Meopham School Information Technology Code of Conduct

Size: px
Start display at page:

Download "Meopham School Information Technology Code of Conduct"

Transcription

1 1. Intrductin Infrmatin technlgy resurces are essential fr accmplishing Mepham Schl s missin f pursuing excellence in teaching and learning, research and cmmunity service. Members f the Schl cmmunity are granted shared access t these resurces, which must be used and managed respnsibly t ensure their integrity, security and availability fr apprpriate educatinal and business activities. This Cde f Practice prvides guidance t authrised users fr the apprpriate use f the Schl's infrmatin technlgy resurces. Within this Cde f Practice, infrmatin technlgy resurces include all cmputers, electrnic cmmunicatin devices and sftware wned r leased by the Schl and netwrk facilities which link cmputers within the Schl and which prvide external access such as t Frnter and the Internet. This Cde f Practice applies irrespective f where the Schl s infrmatin technlgy resurces are accessed and used, and includes use at hme. The Cde f Practice applies t all users f the Schl's infrmatin technlgy resurces, including thse wh install, develp, maintain, administer and use thse systems and applicatins. This Cde f Practice is intended t perate within, and be cnsistent with, existing Gvernment laws and Schl legislatin and plicies in areas such as sexual harassment, discriminatin, equal pprtunity, freedm f infrmatin, cpyright, defamatin, discipline and miscnduct. It is intended t encurage respnsible actin and gd judgment and t prtect privacy. Sanctins will be enfrced if yu act irrespnsibly and disregard yur bligatins t ther users, r t the Schl as the prvider f infrmatin technlgy resurces. Inapprpriate use f Schl prvided infrmatin technlgy resurces may als result in suspensin, expulsin, terminatin f emplyment, legal actin, r ther disciplinary actin. 2. Yur respnsibilities It is yur respnsibility t becme familiar with the rules gverning use f the Schl's infrmatin technlgy resurces. Users wh are authrised t permit ther persns t use the Schl's infrmatin technlgy resurces must ensure that thse persns are made aware f the rules gverning use f the Schl's infrmatin technlgy resurces and have them sign r therwise acknwledge that they will carry ut their respnsibilities under these rules. Users learning f any vilatin f any f this Cde f Practice must bring this matter t the attentin f an apprpriate fficer (e.g. head, supervisr, teacher, and Infrmatin Services staff) within the Schl withut delay. 3. Authrised Access Yu may nly make use f equipment, netwrks r infrmatin fr which prper authrisatin has been given. In the case f staff, authrisatin must be btained frm the persn r unit respnsible fr the facility (e.g., Head f Schl/Office Directr r nminee). In the case f students, authrisatin ccurs autmatically upn enrlment at Mepham Schl. Yu are respnsible fr ensuring that yur passwrds, accunts, sftware and data are adequately secured. Yu will be held respnsible fr all activities, which riginate frm yur accunt. It is in everyne s interest that yu select a secure passwrd. Page 1

