State of Ohio IT Policy
|
|
|
- Thomas McDowell
- 10 years ago
- Views:
Transcription
1 Ohio Office of Information Technology Ted Strickland, Governor R. Steve Edmonson, Director / State Chief Information Officer Statewide IT Policy Investment and Governance Division 30 East Broad Street, 39 th Floor Columbus, Ohio tel fax State of Ohio IT Policy Use of State Telephones No: Effective: ITP-H.2 12/01/2004 Issued By: Gregory S. Jackson Director, Office of Information Technology State Chief Information Officer Published By: Statewide IT Policy Investment and Governance Division Original Publication Date: 12/07/ Purpose This state policy provides requirements regarding the use of wired and wireless state telephone service. 2.0 Scope Pursuant to Ohio IT Policy ITP-A.1, Authority of the State Chief Information Officer to Establish Policy Regarding the Acquisition and Use of Computer and Telecommunications Products and Services, this state policy applies to every organized body, office, or agency established by the laws of the state for the exercise of any function of state government except for those specifically exempted. The scope of this information technology policy includes state computer and telecommunications systems and the employees, contractors, temporary personnel and other agents of the state who use and administer such systems. 3.0 Background The State of Ohio offers telephone services to employees, contractors, temporary personnel and other agents of the state to facilitate communication in the course of performing state business. In addition to traditional wired telephones, wireless telephones are increasingly being used by state employees in emergency situations and when their job responsibilities regularly require them to go from job site to job site. Usage costs for wireless telephone services are typically higher than for wired telephone services, and wireless telephone services are subject to a higher risk of fraud. Hence, there is a higher fiduciary responsibility to oversee and regulate wireless telephone services. An Equal Opportunity Employer and Provider of ADA Services
2 4.0 References 5.0 Policy 4.1 Ohio IT Policy ITP-A.1, Authority of the State Chief Information Officer to Establish Policy Regarding the Acquisition and Use of Computer and Telecommunications Products and Services, defines the authority of the state chief information officer to establish State of Ohio IT policies as they relate to state agencies acquisition and use of information technology, including, but not limited to, hardware, software, technology services and security. 4.2 Ohio IT Policy ITP H.6, Telecommunications Utility Services, provides additional details on the procedures for the submission and review of requests for telecommunications utility services. 4.3 A glossary of terms found in this policy is located in section 8.0 Definitions. The first occurrence of a defined term is in bold italics. Each agency is responsible for the effective, efficient and responsible use of stateacquired telephone services. At a minimum, agencies shall implement the following requirements regarding state telephone services: 5.1 Limitations on Personal Calls. Personal calls made using state wired or wireless telephone services shall comply with the following minimum requirements: When using a state wireless telephone service, personal calls made or received are only acceptable in emergency situations when wired telephone service is not available When using a state wired telephone service, the number, frequency and duration of personal calls shall be kept to a minimum and, whenever possible, made during lunch hours or authorized breaks Personal long distance calls made using the state s wired telephone service are only acceptable if charged to a personal credit card or personal telephone card, or if billed to a non-state third party number In the case of an emergency, personal long distance calls may be made using the state s wired telephone service and charged to the state. However, the charge for the call shall be reimbursed in accordance with the requirements outlined in section 5.4 of this policy Personal business, which involves an activity undertaken for profit or gain of any kind, shall not be conducted using a state telephone service. ITP-H.2 Page 2 of 6
3 Employees are prohibited from circulating their state telephone number as a telephone number at which they can be reached for personal business. Personal business cards and other such materials shall not have a state telephone number listed as a contact number Agencies may at their discretion prohibit the use of any state telephone services to receive or originate personal calls. 5.2 Prohibited Calls. The following types of calls are prohibited if not related to official state business: Pay per call numbers Collect calls to state telephone services Calls billed to state telephone services 5.3 Penalties. Violation of this policy may result in disciplinary action and may be a cause for termination. 