APPENDIX III-29 GOVERNMENT NATIONAL MORTGAGE ASSOCIATION ENTERPRISE PORTAL (GMEP) REGISTRATION FORMS
|
|
|
- Nora Richards
- 9 years ago
- Views:
Transcription
1 APPENDIX III-29 GOVERNMENT NATIONAL MORTGAGE ASSOCIATION ENTERPRISE PORTAL (GMEP) REGISTRATION FORMS Applicability: Purpose: Prepared by: Distribution: Ginnie Mae I MBS Program and Ginnie Mae II MBS Program. To obtain access to Ginnie Mae s Enterprise Portal in order to access business applications that are used by program participants to conduct business with Ginnie Mae. Issuer and Document Custodian Please return the completed and signed form to: Ginnie Mae Security Administrator Ginnie Mae Relationship Services C/O The Bank of New York 101 Barclay Street - 8 East New York, NY Completed forms should be scanned as a PDF document and ed to [email protected] : Completion Instructions: In order to register for access to the Ginnie Mae Enterprise Portal, all organizations will be required to designate at least two (2) security officers (SO), one for registering users into the new Portal, and a second to approve those users. This will provide the required separation of duties. Each SO must complete the Security Officer portal registration form. Each organization will be required to submit two Security Officer portal registration forms, advising who the two Security Officers are. Each Security Officer will fill out the form, sign it, and then give it to their Supervisor to review and sign. The Supervisor will pass the form to the organization s Authorized Officer, who must also be named on the Resolution of Board of Directors and Certificate of Authorized Signatures ( form HUD ). After the Authorized Officer reviews and signs the form, he/she will send the completed form to the Ginnie Mae Security Administration office. Upon receipt, Ginnie Mae s Security Administrator will validate the signature on the registration form against the signatures on the form HUD Once verified, Ginnie Mae s Security Administrator will register the Security Officer in the Ginnie Mae portal registration system. One Ginnie Mae Security Administrator will add the Security Officer to the portal and another Security Administrator will approve the new Security Officer user. The Ginnie Mae Security Administrator will call the new Security Officer using the verified contact information, confirm the identity of the SO, and notify them of the ID and password by phone. When the ID and password is received, the SO will be required to login with their new ID and system generated password. Once the login is successful, the SO will be prompted to enter a new Date: 2/24/ Appendix III-29
2 password and answer 3 security questions. If the password is confirmed, the Portal will send a message back to the Ginnie Mae Security Administrator that the password has been changed. Note that a representative from the Ginnie Mae Security Administrator office must create the initial SO in an organization. Additionally, the Ginnie Mae Security Administrators must have the fully completed paperwork as described previously before they can create the Security Officer. The Security Officer will be associated with a group type i.e. custodian, issuer, etc. This group type will be used to restrict types of roles that can be assigned by that organization s Security Officer. (Note: Issuers are strongly encouraged to assign a backup SO in the event that one of the two primary Security Officers is unavailable.) This appendix contains the following registration forms. Security Officer Registration for Issuer Only Security Officer Registration for Custodian Only User Registration for Issuer Only User Registration for Custodian Only Date: 2/24/ Appendix III-29
3 Ginnie Mae Enterprise Portal (GMEP) Security Officer Registration for Custodian ONLY Instructions: (1) Complete the information in the box below please print. (2) Read the Rules of Behavior. (3) Sign and date this registration request on page 4. (4) Have an authorized officer sign the registration document on page 4. (5) Mail the completed and signed form to: Ginnie Mae Security Administrator Ginnie Mae Relationship Services The Bank of New York Mellon 101 Barclay - 8 East New York, NY Organization Name: Custodian Number(s): Security Officer Last Name: First Name: Middle Name: Name Suffix: Prefix: (Mr., Ms., Mrs.) Office Phone No.: Office Fax No.: RULES OF BEHAVIOR As a user of the GMEP, I understand that I am personally responsible for all use and any misuse of my user account and password. I understand that by accessing a U.S. Government information system, I must comply with the following requirements: (1) Users must safeguard the information to which you have access at all times. (2) The system may be used only in support of Ginnie Mae business. (3) The system may not be used for any purpose other than those functions related to Ginnie Mae's business. (4) The government reserves the right to monitor the activities of any user and/or any machine connected to GMEP. (5) The GMEP and the information contained within are the property of the federal government. Ginnie Mae owns the data stored on these systems, including all messages and information, even those deemed personal. (6) No data may be transmitted on the system that is more sensitive than the level for which that system has been approved. (7) Information that was obtained via GMEP may not be divulged outside of government channels without the express, written permission of the system owner. SECURITY OFFICER REGISTRATION FOR CUSTODIAN ONLY Page 3 of 24
