Surveillance Equipment
|
|
|
- Winfred Paul
- 10 years ago
- Views:
Transcription
1 University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of Surveillance Equipment for the purpose of security. II. Scope This standard practice applies to all personnel, schools, and centers of the University in the use of surveillance equipment. This standard practice is not intended to cover the use of Web cams unless the Web cam is used for surveillance. III. Definitions Audio surveillance - Close observation or recording of a person, group, or an area relating to or used in the transmission or reception of sound. Campus Security Subcommitte A task group reporting through the campus Loss Control Committee to the VP for Finance and Operations. The mission of the subcommittee is to review security needs relating to University personnel, students, visitors, buildings and grounds, events, research, information, and operations; review and recommend policies regarding security, priorities, and standards; provide guidelines to assist departments in monitoring adherence to policies and procedures designed to prevent breaches of security; monitor new information regarding security materials from federal, state, local, and University regulations and disseminate as appropriate; review and recommend training regarding security policies and procedures; review incidents involving security breaches; make recommendations to the main committee. Criminal investigation An organized effort, typically conducted by a law enforcement agency, for the purposes of gathering information concerning criminal intent. Law enforcement purposes The broad term used to describe efforts of law enforcement agencies targeted at insuring obedience to the laws. Public areas Areas maintained for and used by people for which there is no expectation of privacy.
2 Record series A group of records/files having similar characteristics. Names are provided for the record series, and retention times and destruction methods are established. Surveillance - The careful watch or recording of persons, places, things, and/or areas for the purpose of obtaining information concerning the activities and identity of individuals. Surveillance equipment The implements used for the purposes of surveillance. Surveillance Equipment Request Form (240a) The document that must be filled out and submitted to the University Police when an individual or department wishes to have surveillance equipment installed and used in their facilities. Visual surveillance - Close observation or recording of a person, group, or area attained or maintained by sight. University s Record Retention Schedule - An approved policy that lists common record series found in university departments. It provides retention guidelines for the office of record and copy holders based on administrative, fiscal, historical, and legal value. It also provides guidance on the proper disposal methods for each record series after the approved retention period has been met. Webcams -A camera designed to take digital photographs and transmit them over the Internet or other network. IV. General Principles A. The purpose of surveillance equipment is to deter crime and to assist in protecting the property of the University community. As a general policy, only visual recordings will be utilized. The exception to this policy is the possible use of both audio and visual surveillance equipment in a criminal investigation. A criminal investigation will be done by the University Police Department (UPD) or other trained law enforcement unit when approved by the Chief of Police. B. Any diversion of security technologies and personnel for other purposes would undermine the acceptability of these resources and is therefore prohibited by this policy. C. Prior to purchasing or installing any surveillance equipment, a Surveillance Equipment Request Form (see attached form 240a) must be completed and submitted to the UPD. The Surveillance Equipment Request Form will initiate the request for surveillance equipment, and will be routed by the UPD through the approval process. The Surveillance Equipment Request Form is available online at D. The use of surveillance equipment for security purposes will be conducted in a professional, ethical, and legal manner. Personnel involved will be appropriately trained and supervised in the responsible use of this technology. Violation of the
3 use of surveillance equipment as outlined in this standard practice will result in disciplinary action consistent with the rules and regulations governing students and employees of the University. E. Information obtained through surveillance equipment will be used exclusively for security, law enforcement purposes, and enforcement of appropriate UND and North Dakota University System policies and procedures and is not intended for the enhancement of personal safety. F. The use of any surveillance equipment in public areas for security and law enforcement purposes will be conducted in a manner consistent with all existing University policies and legal requirements. G. The use of surveillance equipment for security and law enforcement purposes at the University is limited to uses that do not violate the reasonable expectations of privacy as defined by law. Surveillance equipment installed for security purposes will not be placed in such a manner that confidential or sensitive information is visible or recorded. H. Information obtained in violation of this standard practice may not be used in a disciplinary proceeding against a member of the University faculty, staff, or student body. I. All existing uses of surveillance equipment will be brought into compliance with this standard practice within twelve months of the approval of this standard practice. J. The UPD or their designee will post signage at appropriate locations. Signage will specify: VIDEO SURVEILLANCE ON PREMISES K. Data captured by surveillance equipment will be stored for a period not less than 7 days and not to exceed 30 days and will then be erased unless retained as part of a criminal investigation or court proceedings (criminal or civil), or other bona fide use as approved by the Campus Security Subcommittee. L. Portable hidden cameras with recording equipment will only be used for criminal investigation by trained law enforcement units with the approval of the Chief of the UPD or designee. M. Any data that is retained for investigations or proceedings as described in sections K and L of this standard practice will be held for the appropriate retention time in accordance with the University s Records Retention Schedule. The record series in which this data will be retained under will be determined by the nature of content, investigation, and/or processing.
