Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ

Size: px
Start display at page:

Download "Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117"

Transcription

1 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ Cmputer Use Plicy Intrductin - In supprt f Felician Cllege's missin f teaching and public service, the Infrmatin Technlgy (IT) Department prvides cmputing, netwrking, and infrmatin resurces t the Cllege cmmunity f students, faculty, and staff. This plicy regulates the use f all cmputing equipment and netwrk intercnnectins wned r administered by Felician Cllege. These include, but are nt limited t, administrative cmputing resurces, ffice and residence hall persnal cmputers, devices, campus-wide cmputer labratries, smart bards, netwrk servers, thin-client terminals, laptps, ipads, and assciated peripherals such as printers, scanners, cpiers and fax machines. Rights and Respnsibilities - Cmputers and netwrks can prvide access t resurces n and ff campus, as well as the ability t cmmunicate with ther users wrldwide. Such pen access is a privilege, and requires that individual users act respnsibly and adhere t institutinal plicy. Users must respect the rights f ther users, respect the integrity f cmputer and related physical resurces, and bserve all relevant laws, regulatins, cntractual bligatins. Students and emplyees may have rights f access t infrmatin abut themselves cntained in cmputer files, as specified in federal and state laws. Files may be subject t search under curt rder. In additin, system administratrs may access r examine files r accunts that are suspected f unauthrized use r misuse, r that have been crrupted r damaged. Institutinal cmputers and access t institutinal systems and sftware are fr business purpses and the prperty f the cllege. Existing Legal Cntext - All existing laws (federal and state) Cllege regulatins and plicies apply, including nt nly thse laws and regulatins that are specific t cmputers and netwrks, but thse that may apply generally t persnal cnduct. Misuse f cmputing, netwrking, r infrmatin resurces may result in the lss f cmputing privileges. Additinally, misuse can be prsecuted under applicable statutes. Users may be held accuntable fr their cnduct under any applicable Cllege plicies r prcedures. Cmplaints alleging misuse f cmputing resurces will be directed t thse respnsible fr taking apprpriate disciplinary actin. Unauthrized uses f any cmputers, netwrking r infrmatinal resurces are prhibited. Other rganizatins perating cmputing and netwrking facilities that are reachable via the Felician Cllege netwrk may have their wn plicies gverning the use f thse resurces. When accessing remte resurces frm Felician Cllege facilities, users are respnsible fr abiding by bth the plicies set frth in this dcument and the plicies f the ther rganizatins and netwrks. Illegal reprductin f sftware prtected by U.S. Cpyright Law is subject t civil damages and criminal penalties including fine and imprisnment. Examples f Misuse - Examples f misuse include, but are nt limited t, the activities in the fllwing list. Using a cmputer accunt that yu are nt authrized t use. Obtaining a passwrd fr a cmputer accunt withut the cnsent f the accunt wner.

2 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ Allwing smene else t use yur accunt. The wner f the accunt is respnsible fr the use (and misuse) f the accunt. The wner must take all respnsible precautins, including passwrd maintenance, t prevent use f the accunt by unauthrized persns. Faculty and staff with access t the Cllege's databases must prperly lg in and ut and when in the database - insure that nly thse with authrized access t the Cllege's databases view their screen. When finished with the database, users must lg ut t bth "free up" cmputer resurces and guard against unauthrized access r viewing. Using the campus netwrk t gain unauthrized access t any cmputer system Knwingly r carelessly perfrming an act that will interfere with the nrmal peratin f cmputers, terminals, peripherals, r netwrks. Knwingly r carelessly running r installing n any cmputer system r netwrk, r giving t anther user, a prgram intended t damage r t place excessive lad n a cmputer system r netwrk. This includes, but is nt limited t, prgrams knwn as, cmputer viruses, Trjan hrses, and wrms. Attempting t circumvent data prtectin schemes r uncver security lphles. Vilating terms f applicable sftware licensing agreements r cpyright laws. This includes the bradcast distributin f cpyrighted material frm electrnic surces. Deliberately r negligently wasting cmputer resurces. This includes, but is nt limited t, printing multiple cpies f a dcument n a Cllege-wned printer, prpagating chain letters, bradcasting an message t all system users withut authrizatin, string large files n hst cmputers, running prgrams n hst cmputers that use a disprprtinate share f system resurces, and failing t sign ff frm a mailing list yu have n interest in fllwing. Using electrnic mail t harass thers. Masking the identity f an accunt r machine. This includes, but is nt limited t, sending annymus e- mail. Using Cllege wned cmputing resurces fr any activity that is cmmercial in nature. Psting n electrnic bulletin bards r Internet services materials that vilate existing laws r the Cllege's cde f cnduct. This includes, but is nt limited t, psting bscene r sexually explicit pictures r text t a public n-line cnference, r psting f materials that are slanderus r defamatry in nature. Attempting t mnitr r tamper with anther user's electrnic cmmunicatins; reading, cpying, changing, r deleting anther user's files r sftware withut the explicit agreement f the wner; reading anther persn s .