4 (8) Any activity that would discredit Ginnie Mae, including, but not limited to, seeking, transmitting, collecting, or storing defamatory, discriminatory, sexually explicit, obscene, harassing, or intimidating messages or material, is prohibited. (9) Any activity that violates Federal laws for information protection (e.g., reconnaissance techniques, hacking, phishing, spamming, etc.) is expressly prohibited. Violations will be turned over to the appropriate Federal law enforcement organization for prosecution. (10) GMEP user accounts are provided solely for the use of the individual for whom they were created. Passwords or any other authentication mechanism should never be shared or stored any place easily accessible. If a password is stored it may not be stored in a clear-text or readable format. Sharing of user accounts is grounds for terminating system access. (11) Per Ginnie Mae Policy, GMEP has the following password format requirements: Passwords must be at least eight (8) alphanumeric characters in length, and contain the following five (5) character types: Maximum twenty (20) characters in length; Must have at least one (1) English upper case letter (A, B, C, etc.); Must have at least one (1) English lower case letter (a, b, c, etc.); Must have at least one (1) Arabic number (0, 1, 2, 3, etc.); Must have at least one (1) special character from the following set: (12) Passwords should not be created using the following: Dictionary words or common names, such as Betty, Fred, Rover; Portions of associated account names, for example, user ID, login name; Consecutive character strings, such as abcdef, ; Simple keyboard patterns, such as asdfgh, qwerty; Generic passwords, such as a password consisting of a variation of the word password (e.g., P@ssword1). (13) Passwords must be changed every ninety (90) days and should never be repeated. (14) Password history will prevent users from using the same password from the previous (24) password changes. (15) After three (3) invalid password attempts, the user account will be locked. The user must contact the Ginnie Mae Information System Security Officer to unlock the account. (16) The Security Officer must approve and authorize the Security Administrator s level of access in writing via documented account management procedures. (17) The unauthorized acquisition, use, reproduction, transmission, or distribution of any controlled information including computer software and data, that includes privacy information, copyrighted, trademarked or material with other intellectual property rights (beyond fair use), pre-public release information such as economic indicators, proprietary data, or export controlled software or data is prohibited. All use of copyrighted software must comply with copyright laws and license agreements. SECURITY OFFICER REGISTRATION FOR CUSTODIAN ONLY Page 4 of 24
5 (18) Remote off-site, (e.g., dial-in, VPN) access to GMEP Administrative Functions must be approved and authorized in writing by the appropriate management authority and the Ginnie Mae Information System Security Officer. (19) Authorized users do not have a right, nor should they have an expectation, of privacy while using any Government office equipment at any time. (20) At no time should personally owned equipment be connected to the system. (21) Any security problems or password compromises must be reported immediately to the Ginnie Mae Security Administrator. (22) I understand that Federal law provides for punishment under Title 18, U.S. Code, including a fine and up to ten (10) years in jail for the first offense for anyone who commits any of the following violations: Knowingly accesses an information system without authorization, or exceeds authorized access, and obtains information that requires protection against unauthorized disclosure. Intentionally, without authorization, accesses a government information system and impacts the government s operation, including availability of that system. Intentionally accesses a government information system without authorization, and alters, damages, or destroys information therein. Prevents authorized use of the system or accesses a government information system without authorization, or exceeds authorized access, and obtains anything of value. (23) Screensavers must be password protected. (24) Movable media, (such as diskettes, CD-ROMs, and Zip disks) that contain sensitive and/or official information must be secured when not in use. (25) When the user no longer has a legitimate need to access the system, the user s Supervisor must notify the Security Officer immediately in writing so that access can be terminated. The Security Officer will notify the Ginnie Mae Security Administrator. (26) Upon initial login I will be required to select and answer three (3) Security questions for future use to change or reset my password. (27) If Ginnie Mae or the GMEP Security Administrator issues a one-time password token (e.g. RSA Tokens) or other secondary authentication device, you accept the responsibilities and obligations presented on the forms and documents provided when the device is issued. This includes but is not limited to initiation, usage, storage, return, and reporting procedures for the authentication device. Actions violating any of these rules will result in immediate termination of your assigned identifier/password from the system. SECURITY OFFICER REGISTRATION FOR CUSTODIAN ONLY Page 5 of 24
6 SECURITY OFFICER CERTIFICATION: I have read the above statement of policy regarding system security awareness and practices when accessing GMEP s information resources. I understand the policies as set forth above, and I agree to comply with these requirements as a condition of being granted limited access to the Ginnie Mae s computer resources. I certify that I have been designated as an authorized Security Officer by my organization and will abide by all of the policies and rules as set forth by Ginnie Mae. I will make sure that I only assign Ginnie Mae IDs to active employees and to the best of my knowledge there will be no sharing of IDs. I understand that all accounts will be accessing government information systems. I agree to deactivate users when they leave my company, go on extended leave, are reassigned to other positions, etc. where their Ginnie Mae access is no longer needed. I recognize that a violation of this certification could result in disciplinary action against my organization. Certified By: Security Officer Signature Date AUTHORIZED SIGNATURE CERTIFICATION: I hereby certify that I am authorized and empowered in the name of and on behalf of this corporation to act on behalf of my company and designate a Security Officer for my organization who will abide by all of the policies and rules as set forth by Ginnie Mae. I further authorize and empower the above named Security Officer to register other employees in my organization as Security Officers within Ginnie Mae s portal, as needed. I understand that all accounts will be accessing government information systems. I recognize that a violation of this certification could result in disciplinary action against my organization. Approved By: Name of Authorized Officer Title of Officer Signature of Authorized Officer Date Officer Phone Number SECURITY OFFICER REGISTRATION FOR CUSTODIAN ONLY Page 6 of 24
