Jane Tallitsch. Paul Kuehnert, Health Department DATE: September 29, 2009 SUBJECT: TITLE: Documents needing legal evaluation. Theresa Heaton x85149

Size: px
Start display at page:

Download "Jane Tallitsch. Paul Kuehnert, Health Department DATE: September 29, 2009 SUBJECT: TITLE: Documents needing legal evaluation. Theresa Heaton x85149"

Transcription

1 Kane County Health Department Paul Kuehnert, MS, RN Executive Director Public Health Center 1240 N. Highland Avenue Aurora, Illinois Public Health Center 1330 N. Highland Avenue Aurora, Illinois Public Health Center 113 S. Grove Avenue Elgin, Illinois TO: FROM: Jane Tallitsch MEMO Paul Kuehnert, Health Department DATE: September 29, 2009 SUBJECT: TITLE: CONTACT: X Documents needing legal evaluation 1. DCFS Site Assessment for Partner 2. Virtual Private Network Usage Agreement Theresa Heaton x85149 REVIEW AND COMMENT ONLY. Contract/Grant/Agreement requ1r1ng Karen McConnaughay's signature. Need to have returned by ASAP. *Please return to Diane Roop - Aurora Health - after review for Paul Kuehnert signature.

2 Kane County Health Department DOCUMENT VET SHEET for Karen McConnaughay Chairman, Kane County Board Name of Document: 1. DCFS Site Assessment for Partner 2. Virtual Private Network Usage Agreement Submitted by: Date Submitted: _P~a:!.!:u~I.!.!K!:!:ue:::.:h.!.!.n!.!:e:.!..:rt~ """"'9~/..!:2~9/r:...::0~9 Examined by: (Signature) (Date) Comments: As Lead Agency for the Healthworks Program, this agreement allows the Health Dept. access to the DCFS computer system to assign and record Medical Case Management Agencies, primary care providers, and health-related data on DCFS children in our area. Chairman signed: No Date: I a... :;Jd -d?' Return document to " Diane Roop, KCHD-1240 N. Highland Ave., Ste. 21, Aurora Rev 08/09

3 From: Blixt, Harland Sent: Monday, September 14, :41 PM To: HealthWorks; rock -island. il. us; Cc: Champagne, Vincent; Bradshaw, Stephen Subject: Connecting Healthworks Lead Agencies to the DCFS System Healthworks Lead Agencies: Your agency has been contracted as the Healthworks Lead Agency for your area. As the Lead Agency, you will need to have access to the DCFS computer systems to assign/record Medical Case Management Agencies, primary care providers, and otherwise enter health-related data on DCFS children in your geographic area. Access is also provided to the DCFS confidential system. Assuming your agency already uses some type of high speed Internet service, there is no cost to your agency for this access. There are a couple of steps involved in getting you this access. First, we need to set up your agency on our system. There are 2 forms attached that must be completed and returned in order for DCFS to grant your site this access. These forms include the Site Assessment for Partner form and the Illinois DCFS Virtual Private Network (VPN) Usage Agreement for Partners. The Site Assessment form gives DCFS the information needed to create a connection with your own system, including address, site contacts, number of users and the type of Internet connections you are currently using. You will probably need to involve your IT person in completing this form. This can be returned electronically to Harland Blixt at harland.blixt@illinois.gov or by fax at Once this is received, you will be contacted by a DCFS network analyst to assist you with site connection to the DCFS system. The VPN Usage Agreement must be read, completed and signed by your agency director or manager and then faxed to Harland Blixt at It will allow us to connect your agency users to the DCFS network via VPN access after we receive their individual user creation requests. Once these forms have been received and the site process has begun, you will be contacted with information on how to create DCFS accounts for your individual workers who will be utilizing the system. If you have any questions about this process for conversion to the DCFS computer system, please contact Harland Blixt via at harland.blixt@illinois.gov or by phone at If you have questions about the ehealth program itself, contact Vince Champagne at Harland BliXt DRS PUS/Training Uaison ; PRIVILEGED AND CONFIDENTIALITY NOTICE: This (and/or the documents accompanying such) may contain privileged/confidential information. Such information is intended only for the use of the individual or entity above. If you are not the named or intended recipient, you are hereby notified that any disclosure, copying, distribution, or the taking of any action in reliance on the contents of such information is strictly prohibited. If you have received this transmission in error, please immediately notify the sender by telephone to arrange for the secure return of this document.

