ICT Acceptable Use Policy

Size: px
Start display at page:

Download "ICT Acceptable Use Policy"

Transcription

1 ICT Acceptable Use Plicy Versin Number One Status Apprved Apprval Date: first versin 12 January 2015 Apprval date: current versin 12 January 2015 Respnsible fr plicy: Vice Principal Finance Respnsible fr Vice Principal Finance implementatin: Date f last review: December 2014 Date f next review: February 2016 Equality Impact Assessed Yes Cmmittee Apprval JCC 5 December 2014

2 Table f Cntents: 1.0 Purpse Scpe The Cllege Electrnic Mail Service The Cllege Data Strage Service User Cnduct - Unacceptable Use f the System Cntractual Cmmunicatins Unacceptable Use Exemptins Electrnic Cmmunicatins Unacceptable Use Use f Micrsft OneDrive Cpyright Ntice General Use and Ownership Cnfidentiality and Mnitring Backups Mnitring Persnal Use and Privacy Security Cnfidentiality Passwrds Secure PC Access t Facilities Psting/mailings frm a Cllege Address Threat Management Sftware Expsure t Unnecessary Risk Discipline Mdificatins Terminatin f Use Exclusins and Limitatins Mdificatins Other Relevant Plicies and Prcedures User Undertaking Appendix One: Examples f Reprts Generated Frm Autmated Mnitring Of Netwrk Usage Appendix Tw: Reasnable and Unacceptable Persnal Use Guidelines

3 1.0 Purpse The purpse f this plicy is t set ut the cnditins f acceptable use f any and all cmputer and netwrk related equipment and services wned r used by r with the permissin f the Cllege. This prvisin is referred t in this dcument as the System. This plicy is in place t: prtect the users f the System, the Cllege and third parties; and ensure that scarce resurces (machines and bandwidth etc.) are available when needed by authrised users f the system. Inapprpriate use f the System nt nly expses the Cllege t risks including the risk f being infected by a cmputer virus r ther electrnic threats, the risk that the security f the System and its services may be cmprmised and the risk that the Cllege might attract legal liability, but als takes up scarce resurces. With the rapidly changing nature f electrnic media, and the netiquette which is develping amng users f external n-line services and the internet, this plicy, whilst prviding guidance regarding what is and is nt acceptable use f the System by users, cannt lay dwn rules t cver every pssible situatin. Instead, it expresses the Cllege philsphy and sets frth general principles which shuld be clear t users in any given situatin whether r nt their intended use f the System wuld be deemed acceptable. This plicy shuld be read in cnjunctin with ther Cllege Plicies as detailed in sectin Scpe Except fr the cnditins and users set ut in sectin 5.3 Exemptins, this plicy applies t all users accessing the System, including members f staff, cntractrs r cnsultants appinted by the Cllege, agency persnnel, wrkers f any affiliates r any ther third party, students and anyne else wh makes use f the System. This plicy als applies t any use whatsever made f any infrmatin technlgy equipment that is wned r leased by the Cllege, whether such use takes place n Cllege premises r elsewhere (e.g. Outreach centres) and whether r nt directly r remtely cnnected t the System r its netwrks. The Cllege cnnects t the Internet thrugh JANET and is bliged t cmply with their Acceptable Use Plicy. In additin, users must take care t adhere t apprpriate use plicies, terms and cnditins that may be stipulated by ther prviders n the Internet r as a cnditin t using a service. Many members f the Cllege cmmunity will use electrnic mail ( ) in their dayt-day activities assciated with the Cllege business. This plicy is designed t infrm users f acceptable use and that users shuld ensure that their use f the System is cnsistent with ther Cllege plicies as detailed in sectin 8.0. All users f the System shuld be aware that legal respnsibility fr and internet misuse rests with bth the Cllege and the individual user. Under the law f defamatin, the Cllege may be liable t third parties as the publisher f defamatry r libellus material distributed by any user fr whm the Cllege is legally respnsible. It is fr this reasn, that the Cllege has an interest in ensuring that the System is nt misused r used inapprpriately. 2

