Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )
|
|
|
- Prudence June Hoover
- 9 years ago
- Views:
Transcription
1 Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Overview: The Bring Your Own Device (BYOD) program allows employees to use their own computing devices for Company s business. This agreement allows employees to use their own small handheld devices, such as smart phones and approved wearables 2, for Company business. All of these are referred to herein as your device. Participation in the BYOD programs is voluntary. To access the Company WiFi service or Secure Mobile App services ( Services ), you must register the specific device to be used, select the applicable mobile device Services requested, and access terms of use specific to each Service 3, including privacy and information security obligations 4. This agreement incorporates by reference the Service-specific terms of use provided on the Mobile Device Services website. This agreement is between you and the Company entities authorized to govern or perform any of these terms. By clicking on the box at the end of this agreement, signing a physical copy of this agreement 5, or by accessing the Company network and using Company services on your device (such as , contacts, etc.), you agree that you have read and accepted the terms and conditions in this agreement, as well as completed the device registration process further acknowledging your responsibilities and obligations Eligibility To be eligible to use your device under the BYOD programs, you must: a. Be a regular Company employee (not a contingent or contract worker); b. Register your device; c. Ensure that your device meets minimum hardware and software specifications; d. Be in a business group that allows participation in the program; and e. Receive permission from your manager. f. If you breach any of the terms of this agreement, you may become ineligible to participate in the BYOD programs, and you may also be subject to disciplinary action. 1 Note: rather than try and keep up with all new types of computing devices, the agreement and related policies should govern the capabilities of the devices (e.g. recording capabilities) and generalize for all devices, as much as possible. 2 Note: a company may decide that some wearables are approved for company use and some are not. You can insert a link to a website where approved devices are listed. 3 Note: we have found that having one basic agreement such as this, plus a few service-specific terms located where the services are accessed on the internal portal, is better than a lengthier all-encompassing agreement that contains terms and conditions for services an employee isn t using, or multiple, somewhat repetitive agreements for each service, especially as different devices and services proliferate. 4 Note: you can incorporate existing applicable privacy and information security policies into these terms & conditions as long as they conform and are kept updated. 5 Note: in some jurisdictions, hard-copy (and possibly translated) agreements are required. 6 Note: important clauses are in bold print.
2 2. Company Policies When Enrolled in the BYOD programs a. When conducting Company business on your device, you must comply with all applicable laws and regulations as well as Company s policies and procedures. These include (but are not limited to) any of the following (or similar for your governing entity) policies that apply to you: Company Code of Conduct; Company Policies; Company Computer Use Policies; Company Audio/Video Recording Policy; Company Information Security Policies and Procedures; Company Employment Agreement and Policies; Company Software Licensing Policy; Company Social Media Policy; Company Privacy Policies and Procedures; and All other applicable Company policies and procedures. b. In accordance with the Company Software Licensing Policy, when working on Company business, you may install and use on your device only legally acquired software for which you hold legally acquired and documented software licenses. Although Company may be licensed for a software product, that license may not extend to your device. c. You may use your device for non-company purposes during your personal time. However, you must exercise discretion in your personal use so as not to create legal liability for Company or negatively impact the working environment or resources of Company. Company is not responsible for the loss of any non-company data or applications as a result of your personal use of your device on a Company network. 3. Information Storage and Backup a. When possible, you must separate Company-owned information on your device from non-company information. Various technologies may be available to you to support segregation of Company and non-company information on your device depending upon its configuration and operating system. 7 You are responsible for implementing such technologies on your device as directed by Company. b. You should back up any non-company data you care about that is stored on your device. You should use a method that does not also capture Company data for storage. c. If the Services accessed use encryption, you must not disable such encryption on your Device. d. You must not access, view or store information classified as Company Highly Confidential on your Device. 4. Access to Company Network You must not: a. Allow anyone else to use your device when logged in to a Company network; 7 Note: technology is advancing rapidly in its ability to partition off personal from work data on various computing devices. However, this is not yet possible on all types of mobile computing devices. This agreement is meant to be device-agnostic given the many new form factors in the market.
