Service Level Standard

Size: px
Start display at page:

Download "Service Level Standard"

Transcription

1 Service Level Standard Personal Devices Revision History Date Version Changes 2/17/ Initial Draft Special Note: Service Level Standards will be reviewed and updated following the end of the spring semester and updated version will be available by August 1 st.

2 Table of Contents Executive Summary... 1 General Overview... 1 Roles and Responsibilities... 1 Information Technology... 1 Personal Device End User... 1 Service Level Standards... 2 Support Issues... 2 Business Data... 2 Data Recovery , Calendaring, Tasks... 2 Hardware, Software, Apps... 2 Loss of Physical Device... 2 Network Drive Access... 3 North Central Owned Software... 3 Printing... 3 Relations with manufacturers, internet, and data providers... 3 Remote Access (NetPC2)... 3 Wireless Internet Connection... 3 Recommendations... 3

3 Executive Summary The Personal Device SLS defines and outlines the relationship between North Central Information Technology and employees who choose to use their personally owned devices for business related purposes. Personal devices include smartphones, laptops, tablets, netbooks, desktop computers, or other electronic computer related devices. Digital information owned by North Central includes North Central , folders/files on network drives, etc. General Overview The following support standard and guidelines will effectively maintain support and accommodate personal device requests. This document outlines the most current standards. Information Technology requires all employees that choose to use personal devices for business related matters to be compliant with this policy before support is rendered. Roles and Responsibilities Information Technology Information Technology s responsibility includes purchasing, maintaining, securing, and updating technology. There are different circumstances when an employee chooses to use their personal device for business related purposes. In these instances, the employee can bring their request to Information Technology for assistance with their personal device. Information Technology will assist the user with setting up access to North Central owned digital information. Due to a vast amount of different variables with personal devices, Information Technology cannot guarantee access to North Central owned information on every device. If it is determined that the personal device is unable work with North Central systems, it will not be responsibility of Information Technology to repair or update software or hardware on the personal device. Information Technology will make an effort to provide current available documents and resources that may or may not include the information needed for the specific make of personal device or operating system. Information Technology does not necessarily guarantee the conclusion or resolution of the request as the specific provider or manufacturer of the personal device may need to resolve. The Information Technology Department may choose to suspend or eliminate the privilege of employees accessing North Central owned digital information on a personal device use at any time, if a security breach is found, standards or laws change, or a determination by any direct supervisors that personal devices are more disruptive, rather than productive to the job responsibilities of the end user. Personal Device End User The end user shall be responsible for purchasing, configuring, repairing, setting up personal data plan or internet connections, and contacting appropriate manufacturer in the event of a problem with their personal device. The end user acknowledges that North Central University does not offer any form of compensation to the employees if they choose to use their own personal devices for business related matters. It will be the responsibility of the end user to ensure their personal device is protected in a manner that reduces the risk of the University from any business related data being corrupted or stolen from the device. Depending on how the specific person device is used, the end user may need to comply with applicable North Central security policies such as setting passwords, allow remote wiping of device, and proper encryption standards. If there is failure to comply with the security requirements, accessing

4 North Central owned digital information will not be granted. The end user also must take it upon themselves to not store North Central owned digital information that may contain sensitive data on local storage (hard drives, flash drives, etc.) on the personal device. In the event a person device gets misplaced or stolen, the end user must contact Information Technology immediately. Depending on the circumstance, Information Technology may execute a command to remotely wipe the device. That will be determined on a case-by-case basis. If a security breach is found the end user may be restricted from accessing North Central owned digital information from personal devices in conjunction with North Central owned services and systems. Service Level Standards This section outlines and defines the most common support requests for personal devices. Any support request not listed below will be handled on a case-by-case basis. Support Issues Business Data Any business data such as Word documents, Excel spreadsheets, etc. that have been transferred from the end users computer to the end users personal device, or vice versa, could result in the data becoming corrupted, formatting may change, or data may be lost. The end user will be responsible to adjust the data as needed on their personal device. If needed, Information Technology will attempt to recover a backup of the original data, providing the data is available on North Central s network or backup drives. Should the employee leave North Central for any reason, all business data must be removed from the device. Access to North Central owned digital property will also be permanently terminated. Data Recovery Information Technology will not attempt to recover any lost data on the end user s personal device. The personal device manufacturer or wireless provider should be contacted in this case. , Calendaring, Tasks Personal o Information Technology will not assist with setting up any personal accounts on the end users personal device. Business o Information Technology will assist with setting up North Central on the personal device. Depending on the specific device, Information Technology may only be able to provide a configuration information sheet for setup. Hardware, Software, Apps Information Technology will not repair or make any modifications to any personal devices. This includes, but is not limited to: battery replacement, storage device replacement, software updates, software purchases, App purchases, etc. Loss of Physical Device If an employee s physically loses their personal device, they must report the loss to Information Technology within immediately of the noticed disappearance. This is so Information Technology