3 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ All faculty develping curses fr n-line r distance learning must read and fllw the guidelines established by the Cllege's Distance Learning Crdinatr. Presentatins designed n (r run thrugh) the Cllege's netwrk r nn-netwrk equipment must adhere t the guidelines established in this use plicy. Activities will nt be cnsidered misuse when authrized by apprpriate Cllege fficials fr security r perfrmance testing. Treatment f Cnfidential Infrmatin Cnfidential infrmatin generally cnsists f nn-public infrmatin abut a persn r an entity that, if disclsed, culd reasnably be expected t place either the persn r the entity at risk f criminal r civil liability, r damage the persn r entity's financial standing, emplyability, privacy r reputatin. The Cllege is bund by law r cntract t prtect sme types f cnfidential infrmatin, and in ther instances the Cllege requires prtectin f cnfidential infrmatin beynd legal r cntractual requirements as an additinal safeguard. Cnfidential infrmatin includes but is nt limited t: payrll recrds, salary and nn-public benefits infrmatin Scial Security numbers, driver's license numbers, state identificatin card numbers, passprt numbers credit and debit card infrmatin, and financial accunt infrmatin persnnel recrds, including but nt limited t infrmatin regarding an emplyee's wrk histry, credentials, salary and salary grade, benefits, length f service, perfrmance, and discipline individual criminal backgrund check infrmatin individual cnflict f interest infrmatin individually identifiable bimetric infrmatin cmputer system passwrds and security cdes unpublished grant prpsals and unpublished research data unpublished manuscripts and crrespndence budgetary, departmental, r Cllege planning infrmatin nn-public financial, prcurement, health/safety, audit, insurance and claims infrmatin internal investigatin infrmatin, pre-litigatin, and nn-public litigatin and administrative agency charge, audit and inquiry infrmatin student recrds, including but nt limited t student educatin recrds within the meaning f the Family Educatinal Rights and Privacy Act prprietary r intellectual prperty in which the Cllege asserts wnership that is created by Cllege emplyees in cnnectin with their wrk nn-public law enfrcement recrds generated r maintained by the Cllege security ffices

4 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ all Cllege attrney-client cmmunicatins and Cllege attrney wrk prduct nn-public dnr and alumni infrmatin patient care recrds including patient benefit plan enrllment, claims, billing matters, and data cncerning human research subjects medical recrds, persnally identifiable medical infrmatin, and all infrmatin designated as "Prtected Health Infrmatin" under the Health Insurance Prtability and Accuntability Act (HIPAA), r therwise prtected by law all infrmatin, materials, data and recrds designated cnfidential by a Cllege unit, by law r by cntract, including infrmatin btained by the Cllege frm third parties under nn-disclsure agreements r any ther cntract that designates third party infrmatin as cnfidential Guidelines: 1. All emplyees with jb duties that require them t handle cnfidential infrmatin are required t safeguard such infrmatin and nly use it r disclse it as expressly authrized r specifically required in the curse f perfrming their specific jb duties. 2. Misuse f cnfidential infrmatin can be intentinal (acts and/r missins), r a prduct f negligence r inadvertence. Misuse includes but is nt limited t: Accessing infrmatin nt directly germane r relevant t the emplyee's specifically assigned tasks Disclsing, discussing and/r prviding cnfidential infrmatin t any individual nt authrized t view r access that data, including but nt limited t third parties, vlunteers, vendrs and ther Cllege emplyees Reckless, careless, negligent, r imprper handling, strage r dispsal f cnfidential data, including electrnically stred and/r transmitted data, printed dcuments and reprts cntaining cnfidential infrmatin Deleting r altering infrmatin withut authrizatin Generating and/r disseminating false r misleading infrmatin, and Using infrmatin viewed r retrieved frm the systems fr persnal r any ther unauthrized r unlawful use. 3. Emplyees wh have been assigned persnal access cdes t wrk with systems that generate, stre r manage cnfidential infrmatin bear the respnsibility fr preserving the cmplete cnfidentiality f such cdes t ensure against unauthrized use by any ther persn. Emplyees wh negligently r intentinally share their system passwrds r accunts with anyne else fr any reasn will be held respnsible fr any resulting misuse f the system by thers.

