Supersedes: DPS Policy Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5

Size: px
Start display at page:

Download "Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5"

Transcription

1 Plicy: SUBJECT: INTERNET USAGE Supersedes: DPS Plicy Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f POLICY PURPOSE Detrit Public Schls (DPS) Internet and Intranet envirnment is available t assist business prcesses thrugh the utilizatin f technlgy and technlgy related services. Amng the essential cmpnents f internet usage management are: establishing guidelines fr utilizatin, a means fr securing sensitive data and applicatins; awareness f the mnitring and recrding Internet usage; assist in the training f end-users in the prper use f all available access and security technlgy, search engines usage, and encryptin tls. Apprpriate Internet usage is imprtant fr three central reasns: 1. Emplyee Prductivity: Organizatins typically measure prductivity based n specified gals and bjectives, as well as by examining hw emplyees allcate their time. Management shuld have the infrmatin it needs t examine hw emplyees spend their time n the Internet. 2. Netwrk Bandwidth and Resurces: Internet access is nt free. Excessive nn-business usage f the Internet results in real csts t the rganizatin. Fr example: the cst t upgrade netwrk resurces such as leased lines, ruters, disk strage, and printers in rder t handle increased lad; as well as the cst f wasted time caused by slw netwrk respnse r unreliable cnnectins; 3. Ptential Legal Liabilities and/r Negative Publicity: Inapprpriate usage f the Internet may result in legal liabilities and/r negative publicity t the district. Examples f inapprpriate usage include, but are nt limited t: The creatin f, receipt, display r transmissin f threatening, hstile, harassing, sexually and/r racially ffensive language r any ther cmmunicatin that is deemed inapprpriate The creatin f, receipt, display r transmissin f certain infrmatin may vilate sftware licensing laws and may cnstitute illegal dwnlading Certain activities n the internet may qualify as impermissible persnal business cnducted frm a DPS server, and/r Certain activities can result in cnnectin with inapprpriate sites n the Internet allwing the district dmain (e.g., jhn_de@detritk12.rg) t be captured, pssibly resulting in negative publicity The Detrit Public Schls netwrk must perate under the guidelines f the Child Infrmatin Prtectin Act (CIPA)

2 2.0 SCOPE Detrit Public Schls has prvided access t the Internet t its emplyees. As a prvider f Internet use and , Detrit Public Schls must ensure that the Internet is used in a way that is legal, safe, and secure s that Internet use can be a prductive business tl. Any Detrit Public Schl emplyee r business partner representing Detrit Public Schls n the Internet must adhere t this plicy. 3.0 POLICY 1. The Internet is a business tl fr DPS. Access t the Internet is prvided by DPS t its emplyees at a significant cst. That means DPS expects the Internet t be used fr business-related purpses, which includes, but is nt limited t, cmmunicatin with custmers and suppliers, t research relevant tpics, and t btain useful business infrmatin. 2. DPS requires that thse emplyees and thers wh use DPS-prvided internet access cnduct themselves hnestly and apprpriately n the Internet, and that they cmply with cpyright laws, sftware licensing rules, prperty and privacy rights, and the prergatives f thers, just as in any ther business dealings. 3. All existing DPS plicies apply t cnduct n the Internet, including, but nt limited t DPS plicies that address intellectual prperty prtectin, privacy and cnfidentiality rules, and plicies n the misuse f DPS resurces, infrmatin and data security. In additin t what any ther DPS plicy may require, this plicy prhibits the transfer and/r disseminatin f prprietary infrmatin, trade secrets, cnfidential dcuments r any ther DPS privileged infrmatin via the Internet. 4. Detrit Public Schls des nt extend nr imply a right t privacy in Internet usage r infrmatin exchanged n the Internet. As set frth in the Mnitring sectin belw, DPS reserves the right t lawfully inspect and mnitr internet usage and t examine any and all files stred in private areas f its netwrk in rder t assure cmpliance with DPS plicies. 5. DPS may be required t preserve stred Internet infrmatin fr extended r specified perids f time. Pursuant t State Department f Educatin, Bulletin N. 522, Revised, March 1997, DPS is required t retain dcuments that qualify as Business Office Recrds, Student Educatinal Recrds, Pupil Accunting Recrds, and ther miscellaneus infrmatin fr designated perids f time. If the infrmatin r files stred n the Internet fall int ne f these categries and/r is required t be retained pursuant t Bulletin N. 522, then DPS may be required t archive such infrmatin. 6. The display f any kind f sexually explicit image r dcument n any DPS system is a vilatin f DPS plicy, including but nt limited t the DPS plicy n sexual harassment. In additin, sexually explicit material may nt be archived, stred, distributed, edited, r recrded using DPS netwrk r cmputing resurces.