4 3.0 The Cllege Electrnic Mail Service The service is prvided t send and receive electrnic mail via the Internet, using the Cllege service n the Cllege netwrk fr purpses relevant t users wrk activities r curse f study in rder t cmmunicate bth utwith and within the Cllege. The Cllege reserves the right t vary any limits assciated with strage areas in accrdance with specific user requirements and, where necessary, will keep users infrmed. Such limits may be by reference t the physical amunt f space available, the number f electrnic mail messages held, the size f any attachments sent r any ther methd the Cllege specifies. The Cllege reserves the right t refuse t accept material, which wuld exceed any strage limit, and / r t delete material, which exceeds the relevant strage limit. This service is prvided t users withut charge as lng as the service is accessed via the Cllege netwrk. Remte access (e.g. frm hme) means that users may incur charges frm their wn ISP whilst using the service fr which they are slely liable. Users shuld be aware that such use must still cmply with the netwrk ICT Acceptable Use Plicy. 4.0 The Cllege Data Strage Service The Cllege will prvide users with strage space fr data in a frmat mst apprpriate t the delivery f ICT services and facilities. In additin, users may have access t discretinary cllabrative areas fr data which shuld be shared. The Cllege reserves the right t vary any limits assciated with these strage areas in accrdance with specific user requirements and, where necessary, will keep users infrmed. Such limits may be by reference t the physical amunt f space available r any ther methd the Cllege specifies. The Cllege reserves the right t refuse t accept material, which wuld exceed any strage limit, and / r t delete material, which exceeds the relevant strage limit. This service is prvided t users withut charge as lng as the service is accessed via the Cllege netwrk. Remte access (e.g. frm hme) means that users may incur charges whilst using the service fr which they are slely liable. Users shuld be aware that such use must still cmply with the netwrk ICT Acceptable Use Plicy. Only business related data shuld be stred in the prvided data strage areas. Files such as MP3s, Exe, MDB, JPEG (JPG), AVI fr example (this list is nt exhaustive) shuld nt be stred n Cllege servers unless they are a prven legitimate part f Cllege business. Strage f files such as thse afrementined can have legal implicatins under cpyright and licensing laws. 5.0 User Cnduct - Unacceptable Use f the System 5.1. Cntractual Cmmunicatins Users shuld, at all times, exercise a general duty f care with respect t the drafting f s; insfar as s sent fr r n behalf f the Cllege have the ptential t place the reputatin and business interests f the Cllege at risk by the careless use r abuse f by users. is a cmpetent means f creating a cntract; cnsequently, any user sending an r digitally signing 3

5 a dcument transmitted by n behalf f the Cllege must be aware that by s ding, the r the dcument may effectively bind the Cllege in cntract, even where that was nt the intentin f the sender. All business recrds such as s frming part f cntracts, cntracts, agreements, financial statements r ther recrds and any crrespndence cnnected with any legal prceedings shuld be retained as hard cpy n file fr a perid f at least seven years as these may be needed fr legal, regulatry, tax, cntractual, audit and evidentiary purpses. 5.2 Unacceptable Use Under n circumstances is any user authrised t engage in any illegal activity while utilising the Cllege resurces. The fllwing list prvides guidance as t which activities cnstitute unacceptable use f the System. The list is illustrative nly and is nt exhaustive. 1. Breaching r infringing the intellectual prperty rights f any third party including but nt limited t the installatin r distributin f unlicenced sftware prducts. 2. The unauthrised cpying f cpyright materials including digitisatin and distributin f phtgraphs frm magazines, bks r any ther cpyright surces. 3. Intrducing malicius prgrams int the netwrk infrastructure (e.g. viruses, wrms, Trjans, bmbs r malware f any descriptin). 4. Revealing accunt details r passwrds t, r allwing use f a user s accunt by, thers. 5. Using the identity and passwrd f anther user fr any reasn ther than a jb related functin. 6. Using the System r any Cllege equipment t prcure r transmit material that cnstitutes a breach f the Equality and Diversity Plicy r the Bullying and Persnal Harassment Plicy and Prcedure, r culd be seen as an act f harassment n the grunds f age, gender r gender identity (transgender, transsexual), true r perceived sexual rientatin (lesbian, gay, bisexual r hetersexual), marital / civil partnership status, race, ethnic r natinal rigin, disability r religius belief. 7. Accessing, creating, dwnlading, sending, sharing, string, printing and / r displaying any ffensive, bscene, indecent, degrading r menacing images, data r material frm sites cntaining prngraphic r ptentially ffensive materials that culd be cnsidered, by a reasnable persn, t be bscene, racist, sexist, r therwise ffensive when viewed r accessed by a third party r creates an unpleasant envirnment is strictly prhibited. 8. Making fraudulent ffers f prducts, items r services thrugh the use f any Cllege user accunt. 9. Effecting security breaches r disruptins t netwrk cmmunicatin whether n the System r n any third party system. Security breaches include but are nt limited t, the accessing f data f which the user is nt 4

6 an intended recipient r lgging int a server r accunt that the user is nt expressly authrised t access, unless these duties are within the scpe f regular duties. Disruptin may include, but is nt limited t, netwrk sniffing, pinged flds, packet spfing, denial f service and frged ruting infrmatin fr malicius purpses. 10. Prt scanning r security scanning is expressly prhibited, see sectin 5.3 Exemptins. 11. Executing any frm f netwrk mnitring which will intercept data nt intended fr the user s cmputer. 12. Circumventing user authenticatin r security f any hst, netwrk r accunt. 13. Using any prgram / script / cmmand fr sending messages f any kind with the intent t interfere with r disable a user s terminal sessin r the services f any server. 14. String n Cllege ICT equipment f data / materials subject t legal r cpyright laws, e.g. MP3s. 15. Yu are respnsible fr prviding prf f the legality f any data / material yu stre n Cllege ICT Equipment which is required fr business use. Ultimately, the Cllege is respnsible fr the System and reserves the right t remve data when necessary. 5.3 Exemptins Certain categries f users may be exempted frm any r all f these restrictins during the curse f their legitimate jb respnsibilities r apprved Studies in a cntrlled envirnment and in cnsultatin with the Cllege ICT Services. Prviding any data / materials used des nt breach cpyright r sftware licencing laws. 5.4 Electrnic Cmmunicatins Unacceptable Use The fllwing list prvides guidance as t which activities cnstitute unacceptable use f the System fr and cmmunicatins. The list is illustrative nly and is nt exhaustive. 1. Sending any s which are knwn t have viruses cntained within them. 2. Sending messages f an ffensive, bullying, threatening r harassing nature r which cntravene the prvisins f sectin 5 (abve). 3. Sending unslicited messages, including the sending f junk mail r ther advertising material t individuals wh did nt specifically request such material. 4. Subscribing t newsletters ther than fr business purpses. 5. Playing nline internet games r using streaming media fr news, sprts scres r ther nn-business-related real time data streaming. There are specific exceptins fr fficially apprved activities e.g. as part f curriculum delivery. 5

