Remote Working (Policy & Procedure)
|
|
- Mavis Cannon
- 8 years ago
- Views:
Transcription
1 Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer & Infrmatin Gvernance Manager Related Infrmatin Cmputer Misuse Act 1990 Data Prtectin Act Gvernment Prtective Marking Scheme ICT Acceptable Use Plicy Mbile Phne Plicy Official Secrets Act 1989 Regulatin f Investigatry Pwers Act The Telecmmunicatins (Lawful Business Practice) (Interceptin f Cmmunicatins) Regulatins 2000 Date First Apprved at FPG 05/12/2012 This Versin Versin 1.0 Created 12/09/2012 Date f Next Review 05/12/2015 September 2012
2 Remte Wrking PSD Plicy Statement Merseyside Plice needs t maintain a high level f cnfidence and trust with ur custmers, suppliers, ther frces, criminal justice agencies and ur crime and disrder partners. We must, therefre, be able t demnstrate that business infrmatin is prtected frm bth intentinal and unintentinal misuse irrespective f the lcatin at which the infrmatin is handled. Aims This plicy aims t establish minimum prtective measures by utlining the physical and ICT cntrls applicable when wrking n fficial infrmatin away frm fficial premises. The plicy is underpinned by prcedures designed t prvide clear, definitive and unambiguus directin fr all thse invlved in remte wrking. This shuld help t prtect the Merseyside Plice Cmputer Netwrk, equipment and the infrmatin that it hlds. Objectives A brad bjective is t enable the rganisatin and its emplyees t gain the maximum business benefit frm using frce infrmatin. Mre specific assciated bjectives are t: a) Safeguard the rganisatin s infrmatin. b) Prtect the rganisatin frm ptential legal liabilities and prtect the reputatin f Merseyside Plice. c) Ensure all individuals using frce infrmatin in remte lcatins understand their persnal respnsibilities. d) Ensure that ICT systems and equipment used fr remte wrking are used apprpriately. Applicatin and Scpe The plicy applies t the use f all Merseyside Plice infrmatin frm any remte wrking lcatin. Remte wrkers must ensure that they read, understand and cmply with all relevant frce plicies and thse prcedures cntained within, r referenced frm, this dcument. Failure t cmply may lead t a breach in system security and cnsequently may lead t disciplinary actin. Remte wrking refers t any wrk dne utside f Merseyside Plice premises, including accessing, string, prcessing r discussing business infrmatin. This culd be at hme, at anther frce r at a partner agency. It als cvers mbile wrking; traveling n public r private transprt; staying in htels; in public places such as libraries r cffee shps r even having telephne cnversatins in the street. All system use is audited and system users shuld have n expectatin f privacy. Merseyside Plice will take criminal and/r disciplinary actin against any emplyee wh wilfully misuses its systems. Status: V1.0 1 Last Update: 26/09/2012
3 Remte Wrking PSD Outcme Evaluatin The Anti Crruptin Unit will retain respnsibility fr ensuring that the use f ICT systems and frce infrmatin is audited and mnitred n an nging basis. Relevant data will include the number f cases investigated by the ACU and cmplaints/referrals t PSD n assciated issues. Status: V1.0 2 Last Update: 26/09/2012
4 Remte Wrking PSD 1. Remte Wrking Prcedures 1.1 Persnal Respnsibility All users f Merseyside Plice ICT systems, equipment and infrmatin have a persnal respnsibility t prtect frce infrmatin and assets that are under their cntrl. This includes keeping them physically safe when in transit and securely string all papers and prtable ICT equipment when wrk is finished When wrking frm hme it is the persnal respnsibility f the individual t make sure infrmatin is safe and the individual s husehld understands the need fr the security measures t be taken. 