7 GINNIE MAE SECURITY ADMINISTRATOR CERTIFICATION: Authorized signer called-back 1 st Security Administrator Name Administrator Phone No. 1 st Security Administrator Signature Date Security Officer Registration Approved Security Officer added to Portal 2 nd Security Administrator Name Administrator Phone No. 2 nd Security Administrator Signature Date SECURITY OFFICER REGISTRATION FOR CUSTODIAN ONLY Page 7 of 24
8 Ginnie Mae Enterprise Portal (GMEP) Security Officer Registration for Issuer ONLY Instructions: (6) Complete the information in the box below please print. (7) Read the Rules of Behavior. (8) Sign and date this registration request on page 4. (9) Have an authorized officer sign the registration document on page 4. (10) Mail the completed and signed form to: Ginnie Mae Security Administrator Ginnie Mae Relationship Services The Bank of New York Mellon 101 Barclay - 8 East New York, NY Name of Issuer: Issuer Number(s): Security Officer Last Name: First Name: Middle Name: Name Suffix: Prefix: (Mr., Ms., Mrs.) Office Phone No.: Office Fax No.: USER RULES OF BEHAVIOR As a user of the GMEP, I understand that I am personally responsible for all use and any misuse of my user account and password. I understand that by accessing a U.S. Government information system, I must comply with the following requirements: (1) Users must safeguard the information to which you have access at all times. (2) The system may be used only in support of Ginnie Mae business. (3) The system may not be used for any purpose other than those functions related to Ginnie Mae's business. (4) The government reserves the right to monitor the activities of any user and/or any machine connected to GMEP. (5) The GMEP and the information contained within are the property of the federal government. Ginnie Mae owns the data stored on these systems, including all messages and information, even those deemed personal. (6) No data may be transmitted on the system that is more sensitive than the level for which that system has been approved. (7) Information that was obtained via GMEP may not be divulged outside of government channels without the express, written permission of the system owner. Security Officer Registration for Issuer ONLY Page 8 of 24
9 (8) Any activity that would discredit Ginnie Mae, including, but not limited to, seeking, transmitting, collecting, or storing defamatory, discriminatory, sexually explicit, obscene, harassing, or intimidating messages or material, is prohibited. (9) Any activity that violates Federal laws for information protection (e.g., reconnaissance techniques, hacking, phishing, spamming, etc.), is expressly prohibited. Violations will be turned over to the appropriate Federal law enforcement organization for prosecution. (10) GMEP user accounts are provided solely for the use of the individual for whom they were created. Passwords or any other authentication mechanism should never be shared or stored any place easily accessible. If a password is stored it may not be stored in a clear-text or readable format. Sharing of user accounts is grounds for terminating system access. (11) Per Ginnie Mae Policy, GMEP has the following password format requirements: Passwords must be at least eight (8) alphanumeric characters in length, and contain the following five (5) character types: Maximum twenty (20) characters in length; Must have at least one (1) English upper case letter (A, B, C, etc.); Must have at least one (1) English lower case letter (a, b, c, etc.); Must have at least one (1) Arabic number (0, 1, 2, 3, etc.); Must have at least one (1) special character from the following set: (12) Passwords should not be created using the following: Dictionary words or common names, such as Betty, Fred, Rover; Portions of associated account names, for example, user ID, login name; Consecutive character strings, such as abcdef, ; Simple keyboard patterns, such as asdfgh, qwerty; Generic passwords, such as a password consisting of a variation of the word password (e.g., P@ssword1). (13) Passwords must be changed every ninety (90) days and should never be repeated. (14) Password history will prevent users from using the same password from the previous (24) password changes. (15) After three (3) invalid password attempts, the user account will be locked. The user must contact the appropriate Help Desk or Security Officer in person for identification verification and to unlock the account. (16) The Security Officer must approve and authorize the employee's level of access in writing via documented account management procedures. (17) The unauthorized acquisition, use, reproduction, transmission, or distribution of any controlled information including computer software and data, that includes privacy information, copyrighted, trademarked or material with other intellectual property rights (beyond fair use), pre-public release information such as economic indicators, proprietary data, or export controlled software or data is prohibited. All use of copyrighted software must comply with copyright laws and license agreements. Security Officer Registration for Issuer ONLY Page 9 of 24
