Key Management Policy
|
|
|
- Julian Cunningham
- 9 years ago
- Views:
Transcription
1 THE LAMBTON COLLEGE OF APPLIED ARTS AND TECHNOLOGY Issued Date: Supersedes Date: Policy #: January 04, 2006 October 02, Key Management Policy Policy It is the policy of the Lambton College to maintain a unified access program throughout all College sites, ensuring the highest security standards in the protection of site facilities and create a safe working environment by restricting access through the issuance and control of keys and cards related to the operation of Lambton College facilities. Scope To provide a high security keying and electronic access program encompassing the maintenance of all locks, issuance of security keys and key cards, tracking, auditing and retrieval of system keys and cards ensuring the integrity of the keying and electronic access management program. Management Structure Reference management chart (PDF) - appendix. College Program Coordinator The college Program coordinator is appointed to oversee the security keying program through all the Lambton College facilities. The coordinator is empowered to maintain the unified standards, policy and operation procedures remain consistent and of the highest standards.the coordinator will act as an ex-official member of all the management committees and receive all reports and documentation required to ensure that a unified effective keying program is being maintained throughout Lambton College. Access Management Committee The access management committee shall consist of three individuals representing management, security and physical plant with the College program coordinator and access control manager acting as ex official members of the committee representing all facilities and interrelated smaller facilities. This committee shall be empowered to issue or deny access to keys and cards and mandated to enforce the policies and process established a teach site. This committee, in conjunction with the program coordinator will have the power to change the access policy from time to time as the operational state of the facility changes. Members of the management committee may assign a temporary replacement during their absence Access Control Manager An individual with knowledge of the keying management and electronic access system will be selected and empowered to manage the day to day processes of issuing, tracking, auditing and retrieving keys and cards.the key control manager will oversee all record keeping and storage of non issued keys and cards including the report auditing of all departments. Reporting Structure
2 The access control manager is empowered to operate the day to day keying and access control program through the access management committee. The daily access system operation and management is based on the established access system policy and processes. The access control manager is required, utilizing the key management software and electronic access software, to forward status report confirming operational integrity to both the management committee and College system controller. Reports: 1. Key issuance 2. Lost/stolen key or card status 3. Request for key changes 4. Key design changes Key and Card Holder Accountability 1. All systems keys and cards are the property of Lambton College. The proper use and care of the keys and cards is the responsibility of the individual to whom the keys are issued. 2. System keys and cards are not to be loaned. 3. System keys and cards are not to be transferred. 4. System keys and cards are to be rendered on request and returned to the access control center if retirement, transfer, termination or separation from or within the College occurs. 5. Adherence to the access control is required. Issuance of Keys Keys will be issued to employees and students of the Lambton College and approved individuals. This policy and the access management committee will govern issuance of keys based on the level in the hierarchy design. LEVEL I ZONE LEVEL II BUILDING LEVEL III FLOOR LEVEL IV DEPARTMENT LEVEL V CHANGE Level I II These levels will be issued to a key tracking system. The keys in these levels are to be used on the College premises only and are not to leave the premises at any time. Only authorized individuals approved by the management committee will be allowed access to these keys by the issuance of a tracking auditing system. These keys must be returned daily to the tracking system based on the individual's job and time requirements. The access control manager has the authority to demand that keys be returned at any time if the assigned individual fails to return the key at the designated time or removes the key from the Lambton College facility. Level III The access control manager is assigned the authority to issue or deny Level III keys. These keys may be issued to the control center key trackers. The removal of these keys from the operating facility is not allowed. Any individuals not returning keys at the designated return time will be called and required to return keys to the facility. Issuance of Level IV & Level V The access control manager is assigned the authority to issue or deny Level IV & V keys. These keys will be assigned to individuals with the approved authority of area managers established and assigned to the key management software. Hierarchy