5 can monitor the employee s business accounts for possible fraud, identity theft, and protection of North Central student s personal information. Any costs associated with the lost device or replacing the device shall be the responsibility of the end user. Network Drive Access Personal devices will not be able to connect directly to network drives. NetPC2 should be utilized for this purpose. North Central Owned Software Due to licensing requirements, North Central owned software may not be installed on personal devices. Access to software may be available on NetPC2. Printing Personal owned devices will be unable to print to North Central networked printers. The end user is responsible for finding other means for their printing needs. Relations with manufacturers, internet, and data providers Information Technology will not mediate repair, service, or any other issues with the end users internet/data provider or personal device manufacturer. This shall be the sole responsibility of the end user. Remote Access (NetPC2) Devices need to have a remote desktop connection client installed on the device in order to utilize NetPC2. Not all devices work with remote desktop connection, therefore may be technically unable to use NetPC2. If a purchase of remote desktop connection software is needed, it will be the responsibility of the end user to purchase with personal funds. Wireless Internet Connection On campus o Information Technology will assist with setting up North Central wireless connection on the personal device. Depending on the specific device, Information Technology may only be able to provide a configuration information sheet for setup. Off campus o Information Technology will not assist with setting up wireless internet from locations that are located off campus. Recommendations Information Technology strongly recommends end users whom have personal devices use the password-locking feature found on most personal devices. This feature will provide an extra layer of security of the information that may be on the personal device in the instance that there may be a loss of the device or a possible security risk. Information Technology strongly recommends that the end user store business related files on the North Central network. All data stored on the North Central network is backed up routinely. This will be helpful in the event that the personal device malfunctions, local files become corrupt, or the personal device gets stolen or misplaced. Information Technology strongly encourages using encryption on devices.

Service Level Standard

Service Level Standard Service Level Standard External Storage Devices and Cloud Services SLS Date: May 24, 2012 Table of Contents Executive Summary... 1 General Overview... 1 Roles and Responsibilities... 1 Information Technology...

More information

CENG Information Technology Services University of North Texas

CENG Information Technology Services University of North Texas CENG Information Technology Services University of North Texas for the Information Technology Services as applied To the University of North Texas College of Engineering 1.0 Agreement 1.1 Purpose CENGITS

More information

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect

More information

Mobile Tablet Devices

Mobile Tablet Devices Document Owner: Page 1 of 5 Mobile Tablet Devices Purpose The purpose of this document is to provide guidance for the appropriate purchase and usage of Mobile Tablet Devices (devices running ios and Android

More information

USING GOOGLE APPS FOR SMALL BUSINESS EMAIL HOSTING MARCH 2015

USING GOOGLE APPS FOR SMALL BUSINESS EMAIL HOSTING MARCH 2015 USING GOOGLE APPS FOR SMALL BUSINESS EMAIL HOSTING MARCH 2015 Table of Contents Introduction... 3 Google Apps for Work...4 Key benefits of Google Apps...4 Huge amounts of email storage...4 Peace of mind

More information

SECTION 15 INFORMATION TECHNOLOGY

SECTION 15 INFORMATION TECHNOLOGY SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

How To Understand The Bring Your Own Device To School Policy At A School

How To Understand The Bring Your Own Device To School Policy At A School The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS

More information

Bring Your Own Device (BYOD) and Mobile Device Management

Bring Your Own Device (BYOD) and Mobile Device Management Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

device management solutions

device management solutions device management solutions devicemanagement Do you have a high number of geographically dispersed remote or field workers who use mobile devices? Do you need to monitor and track the devices and upload

More information

Bright Local Schools BYOD Acceptable Use Policy

Bright Local Schools BYOD Acceptable Use Policy Bright Local Schools BYOD Acceptable Use Policy Why Bring Your Own Device at Bright Local Schools? Bright Local is dedicated to providing 21st Century instruction to all its students. We feel we must provide

