Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources
|
|
|
- Abraham Glenn
- 10 years ago
- Views:
Transcription
1 Southern Law Center Law Center Policy #IT0014 Title: Privacy Expectations for SULC Computing Resources Authority: Department Original Adoption: 5/7/2007 Effective Date: 5/7/2007 Last Revision: 9/17/ Purpose: This policy seeks to facilitate teaching, research, and the overall mission of the Law Center through the authorized use of computing resources and data consistent with the Law Center s need for limited access by persons other than the account holder when necessary to serve or protect operations within the Law Center or to meet legal requirements. 2.0 Scope: This policy applies to all SULC users. Nothing in this policy is intended or shall be interpreted to waive, limit, or otherwise restrict the rights of the Law Center to manage and allocate use of its computing resources and data or the responsibilities of Users under other SULC policies. 3.0 Definitions: User SULC employees and students, contractors, vendors, and agents working under the auspices of the Law Center. Authorized Users - People acting within the scope of a legitimate affiliation with the Law Center, using their approved and assigned credentials and privileges, to gain approved access to Law Center computing resources. A person acting outside of a legitimate affiliation with the Law Center or outside the scope of their approved access to Law Center computing resources is considered an unauthorized user. Computing Resources - All devices (including, but not limited to, personal computers, laptops, PDAs and smart phones) owned by the Law Center, the user or otherwise, which are part of or are used to access (1) the Law Center network, peripherals, and related equipment and software; (2) data communications infrastructure, peripherals, and related equipment and software; (3) voice communications infrastructure, peripherals, and related equipment and software; (4) and all other associated tools, instruments, facilities, and the services that make use of any technology resources owned, operated, or controlled by the Law Center. Computing resources or components thereof may be individually assigned or shared, single-user or multi-user, standalone or networked, and/or mobile or stationary. Content-Neutral Information - Information relating to the operation of systems, including information relating to interactions between individuals and those systems. Such information includes, but is not limited to, operating system logs (e.g., record of actions or events related to the operation of a device or system), user login records (e.g., logs of usernames used to connect to Law Center systems, noting source and date/time), dial-up logs (e.g., connections to Law Center modems, noting source,
2 date/time, and caller id), network activity logs (e.g., connections attempted or completed to Law Center systems, with source and date/time), non-content network traffic (e.g., source/destination IP address, port, and protocol), logs (e.g., logs of sent or received by individuals using Law Center systems, noting sender, recipient, and date/time), account/system configuration information, and audit logs (e.g., records of actions taken on Law Center systems, noting date/time). Data - Include all information that is used by or belongs to the Law Center or that is processed, stored, maintained, transmitted, copied on, or copied from Law Center computing resources. IT Department Member - A person employed, contracted or assigned by Law Center to maintain and operate a computer system or network or any portion thereof. IT Department Members are usually charged with installing, supporting, and maintaining servers or other computer systems, and planning for and responding to service outages and other problems. 4.0 Policy: General Except in those circumstances in which access is appropriate to serve or protect operations within the Law Center and to meet legal requirements as outlined in this policy, stored data, and voice and data network communications will not be accessed by information technology (IT) Department Member or anyone other than: the person to whom the account in which the data has been stored is assigned; or the person from whom the communication originated, or to whom the communication was sent; or the person to whom the device containing the stored data has been assigned. Although the Law Center seeks to create an atmosphere of privacy with respect to its data and use of its computing resources, users should be aware that because the Law Center is a public institution, and because the Law Center must be able to ensure the security, integrity and continuity of its operations, use of the Law Center s computing resources cannot be completely private. For example, in addition to the types of permissible access described herein, s sent or received through Law Center accounts, may be subject to disclosure as public records in response to public records requests under Louisiana law. Further, documents including s that are personally identifiable to a student may be education records of that student subject to inspection by that student under federal law. s and other documents and data must be accessed by the Law Center to make such determinations. Users should be aware that although the Law Center will take reasonable measures to ensure the privacy of Law Center computing resources as outlined in this policy, the Law Center cannot guarantee absolute privacy as relates to any particular User. Process Except as provided herein, an IT Department Member at the Law Center may not access or facilitate access to the computer accounts or associated network traffic of someone other than the person to whom the personal computer account or computer is assigned. This
3 includes data, voice and other files, including electronic mail ( ) and voic , encrypted on, stored on, or in transit to or from individual computer or voic accounts on Law Center-owned devices/systems, personally-owned devices on Law Center property or devices/systems managed by the Law Center on behalf of affiliated organizations (e.g., Law Center Foundation). Exceptions An IT Department Member may access or permit access in the following cases: Pursuant to authorization from the owner (the individual to whom the account or device or communication has been assigned or attributed); To investigate potential violations of law or policy - with written authorization from the Law Center Chancellor s Office for situations where there is reasonable concern that the individual to whom the account or device is assigned or owned has engaged, is engaging, or imminently intends to engage, in illegal activities or violations of Law Center policy using the account or device in question; For critical operations - with written authorization from the Department Head of the user s department or Law Center Chancellor s Office for situations in which retrieving the material is critical to the operation of the unit and when the account holder is deceased, terminated, incapacitated, unavailable, or unwilling to provide access; On behalf of a deceased or incapacitated individual - with written authorization from Law Center Chancellor s office to provide access to a lawful representative (e.g., spouse, parent, executor, holder of power of attorney) of a deceased or incapacitated employee, faculty member, or student; For internal audits - with written request from the Law Center Chancellor s Office or the Southern University System Office Director of Internal Audit for information relating to specific audits or investigations; In response to legal process or demand - with written authorization from Law Center Chancellor s Office confirming that access is required under the terms of a valid subpoena, court order, warrant, or other legal demand, or access is required under an applicable law, regulation, or Law Center policy; To minimize or mitigate substantial Law Center risk with written authorization from Law Center Chancellor s Office, Law Center Public Safety Officer, to address an emergency or to avoid or minimize exposure of the Law Center to substantial risk of harm or liability; For emergency problem resolution when the IT Department Member has a reasonable concern that a program or process active in the