2 If yu knw r suspect that anther persn has gained unauthrised access t yur accunt, yu must ntify the IT Department. Yu must nt use any means, electrnic r therwise, t discver thers' passwrds. 4. Respnsible Use f Mepham Schl s Infrmatin Technlgy Resurces Internet, instant messaging and services can nly be used fr: Schl purpses Limited persnal use. Schl purpses include any activity that is cnducted fr purpses f accmplishing Schl business related t research, teaching and learning, curse f study, Schl administrative activities, and prfessinal develpment. Limited persnal use means use that is infrequent and brief. This use shuld generally ccur during persnal time and shuld nt include uses: that require substantial expenditure f time; that are fr private business, persnal gain r prfit; that supprt plitical campaigns, candidates, legislatin r ballt issues; that impede the efficiency f intranet, internet r services; that clg mailbxes with large numbers f messages; that waste Schl resurces, such as playing games; that wuld vilate r breach the Schl's Cde f Cnduct; that wuld vilate r breach any Gvernment legislatin; that wuld vilate r breach any Schl plicies, regulatins r harm the Schl's image r reputatin. As a guide, use that ccurs mre than a few times per day and/r perids lnger than a few minutes wuld nt be cnsidered limited persnal use. Yu shuld use Schl electrnic mailing lists fr Schl purpses nly. It is inapprpriate t: mass messages f a cmmercial, plitical, lbbying r fundraising nature; frward chain letters r electrnic "petitins", r t ask recipients t frward messages; send annymus mailings; slicit supprt (financial r therwise) fr charity, r special causes nt cnnected with a Mepham Schl effrt; send unverified public service annuncements (such as virus alerts, unsafe prducts, lst and fund, etc.). A message sent t a Schl electrnic mailing list must be relevant t the membership f the list. Yu shuld nt use instant messaging in the Schl. It is inapprpriate t: send mass instant messages f a cmmercial, plitical, lbbying r fundraising nature; frward instant messages r electrnic "petitins", r t ask recipients t frward messages; send annymus messages; slicit supprt (financial r therwise) fr charity, r special causes nt cnnected with a Mepham Schl effrt; send unverified public service annuncements (such as virus alerts, unsafe prducts, lst and fund, etc.). Page 2

3 send/uplad r receive/dwnlad fr printing and/r distributin any cpyrighted materials including with limitatin, music, mvies, phtgraphs, printed materials, r any ther prprietary r prtected infrmatin. Under n circumstance are yu allwed t cnnect any netwrk device t the Mepham Netwrk unless prir permissin is btained Netwrk Manager. Netwrk devices include but are nt limited t; hubs, switches, ruters, wireless access pints, netwrk appliances f any functin and any devices perfrming netwrk mnitring. Yu shuld nt use the Schl netwrk, whether at a Schl site r anther site including at hme, t access inapprpriate Internet sites. Inapprpriate Internet sites include but are nt limited t: sites that are illegal r hld illegal cntent; sites that are prngraphic r cntain inapprpriate sexual material; sites that advcate hate r vilence sites that ffer games r sftware that are unrelated t academic prgrams. Yu must nt dwnlad, distribute, stre r display ffensive r prngraphic graphics, images r statements r ther material btained frm inapprpriate Internet sites. Yu must nt dwnlad, distribute, stre r display material that culd cause ffence t thers, fr example ffensive material based n gender, ethnicity and plitical beliefs. Yu must nt attempt t "spf" i.e., cnstruct electrnic cmmunicatin s it appears t be frm smene else. Where yu are representing the views f the Schl, the cmmunicatin must identify yur psitin within the Schl. Where the view expressed is the fficial Schl view, the authrised surce and authr f that view shuld be identified. Yu must nt express views n behalf f the Schl withut fficial authrisatin t d s, r t allw anther persn t reasnably miscnstrue that a persnal view represents the fficial psitin f the Schl. In circumstances where readers might reasnably cnclude a persnal view is representative f the Schl, the user must clearly state that the pinin expressed is that f the writer, and nt necessarily that f the Schl, r wrds t that effect. The Schl lgs and designs are the prperty f the Schl and may nly be used fr apprved Schl dcuments. 5. Respect fr ther users f the Schl's infrmatin technlgy resurces Successful use f Schl infrmatin technlgy resurces depends upn a spirit f mutual respect and c peratin t ensure that everyne has equitable privileges, privacy and prtectin frm interference r harassment. T this end: Yu must respect the privacy f ther users and thus nt intentinally seek infrmatin n, btain cpies f, r mdify files, tapes, passwrds r any type f data belnging t ther users unless specifically authrised t d s. Yu must nt intentinally disrupt r damage the academic, research, administrative, r related pursuits f thers. Yu must nt use e mail, instant messaging, discussin frums (including wikis and blgs) r web pages under yur cntrl, t prvide r cmmunicate bscene materials, r that threatens, harasses, intimidates r singles ut individuals r grups fr Page 3