1.2 Security Measures The fllwing pints cver the security measures needed t wrk securely utside f Merseyside Plice premises It is necessary t: a) Obtain the Head f Department r Area Cmmander s apprval befre cmmencement f remte wrking. b) Be familiar with and abide by the security requirements f all frce plicies and legislatin and in particular: Acceptable Use f ICT Plicy Gvernment Prtective Marking Scheme (GPMS) Data Prtectin Plicy & Electrnic Messaging Plicy Internet Plicy c) Cnsider the GPMS prtective marking f the infrmatin yu will be wrking n and handle this in line with frce plicies and prcedures. d) Transprt papers, prtable ICT, fficial briefcases and phnes securely. Keep them with yu at all times when travelling and stre them securely. D nt leave frce infrmatin in vehicles that are left unattended i.e. vernight r during breaks in jurneys. e) Make sure yur lcatin is sensibly secure t wrk in, fr example it is nt verlked. D nt wrk n sensitive matters in a public place. If wrking frm hme, if pssible, use a rm where the dr can be clsed and may be lcked at the end f the day. f) Put yur papers away and lck yur laptp/pc if stepping away frm yur ICT. g) Use the security ptins n yur mbile phne, such as a pin number r a passwrd. h) Remember that telephnes are nt secure, be aware telephne calls are transmitted ver pen lines. i) Ensure that remvable media cntaining frce infrmatin must be encrypted by using frce systems. j) Always recrd business infrmatin n apprved ICT equipment. Be aware that the Freedm f Infrmatin Act applies t any infrmatin cncerning fficial business held in persnal accunts r n yur persnal ICT. k) Bring prtectively marked infrmatin back int the ffice fr secure dispsal if there is n apprved secure destructin facility available. l) Cntact the ICT Helpdesk, if travelling r wrking verseas, t check whether security restrictins apply. Status: V1.0 3 Last Update: 26/09/2012
5 Remte Wrking PSD It is vital that remte wrkers d nt: a) Wrk n r stre persnal data r prtectively marked data n persnal ICT. This includes PCs, laptps, tablets, CDs, DVDs, memry sticks etc. b) Send r frward persnal data r prtectively marked data ver the Internet r t private addresses. c) Share yur passwrd with anyne. d) Stre yur passwrd with yur ICT. e) Hld sensitive cnversatins, r thse invlving persnal data, in public. Only use secure r wait until yu are back in the ffice if pssible. f) Give ut persnal cntact numbers withut the wner s cnsent and be wary f unidentified callers. 2 Incident Management Prcedures 2.1 Incident Reprting Structure Individuals wh becme aware that an IT system infrmatin has, r may have been, cmprmised, must reprt this, at the first available pprtunity, t the ICT Helpdesk and Infrmatin Gvernance Manager via their line manager. Reprts shuld be made using the frm available n the frce Intranet. It is a requirement that they include all relevant details, including, where pssible, what infrmatin may have been cmprmised. The types f incident that need t be reprted are: a) Suspected r actual lss f, r unauthrised access t, Prtectively Marked material this includes unauthrised individuals lking at IT system infrmatin n a terminal screen r in hard-cpy frmat. b) Cmprmise f security measures prtecting IT system infrmatin this includes malfunctining lcks, brken shredders, and lst keys t security cntainers. c) Suspected virus infectin f the IT system r terminal, including unexpected errr messages r warning messages frm anti-virus sftware. d) Previusly unidentified threats t IT system infrmatin Where an individual suspects that a virus has infected a terminal, they must stp using the terminal and cntact the ICT Helpdesk immediately fr advice, either by telephne r by frm a different terminal Any suspected lss, theft r cmprmise f IT system infrmatin r equipment will be initially investigated by the Frce Infrmatin Gvernance Manager, in cases where security has been breached, r the Anti Crruptin Unit, where internal miscnduct is suspected. If it is believed that the safety f an individual r individuals may be cmprmised by an incident, apprpriate actin will be taken, in cmpliance with Frce plicy. 2.2 General Incident and Fault Reprting Structure IT system users shuld cntact the ICT Helpdesk fr general IT system related issues. Only apprved IT supprt staff must deal with any IT system issues. Hwever in sme cases a Systems Administratr may deal directly with sme functinal issues. Status: V1.0 4 Last Update: 26/09/2012