5 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ Emplyees wh have any reasn t believe r suspect that smene else is using their persnal access cdes must immediately ntify their supervisr. 5. Emplyees are prhibited frm lgging nt Cllege databases and administrative systems with their persnal access cdes and then permitting anther persn t access infrmatin in thse data bases and/r systems. 6. Student educatin recrds are gverned by the Family Educatinal Rights and Privacy Act (FERPA) and applicable Cllege plicy ( see the Student Handbk ) FERPA-prtected student educatin recrds must nt be disclsed under any circumstances absent the express cnsent f the Cllege student (r frmer student) r as authrized by the Cllege's Legal Cunsel r the Cllege's Registrar. Althugh FERPA als permits the Cllege t disclse student directry infrmatin (as defined by FERPA), n such infrmatin may be disclsed until the Office f the Registrar has cnfirmed that the student has nt elected t blck his r her directry infrmatin, as permitted by FERPA. 7. Emplyees are expected t: Identify cnfidential infrmatin and materials Practively seek infrmatin regarding and cmply with any restrictins n the use, administratin, prcessing, strage r transfer f the cnfidential infrmatin in any frm, physical r electrnic Learn abut and cmply with any prcedures regarding the apprpriate handling f such infrmatin and materials Understand their respnsibilities related t infrmatin security 8. Emplyees wh have access t cnfidential infrmatin are expected t knw and understand assciated security requirements, and t take measures t prtect the infrmatin, regardless f the data strage medium being used, e.g., printed media (frms, wrk papers, reprts, micrfilm, micrfiche, bks), cmputers, data/vice netwrks, physical strage envirnments (ffices, filing cabinets, drawers), and magnetic and ptical strage media (hard drives, diskettes, tapes, CDs, flash drives). Cmputer display screens shuld be psitined s that nly authrized users can view cnfidential infrmatin, and cnfidential infrmatin shuld be discarded in a way that will preserve cnfidentiality (e.g., in a shred bx, nt in a trash can r recycling bin). 9. In many instances, emplyees will be required r expected t attend training relevant t the infrmatin/materials being handled. Emplyees wh are hired int psitins that require adherence t gvernment-mandated cmpliance (e.g., HIPAA, Medicare Cmpliance, grant and cntract administratin, pathgens r select agents) will be subject t strict prcedures fr handling such materials, must attend all mandated training sessins, and cmply with cmpliance-specific plicies and applicable law.

6 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ Emplyees must ntify the Cllege f any vilatin f these guidelines. Emplyees may reprt their cncerns immediately t their supervisr, department head, r central Cllege administratin Enfrcement - Emplyee misuse f cnfidential infrmatin and/r the systems in which the infrmatin is stred is a serius breach f jb respnsibilities Penalties fr vilatin f this plicy may be impsed under ne r mre f the fllwing; Felician Cllege plicies and regulatins, the-laws f the state f New Jersey; and the laws f the United States. Penalties may include lss f access t Cllege cmputing resurces, either temprarily r permanently, suspensin r terminatin. Minr infractins f this plicy will be handled by persnnel frm the IT Department in an infrmal manner. Serius vilatins will be referred t the apprpriate Cllege authrities fr frmal investigatin and actin accrding t established prcedures. I HAVE READ AND AGREE TO THE FOLLOWING TERMS AND CONDITIONS Emplyee Signature