10 (18) Remote off-site, (e.g., dial-in, VPN) access to GMEP Administrative Functions must be approved and authorized in writing by the appropriate management authority and the Ginnie Mae Information System Security Officer. (19) Authorized users do not have a right, nor should they have an expectation, of privacy while using any Government office equipment at any time. (20) At no time should personally owned equipment be connected to the system. (21) Any security problems or password compromises must be reported immediately to the Ginnie Mae Security Administrator. (22) I understand that Federal law provides for punishment under Title 18, U.S. Code, including a fine and up to ten (10) years in jail for the first offense for anyone who commits any of the following violations: Knowingly accesses an information system without authorization, or exceeds authorized access, and obtains information that requires protection against unauthorized disclosure. Intentionally, without authorization, accesses a government information system and impacts the government s operation, including availability of that system. Intentionally accesses a government information system without authorization, and alters, damages, or destroys information therein. Prevents authorized use of the system or accesses a government information system without authorization, or exceeds authorized access, and obtains anything of value. (23) Screensavers must be password protected. (24) Movable media, (such as diskettes, CD-ROMs, and Zip disks) that contain sensitive and/or official information must be secured when not in use. (25) When the user no longer has a legitimate need to access the system, the user s Supervisor must notify the Security Officer immediately in writing so that access can be terminated. The Security Officer will notify the Ginnie Mae Security Administrator. (26) Upon initial login I will be required to select and answer three (3) Security questions for future use to change or reset my password. (27) If Ginnie Mae or the GMEP Security Administrator issues a one-time password token (e.g. RSA Tokens) or other secondary authentication device, you accept the responsibilities and obligations presented on the forms and documents provided when the device is issued. This includes but is not limited to initiation, usage, storage, return, and reporting procedures for the authentication device. Actions violating any of these rules will result in immediate termination of your assigned identifier/password from the system. Security Officer Registration for Issuer ONLY Page 10 of 24
11 SECURITY OFFICER CERTIFICATION: I have read the above statement of policy regarding system security awareness and practices when accessing GMEP s information resources. I understand the policies as set forth above, and I agree to comply with these requirements as a condition of being granted limited access to the Ginnie Mae s computer resources. I certify that I have been designated as an authorized Security Officer by my organization and will abide by all of the policies and rules as set forth by Ginnie Mae. I will make sure that I only assign Ginnie Mae IDs to active employees and to the best of my knowledge there will be no sharing of IDs. I understand that all accounts will be accessing government information systems. I agree to deactivate users when they leave my company, go on extended leave, are reassigned to other positions, etc. where their Ginnie Mae access is no longer needed. I recognize that a violation of this certification could result in disciplinary action against my organization. Certified By: Security Officer Signature Date AUTHORIZED SIGNATURE CERTIFICATION: I hereby certify that I am authorized and empowered in the name of and on behalf of this corporation to act on behalf of my company and designate a Security Officer for my organization who will abide by all of the policies and rules as set forth by Ginnie Mae. I further authorize and empower the above named Security Officer to register other employees in my organization as Security Officers within Ginnie Mae s portal, as needed. I understand that all accounts will be accessing government information systems. I recognize that a violation of this certification could result in disciplinary action against my organization. Approved By: Name of Authorized Officer Title of Officer Signature of Authorized Officer Date Officer Phone Number Security Officer Registration for Issuer ONLY Page 11 of 24
12 GINNIE MAE SECURITY ADMINISTRATORS CERTIFICATION: Authorized signer called-back Signature verified 1 st Security Administrator Name 1 st Security Administrator Phone No. 1 st Security Administrator Signature Date Security Officer Registration Approved Security Officer added to Portal 2 nd Security Administrator Name 2 nd Security Administrator Phone No. 2 nd Security Administrator Signature Date Security Officer Registration for Issuer ONLY Page 12 of 24
13 Ginnie Mae Enterprise Portal (GMEP) User Registration for Issuer ONLY Instructions (1) Complete the information in the boxes below please print. (2) Select the requested roles(s). (3) Read the Rules of Behavior. (4) Sign and date this registration request. (5) Have your supervisor sign this registration request. (6) Submit this request to your Security Officer for processing. Organization: Prefix (Mr., Ms., Mrs.): First Name: Middle Name: Last Name: Suffix: Office Phone Number: Office Fax Number: User Registration for Issuer ONLY Page 13 of 24
14 Select Roles (Select All That Apply): RFS Upload & Exception Feedback User Pool Accounting User SCRA User GPADS User HMBS User e- Notification User IOPP User Exception feedback Pool Accounting - Single Family Servicemembers Civil Relief Act (SCRA) Issuer feedback Pool accounting and reporting Communication of system generated announcements Issuer Feedback Matching and Suspense (MAS) Pool Accounting Multifamily File upload File upload Exception feedback Matching and Suspense (MAS) File upload IPMS RPN Issuer CM Issuer PTS Issuer RSA Token Holder Enter pool number request View requests and reports Selling Issuer: Submit request for Transfer Request maximum pool number calculation override View reports Request commitment and accept commitment fee Buying Issuer: Accept and authorize Transfer Test users token access MAMS Issuer MAMS Subservicer MAMS Participation Agent RSA Temporary Bypass Search and view agreements and reports Create and submit agreements Upload documents View HUD agreements in which Issuer is Subservicer Search HUD agreements in which Issuer is Subservicer Submit HUD agreements in which Issuer is Subservicer View HUD II agreements in which Issuer is Subservicer Search HUD II agreements in which Issuer is Subservicer Submit HUD II agreements in which Issuer is Subservicer Token holders authenticate if they have forgotten or lost their token User Registration for Issuer ONLY Page 14 of 24
