Remote Working (Policy & Procedure)
|
|
|
- Mavis Cannon
- 10 years ago
- Views:
Transcription
1 Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer & Infrmatin Gvernance Manager Related Infrmatin Cmputer Misuse Act 1990 Data Prtectin Act Gvernment Prtective Marking Scheme ICT Acceptable Use Plicy Mbile Phne Plicy Official Secrets Act 1989 Regulatin f Investigatry Pwers Act The Telecmmunicatins (Lawful Business Practice) (Interceptin f Cmmunicatins) Regulatins 2000 Date First Apprved at FPG 05/12/2012 This Versin Versin 1.0 Created 12/09/2012 Date f Next Review 05/12/2015 September 2012
2 Remte Wrking PSD Plicy Statement Merseyside Plice needs t maintain a high level f cnfidence and trust with ur custmers, suppliers, ther frces, criminal justice agencies and ur crime and disrder partners. We must, therefre, be able t demnstrate that business infrmatin is prtected frm bth intentinal and unintentinal misuse irrespective f the lcatin at which the infrmatin is handled. Aims This plicy aims t establish minimum prtective measures by utlining the physical and ICT cntrls applicable when wrking n fficial infrmatin away frm fficial premises. The plicy is underpinned by prcedures designed t prvide clear, definitive and unambiguus directin fr all thse invlved in remte wrking. This shuld help t prtect the Merseyside Plice Cmputer Netwrk, equipment and the infrmatin that it hlds. Objectives A brad bjective is t enable the rganisatin and its emplyees t gain the maximum business benefit frm using frce infrmatin. Mre specific assciated bjectives are t: a) Safeguard the rganisatin s infrmatin. b) Prtect the rganisatin frm ptential legal liabilities and prtect the reputatin f Merseyside Plice. c) Ensure all individuals using frce infrmatin in remte lcatins understand their persnal respnsibilities. d) Ensure that ICT systems and equipment used fr remte wrking are used apprpriately. Applicatin and Scpe The plicy applies t the use f all Merseyside Plice infrmatin frm any remte wrking lcatin. Remte wrkers must ensure that they read, understand and cmply with all relevant frce plicies and thse prcedures cntained within, r referenced frm, this dcument. Failure t cmply may lead t a breach in system security and cnsequently may lead t disciplinary actin. Remte wrking refers t any wrk dne utside f Merseyside Plice premises, including accessing, string, prcessing r discussing business infrmatin. This culd be at hme, at anther frce r at a partner agency. It als cvers mbile wrking; traveling n public r private transprt; staying in htels; in public places such as libraries r cffee shps r even having telephne cnversatins in the street. All system use is audited and system users shuld have n expectatin f privacy. Merseyside Plice will take criminal and/r disciplinary actin against any emplyee wh wilfully misuses its systems. Status: V1.0 1 Last Update: 26/09/2012
3 Remte Wrking PSD Outcme Evaluatin The Anti Crruptin Unit will retain respnsibility fr ensuring that the use f ICT systems and frce infrmatin is audited and mnitred n an nging basis. Relevant data will include the number f cases investigated by the ACU and cmplaints/referrals t PSD n assciated issues. Status: V1.0 2 Last Update: 26/09/2012
4 Remte Wrking PSD 1. Remte Wrking Prcedures 1.1 Persnal Respnsibility All users f Merseyside Plice ICT systems, equipment and infrmatin have a persnal respnsibility t prtect frce infrmatin and assets that are under their cntrl. This includes keeping them physically safe when in transit and securely string all papers and prtable ICT equipment when wrk is finished When wrking frm hme it is the persnal respnsibility f the individual t make sure infrmatin is safe and the individual s husehld understands the need fr the security measures t be taken. 1.2 Security Measures The fllwing pints cver the security measures needed t wrk securely utside f Merseyside Plice premises It is necessary t: a) Obtain the Head f Department r Area Cmmander s apprval befre cmmencement f remte wrking. b) Be familiar with and abide by the security requirements f all frce plicies and legislatin and in particular: Acceptable Use f ICT Plicy Gvernment Prtective Marking Scheme (GPMS) Data Prtectin Plicy & Electrnic Messaging Plicy Internet Plicy c) Cnsider the GPMS prtective marking f the infrmatin yu will be wrking n and handle this in line with frce plicies and prcedures. d) Transprt papers, prtable ICT, fficial briefcases and phnes securely. Keep them with yu at all times when travelling and stre them securely. D nt leave frce infrmatin in vehicles that are left unattended i.e. vernight r during breaks in jurneys. e) Make sure yur lcatin is sensibly secure t wrk in, fr example it is nt verlked. D nt wrk n sensitive matters in a public place. If wrking frm hme, if pssible, use a rm where the dr can be clsed and may be lcked at the end f the day. f) Put yur papers away and lck yur laptp/pc if stepping away frm yur ICT. g) Use the security ptins n yur mbile phne, such as a pin number r a passwrd. h) Remember that telephnes are nt secure, be aware telephne calls are transmitted ver pen lines. i) Ensure that remvable media cntaining frce infrmatin must be encrypted by using frce systems. j) Always recrd business infrmatin n apprved ICT equipment. Be aware that the Freedm f Infrmatin Act applies t any infrmatin cncerning fficial business held in persnal accunts r n yur persnal ICT. k) Bring prtectively marked infrmatin back int the ffice fr secure dispsal if there is n apprved secure destructin facility available. l) Cntact the ICT Helpdesk, if travelling r wrking verseas, t check whether security restrictins apply. Status: V1.0 3 Last Update: 26/09/2012
