Jane Tallitsch. Paul Kuehnert, Health Department DATE: September 29, 2009 SUBJECT: TITLE: Documents needing legal evaluation. Theresa Heaton x85149
|
|
- Adelia Shaw
- 8 years ago
- Views:
Transcription
1 Kane County Health Department Paul Kuehnert, MS, RN Executive Director Public Health Center 1240 N. Highland Avenue Aurora, Illinois Public Health Center 1330 N. Highland Avenue Aurora, Illinois Public Health Center 113 S. Grove Avenue Elgin, Illinois TO: FROM: Jane Tallitsch MEMO Paul Kuehnert, Health Department DATE: September 29, 2009 SUBJECT: TITLE: CONTACT: X Documents needing legal evaluation 1. DCFS Site Assessment for Partner 2. Virtual Private Network Usage Agreement Theresa Heaton x85149 REVIEW AND COMMENT ONLY. Contract/Grant/Agreement requ1r1ng Karen McConnaughay's signature. Need to have returned by ASAP. *Please return to Diane Roop - Aurora Health - after review for Paul Kuehnert signature.
2 Kane County Health Department DOCUMENT VET SHEET for Karen McConnaughay Chairman, Kane County Board Name of Document: 1. DCFS Site Assessment for Partner 2. Virtual Private Network Usage Agreement Submitted by: Date Submitted: _P~a:!.!:u~I.!.!K!:!:ue:::.:h.!.!.n!.!:e:.!..:rt~ """"'9~/..!:2~9/r:...::0~9 Examined by: (Signature) (Date) Comments: As Lead Agency for the Healthworks Program, this agreement allows the Health Dept. access to the DCFS computer system to assign and record Medical Case Management Agencies, primary care providers, and health-related data on DCFS children in our area. Chairman signed: No Date: I a... :;Jd -d?' Return document to " Diane Roop, KCHD-1240 N. Highland Ave., Ste. 21, Aurora Rev 08/09
3 From: Blixt, Harland Sent: Monday, September 14, :41 PM To: HealthWorks; rock -island. il. us; Cc: Champagne, Vincent; Bradshaw, Stephen Subject: Connecting Healthworks Lead Agencies to the DCFS System Healthworks Lead Agencies: Your agency has been contracted as the Healthworks Lead Agency for your area. As the Lead Agency, you will need to have access to the DCFS computer systems to assign/record Medical Case Management Agencies, primary care providers, and otherwise enter health-related data on DCFS children in your geographic area. Access is also provided to the DCFS confidential system. Assuming your agency already uses some type of high speed Internet service, there is no cost to your agency for this access. There are a couple of steps involved in getting you this access. First, we need to set up your agency on our system. There are 2 forms attached that must be completed and returned in order for DCFS to grant your site this access. These forms include the Site Assessment for Partner form and the Illinois DCFS Virtual Private Network (VPN) Usage Agreement for Partners. The Site Assessment form gives DCFS the information needed to create a connection with your own system, including address, site contacts, number of users and the type of Internet connections you are currently using. You will probably need to involve your IT person in completing this form. This can be returned electronically to Harland Blixt at harland.blixt@illinois.gov or by fax at Once this is received, you will be contacted by a DCFS network analyst to assist you with site connection to the DCFS system. The VPN Usage Agreement must be read, completed and signed by your agency director or manager and then faxed to Harland Blixt at It will allow us to connect your agency users to the DCFS network via VPN access after we receive their individual user creation requests. Once these forms have been received and the site process has begun, you will be contacted with information on how to create DCFS accounts for your individual workers who will be utilizing the system. If you have any questions about this process for conversion to the DCFS computer system, please contact Harland Blixt via at harland.blixt@illinois.gov or by phone at If you have questions about the ehealth program itself, contact Vince Champagne at Harland BliXt DRS PUS/Training Uaison ; PRIVILEGED AND CONFIDENTIALITY NOTICE: This (and/or the documents accompanying such) may contain privileged/confidential information. Such information is intended only for the use of the individual or entity above. If you are not the named or intended recipient, you are hereby notified that any disclosure, copying, distribution, or the taking of any action in reliance on the contents of such information is strictly prohibited. If you have received this transmission in error, please immediately notify the sender by telephone to arrange for the secure return of this document.