15 USER RULES OF BEHAVIOR As a user of the GMEP, I understand that I am personally responsible for my use and any misuse of my user account and password. I understand that by accessing a U.S. Government information system that I must comply with the following requirements: (1) Users must safeguard the information to which you have access at all times. (2) The system may be used only in support of Ginnie Mae business. (3) The system may not be used for any purpose other than those functions related to Ginnie Mae's business. (4) The government reserves the right to monitor the activities of any user and/or any machine connected to GMEP. (5) The GMEP and the information contained within are the property of the federal government. Ginnie Mae owns the data stored on these systems, including all messages and information, even those deemed personal. (6) No data may be transmitted on the system that is more sensitive than the level for which that system has been approved. (7) Information that was obtained via GMEP may not be divulged outside of government channels without the express, written permission of the system owner. (8) Any activity that would discredit Ginnie Mae, including, but not limited to, seeking, transmitting, collecting, or storing defamatory, discriminatory, sexually explicit, obscene, harassing, or intimidating messages or material, is prohibited. (9) Any activity that violates Federal laws for information protection (e.g., reconnaissance techniques, hacking, phishing, spamming, etc.), is expressly prohibited. Violations will be turned over to the appropriate Federal law enforcement organization for prosecution. (10) GMEP user accounts are provided solely for the use of the individual for whom they were created. Passwords or any other authentication mechanism should never be shared or stored any place easily accessible. If a password is stored it may not be stored in a clear-text or readable format. Sharing of user accounts is grounds for terminating system access. (11) Per Ginnie Mae Policy, GMEP has the following password format requirements: Passwords must be at least eight (8) alphanumeric characters in length, and contain the following five (5) character types: Maximum twenty (20) characters in length; Must have at least one (1) English upper case letter (A, B, C, etc.); Must have at least one (1 English lower case letter (a, b, c, etc.); Must have at least one (1) Arabic number (0, 1, 2, 3, etc.); Must have at least one (1) special character from the following set: (12) Passwords should not be created using the following: Dictionary words or common names, such as Betty, Fred, Rover; Portions of associated account names, for example, user ID, login name; Consecutive character strings, such as abcdef, ; Simple keyboard patterns, such as asdfgh, qwerty; Generic passwords, such as a password consisting of a variation of the word password (e.g., P@ssword1). (13) Passwords must be changed every ninety (90) days and should never be repeated. User Registration for Issuer ONLY Page 15 of 24
16 (14) Password history will prevent users from using the same password from the previous (24) password changes. (15) After three (3) invalid password attempts, the user account will be locked. The user must contact the appropriate Help Desk or Security Officer in person for identification verification and to unlock the account. (16) The user s Supervisor and Security Officer must authorize and approve the employee's level of access in writing via documented account management procedures. (17) The unauthorized acquisition, use, reproduction, transmission, or distribution of any controlled information including computer software and data, that includes privacy information, copyrighted, trademarked or material with other intellectual property rights (beyond fair use), pre-public release information such as economic indicators, proprietary data, or export controlled software or data is prohibited. All use of copyrighted software must comply with copyright laws and license agreements. (18) Remote off-site (e.g., dial-in, VPN) access to GMEP Administrative Functions must be approved and authorized in writing by the appropriate management authority and the Ginnie Mae Information System Security Officer. (19) Authorized users do not have a right, nor should they have an expectation, of privacy while using any Government office equipment at any time. (20) At no time should personally owned equipment be connected to the system. (21) Any security problems or password compromises must be reported immediately to the appropriate Help Desk or Security Officer. (22) I understand that Federal law provides for punishment under Title 18, U.S. Code, including a fine and up to ten (10) years in jail for the first offense for anyone who commits any of the following violations: Knowingly accesses an information system without authorization, or exceeds authorized access, and obtains information that requires protection against unauthorized disclosure. Intentionally, without authorization, accesses a government information system and impacts the government s operation, including availability of that system. Intentionally accesses a government information system without authorization, and alters, damages, or destroys information therein. Prevents authorized use of the system or accesses a government information system without authorization, or exceeds authorized access, and obtains anything of value. (23) Screen-savers must be password protected. (24) Movable media, (such as diskettes, CD-ROMs, and