5.4 Management and Reimbursement for State Telephone Services. Agencies shall meet the following minimum management and reimbursement requirements: State agencies shall establish and document a management review process for employee usage of telephone services to maintain agency standards of reasonable use, detect instances of abuse of privilege, and verify that required reimbursements have occurred Personal long distance calls made using the state s wired telephone services and all personal wireless telephone calls made and received using the state s wireless telephone services are the financial responsibility of the employee, unless it can reasonably be concluded that the calls are the result of cloning or other fraudulent use of the service by someone other than the employee State agencies shall establish and document a reimbursement procedure for how employees reimburse the state for personal long distance calls and personal use of state wireless telephone services. At a minimum, the reimbursement shall cover the actual cost of the use Agencies shall maintain a record of all reimbursements made to the State of Ohio for personal long distance calls and personal use of state wireless telephone services for a period of time consistent with the applicable records retention schedule. 5.5 Evaluation and Acquisition of Wireless Telephone Service. State agencies shall determine the wireless telephone service required for each individual or group of individuals identified to be issued a wireless telephone Agencies shall consider at a minimum the following criteria for each group or individual for whom a state wireless telephone service is purchased: How the wireless telephone will be used. ITP-H.2 Page 3 of 6
4 Number of minutes required per month Desired coverage area When the wireless telephone will be used (e.g. weekdays, evenings, weekends, etc.) If there is a need for data transmission including faxing Agencies shall acquire state wireless telephone service in accordance with Ohio IT Policy ITP-H.6, Telecommunications Utility Services, and select the most cost-effective plan that meets the criteria identified. 5.6 Authorization of State Wireless Telephone Services and Issuing Wireless Telephones. Each agency shall develop guidelines for the authorization and allocation of state wireless telephone services and a process for tracking the custody of wireless telephones issued to its employees. At a minimum, agency guidelines shall include the following: 6.0 Procedures None The job responsibilities for which the use of a state wireless telephone service is required The factors that determine whether a wireless telephone is to be shared by a group of employees The factors that determine whether a wireless telephone is to be issued to an individual employee The methodology for how group and individual wireless telephones are issued The use of shared wireless telephones, when practical, is preferable to issuing individual wireless telephones. If a wireless telephone is shared, a log shall be maintained to track the responsible user and the dates and times the wireless telephone was checked out and checked in Each state employee assigned a wireless telephone shall be given a copy of Ohio IT Policy ITP-H.2, Use of State Telephones, along with any associated agency guidelines developed to provide additional details or restrictions. ITP-H.2 Page 4 of 6
5 7.0 Revision History Date Description of Change 12/07/1992 Original policy. 12/01/2004 This policy replaces all previously released memoranda and specifically obsoletes Ohio IT Policy ITP H.2, Personal Use of State Telephones, issued March 14, Policy revisions reflect substantive changes in policy and procedure. 12/01/09 Scheduled policy review. 8.0 Definitions 8.1 Cloning. The fraudulent practice of illegally monitoring radio wave transmissions from the wireless telephones of legitimate subscribers to obtain the electronic serial number and telephone number of the wireless telephone. A cloned wireless telephone is then programmed with the legitimate electronic serial number and telephone number. The result of cloning is that the legitimate user is billed for the fraudulent user s wireless telephone calls. 8.2 Telephone Service. Unless otherwise stated, telephone service includes both wired telephones and wireless telephones. 8.3 Wired. Traditional landline local and long distance telephone service. 8.4 Wireless. Use of various electromagnetic spectrum frequencies, such as radio and infrared, to communicate services, such as data and voice, without relying on a hardwired connection, such as twisted pair, coaxial or fiber optic cable. 9.0 Related Resources Document Name None Inquiries For information regarding telephone systems and services contact: Network Services Program Administrator Ohio Office of Information Technology 1320 Arthur E. Adams Drive Columbus, Ohio Telephone: Facsimile: [email protected] ITP-H.2 Page 5 of 6
6 Direct inquiries about this policy to: 11.0 Attachments None. Statewide IT Policy Investment and Governance Division Ohio Office of Information Technology 30 E. Broad Street, 39 th Floor Columbus, Ohio Telephone: Facsimile: Ohio IT Policy can be found on the Internet at: ITP-H.2 Page 6 of 6
STATE OF OHIO I. AUTHORITY
STATE OF OHIO SUBJECT: PAGE 1 OF 8. Telecommunication Services SECTION: 05-OIT-12 RULE/CODE REFERENCE: SUPERSEDES: Ohio IT Policy ITP H.2 05-OIT-12 dated 08/19/14 RELATED ACA STANDARDS: EFFECTIVE DATE:
Ohio Supercomputer Center
Ohio Supercomputer Center Portable Security Computing No: Effective: OSC-09 05/27/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
Ohio Supercomputer Center
Ohio Supercomputer Center Security Education and Awareness No: Effective: OSC-6 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
ACCOUNTING POLICY AND PROCEDURES (APP) MANUAL. TOPIC: Section 10 Special Expense 8.0 EFFECTIVE DATE: 07/26/1993
STATE OF WISCONSIN DEPARTMENT OF HEALTH SERVICES DIVISION OF ENTERPRISE SERVICES BUREAU OF FISCAL SERVICES ACCOUNTING POLICY AND PROCEDURES (APP) MANUAL TOPIC: Section 10 Special Expense 8.0 EFFECTIVE
1.0 PURPOSE AND SCOPE... 1 2.0 RESPONSIBILITIES... 1 3.0 DEFINITIONS... 1 4.0 PROCEDURE... 2 5.0 REFERENCES... 4 6.0 APPROVALS...