4 V. Responsibilities A. The UPD has the responsibility for the following: 1. Receiving and processing Surveillance Equipment Request Forms through the established approval process. 2. Overseeing and coordinating the installation and use of surveillance equipment for security and law enforcement purposes at the University. All new installations will follow this standard practice and any supplemental operating procedures applicable to the installation. All existing surveillance equipment systems will be evaluated for compliance with this standard practice. 3. Disseminating information regarding the use of surveillance equipment and assisting other units in implementing this standard practice and supporting procedures. 4. Consulting with the UND Office of General Counsel to monitor new developments in the relevant law and in security industry practices to ensure that surveillance equipment use at the University is consistent with the highest standards and protections. B. The Campus Security Subcommittee has the responsibility for the following: 1. Establishing and maintaining this standard practice and any supplemental operating procedures. 2. Authorizing the use of surveillance equipment for security purposes at the University as described on Surveillance Equipment Request Forms. Campus Security Subcommittee approval not required for law enforcement purposes. C. Deans and Department Heads have the responsibility for the following: 1. Implementing this standard practice in their respective operations. 2. Coordinating specific duties relating to the daily operation and maintenance of surveillance systems installed in their departments as directed by the UPD or Security Subcommittee. 3. Providing the necessary financing for the proper installation, operation and maintenance of surveillance equipment present in their department. 4. Communicating any problems regarding the use of surveillance equipment to the UPD.
5 VI. Examples of use of surveillance equipment in public areas A. Legitimate security purposes include, but are not limited to, the following: 1. Protection of buildings and property - Building perimeter, entrances and exits, lobbies and corridors, receiving docks, special storage areas, laboratories, cashier locations, etc. 2. Monitoring of access control systems - Monitor and record restricted access transactions at entrances to buildings and other areas. 3. Verification of security alarms - Intrusion alarms, exit door controls, hold-up alarms, etc. 4. Criminal investigation - Robbery, burglary, and theft surveillance.
6 FORM 240a Surveillance Equipment Request Please Check One: New Request For Surveillance Equipment Change to Existing Surveillance Request Department Requesting Surveillance Equipment: Date: Building/Location for Equipment Installation: Room Number(s): Location within room: Departmental Contact: Phone: Reason for Surveillance Equipment Request: RETURN COMPLETED FORM TO UPD BOX 9035 FAX UPD/Security Committee use only below line Date Received by UPD: Received by: Date of design review by UPD Surveillance Equipment Coordinator: Signature: Design Approved Design Denied Design Tabled Date reviewed by Security Subcommittee: Signature of Security Subcommittee Chair: Approved Denied Tabled Date of final approval by UPD Surveillance Equipment Coordinator: Signature: Installation Approved Installation Denied Tabled
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version V.D. Closed Circuit Television Monitoring and Recording of Public Areas for Safety and Security Purposes (Source:
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related
Title of the Policy: Surveillance Policy
Title of the Policy: Surveillance Policy Functional Area: University Police Applies To: All Faculty and Staff Policy Reference(s): Number: Version 1.0 Date First Issued: March 15, 2016 Date Last Reviewed:
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
Camera Use. Policy Statement and Purpose. Table of Contents
Camera Use Policy Type: Administrative Responsible Office: VCU Police Department Initial Policy Approved: 12/04/2015 Current Revision Approved: New Policy Statement and Purpose VCU is committed to enhancing
NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises)
NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises) A. NMSU Entities requesting security cameras will be required to follow the procedures outlined below. 1. Justification
Stanford University Video Surveillance System Guidelines
Stanford University Video Surveillance System Guidelines Effective Date: May 1, 2014 Stanford University / Video Surveillance System Guidelines Page 1 Video Surveillance System Guidelines Statement All
MODESTO CITY SCHOOLS Administrative Regulation
MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized
CCTV Cameras Policy. Policy Guidelines
CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes
College of DuPage Information Technology. Information Security Plan
College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data
Security Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
Video surveillance policy (PUBLIC)
29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security
Mobile Devices Security Policy
Mobile Devices Security Policy 1.0 Policy Administration (for completion by Author) Document Title Mobile Devices Security Policy Document Category Policy ref. Status Policy Unique ref no. Issued by GSU
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
For the purpose of this chapter the following definitions shall apply:
CHAPTER 110. ALARM SYSTEMS GENERAL PROVISIONS Sec. 110.01. Definitions. Secs. 110.02 110.14. Reserved. Sec. 110.01. - Definitions. For the purpose of this chapter the following definitions shall apply:
Policy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
CITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
Information and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places
Information and Privacy Commissioner of Ontario Guidelines for the Use of Video Surveillance Cameras in Public Places Ann Cavoukian, Ph.D. Commissioner September 2007 Acknowledgements This publication
Guide for Non-Profit Housing Societies Security Guide Table of Contents
Guide for Non-Profit Housing Societies Security Guide Table of Contents Chapter 1 - General Security Guidelines Chapter 2 - Target hardening Chapter 3 - Security window bars Chapter 4 - Anti-Graffiti solutions