4 Date: SITE ASSESSMENT for EXTERNAL BUSINESS PARTNER Site Code: CURRENT INFORMATION Agency Name: Kane County Health Department Street Address: 1240 N. Highland Avenue City: Aurora Zip Code: Main Phone Number: SITE CONTACTS Primary Site Contact Name: Diane Ritter Phone: Fax: Secondary Site Contact Name: Elba Salazar Phone: Fax: Technical Contact Name: Diane Ritter Phone: Fax: How many total users at the above-noted site will require access to DCFS applications? 4 Estimate the number of concurrent users that will be accessin the DCFS a lications. 4 NETWORK INFORMATION What type of Internet connection does your site use? 0 DSL 0 Broad-band cable 0 Fractional T1 [:8] Internet Connection via network 0 Other What is the speed of your Internet connection? 500Mbps Does Internet bound traffic traverse through your corporate office first or is it direct from your site? Through corporate office first Please describe and sketch your network layout to the Internet. (Include other sites, switches, firewalls, and routers.) Attached provided by Kane County Information Technology Department. COMMENTS For questions, call Harland Blixt Return to Harland Blixt- Fax# or via to Harland.Biixt@illinois.gov

5 JO)(JF~ lllinois Department of Children & Family Services Illinois DCFS Virtual Private Network (VPN) Usage Agreement for Partners This DCFS Virtual Private Network (VPN) Partner Usage Agreement, herein referred to as Usage Agreement, is by and between the Illinois Department of Children and Family Services, herein referred to as DCFS, and: Partner Name: Partner Principal Address: Partner Mailing Address: Kane County Health Department 1240 N. Highland Avenue Aurora, IL N. Highland Avenue Aurora, IL Herein referred to as External Business Partner ABIDE BY EXISTING CONTRACTS AND POLICIES Partner agrees to abide by the usage policies of their existing Provider contract, usage policies of the State of Illinois Department of Children and Family Services, the State of Illinois Department of Central Management Services and the State of Illinois. INSTALLATION, DISTRIBUTION AND MANAGEMENT Partner will only install the DCFS provided VPN client software and configuration files to and use from a device with up-to-date anti-virus software, host-based firewall software, and latest operating system updates. If VPN access is installed on and used through a privately owned device, the Agency agrees to ensure that the device has up-to-date anti-virus software, host-based firewall software, and latest operating system updates. Also, if an Agency employee utilizes a privately owned device, the Department prohibits transferring or downloading any confidential information onto personal computer or . Partner consents to a scan of the device being used for DCFS VPN access to determine if listed components are present and to determine if any malicious software is installed. The output of this scan will determine the connecting device's compliance posture and will affect the access granted to DCFS shared resources. Partner also consent to accepting and installing software upgrades at DCFS direction either manually or automatically in order to mitigate issues which may arise in the VPN client software or to improve DCFS VPN functionality, performance or security. Partner understands distribution of DCFS provided VPN software is restricted by its author, Cisco Systems Incorporated, by this Usage Agreement and that DCFS VPN software and its underlying encryption routines are export-restricted by the United States Government. Partner will not allow its use or distribution, in whole or in part, by another public or private entity and agrees to hold DCFS harmless for any adverse effects to their network and/or the computer used for DCFS VPN access. PLEASE FAX THIS USAGE AGREEMENT TO (217) DCFS OITS Network Services VPN Usage Agreement draft v3.1

