ACCEPTABLE USE POLICY. Acceptable Use Policy

Size: px
Start display at page:

Download "ACCEPTABLE USE POLICY. Acceptable Use Policy"

Transcription

1 Acceptable Use Plicy

2 Cntents 1. Hw this Acceptable Use Plicy Wrks Yur Obligatins Our Obligatins Indemnity Our Disclaimer Updating this Acceptable Use Plicy Definitins... 6 Issue Date: 18-May-15 Classificatin: PUBLIC Versin: 2.0 Page: 2

3 1. Hw this Acceptable Use Plicy Wrks 1.1. This Acceptable Use Plicy frms part f Our (Outsurcery Hsting Ltd) cntract with Yu (the Cntracted Party) t prvide the Services yu have asked us t prvide under the gvernance f Terms f Service which are available n ur website at Breaches r lack f adherence t any applicable clauses cntained in this plicy will be seen as a material breach f ur mutual cntract and can ultimately lead t terminatin Yu are respnsible fr vilatins f this Acceptable Use Plicy by anyne using the Service whether authrised by yu r nt. 2. Yur Obligatins 2.1. It is yur bligatin that Outsurcery Prducts and Services may nt be used: in any way that breaches any applicable federal, state, lcal r internatinal law r regulatin; in a way that is in any way unlawful, fraudulent r in bad faith r, t yur knwledge, has any unlawful, fraudulent r bad faith purpse r effect including but nt limited t: (a) t btain r attempt t btain unauthrised access t r use f data, services, systems r netwrks, including any attempt t prbe, scan r test the vulnerability f a system r netwrk r t breach security r authenticatin; (b) t mnitr data r traffic n any netwrk r system withut the authrisatin f the wner f the system r netwrk; (c) t interfere with a service t any user, hst r netwrk including, withut limitatin, mail bmbing, flding, deliberate attempts t verlad a system and bradcast attacks; (d) use f an Internet accunt r cmputer withut the wners authrisatin; (e) cllecting infrmatin by deceit, including, but nt limited t Internet scamming (tricking ther peple int releasing their passwrds), passwrd rbbery, phishing, security hle scanning, and prt scanning; (f) use f any false, misleading r deceptive TCP-IP* packet header r any part f the header infrmatin in an r a newsgrup psting; (g) use f the service t distribute sftware that cvertly gathers infrmatin abut a user r cvertly transmits infrmatin abut the user (h) any activity r cnduct that is likely t result in retaliatin against ur netwrk, including blacklisting; (i) t misrepresent yurself as ther cmputer netwrks and users; (j) t publish r transmit material that can be interpreted as: (i) defamatry, bscene, ffensive, r inflammatry; (ii) t infringe any cpyright, r trademark; (iii) be likely t deceive any persn; (iv) t prmte r assist any illegal activity Issue Date: 18-May-15 Classificatin: PUBLIC Versin: 2.0 Page: 3

4 (v) t be threatening, abusive r invade anther's privacy, r cause annyance, incnvenience r needless anxiety (vi) be used t misrepresent yur identity r affiliatin with any persn r rganisatin (vii) t breach any f the IFFOR plicies (viii) register an abusive string in the stld including, withut limitatin, strings that infringe the intellectual prperty rights f a third party, including cmmn law trademark rights; strings that are bvius variants f well-knwn trademarks nt belnging t the registrant; first and last names f an individual ther than the individual r his/her agent r names that suggest the presence f child prngraphy. (k) t publish r therwise distribute Warez* r cpywritten r ther illegal material where the nus is n Yu t prve that Yu wn the rights t publish material, nt fr Outsurcery t prve that Yu d nt; (l) t generate r generate calls, s r data activity causing Nuisance Calls, Artificial Inflatin f Traffic, SPAM r Unslicited Cmmercial (UCE), Distributed denial f service (DDS) r/and therefre adversely affect verall platfrm perfrmance. (m) t participate in any file-sharing/peer-t-peer activities; (n) t use excessive amunts f server resurces. These include bandwidth, prcessr utilizatin and/r disk space; () t run scripts that manipulate the timeuts n servers r scripts that are designed t prvide prxy Services, annymus r therwise. (p) t ffer HTTP dwnlads, ther than where the files are directly related t the subject matter f the site. Any dwnlads ffered by Yu under this clause are subject t cntract space, bandwidth and cntent restrictins and Outsurcery reserves the right t archive any dwnlad cntent we d nt believe t be necessary fr the nrmal peratin f the site, and the definitin f this is entirely at Our discretin. (q) in a way that, in ur reasnable pinin, culd r des detrimentally affect the perfrmance f ur r any third party's system r netwrk r detrimentally affect the quality f the Services fr anther End-User (r) t engage in activities that give rise t Artificial Inflatin f Traffic r assist r allw thers t d s; (s) t send, knwingly receive, uplad, dwnlad, use r re-use material which cnstitutes r encurages child prngraphy, is prngraphic, abusive, likely t cause harassment, ffensive, indecent, defamatry, sexually explicit, bscene, mrally repugnant, excessively vilent,, incites vilence, threatens vilence, cntains hate speech, creates a risk t public health and safety, cmprmises natinal security is menacing r in breach f any cnfidence, privacy, Intellectual Prperty Rights r ther rights; (t) cntrary t any instructins given by us; (u) in a way which wuld cause us t breach the terms f any f ur r their licences; (v) in a way which in ur pinin is likely t be detrimental t ur business and/r ur reputatin; r Issue Date: 18-May-15 Classificatin: PUBLIC Versin: 2.0 Page: 4