3 7. DPS uses independently supplied sftware and data t identify inapprpriate r sexually explicit Internet sites. DPS may blck access frm within its netwrks t all such sites f which DPS is aware. If a user finds that he r she was cnnected accidentally t a site that cntains sexually explicit r ffensive material, a user must discnnect frm that site immediately, regardless f whether that site had been previusly deemed acceptable by any screening r rating prgram. The reprting f Internet related cncerns can be sent t inf.prtectin@detritk12.rg. 8. DPS Internet facilities and cmputing resurces must nt be used knwingly t vilate the laws and regulatins f the United States r any ther natin, r the laws and regulatins f any state, city, prvince r ther lcal jurisdictin in any material way. 9. An individual may nt use the DPS-prvided internet access t create, receive, display, transmit r dwnlad threatening, hstile r harassing infrmatin that is dergatry, defamatry, bscene, r ffensive, r anything that may be perceived as harassment r disparagement based upn race, clr, natinal rigin, sex, sexual rientatin, age, disability, r religius r plitical beliefs r that is deemed inapprpriate based upn federal civil rights law, Michigan s Ellit Larsen Civil Rights Act, r ther relevant law. 10. Any sftware r files dwnladed via the Internet int the DPS netwrk will becme the prperty f the DPS. Any such files r sftware may be used nly in ways that are cnsistent with the licenses and/r cpyrights gverning the sftware r files. 11. N individual may use DPS Internet facilities knwingly t dwnlad r distribute pirated sftware r data. 12. DPS Internet users may nt establish a web site with links t r frm the DPS site. 13. DPS Internet users are nt authrized t purchase, acquire, r implement gds r services withut prir apprval frm the Divisin f Technlgy and Infrmatin Systems. 14. N individual may use DPS Internet facilities t deliberately prpagate a virus, wrm, Trjan hrse, trap-dr prgram, r any ther malicius cde. 15. N individual may use the DPS Internet facilities knwingly t disable r verlad any cmputer system r netwrk, r t circumvent any system intended t prtect the privacy r security f anther user. 16. Each individual using DPS internet facilities shall identify himself r herself hnestly, accurately, and cmpletely (including DPS affiliatin and functin where requested) when participating in chat rms r newsgrups, r when setting up accunts n utside cmputer systems; hwever, nly thse agents, emplyees r fficials wh are duly authrized t speak t the media, t analysts, r in public gatherings n behalf f DPS may speak/write in the name f DPS t any newsgrup r chat rm.