6 USAGE AND. MONITORING The Partner agrees that DCFS VPN functionality is for use solely to connect to DCFS networked resources in support of their contracted status as an agent of DCFS, as an agent acting on behalf of DCFS, or as an agent acting pursuant to legislative mandate under legislative authority. If the contracted status of an Partner changes, the Partner agrees to discontinue use of DCFS VPN and to delete any DCFS-provided software and configuration files related to VPN. The Partner also agrees to notify OITS within 24 hours of an employee's departure from the Agency. When using VPN, it is the Partner's responsibility to take reasonable and customary steps to enforce compliance and to govern and to protect its use. Partner agrees to allow its DCFS VPN connections to be monitored and logged and understands downloading or uploading copyrighted material and distributing it in any way is prohibited. DCFS logins and passwords will only be used to access DCFS shared resources and the Partner will not allow publishing or sharing of DCFS logins or passwords and will safeguard their DCFS VPN access privileges and components from any unauthorized use. The External Business Partner agrees that violation of this Usage Agreement may result in disabling remote access privileges, termination of Provider contract, and other legal action. Installation and use of configured DCFS provided VPN client software demonstrates that the Partner has read and understands the conditions under which DCFS VPN software my be used to access DCFS shared resources. Please direct questions to your immediate management or to the DCFS OITS Help Desk at Do not sign and return this Usage Agreement until questions about portions you may not understand. you have read, understand and consent to be bound you have received answers to By your signature you indicate by this Usage Agreement. Partner Signature: Date: PLEASE PRINT Name: Title: Telephone: Fax: Address: Paul Kuehnert Executive Director (630) (630) PLEASE FAX THIS USAGE AGREEMENT TO (217) DCFS OITS Network Services VPN Usage Agreement draft v3.1

7 Page 1 of 1 Juniper SSG 550 FlreV\60 Juniper ISG 2000 FlreWlllnDP Internal Ne!WJrk Heellh Department file://c:\documents and Settings\phddsr\Local Settings\ Temporary Internet Files\Content.Outlook\N7V A... 9/30/2009

(f;;l-- Kane County Health Department DOCUMENT VET SHEET. for Karen McConnaughay Chairman, Kane County Board

(f;;l-- Kane County Health Department DOCUMENT VET SHEET. for Karen McConnaughay Chairman, Kane County Board Kane County Health Department DOCUMENT VET SHEET for Karen McConnaughay Chairman, Kane County Board Name of Document: _Chicago State University _ Department of Nursing Affiliating Agreement Submitted by:

More information

If you contact us orally, we may require that you send us your complaint or question in writing within 10 business days.

If you contact us orally, we may require that you send us your complaint or question in writing within 10 business days. Please read the 1 st Equity Bank Online Banking Service Agreement and Disclosure. It includes disclaimers of liability and other matters of interest to users. By pressing the ''I Agree'' button, you agree

More information

Online (Internet) Banking Agreement and Disclosure

Online (Internet) Banking Agreement and Disclosure Online (Internet) Banking Agreement and Disclosure This Online (Internet) Banking Agreement and Disclosure ( the Agreement") explains the terms and conditions governing the basic Online Banking services

More information

Access to Electronic Health Records Policy Franciscan Health System

Access to Electronic Health Records Policy Franciscan Health System Access to Electronic Health Records Policy Franciscan Health System PURPOSE: The purpose of the Access to Electronic Health Records Policy ( EHR Policy ) is to establish processes and procedures for permitting

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

Memorandum. 1. Introduction

Memorandum. 1. Introduction Memorandum To: Mississippi Government IT Directors and Purchasing Agents From: Craig P. Orgeron, Ph.D. Date: April 22, 2015 (Revised June 29, 2015) Re: Security Assessment Services RFP No. 3735 Instructions

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

ACCESS TO ACCOUNTS VIA THE INTERNET.