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI Office of Regulatory Compliance 13001 E. 17 th Place, Suite W1124 Mail Stop F497 Aurora, CO 80045 Main Office: 303-724-1010 Main Fax: 303-724-1019 HIPAA Policy 7.1 Title: Source: Prepared by: Approved

More information

For FY 2016 the new Desktop Support Program rates will be: Business Class - $481/device Enterprise Class - $721/device

For FY 2016 the new Desktop Support Program rates will be: Business Class - $481/device Enterprise Class - $721/device Division/Department Representative Dear Rep, The Desktop Support Program is announcing changes to our rates for FY 2016. As a Cost Recovery Service we are expected to recover expenses related to the operations

More information

Mobile Data Security Essentials for Your Changing, Growing Workforce

Mobile Data Security Essentials for Your Changing, Growing Workforce Mobile Data Security Essentials for Your Changing, Growing Workforce White Paper February 2007 CREDANT Technologies Security Solutions White Paper YOUR DYNAMIC MOBILE ENVIRONMENT As the number and diversity

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0 SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) Bring Your Own Device (BYOD) Policy Intent Rosemount Middle School (RMS) grants its students and staff the privilege of using personal mobile devices (laptops, tablets, etc.) of their choosing to complete

More information

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device)

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...

More information

COLORADO STATE UNIVERSITY SYSTEM

COLORADO STATE UNIVERSITY SYSTEM Board Policy: The purpose of this ipad Usage Policy is to establish guidelines and procedures for staff and Board members of the Colorado State University System (CSUS) to implement the efficient use of

More information

Palm Beach State College. Information Technology. Service Level Agreement

Palm Beach State College. Information Technology. Service Level Agreement Palm Beach State College Information Technology Service Level Agreement (Revision: Feb 14 2014) Table of Contents Section 1.0 INTRODUCTION 1.1 Purpose and Objective 1.2 Parties to the Agreement 1.3 Commencement

More information

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0 NOS for IT User and Application Specialist IT Security (ESKITU04) November 2014 V1.0 NOS Reference ESKITU040 ESKITU041 ESKITU042 Level 3 not defined Use digital systems NOS Title Set up and use security

More information

esnc ACCESS AGREEMENT

esnc ACCESS AGREEMENT FEDERAL RESERVE BOARD Shared National Credit Function esnc ACCESS AGREEMENT A. Introduction This agreement (Agreement) sets forth the terms for your Institution s use of our Electronic Shared National

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices 8-27-2015 4-007.1 Supersedes 4-007 Page Of 1 5 Responsible Authority Vice Provost for Information

More information

Computer Security at Columbia College. Barak Zahavy April 2010

Computer Security at Columbia College. Barak Zahavy April 2010 Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace Everything You Need to Know About Effective Mobile Device Management mastering the mobile workplace Table of Contents Introduction... 3 1. What exactly is Mobility Management Anyway?... 4 Impenetrable

More information

DCC student and employee information must be safeguarded.

DCC student and employee information must be safeguarded. 1 2 Raise Awareness EVERYONE at DCC must know their responsibilities. DCC student and employee information must be safeguarded. What kinds of risks exist? Risk of theft Risk of simple misplacement such

More information

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5 Sophos Mobile Control User guide for Windows Phone 8 Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

BlackBerry Link for Windows. Version: 1.2.3. User Guide

BlackBerry Link for Windows. Version: 1.2.3. User Guide BlackBerry Link for Windows Version: 1.2.3 User Guide Published: 2014-01-20 SWD-20140120093847797 Contents Related resources...5 Getting started...6 About BlackBerry Link... 6 Getting to know BlackBerry

More information

Ohio University Office of Information Technology

Ohio University Office of Information Technology Standard Desktop Support General Overview Standard Desktop Support service level of the Office of Information Technology (OIT) is comprised of: The Standard Desktop Support (SDS) Service The general levels

More information

Don t Let A Security Breach Put You Out of Business

Don t Let A Security Breach Put You Out of Business Don t Let A Security Breach Put You Out of Business Committed to providing you with the most innovative security and privacy solutions. www.boomtechit.com Bring Your Own Device (BYOD) and Mobile Device

More information

Preservation and Production of Electronic Records

Preservation and Production of Electronic Records Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces

More information

CSG Windows Support Policy

CSG Windows Support Policy CSG Windows Support Policy This document describes the policies for service and support of computers running Microsoft Windows used by faculty and staff in the departments of Computer Science, Mathematics

More information

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW

More information

OCR UPDATE Breach Notification Rule & Business Associates (BA)