5 (w) t spam r therwise t send r prcure the sending f any unslicited advertising r prmtinal material, unless permitted by law, r knwingly t receive respnses t any spam, unslicited advertising r prmtinal material; 2.2. It is yur bligatin terms t ensure yur usage: cmplies with RIPE plicies as updated and amended n the RIPE website at frm time t time; cmplies with all applicable laws and industry guidance (including but nt limited t that f the Advertising Standards Authrity, Direct Marketing Assciatin and Ofcm, in particular that regarding "misselling" r "slamming") relating t yur use f the Services and the marketing and advertising f any services yu ffer, and ensure that yu have in place at all times prcesses t mnitr and enfrce cmpliance by yur staff and agents with such laws and guidance and t receive and take prmpt and effective actin n cmplaints frm us r parties wh are authrised t enfrce such cmpliance; take all reasnable steps (including testing with the latest cmmercially available virus detectin sftware) t ensure that any sftware used with r in cnjunctin with the Services is nt infected by viruses and/r lgic bmbs, wrms, trjan hrses and any ther type f disruptive, destructive r nuisance prgrams; cmplies with the rules and cnventins fr pstings t any scial media, bulletin bard, chat grup r ther frum in which yu participate, such as IRC and USENET grups including their rules fr cntent and cmmercial pstings. These grups usually prhibit the psting f ff-tpic cmmercial messages, r mass pstings t multiple frums Cmplies with any plicies and terms and cnditins impsed by the third party suppliers r peratrs. 3. Our Obligatins 3.1. If we cnsider that yu are using the Services r permitting the Services t be used in breach f this Acceptable Use Plicy r that such use may cause us t incur any legal liability r t cmmit an ffence, r we suspect that yur Access Details are being misused, then we may take such actin as we r they cnsider apprpriate in such circumstances which may include investigating the matter; terminating all r part f the Services with immediate effect; and/r suspending all r part f the Services; taking dwn r therwise remving and destrying any materials; and/r infrming apprpriate gvernmental authrities r ther third parties Yu must c-perate with us in any such investigatin referred t in clause Unless prvided therwise, the Charges will cntinue t be payable during any perid f suspensin. Issue Date: 18-May-15 Classificatin: PUBLIC Versin: 2.0 Page: 5