3 b. Give anyone else your Company network login password; or c. Give anyone else access to Company information on your device whether connected to the Company network or not. 5. Information and Device Management a. Your device is subject to standard Company information management policies and procedures including, but not limited to, a remote wipe that may remove all stored content to the extent technically feasible. A remote wipe may be performed as deemed necessary by Company. Examples of when a remote wipe may be necessary include, but are not limited to: employee termination, malicious code infection, lost or stolen device, or prolonged absence from Company. Company will attempt to selectively wipe only Company content unless you request a full wipe or a selective wipe is not technically feasible. However, Company is not responsible for any non-company information lost as the result of a remote wipe. 8 b. Your device is subject to a software audit by Company on all installed software running on it (generally the software name, version, program file information, and license information), for purposes of standard Company software audit requirements. 9 c. You must not disable or alter the settings for Company information security software or enforcement functions on your device. 6. Employees on a Litigation Hold Notice ( LHN ) or Legal Compliance Hold Notice ( LCHN ) If you are, or become, subject to a LHN or LCHN, you must follow all LHN or LCHN instructions, take affirmative steps to preserve relevant information as instructed by Company Legal, and seek permission from Company Legal before removing any information from your device. You must notify Company if you leave the BYOD programs, stop a Service, or your employment with Company is terminated. Appropriate contact information will be supplied to you with any LHN or LCHN notifications. It is your responsibility to understand from the Company Legal team what services you are allowed to access on your device Hardware Support; Theft of, Loss of, or Damage to Your Device a. You are responsible for the cost of all repairs and maintenance related to any device you own and choose to use at Company. In the event you require hardware support for your device you must use a reputable non-company service center for repairs. b. You must never provide your encryption password or Company login/passphrase to non-company service center personnel. If your device password is required to perform the service, remove any Company information and access from your device prior to delivery to a non-company service center. Once repairs have been completed you must change your encryption password, and Company recommends you change all passwords/passphrases. 8 Note: a remote wipe should be proportional to the need. You should also check local laws regarding any potential company liability associated with a remote wipe that deletes employee personal data. 9 Note: many enterprise software vendors are now seeking ways to audit all software use in an effort to sell additional licenses. 10 Note: there may be Services you do not want accessed by an employee on a litigation or compliance hold.
4 c. If your device is lost or stolen, you must immediately report the incident to Company Security at the earliest possible opportunity. Company will not compensate you if you bring a personal device to work and that device is lost, stolen or damaged. You are responsible for all costs and expenses related to use of your device at Company. d. If your Device is lost, stolen, damaged, or stops working, you must take all steps necessary to continue to perform your job satisfactorily while your device is being replaced or repaired. e. The BYOD programs are voluntary and offered for your convenience only. Company is not responsible for any malware infections or other malicious, or unauthorized, activities that result in compromise of your personal accounts or non-company information. Company has no duty, and is not responsible for, network security for non-company information. To avoid loss of non-company information, you are responsible for maintenance of your non-company information, device, and software. 8. Software Support a. Company is not responsible for the backup and maintenance of non-company information and software. b. Company software support for your device will be limited to network protection, and connection to the Company network. To resolve other issues, you should use the Company BYO community self-support model located on Company s intranet site. 9. Travel and Physical Security a. You must protect your device at least to the same level that Company employees are required by Company to protect Company-provided devices. b. You must comply with all applicable export regulations pertaining to controlled technology, in particular when you travel to a controlled country with your device. Some countries may confiscate your device and examine the contents, including your non-company information. 10. Non-Exempt Employee Guidelines a. If you are an hourly or non-exempt employee, you are required to record and accurately report all time spent on Company business, regardless of the location or device used, including your device used under this agreement. b. You may not perform Company work without reporting your time, even if overtime restrictions are in place. If you believe you are being asked to work without reporting your time or being properly compensated for time worked, you must immediately contact your Human Resources or Legal representative, or the Company Hotline, about the matter. 11. Compliance and Program Availability a. Company reserves the right to terminate the BYOD programs at any time and for any reason. In addition, individual employees may be terminated from the program for any extended period of inactivity on the network. Employees may choose to terminate their participation in the BYOD programs at any time, under the terms of this agreement. b. All the provisions of this section 11(b) are subject to Company s compliance with applicable law. Company reserves the right to search, intercept and review both incoming and outgoing on your