3 An approved keying hierarchy design reflecting the integration of the key master keying criteria for the College is the only keying structure to be followed in the maintenance, servicing and additions to the keying program. No cross keying or maizon keying to be allowed unless approved by the access manager committee.any keying outside the hierarchy criteria must be by the site management committee with clear justification and forward to the College program coordinator. Key Request All keys must be requested and supplied through the access controller and authorized in accordance with the policy and processes established by the Lambton College.Request for keys is to be on a Lambton College key request form. Authorization Level I & II The authorization for issuance of Level I & II keys to be approved by & II the access management committee with two signatures required. Level III The authorization for issuance of Level II keys to be approved by the access control manager with request from approve signatures of the department manager or supervisor of the operations department requesting the use of the keys. Level IV & V Level IV to V authorization for issuance of keys to be approved by & V the department manager of supervisor of the individual for which the key is being requested. The department manager or supervisor is required to complete a key request form and submit it to the access control manager. Electronic Card Issuance The access cards are defined in three levels: 1. Level I Security: access, this level controls building and high level entry doors in real time control with alarm response. 2. Level II Controlled: these doors are controlled by security with direct linkage and accountability by other groups. 3. Level III Departments: access, this level is directed to the departmental level and is managed by the individual or group as an independent location. Card Issuance Card issuance may be as direct distribution or utilization of an individual's present student or staff card. The security control and maintenance is by software or on site programming. Request re applications for access is through a security request form with proper authorization for approved location access. The control of all access is through the access control manager or their designate. Auditing The control and management of the electronic access is maintained by the access control manager or designate. Auditing of the software to ensure integrity will create managed entry points. Individuals in violation of the security protocols at any entry point will be subject to an operational review by security or direct supervisor and have denied access status until such time as violations are corrected. Electronic Card Returns The integrity of the electronic access is not dependant on the cards being returned, it is the policy of Lambton College to request that all access and I.D. be returned to the access manager upon retiring, transfer, separation or termination from the employment or attendance at Lambton College. Key Storage It is the responsibility of the key control manager that all spare keys to be secured in a key cabinet and ensure that all software data is properly maintained and updated as required for all system keys accountability. Key Auditing/Operational Processes
4 Attached to the policy are the operational key control requirements. Addendum: Operational Key Control F16. It is the responsibility of the access control manager to review the process outline and establish an operational plan to ensure all aspects of the issuance, tracking,auditing and retrieval are followed as established in the process outline approved by the corporate program coordinator. Change to Access Policy The access management committee in conjunction with the College system coordinator has the authority to make changes to the management policy as required to maintain a policy compliant with the operational requirements, staff and students, at Lambton College. Key Returns Security keys issued to individuals for the purpose of access to Lambton College remain the property of Lambton College and must be returned to the access control manager or their designate upon retiring, transfer, separation or termination from the employment or attendance of Lambton College. Individuals not returning their approved keys will be held responsible for a two or five hundred dollar penalty depending upon status or key level. Keys assigned with deposits, if not returned, will have the deposits held. Key Issuance Internal With the approved authorized signature, the access manager is required prior to issuance of security system keys to update the computer information and develop a signature acknowledgment form for which the key holder must sign. A key card I.D. will be issued to each key holder. The I.D. is to be registered with the appropriate departments ensuring retrieval of all keys prior to discharge or transfer. Key Issuance External The issuance of keys to external contracts is to be approved by the access control manager or authorized designate. The external contract will sign an acknowledgement of the key assignment and accept the cost of replacing keys if lost or stolen. (Form to be developed by corporate program manager). Lost/Stolen Keys & Cards Any individual in receipt of a security access key or card issued by Lambton College is responsible to notify immediately any key which is lost or stolen. Lost or stolen key reports must be reported immediately and not exceed a 12 hour period. The response as to the action required to ensure security is maintained is the access control manager and access management committee's responsibility. Departments or individuals may be held responsible for the cost of re-keying the College premises due to lost or stolen keys. Key System Changes Any keying changes to the master key system or renovations to the facility which will require new locking hardware will be processed through the access control manager. No individual may change any keys or locks at the facility without the consent of the key control manager. Any changes must follow the hierarchy design or be approved by the management committee. Maintenance The access control manager is empowered to maintain and service the keying and electronic access systems. All additions must use qualified key codes as designed in the original system or system approved by the access control manager. Key Management Software
