Information & Communications Technology ICT Security Compliance Guide (Student)

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Information & Communications Technology ICT Security Compliance Guide (Student)"

Transcription

1 Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011

2 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr Mar 2010 Initial Release. Replaces Security EMC Cnsultant Plicy Gverning the Use f Cmputer Resurces at the Singapre Plytechnic Nv 2011 Change f passwrd plicy t meet passwrd cmplexity requirement. Anthny Lau Reviewers Name Rle Status All Members Cmmittee n ICT Security Endrsed Anthny Lau ICT Security Manager Endrsed Apprvals Name Title Date Chairman & Members ICT Steering Cmmittee 25 March 2010 Versin May 2010 Page 2 f 8

3 Table f Cntents Dcument Cntrl Intrductin Student Security Awareness Passwrds Yur Accunts Apprpriate Use SP s Cmputer Resurces Security Vilatins... 8 Versin May 2010 Page 3 f 8

4 1. Intrductin As a student f Singapre Plytechnic, yu will make use f the Plytechnic s ICT Assets such as infrmatin, cmputers, netwrks and sftware in yur day-t-day activities. It is imprtant that these imprtant resurces prvide the service t yu and t thers fr which they were intended. An imprtant part f the prper peratin f these ICT Assets is security. Trjans, viruses, wrms and spyware can wreak havc n these assets s the Plytechnic has taken great care t prtect them against such threat. That said, yu, the student, perfrm a very imprtant rle in maintaining the security and availability f the Plytechnics student cmputer resurces. We have written this guide t help explain what yu need t d, and what rules yu need t cmply with t help ensure that the cnfidentiality, availability and integrity f the cmputing resurces f the Plytechnic are prtected. Students must cmply with the ICT Security Plicies f the Plytechnic. These plicies are very serius and are meant t make sure that the Plytechnic s cmputers and netwrks keep running smthly and securely. This cmpliance guide is intended t explain these plicies t yu. All Students f SP are required t strictly cmply with the Infrmatin Cmmunicatins Technlgy (ICT) Security Plicy and Standards issued by the Plytechnic. 2. Student Security Awareness Reference Plicy Paragraph 5.5, Yu shuld receive security awareness training as part f yur intrductin t the Plytechnic. This training will ensure that yu understand the risks and yur respnsibilities twards helping t reduce thse risks. Yu understand that yu are respnsible t cmply with all security related plicies. These plicies are imprtant and prtect nt nly yu, but everybdy else wh needs t use these resurces. 3. Passwrds Reference Plicy Paragraphs , Versin May 2010 Page 4 f 8

5 Yu will be given a passwrd t access any cmputer accunts that yu need. Yu must keep yur passwrd secret, and never ever tell anybdy else what it is 1 ; We have sme rules t help yu select a gd passwrd: It needs t be at least 9 characters lng; It has t cntain at least 1 letter frm the alphabet and 1 number; It can t have blanks; It can t be yur username r User ID; It can t be yur name r part f yur name; It can t cntain yur NRIC/Passprt Number; It can t cntain r be anything that can be assciated with yu, e.g. yur dg s name r street name; It can t cntain YES r NO. S, yu need t use great care when yu pick a passwrd. One easy way t pick ne yu can remember is t think f a phrase. Fr example, the phrase I like Ice Cream culd be cnverted int a passwrd like 1l1ke1cecream by just putting 1 instead f I ; this is a very gd passwrd. (Dn t use this ne thugh!) Dn t write yur passwrd dwn n a piece f paper r put it in a file n a cmputer. Smebdy else culd find it. If yu think smene has guessed yur passwrd, r if yu accidently revealed it t smebdy else, yu need t change it immediately. One mre thing yur passwrd needs t be changed every 180 days, and yu can t use the same passwrd again. 4. Yur Accunts Reference Plicy Paragraph Yur accunt is just that yur accunt, just fr yu and yu alne. Yu cannt share it with smebdy else, fr any reasn. Yu are respnsible fr everything that cmes frm yur accunt. S if smebdy were t send an , write a blg, r pst smething n FaceBk using yur accunt defaming the schl, a teacher, r a friend, it s yur prblem. S again, keeping yur passwrd a secret helps t avid prblems like this. Yu can t use smene else s accunt, just like smene else can t use yurs. Yu als can t d things that attempt t mask yur accunt t thers t try and hide. Yu can't use the Plytechnic s resurces t spy n thers, and yu can t change, read, delete, cpy r therwise mdify anther persns files unless they give yu permissin t d s. 1 One really gd example f when this rule is imprtant is when yu are the ptential victim f a phishing attack, where yu get an asking yu t reveal yur passwrd. A legitimate site r rganizatin will never ever ask yu t reveal yur passwrd. Versin May 2010 Page 5 f 8

