Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ
|
|
- Hannah Payne
- 8 years ago
- Views:
Transcription
1 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ Cmputer Use Plicy Intrductin - In supprt f Felician Cllege's missin f teaching and public service, the Infrmatin Technlgy (IT) Department prvides cmputing, netwrking, and infrmatin resurces t the Cllege cmmunity f students, faculty, and staff. This plicy regulates the use f all cmputing equipment and netwrk intercnnectins wned r administered by Felician Cllege. These include, but are nt limited t, administrative cmputing resurces, ffice and residence hall persnal cmputers, devices, campus-wide cmputer labratries, smart bards, netwrk servers, thin-client terminals, laptps, ipads, and assciated peripherals such as printers, scanners, cpiers and fax machines. Rights and Respnsibilities - Cmputers and netwrks can prvide access t resurces n and ff campus, as well as the ability t cmmunicate with ther users wrldwide. Such pen access is a privilege, and requires that individual users act respnsibly and adhere t institutinal plicy. Users must respect the rights f ther users, respect the integrity f cmputer and related physical resurces, and bserve all relevant laws, regulatins, cntractual bligatins. Students and emplyees may have rights f access t infrmatin abut themselves cntained in cmputer files, as specified in federal and state laws. Files may be subject t search under curt rder. In additin, system administratrs may access r examine files r accunts that are suspected f unauthrized use r misuse, r that have been crrupted r damaged. Institutinal cmputers and access t institutinal systems and sftware are fr business purpses and the prperty f the cllege. Existing Legal Cntext - All existing laws (federal and state) Cllege regulatins and plicies apply, including nt nly thse laws and regulatins that are specific t cmputers and netwrks, but thse that may apply generally t persnal cnduct. Misuse f cmputing, netwrking, r infrmatin resurces may result in the lss f cmputing privileges. Additinally, misuse can be prsecuted under applicable statutes. Users may be held accuntable fr their cnduct under any applicable Cllege plicies r prcedures. Cmplaints alleging misuse f cmputing resurces will be directed t thse respnsible fr taking apprpriate disciplinary actin. Unauthrized uses f any cmputers, netwrking r infrmatinal resurces are prhibited. Other rganizatins perating cmputing and netwrking facilities that are reachable via the Felician Cllege netwrk may have their wn plicies gverning the use f thse resurces. When accessing remte resurces frm Felician Cllege facilities, users are respnsible fr abiding by bth the plicies set frth in this dcument and the plicies f the ther rganizatins and netwrks. Illegal reprductin f sftware prtected by U.S. Cpyright Law is subject t civil damages and criminal penalties including fine and imprisnment. Examples f Misuse - Examples f misuse include, but are nt limited t, the activities in the fllwing list. Using a cmputer accunt that yu are nt authrized t use. Obtaining a passwrd fr a cmputer accunt withut the cnsent f the accunt wner.
2 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ Allwing smene else t use yur accunt. The wner f the accunt is respnsible fr the use (and misuse) f the accunt. The wner must take all respnsible precautins, including passwrd maintenance, t prevent use f the accunt by unauthrized persns. Faculty and staff with access t the Cllege's databases must prperly lg in and ut and when in the database - insure that nly thse with authrized access t the Cllege's databases view their screen. When finished with the database, users must lg ut t bth "free up" cmputer resurces and guard against unauthrized access r viewing. Using the campus netwrk t gain unauthrized access t any cmputer system Knwingly r carelessly perfrming an act that will interfere with the nrmal peratin f cmputers, terminals, peripherals, r netwrks. Knwingly r carelessly running r installing n any cmputer system r netwrk, r giving t anther user, a prgram intended t damage r t place excessive lad n a cmputer system r netwrk. This includes, but is nt limited t, prgrams knwn as, cmputer viruses, Trjan hrses, and wrms. Attempting t circumvent data prtectin schemes r uncver security lphles. Vilating terms f applicable sftware licensing agreements r cpyright laws. This includes the bradcast distributin f cpyrighted material frm electrnic surces. Deliberately r negligently wasting cmputer resurces. This includes, but is nt limited t, printing multiple cpies f a dcument n a Cllege-wned printer, prpagating chain letters, bradcasting an message t all system users withut authrizatin, string large files n hst cmputers, running prgrams n hst cmputers that use a disprprtinate share f system resurces, and failing t sign ff frm a mailing list yu have n interest in fllwing. Using electrnic mail t harass thers. Masking the identity f an accunt r machine. This includes, but is nt limited t, sending annymus e- mail. Using Cllege wned cmputing resurces fr any activity that is cmmercial in nature. Psting n electrnic bulletin bards r Internet services materials that vilate existing laws r the Cllege's cde f cnduct. This includes, but is nt limited t, psting bscene r sexually explicit pictures r text t a public n-line cnference, r psting f materials that are slanderus r defamatry in nature. Attempting t mnitr r tamper with anther user's electrnic cmmunicatins; reading, cpying, changing, r deleting anther user's files r sftware withut the explicit agreement f the wner; reading anther persn s .