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 8 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk The Bard f Educatin recgnizes as new technlgies shift the manner in which infrmatin is

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Texas Woman's University University Policy Manual

Texas Woman's University University Policy Manual Texas Wman's University University Plicy Manual Plicy Name: Plicy Number: 6.06 Date Passed: July 2004 Health Insurance Prtability& Accuntability Act (HIPAA) Date Reviewed: September 2008 Next Review: September

More information

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5 Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Information & Communications Technology ICT Security Compliance Guide (Student)

Information & Communications Technology ICT Security Compliance Guide (Student) Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0

More information

Woodstock Multimedia, INC. Software/Hardware Usage Policy

Woodstock Multimedia, INC. Software/Hardware Usage Policy Wdstck Multimedia, INC. Sftware/Hardware Usage Plicy POLICY PURPOSE The purpse f the Wdstck Multimedia, INC. Sftware / Hardware Usage Plicy is t ensure that Wdstck Multimedia, INC. emplyees are prperly

More information

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Yur Infrmatin technlgy Security Plicy

Yur Infrmatin technlgy Security Plicy INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE Cunty f Orange Infrmatin Technlgy Usage Plicy 1 INTRODUCTION: The Cunty f Orange Infrmatin Technlgy (IT) Usage Plicy is the fundatin f the Cunty s infrmatin

More information

Meopham School Information Technology Code of Conduct

Meopham School Information Technology Code of Conduct 1. Intrductin Infrmatin technlgy resurces are essential fr accmplishing Mepham Schl s missin f pursuing excellence in teaching and learning, research and cmmunity service. Members f the Schl cmmunity are

More information

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care

More information

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

Technical Writing - TheUsers Visa (SHR User Accunt)

Technical Writing - TheUsers Visa (SHR User Accunt) POLICY Number: 7311-25-004 Title: Saskatn Health Regin User Accunt Plicy Authrizatin [ ] President and CEO [X] Vice President, Finance and Crprate Services Surce: Directr, Infrmatin Technlgy Services Crss

More information

Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services

Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services Erie Cmmunity Cllege Acceptable Use Plicy Last Revisin: December 17, 2009 Cllege Infrmatin Technlgy Services Erie Cmmunity Cllege Cllege Infrmatin Technlgy Services Acceptable Use Plicy Last Revisin:

More information

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,

More information

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices This is being prvided t yu as a requirement f the privacy regulatins issued under the Health Insurance Prtability and Accuntability Act f 1996 (HIPAA). This ntice describes hw HROSM may use and disclse

More information

To clarify terms used within these policies, the following definitions are provided:

To clarify terms used within these policies, the following definitions are provided: Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

COMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE

COMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE COMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE COMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE Mst dealers are familiar with the requirements f the Gramm-Leach-Bliley Act

More information

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin

More information

Williamson County Board of Education Procedures and Guidelines

Williamson County Board of Education Procedures and Guidelines Williamsn Cunty Bard f Educatin Prcedures and Guidelines Effective Date: 6/21/10; 8/15/11; Page 1 f 7 PURPOSE Williamsn Cunty Schls prvides student and emplyee access t the Internet as a means t increase

More information

Privacy and Security Training Policy (PS.Pol.051)

Privacy and Security Training Policy (PS.Pol.051) Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider

More information

How To Ensure Your Health Care Is Safe

How To Ensure Your Health Care Is Safe Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

New York Institute of Technology Faculty and Staff Email Retention Policy

New York Institute of Technology Faculty and Staff Email Retention Policy New Yrk Institute f Technlgy Faculty and Staff Email Retentin Plicy Nvember 2013 I. PURPOSE As electrnic mail (email) has becme the primary frm f cmmunicatin at NYIT and thrughut the wrld, the vlume f

More information

How To Ensure That The Internet Is Safe For A Health Care Worker

How To Ensure That The Internet Is Safe For A Health Care Worker POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy

More information

Creating an Ethical Culture and Protecting Your Bottom Line:

Creating an Ethical Culture and Protecting Your Bottom Line: Creating an Ethical Culture and Prtecting Yur Bttm Line: Best Practices fr Crprate Cdes f Cnduct Nte: The infrmatin belw and all infrmatin n this website is nt meant t be taken as legal advice. Please

More information

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service. FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

Information Security Policy

Information Security Policy Purpse The risk t Charlestn Suthern University, its emplyees and students frm data lss and identity theft is f significant cncern t the University and can be reduced nly thrugh the cmbined effrts f every

More information

NSW FAIR TRADING. Real Estate Fraud Prevention Guidelines

NSW FAIR TRADING. Real Estate Fraud Prevention Guidelines NSW FAIR TRADING Real Estate Fraud Preventin Guidelines Real Estate Fraud Preventin Guidelines Cntents 1. Intrductin..... 2 2. Backgrund.. 2 3. The Law.. 2 4. Cmmissiner s Guidance.... 3 5. Prescribed

More information

THIRD PARTY PROCUREMENT PROCEDURES

THIRD PARTY PROCUREMENT PROCEDURES ADDENDUM #1 THIRD PARTY PROCUREMENT PROCEDURES NORTH CENTRAL TEXAS COUNCIL OF GOVERNMENTS TRANSPORTATION DEPARTMENT JUNE 2011 OVERVIEW These prcedures establish standards and guidelines fr the Nrth Central

More information

Employees - recruitment, records and monitoring

Employees - recruitment, records and monitoring Emplyees - recruitment, recrds and mnitring This guidance has been prduced t help rganisatins cmply with the Data Prtectin Act (DPA) when recruiting and emplying wrkers. It is relevant t public sectr emplyers,

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs

More information

Sources of Federal Government and Employee Information

Sources of Federal Government and Employee Information Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities

More information

Internet Banking Agreement and Disclosure Statement

Internet Banking Agreement and Disclosure Statement Internet Banking Agreement and Disclsure Statement This agreement cntains the terms and cnditins that gvern accessing r using Internet Banking (NetTeller), Bill Payment Services, Mbile Banking and On Demand

More information

The information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice.

The information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice. Privacy Plicy Terms f Service: The fllwing terms and cnditins gvern all use f the Rightwaywebhsting.cm website and all cntent, services and prducts available at r thrugh the website (taken tgether, the

More information

ADMINISTRATIVE REGULATIONS TABLE OF CONTENTS

ADMINISTRATIVE REGULATIONS TABLE OF CONTENTS ADMINISTATIVE EGULATIONS TABLE OF CONTENTS 8000 INFOMATION TECHNOLOGY 8100 Intrductin and Gvernance 8200 Apprpriate Use 8300 Access 8400 Data Security 8500 Hardware and Sftware Supprt 8700 Electrnic Cmmunicatin

More information

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER This Audit Cmmittee Charter has been amended as f July 17, 2015. The Audit Cmmittee shall review and reassess this Charter annually and recmmend

More information

UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM WB-DEC

UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM WB-DEC UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washingtn, D.C. 20549 FORM WB-DEC DECLARATION OF ORIGINAL INFORMATION SUBMITTED PURSUANT TO SECTION 21F OF THE SECURITIES EXCHANGE ACT OF 1934 A. SUBMITTER

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc. HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

Privacy Plicy Welcme, Sensati & JHI

Privacy Plicy Welcme, Sensati & JHI Privacy Plicy Welcme t www.framesdata.cm! This site (the Frames Data Online Site ) is wned by Frames Data Inc. ("FDI" r we ), a subsidiary f Jbsn Medical Infrmatin LLC ("JMI") and its parent, Jbsn Healthcare

More information

WHITE PAPER: UNIVERSITY AND COLLEGE COMPLIANCE WITH THE FOREIGN CORRUPT PRACTICES ACT IN CONNECTION WITH FOREIGN ACADEMIC PROGRAMS