7 6. Transmitting by , retrieving frm the internet r string any cmmunicatin with bscene language r f an bscene, distasteful, ffensive r sexually explicit nature, r which might be judged as such by a reasnable persn. 7. Running a business r any cmmercial activity (ther than the business f the Cllege). 8. Misrepresenting the identity f the sender f an r the surce f an Intercepting, disrupting r altering electrnic cmmunicatins. 10. Any frm f harassment via , telephne r SMS services. 11. Creating r frwarding chain letters r ther pyramid schemes f any type. 12. Psting the same r similar nn-business-related messages t large numbers f Usenet newsgrups (newsgrup spam). 5.5 Use f Micrsft OneDrive As part f the student prvisin, users are als supplied with a strage area called their OneDrive which can be used t stre files and data. Students shuld be aware that any data stred n their OneDrive is subject t mnitring by Micrsft, and any cntent that is in vilatin f Micrsft s Cde f Cnduct is subject t remval and may lead t temprary r permanent shutdwn f the accunt. 5.6 Cpyright Ntice Cllege staff and students shall nt make, stre, transmit r make available unauthrised cpies f cpyrighted material n the Cllege systems, equipment r strage media. 6.0 General Use and Ownership 6.1 Cnfidentiality and Mnitring Whilst the management f the System aims t prvide a reasnable level f privacy, users shuld be aware that the data they create using the System is and remains the prperty f the Cllege. Because f the need t prtect Cllege Systems and als t prtect the Cllege frm the types f risks mentined abve, the Cllege cannt guarantee the cnfidentiality f infrmatin stred r cmmunicated n the System (including persnal strage space n servers). Ultimately the infrmatin which is stred n r transmitted via the System is nt private t the individual user. Accrdingly, users shuld have n reasnable expectatin that persnal r cmmercial infrmatin stred r transferred thrugh the use f the System is r shall remain private. Mnitring f the System will cmply with all UK legislatin including the Regulatin f Investigatry Pwers Act 2000 (RIPA) and the Data Prtectin Act 1998 (DPA). 6

8 6.2 Backups All users shuld be aware that backups are taken at regular intervals fr DR&BC purpses and that any data held in either electrnic r frmat n any f the Servers will be backed up alng with all business data and . Infrmatin deleted frm the System either deliberately r accidentally can be restred frm the backups by ICT Services fllwing a request t d s. 6.3 Mnitring Members f staff shuld be aware that the Cllege is permitted t inspect, mnitr and / r recrd any , internet and strage areas. The Cllege emplys a range f mnitring utilities t lg infrmatin frm which it generates reprts as illustrated in Appendix One. The Cllege may als inspect and strage areas in cnsultatin with a suitable member f the ICT Services, wh will lg the access and prtcls adpted and recrd the data viewed, in accrdance with the prvisins f the Telecmmunicatins (Lawful Business Practice) (Interceptin f Cmmunicatins) Regulatins Specific inspectins are carried ut where such mnitring reveals the likelihd f risk r inapprpriate use. Such inspectins extend t bth current data and backed up data. Mnitring r recrding may be emplyed where it helps t: prevent r detect crime; ascertain whether there are breaches f this r anther Cllege plicy (e.g. Cllege Security Plicy, Persnal Use etc.); ascertain cmpliance with any regulatry requirements; and maintain r secure the effective peratin f the System; The Cllege may als mnitr t ascertain whether a cmmunicatin relates t Cllege business. In additin, the Cllege may recrd r mnitr where it is legally bliged t d s. Where apprpriate, the Cllege may be required t ntify relevant gvernment agencies, the Plice r the Scttish Ministers f any incidents f pssible cncern (e.g. issues f Natinal Security r the accessing f child prngraphy). Reprts can be made available t the varius Cllege Grups and ther designated parties as apprpriate (e.g. Heads f Department / Managers wuld be infrmed if students were dwnlading inapprpriate material fr cntent f study). The Security and IT Asset Management Reprts will be cnfidential t ICT Services and Senir Management Team. 6.4 Persnal Use and Privacy While the Cllege will at all times seek t act apprpriately in its use f mnitring, it reserves the right t blck sites which are being persistently visited by users which have n legitimate business purpse, where it perceives threat r risk t its business activities r where it infringes the acceptable and persnal use plicies. The Cllege will als endeavur t use technical measures t stp misuse as an alternative t mnitring, where it is cnsidered apprpriate t d s. Hwever, 7