4 17. Emplyees and ther internet users are reminded that chat rms and newsgrups are public frums where it is inapprpriate t reveal cnfidential DPS infrmatin, custmer data, trade secrets, and any ther material cvered by existing DPS plicies and prcedures. 18. Use f DPS internet facilities t cmmit infractins, including but nt limited t, the misuse f DPS assets r resurces, sexual harassment, and misapprpriatin r theft f intellectual prperty is prhibited by DPS Plicy Infrmatin Security. 19. Emplyees may use DPS Internet facilities fr nn-business research r brwsing during mealtime r ther breaks, r utside f wrk hurs, prvided that such use is in cmpliance with the DPS Internet Usage plicy and ther DPS plicies. 20. Individuals with access t DPS Internet facilities may nt use DPS Internet facilities t dwnlad entertainment sftware r games, r t play games against ppnents ver the Internet. 21. Individuals with access t DPS Internet facilities may nt use DPS Internet facilities t dwnlad images r vides unless there is an explicit businessrelated use fr the material. 22. Individuals wh are nt DPS emplyees, agents, r fficials wh gain access t the internet thrugh DPS-prvided internet facilities by way f an emplyee, agent r fficial f DPS are subject t the terms and cnditins f this Internet Usage plicy. 23. Web sites and/r internet addresses n the wrld-wide web that are identified by DPS as inapprpriate, will be added t the dictinary r equivalent URL (Web page) filtering feature and an individual will nt be allwed access t thse sites. 4.0 MONITORING DPS has the right t mnitr usage f the DPS-prvided Internet facilities by users, including but nt limited t, reviewing a list f the sites accessed by an individual. The access t the Internet prvided by DPS is fr business purpses and the Internet shuld be used in accrdance with the plicy prvisins set frth abve. A DPS Internet user/dps emplyee, agent r fficial shuld nt have an expectatin f privacy in the use f DPS-prvided Internet facilities nr shuld they have an expectatin f privacy in the infrmatin exchanged. Vilatin f the Internet plicy r failure t cmply with mnitring guidelines can lead t disciplinary and/r legal cnsequences. Mnitring Apprach DPS may mnitr Internet usage n a peridic basis (daily, weekly, mnthly, and bimnthly) and may generate Internet usage reprts t ensure plicy cmpliance. Vilatin f the terms f the abve-referenced Internet Usage plicy, prvisins f ther relevant DPS plicies, federal, state r lcal laws will cnstitute nncmpliance that can carry disciplinary r legal cnsequences, including but nt limited t criminal prsecutin. An emplyee may be ntified f nn-cmpliance with the Internet Usage plicy, and/r prvisins f ther relevant DPS plicies, federal, state, r lcal laws. 5.0 ISSUANCE OF REGULATIONS/STANDARD OPERATING PROCEDURES

5 The Chief Technlgy and Infrmatin Systems Officer is authrized t develp regulatins and/r standard perating prcedures t implement this plicy. 6.0 FAILURE TO COMPLY Nn-cmpliance with this plicy will be subject t management review and actin in cnfrmance with the DPS disciplinary plicies and/r relevant legal actin. 7.0 EXCEPTIONS Any exceptins t this plicy must be dcumented and apprved by the DPS Chief Technlgy and Infrmatin Officer. 8.0 AGREEMENT I, (print name) have a received a written cpy f the DPS Internet Usage Plicy, dated. I fully understand the terms f this plicy and agree t abide by them. I realize that DPS security sftware may recrd fr management use, the Internet address f any site that I visit and keep a recrd f any netwrk activity in which I transmit r receive any kind f file. I acknwledge that any message I send r receive will be recrded and stred in an archive file fr management use and/r review. I acknwledge that any vilatin f this plicy culd lead t disciplinary actin up t and including dismissal and/r criminal prsecutin r ther legal actin. Signed

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 8 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk The Bard f Educatin recgnizes as new technlgies shift the manner in which infrmatin is

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only

DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM For 8 th 12 th Grade Students Only DETROIT PUBLIC SCHOOLS NETBOOK PARENT CONSENT FORM Fr 8 th 12 th Grade Students Only Student s Last Name Parent/Guardian Last Name Class First Name First Name Date Fr the first time this fall, students

More information

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

Woodstock Multimedia, INC. Software/Hardware Usage Policy

Woodstock Multimedia, INC. Software/Hardware Usage Policy Wdstck Multimedia, INC. Sftware/Hardware Usage Plicy POLICY PURPOSE The purpse f the Wdstck Multimedia, INC. Sftware / Hardware Usage Plicy is t ensure that Wdstck Multimedia, INC. emplyees are prperly

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Meopham School Information Technology Code of Conduct

Meopham School Information Technology Code of Conduct 1. Intrductin Infrmatin technlgy resurces are essential fr accmplishing Mepham Schl s missin f pursuing excellence in teaching and learning, research and cmmunity service. Members f the Schl cmmunity are

More information

THIRD PARTY PROCUREMENT PROCEDURES

THIRD PARTY PROCUREMENT PROCEDURES ADDENDUM #1 THIRD PARTY PROCUREMENT PROCEDURES NORTH CENTRAL TEXAS COUNCIL OF GOVERNMENTS TRANSPORTATION DEPARTMENT JUNE 2011 OVERVIEW These prcedures establish standards and guidelines fr the Nrth Central