4 Date: SITE ASSESSMENT for EXTERNAL BUSINESS PARTNER Site Code: CURRENT INFORMATION Agency Name: Kane County Health Department Street Address: 1240 N. Highland Avenue City: Aurora Zip Code: Main Phone Number: SITE CONTACTS Primary Site Contact Name: Diane Ritter Phone: Fax: Secondary Site Contact Name: Elba Salazar Phone: Fax: Technical Contact Name: Diane Ritter Phone: Fax: How many total users at the above-noted site will require access to DCFS applications? 4 Estimate the number of concurrent users that will be accessin the DCFS a lications. 4 NETWORK INFORMATION What type of Internet connection does your site use? 0 DSL 0 Broad-band cable 0 Fractional T1 [:8] Internet Connection via network 0 Other What is the speed of your Internet connection? 500Mbps Does Internet bound traffic traverse through your corporate office first or is it direct from your site? Through corporate office first Please describe and sketch your network layout to the Internet. (Include other sites, switches, firewalls, and routers.) Attached provided by Kane County Information Technology Department. COMMENTS For questions, call Harland Blixt Return to Harland Blixt- Fax# or via to Harland.Biixt@illinois.gov
5 JO)(JF~ lllinois Department of Children & Family Services Illinois DCFS Virtual Private Network (VPN) Usage Agreement for Partners This DCFS Virtual Private Network (VPN) Partner Usage Agreement, herein referred to as Usage Agreement, is by and between the Illinois Department of Children and Family Services, herein referred to as DCFS, and: Partner Name: Partner Principal Address: Partner Mailing Address: Kane County Health Department 1240 N. Highland Avenue Aurora, IL N. Highland Avenue Aurora, IL Herein referred to as External Business Partner ABIDE BY EXISTING CONTRACTS AND POLICIES Partner agrees to abide by the usage policies of their existing Provider contract, usage policies of the State of Illinois Department of Children and Family Services, the State of Illinois Department of Central Management Services and the State of Illinois. INSTALLATION, DISTRIBUTION AND MANAGEMENT Partner will only install the DCFS provided VPN client software and configuration files to and use from a device with up-to-date anti-virus software, host-based firewall software, and latest operating system updates. If VPN access is installed on and used through a privately owned device, the Agency agrees to ensure that the device has up-to-date anti-virus software, host-based firewall software, and latest operating system updates. Also, if an Agency employee utilizes a privately owned device, the Department prohibits transferring or downloading any confidential information onto personal computer or . Partner consents to a scan of the device being used for DCFS VPN access to determine if listed components are present and to determine if any malicious software is installed. The output of this scan will determine the connecting device's compliance posture and will affect the access granted to DCFS shared resources. Partner also consent to accepting and installing software upgrades at DCFS direction either manually or automatically in order to mitigate issues which may arise in the VPN client software or to improve DCFS VPN functionality, performance or security. Partner understands distribution of DCFS provided VPN software is restricted by its author, Cisco Systems Incorporated, by this Usage Agreement and that DCFS VPN software and its underlying encryption routines are export-restricted by the United States Government. Partner will not allow its use or distribution, in whole or in part, by another public or private entity and agrees to hold DCFS harmless for any adverse effects to their network and/or the computer used for DCFS VPN access. PLEASE FAX THIS USAGE AGREEMENT TO (217) DCFS OITS Network Services VPN Usage Agreement draft v3.1