3 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ All faculty develping curses fr n-line r distance learning must read and fllw the guidelines established by the Cllege's Distance Learning Crdinatr. Presentatins designed n (r run thrugh) the Cllege's netwrk r nn-netwrk equipment must adhere t the guidelines established in this use plicy. Activities will nt be cnsidered misuse when authrized by apprpriate Cllege fficials fr security r perfrmance testing. Treatment f Cnfidential Infrmatin Cnfidential infrmatin generally cnsists f nn-public infrmatin abut a persn r an entity that, if disclsed, culd reasnably be expected t place either the persn r the entity at risk f criminal r civil liability, r damage the persn r entity's financial standing, emplyability, privacy r reputatin. The Cllege is bund by law r cntract t prtect sme types f cnfidential infrmatin, and in ther instances the Cllege requires prtectin f cnfidential infrmatin beynd legal r cntractual requirements as an additinal safeguard. Cnfidential infrmatin includes but is nt limited t: payrll recrds, salary and nn-public benefits infrmatin Scial Security numbers, driver's license numbers, state identificatin card numbers, passprt numbers credit and debit card infrmatin, and financial accunt infrmatin persnnel recrds, including but nt limited t infrmatin regarding an emplyee's wrk histry, credentials, salary and salary grade, benefits, length f service, perfrmance, and discipline individual criminal backgrund check infrmatin individual cnflict f interest infrmatin individually identifiable bimetric infrmatin cmputer system passwrds and security cdes unpublished grant prpsals and unpublished research data unpublished manuscripts and crrespndence budgetary, departmental, r Cllege planning infrmatin nn-public financial, prcurement, health/safety, audit, insurance and claims infrmatin internal investigatin infrmatin, pre-litigatin, and nn-public litigatin and administrative agency charge, audit and inquiry infrmatin student recrds, including but nt limited t student educatin recrds within the meaning f the Family Educatinal Rights and Privacy Act prprietary r intellectual prperty in which the Cllege asserts wnership that is created by Cllege emplyees in cnnectin with their wrk nn-public law enfrcement recrds generated r maintained by the Cllege security ffices
4 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ all Cllege attrney-client cmmunicatins and Cllege attrney wrk prduct nn-public dnr and alumni infrmatin patient care recrds including patient benefit plan enrllment, claims, billing matters, and data cncerning human research subjects medical recrds, persnally identifiable medical infrmatin, and all infrmatin designated as "Prtected Health Infrmatin" under the Health Insurance Prtability and Accuntability Act (HIPAA), r therwise prtected by law all infrmatin, materials, data and recrds designated cnfidential by a Cllege unit, by law r by cntract, including infrmatin btained by the Cllege frm third parties under nn-disclsure agreements r any ther cntract that designates third party infrmatin as cnfidential Guidelines: 1. All emplyees with jb duties that require them t handle cnfidential infrmatin are required t safeguard such infrmatin and nly use it r disclse it as expressly authrized r specifically required in the curse f perfrming their specific jb duties. 2. Misuse f cnfidential infrmatin can be intentinal (acts and/r missins), r a prduct f negligence r inadvertence. Misuse includes but is nt limited t: Accessing infrmatin nt directly germane r relevant t the emplyee's specifically assigned tasks Disclsing, discussing and/r prviding cnfidential infrmatin t any individual nt authrized t view r access that data, including but nt limited t third parties, vlunteers, vendrs and ther Cllege emplyees Reckless, careless, negligent, r imprper handling, strage r dispsal f cnfidential data, including electrnically stred and/r transmitted data, printed dcuments and reprts cntaining cnfidential infrmatin Deleting r altering infrmatin withut authrizatin Generating and/r disseminating false r misleading infrmatin, and Using infrmatin viewed r retrieved frm the systems fr persnal r any ther unauthrized r unlawful use. 3. Emplyees wh have been assigned persnal access cdes t wrk with systems that generate, stre r manage cnfidential infrmatin bear the respnsibility fr preserving the cmplete cnfidentiality f such cdes t ensure against unauthrized use by any ther persn. Emplyees wh negligently r intentinally share their system passwrds r accunts with anyne else fr any reasn will be held respnsible fr any resulting misuse f the system by thers.