OCR UPDATE Breach Notification Rule & Business Associates (BA) OCR UPDATE Breach Notification Rule & Business Associates (BA) Alicia Galan Supervisory Equal Opportunity Specialist March 7, 2014 HITECH OMNIBUS A Reminder of What s Included: Final Modifications of the

More information

How To Make Bring Your Own Device A Plus, Not A Risk

How To Make Bring Your Own Device A Plus, Not A Risk FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES BYOD: Bring your own device How to make BYOD a PLUS, not a RISK

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management LASS SPEIFIATION TITLE GRADE EEO-4 ODE IT TEHNIIAN SUPERVISOR 37 7.927 SERIES ONEPT Information Technology (IT) Technicians

More information

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Inside ü Tips for deploying or expanding BYOD programs while remaining

More information

Note: Support: Never use your TruMobi email application for personal use.

Note: Support: Never use your TruMobi email application for personal use. BYOD - Setting up Email Access on your ios mobile device This document provides step-by-step instructions for setting up corporate account on your ios mobile device. Note: The TruMobi email application

More information

Bring Your Own Device (BYOD) Policy Revised: April 2012

Bring Your Own Device (BYOD) Policy Revised: April 2012 Arkansas Baptist Bring Your Own Device (BYOD) Policy Revised: April 2012 Availability of Access Access to the wireless network at any campus of Arkansas Baptist, including pass-through Internet access,

More information

Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources

Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources Boston Public Schools Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and Scope of Policy Technology Resources ACCEPTABLE USE POLICY AND GUIDELINES Boston

More information

BYOD. opos WHAT IS YOUR POLICY? SUMMARY

BYOD. opos WHAT IS YOUR POLICY? SUMMARY BYOD WHAT IS YOUR POLICY? opos SUMMARY The organization s employees and contractors frequently perform employment-related tasks which require connecting to the organization s networks, systems, and/or

More information

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program.

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program. Lindisfarne College INFORMATION COMMUNICATION TECHNOLOGY (ICT) and BRING YOUR OWN DEVICE (BYOD) User Agreement Terms BYOD: Bring Your Own Device refers to the program whereby boys are permitted to bring

More information

IT Security Standard: Computing Devices

IT Security Standard: Computing Devices IT Security Standard: Computing Devices Revision History: Date By Action Pages 09/30/10 ITS Release of New Document Initial Draft Review Frequency: Annually Responsible Office: ITS Responsible Officer:

More information

SERVICE LEVEL AGREEMENT - Shared Exchange Hosting

SERVICE LEVEL AGREEMENT - Shared Exchange Hosting SERVICE LEVEL AGREEMENT - Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between Constructure

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT

More information

PimaCountyCommunityCollegeDistrict Standard Practice Guide Administrative Procedure

PimaCountyCommunityCollegeDistrict Standard Practice Guide Administrative Procedure PimaCountyCommunityCollegeDistrict Standard Practice Guide Administrative Procedure SPG AP Title: Portable College-Issued Mobile Device Security SPG AP Number: SPG-5702/AD AP 9.01.04 Effective Date: 11/13/06

More information

WHAT WOULD HAPPEN TO YOUR BUSINESS IF YOU EXPERIENCED DATA LOSS?

WHAT WOULD HAPPEN TO YOUR BUSINESS IF YOU EXPERIENCED DATA LOSS? WHAT WOULD HAPPEN TO YOUR BUSINESS IF YOU EXPERIENCED DATA LOSS? www.weredown.com (281) 990-9422 WHAT WOULD HAPPEN TO YOUR BUSINESS IF YOU EXPERIENCED DATA LOSS?...80% of all businesses without an effective

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

SERVICE LEVEL AGREEMENT: Shared Exchange Hosting

SERVICE LEVEL AGREEMENT: Shared Exchange Hosting SERVICE LEVEL AGREEMENT: Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between Global Data

More information

Windows Vista The Definitive Guide

Windows Vista The Definitive Guide Windows Vista The Definitive Guide William R. Stanek ULB Darmstadt "75*277 O'REILLY 4 Beijing Cambridge Famham Koln Paris Sebastopol Taipei Tokyo Table of Contents Preface ix Part I. Setting Up, Customizing,

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between Intermedia Technologies

More information

SSSD Bring Your Own Device Policy Structure

SSSD Bring Your Own Device Policy Structure SSSD Bring Your Own Device Policy Structure 1. Student Device Overview 1.1. Striving to achieve the most up-to-date, seamless, and effective 21 st Century learning environment, the Shanksville-Stonycreek

