her/his file shall become inactive.
42 IMPORTANT NOTICE The HMIS system is to be used for business purposes only. Transmission of material in violation of any United States Federal or State of Florida regulations or laws is prohibited and includes material that is copyrighted, legally judged to be threatening or obscene, and considered protected by trade secret. The HMIS will not be used to defraud the Federal, State or local government or an individual entity or to conduct any illegal activity.
43 ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding sharing client information. Staff should be trained, understand and share with clients the purpose of HMIS and both how and why information is obtained and documented in HMIS.
44 ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding sharing client information. Staff should be trained, understand and share with clients the benefits of HMIS, including the fact that the information they provide can assist in better referrals and a more complete set of services on their behalf.
45 ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding sharing client information. Written client consent, or Release of Information (ROI), is required for every client due to the fact that some or all of the data collected will be shared with other providers, the program funding sources and other administrative staff.
46 ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding sharing client information. Copies of client consent records shall be kept by the participating agencies for at least 7 years. An electronic copy of the ROI may be attached to the client s HMIS profile by scanning the signed agreement.
47 ServicePoint Feature Set
48 CallPoint - Call management and tracking, connecting calls to ClientPoint and HMIS ClientPoint - Manage client information and use effective tools like Case Management. ActivityPoint - Schedule classes, events. Track attendance and more. Fund Manager - Real Time tracking of dollars for services, programs and shelter ShelterPoint - Effective Bed Utilization SkanPoint - Faster and more convenient provision of services, programs and shelter ResourcePoint CommunityPoint Keeping information about your organization up to date. Reporting - Available Standard Reports, Easy Access to Information
49 CallPoint - Call management and tracking, connecting calls to ClientPoint and HMIS Add a dynamic information and referral management tool to your ServicePoint system. Utilize CallPoint to log calls, capture information about callers, and refer those in need to the most appropriate community providers.
50 ClientPoint - Manage client information and use effective tools like Case Management. Efficiently manage your client records with this powerful core ServicePoint module. Whether you need to view a summary of client activity, link clients in households, assess client needs, log case plans, or record services - ClientPoint has you covered!
51 ActivityPoint - Easily record client attendance, manage wait-lists, and track volunteer service at any activity or event for quick reference and reporting. Identify the topic, teachers, location and dates of each activity. Know who is scheduled to attend and keep a record of their attendance.
52 ActivityPoint - Schedule classes, events. Track attendance and more. You can even schedule & track attendance for volunteers using Activity Point.
53 Fund Manager Efficiently Manage Your Funding in real-time with FundManager. FundManager allows for seamless integration of grant management and client activity, providing a full picture of how funds are spent and who funds assist.
54 Fund Manager Make Your Grant Management Simple Case Managers are guided through the selection of appropriate funds for a service, and Fund Administrators have flexible options to set up their funds according to the to grant requirements. FundManager allows you to track which clients and households are receiving assistance dollars and for what services. Fund Administrators control fund compliance parameters and which providers have access to the funds. Other flexible options include the ability to allocate assistance amounts to providers or leave the fund open for use on a first come, first serve basis. FundManager empowers case managers by guiding the workflow when providing assistance to their clients. Take the guesswork out of determining the best funding sources to assist clients by displaying only relevant funding source options and providing real-time fund balances. Case Managers are kept up to date on the status of fund requests and informed of the next steps needed to fulfill their clients' fund requests. Make real-time auditing of your grant and fund management easy. FundManager provides unparalleled accountability for your funding as you easily track and report which clients or households are receiving assistance dollars and for what services.
55 ShelterPoint - Effective Bed Utilization
56 ShelterPoint - Effective Bed Utilization ShelterPoint was specifically designed as an all-in-one module to support the unique needs and workflows of human service residential programs. View realtime occupancy information, manage reservations and unit assignments, and much more. And ShelterPoint integrates with the rest of ClientPoint, Fund Manager and even SkanPoint.