Zip disks), that contain sensitive and/or official information must be secured when not in use. (25) When the user no longer has a legitimate need to access the system, the user must notify his/her Supervisor. The Supervisor must notify the Security Officer immediately in writing so that access can be terminated. The Security Officer will notify the Ginnie Mae Security Administrator. (26) Upon initial login I will be required to select and answer three (3) Security questions for future use to change or reset my password. (27) If your Security Officer issues a one-time password token (e.g. RSA Token) or other secondary authentication device, you accept the responsibilities and obligations presented on the forms and documents provided when the device is issued. This includes but is not limited to initiation, usage, storage, return, and reporting procedures for the authentication device. Actions violating any of these rules will result in immediate termination of your assigned identifier/password from the system. User Registration for Issuer ONLY Page 16 of 24
17 USER CERTIFICATION: I have read the above statement of policy regarding system security awareness and practices when accessing GMEP s information resources. I understand the policies as set forth above, and I agree to comply with these requirements as a condition of being granted limited access to the Ginnie Mae s computer resources. User Signature Date SUPERVISOR CERTIFICATION: I certify that I have been designated as an authorized Supervisor to approve user registration forms by my organization and will abide by all of the policies and rules as set forth by Ginnie Mae. I will make sure that I only assign active employees as users and to the best of my knowledge there will be no sharing of IDs. I will verify the identity of the user by the approved listing of identification. I understand that all accounts will be accessing government information systems. I recognize that a violation of this certification could result in disciplinary action against my organization. Verify User Phone number CERTIFIED BY: Supervisor Name Supervisor Signature Verify User address Supervisor Phone Number Date User Registration for Issuer ONLY Page 17 of 24
18 FOR SECURITY OFFICER USE ONLY SECURITY OFFICER CERTIFICATION: Authorized Supervisor Called-Back Verified User and Permissions 1 st Security Officer Name Officer Phone Number 1 st Security Officer Signature Date User Registration Approved User Added to the Portal 2 nd Security Officer Name Officer Phone Number 2 nd Security Officer Signature Date User Registration for Issuer ONLY Page 18 of 24
19 Ginnie Mae Enterprise Portal (GMEP) User Registration for Custodian ONLY Instructions (1) Complete the information in the boxes below please print. (2) Select the requested roles(s). (3) Read the User Rules of Behavior. (4) Sign and date this registration request. (5) Have your supervisor sign this registration request. (6) Submit this request to your Security Officer for processing. Organization Name: User Last Name: First Name: Middle Name: Name Suffix: Prefix: (Mr., Ms., Mrs.) Office Phone No.: Office Fax No.: Select Roles (Select All That Apply): MAMS Document Custodian User Access to retain the physical document of the Master Agreement. PTS Document Custodian Report Access Access to view reports. RSA Token Holder Provide means for users to test their token access. enotification User e-notification (en) RSA Temporary Bypass Provide means for token holder to authenticate if they have forgotten or lost their token. Page 19 of 24
20 USER RULES OF BEHAVIOR As a user of the GMEP, I understand that I am personally responsible for all use and any misuse of my user account and password. I understand that by accessing a U.S. Government information system, I must comply with the following requirements: (1) Users must safeguard the information to which you have access at all times. (2) The system may be used only in support of Ginnie Mae business. (3) The system may not be used for any purpose other than those functions related to Ginnie Mae's business. (4) The government reserves the right to monitor the activities of any user and/or any machine connected to GMEP. (5) The GMEP and the information contained within are the property of the federal government. Ginnie Mae owns the data stored on these systems, including all messages and information, even those deemed personal. (6) No data may be transmitted on the system that is more sensitive than the level for which that system has been approved. (7) Information that was obtained via GMEP may not be divulged outside of government channels without the express, written permission of the system owner. (8) Any activity that would discredit Ginnie Mae, including, but not limited to, seeking, transmitting, collecting, or storing defamatory, discriminatory, sexually explicit, obscene, harassing, or intimidating messages or material, is prohibited. (9) Any activity that violates Federal laws for information protection (e.g., reconnaissance techniques, hacking, phishing, spamming, etc.), is expressly prohibited. Violations will be turned over to the appropriate Federal law enforcement organization for prosecution. (10) GMEP user accounts are provided solely for the use of the individual for whom they were created. Passwords or any other authentication mechanism should never be shared or stored any place easily accessible. If a password is stored it may not be stored in a clear-text or readable format. Sharing of user accounts is grounds for terminating system access. (11) Per Ginnie Mae Policy, GMEP has the following password format requirements: Passwords must be at least eight (8) alphanumeric characters in length, and contain the following five (5) character types: Maximum twenty (20) characters in length; Must have at least one (1) English upper case letter (A, B, C, etc.); Must have at least one (1) English lower case letter (a, b, c, etc.); Must have at least one (1) Arabic number (0, 1, 2, 3, etc.); Must have at least one (1) special character from the following set: (12) Passwords should not be created using the following: Dictionary words or common names, such as Betty, Fred, Rover; Portions of associated account names, for example, user ID, login name; Consecutive character strings, such as abcdef, ; Page 20 of 24