4 account or on the device is causing or will cause significant system or network degradation, or could cause loss/damage to a system or other users' data. This includes forensic and/or other analysis in response to a security incident, sensitive data exposure, or system/device compromise; To access system-generated, content-neutral information for the purposes of analyzing system and storage utilization, problem troubleshooting, security administration, and in support of audits; To investigate security incidents - The incident response function within the SULC IT Department is responsible for investigating reports of abuse or misuse of Law Center computing resources. Incident response staff may use system-generated, content-neutral information for the purposes of investigating technology misuse incidents, and in support of audits; For routine monitoring of network communications - Security personnel in the SULC IT Department may observe, capture, and analyze network communications. Network communications may contain content data and in some cases this content may be viewed during analysis. If any data must be stored to complete the assigned tasks, it will be stored securely and deleted as soon as possible; Pursuant to implied consent in situations where a user has requested assistance diagnosing and/or solving a technical problem or where the IT Department Member is performing required maintenance. In these cases, the IT Department Member shall limit the scope of the access to that which is necessary to address the problem or the task. To protect Law Center assets when there is reasonable concern that the intellectual property, research, trade secrets, or other assets of the Law Center are in jeopardy, and pursuant to written authorization from Law Center Chancellor s Office. Preservation of electronic information and of computing resources The copying and secure storage of the contents of an individual's , other computer accounts, office computer, or transient network traffic to prevent destruction and loss of information may occur: Upon receiving credible notification of a Law Center or law enforcement investigation for alleged illegal activity or violations of Law Center policy on the part of a member of the Law Center community; Upon receiving advice by the Law Center's legal counsel that such copying and storage is otherwise needed in order to comply with legal obligations to preserve electronic information or secure computing resources;
5 Upon receiving authorization from the Law Center Chancellor s Office, or Law Center Safety Officer, or the Southern University Police Department official indicating that such preservation reasonably appears necessary to protect Law Center operations; When there is a reasonable concern that illegal activity or violations of Law Center policy have occurred, are occurring, or are imminent, as determined by the SULC IT Department; As a routine backup procedure for disaster recovery or archival purposes. Note: Access to such copies and stored materials shall be in accordance with this policy. Preserved materials that are no longer needed shall be destroyed in a secure manner. General Duties of IT Department Members Accessing Computing Resources Maintain the privacy of both the contents and the act of the access, except as otherwise required by this policy, or when necessary to report potential violations of law or Law Center policy, and then only to the appropriate authority; Make reasonable efforts to report such actions to the affected individual prior to that access, except when: Prior notification is not appropriate or practical due to the urgency of the circumstances; Such notice may result in destruction, removal, or alteration of data; Other circumstances make prior notice inappropriate or impractical. Where prior notification is not appropriate or practical, reasonable efforts will be made to notify the affected individual as soon as reasonable under the circumstances. No notification is necessary if access is for strictly routine backup, disaster recovery, or for archival purposes. Coordination with SULC IT Department: All requests for access to computer accounts must be coordinated with the SULC IT Department. Where needed, proper and authorization must be presented to the IT Department before access is accorded. Legal Requests or Demands All legal requests or demands for access to computing resources or electronic information and all subpoenas, warrants, court orders, and other legal process, or demands directing that access be afforded to law enforcement agencies or others, must be delivered immediately to the Law Center Chancellor s for verification and approval. Should such documents be served on individual, employees, or IT
6 Department Member, the documents must be sent immediately to the Law Center Chancellor s office for review. The Law Center Chancellor s office for review will review the request or order, and advise the relevant personnel on the necessary response. In the event that a law enforcement agency seeks to execute a search warrant or other order immediately and will not wait for review, individual IT Department Member or other persons receiving such orders should not obstruct the execution of the warrant or order, but should document the actions by law enforcement, notify the Law Center Chancellor s office for review as soon as possible, and take reasonable steps whenever possible to preserve a copy of any data being removed, for appropriate Law Center use. Initiating Access Persons seeking access to specific computing resources and/or electronic information assigned to or associated with an individual, that are maintained by the SULC IT Department must send those requests to the Law Center Chancellor s Office. In addition, persons seeking access to specific computing resources and electronic information primarily assigned or associated with other persons, and that are not maintained by SULC IT Department (e.g. computing resources maintained by the Southern University) should direct those requests to the Law Center Chancellor s office for approval, disposition, or forwarding to appropriate officials.