9 users shuld be aware that, because mnitring is a recgnised cmpnent f the relatinship between the prvider f the System and the users, there is n legitimate expectatin f privacy when using the System, , Intranet, Extranet and Internet facilities etc. On a practical level, members f staff shuld be aware that, as thers may read s; cnfidential infrmatin shuld nt be sent in this way. Fr guidance purpses nly, examples f reasnable and unacceptable private use are set ut in Appendix Tw. 6.5 Security Cnfidentiality Access t infrmatin cntained within the Cllege ICT related systems shuld be classified as either cnfidential r nt cnfidential as defined by the Cllege s Data Prtectin Officer. Examples f cnfidential infrmatin include but are nt limited t: cmpany strategies, cmpetitr sensitive infrmatin, and student and staff infrmatin held n the central recrds system, specificatins, custmer lists and research data. Users shuld take all necessary steps t prevent unauthrised access t this infrmatin Passwrds Passwrds fr any Cllege system must be kept secure and nt shared. Under n circumstances shuld users (staff and / r students) disclse their passwrd t anyne. N member f staff shuld ask fr anther s (whether staff and / r students ) passwrd. T d s wuld be a breach f the ICT Acceptable Use Plicy and disciplinary prcedures may be instigated. All users are respnsible fr the security f their wn passwrds and accunts. ALL staff users will be prmpted t change their passwrd every 90 days in accrdance with the netwrk s security plicy. Passwrds shuld nt be written dwn and n display fr all t see. Passwrds s discvered will be wiped r remved frm display and reprted t the relevant authrities Secure PC Users shuld ensure their cmputers are secured by lgging ff when the cmputer is unattended r by lcking the cmputer when leaving it unattended fr a shrt time as detailed in the ICT Security and Gvernance Plicy Access t Facilities Access t all cmputer facilities are allwed and enabled nce users have cmpleted a valid enrlment prcess. Students: An SR1 (r ther authrised Student Enrlment Frm), the issue f a Student ID and Card. Staff by authrisatin frm HR t ICT Services Psting/mailings frm a Cllege Address Pstings by users frm a Cllege address shuld cntain a disclaimer (this is applied by Cllege systems by default) stating that the pinins expressed are strictly their wn and nt necessarily thse f the Cllege Threat Management Sftware All cmputers which are cnnected t the Cllege Infrastructure shall run with the Clleges apprved Threat Management Sftware, which must nt be disabled at any time. The nly exceptins t this are if ICT Services need t 8

10 disable the TM sftware fr technical reasns but all reasnable steps must be taken t ensure the security f the Cllege is nt cmprmised Expsure t Unnecessary Risk Users have a respnsibility t ensure that the system is nt expsed t any unnecessary risk, and they must use extreme cautin when pening r attachments as they may be phishing s r cntain viruses, bmbs, malicius cde r ther ptential risks. 6.6 Discipline Access t the System is a facility available nly t authrised users. As with any ther Cllege facility, abuse f these facilities thrugh imprper r unacceptable use in breach f this plicy r therwise may lead t disciplinary actin. Students are bund by the Cllege s Learner Guide: Terms and Cnditins and members f staff are bund by the Cllege s Cde f Cnduct fr Staff. All users f the netwrk are subject t legal cmpliance with varius statutry requirements including but nt limited t the Cmputer Misuse Act 1990, the Cpyright, Design & Patents Act 1988, and the Data Prtectin Act This includes any upgrades, amendments and any new legislatin enacted since the riginal date. Fr the avidance f dubt, a breach f this plicy, and in particular thse parts which relate t the prcessing f persnal infrmatin, may amunt t grss miscnduct. In a case where inapprpriate use is identified r where such use severely impacts upn the perfrmance r appears t pse a risk t the security f the System r upn Cllege services and facilities, r where such misuse is deemed sufficiently serius, a user s accunt may be suspended pending investigatin. 6.7 Mdificatins The Cllege may frm time t time change sme r all f the terms f this plicy r t mdify r discntinue (either temprarily r permanently) the prvisin f the System. Users will be ntified f any such changes where practical. Users d nt have t accept such changes, but if they d nt, the Cllege shall be entitled t withdraw their access t the System where deemed apprpriate. Users agree that the Cllege shall nt be liable t them r t any third party fr any such change, mdificatin r the withdrawal f access t the System. On ccasin fr technical, peratinal r ther reasns, it may als be necessary t terminate services hsted n the System with little r n prir ntice. Users agree that the Cllege shall nt be liable t them r t any third party fr any such terminatin f such services. 6.8 Terminatin f Use Users agree that the Cllege may immediately suspend their use f the System withut prir ntice fr any reasn including, but nt limited t: The Cllege having a reasnable belief that they are r have been in breach f this Plicy; The Cllege being unable t cntinue access t the System r any services hsted n the System, due t cntractual, ecnmic, technical r peratinal reasns; r, 9