5 Remte Wrking PSD It is vital that remte wrkers d nt: a) Wrk n r stre persnal data r prtectively marked data n persnal ICT. This includes PCs, laptps, tablets, CDs, DVDs, memry sticks etc. b) Send r frward persnal data r prtectively marked data ver the Internet r t private addresses. c) Share yur passwrd with anyne. d) Stre yur passwrd with yur ICT. e) Hld sensitive cnversatins, r thse invlving persnal data, in public. Only use secure r wait until yu are back in the ffice if pssible. f) Give ut persnal cntact numbers withut the wner s cnsent and be wary f unidentified callers. 2 Incident Management Prcedures 2.1 Incident Reprting Structure Individuals wh becme aware that an IT system infrmatin has, r may have been, cmprmised, must reprt this, at the first available pprtunity, t the ICT Helpdesk and Infrmatin Gvernance Manager via their line manager. Reprts shuld be made using the frm available n the frce Intranet. It is a requirement that they include all relevant details, including, where pssible, what infrmatin may have been cmprmised. The types f incident that need t be reprted are: a) Suspected r actual lss f, r unauthrised access t, Prtectively Marked material this includes unauthrised individuals lking at IT system infrmatin n a terminal screen r in hard-cpy frmat. b) Cmprmise f security measures prtecting IT system infrmatin this includes malfunctining lcks, brken shredders, and lst keys t security cntainers. c) Suspected virus infectin f the IT system r terminal, including unexpected errr messages r warning messages frm anti-virus sftware. d) Previusly unidentified threats t IT system infrmatin Where an individual suspects that a virus has infected a terminal, they must stp using the terminal and cntact the ICT Helpdesk immediately fr advice, either by telephne r by frm a different terminal Any suspected lss, theft r cmprmise f IT system infrmatin r equipment will be initially investigated by the Frce Infrmatin Gvernance Manager, in cases where security has been breached, r the Anti Crruptin Unit, where internal miscnduct is suspected. If it is believed that the safety f an individual r individuals may be cmprmised by an incident, apprpriate actin will be taken, in cmpliance with Frce plicy. 2.2 General Incident and Fault Reprting Structure IT system users shuld cntact the ICT Helpdesk fr general IT system related issues. Only apprved IT supprt staff must deal with any IT system issues. Hwever in sme cases a Systems Administratr may deal directly with sme functinal issues. Status: V1.0 4 Last Update: 26/09/2012
6 Remte Wrking PSD Appendix 1 Glssary f Terms GPMS Gvernment Prtective Marking Scheme ACU Anti Crruptin Unit ICT Infrmatin Cmmunicatin Technlgy, this is a term used t cver all the technlgies used fr infrmatin prcessing, including sftware, hardware, cmmunicatins technlgies and related services. ICT systems A term used t describe ICT and the prcesses, prcedures and ther functins that are used t supprt a business prcess. Remvable Media All prtable devices used t stre data. e.g. USB Sticks CD-Rm, DVD Malware A Malicius r unwanted sftware prgram. Persnal Data Infrmatin frm which a living individual can be identified either frm that infrmatin r that and ther available infrmatin. Appendix 2 Cntact Infrmatin Rle Descriptin f Rle Cntact ICT Helpdesk Infrmatin Gvernance Manager Data Prtectin Officer IT Security Officer The Frce Recrds Manager Systems Administratr The first pint f call fr all IT issues. Prvides advice and reslutin t IT issues. Prvides advice and guidance n security educatin, training and gd practice. Prvides advice n plicies and prcedures. Prvides advice and guidance n Data Prtectin educatin, training and gd practice. Prvides advice n plicies and prcedures. The IT Security Officer prvides advice and guidance n technical security practice and Infrmatin Systems. Prvides advice n the management f frce recrds and their retentin. Systems Administratrs are respnsible fr the day-t-day management, security, mnitring and administratin f individual systems. ICT Department Tel: IT Helpdesk Anti Crruptin Unit Tel: Infrmatin Security Anti Crruptin Unit Tel: Infrmatin Security ICT Department Tel: IT Security Officer Infrmatin Bureau Tel: Recrds Management Each system has its wn systems administratr. Cntact the ICT Helpdesk fr advice. Tel: IT Helpdesk Status: V1.0 5 Last Update: 26/09/2012
Data Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
Personal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