6 Remte Wrking PSD Appendix 1 Glssary f Terms GPMS Gvernment Prtective Marking Scheme ACU Anti Crruptin Unit ICT Infrmatin Cmmunicatin Technlgy, this is a term used t cver all the technlgies used fr infrmatin prcessing, including sftware, hardware, cmmunicatins technlgies and related services. ICT systems A term used t describe ICT and the prcesses, prcedures and ther functins that are used t supprt a business prcess. Remvable Media All prtable devices used t stre data. e.g. USB Sticks CD-Rm, DVD Malware A Malicius r unwanted sftware prgram. Persnal Data Infrmatin frm which a living individual can be identified either frm that infrmatin r that and ther available infrmatin. Appendix 2 Cntact Infrmatin Rle Descriptin f Rle Cntact ICT Helpdesk Infrmatin Gvernance Manager Data Prtectin Officer IT Security Officer The Frce Recrds Manager Systems Administratr The first pint f call fr all IT issues. Prvides advice and reslutin t IT issues. Prvides advice and guidance n security educatin, training and gd practice. Prvides advice n plicies and prcedures. Prvides advice and guidance n Data Prtectin educatin, training and gd practice. Prvides advice n plicies and prcedures. The IT Security Officer prvides advice and guidance n technical security practice and Infrmatin Systems. Prvides advice n the management f frce recrds and their retentin. Systems Administratrs are respnsible fr the day-t-day management, security, mnitring and administratin f individual systems. ICT Department Tel: IT Helpdesk Anti Crruptin Unit Tel: Infrmatin Security Anti Crruptin Unit Tel: Infrmatin Security ICT Department Tel: IT Security Officer Infrmatin Bureau Tel: Recrds Management Each system has its wn systems administratr. Cntact the ICT Helpdesk fr advice. Tel: IT Helpdesk Status: V1.0 5 Last Update: 26/09/2012
Data Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
More informationPersonal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
More informationInternet and E-Mail Policy User s Guide
Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin
More informationData Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
More informationHIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
More informationGUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
More informationVCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
More informationProcess for Responding to Privacy Breaches
Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident
More informationKey Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
More informationBLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS
BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin
More informationLINCOLNSHIRE POLICE Policy Document
LINCOLNSHIRE POLICE Plicy Dcument 1. POLICY IDENTIFICATION PAGE POLICY TITLE: ICT CHANGE & RELEASE MANAGEMENT POLICY POLICY REFERENCE NO: PD 186 POLICY OWNERSHIP: ACPO Cmmissining Officer: Prtfli / Business-area
More informationCASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles
More informationALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY. Approved by Governing Body on: 6 th May 2015
ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY Gvernrs Cmmittee: Finance and General Purpses Apprved by Gverning Bdy n: 6 th May 2015 Signed: (Chair f Cmmittee) Signed: (Headteacher) Date t be
More informationUniversity of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments
University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department
More informationHIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
More informationDisplayNote Technologies Limited Data Protection Policy July 2014
DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f
More informationNHS WEST NORFOLK CLINICAL COMMISSIONING GROUP SAFEHAVEN POLICY
NHS WEST NORFOLK CLINICAL COMMISSIONING GROUP SAFEHAVEN POLICY 1 DOCUMENT CONTROL SHEET Name f Dcument: Safehaven Plicy Versin: 1 File Lcatin / Dcument Name: Held by Senir Infrmatin Risk Owner (SIRO):
More informationIn addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
More informationHow To Deal With A Data Breach In The European Law
Data Prtectin: Regulating Cyber Security Jnathan Bamfrd Head f Strategic Liaisn Hw des DP regulatin affect cyber security? Data Prtectin Act 1998: apprpriate security Privacy and Electrnic Cmmunicatin
More informationUnified Infrastructure/Organization Computer System/Software Use Policy
Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help
More informationProcess of Setting up a New Merchant Account
Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am
More informationPrivacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.
Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive
More informationCorporate Standards for data quality and the collation of data for external presentation
The University f Kent Crprate Standards fr data quality and the cllatin f data fr external presentatin This paper intrduces a set f standards with the aim f safeguarding the University s psitin in published
More informationFor students to participate in BYOD please follow these two steps
www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many
More informationTITLE: RECORDS AND INFORMATION MANAGEMENT POLICY
TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act
More informationCOPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
More informationTrustED Briefing Series:
TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers
More informationSecurity Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview
Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the
More informationISMF Standard 141 Endpoint Protection. OCIO/S4.6 Government standard on cyber security
ISMF Standard 141 OCIO/S4.6 Gvernment standard n cyber security Prepared by: Office f the Chief Infrmatin Officer Versin: v1.0 Date: 12 September 2014 GOVERNMENT STANDARD ON CYBER SECURITY OCIO/S4.6 Cnfidentiality:
More informationDETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only
DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM Fr 8 th 12 th Grade Students Only Student s Last Name Parent/Guardian Last Name Class First Name First Name Date Fr the first time this fall, students
More informationRecords management guidance 12. Disposing of Information
Recrds management guidance 12 Dispsing f Infrmatin Dispsing f Infrmatin Why dispse f recrds? T save space, time and equipment. T find the right (versin f) infrmatin quickly and efficiently. T meet bligatins
More informationPublic consultation paper
Public cnsultatin paper Nvember 2012 Public cnsultatin n guidelines fr prfessinal indemnity insurance arrangements fr nurses and nurse practitiners. Please prvide feedback by email t: nmbafeedback@ahpra.gv.au
More informationnbn is committed to identifying hazards, preventing workplace accidents and minimising dangerous health safety and environment incidents.
Incident & Hazard Reprting Overview At nbn we are safe, disciplined and reliable. nbn is cmmitted t preventing injury, illness and envirnmental harm by prviding a safe and healthy wrking envirnment fr
More informationHampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices
This is being prvided t yu as a requirement f the privacy regulatins issued under the Health Insurance Prtability and Accuntability Act f 1996 (HIPAA). This ntice describes hw HROSM may use and disclse
More informationWHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy
WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin
More informationCell Phone & Data Access Policy Frequently Asked Questions
Cell Phne & Data Access Plicy Frequently Asked Questins 1. Wh is eligible fr a technlgy allwance? First and fremst, the technlgy allwance is fr the benefit f the University, rather than fr the cnvenience
More informationBYOD and Cloud Computing
BYOD and Clud Cmputing AIIM First Canadian Chapter May 22, 2014 Susan Nickle, Lndn Health Sciences Centre Chuck Rthman, Wrtzmans Sheila Taylr, Erg Infrmatin Management Cnsulting Clud cmputing Agenda What
More informationMulti-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021
Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada
More informationRUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer
RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible
More informationSouth Australia Police POSITION INFORMATION DOCUMENT
Suth Australia Plice POSITION INFORMATION DOCUMENT Stream: Career Grup: Discipline: Classificatin: Service: Branch: Psitin Title: Administrative Services Cnsultancy and Infrmatin AO ASO-6 Infrmatin Systems
More informationImproved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
More informationNorwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16
Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected
More informationensure that all users understand how mobile phones supplied by the council should and should not be used.
Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended
More informationAccessible Service Policy
Accessible Service Plicy Date Created Revisin Oct. 16, 2012 1 Gal This plicy is intended t meet the requirements f the Accessibility Standards fr Custmer Service, Ontari Regulatin 429/07 under the Accessibility
More informationSystems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
More informationPOLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
More informationCloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013
Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies
More informationACTIVITY MONITOR Real Time Monitor Employee Activity Monitor
ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library
More informationNHVAS Mass Management Spot Check Checklist
Legal Entity Name f NHVAS Operatr: DTMR Representative: Lcatin: NHVAS Mass Management Spt Check Checklist Spt Check Date: Spt Check Number: DMS Number: 540/ The fllwing surces f evidence have been identified
More informationTHE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM
THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant
More informationGUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN
Gvernment f Newfundland and Labradr Office f the Chief Infrmatin Officer Infrmatin Management Branch GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Guideline (Definitin): OCIO Guidelines derive frm
More informationEmployees - recruitment, records and monitoring
Emplyees - recruitment, recrds and mnitring This guidance has been prduced t help rganisatins cmply with the Data Prtectin Act (DPA) when recruiting and emplying wrkers. It is relevant t public sectr emplyers,
More informationWadham College Information Security Policy
Wadham Cllege Infrmatin Security Plicy 1. Intrductin In July 2012 the University f Oxfrd apprved its Infrmatin Security plicy that had been created t prtect the University frm serius infrmatin security
More informationTexas Woman's University University Policy Manual
Texas Wman's University University Plicy Manual Plicy Name: Plicy Number: 6.06 Date Passed: July 2004 Health Insurance Prtability& Accuntability Act (HIPAA) Date Reviewed: September 2008 Next Review: September
More informationFAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT
FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028
More informationFirst Global Data Corp.