6 5. Apprpriate Use SP s Cmputer Resurces Reference Plicy Paragraphs , , , 11.5 The cmputer systems, including netwrks that have been set aside fr yur use are tls t facilitate yur educatin. These systems shuld be usable by yu just the way they are, and yu shuld nt need t change their cnfiguratin r add any sftware. Use cmmn sense in what yu d n these systems - if it feels wrng, it prbably is. Yu shuld nly use Plytechnic cmputer systems and the Plytechnic s netwrks fr Plytechnic related activities such as cursewrk r research, and fr n ther purpse. Yu shuld nt use these systems fr: Cmmercial r financial gain; Gambling; Unauthrized strage; Attacking r hacking Plytechnic r external resurces Installatin f malicius sftware r cde Disruptive activities t ther students r the Plytechnic as a whle Only install authrized sftware n the Plytechnic s systems. Authrized sftware is sftware that is licensed fr use, legally acquired, and apprved by the Plytechnic fr use. By installing unauthrized sftware yu culd inadvertently intrduce malicius cde and cause great harm t the Plytechnic. Yu culd als break the licensing agreements that the Plytechnic has with varius sftware vendrs, and withut even knwing it. Only use resurces that are fr students. Staff cmputers are fr staff and students shuld nt use them. If yu have a questin as t if a cmputer system is fr student r staff, please ask. We have spent a lt f time and expense installing security safeguards such as anti-virus, persnal firewalls and anti-spyware prgrams n the Plytechnic s ICT systems. Please d nt try and circumvent these safeguards, as yu will be endangering bth the system and yur fellw students. Infrmatin that ges n the Internet frm the Plytechnic is traceable t the Plytechnic. S dn t use the Plytechnic s netwrk t pst r anything that is: Distasteful; Objectinable; Prejudicial t the gd name f Singapre Plytechnic; Illegal as defined under the laws f the Republic f Singapre; nt public Blgs, scial netwrking sites 2, websites, r any ther publicly accessible cmmunicatin channel. Again, gd sense prevails defamatin, prngraphy, pictures that are disturbing if yu think it s bad, then it prbably is. Yu must nt use the Plytechnic s ICT Systems t illicitly exchange 3 r therwise infringe n the cpyrighted intellectual prperty f thers by any means, including but nt limited t the 2 Scial netwrking sites include sites such as MySpace, Facebk, Twitter, Picasa and s n. Versin May 2010 Page 6 f 8