Procedure No. C-02 Assignment and Usage of Telephones Index 1.0 PURPOSE AND SCOPE... 1 2.0 RESPONSIBILITIES... 1 2.1 CHIEF FINANCIAL OFFICER... 1 2.2 DIVISIONAL VICE PRESIDENTS AND DEPARTMENT HEADS...
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
MAINE REVENUE SERVICES SALES, FUEL & SPECIAL TAX DIVISION SERVICE PROVIDER TAX INSTRUCTIONAL BULLETIN 55
MAINE REVENUE SERVICES SALES, FUEL & SPECIAL TAX DIVISION SERVICE PROVIDER TAX INSTRUCTIONAL BULLETIN 55 Service Provider Tax This bulletin is intended solely as advice to assist persons in determining
CITY OF SALINE CELL PHONE POLICY
CITY OF SALINE CELL PHONE POLICY Purpose The City of Saline acknowledges that to provide efficient services to its citizens some of its employees must be available either 24x7 or while they are away from
Computers Are Your Future. 2006 Prentice-Hall, Inc.
Computers Are Your Future 2006 Prentice-Hall, Inc. Computers Are Your Future Chapter 3 Wired and Wireless Communication 2006 Prentice-Hall, Inc Slide 2 What You Will Learn... ü The definition of bandwidth
Department of Veterans Affairs VA DIRECTIVE 6001 LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY
Department of Veterans Affairs VA DIRECTIVE 6001 Washington, DC 20420 Transmittal Sheet July 28, 2000 LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY 1. REASON FOR
Policies of the University of North Texas
Policies of the University of North Texas 8.5 Use of University Non-Wireless and Wireless Telephones, Telephone Lines, Fax Machines and Personal Computing Devices Chapter 14 Chapter Name Information Technology
University of Georgia Telecommunications Policy for Wireless Devices/Cellular Telephones, Long Distance Usage, and Home/Off Campus Internet Access
University of Georgia Telecommunications Policy for Wireless Devices/Cellular Telephones, Long Distance Usage, and Home/Off Campus Internet Access BACKGROUND OPB Policy Memorandum No. 4 (Revision 8) effective
COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION
COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION Answers to End-of-Chapter Questions Matching g 1. whiteboard i 2. sending device o 3. streaming j 4. WiFi m 5. Webcam d 6. data transfer
Online Banking Agreement and Disclosures
Online Banking Agreement and Disclosures This agreement states the terms and conditions that apply to your use of Online Banking services offered by Eastman Credit Union. Please read this agreement carefully.
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,
Telecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
GPS, Wi-Fi, and Cell Phone Jammers Frequently Asked Questions (FAQs)
Enforcement Bureau GPS, Wi-Fi, and Cell Phone Jammers Frequently Asked Questions (FAQs) GENERAL INFORMATION 1. What are jammers? 2. How do jammers work? 3. What laws prohibit the marketing, sale, and use
ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
SECURITIES TRADING AND INVESTMENT POLICY
STEWART INFORMATION SERVICES CORPORATION SECURITIES TRADING AND INVESTMENT POLICY I. PURPOSE AND SCOPE This Policy is intended to provide guidance to all Company Employees of Stewart Information Services
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Florida Agricultural & Mechanical University Board of Trustees Policy
Florida Agricultural & Mechanical University Board of Trustees Policy Board of Trustees Policy Number: Date of Adoption/Revision: September 13, 2007/ April 9, 2009 Subject Authority Applicability Telecommunications
July 2014 Page U-1 TABLE OF CONTENTS
July 2014 Page U-1 CHAPTER U TABLE OF CONTENTS U.1 Introduction U.2 2-Way Land Mobile Radios U.3 Satellite Communications Systems U.4 Caltrans Auxiliary Radio System (CARS) U.5 Wired, Wireless, Fiber Optic
The data can be transmitted through a variety of different communications platforms such as:
COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects
Other Review Dates: 15 July 2010, 20 October 2011
POLICY:- Policy Title: Mobile Telephone Policy File reference: F10/618-04 Date Policy was adopted by Council initially: 18 December 2008 Resolution Number: 404/08 Other Review Dates: 15 July 2010, 20 October
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
EECC694 - Shaaban. Transmission Channel
The Physical Layer: Data Transmission Basics Encode data as energy at the data (information) source and transmit the encoded energy using transmitter hardware: Possible Energy Forms: Electrical, light,