5 The software is to reside on the computer in a location accessible by the access control manager. The software is the central management for control and issuance of any keys. An individual will be required to operate as the software manager. This individual or site designate will process all key requests and distribute keys in accordance with the management policy. Also required by the software manager is to process requests from Human Resources or department responsible for all individuals leaving the College facility and have a timely report of all individuals to allow the retrieval of keys before departure and process the reregistration of those keys in the software. Key Identification Lambton College requires that all systems keys be identified with a site code,location code and individual tracking codes. Multiple keys are to be attached to a serialized security ring or security identifying seal prior to issuance and this coding to be used for individual accountability. Key Card Tracking Every individual receiving a security system key will be issued a key card with the care and maintenance clearly explained. The individual serial code will be used to ensure key retrieval within the organization. Information System A document key record form must be used when: - Requesting keys # Reporting lost/stolen keys # System servicing # All rules and processes defined on the forms must be closely followed. Key Production Security and registered key production is restricted to the access control manager or their designate and production is restricted to Lambton College unless approved by the access management committee. Control of Codes All system codes must be maintained by the access control manager and use of the codes by the hardware manufacturer must be in conjunction to the restrictions and security needs of Lambton College. New Construction/Additions All system cylinders or electronic access used at Lambton College facilities must be supplied through the approval of the access control manager or the management committee in conjunction with the architectural criteria required in the new construction. Appendix Management Control and Accountability
FACILITIES MANAGEMENT DEPARTMENT
FACILITIES MANAGEMENT DEPARTMENT Policy Title: Key Control and Card Access Policy Policy Number D-12 Section: Safety and Security Effective Date: April 12, 2007 Last Review: April 12, 2007 Purpose: The
Security, Access Management and Key Control Policy and Procedures
1 Policy Security, Access Management and Key Control Policy 1.1.1 The goal of the Vice President, Business Affairs and Facilities and Services is to provide a safe, comfortable, secure learning environment
Purchasing Card Program
Purchasing Card Program User Guidelines University of North Alabama Procurement Department Created: March 2008 / Updated 7/16/2015 University of North Alabama Purchasing Card Program 1 Table of Contents
KEY / CARD ACCESS CONTROL POLICY FOR FACULTY, STAFF AND STUDENTS
Facilities Management Revised 4/12/2010 KEY / CARD ACCESS CONTROL POLICY FOR FACULTY, STAFF AND STUDENTS I. Purpose II. Scope The purpose of the Key/ Card Access Control Policy is to provide reasonable
Access Control Regulations
Access Control Regulations 6 August 2008 1 TABLE OF CONTENTS I. Regulations... 3 II. Introduction... 3 III. Definitions... 3 IV. Single Access Control Alarm Coordinator (SACC)... 4 V. Access to Closed
KEY AND LOCK POLICY Physical Plant Division April 2003
Physical Plant Division April 2003 Revised June 2003 Revised March 2004 Revised August 2004 APRIL 2003 (Revision: February 2004) Table of Contents Page A. Objective 1 B. General 1 C. Responsibilities 1
2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04
2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04 A. Keys 1) Sul Ross State University maintains a centralized key and lock system to enhance the control and security of property
UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Access Control REFERENCE:
UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Access Control REFERENCE: CATEGORY: Real Estate and Facilities PAGE: 1 of 6 SUPERSEDES: APPROVER: Larry Marbert Vice President, Real Estate and Facilities
TENANT ACCESS COORDINATOR HANDBOOK
TENANT ACCESS COORDINATOR HANDBOOK CHILDRESS KLEIN PROPERTIES July 22, 2009 CHILDRESS KLEIN PROPERTIES CARD ACCESS PROCEDURES TABLE OF CONTENTS I. Card Access System 1 A. Card Readers 1 B. Access Cards
U.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010)
U.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010) Definition of CBP Security Area (19 CFR 122.181) The term CBP security area means the Federal Inspection
INSURANCE AGENCY AGREEMENT
INSURANCE AGENCY AGREEMENT BritAmerica Management Group, Inc., hereinafter referred to as the Company, hereby appoints: Agent Agency Address City State Zip Tax ID hereinafter referred to as the Agent.