7 use f peer-t-peer r client-t-client technlgies 4, r FTP. If yu have peer-tpeer r client-t-client sftware n yur persnal laptp, either turn it ff r dn t cnnect yur cmputer int the Plytechnic s netwrk. When yu use yur wn cmputer r laptp, yu can nly cnnect it t netwrks that are allcated specifically fr student r guest use. Yu cannt attach it t any netwrk reserved fr the staff f the Plytechnic. If yur cmputer runs the Micrsft Windws perating system, yu must ensure that it has an apprpriate antivirus prgram installed, peratinal and up-t-date befre yu cnnect it t the Plytechnic s netwrk. This is t prtect bth yu and yur fellw students against malware. Ensure that yur cmputer is nt attached t a secnd netwrk 5 and Singapre Plytechnic s netwrk at the same time; fr example, if yu have a USB dngle that facilitates cnnectins t a 3G netwrk, then yu can t use that dngle at the same time as yur cmputer is attached t the Plytechnic s netwrk. 6. Reference Plicy Paragraph , The Plytechnic may have created a student accunt fr yur exclusive use. Yu are fully accuntable fr all s transmitted frm yur Plytechnic accunt s yu must ensure that nbdy else can access this accunt. When yu use yur Plytechnic accunt, yu are in effect representing the Plytechnic. Yu must exercise care and discretin when yu send mail, and yu must nt use yur Plytechnic accunt t: Send spam r cmmercial s; Slicit fr plitical candidates; Engage in illegal, unethical r imprper activities; Disseminate internal addresses t external mailing lists; Cnduct persnal business 3 By illicitly exchange, we mean exchange withut the permissin f the cpyright wner r exchange in vilatin f nrmal fair use principles; this generally applies t music, mvies, sftware, and ther frms f intellectual prperty. 4 Examples include ednkey, Gnutella and Bit Trrent 5 A Secnd Netwrk is meant t be an un-trusted third-party netwrk such as the Internet; the effect f cnnecting a cmputer t tw netwrks at the same time is t circumvent prtectin mechanisms that may be in place n the trusted netwrk. A gd example f cnnecting t a secnd netwrk is at the same time wuld be t cnnect t the SPICE netwrk using a LAN prt while at the same time being cnnected t n the WiFi prt. Versin May 2010 Page 7 f 8

8 7. Security Vilatins Reference Plicy Paragraph RESTRICTED If yu see smething that yu think might indicate a security prblem, malfunctin f a security device r prgram, r a security vilatin, please prmptly reprt the matter t the SPICE Service Desk it is yur respnsibility t d s. If there is an investigatin being cnducted by the Plytechnic relating t system misuse, abuse r a security incident/vilatin, then yu understand that during the curse f the investigatin the Plytechnic s management has the right t examine yur accunt, s, and user files even n yur PC if yur PC is attached t the Plytechnic s netwrk. Yu als understand that vilatin f the Plytechnics cmputer security plicies and acceptable use plicies is a very serius matter. Vilatins may result in: Fines against the ffending party; Withdrawal f access t the Plytechnic s cmputing resurces and/r netwrk Suspensin r expulsin frm the Plytechnic. Finally, Singapre Plytechnic reserves the right t take disciplinary r legal actin against an ffending user in the event that he r she cnducts himself r herself in any manner which is cnsidered by the Plytechnic t be irrespnsible; r in the event that the individual is misusing the cmputing resurces allcated t him r her. Versin May 2010 Page 8 f 8

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117

Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ 07644-2117 Cmputer Use Plicy Intrductin - In supprt f Felician Cllege's missin f teaching and public service, the Infrmatin Technlgy

More information

Meopham School Information Technology Code of Conduct

Meopham School Information Technology Code of Conduct 1. Intrductin Infrmatin technlgy resurces are essential fr accmplishing Mepham Schl s missin f pursuing excellence in teaching and learning, research and cmmunity service. Members f the Schl cmmunity are

More information

To clarify terms used within these policies, the following definitions are provided:

To clarify terms used within these policies, the following definitions are provided: Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Woodstock Multimedia, INC. Software/Hardware Usage Policy

Woodstock Multimedia, INC. Software/Hardware Usage Policy Wdstck Multimedia, INC. Sftware/Hardware Usage Plicy POLICY PURPOSE The purpse f the Wdstck Multimedia, INC. Sftware / Hardware Usage Plicy is t ensure that Wdstck Multimedia, INC. emplyees are prperly

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5 Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,