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools
Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of
5.00 Employee in relation to the university, includes a volunteer and a service provider.
PROTECTION OF PRIVACY POLICY University Policy No: GV0235 Classification: Governance Approving Authority: Board of Governors Effective Date: January 1, 2010 Supersedes: June 2008 Last Editorial Change:
Supply Chain Security Audit Tool - Warehousing/Distribution
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
DRAFT CITY/COUNTY OF, TENNESSEE POLICE ALARM ORDINANCE
DRAFT CITY/COUNTY OF, TENNESSEE POLICE ALARM ORDINANCE WHEREAS, the purpose of this ordinance, finds that excessive false alarms unduly burden the Police Department s limited law enforcement resources.
Encryption Security Standard
Virginia Commonwealth University Information Security Standard Title: Encryption Security Standard Scope: Approval February 22, 2012 This document provides the encryption requirements for all data generated,
Lawlink NSW: Guide to the Workplace Video Surveillance Act
Guide to the Workplace Video Surveillance Act A Guide to the Workplace Video Surveillance Act 1998 (NSW) Privacy NSW February 2002 CONTENTS The Workplace Video Surveillance Act 1998 Coverage of the Act
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
UMDNJ COMPLIANCE PLAN
UMDNJ COMPLIANCE PLAN INTRODUCTION...2 COMPLIANCE OVERSIGHT 3 COMPLIANCE COMMITTEE STRUCTURE...4 CHIEF COMPLIANCE OFFICER S RESPONSIBILITIES...5 RESEARCH COMPLIANCE.5 UNIT IMPLEMENTATION.6 COMPLIANCE POLICIES
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5
Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Winning Initiatives and Best Practices for Physical Security
Winning Initiatives and Best Practices for Physical Security Today s Presentation 1. Using a risk-based strategy for security 2. The balanced security approach 3. Concentric circles of protection concept
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO Contents Page Number 1. Introduction Page 2 2. Defining the Responsible Persons Page 2 3. Purpose and Principles
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
Administrative Procedure
Administrative Procedure Effective: 12/21/2012 Supersedes: N/A Page: 1 of 5 Subject: SECURITY ALARMS 1.0. PURPOSE: The purpose of this procedure is to coordinate and control the installation, monitoring,
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
UNIVERSITY OF MANITOBA POLICY CLOSED CIRCUIT TV (CCTV) MONITORING. Part I Reason for Policy
UNIVERSITY OF MANITOBA POLICY Policy: Effective Date: October 1, 2012 Revised Date: November 20, 2012 Review Date: October 1, 2022 Approving Body: Authority: Responsible Executive Officer: Delegate: Contact:
Rowan University Data Governance Policy
Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data
COBAR SHIRE COUNCIL FILE:P5-90
COBAR SHIRE COUNCIL WORKPLACE SURVEILLANCE POLICY FILE:P5-90 Table of Contents POLICY STATEMENT... 3 INTRODUCTION 3 POLICY RESPONSIBILITIES 4 DEFINITIONS.. 5 REASONS AND REQUIREMENTS FOR SURVEILLANCE...
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Utica College. Information Security Plan
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
Wellesley College Whistleblower Policy Adopted April 2009
Wellesley College Whistleblower Policy Adopted April 2009 1. General Wellesley College (the "College") requires all employees (including faculty) to observe high standards of business and personal ethics
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS 2014 I. Ethics (18%) This area assesses the candidate s ability to comply with ethical standards of private investigators regarding privacy rights, confidentiality,
COMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
ADMINISTRATIVE PROCEDURES/REGULATIONS.