4 6. Privacy degradatin r harassment in vilatin f Gvernment law, and ther Schl plicies and regulatins. Yu must nt display n screens images, sunds r messages, which culd create an atmsphere f discmfrt r harassment t thers. Yu must nt knwingly create r prpagate a virus, wrm r any ther frm f malicius sftware. Yu must nt tamper with hardware cmpnents r hardware cnfiguratins withut the express permissin f the persn/s respnsible fr that particular item f equipment. This includes: wrkstatin, mnitr, keybard and muse; printers and ther peripherals; netwrk utlets, cabling and ther cmpnents; phnes any part f a lab r ther installatin used by the general ppulatin f the Schl. Yu must respect the integrity f the system and nt use Schl resurces t develp r execute prgrams that culd infiltrate the system, tamper with r attempt t subvert security prvisins, r damage r alter the sftware cmpnents f the system. This als applies t systems maintained by thers utside Mepham Schl that yu access electrnically r physically. The Schl netwrk, systems and facilities are the prperty f the Schl. Anything sent r received using the netwrk, systems and facilities f the Schl will therefre be transmitted and stred n Schl prperty. Accrdingly it is likely t be reviewed by the Schl. This applies whether yu use the Schl resurces at a Schl site, at hme, r any ther lcatin. The Schl therefre reserves the right t mnitr bth usage and cntent f messages, instant messages, discussin frums and visits t Internet sites using Schl resurces t: Identify inapprpriate use; Prtect system security; Maintain system perfrmance; Prtect the rights and prperty f the Schl; Determine cmpliance with plicy and Gvernment legislatin. The Schl als mnitrs and recrds netwrk traffic including: and internet sites accessed; usage data such as accunt names, surce and destinatin accunts and sites; dates and times f transmissin r access; size f transmitted material; ther usage related data. This infrmatin is used fr accunting purpses, trubleshting and systems management. The Schl reserves the right t inspect, cpy, stre and disclse the cntents f the electrnic cmmunicatins f its emplyees and ther authrised users (e.g. students), fr the purpses f identifying inapprpriate use, upn receiving a cmplaint, investigatin request r allegatin f misuse, and fllwing authrisatin frm apprpriate Schl managers, the Plice r ther law enfrcement agencies t assist in the investigatin f an ffence. The cntents f electrnic cmmunicatins, prperly btained fr legitimate business purpses, may be disclsed withut permissin f the emplyee r authrised user. Page 4

5 Mnitring and inspectin can apply t persnal and business use f intranet r internet services and persnal and business related messages. Yu shuld always assume that everything yu send by e mail, instant messaging, pst t a newsgrup r LISTSERV r pst via a web site is ttally public and might be read by peple ther than expected recipients. Any messages r instant messages whether persnal r business, may be accessed as dcuments under the Freedm f Infrmatin Act and may als be tendered in curt as evidence. Yu shuld always assume that any web site yu visit will at least knw the Internet address yu are cming frm and that the same is true fr that yu send. 7. Cpyright Cmpliance The Cpyright Act sets ut the exclusive rights f cpyright wners and the rights f users. In additin, certain uses may be cvered by licence agreements t which the Schl is party. It is illegal t place n a Web page any pictures r vides f peple withut the permissin f the peple in the picture r vide and/r the cpyright wner. Sftware prgrams are prtected by the Cpyright Act. Yu d nt have the right t make and distribute cpies f prgrams withut specific permissin f the cpyright hlder. 8. What happens if yu dn't act respnsibly? The Schl cnsiders any breach f yur respnsibilities t be a serius ffence and reserves the right t cpy and examine files r infrmatin resident n r transmitted via Schl infrmatin technlgy resurces. Students deemed t be in breach f the abve principles r guidelines are subject t disciplinary actin, which may include suspensin r exclusin. Staff deemed t be in breach f these principles r guidelines are subject t disciplinary actin available under industrial prvisins. Offenders may als be prsecuted under Gvernment and Internatinal laws. The Infrmatin Technlgy department may temprarily remve material frm web sites r clse any accunt that is endangering the running f the system r that is being reviewed fr inapprpriate r illegal use. Page 5