More information

INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE

INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE Cunty f Orange Infrmatin Technlgy Usage Plicy 1 INTRODUCTION: The Cunty f Orange Infrmatin Technlgy (IT) Usage Plicy is the fundatin f the Cunty s infrmatin

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

PRIVACY POLICY. This Privacy Policy describes how and when Pole Star USA, Inc. ( Pole Star ) collects, uses and

PRIVACY POLICY. This Privacy Policy describes how and when Pole Star USA, Inc. ( Pole Star ) collects, uses and PRIVACY POLICY This Privacy Plicy describes hw and when Ple Star USA, Inc. ( Ple Star ) cllects, uses and shares yur infrmatin when yu use Ple Star s NAO Clud Platfrm, which includes the Ple Star website

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

Amazon Marketing Services Content Policies and Standards

Amazon Marketing Services Content Policies and Standards Amazn Marketing Services Cntent Plicies and Standards Cntents Intrductin... 2 Acceptance f Creative Assets... 2 General Creative Plicies... 3 Reprting Abuse... 3 Cnsequences fr Vilatins... 3 Image Guidelines...

More information

2.1 All SHR Users are responsible for the security of SHR systems/applications, resources and information.

2.1 All SHR Users are responsible for the security of SHR systems/applications, resources and information. POLICY Number: 7311-25-004 Title: Saskatn Health Regin User Accunt Plicy Authrizatin [ ] President and CEO [X] Vice President, Finance and Crprate Services Surce: Directr, Infrmatin Technlgy Services Crss

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 8 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk The Bard f Educatin recgnizes as new technlgies shift the manner in which infrmatin is

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information

POLICY INTERNET - ACCEPTABLE USE

POLICY INTERNET - ACCEPTABLE USE POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Customers FAQs for Webroot SecureAnywhere Identity Shield

Customers FAQs for Webroot SecureAnywhere Identity Shield Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies

More information

5.2.1 Passwords. Information Technology Policy. Policy. Purpose. Policy Statement. Applicability of this Policy

5.2.1 Passwords. Information Technology Policy. Policy. Purpose. Policy Statement. Applicability of this Policy Infrmatin Technlgy Plicy 5.2.1 Passwrds Plicy Area: 5.2 Security Title: 5.2.1 Passwrds Issued by: Assistant Vice-President/CIO, ITS Date Issued: 2006 July 24 Last Revisin Date: 2011 Octber 19 Apprved by:

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Aladdin HASP SRM Key Problem Resolution

Aladdin HASP SRM Key Problem Resolution Aladdin HASP SRM Key Prblem Reslutin Installatin flwchart fr EmbrideryStudi and DecStudi e1.5 Discnnect frm the Internet and disable all anti-virus and firewall applicatins. Unplug all dngles. Insert nly

More information

FAQs for Webroot SecureAnywhere Identity Shield

FAQs for Webroot SecureAnywhere Identity Shield FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt

More information

Texas Woman's University University Policy Manual

Texas Woman's University University Policy Manual Texas Wman's University University Plicy Manual Plicy Name: Plicy Number: 6.06 Date Passed: July 2004 Health Insurance Prtability& Accuntability Act (HIPAA) Date Reviewed: September 2008 Next Review: September

More information

CSAT Account Management

CSAT Account Management CSAT Accunt Management User Guide March 2011 Versin 2.1 U.S. Department f Hmeland Security 1 CSAT Accunt Management User Guide Table f Cntents 1. Overview... 1 1.1 CSAT User Rles... 1 1.2 When t Update

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

Privacy and Security Training Policy (PS.Pol.051)

Privacy and Security Training Policy (PS.Pol.051) Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider

More information

DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only

DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM Fr 8 th 12 th Grade Students Only Student s Last Name Parent/Guardian Last Name Class First Name First Name Date Fr the first time this fall, students

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

IT Help Desk Service Level Expectations Revised: 01/09/2012

IT Help Desk Service Level Expectations Revised: 01/09/2012 IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+

More information

The information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice.