ACCESS TO ACCOUNTS VIA THE INTERNET. Internet Banking Service Agreement Terms and Conditions This Internet Banking Services Agreement Terms and Conditions (Agreement) between you and Glacier Bank govern the use First Security Bank, a Division

More information

Number: 08.04 NETWORK SECURITY

Number: 08.04 NETWORK SECURITY NETWORK SECURITY December 2003 TABLE OF CONTENTS 1 INTRODUCTION... 1 1.1 NETWORK SECURITY OVERVIEW... 1 1.2 EXCLUSIONS... 1 1.3 COMMENTS AND SUGGESTIONS... 1 2 NETWORK SECURITY RESPONSIBILITIES... 3 2.1

More information

ACCESS TO ELECTRONIC HEALTH RECORDS AGREEMENT

ACCESS TO ELECTRONIC HEALTH RECORDS AGREEMENT ACCESS TO ELECTRONIC HEALTH RECORDS AGREEMENT THIS AGREEMENT ( Agreement ) is made and entered into this day of, 20, by and between Franciscan Health System ( Hospital ), and ( Community Partner ). RECITALS

More information

PLEASE READ THIS AGREEMENT CAREFULLY AND KEEP A COPY FOR YOUR RECORDS.

PLEASE READ THIS AGREEMENT CAREFULLY AND KEEP A COPY FOR YOUR RECORDS. PLEASE READ THIS AGREEMENT CAREFULLY AND KEEP A COPY FOR YOUR RECORDS. Farmers & Merchants Savings Bank Online Banking Agreement 1. The Service. In consideration of the Online Banking services (hereinafter

More information

BUSINESS ONLINE BANKING AGREEMENT

BUSINESS ONLINE BANKING AGREEMENT BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank

More information

Franciscan University of Steubenville Information Security Policy

Franciscan University of Steubenville Information Security Policy Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,

More information

SAO Remote Access POLICY

SAO Remote Access POLICY SAO Remote Access POLICY Contents PURPOSE... 4 SCOPE... 4 POLICY... 4 AUTHORIZATION... 4 PERMITTED FORMS OF REMOTE ACCESS... 5 REMOTE ACCESS USER DEVICES... 5 OPTION ONE: SAO-OWNED PC... 5 OPTION TWO:

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement Liberty National Bank Online Banking Agreement ONLINE BANKING / BILL PAYING AGREEMENT 1. The Services: Use of Liberty National Bank's Online Banking Services requires at least

More information

Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government

Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government Department of Information Technology Remote Access Audit Final Report January 2010 promoting efficient & effective local government Background Remote access is a service provided by the county to the Fairfax

More information

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI Office of Regulatory Compliance 13001 E. 17 th Place, Suite W1124 Mail Stop F497 Aurora, CO 80045 Main Office: 303-724-1010 Main Fax: 303-724-1019 HIPAA Policy 7.1 Title: Source: Prepared by: Approved

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

New York State Office Of Children And Family Services VPN

New York State Office Of Children And Family Services VPN CLIENT VPN New York State Office Of Children & Family Services New York State Office of Children & Family Services (OCFS) Client Virtual Private Network (VPN) Access to the Human Services Enterprise Network

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

Sample Policies for Internet Use, Email and Computer Screensavers

Sample Policies for Internet Use, Email and Computer Screensavers Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies

More information

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of

More information

Terms and Conditions of Use - Connectivity to MAGNET

Terms and Conditions of Use - Connectivity to MAGNET I, as the Client, declare to have read and accepted the terms and conditions set out below for the use of the network connectivity to the Malta Government Network (MAGNET) provided by the Malta Information

More information

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

MIDDLESEX SAVINGS BANK ONLINE BANKING AGREEMENT

MIDDLESEX SAVINGS BANK ONLINE BANKING AGREEMENT MIDDLESEX SAVINGS BANK ONLINE BANKING AGREEMENT 1. Online Banking This Agreement made between you and Middlesex Savings Bank (the "Bank") governs the use of Online Banking services (the "Service"). The

More information

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3 Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