More information

Desktop Support. Service Description. Standard Hardware. Administrative Information Technology Services

Desktop Support. Service Description. Standard Hardware. Administrative Information Technology Services Administrative Information Technology Services Desktop Support Release: 1.5 : 4/23/12 Owner: Client Services Support group Service Description The Office of Administrative Information Technology Services

More information

BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com

BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com BYOD Bring Your Own Device - Mobile Device Management www.prooncall.com Bring Your Own Device (BYOD) Mobile Device Management People are starting to expect the ability to connect to public networks and

More information

b. USNH requires that all campus organizations and departments collecting credit card receipts:

b. USNH requires that all campus organizations and departments collecting credit card receipts: USNH Payment Card Industry Data Security Standard (PCI DSS) Version 3 Administration and Department Policy Draft Revision 3/12/2013 1. Purpose. The purpose of this policy is to assist the University System

More information

NETWORK SECURITY GUIDELINES

NETWORK SECURITY GUIDELINES NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

BYOD Policy for [AGENCY]

BYOD Policy for [AGENCY] BYOD Policy for [AGENCY] This document provides policies, standards, and rules of behavior for the use of smartphones, tablets and/or other devices ( Device ) owned by [AGENCY] employees personally (herein

More information

The Importance of Organizing Your SJSU Information Assets

The Importance of Organizing Your SJSU Information Assets Standard: Asset Control Page 1 Executive Summary The Asset Control Standard defines the requirements for controlling and ensuring all SJSU computing hardware, software, and confidential assets are identified,

More information

Southwest Airlines 2013 Terms of Use Portable Devices Feb 2013

Southwest Airlines 2013 Terms of Use Portable Devices Feb 2013 1 TERMS OF USE As of February 3, 2013 The following terms and conditions of use ( Terms of Use ) form a legally binding agreement between you (an entity or person) and Southwest Airlines Co. ( Southwest

More information

Policy Outsourcing and Cloud Based File Sharing

Policy Outsourcing and Cloud Based File Sharing Policy Outsourcing and Cloud Based File Sharing Version 3.1 TABLE OF CONTENTS Outsourcing Policy... 2 Outsourcing Management Standard... 2 Overview... 2 Standard... 2 Outsourcing Policy... 3 Policy Statement...

More information

Technical Help Desk Terms of Service

Technical Help Desk Terms of Service Technical Help Desk Terms of Service This esecuritel Technical Help Desk Terms of Service (the Agreement ) is provided in connection with the eligible tablet enrolled in either the Advanced Protection

More information

McDonough School of Business: MSBTC SLA 2014

McDonough School of Business: MSBTC SLA 2014 McDonough School of Business: MSBTC SLA 2014 Contents Service Level Agreement... 4 Contacting a Technician... 4 MSBTC Hours of Operation... 5 Trouble Call Problem Priority... 5 Priority 1... 5 Priority

More information

ShareNet. Maintenance Software

ShareNet. Maintenance Software Solutions Data Sheet ShareNet Track Equipment. Manage Maintenance. Report on Costs. The Novo ShareNet Cloud Platform is a powerful web and mobile application that can be used as a Solution to efficiently

More information

BYOD program at St Julian s School

BYOD program at St Julian s School BYOD program at St Julian s School Introduction St Julian s school currently runs a Bring Your Own Device (BYOD) program for all students in Years 10-13. This program requires that all students must bring

More information

Columbus Police Division Directive. I. Definitions. May 15, 1993 10.01 REVISED. Division Computer Systems

Columbus Police Division Directive. I. Definitions. May 15, 1993 10.01 REVISED. Division Computer Systems Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 10.01 REVISED TOTAL PAGES Mar. 30, 2014 9 Division Computer Systems I. Definitions A. Executable File A program or file that automatically

More information

Departmental On-Site Computing Support (DOCS) Server Support SLA

Departmental On-Site Computing Support (DOCS) Server Support SLA 1 General Overview This is a Service Level Agreement ( SLA ) between the customer and Departmental On-site Computing Support (DOCS) to document: The technology services DOCS provides to the campus. The

More information

Keep Your Data Secure: Fighting Back With Flash

Keep Your Data Secure: Fighting Back With Flash Keep Your Data Secure: Fighting Back With Flash CONTENTS: Executive Summary...1 Data Encryption: Ensuring Peace of Mind...2 Enhanced Encryption and Device Decommission in the Enterprise...3 Freeing Up