57 SkanPoint - Faster and more convenient provision of services, programs and shelter Stream-line data entry for services. With SkanPoint, you can instantly record one or more services, quickly assign a residential unit, easily generate client ID cards for multiple services, and much more.
58 ResourcePoint CommunityPoint Keeping information about your organization up to date. HMIS ResourcePoint
59 Identifying Service Codes that will match a client/households needs. Each resource in ResourcePoint has a list of Service Codes that come from the AIRS Taxonomy.
60 Reporting - Available Standard Reports, Easy Access to Information, Custom Reporting Canned Reports Standard reports provided with ServicePoint to help track items like services, referrals and more. No need for special programming. Special Recipe Individualized reports to meet a projects specific needs. Usually done with the Advanced Reporting Tool (ART) by the HMIS staff.
61 Reporting Reporting: ServicePoint Reports Canned Reports ReportWriter Dashboard Reports Counts Reports My Fund Requests ART Dashboard Reports Specialized ART Reports
62 Annual Homeless Assessment Report
63 Description and Purpose of the AHAR Report A H A R The Annual Homeless Assessment Report (AHAR) is a HUD report to the U.S. Congress that provides nationwide estimates of homelessness, including information about the demographic characteristics of homeless persons, service use patterns, and the capacity to house homeless persons. The report is based primarily on Homeless Management Information Systems (HMIS) data about persons who experience homelessness during a 12-month period. For our area, the City of Sarasota is the only geocode included for the AHAR report. Focus is on emergency housing, transitional housing and permanent supportive housing. Current Status Quarterly status reports enable providers to correct errors and complete information that is lacking in a client file. Timeline First draft due in October, final report is due by Mid-November.
64 HUD Standards: A few changes and a greater emphasis on performance.
65 Program Data Elements Project Requested Data Elements Universal Data Elements include REQUIRED fields for data entry for all projects and are included for all projects. Program Data Elements are required fields for specific projects upon the funding source, and are not always available for every project. Project Requested Data Elements are fields that your specific project requests that are neither required or part of the Universal Data Elements. These fields may provide helpful data as you make services available.
66 FY 2015 New HUD Data Standards: Universal Data Elements 3.12 Destination 3.17 Time on Streets, Emergency Shelters, or Safe Havens Program Specific Data Elements 4.11 Domestic Violence RHY Only 4.35A Commercial Sexual Exploitation 4.35B Commercial Labor Exploitation SSVF Only 4.44 HP Screening Score 4.45 VAMC Station Number HOPWA Only 4.47 T-Cell and Viral Load
67 System Performance Measures: Length of Time Persons Remain Homeless Exit Homelessness to Permanent Housing & Return to Homelessness Number of Homeless Persons Employment and Income Growth for Homeless Persons in CoC Program funded Projects Number of Persons who Become Homeless for the First Time Homelessness Prevention and Housing Placement of Persons Defined by Category 3 of HUD s Homeless Definition in CoC Program-funded Projects Successful Housing Placements
68 25 Questions
69 25 Questions The HMIS Annual Workshop Booklet has all 25 questions and our best answer for each. You can download a copy of this booklet on line at:
70 Thank You.
Initial Client Setup Manual v. 5.5 InHOUSE Alameda Countywide HMIS System
Initial Client Setup Manual v. 5.5 InHOUSE Alameda Countywide HMIS System Manual written to correspond with ServicePoint software version 5.11.2 10/6/2014 InHOUSE Alameda Countywide HMIS System - ServicePoint
More informationNetwork and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
More informationHMIS Privacy/Security Plan
Page 1 of 8 Memphis and Shelby County Homeless Management Information System Community Alliance for the Homeless, MIS Department Memphis TN 38103 (901) 527-1302 Phone, (901) 527-1308 Fax www.cafth.org
More informationThis document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.
SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,
More informationIntroduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
More informationRocklin Unified School District Employee Authorized Network, Internet Usage, and E-Mail Privacy Agreement
Rocklin Unified School District Employee Authorized Network, Internet Usage, and E-Mail Privacy Agreement Please read this document carefully before signing: A. Upon employment all individuals permitted
More informationBusiness ebanking Fraud Prevention Best Practices
Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special
More informationQuick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
More informationUser Manual for National Transplant Procurement Management (NTPM) TOP team user Web Application
User Manual for National Transplant Procurement Management (NTPM) TOP team user Web Application Tel: 03-2694 2704/2705, 03-2615 6576 E-mail:ntpm@moh.gov.my Website: https://www.macr.org.my/entpm/ Table
More informationInformation Security
Information Security Table of Contents Statement of Confidentiality and Responsibility... 2 Policy and Regulation... 2 Protect Our Information... 3 Protect Your Account... 4 To Change Your Password...
More informationPROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationReliance Bank Fraud Prevention Best Practices
Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.
More informationEmployer Registrations On Maine s Job Bank Helpline: 1-888-457-8883
Maine s Employer Registrations On Maine s Job Bank Helpline: 1-888-457-8883 Maine s Job Bank is a no fee job match and workforce information service for employers. Maine's Job Bank is your portal to services
More informationwww.clienttrack.net/modesto
Homeless Management Information System Keeps Track of Homeless Clients and their progress through the Continuum of Care HUD Mandated ClientTrack The Software we use for HMIS Web Based Limited Licenses
More informationHow To Protect The Time System From Being Hacked
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
More informationBOWMAN SYSTEMS SECURING CLIENT DATA
BOWMAN SYSTEMS SECURING CLIENT DATA 2012 Bowman Systems L.L.C. All Rights Reserved. This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered
More informationCommon Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
More informationDistrict Regulation 2361 - ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES
District Regulation 2361 - ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES Section: Program Date Created: March, 2007 Date Edited: October, 2014 The school district provides computer equipment,
More information3. Electronic Mail (E-mail)
- Title of Agency - Internet Acceptable Use Policy The Following Internet Acceptable Use Policy Applies to the (AGENCY NAME) Staff 1. Introduction The (AGENCY NAME) provides its staff and (other entity(s)
More informationCasey State Bank Online Banking Agreement and Disclosure
Casey State Bank Online Banking Agreement and Disclosure Please carefully read this entire agreement and keep a copy for your records. By pressing the I ACCEPT button, you agree to the terms and conditions
More informationINTRODUCTION HMIS Objectives and Expectations... 1
Chicago Homeless Management Information System (HMIS) Standard Operating Procedures for Implementation Approved by the Planning Council on Homelessness: Date: January 2014 Current Version #: 1.01 Table
More informationAcceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
More informationRESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET
Administrative Procedure 140 Background RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET This Administrative Procedure is to guide users in the proper use of technology within the Division. The goal of the
More information1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
More informationAPPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
More information2. _General Help and Technical Support
1. _Welcome Welcome to Business Internet Banking. Our online service is available 06:00 AM ET 12:00 AM (Midnight) ET, seven days a week, so you and your employees can manage your business banking accounts
More informationAPPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE
TITLE: COMPUTER USE POLICY PAGE 1 OF 5 EFFECTIVE DATE: 07/2001 REVIEW DATES: 02/2003, 09/2006 REVISION DATES: 03/2005, 03/2008 DISTRIBUTION: All Departments PURPOSE APPROVED BY: Signatures on File Chief
More informationTable of Contents. Introduction... 3. Logging into ETO... 4. ETO HMIS Homepage Description... 9. ETO HMIS Homepage Tabs... 13
HMIS User Manual Table of Contents Introduction... 3 Logging into ETO... 4 ETO HMIS Homepage Description... 9 ETO HMIS Homepage Tabs... 13 Working with a Client... 25 Updating Client Demographics... 27
More informationU.S. Bank Secure Mail
U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email
More informationREGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
More informationBUSINESS ONLINE BANKING AGREEMENT
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
More informationBSHSI Security Awareness Training
BSHSI Security Awareness Training Originally developed by the Greater New York Hospital Association Edited by the BSHSI Education Team Modified by HSO Security 7/1/2008 1 What is Security? A requirement
More informationInternet Acceptable Use and Software Installation Policy
Internet Acceptable Use and Software Installation Policy Internet access is available to all team members of the Regional Office Education for Bond, Fayette, and Effingham Counties #3 (ROE) and its divisions.