First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First
More informationRequest for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply
Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t
More informationInformation Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
More informationHillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network
2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal
More informationFINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.
FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept
More informationTerms and Conditions of Use of Bewley s Hotel Dublin Airport Car Park
Terms and Cnditins f Use f Bewley s Htel Dublin Airprt Car Park Yu shuld read these Cnditins f Parking carefully as they cntain imprtant infrmatin regarding yur legally binding cntract with us. 1. The
More informationLines of Business: Auto Liability, General Liability, Professional Liability, Worker s Compensation
Cell Phne Usage Lines f Business: Aut Liability, General Liability, Prfessinal Liability, Wrker s Cmpensatin www.tridentinsurance.net Risk Cntrl Strategy/Key Issues: Develp cntrls t prevent ver the rad
More informationPENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK
Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs
More informationColorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies
Clrad Rapids Yuth Sccer Club Scial Media and Electrnic Cmmunicatin Plicies OVERVIEW Online, scial media and ther electrnic cmmunicatin tls such as text messaging have becme a prevalent and effective means
More informationMbile Plicy FER specification - Review
Mbile Plicy Mbile Plicy Purpse f this Dcument This dcument details the plicies fr prviding mbile phnes, tablet devices and the mbile services. This dcument will be reviewed every 12 mnths Authr: Thmas
More informationFAYETTEVILLE STATE UNIVERSITY
FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty
More informationInternet Banking Agreement and Disclosure Statement
Internet Banking Agreement and Disclsure Statement This agreement cntains the terms and cnditins that gvern accessing r using Internet Banking (NetTeller), Bill Payment Services, Mbile Banking and On Demand
More informationResearch Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013
Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,
More informationPrivacy and Security Training Policy (PS.Pol.051)
Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider
More informationService Level Agreement
Template SDSU-TPL-11085 v1.3 18/1/11 IT Services Service Level Agreement Staff Email and SMTP Accunts (EMSF) Versin: 0.1 01/11/2010 Service Level Agreement: Staff Email and SMTP Accunts (EMSF) Cntents
More informationSOFTWARE DEVELOPER POSITION BY RIOMED LTD. SAFE. EFFICIENT. QUALITY WORLD CLASS HEALTHCARE SOLUTION
SOFTWARE DEVELOPER POSITION BY RIOMED LTD. SAFE. EFFICIENT. QUALITY WORLD CLASS HEALTHCARE SOLUTION JOB DESCRIPTION POSITION: EXPERIENCED SOFTWARE DEVELOPER LOCATION: INDIA REPORTING TO: COMPANY DIRECTOR
More informationCPIT Aoraki ICT Asset and Media Security Standard
CPIT Araki Crprate Services Divisin: ICT This security standard refers t CPIT, which is the current legal name fr the new rganisatin established 1 January 2016 bringing tgether CPIT and Araki Plytechnic.
More informationMalpractice and Maladministration Policy
TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs
More informationACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.
Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it
More informationImmaculate Conception School, Prince George Bring Your Own Device Policy for Students
Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,
More informationHow To Ensure That The Internet Is Safe For A Health Care Worker
POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy
More informationHow to Address Key Selection Criteria
Hw t Address Key Selectin Criteria Yu've seen an jb pprtunity that yu're interested in, n a jbs bard r in the press and want t apply, but where d yu start? A key requirement fr jbs in Gvernment is t respnd
More informationCMS Eligibility Requirements Checklist for MSSP ACO Participation
ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.