PHI Air Medical, L.L.C. Compliance Plan
Page No. 1 of 13 Introduction: The PHI Air Medical, L.L.C. is to be used by employees, contractors and vendors to get a high level understanding of the key regulatory requirements relating to our participation
PUBLIC UTILITY COMMISSION OF OREGON INTEROFFICE CORRESPONDENCE
PUBLIC UTILITY COMMISSION OF OREGON INTEROFFICE CORRESPONDENCE DATE: January 7, 2009 TO: FROM: SUBJECT: Bryan Conway Celeste Hari Competitive Providers Report to Legislature ORS 759.050(9) requires the
APHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Telephone Acceptable Use Policy (ISP05)
Telephone Acceptable Use Policy (ISP05) Issue Date: December 2014 Version 3 Document Control 3 1. Policy Statement 4 2. Introduction 4 3. Responsibilities 4 4. Breach of Policy 5 5. Service Standards:
DISTRICT OF COLUMBIA CELLULAR AND LANDLINE TELEPHONE USAGE POLICY
11/29/2012 PURPOSE DISTRICT OF COLUMBIA CELLULAR AND LANDLINE TELEPHONE USAGE POLICY This policy is intended to minimize the District of Columbia Government s costs for landline and cell phone equipment
13.19 ETHICS REPORTING POLICY AND PROCEDURE
13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment
STANDARDIZED SOFTWARE STANDARD BUILD STANDARD PROCEDURES
Approved: Shobna Varma Deputy Director Standard Procedure No.: 242-004 (SP) Responsible Office: Division of Information Technology STANDARDIZED SOFTWARE STANDARD BUILD STANDARD PROCEDURES PURPOSE: The
BILL ANALYSIS. Senate Research Center S.B. 20 By: Nelson Finance 3/9/2015 As Filed
BILL ANALYSIS Senate Research Center S.B. 20 By: Nelson Finance 3/9/2015 As Filed AUTHOR'S / SPONSOR'S STATEMENT OF INTENT The purpose of this bill is to reform state agency contracting by clarifying accountability,
BY COMPLETING THIS NEW BUSINESS APPLICATION YOU ARE APPLYING FOR COVERAGE WITH FEDERAL INSURANCE COMPANY OR VIGILANT INSURANCE COMPANY (THE COMPANY )
BY COMPLETING THIS NEW BUSINESS APPLICATION YOU ARE APPLYING FOR COVERAGE WITH FEDERAL INSURANCE COMPANY OR VIGILANT INSURANCE COMPANY (THE COMPANY ) NOTICE: PLEASE ANSWER ALL OF THE FOLLOWING INQUIRIES.
United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008
United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008 I. Introduction United Cerebral Palsy of Greater Chicago ( UCP ) recognizes that
TELEPHONE USAGE POLICY
TELEPHONE USAGE POLICY TABLE OF CONTENTS 1. PREAMBLE...4 2. PURPOSE...5 3. OBJECTIVES...5 4. SCOPE...5 5. LEGAL FRAMEWORK...6 6. TIMEFRAMES...6 7. DEFINITIONS...6 8. PRINCIPLES...7 9. ROLES AND RESPONSIBILITIES...8
HIPAA Employee Training Guide. Revision Date: April 11, 2015
HIPAA Employee Training Guide Revision Date: April 11, 2015 What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 (also known as Kennedy- Kassebaum Act ). HIPAA regulations address
PURCHASING CARD POLICY AND PROCEDURES
PURCHASING CARD POLICY AND PROCEDURES 1. PURPOSE To establish policies and procedures for procuring goods and/or services using a Purchasing Card. Purchasing Cards are referred to throughout this policy
MOBILE PHONE USAGE AND ADMINISTRATION
POLICY NO: 5.3.4 OBJECTIVE The purpose of this policy is to provide guidance and to govern the usage of mobile phones by employees of the City. Mobile phones are provided to ensure: POLICY STATEMENT access
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Sample Healthcare Compliance Program
P.O. Box 153 Shell, WY 82441 307-765-2241 (direct) 888-286-2095 (e-fax) [email protected] www.hcma-consulting.com Sample Healthcare Compliance Program 1. Introduction COMPANY is committed to establishing
Troy Cablevision, Inc. Subscriber Privacy Policy
Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. ( Troy Cable ) is committed to protecting and securely maintaining our customers privacy. The following privacy policy applies to
12.809 COURT ORDERS FOR TELEPHONE RECORDS
12.809 COURT ORDERS FOR TELEPHONE RECORDS References: United States Code (USC) 18USC2510-18USC2522, et al - Federal Wiretap Statutes 18USC2703 - Release of Subscriber Information to Law Enforcement under
CHAPTER 2016-46. Committee Substitute for Committee Substitute for Senate Bill No. 494
CHAPTER 2016-46 Committee Substitute for Committee Substitute for Senate Bill No. 494 An act relating to digital assets; providing a directive to the Division of Law Revision and Information; creating
CREDIT REPAIR ORGANIZATIONS ACT 15 U.S.C. 1679 et. seq.
