STATE OF OHIO I. AUTHORITY
|
|
|
- Arline Harvey
- 10 years ago
- Views:
Transcription
1 STATE OF OHIO SUBJECT: PAGE 1 OF 8. Telecommunication Services SECTION: 05-OIT-12 RULE/CODE REFERENCE: SUPERSEDES: Ohio IT Policy ITP H.2 05-OIT-12 dated 08/19/14 RELATED ACA STANDARDS: EFFECTIVE DATE: 4-APPFS-2A-15 May 4, 2015 DEPARTMENT OF REHABILITATION AND CORRECTION APPROVED: I. AUTHORITY This policy is issued in compliance with Ohio Revised Code , which delegates to the Director of the Department of Rehabilitation and Correction the authority to manage and direct the total operations of the Department and to establish such rules and regulations as the Director prescribes. II. PURPOSE The purpose of this policy is to provide direction to authorized users regarding the use of telecommunication services for business and personal use to include telephones, cellular telephones, text messaging, instant messaging, downloadable applications and telephone credit cards. III. APPLICABILITY This policy applies to all Department of Rehabilitation and Correction employees, contractors, volunteers, other external individuals, and inmates who are authorized users with access to Department telecommunication services. IV. DEFINITIONS Aircard An electronic device that can be plugged into a computer, usually a mobile computer, computer, to access the internet wirelessly. Application - A self-contained program or software designed to perform a specific purpose that, for the purposes of this policy, is downloaded by the device user to a cellular telephone or another electronic device. These programs or software are commonly referred to as apps. Authorized User - A DRC employee, contractor, intern, volunteer or other agent of the State who is authorized at a high technical level to administer and support / maintain state computing information technology systems and telecommunications technology systems or is authorized at an end user level, to have access to and use State computing information technology systems and telecommunications technology systems for business purposes on behalf of the State of Ohio. DRC 1361
2 SUBJECT: Telecommunication Services PAGE 2 OF 8. Cellular Telephone - Cellular/digital telephone service. Instant Messaging - The process of exchanging typed electronic messages instantly via the Internet or a cellular network, using a shared software application on a personal computer, cellular telephone or another mobile electronic device. This process is commonly referred to as IM. Mobile Hot Spot A portable electronic device that provides wireless internet access on many devices, such as laptops, smartphones, MP3 players, tablet computers, and portable gaming consoles. Unlike aircards, mobile hot spots allow multiple devices to connect to wireless Internet access at the same time. Mobile hot spots are also known as portable hotspots or portable hot spots. Record - Any item that is kept by the Department that: (1) is stored on a fixed medium, including and electronic or digital medium (2) is created, received, or sent under the jurisdiction of the Department and (3) documents the organization, functions, policies, decisions, procedures, operations, or other activities of the Department. Sensitive Data Records, information or data considered private, confidential or non-public, as prescribed by law, administrative rule or other legally binding authority that are restricted to a limited number of authorized DRC users for specialized business purposes and available only to non-drc entities pursuant to a formal request, review and approval process, such as a MOU. Personal identification data, including an individual s last name, first name or first initial, in combination with any of the following data elements, shall always constitute sensitive data: social security number, driver s license number, state identification card number, financial account number, credit card number or debit card number. Sensitive data must be protected with a high level of security from unauthorized access, use, storage or release. Telecommunication Services - Includes telephone utilities, long distance, and private line voice and data, wired and wireless telephones, VoIP, aircards mobile hot spots, text messaging, instant messaging and downloadable applications or any other telecommunications products or service. Telephone - Unless otherwise stated, telephone includes both wired and cellular telephones, as well as smartphones and other handheld devices with telephone capabilities. Text Messaging - The process of sending or receiving written text messages or multimedia messages, such as pictures or audio, using a cellular telephone or another mobile electronic device. This process is commonly referred to as texting. Voice Over Internet Protocol (VoIP) A technology that allows the delivery of voice communications digitally over the internet instead of analog telephone lines. Some VoIP systems also have desktop videoconferencing capability. Wired - Traditional landline local and long distance telephone service. Wireless - Use of various electromagnetic spectrum frequencies, such as radio and infrared, to communicate services, such as data and voice, without relying on a hardwired connection, such as twisted pair, coaxial or fiber optic cable.