The information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice. Privacy Plicy Terms f Service: The fllwing terms and cnditins gvern all use f the Rightwaywebhsting.cm website and all cntent, services and prducts available at r thrugh the website (taken tgether, the

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

Social Media Policy. Record Number D14/78. Director Business Support and Strategy Manager Customer and Communications. Responsible Manager

Social Media Policy. Record Number D14/78. Director Business Support and Strategy Manager Customer and Communications. Responsible Manager Scial Media Plicy Scial Media Plicy Recrd Number D14/78 Respnsible Manager Directr Business Supprt and Strategy Manager Custmer and Cmmunicatins Last reviewed 11 February 2014 Adptin reference Cuncil Reslutin

More information

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies Clrad Rapids Yuth Sccer Club Scial Media and Electrnic Cmmunicatin Plicies OVERVIEW Online, scial media and ther electrnic cmmunicatin tls such as text messaging have becme a prevalent and effective means

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

GRADUATION EXERCISES (GB POLICY I-7450)

GRADUATION EXERCISES (GB POLICY I-7450) GRADUATION EXERCISES (GB POLICY I-7450) Graduatin exercises will be held fr students wh have met state and lcal requirements fr graduatin frm high schl. Participatin in high schl cmmencement exercises

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

SBClient and Microsoft Windows Terminal Server (Including Citrix Server) SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance

More information

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free. 990 e-pstcard FAQ Fr frequently asked questins abut filing the e-pstcard that are nt listed belw, brwse the FAQ at http://epstcard.frm990.rg/frmtsfaq.asp# (cpy and paste this link t yur brwser). General

More information

Social Media Security Awareness for Business or Home Computing Users

Social Media Security Awareness for Business or Home Computing Users Scial Media Security Awareness fr Business r Hme Cmputing Users The purpse f all scial media sites, whether fr business r persnal use, is cmmunicatin, sharing, and smetimes cllabratin. The benefits f the

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet

More information

Preventing Identity Theft

Preventing Identity Theft Preventing Identity Theft Each year, millins f Americans have their identity stlen. ENG Lending wants yu t have the infrmatin yu need t prtect yurself against identity theft. While there are n guarantees

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

ISMF Standard 141 Endpoint Protection. OCIO/S4.6 Government standard on cyber security

ISMF Standard 141 Endpoint Protection. OCIO/S4.6 Government standard on cyber security ISMF Standard 141 OCIO/S4.6 Gvernment standard n cyber security Prepared by: Office f the Chief Infrmatin Officer Versin: v1.0 Date: 12 September 2014 GOVERNMENT STANDARD ON CYBER SECURITY OCIO/S4.6 Cnfidentiality:

More information

EA-POL-015 Enterprise Architecture - Encryption Policy

EA-POL-015 Enterprise Architecture - Encryption Policy Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:

More information

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT 1 FERRIS STATE UNIVERSITY SCHOOL f NURSING CODE f CONDUCT The Schl f Nursing (SON) at Ferris State University uphlds the University Cde f Student Cnduct and the American Nurses Assciatin Cde f Ethics.

More information

For students to participate in BYOD please follow these two steps

For students to participate in BYOD please follow these two steps www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many

More information

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions Maryland General Service (MGS) Area 29 Treatment Facilities Cmmittee (TFC) TFC Instructins Lve And Service Facility Presentatin t Patients We are frm Alchlics Annymus (AA), fr AA, and ur service is fr

More information

High Speed Internet Services

High Speed Internet Services Cnventin Center High Speed Internet Services Wired high-speed Internet access inside a meeting rm, fyer r ther cmmn area: $550 fr the first IP address/device per meeting rm/lcatin, ONE TIME charge fr the

More information

Service Desk Self Service Overview

Service Desk Self Service Overview Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service