6 USAGE AND. MONITORING The Partner agrees that DCFS VPN functionality is for use solely to connect to DCFS networked resources in support of their contracted status as an agent of DCFS, as an agent acting on behalf of DCFS, or as an agent acting pursuant to legislative mandate under legislative authority. If the contracted status of an Partner changes, the Partner agrees to discontinue use of DCFS VPN and to delete any DCFS-provided software and configuration files related to VPN. The Partner also agrees to notify OITS within 24 hours of an employee's departure from the Agency. When using VPN, it is the Partner's responsibility to take reasonable and customary steps to enforce compliance and to govern and to protect its use. Partner agrees to allow its DCFS VPN connections to be monitored and logged and understands downloading or uploading copyrighted material and distributing it in any way is prohibited. DCFS logins and passwords will only be used to access DCFS shared resources and the Partner will not allow publishing or sharing of DCFS logins or passwords and will safeguard their DCFS VPN access privileges and components from any unauthorized use. The External Business Partner agrees that violation of this Usage Agreement may result in disabling remote access privileges, termination of Provider contract, and other legal action. Installation and use of configured DCFS provided VPN client software demonstrates that the Partner has read and understands the conditions under which DCFS VPN software my be used to access DCFS shared resources. Please direct questions to your immediate management or to the DCFS OITS Help Desk at Do not sign and return this Usage Agreement until questions about portions you may not understand. you have read, understand and consent to be bound you have received answers to By your signature you indicate by this Usage Agreement. Partner Signature: Date: PLEASE PRINT Name: Title: Telephone: Fax: Address: Paul Kuehnert Executive Director (630) (630) PLEASE FAX THIS USAGE AGREEMENT TO (217) DCFS OITS Network Services VPN Usage Agreement draft v3.1
7 Page 1 of 1 Juniper SSG 550 FlreV\60 Juniper ISG 2000 FlreWlllnDP Internal Ne!WJrk Heellh Department file://c:\documents and Settings\phddsr\Local Settings\ Temporary Internet Files\Content.Outlook\N7V A... 9/30/2009
(f;;l-- Kane County Health Department DOCUMENT VET SHEET. for Karen McConnaughay Chairman, Kane County Board
Kane County Health Department DOCUMENT VET SHEET for Karen McConnaughay Chairman, Kane County Board Name of Document: _Chicago State University _ Department of Nursing Affiliating Agreement Submitted by:
More informationIf you contact us orally, we may require that you send us your complaint or question in writing within 10 business days.
Please read the 1 st Equity Bank Online Banking Service Agreement and Disclosure. It includes disclaimers of liability and other matters of interest to users. By pressing the ''I Agree'' button, you agree
More informationOnline (Internet) Banking Agreement and Disclosure
Online (Internet) Banking Agreement and Disclosure This Online (Internet) Banking Agreement and Disclosure ( the Agreement") explains the terms and conditions governing the basic Online Banking services
More informationAccess to Electronic Health Records Policy Franciscan Health System
Access to Electronic Health Records Policy Franciscan Health System PURPOSE: The purpose of the Access to Electronic Health Records Policy ( EHR Policy ) is to establish processes and procedures for permitting
More informationMISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
More informationMemorandum. 1. Introduction
Memorandum To: Mississippi Government IT Directors and Purchasing Agents From: Craig P. Orgeron, Ph.D. Date: April 22, 2015 (Revised June 29, 2015) Re: Security Assessment Services RFP No. 3735 Instructions
More informationCentral Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
More informationACCESS TO ACCOUNTS VIA THE INTERNET.