6 4. Indemnity Yu shall indemnify us, ur agents, sub-cntractrs and their suppliers against any liability, cst, charge and expense we and/r they (as apprpriate) incur as a result f breach f this Acceptable Use Plicy, including but nt limited t in respect f cntent upladed, cntent dwnlads, Calls made and/r received, s sent and received, and materials placed n any web space prvided as part f the Services. 5. Our Disclaimer We are under n duty, and by this Acceptable Use Plicy are nt deemed t undertake a duty t mnitr r plice ur custmers' activities and we disclaim any respnsibility fr any misuse f ur Services. 6. Updating this Acceptable Use Plicy We may update this acceptable Use Plicy frm time t time and yu must, at all times cmply with the mst recent Acceptable Use Plicy available n the Outsurcery Website. Yur cntinued use f a Service will be an acceptance f the Acceptable Use Plicy as updated. 7. Definitins Artificial Inflatin f Traffic r AIT where the flw f Calls t a Revenue Share Service (which shall include services t the 070, 084, 087, 090, 091, 098 and 118 number ranges and any ther number ranges ntified t yu in writing) r ther equivalent revenue share type services, is disprprtinate t the flw f Calls which wuld be expected frm gd faith usage r an acceptable and reasnable cmmercial practice relating t the peratin use f such service r f telecmmunicatin systems; Cmmunicatins Prvider As defined in the Cmmunicatins Act 2003 Call A signal, message r cmmunicatin which can be silent, visual r spken; Distributed Denial f Service (DDS) Denial-f-service (DS) r distributed denial-f-service (DDS) attack is an attempt t temprarily r indefinitely interrupt r suspend services cnnected t the Internet by saturating the target service/platfrm with external cmmunicatins requests. IFFOR Internatinal Fundatin fr Online Respnsibility, the plicy making bdy fr the.xxx stld. Issue Date: 18-May-15 Classificatin: PUBLIC Versin: 2.0 Page: 6

7 Nuisance Call Revenue Share Service RIPE an unwanted Call that causes annyance t the receiver f the Call and/r is a hax Call, and/r is f an ffensive, spiteful, abusive, indecent, defamatry, bscene r menacing nature including unauthrised r spam Calls and silent Calls as defined by Ofcm in its Statement f plicy n the persistent misuse f an electrnic cmmunicatins service published 1 March 2006, and any subsequent update. a service where an element f the revenue fr the Call passed n frm the riginating Cmmunicatins Prvider is shared (directly r indirectly) by the Cmmunicatins Prvider receiving (via a third party in a transit situatin) such revenue with the persn perating the service (which fr the avidance f dubt may be the Cmmunicatins Prvider receiving such revenue) The Réseaux IP Eurpéens Netwrk Crdinatin Centre (RIPE NCC) is ne f five Reginal Internet Registries (RIRs) prviding Internet resurce allcatins, registratin services and crdinatin activities that supprt the peratin f the Internet glbally. SPAM r Unslicited Cmmercial (UCE) Unslicitied nearly identical messages sent t numerus recipients by ften cntaining links t pfishing websites r malware. Als described as Unslicited Bulk (UBE) Issue Date: 18-May-15 Classificatin: PUBLIC Versin: 2.0 Page: 7

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

Meopham School Information Technology Code of Conduct

Meopham School Information Technology Code of Conduct 1. Intrductin Infrmatin technlgy resurces are essential fr accmplishing Mepham Schl s missin f pursuing excellence in teaching and learning, research and cmmunity service. Members f the Schl cmmunity are

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

How To Write A Scial Media Plicy

How To Write A Scial Media Plicy Scial Media Plicy Scial Media Plicy Recrd Number D14/78 Respnsible Manager Directr Business Supprt and Strategy Manager Custmer and Cmmunicatins Last reviewed 11 February 2014 Adptin reference Cuncil Reslutin

More information

How To Ensure That The Internet Is Safe For A Health Care Worker

How To Ensure That The Internet Is Safe For A Health Care Worker POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy

More information

TERMS OF WEBSITE USE FOR DISTRIBUTORS' USE OF WWW.TRACERCO.COM. 1. The following is the glossary of terms used in these terms of website use:

TERMS OF WEBSITE USE FOR DISTRIBUTORS' USE OF WWW.TRACERCO.COM. 1. The following is the glossary of terms used in these terms of website use: TERMS OF WEBSITE USE FOR DISTRIBUTORS' USE OF WWW.TRACERCO.COM 1. The fllwing is the glssary f terms used in these terms f website use: 1.1 Custmisable Materials means the Materials available fr dwnlad

More information

The information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice.