11 In the event f the Cllege receiving intimatin f a user s withdrawal frm a curse r the terminatin f emplyment. In the event f terminatin, the Cllege will give users such ntice f terminatin as is reasnably practicable. 6.9 Exclusins and Limitatins Access t the System and t services hsted by the Cllege is prvided n an as is and as available basis. N cnditins, warranties r ther terms are made r given by the Cllege in respect f access t the System. Further, the Cllege can make n guarantee that the services ffered n the System will meet users requirements; that it will be interruptin r bug free; timely r ultimately secure. The Cllege accepts n respnsibility fr any unintentinal deletin r failure t prperly stre any data r messages n users behalf and accepts n respnsibility fr any csts r damages arising frm any interruptin, suspensin f, withdrawal f r terminatin f the services n the System. All users understand and agree that any material and/r data dwnladed r therwise btained, thrugh remte access and use f r frm the System, is dne at their wn risk and that they will be slely respnsible fr any damage t their wn cmputer system r fr any lss f data that may ccur as a result. The Cllege shall nt be liable fr any direct, indirect r cnsequential lss r damages resulting frm the use r inability t use the System. These terms and cnditins represent the entire agreement between users and the Cllege and supersede any prir agreements, arrangements r representatins made by either party relating t access t the System. 7.0 Mdificatins The Cllege reserves the right, frm time t time change sme r all f the terms f this plicy r mdify r discntinue (either temprarily r permanently) the prvisin f any systems r equipment. The Cllege will make every effrt t infrm users f said changes t this plicy thrugh the mst apprpriate means available as sn as is practicable. 8.0 Other Relevant Plicies and Prcedures The Cllege has a number f plicies and prcedures in place which aim t supprt the cnditins fr acceptable use f the System. These are regularly reviewed in light f changes in legislatin and current gd practice: 1. Use f Scial Media Plicy 2. Equality and Diversity Plicy 3. ICT and Infrmatin Security Plicy 4. Cde f Cnduct Plicy 5. Disciplinary Plicy and Prcedure 10

12 User Undertaking I have read, understd and agree t abide by and t have my access t and use f the System regulated by the freging plicy statements. Signature:. Please PRINT name in blck capitals.. If signed n behalf f a student user please PRINT the student user s name in BLOCK CAPITALS (See nte belw)... Date:... [In sme instances a parent r legal guardian may be asked t sign where a student user is under 16 years f age, thereby making the parent r guardian respnsible fr the actins f the student.] 11

13 Appendix One: Examples f Reprts Generated Frm Autmated Mnitring Of Netwrk Usage The Cllege uses unbtrusive mnitring sftware that enables reprting in the fllwing areas: Web Blcker/filter Reprts: Tp 20 Reprt shwing the tp 20 Dmains visited by users Blcked URL Attempts shwing users wh have attempted t access blcked URLs Cntent Management: Inapprpriate cntent reprt t identify inapprpriate cntent (e.g. Prngraphy) the lcatin f the file, and the user wh created it Scan Reprt check fr specific categries f files such as MP3s; JPGs; ISOs; MOV; AVI and any ther as deemed necessary. This list is nt exhaustive and is given as guidance nly (which has a majr impact n legal liability, cpyright and strage capacity) Security Reprts: File Scan fr Threats Reprt shwing files psing a danger t netwrk security Threat Alerts which autmatically alerts Netwrks Services when an identifiable threat has been intrduced nt any cmpnent f the netwrk IT Asset Management: Installed Sftware Summary shwing all installed sftware n a particular machine Operating System Summary shwing all installed perating systems, serial numbers and service packs Hardware/Sftware changes shwing these changes ver a given perid Machine Cnfiguratin shwing an verview f each machine s installed sftware, hardware and summary f disk usage Filter (t blck inapprpriate cntent and spam): Biggest s sent Largest vlume f sent Mst s received Mst sent SPAM summary The Cllege rutinely generates these and ther netwrk activity reprts t ensure that users are cmplying with Cllege plicies and prcedures and t enable the Cllege t safeguard itself and the System against knwn and perceived threats, inapprpriate r malicius use by users r users deliberately r inadvertently acting in a manner which breaches Cllege plicies as detailed in sectin

14 Appendix Tw: Reasnable and Unacceptable Persnal Use Guidelines The fllwing details Cllege plicy fr users n what is cnsidered t be reasnable persnal use and what is cnsidered unacceptable persnal use f ICT systems. This is nt an exhaustive list. The Cllege takes the view that persnal use shuld be within reasn and that it shuld nt be abused t the detriment f an individual s wrk utputs. Use f the System fr persnal purpses shuld therefre be limited t nn-wrking hurs. Staff: Acceptable Persnal Use Unacceptable Persnal Use Staff and Students: Access t sites relevant t curriculum area f team. Accessing sites f persnal interest ut with nrmal wrking hurs r during lunch breaks. Dwnlad f licenced r nn-cpyright materials relevant t curriculum area f team. Use f facilities in curse f Cllege duties and respnsibilities. Use f the internet t gain experience f mdern business / cmmerce purpses / practice i.e. Persnal . Internet purchases; nline travel bkings / banking (Fife Cllege cannt guarantee the security f credit card infrmatin which may be accessible). Students: Accessing sites which are relevant t curse f study and timetabled activities. Accessing materials relevant t curse f study / subject area / timetabled activities. Accessing r dwnlading materials frm sites cntaining prngraphic r ptentially ffensive images. Dwnlading any cpyright r unlicenced materials which infringe the law and / r expse the Cllege t risk. Sending cmmunicatins cntaining ffensive, abusive, harassing r threatening language r images. Use f chat lines. Frwarding r distributing items f junk via mail facility. Frwarding f inapprpriate material which wastes time. Strage f nn-business-related and persnal files and details. Cmmitting the Cllege t anything which incurs unauthrised cst r any unauthrised subscriptin t paid fr services. Use f facilities relevant t curse f study / subject area / timetabled activities in rder t facilitate effective cmmunicatin between classmates. 13