More information

Licensing Windows Server 2012 for use with virtualization technologies

Licensing Windows Server 2012 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position Psitin Title I.T Prject Officer Classificatin Higher Educatin Wrker, Level 7 Respnsible t The Psitin I.T Manager The psitin assists with the cmpletin f varius IT prjects intended t enable the nging administratin

More information

Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services

Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services Erie Cmmunity Cllege Acceptable Use Plicy Last Revisin: December 17, 2009 Cllege Infrmatin Technlgy Services Erie Cmmunity Cllege Cllege Infrmatin Technlgy Services Acceptable Use Plicy Last Revisin:

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

Helpdesk Support Tickets & Knowledgebase

Helpdesk Support Tickets & Knowledgebase Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate

More information

Tipsheet: Sending Out Mass Emails in ApplyYourself

Tipsheet: Sending Out Mass Emails in ApplyYourself GEORGETOWN GRADUATE SCHOOL Tipsheet: Sending Out Mass Emails in ApplyYurself In ApplyYurself (AY), it is very simple and easy t send a mass email t all f yur prspects, applicants, r students with applicatins

More information

Frequently Asked Questions About I-9 Compliance

Frequently Asked Questions About I-9 Compliance Frequently Asked Questins Abut I-9 Cmpliance What is required t verify wrk authrizatin? The basic requirement t verify wrk authrizatin is the Frm I-9. This frm is available n the HR website: http://www.fit.edu/hr/dcuments/frms/i-9.pdf

More information

Internet and Social Media Solicitations: Wise Giving Tips

Internet and Social Media Solicitations: Wise Giving Tips Internet and Scial Media Slicitatins: Wise Giving Tips Charities use a wide variety f methds t slicit charitable dnatins. New and pwerful technlgies utilize nt just the internet and email, but als scial

More information

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance

More information

HCHS Student ipad User Agreement

HCHS Student ipad User Agreement HCHS Student ipad User Agreement Schl ipad Initiative Hancck Cunty High Schl has initiated a 1:1 ipad prgram fr students and teachers in an effrt t embrace 21st Century Skills. Students will be using ipads

More information

What Happens To My Benefits If I Get a Bunch of Money? TANF Here is what happens if you are on the TANF program when you get lump-sum income:

What Happens To My Benefits If I Get a Bunch of Money? TANF Here is what happens if you are on the TANF program when you get lump-sum income: 126 Sewall Street Augusta, Maine 04330-6822 TTY/Vice: (207) 626-7058 Fax: (207) 621-8148 www.mejp.rg What Happens T My Benefits If I Get a Bunch f Mney? Each prgram, (TANF, SSI, MaineCare, etc.) has its

More information

LISTSERV ADMINISTRATION Department of Client Services Information Technology Systems Division

LISTSERV ADMINISTRATION Department of Client Services Information Technology Systems Division LISTSERV ADMINISTRATION Department f Client Services Infrmatin Technlgy Systems Divisin E-MAIL LIST INSTRUCTIONS Yur List s Admin Webpage...2 Fr assistance cntact the Technlgy Assistance Center: 962-4357

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs

More information

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS APPENDIX A FORM ADV (Paper Versin) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS Frm ADV: General Instructins Read these instructins carefully befre

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Crprate Accunt Takever & Infrmatin Security Awareness What is Crprate Accunt Takever? A fast grwing electrnic crime where thieves typically use sme frm f malware t btain lgin credentials t Crprate Online

More information

Licensing Windows Server 2012 R2 for use with virtualization technologies

Licensing Windows Server 2012 R2 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents

More information

Williamson County Board of Education Procedures and Guidelines

Williamson County Board of Education Procedures and Guidelines Williamsn Cunty Bard f Educatin Prcedures and Guidelines Effective Date: 6/21/10; 8/15/11; Page 1 f 7 PURPOSE Williamsn Cunty Schls prvides student and emplyee access t the Internet as a means t increase