The information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice. Privacy Plicy Terms f Service: The fllwing terms and cnditins gvern all use f the Rightwaywebhsting.cm website and all cntent, services and prducts available at r thrugh the website (taken tgether, the

More information

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5 Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

Web Hosting and Internet Services Terms and Conditions

Web Hosting and Internet Services Terms and Conditions Web Hsting and Internet Services Terms and Cnditins Server Use blue spark Ltd ( blue spark ) prvide Wrld Wide Web hsting and email services thrugh selected third party suppliers. blue spark reserve the

More information

To clarify terms used within these policies, the following definitions are provided:

To clarify terms used within these policies, the following definitions are provided: Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT 1 FERRIS STATE UNIVERSITY SCHOOL f NURSING CODE f CONDUCT The Schl f Nursing (SON) at Ferris State University uphlds the University Cde f Student Cnduct and the American Nurses Assciatin Cde f Ethics.

More information

Privacy and Security Training Policy (PS.Pol.051)

Privacy and Security Training Policy (PS.Pol.051) Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider

More information

Essendant Online Terms of Use

Essendant Online Terms of Use Essendant Online Terms f Use Thank yu fr visiting this website. These Terms f Use gvern yur use f any website wned by Essendant C. r any f its subsidiaries (including Essendant Industrial LLC), n which

More information

Peratr Accreditatin and Services in Queensland

Peratr Accreditatin and Services in Queensland Infrmatin Bulletin PT 204/09.15 Operatr Accreditatin fr Limusine Services What is peratr accreditatin? The Transprt Operatins (Passenger Transprt) Act 1994 requires peratrs f public passenger services

More information

Information & Communications Technology ICT Security Compliance Guide (Student)

Information & Communications Technology ICT Security Compliance Guide (Student) Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 8 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk The Bard f Educatin recgnizes as new technlgies shift the manner in which infrmatin is

More information

Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117

Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ 07644-2117 Cmputer Use Plicy Intrductin - In supprt f Felician Cllege's missin f teaching and public service, the Infrmatin Technlgy

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care

More information

Amazon Marketing Services Content Policies and Standards

Amazon Marketing Services Content Policies and Standards Amazn Marketing Services Cntent Plicies and Standards Cntents Intrductin... 2 Acceptance f Creative Assets... 2 General Creative Plicies... 3 Reprting Abuse... 3 Cnsequences fr Vilatins... 3 Image Guidelines...

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Crprate Accunt Takever & Infrmatin Security Awareness What is Crprate Accunt Takever? A fast grwing electrnic crime where thieves typically use sme frm f malware t btain lgin credentials t Crprate Online

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Employees - recruitment, records and monitoring

Employees - recruitment, records and monitoring Emplyees - recruitment, recrds and mnitring This guidance has been prduced t help rganisatins cmply with the Data Prtectin Act (DPA) when recruiting and emplying wrkers. It is relevant t public sectr emplyers,

More information

Public consultation paper

Public consultation paper Public cnsultatin paper Nvember 2012 Public cnsultatin n guidelines fr prfessinal indemnity insurance arrangements fr nurses and nurse practitiners. Please prvide feedback by email t: nmbafeedback@ahpra.gv.au

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

ICT Acceptable Use Policy

ICT Acceptable Use Policy ICT Acceptable Use Plicy Versin Number One Status Apprved Apprval Date: first versin 12 January 2015 Apprval date: current versin 12 January 2015 Respnsible fr plicy: Vice Principal Finance Respnsible

More information

PRIVACY POLICY Last revised: April 2015

PRIVACY POLICY Last revised: April 2015 PRIVACY POLICY Last revised: April 2015 ACD, LLC, and its affiliates (cllectively, we, us, ur ) understand that privacy is imprtant t ur cnsumers and want yu t make knwledgeable decisins abut the infrmatin

More information

General Records Authority 33. Accredited Training

General Records Authority 33. Accredited Training General Recrds Authrity 33 2012/00579704 Accredited Training February 2013 This is an accurate reprductin f the authrised recrds authrity cntent, created fr accessibility purpses CONTENTS INTRODUCTION

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs

More information

! Mobile)App)Proposal)

! Mobile)App)Proposal) Mbile)App)Prpsal) prepared)fr) ) Representative: Cntact#: CntactEmail: - 1- TABLEOFCONTENTS Intrductin PrjectOverview,Scpe&Objectives QRCdes Analytics CludHsting Maintenance/TechSupprt ClientTasks PricingSchedule

More information

ACQUIRED RARE DISEASE DRUG THERAPY EXCEPTION PROCESS

ACQUIRED RARE DISEASE DRUG THERAPY EXCEPTION PROCESS ADMINISTRATIVE POLICY ACQUIRED RARE DISEASE DRUG THERAPY EXCEPTION PROCESS Plicy Number: ADMINISTRATIVE 19.8 T Effective Date: Octber 1, 014 Table f Cntents CONDITIONS OF COVERAGE... BENEFIT CONSIDERATIONS...