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5 Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information

How To Ensure That The Internet Is Safe For A Health Care Worker

How To Ensure That The Internet Is Safe For A Health Care Worker POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

Meopham School Information Technology Code of Conduct

Meopham School Information Technology Code of Conduct 1. Intrductin Infrmatin technlgy resurces are essential fr accmplishing Mepham Schl s missin f pursuing excellence in teaching and learning, research and cmmunity service. Members f the Schl cmmunity are

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

LINCOLNSHIRE POLICE Policy Document

LINCOLNSHIRE POLICE Policy Document LINCOLNSHIRE POLICE Plicy Dcument 1. POLICY IDENTIFICATION PAGE POLICY TITLE: ICT CHANGE & RELEASE MANAGEMENT POLICY POLICY REFERENCE NO: PD 186 POLICY OWNERSHIP: ACPO Cmmissining Officer: Prtfli / Business-area

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

Technical Writing - TheUsers Visa (SHR User Accunt)

Technical Writing - TheUsers Visa (SHR User Accunt) POLICY Number: 7311-25-004 Title: Saskatn Health Regin User Accunt Plicy Authrizatin [ ] President and CEO [X] Vice President, Finance and Crprate Services Surce: Directr, Infrmatin Technlgy Services Crss

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Heythrop College Disciplinary Procedure for Support Staff

Heythrop College Disciplinary Procedure for Support Staff Heythrp Cllege Disciplinary Prcedure fr Supprt Staff Intrductin 1. This prcedural dcument des nt apply t thse academic-related staff wh are mentined in the Cllege s Ordinance, namely the Librarian and

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc. HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine Title: Identity Theft Prgram Effective Date: July 2009 NYU Langne Medical Center NYU Hspitals Center NYU Schl f Medicine POLICY It is the plicy f the NYU Langne Medical Center t educate and train staff

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 8 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk The Bard f Educatin recgnizes as new technlgies shift the manner in which infrmatin is

More information

To clarify terms used within these policies, the following definitions are provided:

To clarify terms used within these policies, the following definitions are provided: Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail

More information

Information & Communications Technology ICT Security Compliance Guide (Student)

Information & Communications Technology ICT Security Compliance Guide (Student) Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0

More information

TITLE: Supplier Contracting Guidelines Process: FIN_PS_PSG_050 Replaces: Manual Sections 6.4, 7.1, 7.5, 7.6, 7.11 Effective Date: 10/1/2014 Contents

TITLE: Supplier Contracting Guidelines Process: FIN_PS_PSG_050 Replaces: Manual Sections 6.4, 7.1, 7.5, 7.6, 7.11 Effective Date: 10/1/2014 Contents TITLE: Supplier Cntracting Guidelines Prcess: FIN_PS_PSG_050 Replaces: Manual Sectins 6.4, 7.1, 7.5, 7.6, 7.11 Cntents 1 Abut university supplier cntracting... 2 2 When is a cntract required?... 2 3 Wh

More information

The information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice.

The information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice. Privacy Plicy Terms f Service: The fllwing terms and cnditins gvern all use f the Rightwaywebhsting.cm website and all cntent, services and prducts available at r thrugh the website (taken tgether, the

More information

CHANGE MANAGEMENT STANDARD

CHANGE MANAGEMENT STANDARD The electrnic versin is current, r when printed and stamped with the green cntrlled dcument stamp. All ther cpies are uncntrlled. DOCUMENT INFORMATION Descriptin Dcument Owner This standard utlines the

More information

How To Write A Scial Media Plicy

How To Write A Scial Media Plicy Scial Media Plicy Scial Media Plicy Recrd Number D14/78 Respnsible Manager Directr Business Supprt and Strategy Manager Custmer and Cmmunicatins Last reviewed 11 February 2014 Adptin reference Cuncil Reslutin

More information

Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117

Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ 07644-2117 Cmputer Use Plicy Intrductin - In supprt f Felician Cllege's missin f teaching and public service, the Infrmatin Technlgy

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs

More information

CENTURIC.COM ONLINE DATA BACKUP AND DISASTER RECOVERY SOLUTION ADDENDUM TO TERMS OF SERVICE

CENTURIC.COM ONLINE DATA BACKUP AND DISASTER RECOVERY SOLUTION ADDENDUM TO TERMS OF SERVICE CENTURIC.COM ONLINE DATA BACKUP AND DISASTER RECOVERY SOLUTION ADDENDUM TO TERMS OF SERVICE This Agreement, named the Online Data Backup and Disaster Recvery Slutin Addendum t Centuric s Terms f Service

More information

Privacy and Security Training Policy (PS.Pol.051)

Privacy and Security Training Policy (PS.Pol.051) Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider

More information

Woodstock Multimedia, INC. Software/Hardware Usage Policy

Woodstock Multimedia, INC. Software/Hardware Usage Policy Wdstck Multimedia, INC. Sftware/Hardware Usage Plicy POLICY PURPOSE The purpse f the Wdstck Multimedia, INC. Sftware / Hardware Usage Plicy is t ensure that Wdstck Multimedia, INC. emplyees are prperly

More information

Texas Woman's University University Policy Manual

Texas Woman's University University Policy Manual Texas Wman's University University Plicy Manual Plicy Name: Plicy Number: 6.06 Date Passed: July 2004 Health Insurance Prtability& Accuntability Act (HIPAA) Date Reviewed: September 2008 Next Review: September

More information

General Records Authority 33. Accredited Training

General Records Authority 33. Accredited Training General Recrds Authrity 33 2012/00579704 Accredited Training February 2013 This is an accurate reprductin f the authrised recrds authrity cntent, created fr accessibility purpses CONTENTS INTRODUCTION

More information

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format.