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

CORPORATE CREDIT CARD POLICY

CORPORATE CREDIT CARD POLICY TITLE: POLICY OWNERS: DATE INSTITUTED: May 1, 2008 CURRENT VERSION: Ver. 1.6 REVISION DATE: July 1, 2015 Crprate Credit Card Plicy Melissa Cluse, Vice President & Cntrller Cindy Klein, Accunts Payable

More information

How To Ensure That The Internet Is Safe For A Health Care Worker

How To Ensure That The Internet Is Safe For A Health Care Worker POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy

More information

SaaS Listing CA Cloud Service Management

SaaS Listing CA Cloud Service Management SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

Yur Infrmatin technlgy Security Plicy

Yur Infrmatin technlgy Security Plicy INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE Cunty f Orange Infrmatin Technlgy Usage Plicy 1 INTRODUCTION: The Cunty f Orange Infrmatin Technlgy (IT) Usage Plicy is the fundatin f the Cunty s infrmatin

More information

CMS Eligibility Requirements Checklist for MSSP ACO Participation

CMS Eligibility Requirements Checklist for MSSP ACO Participation ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.

More information

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

Williamson County Board of Education Procedures and Guidelines

Williamson County Board of Education Procedures and Guidelines Williamsn Cunty Bard f Educatin Prcedures and Guidelines Effective Date: 6/21/10; 8/15/11; Page 1 f 7 PURPOSE Williamsn Cunty Schls prvides student and emplyee access t the Internet as a means t increase

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

Chapter 7 Business Continuity and Risk Management

Chapter 7 Business Continuity and Risk Management Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

New York Institute of Technology Faculty and Staff Email Retention Policy

New York Institute of Technology Faculty and Staff Email Retention Policy New Yrk Institute f Technlgy Faculty and Staff Email Retentin Plicy Nvember 2013 I. PURPOSE As electrnic mail (email) has becme the primary frm f cmmunicatin at NYIT and thrughut the wrld, the vlume f

More information

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Creating an Ethical Culture and Protecting Your Bottom Line:

Creating an Ethical Culture and Protecting Your Bottom Line: Creating an Ethical Culture and Prtecting Yur Bttm Line: Best Practices fr Crprate Cdes f Cnduct Nte: The infrmatin belw and all infrmatin n this website is nt meant t be taken as legal advice. Please

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services

Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services Erie Cmmunity Cllege Acceptable Use Plicy Last Revisin: December 17, 2009 Cllege Infrmatin Technlgy Services Erie Cmmunity Cllege Cllege Infrmatin Technlgy Services Acceptable Use Plicy Last Revisin:

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT 1 FERRIS STATE UNIVERSITY SCHOOL f NURSING CODE f CONDUCT The Schl f Nursing (SON) at Ferris State University uphlds the University Cde f Student Cnduct and the American Nurses Assciatin Cde f Ethics.

More information

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin

More information

Process of Setting up a New Merchant Account

Process of Setting up a New Merchant Account Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am

More information

DATE APPROVED March 2011. Version Date Comments / Changes 1.0 March 2011 Initial policy released

DATE APPROVED March 2011. Version Date Comments / Changes 1.0 March 2011 Initial policy released Page 1 f 11 APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial plicy released 1. PURPOSE OF THIS POLICY T define the purpses fr which Crprate Purchase Cards are t be used

More information

Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117

Felician College. Computer Use Policy. Office of Information Technology 262 South Main St Lodi, NJ 07644-2117 Felician Cllege Office f Infrmatin Technlgy 262 Suth Main St Ldi, NJ 07644-2117 Cmputer Use Plicy Intrductin - In supprt f Felician Cllege's missin f teaching and public service, the Infrmatin Technlgy

More information

Purpose Statement. Objectives

Purpose Statement. Objectives Apprved by Academic Affairs Cuncil, June 24, 2014 Faculty Handbk Part VI: Other Plicies and Prcedures Sectin R. Intellectual Prperty Classified Emplyee Handbk Part VI: Other Plicies and Prcedures Sectin

More information

Information & Communications Technology ICT Security Compliance Guide (Student)