More information

Frequently Asked Questions About I-9 Compliance

Frequently Asked Questions About I-9 Compliance Frequently Asked Questins Abut I-9 Cmpliance What is required t verify wrk authrizatin? The basic requirement t verify wrk authrizatin is the Frm I-9. This frm is available n the HR website: http://www.fit.edu/hr/dcuments/frms/i-9.pdf

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

CENTURIC.COM ONLINE DATA BACKUP AND DISASTER RECOVERY SOLUTION ADDENDUM TO TERMS OF SERVICE

CENTURIC.COM ONLINE DATA BACKUP AND DISASTER RECOVERY SOLUTION ADDENDUM TO TERMS OF SERVICE CENTURIC.COM ONLINE DATA BACKUP AND DISASTER RECOVERY SOLUTION ADDENDUM TO TERMS OF SERVICE This Agreement, named the Online Data Backup and Disaster Recvery Slutin Addendum t Centuric s Terms f Service

More information

NAIC Replacement Requirements For Certain Life Insurance Policies And Annuity Contracts

NAIC Replacement Requirements For Certain Life Insurance Policies And Annuity Contracts NAIC Replacement Requirements Fr Certain Life Insurance Plicies And Annuity Cntracts Duties f Prducers If a transactin invlves a replacement, the prducer must leave with the applicant, at the time an applicatin

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices This is being prvided t yu as a requirement f the privacy regulatins issued under the Health Insurance Prtability and Accuntability Act f 1996 (HIPAA). This ntice describes hw HROSM may use and disclse

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

OUR DISCIPLINARY POLICY

OUR DISCIPLINARY POLICY OUR DISCIPLINARY POLICY WHO is this plicy fr? Channel 4 emplyees wh ve passed their prbatinary perid Channel 4 managers This plicy des nt frm part f any emplyee s cntract f emplyment and we may amend it

More information

What Information Is Collected and How Is It Collected?

What Information Is Collected and How Is It Collected? RCI PRIVACY NOTICE RCI Pacific Pty Ltd is cncerned abut privacy issues and wants yu t be familiar with hw we cllect, use and disclse infrmatin. This Privacy Ntice describes ur practices in cnnectin with

More information

Internet Service Definition. SD012v1.1

Internet Service Definition. SD012v1.1 Internet Service Definitin SD012v1.1 Internet Service Definitin Service Overview InTechnlgy Internet Service is a permanent Internet cnnectivity slutin. The service cnnects custmers t the InTechnlgy natinal

More information

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS APPENDIX A FORM ADV (Paper Versin) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS Frm ADV: General Instructins Read these instructins carefully befre

More information

CHARTER OF THE COMPENSATION COMMITTEE OF THE BOARD OF DIRECTORS OF UPLAND SOFTWARE, INC.

CHARTER OF THE COMPENSATION COMMITTEE OF THE BOARD OF DIRECTORS OF UPLAND SOFTWARE, INC. CHARTER OF THE COMPENSATION COMMITTEE OF THE BOARD OF DIRECTORS OF UPLAND SOFTWARE, INC. PURPOSE The purpse f the Cmpensatin Cmmittee f the Bard f Directrs (the Bard ) f Upland Sftware, Inc. (the Cmpany

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format.