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5 Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 8 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk The Bard f Educatin recgnizes as new technlgies shift the manner in which infrmatin is

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

To clarify terms used within these policies, the following definitions are provided:

To clarify terms used within these policies, the following definitions are provided: Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services

Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services Erie Cmmunity Cllege Acceptable Use Plicy Last Revisin: December 17, 2009 Cllege Infrmatin Technlgy Services Erie Cmmunity Cllege Cllege Infrmatin Technlgy Services Acceptable Use Plicy Last Revisin:

More information

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

Information & Communications Technology ICT Security Compliance Guide (Student)

Information & Communications Technology ICT Security Compliance Guide (Student) Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0

More information

Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117

Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ 07644-2117 Cmputer Use Plicy Intrductin - In supprt f Felician Cllege's missin f teaching and public service, the Infrmatin Technlgy

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices This is being prvided t yu as a requirement f the privacy regulatins issued under the Health Insurance Prtability and Accuntability Act f 1996 (HIPAA). This ntice describes hw HROSM may use and disclse

More information

INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE

INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE Cunty f Orange Infrmatin Technlgy Usage Plicy 1 INTRODUCTION: The Cunty f Orange Infrmatin Technlgy (IT) Usage Plicy is the fundatin f the Cunty s infrmatin

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT 1 FERRIS STATE UNIVERSITY SCHOOL f NURSING CODE f CONDUCT The Schl f Nursing (SON) at Ferris State University uphlds the University Cde f Student Cnduct and the American Nurses Assciatin Cde f Ethics.

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information

POLICY INTERNET - ACCEPTABLE USE

POLICY INTERNET - ACCEPTABLE USE POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy

More information

Woodstock Multimedia, INC. Software/Hardware Usage Policy

Woodstock Multimedia, INC. Software/Hardware Usage Policy Wdstck Multimedia, INC. Sftware/Hardware Usage Plicy POLICY PURPOSE The purpse f the Wdstck Multimedia, INC. Sftware / Hardware Usage Plicy is t ensure that Wdstck Multimedia, INC. emplyees are prperly

More information

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

INTRODUCTION TO PORTAL GROUP STUDIO

INTRODUCTION TO PORTAL GROUP STUDIO Mntana State University Luminis Prtal Prject INTRODUCTION TO PORTAL GROUP STUDIO Grup Studi With the Grup Studi sftware, yu can request the creatin f nline grups fr clubs, affiliatins, r interests and

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only

DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM Fr 8 th 12 th Grade Students Only Student s Last Name Parent/Guardian Last Name Class First Name First Name Date Fr the first time this fall, students

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies Clrad Rapids Yuth Sccer Club Scial Media and Electrnic Cmmunicatin Plicies OVERVIEW Online, scial media and ther electrnic cmmunicatin tls such as text messaging have becme a prevalent and effective means

More information

Social Media Policy. Record Number D14/78. Director Business Support and Strategy Manager Customer and Communications. Responsible Manager

Social Media Policy. Record Number D14/78. Director Business Support and Strategy Manager Customer and Communications. Responsible Manager Scial Media Plicy Scial Media Plicy Recrd Number D14/78 Respnsible Manager Directr Business Supprt and Strategy Manager Custmer and Cmmunicatins Last reviewed 11 February 2014 Adptin reference Cuncil Reslutin

More information

Texas Woman's University University Policy Manual

Texas Woman's University University Policy Manual Texas Wman's University University Plicy Manual Plicy Name: Plicy Number: 6.06 Date Passed: July 2004 Health Insurance Prtability& Accuntability Act (HIPAA) Date Reviewed: September 2008 Next Review: September

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc. HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