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format. Municipal Service Cmmissin Gerald P. Cle Frederick C. DeLisle Thmas M. Kaul Gregry L. Riggle Stanley A. Rutkwski Electric, Steam, Water Cable Televisin and High Speed Internet Service since 1889 Melanie

More information

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010 OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity

More information

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service. FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept

More information

Information Security Policy

Information Security Policy Purpse The risk t Charlestn Suthern University, its emplyees and students frm data lss and identity theft is f significant cncern t the University and can be reduced nly thrugh the cmbined effrts f every

More information

OUR DISCIPLINARY POLICY

OUR DISCIPLINARY POLICY OUR DISCIPLINARY POLICY WHO is this plicy fr? Channel 4 emplyees wh ve passed their prbatinary perid Channel 4 managers This plicy des nt frm part f any emplyee s cntract f emplyment and we may amend it

More information

Service Level Agreement

Service Level Agreement Template SDSU-TPL-11085 v1.3 18/1/11 IT Services Service Level Agreement Staff Email and SMTP Accunts (EMSF) Versin: 0.1 01/11/2010 Service Level Agreement: Staff Email and SMTP Accunts (EMSF) Cntents

More information

ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY. Approved by Governing Body on: 6 th May 2015

ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY. Approved by Governing Body on: 6 th May 2015 ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY Gvernrs Cmmittee: Finance and General Purpses Apprved by Gverning Bdy n: 6 th May 2015 Signed: (Chair f Cmmittee) Signed: (Headteacher) Date t be

More information

THIRD PARTY PROCUREMENT PROCEDURES

THIRD PARTY PROCUREMENT PROCEDURES ADDENDUM #1 THIRD PARTY PROCUREMENT PROCEDURES NORTH CENTRAL TEXAS COUNCIL OF GOVERNMENTS TRANSPORTATION DEPARTMENT JUNE 2011 OVERVIEW These prcedures establish standards and guidelines fr the Nrth Central

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

RQ10.06 AACo Share Trading Policy

RQ10.06 AACo Share Trading Policy Australian Agricultural Cmpany Limited ACN 010 892 270 RQ10.06 AAC Share Trading Plicy Versin 5 This plicy was apprved by the Bard f Australian Agricultural Cmpany Limited n 15 December 2010. This plicy

More information

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...

More information

Process of Setting up a New Merchant Account

Process of Setting up a New Merchant Account Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am

More information

Employees - recruitment, records and monitoring

Employees - recruitment, records and monitoring Emplyees - recruitment, recrds and mnitring This guidance has been prduced t help rganisatins cmply with the Data Prtectin Act (DPA) when recruiting and emplying wrkers. It is relevant t public sectr emplyers,

More information

CORPORATE CREDIT CARD POLICY

CORPORATE CREDIT CARD POLICY TITLE: POLICY OWNERS: DATE INSTITUTED: May 1, 2008 CURRENT VERSION: Ver. 1.6 REVISION DATE: July 1, 2015 Crprate Credit Card Plicy Melissa Cluse, Vice President & Cntrller Cindy Klein, Accunts Payable

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

Public consultation paper

Public consultation paper Public cnsultatin paper Nvember 2012 Public cnsultatin n guidelines fr prfessinal indemnity insurance arrangements fr nurses and nurse practitiners. Please prvide feedback by email t: nmbafeedback@ahpra.gv.au

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices This is being prvided t yu as a requirement f the privacy regulatins issued under the Health Insurance Prtability and Accuntability Act f 1996 (HIPAA). This ntice describes hw HROSM may use and disclse

More information

HP ValuPack Consulting Description OpenVMS Replacement Software Distribution Kit

HP ValuPack Consulting Description OpenVMS Replacement Software Distribution Kit HP ValuPack Cnsulting Descriptin OpenVMS Replacement Sftware Distributin Kit HP ValuPacks are standardized cnsulting services, prvided by HP Cntact Center Service prfessinals, with pre-defined custm deliverables

More information

Cyber Security: Simulation Platform

Cyber Security: Simulation Platform Service Overview The Symantec Cyber Security: Simulatin Platfrm is a Web hsted Service with immersive and hands-n access t cyber exercises fr ffensive (red team) events, inspired by real-life security

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet

More information

New York Institute of Technology Faculty and Staff Email Retention Policy

New York Institute of Technology Faculty and Staff Email Retention Policy New Yrk Institute f Technlgy Faculty and Staff Email Retentin Plicy Nvember 2013 I. PURPOSE As electrnic mail (email) has becme the primary frm f cmmunicatin at NYIT and thrughut the wrld, the vlume f