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format. Municipal Service Cmmissin Gerald P. Cle Frederick C. DeLisle Thmas M. Kaul Gregry L. Riggle Stanley A. Rutkwski Electric, Steam, Water Cable Televisin and High Speed Internet Service since 1889 Melanie

More information

UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM WB-DEC

UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM WB-DEC UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washingtn, D.C. 20549 FORM WB-DEC DECLARATION OF ORIGINAL INFORMATION SUBMITTED PURSUANT TO SECTION 21F OF THE SECURITIES EXCHANGE ACT OF 1934 A. SUBMITTER

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

DATE APPROVED March 2011. Version Date Comments / Changes 1.0 March 2011 Initial policy released

DATE APPROVED March 2011. Version Date Comments / Changes 1.0 March 2011 Initial policy released Page 1 f 11 APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial plicy released 1. PURPOSE OF THIS POLICY T define the purpses fr which Crprate Purchase Cards are t be used

More information

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

The Importance of Market Research

The Importance of Market Research The Imprtance f Market Research 1. What is market research? Successful businesses have extensive knwledge f their custmers and their cmpetitrs. Market research is the prcess f gathering infrmatin which

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

Cyber Security: Simulation Platform

Cyber Security: Simulation Platform Service Overview The Symantec Cyber Security: Simulatin Platfrm is a Web hsted Service with immersive and hands-n access t cyber exercises fr ffensive (red team) events, inspired by real-life security

More information

Convenience Fees BEST PRACTICES FOR MERCHANT USE OF CONVENIENCE FEES:

Convenience Fees BEST PRACTICES FOR MERCHANT USE OF CONVENIENCE FEES: Cnvenience Fees This publicatin includes Card Acceptance Guide language n Best Practices fr Merchant Use f Cnvenience Fees in additin t addressing specific differences by card brand and special circumstances

More information

Williamson County Board of Education Procedures and Guidelines

Williamson County Board of Education Procedures and Guidelines Williamsn Cunty Bard f Educatin Prcedures and Guidelines Effective Date: 6/21/10; 8/15/11; Page 1 f 7 PURPOSE Williamsn Cunty Schls prvides student and emplyee access t the Internet as a means t increase

More information

STANDARDISATION IN E-ARCHIVING

STANDARDISATION IN E-ARCHIVING STANDARDISATION IN E-ARCHIVING R E Q U I R E M E N T S A N D C O N T R O L S F O R D I G I T I S AT I O N A N D E - A R C H I V I N G S E R V I C E P R O V I D E R S Alain Wahl 1 Requirements and cntrls

More information

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act

More information

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc. HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

How To Ensure Your Health Care Is Safe

How To Ensure Your Health Care Is Safe Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

Internet and Social Media Solicitations: Wise Giving Tips

Internet and Social Media Solicitations: Wise Giving Tips Internet and Scial Media Slicitatins: Wise Giving Tips Charities use a wide variety f methds t slicit charitable dnatins. New and pwerful technlgies utilize nt just the internet and email, but als scial

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

UNIVERSAL MUSIC GROUP PRIVACY POLICY. Universal Music AB ("We") are committed to protecting and respecting your privacy.

UNIVERSAL MUSIC GROUP PRIVACY POLICY. Universal Music AB (We) are committed to protecting and respecting your privacy. Effective Date: 2016-04-26 UNIVERSAL MUSIC GROUP PRIVACY POLICY Universal Music AB ("We") are cmmitted t prtecting and respecting yur privacy. This privacy plicy (tgether with ur terms f use and any ther

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

KIK s GUIDE FOR LAW ENFORCEMENT

KIK s GUIDE FOR LAW ENFORCEMENT Thanks fr checking ut ur law enfrcement guide. Kik takes the safety f ur users very seriusly, and we hpe this guide will be a useful tl fr yu. It includes infrmatin abut ur app; the features and functins

More information

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies Clrad Rapids Yuth Sccer Club Scial Media and Electrnic Cmmunicatin Plicies OVERVIEW Online, scial media and ther electrnic cmmunicatin tls such as text messaging have becme a prevalent and effective means

More information

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service. FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept

More information

INTRODUCTION TO PORTAL GROUP STUDIO

INTRODUCTION TO PORTAL GROUP STUDIO Mntana State University Luminis Prtal Prject INTRODUCTION TO PORTAL GROUP STUDIO Grup Studi With the Grup Studi sftware, yu can request the creatin f nline grups fr clubs, affiliatins, r interests and

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

FREQUENTLY ASKED QUESTIONS (FAQs)

FREQUENTLY ASKED QUESTIONS (FAQs) EMPLOYMENT PRACTICES LIABILITY fr small businesses FREQUENTLY ASKED QUESTIONS (FAQs) What is Emplyment Practices Liability Insurance? Emplyment Practices Liability (EPL) insurance prtects an emplyer frm