Information & Communications Technology ICT Security Compliance Guide (Student) Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

Electronic and Information Resources Accessibility Compliance Plan

Electronic and Information Resources Accessibility Compliance Plan Electrnic and Infrmatin Resurces Accessibility Cmpliance Plan Intrductin The University f Nrth Texas at Dallas (UNTD) is cmmitted t prviding a wrk envirnment that affrds equal access and pprtunity t therwise

More information

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine Title: Identity Theft Prgram Effective Date: July 2009 NYU Langne Medical Center NYU Hspitals Center NYU Schl f Medicine POLICY It is the plicy f the NYU Langne Medical Center t educate and train staff

More information

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

ICT Acceptable Use Policy

ICT Acceptable Use Policy ICT Acceptable Use Plicy Versin Number One Status Apprved Apprval Date: first versin 12 January 2015 Apprval date: current versin 12 January 2015 Respnsible fr plicy: Vice Principal Finance Respnsible

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

State of California California Technology Agency. Software Management Plan Guidelines

State of California California Technology Agency. Software Management Plan Guidelines State f Califrnia Califrnia Technlgy Agency Sftware Management Plan Guidelines Revised April 2011 Sectin 1 1.0 Overview INTRODUCTION TO SOFTWARE MANAGEMENT PLANNING The State Administrative Manual (SAM)

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service. FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept

More information

How To Ensure Your Health Care Is Safe

How To Ensure Your Health Care Is Safe Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

Technical Writing - TheUsers Visa (SHR User Accunt)

Technical Writing - TheUsers Visa (SHR User Accunt) POLICY Number: 7311-25-004 Title: Saskatn Health Regin User Accunt Plicy Authrizatin [ ] President and CEO [X] Vice President, Finance and Crprate Services Surce: Directr, Infrmatin Technlgy Services Crss

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

E-LEARNING ONTARIO POLICY DOCUMENT

E-LEARNING ONTARIO POLICY DOCUMENT E-LEARNING ONTARIO POLICY DOCUMENT In additin t the Service Level Agreement (SLA), which is specific t each bard, each participating bard must abide by this plicy dcument. It cntains three sectins: A.

More information

The information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice.

The information contained in this site is for INFORMATIONAL purposes only and is protected by copyright. We are not providing legal advice. Privacy Plicy Terms f Service: The fllwing terms and cnditins gvern all use f the Rightwaywebhsting.cm website and all cntent, services and prducts available at r thrugh the website (taken tgether, the

More information

State Fleet Card Oversight Usage and Responsibilities

State Fleet Card Oversight Usage and Responsibilities State Fleet Card Oversight Usage and Respnsibilities Intrductin The Department f General Services (DGS), Office f Fleet and Asset Management (OFAM) administers a statewide ne-prvider payment system cntract

More information

CENTURIC.COM ONLINE DATA BACKUP AND DISASTER RECOVERY SOLUTION ADDENDUM TO TERMS OF SERVICE

CENTURIC.COM ONLINE DATA BACKUP AND DISASTER RECOVERY SOLUTION ADDENDUM TO TERMS OF SERVICE CENTURIC.COM ONLINE DATA BACKUP AND DISASTER RECOVERY SOLUTION ADDENDUM TO TERMS OF SERVICE This Agreement, named the Online Data Backup and Disaster Recvery Slutin Addendum t Centuric s Terms f Service

More information

Resident Assistant Application JOB DESCRIPTION

Resident Assistant Application JOB DESCRIPTION Requirements and Cmpensatin Resident Assistant Applicatin JOB DESCRIPTION Must have cmpleted at least 24 credit hurs at the time f emplyment. Must have a clear judicial recrd with Husing and Residential

More information

Internal Audit Charter and operating standards

Internal Audit Charter and operating standards Internal Audit Charter and perating standards 2 1 verview This dcument sets ut the basis fr internal audit: (i) the Internal Audit charter, which establishes the framewrk fr Internal Audit; and (ii) hw

More information

Accessible Service Policy

Accessible Service Policy Accessible Service Plicy Date Created Revisin Oct. 16, 2012 1 Gal This plicy is intended t meet the requirements f the Accessibility Standards fr Custmer Service, Ontari Regulatin 429/07 under the Accessibility