3 SUBJECT: Telecommunication Services PAGE 3 OF 8. V. POLICY It is the policy of the Ohio Department of Rehabilitation and Correction to ensure that telecommunication services and equipment is used in an effective and efficient manner in the course of authorized users conducting official State business pursuant to the Ohio Department of Administrative Services, Office of Information Technology (DAS OIT) Policy ITP-H.2, Use of State Telephones. VI. PROCEDURES A. Authorized Access To Telephone Service and Equipment 1. State telecommunication services, including wired and cellular/wireless telephone service, aircards, mobile hot spots, text messaging, instant messaging, downloadable applications and VoIP shall only be used by authorized users to conduct official State business, except as otherwise noted in this policy. As a result, authorized users of State telecommunications services shall not: a. Send, communicate or transmit jokes, rumors, gossip, chain letters or any other nonbusiness related communications or content via State telecommunication services. b. Send, communicate or transmit abusive, harassing, threatening, menacing, discriminatory, pornographic, disrespectful, offensive or any other non-business related communication or content via State telecommunications services. c. Conduct any personal business, which involves an activity or endeavor undertaken for profit or gain of any kind, via State telecommunications services, to include, but not limited to: i. Distributing, transmitting, circulating, displaying or listing a State telephone number, State fax number, State address, State website uniform resource locator (URL) or any other State information, data or content for any personal business purposes, including personal business contacts. ii. Distributing, transmitting, circulating, displaying or listing any personal business information, data or content (e.g. personal business cards, personal business telephone numbers, personal business addresses, personal business letterheads, personal business URLs, personal business social networking sites, etc.) via State telecommunications services. 2. All requests for any new State telecommunication products or services, requests to modify existing service, or requests to cancel existing services shall be submitted to the Chief of the Bureau of Information and Technology Services (BITS) who shall review the request, take the appropriate action and respond accordingly. 3. Requests for the assignment of State cellular telephones, aircards or mobile hot spots by authorized users shall be completed and submitted through the chain of command to the appropriate Managing Officer or designee. A Telecommunications Equipment Justification Statement (DRC1287) shall accompany the request. The following criteria shall be considered as part of the submission process:
4 SUBJECT: Telecommunication Services PAGE 4 OF 8. a. The authorized user s primary job duties require that the authorized user be immediately accessible; b. The primary job duties of the authorized user require that the authorized user be in the field at least 50% of the time without access to a State wired telephone; c. The authorized user does not have other telecommunication services reasonably available during the majority of working hours. For example, an authorized user that spends at least 50% of their time in the field but are generally at an institution, or other Department office or facility with readily available telephones would not meet this criteria; or d. Other significant work related considerations that necessitate and justify the assignment of an individual cellular phone aircard or mobile hot spot. These considerations must be fully documented on the Telecommunications Equipment Justification Statement (DRC1287). 4. The Managing Officer or designee shall review and assess the request, the Telecommunications Equipment Justification Statement (DRC1287) and whether the authorized user meets the aforementioned criteria. The Managing Officer or designee shall approve or disapprove the request and, if the request is approved, the Managing Officer or designee shall submit a copy of the request and the Telecommunications Equipment Justification Statement (DRC1287) to the Chief of BITS or designee, who shall arrange for the acquisition of the device or services. 5. In situations where a group of authorized users do not meet the above criteria but still have a need for the use of a cellular telephones or mobile hot spots while performing their job duties, the appropriate Managing Officer or designee may request shared cellular phones or a mobile hot spot by submitting a written request and an approved Telecommunications Equipment Justification Statement (DRC1287) to the Chief of BITS or designee, who shall arrange for the acquisition of the device or services. In as much as strict accountability must be maintained for shared device, a supervisor designated by the Managing Officer or designee must maintain a written log to document and track use of the shared devices. The log shall include the dates and times when the device is checked out and checked in, the name of the authorized user checking the device out and checking the device in and the specific purpose for using the shared device. The tracking log shall be kept current and shall be maintained by the Managing Officer or designee s. 6. Inmates are prohibited from accessing or using any telecommunications services at the institution that are not specifically blocked from incoming and outgoing outside calls. The Managing Officer or his/her designee must approve all exceptions in writing. An original of the approval must be posted in plain view near the telephone that the inmate is using. Institutions equipped with call accounting systems shall closely monitor all telephone logs that are generated as a result of inmates using administrative telephones. B. Limitations on Use 1. Incoming collect telephone calls to a Department office are not permitted. 2. Calls to numbers are strictly prohibited. The Local Exchange Carrier through a Telecommunications Service Request (TSR) issued by the Telecommunications