HOSTING SERVICES ADDENDUM TO MASTER SOFTWARE LICENCE AGREEMENT

HOSTING SERVICES ADDENDUM TO MASTER SOFTWARE LICENCE AGREEMENT HOSTING SERVICES ADDENDUM TO MASTER SOFTWARE LICENCE AGREEMENT Last Updated: 10 June 2015 This Hosting Services Addendum to the Master Software Licence Agreement ( Addendum ) will only apply to the extent

More information

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed

More information

REQUESTING ORGANIZATION INFORMATION:

REQUESTING ORGANIZATION INFORMATION: Instructions: Please fill in this form, print it, and sign it (5 pages in total). You may then either: fax the completed and signed forms to the ehealth Service Desk at 306-781-8480 or scan the completed

More information

Effective Date: Subject Matter Experts / Approval(s): TAC: LASO: C/ISO: Front Desk: Technology Support Lead: Agency Head:

Effective Date: Subject Matter Experts / Approval(s): TAC: LASO: C/ISO: Front Desk: Technology Support Lead: Agency Head: Policy Title: Effective Date: Revision Date: Subject Matter Experts / Approval(s): TAC: LASO: C/ISO: Front Desk: Technology Support Lead: Agency Head: Every 2 years or as needed Purpose: The purpose of

More information

SUPPLIER SECURITY STANDARD

SUPPLIER SECURITY STANDARD SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard

More information

ACS Email Encryption Recipient Guide

ACS Email Encryption Recipient Guide ACS Email Encryption Recipient Guide ACS ENCRYPTION SERVICES / TRAINING AND AWARENESS ACS Email Encryption Recipient Guide Email Encryption Recipient Guide ACS A Xerox Company 2828 North Haskell Dallas,

More information

Background Information

Background Information User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system

More information

Dell Advanced Network Monitoring Services Service Description

Dell Advanced Network Monitoring Services Service Description Dell Service Description 1. INTRODUCTION TO YOUR SERVICE AGREEMENT Advanced Network Monitoring: Network outages or network performance problems can cause significant economic impacts to your day to day

More information

GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE

GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE IF YOU HAVE A MEDICAL EMERGENCY, YOU ARE INSTRUCTED IMMEDIATELY TO CALL EMERGENCY PERSONNEL (911). DO NOT RELY ON THIS WEBSITE OR THE INFORMATION PROVIDED

More information

TERMS OF USE & GENERAL PRIVACY POLICY

TERMS OF USE & GENERAL PRIVACY POLICY TERMS OF USE & GENERAL PRIVACY POLICY BETWEEN: MEDICAL ANSWERING SERVICES, LLC AND COMPANY NAME Medical Answering Services, LLC values your trust and our relationships with our clientele - so we take great

More information

Beggs Telephone Company, Inc. Internet Services P.O. Box 749 Beggs, OK 74421 Phone: 918-267-3636 Fax: 918-267-3605 Internet Services

Beggs Telephone Company, Inc. Internet Services P.O. Box 749 Beggs, OK 74421 Phone: 918-267-3636 Fax: 918-267-3605 Internet Services Beggs Telephone Company, Inc. Internet Services P.O. Box 749 Beggs, OK 74421 Phone: 918-267-3636 Fax: 918-267-3605 Internet Services Installation Guide Beggs Telephone Company, Inc. Internet Service Dear

More information

Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)

Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) Below you will find the following sample policies: Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) *Log in to erisk Hub for

More information

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office

More information

DATA SECURITY AGREEMENT. Addendum # to Contract #

DATA SECURITY AGREEMENT. Addendum # to Contract # DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the

More information

CITY OF SALINE CELL PHONE POLICY

CITY OF SALINE CELL PHONE POLICY CITY OF SALINE CELL PHONE POLICY Purpose The City of Saline acknowledges that to provide efficient services to its citizens some of its employees must be available either 24x7 or while they are away from

More information

Authorized. User Agreement

Authorized. User Agreement Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION

More information

Quorum Privacy Policy

Quorum Privacy Policy Quorum Privacy Policy Quorum Analytics Inc. ( Quorum") has created this website (the "Website" or the "Site") to provide an online analytical tool that Subscribers can use to generate Derived Analytics

More information

Home Trust & Savings Bank www.hometrustbank.com

Home Trust & Savings Bank www.hometrustbank.com Home Trust & Savings Bank www.hometrustbank.com Terms & Conditions Please read the following Electronic Banking Agreement before you sign the enrollment form. GENERAL TERMS This agreement (the Agreement

More information

BUCKLEY STATE BANK ONLINE BANKING SERVICE AGREEMENT & APPLICATION

BUCKLEY STATE BANK ONLINE BANKING SERVICE AGREEMENT & APPLICATION BUCKLEY STATE BANK ONLINE BANKING SERVICE AGREEMENT & APPLICATION This Agreement describes your rights and obligations as a user of the Online Banking Services. It also describes the rights and obligations

More information

Electronic Documents (e-document) Disclosure and User Agreement

Electronic Documents (e-document) Disclosure and User Agreement Electronic Documents (e-document) Disclosure and User Agreement Welcome to River Works Credit Union s e-document Delivery Service. Our goal is to provide you with a free, convenient and environmentally

More information

ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access

ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Farmers Savings Bank & Trust Online Banking Agreement

Farmers Savings Bank & Trust Online Banking Agreement Farmers Savings Bank & Trust Online Banking Agreement Must be 18-years or older to participate in the Online Banking General Terms This agreement (the Agreement ) made between you and us for accessing

More information

Network Security Policy

Network Security Policy Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Department of Information Technology Olivet Nazarene University (815) 939-5302 Published August 2013 Ver. 4.0 Policy Overview 1. Executive Summary This summary is intended to present

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

Gaston County HIPAA Manual

Gaston County HIPAA Manual Gaston County HIPAA Manual Includes Gaston County IT Manual Action Date Reviewed and Revised December 2012 Gaston County HIPAA Policy Manual has be updated and combined with the Gaston County IT Manual.

More information

How To Use Kendallville Internet For Free

How To Use Kendallville Internet For Free Kendallville Internet High-speed Internet Business Full Speed 3.5 Mbps Download Speed 1.5 Mbps Upload Speed $50 Installation fee with a 2 year commitment* $100.00/month Residential Full Speed 3.5 Download

More information

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and

More information

Physical Protection Policy Sample (Required Written Policy)

Physical Protection Policy Sample (Required Written Policy) Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the

More information

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration

More information

Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007

Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

Casey State Bank Online Banking Agreement and Disclosure

Casey State Bank Online Banking Agreement and Disclosure Casey State Bank Online Banking Agreement and Disclosure Please carefully read this entire agreement and keep a copy for your records. By pressing the I ACCEPT button, you agree to the terms and conditions

More information

Business Online Banking Client Setup Form

Business Online Banking Client Setup Form Business Online Banking Client Setup Form *All available fields must be filled out prior to submission to ensure proper processing. New Setup Maintenance on Existing Customer Company Name: Tax ID: Address:

More information

Bank of Kirksville Internet Banking Application

Bank of Kirksville Internet Banking Application Internet Banking Application A Free Service for our Valued Customers 214 S. Franklin St., P.O. Box 787, (660) 665-7766, www.bankofkirksville.com, email: bofk@bankofkirksville.com NOTE: requires internet

More information

Dynamic IP Standard Terms and Conditions

Dynamic IP Standard Terms and Conditions Dynamic IP Standard Terms and Conditions In addition to the general terms and conditions contained in the service agreement between PAETEC, now a Windstream Company and Customer (the Agreement ), of which

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

1.02 Authorized Recipient means an entity authorized by statute to receive background check information for noncriminal justice purposes.