More information

LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION FACT SHEET Texas

LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION FACT SHEET Texas LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION FACT SHEET Texas Ri Salad Cllege, a Maricpa Cunty Cmmunity Cllege in Tempe, Arizna, is prud t annunce its Credit by Examinatin prgram in Law Enfrcement

More information

1. What insurance coverage is provided for Sigma Chi chapters that are members of the Risk Management Foundation?

1. What insurance coverage is provided for Sigma Chi chapters that are members of the Risk Management Foundation? Frequently Asked Questins 1. What insurance cverage is prvided fr Sigma Chi chapters that are members f the Risk Management Fundatin? Membership in the Risk Management Fundatin includes the fllwing mandatry

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

StarterPak: Dynamics CRM Opportunity To NetSuite Sales Order

StarterPak: Dynamics CRM Opportunity To NetSuite Sales Order StarterPak: Dynamics CRM Opprtunity T NetSuite Sales Order Versin 1.0 7/20/2015 Imprtant Ntice N part f this publicatin may be reprduced, stred in a retrieval system, r transmitted in any frm r by any

More information

esupport Quick Start Guide

esupport Quick Start Guide esupprt Quick Start Guide Last Updated: 5/11/10 Adirndack Slutins, Inc. Helping Yu Reach Yur Peak 908.725.8869 www.adirndackslutins.cm 1 Table f Cntents PURPOSE & INTRODUCTION... 3 HOW TO LOGIN... 3 SUBMITTING

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

KronoDesk Migration and Integration Guide Inflectra Corporation

KronoDesk Migration and Integration Guide Inflectra Corporation / KrnDesk Migratin and Integratin Guide Inflectra Crpratin Date: September 24th, 2015 0B Intrductin... 1 1B1. Imprting frm Micrsft Excel... 2 6B1.1. Installing the Micrsft Excel Add-In... 2 7B1.1. Cnnecting

More information

SMART Active Directory Migrator 9.0.2. Requirements

SMART Active Directory Migrator 9.0.2. Requirements SMART Active Directry Migratr 9.0.2 January 2016 Table f Cntents... 3 SMART Active Directry Migratr Basic Installatin... 3 Wrkstatin and Member Server System... 5 Netwrking... 5 SSL Certificate... 6 Service

More information

AVON MAITLAND DISTRICT SCHOOL BOARD ADMINISTRATIVE PROCEDURE NO. 161

AVON MAITLAND DISTRICT SCHOOL BOARD ADMINISTRATIVE PROCEDURE NO. 161 AVON MAITLAND DISTRICT SCHOOL BOARD ADMINISTRATIVE PROCEDURE NO. 161 SUBJECT: Legal References: BYOD (BRING YOUR OWN DEVICE): USE OF PERSONALLY OWNED COMPUTING DEVICES ON SCHOOL AND BOARD NETWORKS Educatin

More information

Solving the Patch Management Dilemma Using SCCM 2007

Solving the Patch Management Dilemma Using SCCM 2007 White Paper Slving the Patch Management Dilemma Using SCCM 2007 Abstract If yu find it difficult t patch r update yur enterprise cmputers, a Micrsft System Center Family prduct System Center Cnfiguratin

More information

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3 EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.

More information

WatchDox Server. Administrator's Guide. Version 3.8.5

WatchDox Server. Administrator's Guide. Version 3.8.5 WatchDx Server Administratr's Guide Versin 3.8.5 Cnfidentiality This dcument cntains cnfidential material that is prprietary WatchDx. The infrmatin and ideas herein may nt be disclsed t any unauthrized

More information

Girl Scouts of the Missouri Heartland, Inc. Guidelines for Girl Scout Troop & Service Unit Websites

Girl Scouts of the Missouri Heartland, Inc. Guidelines for Girl Scout Troop & Service Unit Websites Girl Scuts f the Missuri Heartland, Inc. Guidelines fr Girl Scut Trp & Service Unit Websites Nearly all Girl Scut members surf the web regularly and many Girl Scut Trps and Girl Scut Service Units are

More information