Southern Law Center Law Center Policy #IT0004. Title: Email Policy
Southern Law Center Law Center Policy #IT0004 Title: Email Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/2012 1.0 Purpose: To provide members of
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
V 11.01.14. Seven areas are covered by this Notice:
Mediatti Broadband Communications, your local cable operator ( MBC ) is providing this Subscriber Privacy Notice ( Notice ) to inform you of its practices regarding personally identifiable information
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
This form may not be modified without prior approval from the Department of Justice.
This form may not be modified without prior approval from the Department of Justice. Delete this header in execution (signature) version of agreement. HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
HIPAA Audit Risk Assessment - Risk Factors
I II Compliance Compliance I Compliance II SECTION ONE COVERED ENTITY RESPONSIBILITIES AREA ONE Notice of Privacy Practices 1 Is your full notice of privacy practices given to every new patient in your
GENOA, a QoL HEALTHCARE COMPANY, LLC WEBSITE PRIVACY POLICY
GENOA, a QoL HEALTHCARE COMPANY, LLC WEBSITE PRIVACY POLICY PLEASE READ THIS WEBSITE PRIVACY POLICY CAREFULLY BEFORE USING THIS WEBSITE, OR SUBMITTING ANY PROTECTED HEALTH INFORMATION OR PERSONALLY IDENTIFIABLE
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline 5.23.1.4 Information Security Incident Response
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Information Security Incident Response Part 1. Purpose. This guideline establishes the minimum requirements for Information
Terms and Conditions. Wisconsin Department of Safety and Professional Services Application Hosting Agreement
Terms and Conditions Wisconsin Department of Safety and Professional Services Application Hosting Agreement IMPORTANT READ CAREFULLY: This Terms and Conditions ( Agreement ) is a legal agreement between
B. Terms of Agreement; Google Terms of Service; Conflicting Provisions
OHSU Email Address for Life Terms and Conditions These Terms and Conditions govern your activation, receipt, and use of an @alumni.ohsu.edu email account. Activating an @alumni.ohsu.edu email account constitutes
3Degrees Group, Inc. Privacy Policy
3Degrees Group, Inc. Privacy Policy Your privacy is important to 3Degrees Group, Inc. ( 3Degrees ). The following Privacy Policy discloses the information practices followed by 3Degrees with respect to
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308)
HIPAA Business Associate Agreement Sample Notice Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) The information provided in this document does not constitute, and is no substitute
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ) is entered into by and between Professional Office Services, Inc., with principal place of business at PO Box 450, Waterloo,
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
ADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY COLLECTION AND USE OF INFORMATION FROM USERS
ADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY Advanced Cable Communications ( Company ) strives to offer visitors to its website (the Site ) the many advantages of Internet technology and to provide
Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up.
TERMS OF SERVICE: Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up. The following Terms and Conditions are applicable to all individual users / corporate clients who use, sign-up and pay-for
BUSINESS CHICKS, INC. Privacy Policy
BUSINESS CHICKS, INC. Privacy Policy Welcome to businesschicks.com, the online and mobile service of Business Chicks, Inc. ( Company, we, or us ). Our Privacy Policy explains how we collect, use, disclose,
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT is made and entered into as of the day of, 2013 ( Effective Date ), by and between [Physician Practice] on behalf of itself and each of its
BUSINESS ASSOCIATE AGREEMENT
Note: This form is not meant to encompass all the various ways in which any particular facility may use health information and should be specifically tailored to your organization. In addition, as with
Provider secure web portal & Member Care Information portal Registration Form
Provider secure web portal & Member Care Information portal Registration Form Thank you for your interest in registering for the Aetna Better Health Provider Secure Web Portal and the Aetna Better Health
Privacy Policy and Notice of Information Practices
Privacy Policy and Notice of Information Practices Effective Date: April 27, 2015 BioMarin Pharmaceutical Inc. ("BioMarin") respects the privacy of visitors to its websites and online services and values
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
Guideline for E-mail Services
Guideline for E-mail Services Under the Policy on Information Technology, the Vice-President and Provost is authorized to establish guidelines for information technology services at the University of Toronto.