5 SUBJECT: Telecommunication Services PAGE 5 OF 8. Coordinator at Operation Support Center shall block all 900 numbers on all Department lines, trunks and VoIP hardware and software. 3. A free application or app shall be downloaded to a State cellular telephone by an authorized user only when the app facilitates the efficient performance of State business. DRC shall not pay for any downloadable apps nor reimburse anyone for the purchase of or use of any apps downloaded to a State cellular telephone. In addition, in order to safeguard State data, an authorized user shall not upload any State business data, including any records or sensitive data, to an app. 4. Instant messaging, or IM, and text messaging, or texting, shall be used by an authorized user on a State cellular telephone only when the IM or texting facilitates the efficient performance of State business. As a result, messages generated via IM or via texting are property of the State of Ohio and are subject to all applicable DRC record and public record requirements pursuant to Department Policy 07-ORD-02, Public Records. In addition, the messages shall be retained pursuant to all applicable DRC retention schedules. 5. Messages generated via IM or texting shall not be used as the sole source / primary source for offender management / supervision documentation. Authorized users shall use only existing data documentation systems, such as DOTS, ORAS, FOT, OCSS, ecw, etc. as the sole source / primary source for all offender management / supervision documentation. 6. In order to safeguard State data, IM and texting shall not be used on a State cellular telephone or a non-state personal cellular telephone to generate, transmit or share any State business data, including records or sensitive data. 7. DRC shall not reimburse employees, contractors, volunteers or any other individuals for any IM or text message products or services or for any IM or text messages sent or received on a non-state personal cellular telephone. 8. DRC reserves the right to monitor, review and audit any IM or text messages sent or received on a State cellular telephone. 9. When using a State cellular/wireless telephone service, local-toll personal calls made or received are only acceptable in emergency situations when wired telephone service is not available. However, the employee shall reimburse the Department for all local-toll personal wireless/cellular calls made and received using State wireless telephone services. 10. When using a State wired telephone service, the number, frequency and duration of localtoll personal calls shall be kept to a minimum and, whenever possible, made during lunch hours or authorized breaks. 11. Personal long distance calls made using the State s wired telephone service are only acceptable if charged to a personal credit card or personal telephone card or if billed to a non-state third party number. In extremely limited emergency circumstances and with the approval of the immediate supervisor, personal long distance calls may be made using
6 SUBJECT: Telecommunication Services PAGE 6 OF 8. the Department s wired telephone service and charged to the Department. However, the employee must reimburse the agency for the actual cost for all such calls. If the charges for such calls can t be determined from the billing information or other documentation provided by the carrier, the employee shall pay for the personal calls at the rate of 10 cents per minute. C. Record Keeping and Reimbursement for Use 1. Outgoing personal long distance calls on State wired telephones, as approved above, and all personal cellular telephone calls made and received using State telecommunication services are the financial responsibility of the employee, unless it can be shown that calls are the result of cloning or other fraudulent use of the service by someone other than the employee. 2. Employees who were approved by their supervisor to make an emergency long-distance call on a wired telephone line shall contact the appropriate business office to determine the actual cost of the call and procedures for reimbursement. 3. The Department of Administrative Services provides all State agencies on the Centrex system with monthly toll call billing Statements. As State agency Centrex systems are discontinued and replaced with VoIP, monthly billing information will be generated by Cincinnati Bell, the third party telecommunications vendor responsible for statewide VoIP services. 4. Prison facilities shall maintain long distance toll call activity on their internal telecommunications systems. 5. The applicable business office shall be responsible for reviewing the monthly Centrex or VoIP billing Statements to ensure that long distance calls, other than to department offices, are properly charged to each State telephone. Likewise, institution business offices shall be provided monthly toll call activity reports from their PBX systems to be reviewed. 6. The monthly review shall consist of a random selection of at least ten telephone extensions from the monthly billing statements to screen the long distance telephone call activity. The review shall also include a screening of the separate business telephone lines billed directly to each respective business office (e.g., fax, computer modem, etc.). 7. The monthly review shall consist of the following screening criteria: a. Time of telephone call; b. Duration of telephone call; c. Location of telephone call; d. Cost of telephone call; e. Repetitiveness of telephone call. 8. Billing statement printouts with questionable long distance calling activity shall be forwarded to the employee assigned to the extension for certification. The employee shall review the activity and sign the printout. The printout shall then be forwarded to the