21 Simple keyboard patterns, such as asdfgh, qwerty; Generic passwords, such as a password consisting of a variation of the word password (e.g., P@ssword1). (13) Passwords must be changed every ninety (90) days and should never be repeated. (14) Password history will prevent users from using the same password from the previous (24) password changes. (15) After three (3) invalid password attempts, the user account will be locked. The user must contact the appropriate Help Desk or Security Officer in person for identification verification and to unlock the account. (16) The user s Supervisor and Security Officer must authorize and approve the employee's level of access in writing via documented account management procedures. (17) The unauthorized acquisition, use, reproduction, transmission, or distribution of any controlled information including computer software and data, that includes privacy information, copyrighted, trademarked or material with other intellectual property rights (beyond fair use), pre-public release information such as economic indicators, proprietary data, or export controlled software or data is prohibited. All use of copyrighted software must comply with copyright laws and license agreements. (18) Remote off-site, (e.g., dial-in, VPN) access to GMEP Administrative Functions must be approved and authorized in writing by the appropriate management authority and the Ginnie Mae Information System Security Officer. (19) Authorized users do not have a right, nor should they have an expectation, of privacy while using any Government office equipment at any time. (20) At no time should personally owned equipment be connected to the system. (21) Any security problems or password compromises must be reported immediately to the appropriate Help Desk or Security Officer. (22) I understand that Federal law provides for punishment under Title 18, U.S. Code, including a fine and up to ten (10) years in jail for the first offense for anyone who commits any of the following violations: Knowingly accesses an information system without authorization, or exceeds authorized access, and obtains information that requires protection against unauthorized disclosure. Intentionally, without authorization, accesses a government information system and impacts the government s operation, including availability of that system. Intentionally accesses a government information system without authorization, and alters, damages, or destroys information therein. Prevents authorized use of the system or accesses a government information system without authorization, or exceeds authorized access, and obtains anything of value. (23) Screen-savers must be password protected. (24) Movable media, (such as diskettes, CD-ROMs, and Zip disks), that contain sensitive and/or official information must be secured when not in use. (25) When the user no longer has a legitimate need to access the system, the user must notify his/her Supervisor. The Supervisor must notify the Security Officer immediately in writing so that access can be terminated. The Security Officer will notify the Ginnie Mae Security Administrator. Page 21 of 24
22 (26) Upon initial login I will be required to select and answer three (3) Security questions for future use to change or reset my password. (27) If your Security Officer issues a one-time password token (e.g. RSA Token) or other secondary authentication device, you accept the responsibilities and obligations presented on the forms and documents provided when the device is issued. This includes but is not limited to initiation, usage, storage, return, and reporting procedures for the authentication device. Actions violating any of these rules will result in immediate termination of your assigned identifier/password from the system. Page 22 of 24
23 USER CERTIFICATION: I have read the above statement of policy regarding system security awareness and practices when accessing GMEP s information resources. I understand the policies as set forth above, and I agree to comply with these requirements as a condition of being granted limited access to the Ginnie Mae s computer resources. User Signature Date SUPERVISOR CERTIFICATION: I certify that I have been designated as an authorized Supervisor to approve user registration forms by my organization and will abide by all of the policies and rules as set forth by Ginnie Mae. I will make sure that I only assign active employees as users and to the best of my knowledge there will be no sharing of IDs. I will verify the identity of the user by the approved listing of identification. I understand that all accounts will be accessing government information systems. I recognize that a violation of this certification could result in disciplinary action against my organization. Verify User Phone number CERTIFIED BY: Supervisor Name Supervisor Signature Verify User address Supervisor Phone Number Date Page 23 of 24
24 FOR SECURITY OFFICER USE ONLY SECURITY OFFICER CERTIFICATION: Authorized Supervisor Called-Back Verified User and Permissions 1 st Security Officer Name Officer Phone Number 1 st Security Officer Signature Date User Registration Approved User Added to the Portal 2 nd Security Officer Name Officer Phone Number 2 nd Security Officer Signature Date Page 24 of 24
Ginnie Mae Enterprise Portal (GMEP) User Registration for Custodian ONLY
Ginnie Mae Enterprise Portal (GMEP) User Registration for Custodian ONLY Instructions (1) Complete the information in the boxes below please print. (2) Select the requested roles(s). (3) Read the User
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
Appendix H: End User Rules of Behavior
Appendix H: End User Rules of Behavior 1. Introduction The Office of Management and Budget (OMB) has established the requirement for formally documented Rules of Behavior as set forth in OMB Circular A-130.