5 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ Emplyees wh have any reasn t believe r suspect that smene else is using their persnal access cdes must immediately ntify their supervisr. 5. Emplyees are prhibited frm lgging nt Cllege databases and administrative systems with their persnal access cdes and then permitting anther persn t access infrmatin in thse data bases and/r systems. 6. Student educatin recrds are gverned by the Family Educatinal Rights and Privacy Act (FERPA) and applicable Cllege plicy ( see the Student Handbk ) FERPA-prtected student educatin recrds must nt be disclsed under any circumstances absent the express cnsent f the Cllege student (r frmer student) r as authrized by the Cllege's Legal Cunsel r the Cllege's Registrar. Althugh FERPA als permits the Cllege t disclse student directry infrmatin (as defined by FERPA), n such infrmatin may be disclsed until the Office f the Registrar has cnfirmed that the student has nt elected t blck his r her directry infrmatin, as permitted by FERPA. 7. Emplyees are expected t: Identify cnfidential infrmatin and materials Practively seek infrmatin regarding and cmply with any restrictins n the use, administratin, prcessing, strage r transfer f the cnfidential infrmatin in any frm, physical r electrnic Learn abut and cmply with any prcedures regarding the apprpriate handling f such infrmatin and materials Understand their respnsibilities related t infrmatin security 8. Emplyees wh have access t cnfidential infrmatin are expected t knw and understand assciated security requirements, and t take measures t prtect the infrmatin, regardless f the data strage medium being used, e.g., printed media (frms, wrk papers, reprts, micrfilm, micrfiche, bks), cmputers, data/vice netwrks, physical strage envirnments (ffices, filing cabinets, drawers), and magnetic and ptical strage media (hard drives, diskettes, tapes, CDs, flash drives). Cmputer display screens shuld be psitined s that nly authrized users can view cnfidential infrmatin, and cnfidential infrmatin shuld be discarded in a way that will preserve cnfidentiality (e.g., in a shred bx, nt in a trash can r recycling bin). 9. In many instances, emplyees will be required r expected t attend training relevant t the infrmatin/materials being handled. Emplyees wh are hired int psitins that require adherence t gvernment-mandated cmpliance (e.g., HIPAA, Medicare Cmpliance, grant and cntract administratin, pathgens r select agents) will be subject t strict prcedures fr handling such materials, must attend all mandated training sessins, and cmply with cmpliance-specific plicies and applicable law.