WHITE PAPER: UNIVERSITY AND COLLEGE COMPLIANCE WITH THE FOREIGN CORRUPT PRACTICES ACT IN CONNECTION WITH FOREIGN ACADEMIC PROGRAMS WHITE PAPER: UNIVERSITY AND COLLEGE COMPLIANCE WITH THE FOREIGN CORRUPT PRACTICES ACT IN CONNECTION WITH FOREIGN ACADEMIC PROGRAMS By Sean R. Kelly, Esq. DanaLynn T. Cla, Esq. Saiber, LLC 18 Clumbia Turnpike,

More information

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT 1 FERRIS STATE UNIVERSITY SCHOOL f NURSING CODE f CONDUCT The Schl f Nursing (SON) at Ferris State University uphlds the University Cde f Student Cnduct and the American Nurses Assciatin Cde f Ethics.

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. HIPAA: Use and Disclosure of Protected Health Information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. HIPAA: Use and Disclosure of Protected Health Information Page 1 f 23 HIPAA: Use and Disclsure f Prtected Health Infrmatin Applies t: faculty staff students student emplyees visitrs cntractrs clinicians Effective Date f This Revisin: Nvember 27, 2012 Cntact fr

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

How To Get A Credit By Examination

How To Get A Credit By Examination LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION FACT SHEET Texas Ri Salad Cllege, a Maricpa Cunty Cmmunity Cllege in Tempe, Arizna, is prud t annunce its Credit by Examinatin prgram in Law Enfrcement

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

Purpose Statement. Objectives

Purpose Statement. Objectives Apprved by Academic Affairs Cuncil, June 24, 2014 Faculty Handbk Part VI: Other Plicies and Prcedures Sectin R. Intellectual Prperty Classified Emplyee Handbk Part VI: Other Plicies and Prcedures Sectin

More information

Heythrop College Disciplinary Procedure for Support Staff

Heythrop College Disciplinary Procedure for Support Staff Heythrp Cllege Disciplinary Prcedure fr Supprt Staff Intrductin 1. This prcedural dcument des nt apply t thse academic-related staff wh are mentined in the Cllege s Ordinance, namely the Librarian and

More information

DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only

DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM Fr 8 th 12 th Grade Students Only Student s Last Name Parent/Guardian Last Name Class First Name First Name Date Fr the first time this fall, students

More information

Frequently Asked Questions About I-9 Compliance

Frequently Asked Questions About I-9 Compliance Frequently Asked Questins Abut I-9 Cmpliance What is required t verify wrk authrizatin? The basic requirement t verify wrk authrizatin is the Frm I-9. This frm is available n the HR website: http://www.fit.edu/hr/dcuments/frms/i-9.pdf

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine Title: Identity Theft Prgram Effective Date: July 2009 NYU Langne Medical Center NYU Hspitals Center NYU Schl f Medicine POLICY It is the plicy f the NYU Langne Medical Center t educate and train staff

More information

IN-HOUSE OR OUTSOURCED BILLING

IN-HOUSE OR OUTSOURCED BILLING IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

Columbine Federal Credit Union ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE

Columbine Federal Credit Union ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE Clumbine Federal Credit Unin ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE 1. Online Banking/Bill Payment 2. Online Banking/ Bill Payment Limitatins 3. Online Bill Payment

More information

State Fleet Card Oversight Usage and Responsibilities

State Fleet Card Oversight Usage and Responsibilities State Fleet Card Oversight Usage and Respnsibilities Intrductin The Department f General Services (DGS), Office f Fleet and Asset Management (OFAM) administers a statewide ne-prvider payment system cntract

More information

Who Defines Fraud, Waste, and Abuse?

Who Defines Fraud, Waste, and Abuse? Wh Defines Fraud, Waste, and Abuse? This dcument cntains a sample f the varius definitins f the terms Fraud, Waste, and Abuse frm gvernment agencies and health plans. There are mre. The lack f a cncrete

More information

How To Write A Scial Media Plicy

How To Write A Scial Media Plicy Scial Media Plicy Scial Media Plicy Recrd Number D14/78 Respnsible Manager Directr Business Supprt and Strategy Manager Custmer and Cmmunicatins Last reviewed 11 February 2014 Adptin reference Cuncil Reslutin