More information2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
More informationHow To Protect A Hampden County Hmis From Being Hacked
Hampden County HMIS Springfield Office of Housing SECURITY PLAN Security Officers The Springfield Office of Housing has designated an HMIS Security Officer whose duties include: Review of the Security
More informationSecure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
More informationHomeless Management Information System (HMIS) Indiana Housing & Community Development Authority
Homeless Management Information System (HMIS) Indiana Housing & Community Development Authority 3.2.2012 Homeless Management Information System (HMIS) New User Training A Homeless Management Information
More informationState of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services Bureau
More informationCODE OF CONDUCT regarding the Data Storage Web Health History ("W.H.H.") Service called Lifepassport provided by Meshpass SA
CODE OF CONDUCT regarding the Data Storage Web Health History ("W.H.H.") Service called Lifepassport provided by Meshpass SA Updated: 20 Jun 2015 (substitutes previous versions) This Code of Conduct describes
More informationMIDDLESEX SAVINGS BANK ONLINE BANKING AGREEMENT
MIDDLESEX SAVINGS BANK ONLINE BANKING AGREEMENT 1. Online Banking This Agreement made between you and Middlesex Savings Bank (the "Bank") governs the use of Online Banking services (the "Service"). The
More informationUSE OF TECHNOLOGY RESOURCES IN INSTRUCTION
I-6400 2012 Arizona School Boards Association IJNDB USE OF TECHNOLOGY RESOURCES IN INSTRUCTION Appropriate use of Electronic Information Services The District may provide electronic information services
More informationFollow the instructions below for first-time users only
Whittier Law School Law Library Cisco NAC Agent Wireless Installation Guide For Microsoft Windows In order to access the wireless network on campus, Microsoft Windows laptop users must go through the Cisco
More informationFMS Bank s Internet Banking Accounts Access Agreement
I. Introduction FMS Bank s Internet Banking Accounts Access Agreement II. III. IV. Protecting Your Accounts a. Preventing Misuse of Your Account(s) b. Unauthorized Transactions in Your FMS Bank Account(s)
More informationDenver Public Schools - East High School
Denver Public Schools - East High School Return this page to the Technology Department in room 230 Electronic Web Access Agreement for Viewing Student Information via DPS Infinite Campus Parent/Student
More informationGreen Climate Fund Online Accreditation System: User s Guide
Green Climate Fund Online Accreditation System: User s Guide Page b Table of Contents I. Introduction 1 II. Contacting the Fund s administrator 1 III. Setting your account 1 IV. Accessing and logging into
More informationBusiness Internet Banking / Cash Management Fraud Prevention Best Practices
Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization
More informationSafe Practices for Online Banking
November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.