6 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ Emplyees must ntify the Cllege f any vilatin f these guidelines. Emplyees may reprt their cncerns immediately t their supervisr, department head, r central Cllege administratin Enfrcement - Emplyee misuse f cnfidential infrmatin and/r the systems in which the infrmatin is stred is a serius breach f jb respnsibilities Penalties fr vilatin f this plicy may be impsed under ne r mre f the fllwing; Felician Cllege plicies and regulatins, the-laws f the state f New Jersey; and the laws f the United States. Penalties may include lss f access t Cllege cmputing resurces, either temprarily r permanently, suspensin r terminatin. Minr infractins f this plicy will be handled by persnnel frm the IT Department in an infrmal manner. Serius vilatins will be referred t the apprpriate Cllege authrities fr frmal investigatin and actin accrding t established prcedures. I HAVE READ AND AGREE TO THE FOLLOWING TERMS AND CONDITIONS Emplyee Signature
RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer
RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible
More informationHillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network
2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal
More informationUnified Infrastructure/Organization Computer System/Software Use Policy
Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help
More informationNorwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16
Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected
More informationHillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network
2361/Page 1 f 8 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk The Bard f Educatin recgnizes as new technlgies shift the manner in which infrmatin is
More informationGUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
More informationBLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS
BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin
More informationData Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
More informationCOPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
More informationTexas Woman's University University Policy Manual
Texas Wman's University University Plicy Manual Plicy Name: Plicy Number: 6.06 Date Passed: July 2004 Health Insurance Prtability& Accuntability Act (HIPAA) Date Reviewed: September 2008 Next Review: September
More informationSupersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5
Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet
More informationVCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
More informationInformation & Communications Technology ICT Security Compliance Guide (Student)
Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0
More informationWoodstock Multimedia, INC. Software/Hardware Usage Policy
Wdstck Multimedia, INC. Sftware/Hardware Usage Plicy POLICY PURPOSE The purpse f the Wdstck Multimedia, INC. Sftware / Hardware Usage Plicy is t ensure that Wdstck Multimedia, INC. emplyees are prperly
More informationInternet and E-Mail Policy User s Guide
Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin
More informationFAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT
FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028
More informationFirst Global Data Corp.
First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First
More informationYur Infrmatin technlgy Security Plicy
INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE Cunty f Orange Infrmatin Technlgy Usage Plicy 1 INTRODUCTION: The Cunty f Orange Infrmatin Technlgy (IT) Usage Plicy is the fundatin f the Cunty s infrmatin
More informationMeopham School Information Technology Code of Conduct
1. Intrductin Infrmatin technlgy resurces are essential fr accmplishing Mepham Schl s missin f pursuing excellence in teaching and learning, research and cmmunity service. Members f the Schl cmmunity are
More informationProject Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES
Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care
More informationCloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013
Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies
More informationHIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
More informationPlus500CY Ltd. Statement on Privacy and Cookie Policy
Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and
More informationUniversity of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments
University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department
More informationTechnical Writing - TheUsers Visa (SHR User Accunt)
POLICY Number: 7311-25-004 Title: Saskatn Health Regin User Accunt Plicy Authrizatin [ ] President and CEO [X] Vice President, Finance and Crprate Services Surce: Directr, Infrmatin Technlgy Services Crss
More informationErie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services
Erie Cmmunity Cllege Acceptable Use Plicy Last Revisin: December 17, 2009 Cllege Infrmatin Technlgy Services Erie Cmmunity Cllege Cllege Infrmatin Technlgy Services Acceptable Use Plicy Last Revisin:
More informationImmaculate Conception School, Prince George Bring Your Own Device Policy for Students
Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,
More informationHampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices
This is being prvided t yu as a requirement f the privacy regulatins issued under the Health Insurance Prtability and Accuntability Act f 1996 (HIPAA). This ntice describes hw HROSM may use and disclse
More informationTo clarify terms used within these policies, the following definitions are provided:
Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail
More informationDisplayNote Technologies Limited Data Protection Policy July 2014
DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f
More informationHIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
More informationCOMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE
COMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE COMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE Mst dealers are familiar with the requirements f the Gramm-Leach-Bliley Act
More informationWHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy
WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin
More informationWilliamson County Board of Education Procedures and Guidelines
Williamsn Cunty Bard f Educatin Prcedures and Guidelines Effective Date: 6/21/10; 8/15/11; Page 1 f 7 PURPOSE Williamsn Cunty Schls prvides student and emplyee access t the Internet as a means t increase
More informationPrivacy and Security Training Policy (PS.Pol.051)
Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider
More informationHow To Ensure Your Health Care Is Safe
Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t
More informationPersonal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
More informationKey Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
More informationNew York Institute of Technology Faculty and Staff Email Retention Policy
New Yrk Institute f Technlgy Faculty and Staff Email Retentin Plicy Nvember 2013 I. PURPOSE As electrnic mail (email) has becme the primary frm f cmmunicatin at NYIT and thrughut the wrld, the vlume f
More informationHow To Ensure That The Internet Is Safe For A Health Care Worker
POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy
More informationCreating an Ethical Culture and Protecting Your Bottom Line:
Creating an Ethical Culture and Prtecting Yur Bttm Line: Best Practices fr Crprate Cdes f Cnduct Nte: The infrmatin belw and all infrmatin n this website is nt meant t be taken as legal advice. Please
More informationFINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.
FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept
More informationTHE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM
THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant
More informationInformation Security Policy
Purpse The risk t Charlestn Suthern University, its emplyees and students frm data lss and identity theft is f significant cncern t the University and can be reduced nly thrugh the cmbined effrts f every
More informationNSW FAIR TRADING. Real Estate Fraud Prevention Guidelines
NSW FAIR TRADING Real Estate Fraud Preventin Guidelines Real Estate Fraud Preventin Guidelines Cntents 1. Intrductin..... 2 2. Backgrund.. 2 3. The Law.. 2 4. Cmmissiner s Guidance.... 3 5. Prescribed
More informationTHIRD PARTY PROCUREMENT PROCEDURES
ADDENDUM #1 THIRD PARTY PROCUREMENT PROCEDURES NORTH CENTRAL TEXAS COUNCIL OF GOVERNMENTS TRANSPORTATION DEPARTMENT JUNE 2011 OVERVIEW These prcedures establish standards and guidelines fr the Nrth Central
More informationEmployees - recruitment, records and monitoring
Emplyees - recruitment, recrds and mnitring This guidance has been prduced t help rganisatins cmply with the Data Prtectin Act (DPA) when recruiting and emplying wrkers. It is relevant t public sectr emplyers,
More informationMalpractice and Maladministration Policy
TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs
More informationSources of Federal Government and Employee Information
Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities
More informationInternet Banking Agreement and Disclosure Statement
Internet Banking Agreement and Disclsure Statement This agreement cntains the terms and cnditins that gvern accessing r using Internet Banking (NetTeller), Bill Payment Services, Mbile Banking and On Demand
More informationThe information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice.
Privacy Plicy Terms f Service: The fllwing terms and cnditins gvern all use f the Rightwaywebhsting.cm website and all cntent, services and prducts available at r thrugh the website (taken tgether, the
More informationADMINISTRATIVE REGULATIONS TABLE OF CONTENTS
ADMINISTATIVE EGULATIONS TABLE OF CONTENTS 8000 INFOMATION TECHNOLOGY 8100 Intrductin and Gvernance 8200 Apprpriate Use 8300 Access 8400 Data Security 8500 Hardware and Sftware Supprt 8700 Electrnic Cmmunicatin
More informationMSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER
MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER This Audit Cmmittee Charter has been amended as f July 17, 2015. The Audit Cmmittee shall review and reassess this Charter annually and recmmend
More informationUNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM WB-DEC
UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washingtn, D.C. 20549 FORM WB-DEC DECLARATION OF ORIGINAL INFORMATION SUBMITTED PURSUANT TO SECTION 21F OF THE SECURITIES EXCHANGE ACT OF 1934 A. SUBMITTER
More informationSession 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
More informationOnline Banking Agreement
Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet
More informationPOLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
More informationHIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.
HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN
More informationPrivacy Plicy Welcme, Sensati & JHI
Privacy Plicy Welcme t www.framesdata.cm! This site (the Frames Data Online Site ) is wned by Frames Data Inc. ("FDI" r we ), a subsidiary f Jbsn Medical Infrmatin LLC ("JMI") and its parent, Jbsn Healthcare
More informationWHITE PAPER: UNIVERSITY AND COLLEGE COMPLIANCE WITH THE FOREIGN CORRUPT PRACTICES ACT IN CONNECTION WITH FOREIGN ACADEMIC PROGRAMS
WHITE PAPER: UNIVERSITY AND COLLEGE COMPLIANCE WITH THE FOREIGN CORRUPT PRACTICES ACT IN CONNECTION WITH FOREIGN ACADEMIC PROGRAMS By Sean R. Kelly, Esq. DanaLynn T. Cla, Esq. Saiber, LLC 18 Clumbia Turnpike,
More informationFERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT
1 FERRIS STATE UNIVERSITY SCHOOL f NURSING CODE f CONDUCT The Schl f Nursing (SON) at Ferris State University uphlds the University Cde f Student Cnduct and the American Nurses Assciatin Cde f Ethics.
More informationProcess for Responding to Privacy Breaches
Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. HIPAA: Use and Disclosure of Protected Health Information
Page 1 f 23 HIPAA: Use and Disclsure f Prtected Health Infrmatin Applies t: faculty staff students student emplyees visitrs cntractrs clinicians Effective Date f This Revisin: Nvember 27, 2012 Cntact fr
More informationMulti-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021
Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada
More informationHow To Get A Credit By Examination
LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION FACT SHEET Texas Ri Salad Cllege, a Maricpa Cunty Cmmunity Cllege in Tempe, Arizna, is prud t annunce its Credit by Examinatin prgram in Law Enfrcement
More informationexpertise hp services valupack consulting description security review service for Linux
expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS
More informationFAYETTEVILLE STATE UNIVERSITY
FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty
More informationIT Account and Access Procedure
IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1
More informationPurpose Statement. Objectives
Apprved by Academic Affairs Cuncil, June 24, 2014 Faculty Handbk Part VI: Other Plicies and Prcedures Sectin R. Intellectual Prperty Classified Emplyee Handbk Part VI: Other Plicies and Prcedures Sectin
More informationHeythrop College Disciplinary Procedure for Support Staff
Heythrp Cllege Disciplinary Prcedure fr Supprt Staff Intrductin 1. This prcedural dcument des nt apply t thse academic-related staff wh are mentined in the Cllege s Ordinance, namely the Librarian and
More informationDETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only
DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM Fr 8 th 12 th Grade Students Only Student s Last Name Parent/Guardian Last Name Class First Name First Name Date Fr the first time this fall, students
More informationFrequently Asked Questions About I-9 Compliance
Frequently Asked Questins Abut I-9 Cmpliance What is required t verify wrk authrizatin? The basic requirement t verify wrk authrizatin is the Frm I-9. This frm is available n the HR website: http://www.fit.edu/hr/dcuments/frms/i-9.pdf
More informationPrivacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.
Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive
More informationNYU Langone Medical Center NYU Hospitals Center NYU School of Medicine
Title: Identity Theft Prgram Effective Date: July 2009 NYU Langne Medical Center NYU Hspitals Center NYU Schl f Medicine POLICY It is the plicy f the NYU Langne Medical Center t educate and train staff
More informationIN-HOUSE OR OUTSOURCED BILLING
IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability
More informationInformation Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
More informationColumbine Federal Credit Union ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE
Clumbine Federal Credit Unin ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE 1. Online Banking/Bill Payment 2. Online Banking/ Bill Payment Limitatins 3. Online Bill Payment
More informationState Fleet Card Oversight Usage and Responsibilities
State Fleet Card Oversight Usage and Respnsibilities Intrductin The Department f General Services (DGS), Office f Fleet and Asset Management (OFAM) administers a statewide ne-prvider payment system cntract
More informationWho Defines Fraud, Waste, and Abuse?