GlobalSign Subscriber Agreement for DocumentSign Digital ID for Adobe Certified Document Services (CDS)
GlobalSign Subscriber Agreement for DocumentSign Digital ID for Adobe Certified Document Services (CDS) Version 1.1 PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE DIGITAL CERTIFICATE ISSUED TO YOU
How To Manage Keys At Trent University
POLICY ACCESS CONTROL Category: Approval: Responsibility: Date: Operations & Governance PVP Vice President Administration Date initially approved: September 1, 2005 Date of last revision: April 2012 Definitions:
Recommendations for Improving Purchasing Card Procedures
Recommendations for Improving Purchasing Card Procedures I. Cardholder Issues: 1. Receipts are not provided for all card charges. A. Current Policy Statement: The Cardholder must: Obtain all sales slips,
Data Center Access Policies and Procedures
Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 1 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data
CORPORATE PURCHASE PUR
Trent University Subject: Number: POLICIES and PROCEDURES CORPORATE PURCHASE PUR 075 CARD Effective Date: Issued by: Contact: October 1999 Financial Services Purchasing Services Ext. 7216 Supersedes: NEW
Military Considerations
Military Considerations (A) (B) (C) A veteran means any person who has completed service in the armed forces, including the national guard of any state, or a reserve component of the armed forces, who
MANUAL OF PROCEDURE. Miami Dade College Purchasing Card Program. VI-2 Bidding for Commodities and Services VI-3A Minority Business Enterprises
MANUAL OF PROCEDURE PROCEDURE NUMBER: 6520 PAGE 1 of 12 PROCEDURE TITLE: Miami Dade College Purchasing Card Program STATUTORY REFERENCE: FLORIDA STATUTES 1001.65(1) AND 1010.04(2) BASED ON POLICY: VI-2
LONG TERM RENTAL REGISTRATION APPLICATION All sections are required to be completed. Please print, type, or apply through portal.
City of Destin Community Development Department Code Enforcement Division City of Destin Annex 4100 Indian Bayou Trail Destin, Florida 32541 Phone (850) 654-1119 Fax (850) 460-2171 Email to: [email protected]
DataCentre Access Policies & Procedures
DataCentre Access Policies & Procedures Contents Purpose... 3 Overview... 3 DataCentre Access... 3 DataCentre Access Levels... 4 Periodic Review & Termination of Access... 5 DataCentre Access Log... 5
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO Contents Page Number 1. Introduction Page 2 2. Defining the Responsible Persons Page 2 3. Purpose and Principles
Arrangement of Clauses
REGULATION NO: NERC-R-0108 NIGERIAN ELECTRICITY REGULATORY COMMISSION In exercise of the Powers to make Regulations conferred by Section 96(1) of the Electric Power Sector Reform Act 2005 (Act No.6 of
GNB RSA Token Standards and Procedures
Client Authentication Standards GNB RSA Token Standards and Procedures Concept The client authentication standard provides a formalized, secure and efficient methodology for proper identification of the
MUNICIPALITY of COLCHESTER PURCHASING CARD POLICY. January 2006
MUNICIPALITY of COLCHESTER PURCHASING CARD POLICY January 2006 Purpose: Purchasing card programs are designed to provide an efficient and lowcost method of purchasing and paying for small dollar and high
8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES. Policy Statement COLLEGE OF CHARLESTON POLICY ON
OFFICIAL POLICY 8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES 03/21/11 Policy Statement COLLEGE OF CHARLESTON POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES 1.0 PURPOSE OF POLICY The purpose
University of Nevada, Reno. UNR Building Access Cards and Key Control Procedures 1
University of Nevada, Reno Building Access Cards and Key Control Procedures PURPOSE The purpose of this document is to specify procedures for obtaining access to facilities using card keys and hard keys,
Annex 4 Operational Certification Procedures. Rule 1 Definitions
Annex 4 Operational Certification Procedures Rule 1 Definitions For the purposes of this Annex, the term: (a) competent governmental authority means the authority that, according to the laws and regulations
REGULATION ON FINANCIAL HOLDING COMPANIES (Published in Official Gazette dated November 1, 2006 Nr. 26333)
By the Banking Regulation and Supervision Agency: REGULATION ON FINANCIAL HOLDING COMPANIES (Published in Official Gazette dated November 1, 2006 Nr. 26333) PART ONE Objective and Scope, Basis and Definitions
(TRANSLATION) CHARTER OF THE BOARD OF DIRECTORS SONY CORPORATION
(TRANSLATION) CHARTER OF THE BOARD OF DIRECTORS SONY CORPORATION (TRANSLATION) CHARTER OF THE BOARD OF DIRECTORS OF SONY CORPORATION Article 1. Purpose of Charter The purpose of this Charter of the Board
Financial Instructions
Financial Instructions Contents 1. Definitions & Abbreviations 2. Constitutional Provisions 3. Ministerial Financial Instructions - Background 4. Ministerial Financial Instructions M4 1 Observation of
Encryption Security Standard
Virginia Commonwealth University Information Security Standard Title: Encryption Security Standard Scope: Approval February 22, 2012 This document provides the encryption requirements for all data generated,
Overview A. What is the Visa Purchasing card?