Williamson County Board of Education Procedures and Guidelines

Williamson County Board of Education Procedures and Guidelines Williamsn Cunty Bard f Educatin Prcedures and Guidelines Effective Date: 6/21/10; 8/15/11; Page 1 f 7 PURPOSE Williamsn Cunty Schls prvides student and emplyee access t the Internet as a means t increase

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,

More information

Legal Issues Bulletin

Legal Issues Bulletin Legal Issues Bulletin N. 8 reviewed May 2015 Claims fr lss f r damage t persnal prperty and use f private mtr vehicles by staff, parents and students Legal Issues Bulletin 39 - Preparatin and use f accident

More information

The information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice.

The information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice. Privacy Plicy Terms f Service: The fllwing terms and cnditins gvern all use f the Rightwaywebhsting.cm website and all cntent, services and prducts available at r thrugh the website (taken tgether, the

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

Guidelines for Custodians

Guidelines for Custodians Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

ADMINISTRATIVE REGULATIONS TABLE OF CONTENTS

ADMINISTRATIVE REGULATIONS TABLE OF CONTENTS ADMINISTATIVE EGULATIONS TABLE OF CONTENTS 8000 INFOMATION TECHNOLOGY 8100 Intrductin and Gvernance 8200 Apprpriate Use 8300 Access 8400 Data Security 8500 Hardware and Sftware Supprt 8700 Electrnic Cmmunicatin

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

HCHS Student ipad User Agreement

HCHS Student ipad User Agreement HCHS Student ipad User Agreement Schl ipad Initiative Hancck Cunty High Schl has initiated a 1:1 ipad prgram fr students and teachers in an effrt t embrace 21st Century Skills. Students will be using ipads

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine Title: Identity Theft Prgram Effective Date: July 2009 NYU Langne Medical Center NYU Hspitals Center NYU Schl f Medicine POLICY It is the plicy f the NYU Langne Medical Center t educate and train staff

More information

KIK s GUIDE FOR LAW ENFORCEMENT

KIK s GUIDE FOR LAW ENFORCEMENT Thanks fr checking ut ur law enfrcement guide. Kik takes the safety f ur users very seriusly, and we hpe this guide will be a useful tl fr yu. It includes infrmatin abut ur app; the features and functins

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

Creating an Ethical Culture and Protecting Your Bottom Line:

Creating an Ethical Culture and Protecting Your Bottom Line: Creating an Ethical Culture and Prtecting Yur Bttm Line: Best Practices fr Crprate Cdes f Cnduct Nte: The infrmatin belw and all infrmatin n this website is nt meant t be taken as legal advice. Please

More information

Employees - recruitment, records and monitoring

Employees - recruitment, records and monitoring Emplyees - recruitment, recrds and mnitring This guidance has been prduced t help rganisatins cmply with the Data Prtectin Act (DPA) when recruiting and emplying wrkers. It is relevant t public sectr emplyers,

More information

Cyber Security: Simulation Platform

Cyber Security: Simulation Platform Service Overview The Symantec Cyber Security: Simulatin Platfrm is a Web hsted Service with immersive and hands-n access t cyber exercises fr ffensive (red team) events, inspired by real-life security

More information

Amazon Marketing Services Content Policies and Standards

Amazon Marketing Services Content Policies and Standards Amazn Marketing Services Cntent Plicies and Standards Cntents Intrductin... 2 Acceptance f Creative Assets... 2 General Creative Plicies... 3 Reprting Abuse... 3 Cnsequences fr Vilatins... 3 Image Guidelines...