5 Company account on your device, all internet usage through a Company network on your device, and any Company information stored on your device. In addition, Company may investigate, copy and use any information from your device at the direction of a court, government agency or law enforcement agency, or when there is reasonable cause to suspect that there has been a violation of Company s Code of Conduct, Policies, or other Company information security or computer use guidelines, or a violation of other statutes or regulations. If requested by Company Corporate Security, Company Legal, Internal Audit, HR Legal, or Company Information Security, you must provide your device for manual inspection and possible copying and use of its content. c. If, for whatever reason, you cease to be eligible to participate in the BYOD programs, you elect to cease your participation in the BYOD programs, you elect to remove a particular device from the BYOD program, or you leave employment with Company (whether voluntary or involuntary), you must give Company ten days notice and deliver your device to IT Services for removal of Company information and applications. For certain BYOD devices, you may contact PC Services to remote wipe any Company information from your device. d. Failure to follow these steps may result in disconnection from the Company network, or a remote wipe of your device that will remove all stored content, including your non-company information. i. Company PC Services will remove your Company system access and all associated information and Company-provided applications. ii. iii. As with a Company-provided computer, if you leave Company for any reason or are placed on a LHN or LCHN, Company PC Services will copy any Company information stored on your device. To the extent technically feasible, this will not include non-company information unless legally required. This information will be stored securely by Company according to Company s standard data retention policies. You may remove all non-company information from your device before submitting it to Company PC Services, unless your device is subject to a LHN or LCHN as described above. 12. Updating This Agreement and Related Policies a. This agreement and the Service-specific and other terms of use incorporated by reference herein constitute the entire agreement between you and Company, and supersede all prior agreements between you and Company concerning the subject matter herein. b. Company may amend this agreement, or distribute and enforce new policies related to the BYOD programs, at any time without prior notice, provided that Company complies with all applicable laws. By continuing to participate in the BYOD programs, you agree to be governed by the terms and conditions as provided in the most updated version of this agreement and any related policies 11. c. Company may deploy and enforce new policies without prior notice to address newly identified vulnerabilities. You agree to be governed by the terms and conditions as provided in such policies and to allow the installation of patches or software as deemed necessary by Company to protect Company information and the Company network. If your device does not support updated minimum security specifications, it may be disconnected from services when appropriate and remotely wiped to protect Company s information. 11 Note: significant changes to the program or the Agreement should be managed by executing an updated agreement.
6 13. Severability If any provision of this agreement is determined by a court of competent jurisdiction to be invalid, illegal, or unenforceable, such determination will not affect the validity of the remaining provisions. This agreement was updated, <Insert forced scroll and clickable box, then track agreements and users may need translations and hard-copy signatures.>
Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)
Below you will find the following sample policies: Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) *Log in to erisk Hub for
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Technical Help Desk Terms of Service
Technical Help Desk Terms of Service This esecuritel Technical Help Desk Terms of Service (the Agreement ) is provided in connection with the eligible tablet enrolled in either the Advanced Protection
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
Bring Your Own Device Policy
Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
NOTE: BY CLICKING TO AGREE AND BY USE OF THIS SERVICE YOU ARE CONCLUDING A LEGALLY BINDING AGREEMENT. READ CAREFULLY.
INTERNET BANKING SERVICE AGREEMENT NOTE: BY CLICKING TO AGREE AND BY USE OF THIS SERVICE YOU ARE CONCLUDING A LEGALLY BINDING AGREEMENT. READ CAREFULLY. Introduction. This Internet Banking Service Agreement
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
How To Understand The Bring Your Own Device To School Policy At A School
The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS
Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy
Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)
BEConnected User Agreement
BEConnected User Agreement Page 1 of 5 INTRODUCTION This is a legal document between you and the owner ( Belmont College ) of the Apple ipad tablet ( ipad ) in connection with the delivery of an ipad to
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Bring Your Own Device. Individual Liable User Policy Considerations
Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations
Mobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Casey State Bank Online Banking Agreement and Disclosure
Casey State Bank Online Banking Agreement and Disclosure Please carefully read this entire agreement and keep a copy for your records. By pressing the I ACCEPT button, you agree to the terms and conditions
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace
Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace Earl (Chip) M. Jones Littler, Dallas [email protected] (214) 880-8115 Michelle B. Brookshire Littler, Dallas [email protected]
Covered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
IT Security Standard: Computing Devices
IT Security Standard: Computing Devices Revision History: Date By Action Pages 09/30/10 ITS Release of New Document Initial Draft Review Frequency: Annually Responsible Office: ITS Responsible Officer:
Security and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Mobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BAA ) is effective ( Effective Date ) by and between ( Covered Entity ) and Egnyte, Inc. ( Egnyte or Business Associate ). RECITALS
How To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
BUSINESS ONLINE BANKING AGREEMENT
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
Access Control Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
CITY OF BOULDER *** POLICIES AND PROCEDURES
CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of
CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard
CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information
Cyber Security Best Practices
Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters
Bill Payment Service Agreement
www.starone.org Bill Payment Service Agreement 1. INTRODUCTION This Agreement is the contract which covers your and our rights and responsibilities concerning the Bill Payment Services offered to you by
Information Technology Policy
ITP Number ITP-SEC024 Category Security Contact [email protected] Information Technology Policy IT Security Incident Policy Effective Date August 2, 2012 Supersedes Scheduled Review Annual 1. Purpose
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
EDI REGISTRATION FORM Blue Cross of Idaho 3000 E Pine Ave Meridian, Id 83642 Fax 208-331-7203
DATE: EDI REGISTRATION FORM Blue Cross of Idaho 3000 E Pine Ave Meridian, Id 83642 Fax 208-331-7203 Enrollments will be completed with 5-7 Business Days from Date Received Business Name: Provider Information:
O1 ONLINE BANKING Agreement Option 1 Credit Union
O1 ONLINE BANKING Agreement Option 1 Credit Union By enrolling in Option 1 Credit Union s O1 ONLINE Banking service, you agree to the addition of the following to the Terms and Conditions for Personal
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
Southern Law Center Law Center Policy #IT0004. Title: Email Policy
Southern Law Center Law Center Policy #IT0004 Title: Email Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/2012 1.0 Purpose: To provide members of
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY CONDITIONS OF USE FOR ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY Between: the Commonwealth of Australia, acting
Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice
Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help
White Paper. Data Security. journeyapps.com
White Paper Data Security CONTENTS The JourneyApps Commitment to Security Geographic Location of Cloud Hosting Infrastructure-Level Security Protection of Data Through Encryption Data Life Cycle Management
[BRING YOUR OWN DEVICE POLICY]
2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ), is made effective as of the sign up date on the login information page of the CarePICS.com website, by and between CarePICS,
Village of Hastings-on-Hudson Electronic Policy. Internal and External Email Policies and Procedures
Village of Hastings-on-Hudson Electronic Policy Internal and External Email Policies and Procedures Effective February 2012 1 1. Table of Contents 1. General Policies... 3 1.1 Establishment and upkeep
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
NETWORK SECURITY GUIDELINES
NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus
Service Description: Dell Backup and Recovery Cloud Storage
Service Description: Dell Backup and Recovery Cloud Storage Service Providers: Dell Marketing L.P. ( Dell ), One Dell Way, Round Rock, Texas 78682, and it s worldwide subsidiaries, and authorized third
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
BYOD Policy for [AGENCY]
BYOD Policy for [AGENCY] This document provides policies, standards, and rules of behavior for the use of smartphones, tablets and/or other devices ( Device ) owned by [AGENCY] employees personally (herein
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP
Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
ADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY COLLECTION AND USE OF INFORMATION FROM USERS
ADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY Advanced Cable Communications ( Company ) strives to offer visitors to its website (the Site ) the many advantages of Internet technology and to provide
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
DBC 999 Incident Reporting Procedure
DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible
Business Merchant Capture Agreement. A. General Terms and Conditions
Business Merchant Capture Agreement A. General Terms and Conditions Merchant Capture (MC), the Service, allows you to deposit checks to your LGE Business Account from remote locations by electronically
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Terms and Conditions for Online Services of BOC Credit Card (International) Limited
Terms and Conditions for Online Services of BOC Credit Card (International) Limited Online Services of BOC Credit Card (International) Limited ("BOCCC") are provided to you by Bank of China (Hong Kong)
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
BOC Credit Card (International) Limited - Terms and Conditions for Online Services
BOC Credit Card (International) Limited - Terms and Conditions for Online Services These terms and conditions are applicable to all users of the Online Services and govern the use of the Online Services,
PointCentral Subscription Agreement v.9.2
PointCentral Subscription Agreement v.9.2 READ THIS SUBSCRIPTION AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE INSTALLING THIS SOFTWARE. THIS AGREEMENT, BETWEEN CALYX TECHNOLOGY, INC., DBA CALYX SOFTWARE (
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
Mobile Device Usage and Agreement Policy
Page 1 of 10 1.0 Introduction Mobile Device Usage and Agreement Policy The State of Minnesota provides several electronic tools for employees whose job performance requires or would be enhanced by their
XCEL ENERGY S ebill AND ebill PAYMENT TERMS OF USE
XCEL ENERGY S ebill AND ebill PAYMENT TERMS OF USE 1. Introduction CAREFULLY READ ALL OF THESE TERMS OF USE BEFORE PROCEEDING. IF YOU DO NOT ACCEPT SUCH TERMS AND INDICATE YOUR ACCEPTANCE BELOW, THEN YOU
How To Make Bring Your Own Device A Plus, Not A Risk
FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES BYOD: Bring your own device How to make BYOD a PLUS, not a RISK