7 SUBJECT: Telecommunication Services PAGE 7 OF 8. employee s supervisor for review and verification. The employee s supervisor shall review the printout for unusual calling activity and, if necessary, make the appropriate follow-up with the employee. The supervisor shall then sign and return the printout to the business office. The printouts shall be filed and maintained in the business office until audited by the State and DRC internal audit staff. The review and certification process shall take no longer than 14 calendar days. 9. The billing statement for each State owned cellular telephone, provided by MOBI, the third party telecommunications vendor responsible for managing State agency cellular telephone services, must be reviewed as bills are received using the following procedure: a. Each person assigned a cellular telephone must review the bill and initial any personal calls made or received. b. Each person shall sign and date the bill, documenting the total charge for all personal calls made or received. c. At the end of each month, each person shall complete, sign and date the Monthly Cellular Phone Bill Review Form (DRC1912) and submit it to the applicable business office for review and processing. Failure to submit the form in a complete or timely manner can result in termination of the State owned cellular telephone account. d. Each person with personal calls shall reimburse the State following the procedures Stated below. e. A designated business office employee shall review the bill after all personal calls have been noted to ensure that personal cellular usage followed the guidelines in this policy. 10. The State shall be reimbursed at the current rate for any personal calls charged to the State. Reimbursement for cellular phone use shall be calculated by the Deputy Director of the Office of Administration, who shall advise all Department business offices of the current rate. A cashier's check or money order for the amount charged is to be made payable to the Treasurer of the State of Ohio and forwarded to the business office. Cash can be an appropriate form of payment when there is a cashier on site to appropriately secure the money. Reimbursement shall occur within 14 calendar days following receipt of the monthly agency telephone bill. D. Maintenance and Inventory of Equipment 1. All cellular phones are to be maintained on a written inventory. The inventory shall include the serial number of the phone, the assigned phone number, and the staff member to whom the phone is assigned. The inventory is to be current at all times. 2. The Bureau of Information and Technology Services shall maintain the inventory of all Operation Support Center cellular phones. The Managing Officer shall designate an individual responsible for maintaining the inventory in the institutions. A copy of all inventories shall also be updated annually in the first quarter of the Fiscal Year and sent to the Deputy Director of the Office of Administration and the Chief of BITS. 3. All employees shall be required to sign a receipt verifying the issuance and return of all telecommunications equipment via use of the Equipment Issue and Retrieval Documentation Form (DRC3143). These receipts shall be maintained by BITS.
8 SUBJECT: Telecommunication Services PAGE 8 OF A sign-out/sign-in sheet is to be used for all phones that are kept in the telecommunications office and loaned out on an as needed basis. 5. Staff should read the instructions and feature section of the information packet which comes with each cellular phone. 6. All Department staff members assigned any State telecommunications device (telephone, aircard, mobile hot spot, etc.) and Department staff members responsible for a shared State device shall maintain the equipment in good working order. If equipment is found to be defective, it is to be reported as soon as possible to the Bureau of Information and Technology Services. Any damage, loss, or breakage of phone equipment is to be reported to the employee s supervisor through an Incident Report form (DRC1000), with copies to the Bureau of Information and Technology Services. Staff shall not attempt to repair State phone equipment. Carelessness or negligence may result in reimbursement to the State by the employee. 7. When phones that are used for the sign-in/sign out procedure are returned and signed back in, they are to be placed back into the chargers for the next user. 8. In the event any State telecommunication devices are lost or stolen, the access for that particular device must be cancelled or stopped immediately. The staff member shall immediately notify the Bureau of Information and Technology Services of the loss or theft and an Incident Report (DRC1000) shall be completed. The police shall be called if a theft has occurred. Copies of police reports shall be attached to the Incident Report. 9. When an employee separates from State service, the employee s immediate supervisor is responsible for returning all telecommunications devices and equipment issued to the employee to the Bureau of Information and Technology Services upon separation from the Department. Supervisors are responsible to ensure that the equipment is collected or turned in prior to the employee s last workday. E. Penalties For Abuse/Misuse Any abuse or misuse of State telecommunications services, devices or equipment may result in disciplinary action and a suspension of the offending employee s approval to utilize said services, device or equipment. Related Department Forms: Incident Report Equipment Justification Form Monthly Cellular Phone Bill Review Equipment Issue and Retrieval Documentation Form DRC1000 DRC1287 DRC1912 DRC3143
State of Ohio IT Policy
Ohio Office of Information Technology Ted Strickland, Governor R. Steve Edmonson, Director / State Chief Information Officer Statewide IT Policy Investment and Governance Division 30 East Broad Street,
This policy applies to all DRC employees, contractors, volunteers, interns and other agents of the state.