Internet Banking Service Agreement Terms and Conditions This Internet Banking Services Agreement Terms and Conditions (Agreement) between you and Glacier Bank govern the use First Security Bank, a Division
More informationNumber: 08.04 NETWORK SECURITY
NETWORK SECURITY December 2003 TABLE OF CONTENTS 1 INTRODUCTION... 1 1.1 NETWORK SECURITY OVERVIEW... 1 1.2 EXCLUSIONS... 1 1.3 COMMENTS AND SUGGESTIONS... 1 2 NETWORK SECURITY RESPONSIBILITIES... 3 2.1
More informationACCESS TO ELECTRONIC HEALTH RECORDS AGREEMENT
ACCESS TO ELECTRONIC HEALTH RECORDS AGREEMENT THIS AGREEMENT ( Agreement ) is made and entered into this day of, 20, by and between Franciscan Health System ( Hospital ), and ( Community Partner ). RECITALS
More informationPLEASE READ THIS AGREEMENT CAREFULLY AND KEEP A COPY FOR YOUR RECORDS.
PLEASE READ THIS AGREEMENT CAREFULLY AND KEEP A COPY FOR YOUR RECORDS. Farmers & Merchants Savings Bank Online Banking Agreement 1. The Service. In consideration of the Online Banking services (hereinafter
More informationBUSINESS ONLINE BANKING AGREEMENT
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
More informationFranciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
More informationSAO Remote Access POLICY
SAO Remote Access POLICY Contents PURPOSE... 4 SCOPE... 4 POLICY... 4 AUTHORIZATION... 4 PERMITTED FORMS OF REMOTE ACCESS... 5 REMOTE ACCESS USER DEVICES... 5 OPTION ONE: SAO-OWNED PC... 5 OPTION TWO:
More informationTASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
More informationOnline Banking Agreement
Online Banking Agreement Liberty National Bank Online Banking Agreement ONLINE BANKING / BILL PAYING AGREEMENT 1. The Services: Use of Liberty National Bank's Online Banking Services requires at least
More informationDepartment of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government
Department of Information Technology Remote Access Audit Final Report January 2010 promoting efficient & effective local government Background Remote access is a service provided by the county to the Fairfax
More informationIntroduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI
Office of Regulatory Compliance 13001 E. 17 th Place, Suite W1124 Mail Stop F497 Aurora, CO 80045 Main Office: 303-724-1010 Main Fax: 303-724-1019 HIPAA Policy 7.1 Title: Source: Prepared by: Approved
More informationGuideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
More informationData Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
More informationNewcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
More informationAPPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES
APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,
More informationNew York State Office Of Children And Family Services VPN
CLIENT VPN New York State Office Of Children & Family Services New York State Office of Children & Family Services (OCFS) Client Virtual Private Network (VPN) Access to the Human Services Enterprise Network
More informationNetwork & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
More informationSample Policies for Internet Use, Email and Computer Screensavers
Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies
More informationGENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of
More informationTerms and Conditions of Use - Connectivity to MAGNET
I, as the Client, declare to have read and accepted the terms and conditions set out below for the use of the network connectivity to the Malta Government Network (MAGNET) provided by the Malta Information
More informationState of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationMIDDLESEX SAVINGS BANK ONLINE BANKING AGREEMENT
MIDDLESEX SAVINGS BANK ONLINE BANKING AGREEMENT 1. Online Banking This Agreement made between you and Middlesex Savings Bank (the "Bank") governs the use of Online Banking services (the "Service"). The
More informationThe Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
More informationInformation Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
More informationHOSTING SERVICES ADDENDUM TO MASTER SOFTWARE LICENCE AGREEMENT
HOSTING SERVICES ADDENDUM TO MASTER SOFTWARE LICENCE AGREEMENT Last Updated: 10 June 2015 This Hosting Services Addendum to the Master Software Licence Agreement ( Addendum ) will only apply to the extent
More informationIBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing
IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed
More informationREQUESTING ORGANIZATION INFORMATION:
Instructions: Please fill in this form, print it, and sign it (5 pages in total). You may then either: fax the completed and signed forms to the ehealth Service Desk at 306-781-8480 or scan the completed
More informationEffective Date: Subject Matter Experts / Approval(s): TAC: LASO: C/ISO: Front Desk: Technology Support Lead: Agency Head:
Policy Title: Effective Date: Revision Date: Subject Matter Experts / Approval(s): TAC: LASO: C/ISO: Front Desk: Technology Support Lead: Agency Head: Every 2 years or as needed Purpose: The purpose of
More informationSUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
More informationACS Email Encryption Recipient Guide
ACS Email Encryption Recipient Guide ACS ENCRYPTION SERVICES / TRAINING AND AWARENESS ACS Email Encryption Recipient Guide Email Encryption Recipient Guide ACS A Xerox Company 2828 North Haskell Dallas,
More informationBackground Information
User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system
More informationDell Advanced Network Monitoring Services Service Description
Dell Service Description 1. INTRODUCTION TO YOUR SERVICE AGREEMENT Advanced Network Monitoring: Network outages or network performance problems can cause significant economic impacts to your day to day
More informationGENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE
GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE IF YOU HAVE A MEDICAL EMERGENCY, YOU ARE INSTRUCTED IMMEDIATELY TO CALL EMERGENCY PERSONNEL (911). DO NOT RELY ON THIS WEBSITE OR THE INFORMATION PROVIDED
More informationTERMS OF USE & GENERAL PRIVACY POLICY
TERMS OF USE & GENERAL PRIVACY POLICY BETWEEN: MEDICAL ANSWERING SERVICES, LLC AND COMPANY NAME Medical Answering Services, LLC values your trust and our relationships with our clientele - so we take great
More informationBeggs Telephone Company, Inc. Internet Services P.O. Box 749 Beggs, OK 74421 Phone: 918-267-3636 Fax: 918-267-3605 Internet Services
Beggs Telephone Company, Inc. Internet Services P.O. Box 749 Beggs, OK 74421 Phone: 918-267-3636 Fax: 918-267-3605 Internet Services Installation Guide Beggs Telephone Company, Inc. Internet Service Dear
More informationAntivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)
Below you will find the following sample policies: Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) *Log in to erisk Hub for
More informationManaged Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043
Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office
More informationDATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
More informationCITY OF SALINE CELL PHONE POLICY
CITY OF SALINE CELL PHONE POLICY Purpose The City of Saline acknowledges that to provide efficient services to its citizens some of its employees must be available either 24x7 or while they are away from
More informationAuthorized. User Agreement
Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION
More informationQuorum Privacy Policy
Quorum Privacy Policy Quorum Analytics Inc. ( Quorum") has created this website (the "Website" or the "Site") to provide an online analytical tool that Subscribers can use to generate Derived Analytics
More informationHome Trust & Savings Bank www.hometrustbank.com
Home Trust & Savings Bank www.hometrustbank.com Terms & Conditions Please read the following Electronic Banking Agreement before you sign the enrollment form. GENERAL TERMS This agreement (the Agreement
More informationBUCKLEY STATE BANK ONLINE BANKING SERVICE AGREEMENT & APPLICATION
BUCKLEY STATE BANK ONLINE BANKING SERVICE AGREEMENT & APPLICATION This Agreement describes your rights and obligations as a user of the Online Banking Services. It also describes the rights and obligations
More informationElectronic Documents (e-document) Disclosure and User Agreement
Electronic Documents (e-document) Disclosure and User Agreement Welcome to River Works Credit Union s e-document Delivery Service. Our goal is to provide you with a free, convenient and environmentally
More informationADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access
Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information
More informationEstate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
More informationFarmers Savings Bank & Trust Online Banking Agreement
Farmers Savings Bank & Trust Online Banking Agreement Must be 18-years or older to participate in the Online Banking General Terms This agreement (the Agreement ) made between you and us for accessing
More informationNetwork Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
More informationNetwork Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
More informationAcceptable Use Policy
Acceptable Use Policy Department of Information Technology Olivet Nazarene University (815) 939-5302 Published August 2013 Ver. 4.0 Policy Overview 1. Executive Summary This summary is intended to present
More informationInformation Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
More informationReliance Bank Fraud Prevention Best Practices
Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.