More informationDATE APPROVED March 2011. Version Date Comments / Changes 1.0 March 2011 Initial policy released
Page 1 f 11 APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial plicy released 1. PURPOSE OF THIS POLICY T define the purpses fr which Crprate Purchase Cards are t be used
More informationIMPLEMENTATION DETAILS
Plicy: Title: Status: 1. Intrductin ISP-I10 Payment Card Security Apprved Infrmatin Security Plicy Dcumentatin IMPLEMENTATION DETAILS 1.1. This dcument supprts implementatin f the "Payment Card Industry
More informationHow To Write A Disaster Recovery Plan
Dcument Preview This is nly a prtin f the entire, custmizable dcument. KEEP IN DISASTER RECOVERY PLAN and a cpy ff-site Disaster Recvery and Business Cntinuity Plan Fr Name f Cmpany Name Lcatin f Date
More informationService Desk Self Service Overview
Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service
More informationSKILLS CANADA - ONTARIO
Emplyment Plicy and Prcedure Manual Sectin: Cmmunicatin SPP N: 4.06 Subject: AODA Custmer Service Issued: January 31, 2016 Issue t: All Manual Hlders Replaces: NA Issued by: Re-Evaluatin Date: NA Executive
More informationTo clarify terms used within these policies, the following definitions are provided:
Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail
More informationInformation & Communications Technology ICT Security Compliance Guide (Student)
Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0
More informationHi-Tech will not be responsible if your hardware fails and you lose your residents medical record documentation and/or MDS records.
Overview... 1 Prepare fr E-Signatures... 1 Set Up Electrnic Signatures fr Clinical Assessments, Ntes and the MDS 3.0... 2 Put Users Electrnic Signatures n File... 2 Select Recrds t be Signed Electrnically...
More informationCHANGE MANAGEMENT STANDARD
The electrnic versin is current, r when printed and stamped with the green cntrlled dcument stamp. All ther cpies are uncntrlled. DOCUMENT INFORMATION Descriptin Dcument Owner This standard utlines the
More informationEmail Use Policy. Effective November 2015 Present
Email Use Plicy Effective Nvember 2015 Present UNIVERSITY OF CENTRAL LANCASHIRE Email Use Plicy v.2.0 Page 1 f 12 Cntents A Intrductin and definitins... 3 B Scpe f the plicy... 3 C Respnsibilities... 3
More informationCorporate Account Takeover & Information Security Awareness
Crprate Accunt Takever & Infrmatin Security Awareness What is Crprate Accunt Takever? A fast grwing electrnic crime where thieves typically use sme frm f malware t btain lgin credentials t Crprate Online
More informationService Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S
Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...
More informationPlus500CY Ltd. Statement on Privacy and Cookie Policy
Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and
More informationUBC Incident Response Plan V1.5
UBC Incident Respnse Plan V1.5 Cntents 1. Ratinale... 2 2. Objective... 2 3. Applicatin... 2 4. Reprting a Cmputer Security Incident... 2 5. Managing the Security Incident... 2 5.1. All Incidents... 2
More informationWiltshire College. Job Description. Public Relations Officer (Fixed term maternity cover) 5: 21,103 per annum Marketing and Communications Manager
Wiltshire Cllege Jb Descriptin Jb Title: Grade: Respnsible t: Lcatin: Public Relatins Officer (Fixed term maternity cver) 5: 21,103 per annum Marketing and Cmmunicatins Manager Trwbridge Intrductin All
More informationCOMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS for STUDY ABROAD PROGRAMS
COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS fr STUDY ABROAD PROGRAMS Belw is a list f items t address and questins that need t be addressed in the cmprehensive safety assessment. In additin t the safety
More informationAUDIT AND RISK COMMITTEE TERMS OF REFERENCE
AUDIT AND RISK COMMITTEE TERMS OF REFERENCE 1. TITLE OF COMMITTEE Audit and Risk Cmmittee 2. ESTABLISHMENT The Audit and Risk Cmmittee is established under Part 3 Sectin 19(1) f the Charles Darwin University
More informationSources of Federal Government and Employee Information
Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities
More informationHCHS Student ipad User Agreement
HCHS Student ipad User Agreement Schl ipad Initiative Hancck Cunty High Schl has initiated a 1:1 ipad prgram fr students and teachers in an effrt t embrace 21st Century Skills. Students will be using ipads
More informationPOSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position
Psitin Title I.T Prject Officer Classificatin Higher Educatin Wrker, Level 7 Respnsible t The Psitin I.T Manager The psitin assists with the cmpletin f varius IT prjects intended t enable the nging administratin
More information