STATE OF OHIO SUBJECT: PAGE 1 OF 9 DRC Sensitive Data Security Requirements NUMBER: 05-OIT-23 DEPARTMENT OF REHABILITATION AND CORRECTION RULE/CODE REFERENCE: RELATED ACA STANDARDS: SUPERSEDES: 05-OIT-23
O.R.C. 5120.01; 5120.22
STATE OF OHIO SUBJECT: PAGE 1 OF 7 Inventory, Donation, Transfer & Disposal of DRC IT Hardware & NUMBER: 05-OIT-21 Software RULE/CODE REFERENCE: O.R.C. 5120.01; 5120.22 SUPERSEDES: 05-OIT-21 dated 09/13/11
1.0 PURPOSE AND SCOPE... 1 2.0 RESPONSIBILITIES... 1 3.0 DEFINITIONS... 1 4.0 PROCEDURE... 2 5.0 REFERENCES... 4 6.0 APPROVALS...
Procedure No. C-02 Assignment and Usage of Telephones Index 1.0 PURPOSE AND SCOPE... 1 2.0 RESPONSIBILITIES... 1 2.1 CHIEF FINANCIAL OFFICER... 1 2.2 DIVISIONAL VICE PRESIDENTS AND DEPARTMENT HEADS...
ACCOUNTING POLICY AND PROCEDURES (APP) MANUAL. TOPIC: Section 10 Special Expense 8.0 EFFECTIVE DATE: 07/26/1993
STATE OF WISCONSIN DEPARTMENT OF HEALTH SERVICES DIVISION OF ENTERPRISE SERVICES BUREAU OF FISCAL SERVICES ACCOUNTING POLICY AND PROCEDURES (APP) MANUAL TOPIC: Section 10 Special Expense 8.0 EFFECTIVE
STATE OF OHIO DEPARTMENT OF REHABILITATION AND CORRECTION I. AUTHORITY
STATE OF OHIO SUBJECT: Certificate of Achievement and PAGE: 1 of 6 Employability NUMBER: 02-REN-05 RULE/CODE REFERENCE: SUPERSEDES: HB 86 02-REN-05 dated 12/01/11 DEPARTMENT OF REHABILITATION AND CORRECTION
POLICY STATEMENT. Agency Cell Phones. Court Services and Offender Supervision Agency for the District of Columbia I. COVERAGE
Court Services and Offender Supervision Agency for the District of Columbia POLICY STATEMENT Agency Cell Phones I. COVERAGE This Policy Statement and its appended procedures apply to all Court Services
Ohio Supercomputer Center
Ohio Supercomputer Center Portable Security Computing No: Effective: OSC-09 05/27/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
BUSINESS ONLINE BANKING AGREEMENT
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
DISTRICT OF COLUMBIA CELLULAR AND LANDLINE TELEPHONE USAGE POLICY
11/29/2012 PURPOSE DISTRICT OF COLUMBIA CELLULAR AND LANDLINE TELEPHONE USAGE POLICY This policy is intended to minimize the District of Columbia Government s costs for landline and cell phone equipment
MS 760 Overseas Imprest Management
MS 760 Overseas Imprest Management Effective Date: January 7, 2013 Responsible Office: Office of Chief Financial Officer Supersedes: 5/15/84 V.2; MS 731 Issuance Memo Issuance Memo 01/07/2013 Table of
South Texas College Cellular Telephone Use Guidelines
South Texas College Cellular Telephone Use Guidelines Purpose The purpose of this document is to provide uniform guidelines to College employees regarding the acquisition, use, and payment of College owned
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
University of Georgia Telecommunications Policy for Wireless Devices/Cellular Telephones, Long Distance Usage, and Home/Off Campus Internet Access
University of Georgia Telecommunications Policy for Wireless Devices/Cellular Telephones, Long Distance Usage, and Home/Off Campus Internet Access BACKGROUND OPB Policy Memorandum No. 4 (Revision 8) effective
Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
INSTRUCTION: Instructional Services
INSTRUCTION: Instructional Services Technology Acceptable use Policy (TAUP) for Students I. Purpose Baltimore County Public Schools (BCPS) offers a wide array of technology resources for student use. These