More information

Information Bulletin PT 204/09.15

Information Bulletin PT 204/09.15 Infrmatin Bulletin PT 204/09.15 Operatr Accreditatin fr Limusine Services What is peratr accreditatin? The Transprt Operatins (Passenger Transprt) Act 1994 requires peratrs f public passenger services

More information

CMS Eligibility Requirements Checklist for MSSP ACO Participation

CMS Eligibility Requirements Checklist for MSSP ACO Participation ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Audit Cmmittee Charter St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Versin 2.0, 22 February 2016 Apprver Bard f Directrs St Andrew

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

RQ10.06 AACo Share Trading Policy

RQ10.06 AACo Share Trading Policy Australian Agricultural Cmpany Limited ACN 010 892 270 RQ10.06 AAC Share Trading Plicy Versin 5 This plicy was apprved by the Bard f Australian Agricultural Cmpany Limited n 15 December 2010. This plicy

More information

Public consultation paper

Public consultation paper Public cnsultatin paper Nvember 2012 Public cnsultatin n guidelines fr prfessinal indemnity insurance arrangements fr nurses and nurse practitiners. Please prvide feedback by email t: nmbafeedback@ahpra.gv.au

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

ICT Acceptable Use Policy

ICT Acceptable Use Policy ICT Acceptable Use Plicy Versin Number One Status Apprved Apprval Date: first versin 12 January 2015 Apprval date: current versin 12 January 2015 Respnsible fr plicy: Vice Principal Finance Respnsible

More information

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15 AMWA Chapter Subgrups n LinkedIn Guidance fr Subgrup Managers and Chapter Leaders, updated 2-12-15 1. Chapters may nt have an independent grup n LinkedIn, Facebk, r ther scial netwrking site. AMWA prvides

More information

HOUSE OF REPRESENTATIVES FINAL BILL ANALYSIS SUMMARY ANALYSIS

HOUSE OF REPRESENTATIVES FINAL BILL ANALYSIS SUMMARY ANALYSIS HOUSE OF REPRESENTATIVES FINAL BILL ANALYSIS BILL #: CS/CS/HB 197 FINAL HOUSE FLOOR ACTION: SPONSOR(S): COMPANION BILLS: Judiciary Cmmittee; Criminal Justice Subcmmittee; Metz and thers 113 Y s 0 N s CS/CS/SB

More information

TECHNOLOGY SERVICE AND SUPPORT POLICY

TECHNOLOGY SERVICE AND SUPPORT POLICY Respnsible Official: Directr f Technlgy Respnsible Office: Department f Technlgy Services and Supprt Next Review Date: July 2016 Website Address: https://myum.mc.edu/services/ir/plicies/public%20pl ices/techservicesupprtplicy.pdf

More information

ACCEPTABLE USE POLICY. Acceptable Use Policy

ACCEPTABLE USE POLICY. Acceptable Use Policy Acceptable Use Plicy Cntents 1. Hw this Acceptable Use Plicy Wrks... 3 2. Yur Obligatins... 3 3. Our Obligatins... 5 4. Indemnity... 6 5. Our Disclaimer... 6 6. Updating this Acceptable Use Plicy... 6

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

Draft for consultation

Draft for consultation Draft fr cnsultatin Draft Cde f Practice n discipline and grievance May 2008 Further infrmatin is available frm www.acas.rg.uk CONSULTATION ON REVISED ACAS CODE OF PRACTICE ON DISCIPLINE AND GRIEVANCE

More information

GOVERNORS PHARMACY HIPAA NOTICE OF PRIVACY PRACTICES For Your Protected Health Information

GOVERNORS PHARMACY HIPAA NOTICE OF PRIVACY PRACTICES For Your Protected Health Information GOVERNORS PHARMACY HIPAA NOTICE OF PRIVACY PRACTICES Fr Yur Prtected Health Infrmatin THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS

More information

Process of Setting up a New Merchant Account

Process of Setting up a New Merchant Account Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am

More information

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT Kentwd Plice Department 4742 Walma Ave SE Kentwd, Michigan 49512 (616) 698-6580 http://www.ci.kentwd.mi.us REPORTING IDENTITY THEFT If yu are the victim f identity theft and ne f the fllwing cnditins are