More information

Texas Department of Insurance Division of Workers Compensation. Insurance Carrier/Utilization Review Agent Plan-Based Audit

Texas Department of Insurance Division of Workers Compensation. Insurance Carrier/Utilization Review Agent Plan-Based Audit Texas Department f Insurance Divisin f Wrkers Cmpensatin Insurance Carrier/Utilizatin Review Agent Plan-Based Audit Octber 22, 2012 1 P age Sectin I: General Statement and Overview The Texas Department

More information

Bond Authorization Requested

Bond Authorization Requested District r Charter Schl Cntact Persn: Address 1: Address 2: City: Zip Cde: Telephne: Email Address: Bnd Authrizatin Requested The maximum bnd authrizatin that may be requested per district r charter schl

More information

To clarify terms used within these policies, the following definitions are provided:

To clarify terms used within these policies, the following definitions are provided: Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail

More information

IT Help Desk Service Level Expectations Revised: 01/09/2012

IT Help Desk Service Level Expectations Revised: 01/09/2012 IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+

More information

Overview of the Final Requirements for Meaningful Use - 2015 through 2017

Overview of the Final Requirements for Meaningful Use - 2015 through 2017 Overview f the Final Requirements fr Meaningful Use - 2015 thrugh 2017 On Oct. 6, 2015, the Centers fr Medicare & Medicaid Services (CMS) issued a final rule utlining the requirements fr eligible prfessinal

More information

Controller-Treasurer Department Internal Audit Division

Controller-Treasurer Department Internal Audit Division nty f Santa Clara Cntrller-Treasurer Department Internal Audit Divisin David G. Elledge Cntrller-Treasurer Bill Penne, CIA Supervising Internal Auditr May 4,2007 Assignment 10160 T: Distributin List Subject:

More information

HP ValuPack Consulting Description Red Hat Linux System Performance Monitoring & Tuning

HP ValuPack Consulting Description Red Hat Linux System Performance Monitoring & Tuning HP ValuPack Cnsulting Descriptin Red Hat Linux System Perfrmance Mnitring & Tuning HP ValuPacks are standardized cnsulting services, prvided by HP Slutin Center Service Prfessinals, with pre-defined custm

More information

Privacy Breach and Complaint Protocol

Privacy Breach and Complaint Protocol Privacy Breach and Cmplaint Prtcl Effective: December 31, 2012 Apprved by: Le McKenna, CFO 1.0 General Privacy breaches and privacy cmplaints will be handled in accrdance with this prtcl. This prtcl is

More information

Australian Institute of Psychology. Human Research Ethics Committee. Terms of Reference

Australian Institute of Psychology. Human Research Ethics Committee. Terms of Reference Australian Institute f Psychlgy Human Research Ethics Cmmittee Terms f Reference What is research? Accrding t the Natinal Statement research... is widely understd t include at least investigatin undertaken

More information

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care

More information

Charlotte-Mecklenburg Schools Elementary School Grading Procedures Plan

Charlotte-Mecklenburg Schools Elementary School Grading Procedures Plan Charltte-Mecklenburg Schls Elementary Schl Grading Prcedures Plan CMS Visin Charltte-Mecklenburg Schls prvides all students the best educatin available anywhere, preparing every child t lead a rich and

More information

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc. HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

The Cost Benefits of the Cloud are More About Real Estate Than IT

The Cost Benefits of the Cloud are More About Real Estate Than IT y The Cst Benefits f the Clud are Mre Abut Real Estate Than IT #$#%&'()*( An Osterman Research Executive Brief Published December 2010 "#$#%&'()*( Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

How To Get A Credit By Examination

How To Get A Credit By Examination LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION FACT SHEET Texas Ri Salad Cllege, a Maricpa Cunty Cmmunity Cllege in Tempe, Arizna, is prud t annunce its Credit by Examinatin prgram in Law Enfrcement

More information

TITLE: Supplier Contracting Guidelines Process: FIN_PS_PSG_050 Replaces: Manual Sections 6.4, 7.1, 7.5, 7.6, 7.11 Effective Date: 10/1/2014 Contents