Overview A. What is the Visa Purchasing card? The Purchasing Card is a Visa Card used by The University of Winnipeg employees to purchase materials and services up to $999.99 per item (excluding sales
KEY, SWIPE CARD AND ELECTRONIC FOB POLICY
KEY, SWIPE CARD AND ELECTRONIC FOB POLICY DOCUMENT CONTROL Version: 3 Ratified by: Risk Management Group Date Ratified: 30 th April 2014 Name of originator / author: Head of Health, Safety & Security Name
Schoeller Allibert Limited Job Description. Reports to: Operations Director Date of Completion. 04/05/16
Schoeller Allibert Limited Job Description Job Title. Process Manager Location: Winsford Name Department. Operations Reports to: Operations Director Date of Completion. 04/05/16 Job Purpose. To manage
Definitions: The Certification of Exemption memorandum must be signed by the principal investigator s dean or department chair.
University of Pittsburgh Guidelines for the Ordering and Use of Prescription Drugs and Devices and Controlled Substances for Non- Clinical Laboratory Research Definitions: 1. Authorized Agent(s) of the
Samford University Purchasing Card (PCARD) Program Policy and Procedures May 1, 2016
Samford University Purchasing Card (PCARD) Program Policy and Procedures May 1, 2016 1 Table of Contents I. Overview A. Introduction..3 B. Definitions.... 3 II. Card Issuance A. Cardholder Eligibility...4
DOOR ACCESS CONTROL SYSTEM POLICY
DOOR ACCESS CONTROL SYSTEM POLICY 1 PURPOSE 1.1 Electronic door access control systems are widely used in the National University of Singapore (NUS) to control access to buildings, offices and facilities.
Appendix 1 Payment Card Industry Data Security Standards Program
Appendix 1 Payment Card Industry Data Security Standards Program PCI security standards are technical and operational requirements set by the Payment Card Industry Security Standards Council to protect
Xx Primary School. Finance Policy
Xx Primary School Finance Policy 1. AIMS 1.1 This document has been adopted by the Governing Body, as the basis for the administration and management of finances. The aim of the policy is to create a framework
POLICY TITLE: IDENTITY THEFT PROTECTION POLICY
POLICY TITLE: IDENTITY THEFT PROTECTION POLICY I. Purpose The purpose of this policy is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection
Ch. 435a KEY, GAMING & NONGAMING EMPLOYEES 58 435a.1. CHAPTER 435a. KEY, GAMING AND NONGAMING EMPLOYEES; BOARD-ISSUED CREDENTIALS
Ch. 435a KEY, GAMING & NONGAMING EMPLOYEES 58 435a.1 CHAPTER 435a. KEY, GAMING AND NONGAMING EMPLOYEES; BOARD-ISSUED CREDENTIALS Sec. 435a.1. 435a.2. 435a.3. 435a.4. 435a.5. 435a.6. 435a.7. 435a.8. 435a.9.