More information

2.1 All SHR Users are responsible for the security of SHR systems/applications, resources and information.

2.1 All SHR Users are responsible for the security of SHR systems/applications, resources and information. POLICY Number: 7311-25-004 Title: Saskatn Health Regin User Accunt Plicy Authrizatin [ ] President and CEO [X] Vice President, Finance and Crprate Services Surce: Directr, Infrmatin Technlgy Services Crss

More information

A Comparison of UK and Chinese Broking Regulation

A Comparison of UK and Chinese Broking Regulation A Cmparisn f UK and Chinese Brking Regulatin David Cupe Partner +44 (0)203 553 4884 david.cupe@ec3legal.cm The fllwing tables are a cmparisn f UK and Chinese brking regulatins including the Llyd s regulatins.

More information

E-LEARNING ONTARIO POLICY DOCUMENT

E-LEARNING ONTARIO POLICY DOCUMENT E-LEARNING ONTARIO POLICY DOCUMENT In additin t the Service Level Agreement (SLA), which is specific t each bard, each participating bard must abide by this plicy dcument. It cntains three sectins: A.

More information

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service. FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

Student Laptop User Agreement

Student Laptop User Agreement Student Laptp User Agreement The laptp The security and use f the laptp is the student s respnsibility. The student must cmply with all directins we give in relatin t the use f the laptp and prduce the

More information

UICCU Online Banking Customer Agreement

UICCU Online Banking Customer Agreement UICCU Online Banking Custmer Agreement I. Intrductin II. Accessing Yur UICCU Accunts Thrugh Online Banking III. Web Site Terms and Cnditins IV. Online Banking/Bill Paying Terms and Cnditins a. General

More information

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act

More information

Notice of Protection Provided by Utah Life and Health Insurance Guaranty Association

Notice of Protection Provided by Utah Life and Health Insurance Guaranty Association Ntice f Prtectin Prvided by Utah Life and Health Insurance Guaranty Assciatin This ntice prvides a brief summary f the Utah Life and Health Insurance Guaranty Assciatin ("the Assciatin") and the prtectin

More information

UBC Incident Response Plan V1.5

UBC Incident Response Plan V1.5 UBC Incident Respnse Plan V1.5 Cntents 1. Ratinale... 2 2. Objective... 2 3. Applicatin... 2 4. Reprting a Cmputer Security Incident... 2 5. Managing the Security Incident... 2 5.1. All Incidents... 2

More information

Internet Banking Agreement and Disclosure Statement

Internet Banking Agreement and Disclosure Statement Internet Banking Agreement and Disclsure Statement This agreement cntains the terms and cnditins that gvern accessing r using Internet Banking (NetTeller), Bill Payment Services, Mbile Banking and On Demand

More information

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions Maryland General Service (MGS) Area 29 Treatment Facilities Cmmittee (TFC) TFC Instructins Lve And Service Facility Presentatin t Patients We are frm Alchlics Annymus (AA), fr AA, and ur service is fr

More information

Privacy and Security Training Policy (PS.Pol.051)

Privacy and Security Training Policy (PS.Pol.051) Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider

More information

Privacy Policy. What personally identifying information is collected on or through the Frames Data Online Site?

Privacy Policy. What personally identifying information is collected on or through the Frames Data Online Site? Privacy Plicy Welcme t www.framesdata.cm! This site (the Frames Data Online Site ) is wned by Frames Data Inc. ("FDI" r we ), a subsidiary f Jbsn Medical Infrmatin LLC ("JMI") and its parent, Jbsn Healthcare

More information

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

For students to participate in BYOD please follow these two steps

For students to participate in BYOD please follow these two steps www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many

More information

10 th May 2010. Dear Peter, Re: Audit Quality in Australia: A Strategic Review

10 th May 2010. Dear Peter, Re: Audit Quality in Australia: A Strategic Review 10 th May 2010 Mr. Peter Levy Audit Quality Strategic Review Crpratins and Financial Services Divisin The Treasury Langtn Crescent PARKES ACT 2600 Dear Peter, Re: Audit Quality in Australia: A Strategic

More information