Wh Defines Fraud, Waste, and Abuse? This dcument cntains a sample f the varius definitins f the terms Fraud, Waste, and Abuse frm gvernment agencies and health plans. There are mre. The lack f a cncrete
More informationHow To Write A Scial Media Plicy
Scial Media Plicy Scial Media Plicy Recrd Number D14/78 Respnsible Manager Directr Business Supprt and Strategy Manager Custmer and Cmmunicatins Last reviewed 11 February 2014 Adptin reference Cuncil Reslutin
More informationKentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT
Kentwd Plice Department 4742 Walma Ave SE Kentwd, Michigan 49512 (616) 698-6580 http://www.ci.kentwd.mi.us REPORTING IDENTITY THEFT If yu are the victim f identity theft and ne f the fllwing cnditins are
More informationData Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
More informationERISA Compliance FAQs: Fiduciary Responsibilities
Brught t yu by Mrris & Reynlds Insurance ERISA Cmpliance FAQs: Fiduciary Respnsibilities The Emplyee Retirement Incme Security Act f 1974 (ERISA) is a federal law that sets minimum standards fr emplyee
More informationensure that all users understand how mobile phones supplied by the council should and should not be used.
Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended
More informationElectronic and Information Resources Accessibility Compliance Plan
Electrnic and Infrmatin Resurces Accessibility Cmpliance Plan Intrductin The University f Nrth Texas at Dallas (UNTD) is cmmitted t prviding a wrk envirnment that affrds equal access and pprtunity t therwise
More informationTHRIFTY DRUG STORES, INC. d/b/a THRIFTY WHITE DRUG / WHITE DRUG / BELL PHARMACY/VALLEY DRUG/ THRIFTY NYSTROM DRUG NOTICE OF PRIVACY PRACTICES
THRIFTY DRUG STORES, INC. d/b/a THRIFTY WHITE DRUG / WHITE DRUG / BELL PHARMACY/VALLEY DRUG/ THRIFTY NYSTROM DRUG NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY
More informationImproved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
More informationGOVERNORS PHARMACY HIPAA NOTICE OF PRIVACY PRACTICES For Your Protected Health Information
GOVERNORS PHARMACY HIPAA NOTICE OF PRIVACY PRACTICES Fr Yur Prtected Health Infrmatin THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS
More informationRemote Working (Policy & Procedure)
Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer
More informationTITLE: RECORDS AND INFORMATION MANAGEMENT POLICY
TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act
More informationCarbonite Recovery Services Cover Sheet
Carbnite Recvery Services Cver Sheet Frm: Name f Requestr Cmpany Name (if applicable) Ticket Number (frm cnfirmatin email): Fax T: Carbnite Recvery Services Team 617-536- 0686 This FAX shuld include the
More informationALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY. Approved by Governing Body on: 6 th May 2015
ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY Gvernrs Cmmittee: Finance and General Purpses Apprved by Gverning Bdy n: 6 th May 2015 Signed: (Chair f Cmmittee) Signed: (Headteacher) Date t be
More informationTrustED Briefing Series:
TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers
More informationColorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies
Clrad Rapids Yuth Sccer Club Scial Media and Electrnic Cmmunicatin Plicies OVERVIEW Online, scial media and ther electrnic cmmunicatin tls such as text messaging have becme a prevalent and effective means
More informationStatement of Work For. Federal Communications Commission. Emergency Mass Notification and Response System
Federal Cmmunicatins Cmmissin 1.0 INTRODUCTION Statement f Wrk Fr Federal Cmmunicatins Cmmissin Emergency Mass Ntificatin and Respnse System The Federal Cmmunicatins Cmmissin (FCC) is an independent United
More informationHIPAA Legislation - Key Provisions
HIPAA SECURITY, PRIVACY, AND THE NATIONAL PROVIDER IDENTIFIER Frederick Britten Frt Hays State University Carl Ann Raymnd The University f Gergia Outline HIPAA Review Enfrcement Update Natinal Prvider
More informationACTIVITY MONITOR Real Time Monitor Employee Activity Monitor
ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library
More informationCell Phone & Data Access Policy Frequently Asked Questions
Cell Phne & Data Access Plicy Frequently Asked Questins 1. Wh is eligible fr a technlgy allwance? First and fremst, the technlgy allwance is fr the benefit f the University, rather than fr the cnvenience
More informationVersion Date Comments / Changes 1.0 January 2015 Initial Policy Released
Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance
More information