Policy: Video/Electronic Security Systems OPER-600 Division: Operations ADMINISTRATIVE PROCEDURES/REGULATIONS. 1. Approval 1.1 The relevant school administrator or manager must submit a Video Surveillance
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
221.01 PURPOSE AND GENERAL POLICY...221-1 221.02 DEFINITIONS...221-1. 221.03 ALARM PERMITS...221-1 (1) Permit Fees...221-2
TABLE OF CONTENTS ALARMS ORDINANCE 221.01 PURPOSE AND GENERAL POLICY...221-1 221.02 DEFINITIONS...221-1 221.03 ALARM PERMITS...221-1 (1) Permit Fees...221-2 221.04 CENTRAL ANSWERING STATION ALARM...221-2
CREDIT CARD SECURITY POLICY PCI DSS 2.0
Responsible University Official: University Compliance Officer Responsible Office: Business Office Reviewed Date: 10/29/2012 CREDIT CARD SECURITY POLICY PCI DSS 2.0 Introduction and Scope Introduction
Chapter 3.5 - ALARM SYSTEMS. Sec. 3.5-1. - Intent and purpose of chapter. Sec. 3.5-2. - Definitions. Page 1 FOOTNOTE(S):
Chapter 3.5 - ALARM SYSTEMS FOOTNOTE(S): --- (1) --- Editor's note Ord. of Dec. 28, 2010, repealed the former Ch. 3.5, 3.5-1 3.5-11, and enacted a new Ch. 3.5 as set out herein. The former Ch. 3.5 pertained
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS I. Introduction 2 II. Definitions 3 III. Program Oversight and Responsibilities 4 A. Structure B. Compliance Committee C.
Principles Concerning the Protection of Personal Data in the Workplace: Guidelines for Employee Monitoring *
1 Unofficial Translation Principles Concerning the Protection of Personal Data in the Workplace: Guidelines for Employee Monitoring * The Office for Personal Data Protection, September 2007 In accordance
Video surveillance at EFSA Implementing rules and technical specifications
Video surveillance at EFSA Implementing rules and technical specifications PUBLIC version 1 Introduction EFSA operates a video surveillance system (hereafter VSS) for the safety and security of its buildings,
Security Service de Services sécurité. Security Alarm Monitoring Protocol
Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings
Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010
Crime Location Crime Type Month Year Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop Theft April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop
Bring Your Own Device (BYOD) Usage and Network Access Guidelines. Rules and Requirements
Bring Your Own Device (BYOD) Usage and Network Access Guidelines Technology has become an essential part of education at Columbus County Schools. Students today have access to a wide variety of mobile
Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor
Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and
Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk
Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV
VIDEO SURVEILLANCE GUIDELINES
VIDEO SURVEILLANCE GUIDELINES Introduction Surveillance of public spaces has increased rapidly over recent years. This growth is largely attributed to the significant advances in surveillance technology
Information Security Policy
Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED
Banking and Financial Institutions (Physical Security Measures) THE BANKING AND FINANCIAL INSTITUTIONS (PHYSICAL SECURITY MEASURES) REGULATIONS, 2008
THE BANKING AND FINANCIAL INSTITUTIONS (PHYSICAL SECURITY MEASURES) REGULATIONS, 2008 ARRANGEMENT OF REGULATIONS Regulation Title PART I PRELIMINARY PROVISIONS 1. Short title 2. Application 3. Interpretation
View. Select View Managed Video Services ADT
monitoring Access Control Video Surveillance Intrusion Detection Fire & life safety Commercial Solutions ADT SM Select View Managed Video Services Leverage your existing investment in video surveillance
Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.
Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
BRANCH SECURITY REVIEW CHECKLIST
BRANCH: Date: Section 1 Physical Vulnerability 1. Do all office windows permit an unobstructed view of the bank s interior? 2. Are all exterior doors and windows equipped with tamper-resistant locks? 3.
Personal Information Protection Act (PIPA) Privacy & Landlord - Tenant Matters Frequently Asked Questions
Personal Information Protection Act (PIPA) Privacy & Landlord - Tenant Matters Frequently Asked Questions Are landlords in Alberta bound by privacy law? Yes. The Personal Information Protection Act (PIPA)
Network Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
Security Alarm Monitoring Protocol
Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice 1 Introduction 1.1 Buckinghamshire County Council (BCC) Transportation Service has Automatic Number Plate Recognition
Court Security Guidelines
July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative
WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM
BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade
ARTICLE 26 5/07/07 Annual Town Meeting Public Safety Chapter 9 Section 30
Section 1. Title and Purpose ARTICLE 26 5/07/07 Annual Town Meeting Public Safety Chapter 9 Section 30 TOWN OF LEICESTER, MASSACHUSETTS ALARM SYSTEM BY-LAW This by-law shall be known as the Alarm System
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 5 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: October 19, 2006 Contact for More Information: Chief Privacy Officer 1303 A West Campus