More information

October 2014 Version 1

October 2014 Version 1 .CARTIER Dmain Name Registratin Plicy Octber 2014 Versin 1.CARTIER Dmain Name Registratin Plicy... 2 Definitins & Interpretatin... 2 Registratin Eligibility... 4 Registratin Terms & Cnditins... 4 Suspensin,

More information

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine Title: Identity Theft Prgram Effective Date: July 2009 NYU Langne Medical Center NYU Hspitals Center NYU Schl f Medicine POLICY It is the plicy f the NYU Langne Medical Center t educate and train staff

More information

RQ10.06 AACo Share Trading Policy

RQ10.06 AACo Share Trading Policy Australian Agricultural Cmpany Limited ACN 010 892 270 RQ10.06 AAC Share Trading Plicy Versin 5 This plicy was apprved by the Bard f Australian Agricultural Cmpany Limited n 15 December 2010. This plicy

More information

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013 Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

How To Deal With A Data Breach In The European Law

How To Deal With A Data Breach In The European Law Data Prtectin: Regulating Cyber Security Jnathan Bamfrd Head f Strategic Liaisn Hw des DP regulatin affect cyber security? Data Prtectin Act 1998: apprpriate security Privacy and Electrnic Cmmunicatin

More information

I. POLICY. their individual assets.

I. POLICY. their individual assets. PRINCIPLES AND PRACTICES BOARD SAMPLE 501(c)(3) HOSPITAL CHARITY CARE AND FINANCIAL ASSISTANCE POLICY AND PROCEDURES The Principles and Practices Bard (P&P Bard) undertk develping an illustrative plicy

More information

Vendor Management. Federal Deposit Insurance Corporation Division of Risk Management Supervision Atlanta Regional Office.

Vendor Management. Federal Deposit Insurance Corporation Division of Risk Management Supervision Atlanta Regional Office. Vendr Management Federal Depsit Insurance Crpratin Divisin f Risk Management Supervisin Atlanta Reginal Office June 18, 2014 1 Agenda Intrductin Vendr Management Overview Regulatry Expectatins Bard and

More information

SPECIAL CONDITIONS OF SUBSCRIPTION TO DIGITAL CABLE TELEVISION SERVICES OF IPKO TELECOMMUNICATIONS LLC

SPECIAL CONDITIONS OF SUBSCRIPTION TO DIGITAL CABLE TELEVISION SERVICES OF IPKO TELECOMMUNICATIONS LLC SPECIAL CONDITIONS OF SUBSCRIPTION TO DIGITAL CABLE TELEVISION SERVICES OF IPKO TELECOMMUNICATIONS LLC Article 1 Cntents f the Special Cnditins 1.1 These Special Cnditins gvern the rights, bligatins and

More information

CMS Eligibility Requirements Checklist for MSSP ACO Participation

CMS Eligibility Requirements Checklist for MSSP ACO Participation ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.

More information

Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services

Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services Erie Cmmunity Cllege Acceptable Use Plicy Last Revisin: December 17, 2009 Cllege Infrmatin Technlgy Services Erie Cmmunity Cllege Cllege Infrmatin Technlgy Services Acceptable Use Plicy Last Revisin:

More information

THE EMPLOYMENT LAW DISPUTE SPECIALISTS DAMAGES BASED AGREEMENT. Your Employment Tribunal claim relating to your employment with...

THE EMPLOYMENT LAW DISPUTE SPECIALISTS DAMAGES BASED AGREEMENT. Your Employment Tribunal claim relating to your employment with... THE EMPLOYMENT LAW DISPUTE SPECIALISTS DAMAGES BASED AGREEMENT 1. What is cvered by this agreement Yur Emplyment Tribunal claim relating t yur emplyment with... 2. What is nt cvered by this agreement 2.1

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only

DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM Fr 8 th 12 th Grade Students Only Student s Last Name Parent/Guardian Last Name Class First Name First Name Date Fr the first time this fall, students

More information

Columbine Federal Credit Union ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE

Columbine Federal Credit Union ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE Clumbine Federal Credit Unin ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE 1. Online Banking/Bill Payment 2. Online Banking/ Bill Payment Limitatins 3. Online Bill Payment

More information