More informationGaston County HIPAA Manual
Gaston County HIPAA Manual Includes Gaston County IT Manual Action Date Reviewed and Revised December 2012 Gaston County HIPAA Policy Manual has be updated and combined with the Gaston County IT Manual.
More informationHow To Use Kendallville Internet For Free
Kendallville Internet High-speed Internet Business Full Speed 3.5 Mbps Download Speed 1.5 Mbps Upload Speed $50 Installation fee with a 2 year commitment* $100.00/month Residential Full Speed 3.5 Download
More informationOSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES
Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and
More informationPhysical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
More informationPCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
More informationDepartment of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes
More informationAPPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
More informationCasey State Bank Online Banking Agreement and Disclosure
Casey State Bank Online Banking Agreement and Disclosure Please carefully read this entire agreement and keep a copy for your records. By pressing the I ACCEPT button, you agree to the terms and conditions
More informationBusiness Online Banking Client Setup Form
Business Online Banking Client Setup Form *All available fields must be filled out prior to submission to ensure proper processing. New Setup Maintenance on Existing Customer Company Name: Tax ID: Address:
More informationBank of Kirksville Internet Banking Application
Internet Banking Application A Free Service for our Valued Customers 214 S. Franklin St., P.O. Box 787, (660) 665-7766, www.bankofkirksville.com, email: bofk@bankofkirksville.com NOTE: requires internet
More informationDynamic IP Standard Terms and Conditions
Dynamic IP Standard Terms and Conditions In addition to the general terms and conditions contained in the service agreement between PAETEC, now a Windstream Company and Customer (the Agreement ), of which
More informationTEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
More information1.02 Authorized Recipient means an entity authorized by statute to receive background check information for noncriminal justice purposes.
SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD The goal of this document is to provide adequate security and integrity for background check information while under the control or management of an
More informationInformation Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
More informationSecondary DMZ: DMZ (2)
Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or
More informationPolicy on Connection to the University Network
Policy on Connection to the University Network Revision History Version Date Changes 0.1 01/12/04 David Conway 0.2 02/12/04 David Conway 0.3 19/01/05 David Conway 0.4 21/01/05 David Conway 1.0 07/03/05
More informationData Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
More informationSUBSCRIPTION AGREEMENT FOR ELECTRONIC ACCESS TO OFFICIAL RECORDS KEN BURKE, CPA CLERK OF CIRCUIT COURT & COMPTROLLER PINELLAS COUNTY, FL
KEN BURKE, CPA CLERK OF CIRCUIT COURT & COMPTROLLER PINELLAS COUNTY, FL This agreement is made and entered into by and between, Ken Burke, CPA, Pinellas County Clerk of the Circuit Court & Comptroller,
More informationCITY OF MARLBOROUGH MARLBOROUGH, MASSACHUSETTS 01752-3812
CITY OF MARLBOROUGH MARLBOROUGH, MASSACHUSETTS 01752-3812 APPLICATION FOR INTERNET ACCESS To obtain Internet Access, complete the following form, sign and obtain department head signature and return to
More informationInstruction. Neoga Community Unit School District #3 Page 1 of 5
Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each
More informationCOLUMBIA UNIVERSITY EMAIL USAGE POLICY
COLUMBIA UNIVERSITY EMAIL USAGE POLICY Published: October 2013 I. Introduction Email is an expedient communication vehicle to send messages to the Columbia University community. The University recognizes
More informationTenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014
Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology
More informationMid Carolina CU Internet Online Banking Services Terms and Conditions