More information

BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment

BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment BYOD and Its Impact on IT Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment BYOD and IT D means Apple products Macs iphones ipads Android phones IT means Microsoft

More information

CELL PHONES and OTHER MOBILE DEVICES

CELL PHONES and OTHER MOBILE DEVICES UNIVERSITY of NORTH DAKOTA FINANCE & OPERATIONS POLICY LIBRARY CELL PHONES and OTHER MOBILE DEVICES Policy 2.18, Cell Phone and Other Mobile Devices Responsible Executive: VP Finance & Operations Responsible

More information

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology

More information

Jigsaw24 Support Contract Terms & Conditions

Jigsaw24 Support Contract Terms & Conditions Version 1.1 Jigsaw24 Support Contract Terms & Conditions These conditions together with the provisions of the Agreement or a Scope of Work (SOW) are the only contractual terms upon which Jigsaw Systems

More information

TECHNICAL SUPPORT. and HARDWARE/SOFTWARE/NETWORK MAINTENANCE. for STUDENT-ACCESS LABS

TECHNICAL SUPPORT. and HARDWARE/SOFTWARE/NETWORK MAINTENANCE. for STUDENT-ACCESS LABS IT Services Service Level Agreement TECHNICAL SUPPORT and HARDWARE/SOFTWARE/NETWORK MAINTENANCE for STUDENT-ACCESS LABS IT Services Service Level Agreement:Student-Access Labs This service level agreement

More information

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result

More information

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and

More information

BlackBerry Link for Windows. Version: 1.1.1. User Guide

BlackBerry Link for Windows. Version: 1.1.1. User Guide BlackBerry Link for Windows Version: 1.1.1 User Guide Published: 2013-07-22 SWD-20130722144723525 Contents Getting started...5 About BlackBerry Link... 5 Getting to know BlackBerry Link...5 Connecting

More information

INFORMATION TECHNOLOGY TECHNICIAN I/II

INFORMATION TECHNOLOGY TECHNICIAN I/II INFORMATION TECHNOLOGY TECHNICIAN I/II CITY OF HAYWARD DEFINITION To perform responsible technical duties related to computer hardware and software customer support; provide project support for new and

More information

University Systems Desktop Support Service Level Commitment

University Systems Desktop Support Service Level Commitment University Systems Desktop Support Service Level Commitment The Purpose of this Service Level Commitment (SLC) is to formally define the level of service University Systems will provide to UVic faculty,

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Portable Security Computing No: Effective: OSC-09 05/27/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information

Mobile Health Apps 101: A Primer for Consumers. myphr.com

Mobile Health Apps 101: A Primer for Consumers. myphr.com Mobile Health Apps 101: A Primer for Consumers just think APP This guide is designed to help you understand and make educated decisions about using mobile health applications ( app ). When considering

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

School of Nursing Research Seminar. Data Security in The Academic Health Center. Presented By Jon Harper AHC Information Systems

School of Nursing Research Seminar. Data Security in The Academic Health Center. Presented By Jon Harper AHC Information Systems School of Nursing Research Seminar Data Security in The Academic Health Center Presented By Jon Harper AHC Information Systems 1 Overview of AHC-IS and Supported Services Provide desktop support to ~8500+

More information

Frontier Academy s Bring Your Own Device (BYOD) - User Agreement 2013-14

Frontier Academy s Bring Your Own Device (BYOD) - User Agreement 2013-14 Frontier Academy s Bring Your Own Device (BYOD) - User Agreement 2013-14 Please read the below guidelines, sign and return the last page and then return it to Frontier Academy Technology Department (or

More information

Smith College Information Security Risk Assessment Checklist

Smith College Information Security Risk Assessment Checklist Smith College Information Security Risk Assessment Checklist This form contains a checklist for individual data handlers who are conducting an information security risk assessment of their work environment.

More information

How To Protect Your Data From Being Hacked

How To Protect Your Data From Being Hacked Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW

More information

April 2010. promoting efficient & effective local government

April 2010. promoting efficient & effective local government Department of Public Works and Environmental Services Department of Information Technology Fairfax Inspections Database Online (FIDO) Application Audit Final Report April 2010 promoting efficient & effective

More information

www.datatechhosting.com

www.datatechhosting.com Hosting and Cloud Services Customer Service Level Agreement (SLA) Welcome to the Clustered Cloud Hosted Services Community. We are happy to have you aboard and look forward to assisting you with all your

More information