CITY UNIVERSITY OF NEW YORK EMPLOYEE ACCESS TO THE STUDENT INFORMATION MANAGEMENT SYSTEM AT SELECTED CAMPUSES. Report 2007-S-23
Thomas P. DiNapoli COMPTROLLER OFFICE OF THE NEW YORK STATE COMPTROLLER DIVISION OF STATE GOVERNMENT ACCOUNTABILITY Audit Objective... 2 Audit Results - Summary... 2 Background... 3 Audit Findings and
GRINNELL COLLEGE CREDIT CARD PROCESSING AND SECURITY POLICY
GRINNELL COLLEGE CREDIT CARD PROCESSING AND SECURITY POLICY PURPOSE The Payment Card Industry Data Security Standard was established by the credit card industry in response to an increase in identify theft
Pursuant to Article 95, item 3 of the Constitution of Montenegro I hereby pass the ENACTMENT PROCLAIMING THE LAW ON BANKS
Pursuant to Article 95, item 3 of the Constitution of Montenegro I hereby pass the ENACTMENT PROCLAIMING THE LAW ON BANKS I hereby proclaim the Law on Banks, adopted by the Parliament of Montenegro at
Berea College Purchasing Card Policy. Adopted November 1, 2003
Berea College Purchasing Card Policy Adopted November 1, 2003 Revised March 1, 2016 Introduction This program has been established to provide a more efficient method for purchasing small dollar items (under
1. The records have been created, sent or received in connection with the compilation.
Record Retention & Destruction Policy Bradley Kirschner PC recognizes that the firm s engagement and administrative files are critical assets. As such, the firm has established this formal written policy
INTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS
Cabinet Member or Representative responsible for completing this form: INSTRUCTIONS FOR COMPLETING THIS FORM: Answer each question by placing an X in the either the Yes, No,, or Applicable () column. Provide
YORK CATHOLIC DISTRICT SCHOOL BOARD
YORK CATHOLIC DISTRICT SCHOOL BOARD BOARD POLICY Policy Section Policy Number Program/Curriculum 318 Former Policy # Page 222 1 of 7 Original Approved Subsequent Approval s March 4 th, 2008 November 26,
MySign Electronic Signature
MySign Electronic Signature Advisory Circular Compliance Matrix FAA AC 120 78, Dated 10/29/02 1 AC 120 78 Section 5, 6 and 8 Gulfstream CMP MySign Digital Signature Compliance 5. What is an acceptable
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
CAMPUS KEY POLICY. Gerry, Bomotti, Senior Vice President for Finance and Business
Gerry, Bomotti, Senior Vice President for Finance and Business 1. PURPOSE The purpose of this policy is to provide optimal physical security and safety for building occupants and to protect the assets
DFA EXTERNAL AGENCY POLICY AND FORMS FOR ACCESS CONTROL
DFA EXTERNAL AGENCY POLICY AND FORMS FOR ACCESS CONTROL Revised on May 18, 2011 Section 1 ACCESS CONTROL SYSTEM (ACS) DESCRIPTION Monitoring building access and the general security of buildings and facilities
Andrews University Payment Card Acceptance Policies & Procedures. Prepared by Financial Administration
Andrews University Payment Card Acceptance Policies & Procedures Prepared by Financial Administration July 12, 2011 Part I: Introduction of Policy and Purpose Formatted: Font: 12 pt In order to protect
Revised June, 2002 FACILITY ACCESS AND IDENTIFICATION BADGE POLICY AND PROCEDURES
FACILITY ACCESS AND IDENTIFICATION BADGE POLICY AND PROCEDURES August/99 Revised Oct./99 Revised Feb/2000 Revised March/2000 Revised April, 2000 Revised March, 2001 Revised May, 2001 Revised June, 2002
CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number 95.51 PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9.