More information

Software and Hardware Change Management Policy for CDes Computer Labs

Software and Hardware Change Management Policy for CDes Computer Labs Sftware and Hardware Change Management Plicy fr CDes Cmputer Labs Overview The cmputer labs in the Cllege f Design are clsely integrated with the academic needs f faculty and students. Cmputer lab resurces

More information

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

DATE APPROVED March 2011. Version Date Comments / Changes 1.0 March 2011 Initial policy released

DATE APPROVED March 2011. Version Date Comments / Changes 1.0 March 2011 Initial policy released Page 1 f 11 APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial plicy released 1. PURPOSE OF THIS POLICY T define the purpses fr which Crprate Purchase Cards are t be used

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

HEAL-Link Federation Higher Education & Research. Exhibit 2. Technical Specifications & Attribute Specifications

HEAL-Link Federation Higher Education & Research. Exhibit 2. Technical Specifications & Attribute Specifications HEAL-Link Federatin Higher Educatin & Research Exhibit 2 Technical Specificatins & Attribute Specificatins Trust Relatinship Trust relatinship amng the federatin, federatin members and federatin partners

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

HP ValuPack Consulting Description OpenVMS Engineering Change Order (ECO) Patch List

HP ValuPack Consulting Description OpenVMS Engineering Change Order (ECO) Patch List HP ValuPack Cnsulting Descriptin OpenVMS Engineering Change Order (ECO) Patch List HP ValuPacks are standardized cnsulting services, prvided by HP Slutin Center Service Prfessinals, with pre-defined custm

More information

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Audit Cmmittee Charter St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Versin 2.0, 22 February 2016 Apprver Bard f Directrs St Andrew

More information

HCHS Student ipad User Agreement

HCHS Student ipad User Agreement HCHS Student ipad User Agreement Schl ipad Initiative Hancck Cunty High Schl has initiated a 1:1 ipad prgram fr students and teachers in an effrt t embrace 21st Century Skills. Students will be using ipads

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

Examples of conduct which may lead to disciplinary sanction under the Disciplinary Procedure may include but are not limited to the following:

Examples of conduct which may lead to disciplinary sanction under the Disciplinary Procedure may include but are not limited to the following: Status: Plicy - verall statement f the psitin, intentin and directin f the rganisatin anchred in the values and principles f the rganisatin Title: Disciplinary Prcedure (includes Appeals Prcedure) Plicy

More information

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT 1 FERRIS STATE UNIVERSITY SCHOOL f NURSING CODE f CONDUCT The Schl f Nursing (SON) at Ferris State University uphlds the University Cde f Student Cnduct and the American Nurses Assciatin Cde f Ethics.

More information

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin

More information

SaaS Listing CA Cloud Service Management

SaaS Listing CA Cloud Service Management SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters

More information

Audit Committee Charter

Audit Committee Charter Audit Cmmittee Charter Membership The Audit Cmmittee (the "Cmmittee") f the Bard f Directrs (the "Bard") f Philip Mrris Internatinal Inc. (the "Cmpany") shall cnsist f at least three directrs all f whm

More information

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t

More information

NHVAS Mass Management Spot Check Checklist

NHVAS Mass Management Spot Check Checklist Legal Entity Name f NHVAS Operatr: DTMR Representative: Lcatin: NHVAS Mass Management Spt Check Checklist Spt Check Date: Spt Check Number: DMS Number: 540/ The fllwing surces f evidence have been identified

More information

We will record and prepare documents based off the information presented

We will record and prepare documents based off the information presented Dear Client: We appreciate the pprtunity f wrking with yu regarding yur Payrll needs. T ensure a cmplete understanding between us, we are setting frth the pertinent infrmatin abut the services that we

More information

How To Ensure Your Health Care Is Safe

How To Ensure Your Health Care Is Safe Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

CHARTER OF THE COMPENSATION COMMITTEE OF THE BOARD OF DIRECTORS OF UPLAND SOFTWARE, INC.

CHARTER OF THE COMPENSATION COMMITTEE OF THE BOARD OF DIRECTORS OF UPLAND SOFTWARE, INC. CHARTER OF THE COMPENSATION COMMITTEE OF THE BOARD OF DIRECTORS OF UPLAND SOFTWARE, INC. PURPOSE The purpse f the Cmpensatin Cmmittee f the Bard f Directrs (the Bard ) f Upland Sftware, Inc. (the Cmpany

More information

Symantec User Authentication Service Level Agreement

Symantec User Authentication Service Level Agreement Symantec User Authenticatin Service Level Agreement Overview and Scpe This Symantec User Authenticatin service level agreement ( SLA ) applies t Symantec User Authenticatin prducts/services, such as Managed

More information

SPECIAL CONDITIONS OF SUBSCRIPTION TO DIGITAL CABLE TELEVISION SERVICES OF IPKO TELECOMMUNICATIONS LLC

SPECIAL CONDITIONS OF SUBSCRIPTION TO DIGITAL CABLE TELEVISION SERVICES OF IPKO TELECOMMUNICATIONS LLC SPECIAL CONDITIONS OF SUBSCRIPTION TO DIGITAL CABLE TELEVISION SERVICES OF IPKO TELECOMMUNICATIONS LLC Article 1 Cntents f the Special Cnditins 1.1 These Special Cnditins gvern the rights, bligatins and

More information