Corporate Mobile Policy Template
Updated July 2011 Three major changes have occurred over the past 18 months that require updates to your organization s mobile policy. These changes include widespread adoption of tablet devices, changes
Policies Middletown Public Schools Employee Telecommunications Equipment and Use Policy EMPLOYEES TELECOMMUNICATIONS EQUIPMENT AND USE POLICY
Policies Middletown Public Schools Employee Telecommunications Equipment and Use Policy No. EMPLOYEES TELECOMMUNICATIONS EQUIPMENT AND USE POLICY The Middletown Public Schools recognizes that the use of
CITY OF SALINE CELL PHONE POLICY
CITY OF SALINE CELL PHONE POLICY Purpose The City of Saline acknowledges that to provide efficient services to its citizens some of its employees must be available either 24x7 or while they are away from
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
STATE OF OHIO I. AUTHORITY
STATE OF OHIO SUBJECT: PAGE 1 OF 5. Travel Policy NUMBER: 22-BUS-04 RULE/CODE REFERENCE: SUPERSEDES: OAC 126-1-02 22-BUS-04 dated 12/12/13 RELATED ACA STANDARDS: EFFECTIVE DATE: 4-4066; 4-4094; 4-4197;
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
12.809 COURT ORDERS FOR TELEPHONE RECORDS
12.809 COURT ORDERS FOR TELEPHONE RECORDS References: United States Code (USC) 18USC2510-18USC2522, et al - Federal Wiretap Statutes 18USC2703 - Release of Subscriber Information to Law Enforcement under
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes
FLORIDA DEPARTMENT OF JUVENILE JUSTICE PROCEDURE
PROCEDURE Title: Telecommunications Procedures Related Policy: FDJJ 1309 I. DEFINITIONS Authorization Number The 13-digit agency identification number used on a Customer Service Authorization (CSA) to
DCCCD BUSINESS PROCEDURES MANUAL. Revision Log. All 07/24/12 07/26/12 07/26/12 Entire section was revised to reflect current practices.
38.1.0 Guidelines for Mobile Phone and Stipends P a g e 3 Revision Log Sub-Section Revision Start Revision End Date Posted Summary of Changes All 07/24/12 07/26/12 07/26/12 Entire section was revised to
Strathfield Girls High School Bring your Own Device User Charter
Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.
University System Office Telecommunications Policy for Wireless Devices and Long Distance Usage
University System Office Telecommunications Policy for Wireless Devices and Long Distance Usage 1.1 Wireless Communications Devices General Guidelines It is the responsibility of the University System
Sydney Technical High School
Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of
Wakefield Public Schools Technology Acceptable Use Policy
Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of
Dracut Public Schools Technology Acceptable Use Policy Revised 2014
1 Dracut Public Schools Technology Acceptable Use Policy Revised 2014 The Dracut Public Schools (DPS) encourages the use of information technology to assist staff and students with academic success, preparation
DCCCD BUSINESS PROCEDURES MANUAL. Revision Log. All 07/24/12 07/26/12 07/26/12 Entire section was revised to reflect current practices.
38.0.0 Overview for Mobile and Internet Stipends P a g e 1 Log Sub-Section Start End Date Posted Summary of Changes All 07/24/12 07/26/12 07/26/12 Entire section was revised to reflect current practices.