Internet and E-Mail Policy User s Guide
Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin
Data Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
HIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
GUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
VCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
Process for Responding to Privacy Breaches
Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident
Key Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS
BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin
LINCOLNSHIRE POLICE Policy Document
LINCOLNSHIRE POLICE Plicy Dcument 1. POLICY IDENTIFICATION PAGE POLICY TITLE: ICT CHANGE & RELEASE MANAGEMENT POLICY POLICY REFERENCE NO: PD 186 POLICY OWNERSHIP: ACPO Cmmissining Officer: Prtfli / Business-area
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles
HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
DisplayNote Technologies Limited Data Protection Policy July 2014
DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f
In addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
How To Deal With A Data Breach In The European Law
Data Prtectin: Regulating Cyber Security Jnathan Bamfrd Head f Strategic Liaisn Hw des DP regulatin affect cyber security? Data Prtectin Act 1998: apprpriate security Privacy and Electrnic Cmmunicatin
Process of Setting up a New Merchant Account
Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am
Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.
Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive
Corporate Standards for data quality and the collation of data for external presentation
The University f Kent Crprate Standards fr data quality and the cllatin f data fr external presentatin This paper intrduces a set f standards with the aim f safeguarding the University s psitin in published
For students to participate in BYOD please follow these two steps
www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many
TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY
TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act
COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
ISMF Standard 141 Endpoint Protection. OCIO/S4.6 Government standard on cyber security
ISMF Standard 141 OCIO/S4.6 Gvernment standard n cyber security Prepared by: Office f the Chief Infrmatin Officer Versin: v1.0 Date: 12 September 2014 GOVERNMENT STANDARD ON CYBER SECURITY OCIO/S4.6 Cnfidentiality:
nbn is committed to identifying hazards, preventing workplace accidents and minimising dangerous health safety and environment incidents.
Incident & Hazard Reprting Overview At nbn we are safe, disciplined and reliable. nbn is cmmitted t preventing injury, illness and envirnmental harm by prviding a safe and healthy wrking envirnment fr
WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy
WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin
Cell Phone & Data Access Policy Frequently Asked Questions
Cell Phne & Data Access Plicy Frequently Asked Questins 1. Wh is eligible fr a technlgy allwance? First and fremst, the technlgy allwance is fr the benefit f the University, rather than fr the cnvenience
Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021
Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada
RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer
RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible
South Australia Police POSITION INFORMATION DOCUMENT
Suth Australia Plice POSITION INFORMATION DOCUMENT Stream: Career Grup: Discipline: Classificatin: Service: Branch: Psitin Title: Administrative Services Cnsultancy and Infrmatin AO ASO-6 Infrmatin Systems
Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
ensure that all users understand how mobile phones supplied by the council should and should not be used.
Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended
Accessible Service Policy
Accessible Service Plicy Date Created Revisin Oct. 16, 2012 1 Gal This plicy is intended t meet the requirements f the Accessibility Standards fr Custmer Service, Ontari Regulatin 429/07 under the Accessibility
Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013
Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies
ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor
ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library
NHVAS Mass Management Spot Check Checklist
Legal Entity Name f NHVAS Operatr: DTMR Representative: Lcatin: NHVAS Mass Management Spt Check Checklist Spt Check Date: Spt Check Number: DMS Number: 540/ The fllwing surces f evidence have been identified
THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM
THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant
GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN
Gvernment f Newfundland and Labradr Office f the Chief Infrmatin Officer Infrmatin Management Branch GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Guideline (Definitin): OCIO Guidelines derive frm
FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT
FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028
First Global Data Corp.