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Covered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
CHAPTER 7: APPLICATION FOR APPROVAL AS A GINNIE MAE ISSUER
7-1: OVERVIEW OF CHAPTER 7-2: APPLICATION PROCEDURE (A) Application Connection (B) Ginnie Mae Online University This chapter describes the application procedures for requesting approval as a Ginnie Mae
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Sample Policies for Internet Use, Email and Computer Screensavers
Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies
Acceptable Use Policy
Acceptable Use Policy Acceptable Use Policy (AUP) ionfish Group, LLC s network and services have been designed to serve its clients, partners, and employees (each individually a User ), and to enhance
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website
Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating
FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION
FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION DATE: June 10, 2015 REGULATION CHAPTER NO.: Chapter 5 REGULATION CHAPTER TITLE: Miscellaneous REGULATION TITLE AND NUMBER:
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
How To Protect The Time System From Being Hacked
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
Administrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
Online (Internet) Banking Agreement and Disclosure
Online (Internet) Banking Agreement and Disclosure This Online (Internet) Banking Agreement and Disclosure ( the Agreement") explains the terms and conditions governing the basic Online Banking services
Denver Public Schools - East High School
Denver Public Schools - East High School Return this page to the Technology Department in room 230 Electronic Web Access Agreement for Viewing Student Information via DPS Infinite Campus Parent/Student
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Information Technology Acceptable Use Policies and Procedures
Information Technology Acceptable Use Policies and Procedures The following Information Technology Acceptable Use Policies and Procedures are to be followed by ALL employees, contractors, vendors, and
ICT USER ACCOUNT MANAGEMENT POLICY
ICT USER ACCOUNT MANAGEMENT POLICY Version Control Version Date Author(s) Details 1.1 23/03/2015 Yaw New Policy ICT User Account Management Policy 2 Contents 1. Preamble... 4 2. Terms and definitions...
GlaxoSmithKline Single Sign On Portal for ClearView and Campaign Tracker - Terms of Use
GlaxoSmithKline Single Sign On Portal for ClearView and Campaign Tracker - Terms of Use IMPORTANT! YOUR REGISTRATION AND USE OF THIS GlaxoSmithKline Single Sign On Portal for ClearView and Campaign Tracker
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes
WCCM XII & APCOM VI Secretariat is in Seoul. Your use of http://wccm2016.org will always be
Terms & Conditions Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
RSA SecurID Software Token Security Best Practices Guide
RSA SecurID Software Token Security Best Practices Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA, the RSA
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
Acceptable Use Policy
Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture
Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-
Musina Local Municipality Information and Communication Technology User Account Management Policy -Draft- Version Control Version Date Author(s) Details V1.0 June2013 Perry Eccleston Draft Policy Page
All Users of DCRI Computing Equipment and Network Resources
July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
Acceptable Use Policy
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
Franciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
Help for ADP s Mobile App
Help for ADP s Mobile App Contents Main Screen... 2 Settings... 3 Preferences... 4 Change PIN... 5 International... 6 Privacy... 7 Terms of Use... 10 Requirements... 13 Help (Main Screen)... 14 Springboard...
Terms of Service. These Terms of Service form a legally binding contract between the Users and the Society.
Terms of Service Article 1: Introduction These Terms of Service (the Terms) govern the relationship between the society Many Players (the Society) whose registered office is at 88 Ter, avenue du Général
General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information
General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information The following rules of behavior apply to all Department of Homeland Security
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
COMPUTER NETWORK FOR EDUCATION
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
PREPLY PRIVACY POLICY
PREPLY PRIVACY POLICY Effective Date: November 21, 2012. Welcome to Preply! This Privacy Policy discloses FindGuru, Inc. s ( Preply, we, us or our ) privacy practices and procedures in connection with
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
TERMS OF SERVICE TELEPORT REQUEST RECEIVERS
TERMS OF SERVICE These terms of service and the documents referred to in them ( Terms ) govern your access to and use of our services, including our website teleportapp.co ( our site ), applications, buttons,
On Line Banking Agreement and Application for Commercial Accounts
On Line Banking Agreement and Application for Commercial Accounts You must be an existing Business Account holder of the Belt Valley Bank, hereinafter referred to as Bank, in order to apply for the On
Acceptable Use Policy
Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
Marion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
TERMS AND CONDITIONS GOVERNING THE USE OF NBADS ONLINE TRADING
TERMS AND CONDITIONS GOVERNING THE USE OF NBADS ONLINE TRADING In this document, the following words and phrases shall have the meanings set out below unless indicated otherwise. You should read every
COMPUTER, INTERNET, & EMAIL USE POLICY
COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter
Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up.
TERMS OF SERVICE: Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up. The following Terms and Conditions are applicable to all individual users / corporate clients who use, sign-up and pay-for
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