13.19 ETHICS REPORTING POLICY AND PROCEDURE
13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
How To Manage A 9-1-1 Service In Texas
INTERLOCAL AGREEMENT FOR E9-1-1 PUBLIC SAFETY ANSWERING POINT SERVICES Article 1: Parties & Purpose 1.1 The Houston-Galveston Area Council (RPC) is a regional planning commission and political subdivision
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
Mobile Device Usage Policy
Mobile Device Usage Policy Version 1.0 1. Introduction...2 2. Responsibilities...2 Line Manager Responsibilities...2 3. Administration and Support of Mobile Devices...3 4. Personal Usage Monitoring...4
GEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures IVJ01-0001. Authority: Effective Date: Page 1 of Wetherington/Ferrero 12/31/01 12
GEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures Functional Area: Office of Information Technology Subject: Technology Policies & Procedures Revises Previous Authority: Page 1 of Wetherington/Ferrero
Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
1. STATEMENT OF POLICY:
LOYOLA MARYMOUNT UNIVERSITY POLICIES AND PROCEDURES MANUAL DEPARTMENT: CONTROLLER S OFFICE SUBJECT: UNIVERSITY PURCHASING CARD (P-CARD) POLICY Page 1 of 6 Policy Number: B&F Supersedes: April 2005 Effective
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
Information Technology Services Guidelines
Page 1 of 10 Table of Contents 1. Purpose... 2 2. Entities Affected by This Guideline... 2 3. Definitions... 2 4. Guidelines... 3 4.1 Requesting Data Center or... 3 4.2 Requirements for Data Center or...
U.S. DEPARTMENT OF TRANSPORTATION FEDERAL AVIATION ADMINISTRATION National Policy
U.S. DEPARTMENT OF TRANSPORTATION FEDERAL AVIATION ADMINISTRATION National Policy Order 1830.9 A 09/18/2009 SUBJ; Cellular/Satellite Device Acquisition and Management 1. Purpose of this order. The Federal
Ohio Supercomputer Center
Ohio Supercomputer Center Security Education and Awareness No: Effective: OSC-6 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
MOBILE TELEPHONES POLICY & GUIDELINES
MOBILE TELEPHONES POLICY & GUIDELINES 1 PURPOSE The purpose of this policy is to: Implement a uniform and consistent approach to providing mobile telephony devices for WA Health official communications;
STATE OF MISSISSIPPI DEPARTMENT OF EDUCATION TOPIC: FIXED ASSETS AND FACILITY USAGE
SECTION: 14.0 PAGE 1 OF 6 FIXED ASSETS The State of Mississippi has stringent controls for the reporting of items designated as fixed assets. The Property Officer in the Fixed Assets Division of the Office
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
The mobile device transition options and classifications are defined as following:
Mobile phone service is supported at Chicago State University (CSU) through the use of a stipend program. The program is setup to allow CSU campus community users to maintain the State of Illinois employee
HIPAA 101: Privacy and Security Basics
HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually
Administrative Procedures Manual. Management Information Services
I-23.10 Management Information Services The College owns and operates a local area network (LAN) that connects the College's computing hardware and services. Computing hardware refers to any device that
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
PURCHASING CARD POLICY AND PROCEDURES
PURCHASING CARD POLICY AND PROCEDURES 1. PURPOSE To establish policies and procedures for procuring goods and/or services using a Purchasing Card. Purchasing Cards are referred to throughout this policy
COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION
COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION Answers to End-of-Chapter Questions Matching g 1. whiteboard i 2. sending device o 3. streaming j 4. WiFi m 5. Webcam d 6. data transfer
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
Other Review Dates: 15 July 2010, 20 October 2011
POLICY:- Policy Title: Mobile Telephone Policy File reference: F10/618-04 Date Policy was adopted by Council initially: 18 December 2008 Resolution Number: 404/08 Other Review Dates: 15 July 2010, 20 October
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,
LIVINGSTON COUNTY CREDIT CARD PROCEDURES
LIVINGSTON COUNTY CREDIT CARD PROCEDURES INTRODUCTION Livingston County is introducing an alternative approach to purchasing products and services through the use of credit cards. A credit card purchase