More informationComputer and Network Security Policy
Coffeyville Community College Computer and Network Security Policy Created By: Jeremy Robertson Network Administrator Created on: 6/15/2012 Computer and Network Security Page 1 Introduction: The Coffeyville
More informationR3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
More informationOnline Banking. Customer Information
Online Banking Customer Information PRIVACY & SECURITY FOR YOUR NETTELLER ACCOUNT Protect Your NetTeller Online Banking Account Information While Farmers Bank & Trust works to protect your banking privacy,
More informationHMIS Policies and Procedures. San Antonio/Bexar County Continuum of Care (CoC) Homeless Management Information System (HMIS) Policies and Procedures
HMIS Policies and Procedures San Antonio/Bexar County Continuum of Care (CoC) Homeless Management Information System (HMIS) Policies and Procedures Revised: 2/15/2012 Accepted by San Antonio/Bexar County
More informationHMIS Support Ticket System User Guide
HMIS Support Ticket System User Guide Table of Contents Welcome to the HMIS Support Ticket System... 3 System Requirements... 3 Helpful Hints and Tips... 3 Using the Support Ticket System... 4 Opening
More informationSussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009
Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009 Access to Electronic Media and other Technologies Terms and Conditions REASONS FOR PROVIDING ELECTRONIC
More informationSystem and Network Security Policy Internet User Guidelines and Policy. North Coast Council. 5700 West Canal Road Valley View, Ohio 44125
North Coast Council 5700 West Canal Road Valley View, Ohio 44125 Telephone: 216-520-6900 Fax: 216-520-6969 1885 Lake Avenue Elyria, Ohio 44035 Telephone: 440-324-3185 Fax: 440-324-7355 URL: www.nccohio.org
More informationOPUS. System Administrators Manual Updated March 17, 2010
OPUS System Administrators Manual Updated March 17, 2010 Presented by: Oregon Housing & Community Services 725 Summer St. NE, Suite B Salem, OR 97301 OPUSHelp@hcs.state.or.us 1-800-453-5511, Option 6 OPUS
More informationCentral Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
More informationHow To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
More informationHyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
More informationData Quality Plan Louisiana Service Network Data Consortium
Data Quality Plan Louisiana Service Network Data Consortium November 2nd, 2012 Developed by: LSNDC Data Quality Committee Data Quality 1.0 Definition: Data Quality Plan A data quality plan is a document
More informationInternet usage Policy
Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
More informationR 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationTenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014
Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology
More informationHang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
More informationFranciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
More informationIf you contact us orally, we may require that you send us your complaint or question in writing within 10 business days.
Please read the 1 st Equity Bank Online Banking Service Agreement and Disclosure. It includes disclaimers of liability and other matters of interest to users. By pressing the ''I Agree'' button, you agree
More informationPulaski Technical College
Pulaski Technical College Internet and E-Mail Acceptable Use Policy 1. Introduction Pulaski Technical College provides faculty and staff with technology resources and a local area network with access to
More information- Do not leave open email/network applications unattended. Log off of a computer when it is in an unsecured area and out of your sight.
STAFF PROCEDURES FOR ACCEPTABLE USE OF EMAIL/NETWORK AND INTERNET The primary purpose of Sycamore Community Schools email/network system is to provide resources to enhance and support educational instruction
More informationResponsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
More informationSecurity Tips You are here: Home» Security Tips
Security Tips You are here: Home» Security Tips Click on a the Security Icon to view detailed information on: Responsibility of the Bank Password Policy Guide Online Security Internet Security Tips Scam
More informationAcceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
More informationINFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
More informationRevelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
More informationCOMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
More informationResponsible Computer Use Policy for Students
Responsible Computer Use Policy for Students Introduction By using the Sheldon College Network and ICT Services students agree to accept the terms and conditions outlined in this document. This policy
More informationInformation Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
More informationStandard Data Entry Workflow SP5.12
This document provides the standard Entry/Exit workflow as used by the DuPage County CoC Homeless Management Information System participants. Prior to completing client level data entry - Discuss your
More informationPortal User Guide. Customers. Version 1.1. May 2013 http://www.sharedband.com 1 of 5
Portal User Guide Customers Version 1.1 May 2013 http://www.sharedband.com 1 of 5 Table of Contents Introduction... 3 Using the Sharedband Portal... 4 Login... 4 Request password reset... 4 View accounts...