1.02 Authorized Recipient means an entity authorized by statute to receive background check information for noncriminal justice purposes. SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD The goal of this document is to provide adequate security and integrity for background check information while under the control or management of an

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

Secondary DMZ: DMZ (2)

Secondary DMZ: DMZ (2) Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or

More information

Policy on Connection to the University Network

Policy on Connection to the University Network Policy on Connection to the University Network Revision History Version Date Changes 0.1 01/12/04 David Conway 0.2 02/12/04 David Conway 0.3 19/01/05 David Conway 0.4 21/01/05 David Conway 1.0 07/03/05

More information

Data Processing Agreement for Oracle Cloud Services

Data Processing Agreement for Oracle Cloud Services Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services

More information

SUBSCRIPTION AGREEMENT FOR ELECTRONIC ACCESS TO OFFICIAL RECORDS KEN BURKE, CPA CLERK OF CIRCUIT COURT & COMPTROLLER PINELLAS COUNTY, FL

SUBSCRIPTION AGREEMENT FOR ELECTRONIC ACCESS TO OFFICIAL RECORDS KEN BURKE, CPA CLERK OF CIRCUIT COURT & COMPTROLLER PINELLAS COUNTY, FL KEN BURKE, CPA CLERK OF CIRCUIT COURT & COMPTROLLER PINELLAS COUNTY, FL This agreement is made and entered into by and between, Ken Burke, CPA, Pinellas County Clerk of the Circuit Court & Comptroller,

More information

CITY OF MARLBOROUGH MARLBOROUGH, MASSACHUSETTS 01752-3812

CITY OF MARLBOROUGH MARLBOROUGH, MASSACHUSETTS 01752-3812 CITY OF MARLBOROUGH MARLBOROUGH, MASSACHUSETTS 01752-3812 APPLICATION FOR INTERNET ACCESS To obtain Internet Access, complete the following form, sign and obtain department head signature and return to

More information

Instruction. Neoga Community Unit School District #3 Page 1 of 5

Instruction. Neoga Community Unit School District #3 Page 1 of 5 Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each

More information

COLUMBIA UNIVERSITY EMAIL USAGE POLICY

COLUMBIA UNIVERSITY EMAIL USAGE POLICY COLUMBIA UNIVERSITY EMAIL USAGE POLICY Published: October 2013 I. Introduction Email is an expedient communication vehicle to send messages to the Columbia University community. The University recognizes

More information

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014 Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology

More information

Mid Carolina CU Internet Online Banking Services Terms and Conditions

Mid Carolina CU Internet Online Banking Services Terms and Conditions Mid Carolina CU Internet Online Banking Services Terms and Conditions This Agreement is the contract which covers your and our rights and responsibilities concerning the Home Banking services offered to

More information

Security Incident Management Requirements For a Health Insurance Business

Security Incident Management Requirements For a Health Insurance Business Providing Quality Brokerage Products To Shelter Since 1996 UniCare Contracting Instructions (PLEASE FOLLOW CAREFULLY) 1. Please print the following contract, and completely fill out all its pages. 2. Make

More information

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)

More information

CCH INCORPORATED, A WOLTERSKLUWER COMPANY ACCESS AGREEMENT FOR THE

CCH INCORPORATED, A WOLTERSKLUWER COMPANY ACCESS AGREEMENT FOR THE CCH INCORPORATED, A WOLTERSKLUWER COMPANY ACCESS AGREEMENT FOR THE Accounting Research Manager INFORMATION DATABASE PROVIDED THROUGH Mayer Hoffman McCann P.C. ("AGREEMENT" OR "ACCESS AGREEMENT") IN THIS

More information

Network Usage Guidelines Contents

Network Usage Guidelines Contents Network Usage Guidelines Contents Network Usage...2 Peer to Peer and File Sharing...2 Servers or Server Technologies...2 Routers...2 Wireless...2 Network Storage...2 Security and Privacy...3 Security...3

More information

Consensus Policy Resource Community. Lab Security Policy

Consensus Policy Resource Community. Lab Security Policy Lab Security Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is