CREDIT REPAIR ORGANIZATIONS ACT 15 U.S.C. 1679 et. seq. Please note that the information contained herein should not be construed as legal advice and is intended for informational purposes only. In addition,
CSH111 COMPANY-ISSUED CREDIT CARDS
SOP # CSH111 Revision: 1 Effective Date: 2/20/15 Prepared by: Central Office Approved by: BOD Title: Policy: CSH111 COMPANY-ISSUED CREDIT CARDS This policy supersedes any policy regarding the use of debit
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
NETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
Ohio Medicaid Program
Ohio Medicaid Program A Compliance Audit by the: Medicaid/Contract Audit Section September 2011 AOS/MCA-12-005C September 29, 2011 Michael Linville, LPN 4932 Lebanon Rd. South Lebanon, OH 45065 Dear Mr.
New Rules for Telemarketing and the National Do Not Call List Telecom Decision 2007-48. Important Implications for IIAC Members
New Rules for Telemarketing and the National Do Not Call List Telecom Decision 2007-48 Important Implications for IIAC Members What are the National Do Not Call Legislation and Unsolicited Telecommunications
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
RECORDS MANAGEMENT POLICY
RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations
JOINT CODE OF ETHICS FOR GOLUB CAPITAL BDC, INC. GOLUB CAPITAL INVESTMENT CORPORATION GC ADVISORS LLC
JOINT CODE OF ETHICS FOR GOLUB CAPITAL BDC, INC. GOLUB CAPITAL INVESTMENT CORPORATION GC ADVISORS LLC Section I Statement of General Fiduciary Principles This Joint Code of Ethics (the Code ) has been
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT
Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT I. Purpose This directive provides Department of Homeland
H-1290-3 - Telephone Communications
H-1290-3 - Telephone Communications Table of Contents Page CHAPTER I. Purpose of the Handbook I-1 CHAPTER II. Telephone Services and Equipment II-1 A. Local Service and Equipment II-1 1. New Installations
UGANDA COMMUNICATIONS COMMISSION
UGANDA COMMUNICATIONS COMMISSION GUIDELINES ON TYPE APPROVAL OF TELECOMMUNICATIONS AND RADIO COMMUNICATIONS EQUIPMENT IN UGANDA 1.0 INTRODUCTION The public radio and telecommunications networks have been
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
Company-wide Credit Card Policy
Company-wide Credit Card Policy Department: Corporate Finance Policy Number: CW-FIN-001-2008-11 Subject: Corporate Credit Cards Effective Date: 11/05/2008 Document Owner: Drew Hurt Title: Corporate Credit
(1) The term automatic telephone dialing system means equipment which has the capacity
Telephone Consumer Protection Act 47 U.S.C. 227 SEC. 227. [47 U.S.C. 227] RESTRICTIONS ON THE USE OF TELEPHONE EQUIPMENT (a) DEFINITIONS. As used in this section (1) The term automatic telephone dialing
The purpose of Mohawk College s Purchasing Card Policy ( policy ) is to:
Policy Number: CS-1002-2009 Policy Title: Purchasing Card Policy Policy Owner: Chief Financial Officer Effective Date: December 2, 2009 Revision Date: April 17, 2013 1. PURPOSE The purpose of Mohawk College
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
Wakefield Public Schools Technology Acceptable Use Policy
Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of
State of Ohio Administrative Policy
Ohio Department of Administrative Services John Kasich, Governor Robert Blair, Director State of Ohio Administrative Policy No: Effective: Motor Vehicle Fleet VF-02 July 13, 2015 Self-Insured Vehicle Liability