More informationInformation Technology Acceptable Use Policies and Procedures
Information Technology Acceptable Use Policies and Procedures The following Information Technology Acceptable Use Policies and Procedures are to be followed by ALL employees, contractors, vendors, and
More informationOnline (Internet) Banking Agreement and Disclosure
Online (Internet) Banking Agreement and Disclosure This Online (Internet) Banking Agreement and Disclosure ( the Agreement") explains the terms and conditions governing the basic Online Banking services
More informationInterskill LMS Admin Guide
Interskill LMS Admin Guide Guide to Your Own Online Training System A roadmap to training success! Training Online Table of Contents Interskill LMS Overview... 3 The Login Page... 3 Navigation Menu...
More informationOnline Banking Customer Awareness and Education Program
Online Banking Customer Awareness and Education Program Electronic Fund Transfers: Your Rights and Responsibilities (Regulation E Disclosure) Indicated below are types of Electronic Fund Transfers we are
More informationChicago Homeless Management Information System (HMIS) Privacy Packet
Chicago Homeless Management Information System (HMIS) Privacy Packet Table of Contents Standard Agency Privacy Practices Notice... 3 Chicago Standard HMIS Privacy Posting... 6 Client Consent Form for Data
More informationCity of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
More informationTHE OPEN UNIVERSITY OF TANZANIA INSTITUTE OF EDUCATIONAL AND MANAGEMENT TECHNOLOGIES. ICT security procedures for staff
THE OPEN UNIVERSITY OF TANZANIA INSTITUTE OF EDUCATIONAL AND MANAGEMENT TECHNOLOGIES ICT security procedures for staff October 2014 1.1 Information Systems Usage Guidelines 1.1.1 Users and Computers Accounts
More informationHealthInfoNet HELP DESK REFERENCE GUIDE. Revised on 10.16.2014 Page 1 of 26
HealthInfoNet HELP DESK REFERENCE GUIDE Revised on 10.16.2014 Page 1 of 26 INSIDE: HealthInfoNet Help Desk Reference Guide Contacting HealthInfoNet (HIN) Determining Priority How to Reach HIN Account Management
More informationD3 TECHNOLOGIES SPAM FILTER
D3 TECHNOLOGIES SPAM FILTER The D3 Technologies spam filtering provides virus, attachment, and spam filtering services for email. We check all emails for viruses and malicious content, since we feel these
More informationM&T BANK CANADIAN PRIVACY POLICY
M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (
More informationSTAAR Assessment Management System User s Guide. STAAR Grades 3 8 and End-of-Course Assessments
STAAR Assessment Management System User s Guide STAAR Grades 3 8 and End-of-Course Assessments March 2, 2016 Student Assessment Division Texas Education Agency 1701 N. Congress Avenue Austin, TX 78701-1494
More informationInternet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
More informationTerms and Conditions of Use - Connectivity to MAGNET
I, as the Client, declare to have read and accepted the terms and conditions set out below for the use of the network connectivity to the Malta Government Network (MAGNET) provided by the Malta Information
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationBank of Wisconsin Dells Personal Online Banking Agreement and Disclosures (01/2016)
Bank of Wisconsin Dells Personal Online Banking Agreement and Disclosures (01/2016) 1. Coverage. This Agreement applies to your use of the Bank of Wisconsin Dells Online Banking Service which permits you
More informationPolicy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
More informationCentury Commons' Internet Use
Century Commons' Internet Use Please Note: Even though you are unable to access the Internet, the sites below are always available. Open up Internet Explorer and type any of these in your address bar to
More informationThe Basics of HIPAA Privacy and Security and HITECH
The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is
More informationPOLICIES AND REGULATIONS Policy #78
Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use
More informationOnline Banking Fraud Prevention Recommendations and Best Practices
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know
More informationHow To Protect Your Privacy On Coolcampuschallenge.Org
COOL CAMPUS CHALLENGE 2015 I. OFFICIAL RULES 1. Description: The Cool Campus Challenge is an online learning experience and competition between University of California campuses. The goal of this website
More informationInstruction. Neoga Community Unit School District #3 Page 1 of 5
Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each
More informationAPHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
More information