Mid Carolina CU Internet Online Banking Services Terms and Conditions This Agreement is the contract which covers your and our rights and responsibilities concerning the Home Banking services offered to
More informationSecurity Incident Management Requirements For a Health Insurance Business
Providing Quality Brokerage Products To Shelter Since 1996 UniCare Contracting Instructions (PLEASE FOLLOW CAREFULLY) 1. Please print the following contract, and completely fill out all its pages. 2. Make
More informationDocument Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy
Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)
More informationCCH INCORPORATED, A WOLTERSKLUWER COMPANY ACCESS AGREEMENT FOR THE
CCH INCORPORATED, A WOLTERSKLUWER COMPANY ACCESS AGREEMENT FOR THE Accounting Research Manager INFORMATION DATABASE PROVIDED THROUGH Mayer Hoffman McCann P.C. ("AGREEMENT" OR "ACCESS AGREEMENT") IN THIS
More informationNetwork Usage Guidelines Contents
Network Usage Guidelines Contents Network Usage...2 Peer to Peer and File Sharing...2 Servers or Server Technologies...2 Routers...2 Wireless...2 Network Storage...2 Security and Privacy...3 Security...3
More informationConsensus Policy Resource Community. Lab Security Policy
Lab Security Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
More informationPrivacy Impact Assessment for the. Standardized Tracking and Accounting Reporting System- Financial Management System (STARS-FMS)
Privacy Impact Assessment for the Standardized Tracking and Accounting Reporting System- Financial Management System (STARS-FMS) United States Marshals Service Contact Point William E. Bordley Associate
More informationMatrix Technical Support Mailer - 72 Procedure for Image Upload through Email Server in SATATYA DVR,NVR & HVR
Matrix Technical Support Mailer - 72 Procedure for Image Upload through Email Server in SATATYA DVR,NVR & HVR Dear Friends, This mailer will help you configure Email Notification in SATATYA Web Client
More informationInternet Acceptable Use and Software Installation Policy
Internet Acceptable Use and Software Installation Policy Internet access is available to all team members of the Regional Office Education for Bond, Fayette, and Effingham Counties #3 (ROE) and its divisions.
More informationHORATIO STATE BANK ONLINE BANKING AGREEMENT AND DISCLOSURE
HORATIO STATE BANK ONLINE BANKING AGREEMENT AND DISCLOSURE (Including disclosures under the Electronic Funds Transfer Act and implementing regulations) ONLINE BANKING AGREEMENT AND DISCLOSURE This Online
More informationSafe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1.
Safe Haven Procedure Final Version 1.0 (Final) Ratified By Executive Team Originator/Author Fabian Henderson Date Issued March 2009 Review Date March 2010 Target NHS East Midland Employees Safe Haven Procedure:
More informationDHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
More informationEffective Date: Oct. 27, 2009... 1
Policy Title: Office of Information Technology Email Usage and Retention Policy Policy No.: 7010 Rev.: 0 Effective Date: Oct. 27, 2009 Last Revision: Oct. 27, 2009 Responsible Office: Responsible Official:
More informationHow To Use Adobe Software For A Business
EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed
More informationIT Services. VPN Connectivity Guide. 1 IT Systems
IT Services VPN Connectivity Guide 1 IT Systems Introduction...3 Cass VPN Service...4 Prerequisites...5 Connectivity process...6 Pilot Group Feedback...13 2 IT Systems Introduction This document briefly
More informationATTORNEY SUBSCRIBER AGREEMENT FOR REMOTE ACCESS TO TAZEWELL COUNTY CIRCUIT COURT CASE DOCUMENTS known as Officer of the Court Remote Access (OCRA)
ATTORNEY SUBSCRIBER AGREEMENT FOR REMOTE ACCESS TO TAZEWELL COUNTY CIRCUIT COURT CASE DOCUMENTS known as Officer of the Court Remote Access (OCRA) This Agreement is made and entered into by and between
More informationPCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
More informationALBANY MUTUAL TELEPHONE S MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION
ALBANY MUTUAL TELEPHONE S MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION General Policy Statement: The following policies apply to mass market broadband Internet services offered by Albany
More information