More information

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT Kentwd Plice Department 4742 Walma Ave SE Kentwd, Michigan 49512 (616) 698-6580 http://www.ci.kentwd.mi.us REPORTING IDENTITY THEFT If yu are the victim f identity theft and ne f the fllwing cnditins are

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

ERISA Compliance FAQs: Fiduciary Responsibilities

ERISA Compliance FAQs: Fiduciary Responsibilities Brught t yu by Mrris & Reynlds Insurance ERISA Cmpliance FAQs: Fiduciary Respnsibilities The Emplyee Retirement Incme Security Act f 1974 (ERISA) is a federal law that sets minimum standards fr emplyee

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information

Electronic and Information Resources Accessibility Compliance Plan

Electronic and Information Resources Accessibility Compliance Plan Electrnic and Infrmatin Resurces Accessibility Cmpliance Plan Intrductin The University f Nrth Texas at Dallas (UNTD) is cmmitted t prviding a wrk envirnment that affrds equal access and pprtunity t therwise

More information

THRIFTY DRUG STORES, INC. d/b/a THRIFTY WHITE DRUG / WHITE DRUG / BELL PHARMACY/VALLEY DRUG/ THRIFTY NYSTROM DRUG NOTICE OF PRIVACY PRACTICES

THRIFTY DRUG STORES, INC. d/b/a THRIFTY WHITE DRUG / WHITE DRUG / BELL PHARMACY/VALLEY DRUG/ THRIFTY NYSTROM DRUG NOTICE OF PRIVACY PRACTICES THRIFTY DRUG STORES, INC. d/b/a THRIFTY WHITE DRUG / WHITE DRUG / BELL PHARMACY/VALLEY DRUG/ THRIFTY NYSTROM DRUG NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

GOVERNORS PHARMACY HIPAA NOTICE OF PRIVACY PRACTICES For Your Protected Health Information

GOVERNORS PHARMACY HIPAA NOTICE OF PRIVACY PRACTICES For Your Protected Health Information GOVERNORS PHARMACY HIPAA NOTICE OF PRIVACY PRACTICES Fr Yur Prtected Health Infrmatin THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act

More information

Carbonite Recovery Services Cover Sheet

Carbonite Recovery Services Cover Sheet Carbnite Recvery Services Cver Sheet Frm: Name f Requestr Cmpany Name (if applicable) Ticket Number (frm cnfirmatin email): Fax T: Carbnite Recvery Services Team 617-536- 0686 This FAX shuld include the

More information

ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY. Approved by Governing Body on: 6 th May 2015

ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY. Approved by Governing Body on: 6 th May 2015 ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY Gvernrs Cmmittee: Finance and General Purpses Apprved by Gverning Bdy n: 6 th May 2015 Signed: (Chair f Cmmittee) Signed: (Headteacher) Date t be

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies Clrad Rapids Yuth Sccer Club Scial Media and Electrnic Cmmunicatin Plicies OVERVIEW Online, scial media and ther electrnic cmmunicatin tls such as text messaging have becme a prevalent and effective means

More information

Statement of Work For. Federal Communications Commission. Emergency Mass Notification and Response System

Statement of Work For. Federal Communications Commission. Emergency Mass Notification and Response System Federal Cmmunicatins Cmmissin 1.0 INTRODUCTION Statement f Wrk Fr Federal Cmmunicatins Cmmissin Emergency Mass Ntificatin and Respnse System The Federal Cmmunicatins Cmmissin (FCC) is an independent United

More information

HIPAA Legislation - Key Provisions

HIPAA Legislation - Key Provisions HIPAA SECURITY, PRIVACY, AND THE NATIONAL PROVIDER IDENTIFIER Frederick Britten Frt Hays State University Carl Ann Raymnd The University f Gergia Outline HIPAA Review Enfrcement Update Natinal Prvider

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

Cell Phone & Data Access Policy Frequently Asked Questions

Cell Phone & Data Access Policy Frequently Asked Questions Cell Phne & Data Access Plicy Frequently Asked Questins 1. Wh is eligible fr a technlgy allwance? First and fremst, the technlgy allwance is fr the benefit f the University, rather than fr the cnvenience

More information

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance

More information