First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First
Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply
Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t
Information Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network
2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal
FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.
FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept
Terms and Conditions of Use of Bewley s Hotel Dublin Airport Car Park
Terms and Cnditins f Use f Bewley s Htel Dublin Airprt Car Park Yu shuld read these Cnditins f Parking carefully as they cntain imprtant infrmatin regarding yur legally binding cntract with us. 1. The
PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK
Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs
Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013
Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,
Privacy and Security Training Policy (PS.Pol.051)
Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider
SOFTWARE DEVELOPER POSITION BY RIOMED LTD. SAFE. EFFICIENT. QUALITY WORLD CLASS HEALTHCARE SOLUTION
SOFTWARE DEVELOPER POSITION BY RIOMED LTD. SAFE. EFFICIENT. QUALITY WORLD CLASS HEALTHCARE SOLUTION JOB DESCRIPTION POSITION: EXPERIENCED SOFTWARE DEVELOPER LOCATION: INDIA REPORTING TO: COMPANY DIRECTOR
CPIT Aoraki ICT Asset and Media Security Standard
CPIT Araki Crprate Services Divisin: ICT This security standard refers t CPIT, which is the current legal name fr the new rganisatin established 1 January 2016 bringing tgether CPIT and Araki Plytechnic.
Malpractice and Maladministration Policy
TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs
Immaculate Conception School, Prince George Bring Your Own Device Policy for Students
Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,
How To Ensure That The Internet Is Safe For A Health Care Worker
POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy
How to Address Key Selection Criteria
Hw t Address Key Selectin Criteria Yu've seen an jb pprtunity that yu're interested in, n a jbs bard r in the press and want t apply, but where d yu start? A key requirement fr jbs in Gvernment is t respnd
CMS Eligibility Requirements Checklist for MSSP ACO Participation
ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.
DATE APPROVED March 2011. Version Date Comments / Changes 1.0 March 2011 Initial policy released
Page 1 f 11 APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial plicy released 1. PURPOSE OF THIS POLICY T define the purpses fr which Crprate Purchase Cards are t be used
Service Desk Self Service Overview
Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service
Information & Communications Technology ICT Security Compliance Guide (Student)
Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0
Hi-Tech will not be responsible if your hardware fails and you lose your residents medical record documentation and/or MDS records.
Overview... 1 Prepare fr E-Signatures... 1 Set Up Electrnic Signatures fr Clinical Assessments, Ntes and the MDS 3.0... 2 Put Users Electrnic Signatures n File... 2 Select Recrds t be Signed Electrnically...
CHANGE MANAGEMENT STANDARD
The electrnic versin is current, r when printed and stamped with the green cntrlled dcument stamp. All ther cpies are uncntrlled. DOCUMENT INFORMATION Descriptin Dcument Owner This standard utlines the
Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S
Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...
Plus500CY Ltd. Statement on Privacy and Cookie Policy
Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and
UBC Incident Response Plan V1.5
UBC Incident Respnse Plan V1.5 Cntents 1. Ratinale... 2 2. Objective... 2 3. Applicatin... 2 4. Reprting a Cmputer Security Incident... 2 5. Managing the Security Incident... 2 5.1. All Incidents... 2
Wiltshire College. Job Description. Public Relations Officer (Fixed term maternity cover) 5: 21,103 per annum Marketing and Communications Manager
Wiltshire Cllege Jb Descriptin Jb Title: Grade: Respnsible t: Lcatin: Public Relatins Officer (Fixed term maternity cver) 5: 21,103 per annum Marketing and Cmmunicatins Manager Trwbridge Intrductin All
COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS for STUDY ABROAD PROGRAMS
COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS fr STUDY ABROAD PROGRAMS Belw is a list f items t address and questins that need t be addressed in the cmprehensive safety assessment. In additin t the safety
AUDIT AND RISK COMMITTEE TERMS OF REFERENCE
AUDIT AND RISK COMMITTEE TERMS OF REFERENCE 1. TITLE OF COMMITTEE Audit and Risk Cmmittee 2. ESTABLISHMENT The Audit and Risk Cmmittee is established under Part 3 Sectin 19(1) f the Charles Darwin University
Sources of Federal Government and Employee Information
Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities
POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position
Psitin Title I.T Prject Officer Classificatin Higher Educatin Wrker, Level 7 Respnsible t The Psitin I.T Manager The psitin assists with the cmpletin f varius IT prjects intended t enable the nging administratin