TITLE: Supplier Contracting Guidelines Process: FIN_PS_PSG_050 Replaces: Manual Sections 6.4, 7.1, 7.5, 7.6, 7.11 Effective Date: 10/1/2014 Contents TITLE: Supplier Cntracting Guidelines Prcess: FIN_PS_PSG_050 Replaces: Manual Sectins 6.4, 7.1, 7.5, 7.6, 7.11 Cntents 1 Abut university supplier cntracting... 2 2 When is a cntract required?... 2 3 Wh

More information

Outsourcing arrangements

Outsourcing arrangements Rules Ntice Guidance Nte Dealer Member Rules Please distribute internally t: Internal Audit Legal and Cmpliance Operatins Regulatry Accunting Senir Management Cntacts: Luis Piergeti Vice President, Financial

More information

Heythrop College Disciplinary Procedure for Support Staff

Heythrop College Disciplinary Procedure for Support Staff Heythrp Cllege Disciplinary Prcedure fr Supprt Staff Intrductin 1. This prcedural dcument des nt apply t thse academic-related staff wh are mentined in the Cllege s Ordinance, namely the Librarian and

More information

High Speed Internet Services

High Speed Internet Services Cnventin Center High Speed Internet Services Wired high-speed Internet access inside a meeting rm, fyer r ther cmmn area: $550 fr the first IP address/device per meeting rm/lcatin, ONE TIME charge fr the

More information

Audit Committee Charter

Audit Committee Charter Audit Cmmittee Charter Membership The Audit Cmmittee (the "Cmmittee") f the Bard f Directrs (the "Bard") f Philip Mrris Internatinal Inc. (the "Cmpany") shall cnsist f at least three directrs all f whm

More information

NAIC Replacement Requirements For Certain Life Insurance Policies And Annuity Contracts

NAIC Replacement Requirements For Certain Life Insurance Policies And Annuity Contracts NAIC Replacement Requirements Fr Certain Life Insurance Plicies And Annuity Cntracts Duties f Prducers If a transactin invlves a replacement, the prducer must leave with the applicant, at the time an applicatin

More information

Sources of Federal Government and Employee Information

Sources of Federal Government and Employee Information Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities

More information

FIREFIGHTER HEART AND CIRCULATORY MALFUNCTION BENEFITS PROGRAM STANDARD OPERATING GUIDELINES Approved by the DOLA Executive Director July 1, 2014

FIREFIGHTER HEART AND CIRCULATORY MALFUNCTION BENEFITS PROGRAM STANDARD OPERATING GUIDELINES Approved by the DOLA Executive Director July 1, 2014 FIREFIGHTER HEART AND CIRCULATORY MALFUNCTION BENEFITS PROGRAM STANDARD OPERATING GUIDELINES Apprved by the DOLA Executive Directr July 1, 2014 Prgram Overview: As f July 1, 2014, the Department f Lcal

More information

Directives to LHINs in respect of Reporting Requirements under the BPSAA. Issued By Minister of Health and Long-Term Care

Directives to LHINs in respect of Reporting Requirements under the BPSAA. Issued By Minister of Health and Long-Term Care Directives t LHINs in respect f Reprting Requirements under the BPSAA Issued By Minister f Health and Lng-Term Care Effective April 1, 2011 Table f Cntents 1. BACKGROUND... 2 2. REPORT ON THE USE OF CONSULTANTS...

More information

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS APPENDIX A FORM ADV (Paper Versin) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS Frm ADV: General Instructins Read these instructins carefully befre

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

ES PROCEDURES FOR OVERPAYMENT RECOVERY

ES PROCEDURES FOR OVERPAYMENT RECOVERY ES PROCEDURES FOR OVERPAYMENT RECOVERY Effective: 7/1/2012 Respnsible Office: Emplyee Services (ES) Apprved: ES Directr Applicatin: All Emplyees f the University f Clrad Plicy The University f Clrad will

More information

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices This is being prvided t yu as a requirement f the privacy regulatins issued under the Health Insurance Prtability and Accuntability Act f 1996 (HIPAA). This ntice describes hw HROSM may use and disclse

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information