More information

Privacy Impact Assessment for the. Standardized Tracking and Accounting Reporting System- Financial Management System (STARS-FMS)

Privacy Impact Assessment for the. Standardized Tracking and Accounting Reporting System- Financial Management System (STARS-FMS) Privacy Impact Assessment for the Standardized Tracking and Accounting Reporting System- Financial Management System (STARS-FMS) United States Marshals Service Contact Point William E. Bordley Associate

More information

Matrix Technical Support Mailer - 72 Procedure for Image Upload through Email Server in SATATYA DVR,NVR & HVR

Matrix Technical Support Mailer - 72 Procedure for Image Upload through Email Server in SATATYA DVR,NVR & HVR Matrix Technical Support Mailer - 72 Procedure for Image Upload through Email Server in SATATYA DVR,NVR & HVR Dear Friends, This mailer will help you configure Email Notification in SATATYA Web Client

More information

Internet Acceptable Use and Software Installation Policy

Internet Acceptable Use and Software Installation Policy Internet Acceptable Use and Software Installation Policy Internet access is available to all team members of the Regional Office Education for Bond, Fayette, and Effingham Counties #3 (ROE) and its divisions.

More information

HORATIO STATE BANK ONLINE BANKING AGREEMENT AND DISCLOSURE

HORATIO STATE BANK ONLINE BANKING AGREEMENT AND DISCLOSURE HORATIO STATE BANK ONLINE BANKING AGREEMENT AND DISCLOSURE (Including disclosures under the Electronic Funds Transfer Act and implementing regulations) ONLINE BANKING AGREEMENT AND DISCLOSURE This Online

More information

Safe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1.

Safe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1. Safe Haven Procedure Final Version 1.0 (Final) Ratified By Executive Team Originator/Author Fabian Henderson Date Issued March 2009 Review Date March 2010 Target NHS East Midland Employees Safe Haven Procedure:

More information

DHHS Information Technology (IT) Access Control Standard

DHHS Information Technology (IT) Access Control Standard DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of

More information

Effective Date: Oct. 27, 2009... 1

Effective Date: Oct. 27, 2009... 1 Policy Title: Office of Information Technology Email Usage and Retention Policy Policy No.: 7010 Rev.: 0 Effective Date: Oct. 27, 2009 Last Revision: Oct. 27, 2009 Responsible Office: Responsible Official:

More information

How To Use Adobe Software For A Business

How To Use Adobe Software For A Business EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed

More information

IT Services. VPN Connectivity Guide. 1 IT Systems

IT Services. VPN Connectivity Guide. 1 IT Systems IT Services VPN Connectivity Guide 1 IT Systems Introduction...3 Cass VPN Service...4 Prerequisites...5 Connectivity process...6 Pilot Group Feedback...13 2 IT Systems Introduction This document briefly

More information

ATTORNEY SUBSCRIBER AGREEMENT FOR REMOTE ACCESS TO TAZEWELL COUNTY CIRCUIT COURT CASE DOCUMENTS known as Officer of the Court Remote Access (OCRA)

ATTORNEY SUBSCRIBER AGREEMENT FOR REMOTE ACCESS TO TAZEWELL COUNTY CIRCUIT COURT CASE DOCUMENTS known as Officer of the Court Remote Access (OCRA) ATTORNEY SUBSCRIBER AGREEMENT FOR REMOTE ACCESS TO TAZEWELL COUNTY CIRCUIT COURT CASE DOCUMENTS known as Officer of the Court Remote Access (OCRA) This Agreement is made and entered into by and between

More information

PCI DSS Requirements - Security Controls and Processes

PCI DSS Requirements - Security Controls and Processes 1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data

More information

ALBANY MUTUAL TELEPHONE S MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION

ALBANY MUTUAL TELEPHONE S MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION ALBANY MUTUAL TELEPHONE S MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION General Policy Statement: The following policies apply to mass market broadband Internet services offered by Albany

More information