PRIVACY POLICY (Update 1) FOR ONLINE GIVING FOR THE UNITED METHODIST CHURCH
A. Overview PRIVACY POLICY (Update 1) FOR ONLINE GIVING FOR THE UNITED METHODIST CHURCH GENERAL COUNCIL ON FINANCE AND ADMINISTRATION OF THE UNITED METHODIST CHURCH, INC., an Illinois corporation 1 Music
Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.
Privacy Policy This Privacy Policy explains what information Fundwave Pte Ltd and its related entities ("Fundwave") collect about you and why, what we do with that information, how we share it, and how
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
GUESTBOOK REWARDS, INC. Privacy Policy
GUESTBOOK REWARDS, INC. Privacy Policy Welcome to Guestbook Rewards, Inc. the online and mobile service of Guestbook Rewards, Inc. ( The Guestbook, we, or us ). Our Privacy Policy explains how we collect,
Quorum Privacy Policy
Quorum Privacy Policy Quorum Analytics Inc. ( Quorum") has created this website (the "Website" or the "Site") to provide an online analytical tool that Subscribers can use to generate Derived Analytics
All Users of DCRI Computing Equipment and Network Resources
July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
Introduction to HIPAA Compliance Checklist:
Introduction to HIPAA Compliance Checklist: HIPAA Compliance Checklist The following is a comprehensive HIPAA Compliance Checklist created to provide guidance to treatment providers utilizing voice and
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Information Security Policy
Information Security Policy Policy Title Responsible Executive Responsible Office Information Security Policy Vice President for Information Technology and CIO, Jay Dominick Office of Information Technology,
LET S ENCRYPT SUBSCRIBER AGREEMENT
Page 1 of 6 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf
TERMS and CONDITIONS OF USE - NextSTEPS TM
TERMS and CONDITIONS OF USE - NextSTEPS TM DATED MARCH 24, 2014. These terms and conditions of use (the Terms and Conditions ) govern your use of the website known as NextSTEPS TM, https://www.stepsonline.ca/
MYACCLAIM PRIVACY POLICY
MYACCLAIM PRIVACY POLICY 1. Introduction MyAcclaim is an online collaboration tool that allows users to annotate video. MyAcclaim s mission is to allow its users, with ease and simplicity, to unleash the
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ), is made effective as of the sign up date on the login information page of the CarePICS.com website, by and between CarePICS,
The E-Discovery Process
POOLING PROVISIONS The E-Discovery Process A publication of Nevada Public Agency Insurance Pool The e- discovery process the search of electronic records for use as legal evidence can cost thousands of
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
IT Security Handbook. Incident Response and Management: Targeted Collection of Electronic Data
IT Security Handbook Incident Response and Management: Targeted Collection of Electronic Data ITS HBK 2810.09 03 Effective Date: 20110824 Expiration Date: 20130824 Responsible Office: OCIO/ Deputy CIO
PRIVACY POLICY. Last Revised: June 23, 2014 1. About this Privacy Policy.
Last Revised: June 23, 2014 1. About this Privacy Policy. PRIVACY POLICY This Privacy Policy is a statement by Active Data, Inc. ( Active Data ) that describes how we collect, store, process, and share
Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION
BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION This Agreement governs the provision of Protected Health Information ("PHI") (as defined in 45 C.F.R.
What Personally Identifiable Information does EducationDynamics collect?
EducationDynamics, LLC GradSchools.com Privacy Policy Thank you for visiting GradSchools.com (hereinafter referred to as the Site ), which is owned and/or operated, in whole or in part, by EducationDynamics,
University Healthcare Physicians Compliance and Privacy Policy
Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
HIPAA: Bigger and More Annoying
HIPAA: Bigger and More Annoying Instructor: Laney Kay, JD Contact information: 4640 Hunting Hound Lane Marietta, GA 30062 (770) 312-6257 (770) 998-9204 (fax) [email protected] www.laneykay.com OFFICIAL
Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions
Privacy Policy Introduction This Privacy Policy explains what information TORO Limited and its related entities ("TORO") collect about you and why, what we do with that information, how we share it, and
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
Federal Trade Commission Privacy Impact Assessment
Federal Trade Commission Privacy Impact Assessment for the: W120023 ONLINE FAX SERVICE December 2012 1 System Overview The Federal Trade Commission (FTC, Commission or the agency) is an independent federal
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
RezScore SM Privacy Policy
RezScore SM Privacy Policy Last updated: August 19, 2011 Thank you for using RezScore.com. We are committed to protecting your privacy and, for that reason, we have adopted this Privacy Policy to memorialize
C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