95.5 of 9. PURPOSE.. To establish a policy that outlines the requirements for compliance to the Payment Card Industry Data Security Standards (PCI-DSS). Compliance with this standard is a condition of
MU 20/15 - LIA MINIMUM STANDARD FOR LIFE INSURANCE ADVISORY PROCESS (EFFECTIVE DATE: NO LATER THAN 1 APRIL 2015)
BY EMAIL ONLY To: Ordinary and Associate Members Members Undertaking No. 20 of 2015 20 May 2015 MU 20/15 - LIA MINIMUM STANDARD FOR LIFE INSURANCE ADVISORY PROCESS (EFFECTIVE DATE: NO LATER THAN 1 APRIL
Audit Report on the New York City Police Department Data Center 7A06-093
Audit Report on the New York City Police Department Data Center 7A06-093 August 14, 2006 THE CITY OF NEW YORK OFFICE OF THE COMPTROLLER 1 CENTRE STREET NEW YORK, N.Y. 10007-2341 WILLIAM C. THOMPSON, JR.
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Registration Procedures
REGISTRATION PROCEDURES 221 Registration Procedures Preamble These procedures ( Procedures ) are to be read in conjunction with FIFA Regulations for the Status and Transfer of Players ( FIFA Regulations
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
CONCORD UNIVERSITY BOARD OF GOVERNORS
CONCORD UNIVERSITY BOARD OF GOVERNORS Policy No. 12 Policy on Fixed Asset Inventory Effective Date: 05/04/2005 Section 1. GENERAL 1.1 Scope: This policy provides direction for establishing and maintaining
Vodafone Group Certification Authority Test House Subscriber Agreement
Vodafone Group Certification Authority Test House Subscriber Agreement Publication Date: 12/05/09 Copyright 2009 Vodafone Group Table of Contents Vodafone Group Certification Authority Test House Subscriber
Presentation by BSI on the main changes to the IATF ISO/TS 16949 certification scheme
Presentation by BSI on the main changes to the IATF ISO/TS 16949 certification scheme ISO/TS 16949 IATF Scheme rules 4 th edition areas that impact BSI Clients Copyright 2014 BSI. All rights reserved.
RENTAL APPLICATION. (All applicants must complete RRM and GLVAR applications)
RENTAL APPLICATION (All applicants must complete RRM and GLVAR applications) Application Fee Application Fee is non-refundable and $55 per applicant/occupant over 18. Roommates must submit a separate application.
Procedures for the Acceptance of Wastewater from Asbestos Abatement Projects
Joanne M. Mahoney, County Executive Tom Rhoads, P.E., Commissioner 650 Hiawatha Boulevard West Syracuse, NY 13204-1194 Phone (315) 435-2260 or (315) 435-6820 FAX (315) 435-5023 http://www.ongov.net Procedures
PURCHASING CARD POLICY AND PROCEDURES
PURCHASING CARD POLICY AND PROCEDURES 1. PURPOSE To establish policies and procedures for procuring goods and/or services using a Purchasing Card. Purchasing Cards are referred to throughout this policy
ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE
AbbVie is a participant in the U.S. Customs supply chain security program called the Customs-Trade Partnership Against Terrorism (C-TPAT). Participation in C-TPAT requires AbbVie to ensure that its overseas
WINONA STATE UNIVERSITY TRAVEL CREDIT CARD PROGRAM USERS GUIDE
WINONA STATE UNIVERSITY TRAVEL CREDIT CARD PROGRAM USERS GUIDE 1 WSU TRAVEL CARD PROGRAM Part 1. Authority MnSCU System Procedure 7.3.3 Credit Cards, provides authority for a college, university or office
THE SOCIALIST REPUBLIC OF VIETNAM Independence - Freedom - Happiness --------------- No: 23/2014/TT-NHNN Hanoi, 19 August 2014 CIRCULAR
STATE BANK OF VIETNAM ------- THE SOCIALIST REPUBLIC OF VIETNAM Independence - Freedom - Happiness --------------- No: 23/2014/TT-NHNN Hanoi, 19 August 2014 CIRCULAR GUIDING THE OPENING AND USE OF PAYMENT
HIPAA Employee Compliance Program TRAINING MANUAL
HIPAA Employee Compliance Program TRAINING MANUAL Training Manual to Assist Employees in HIPAA Compliance January 2013 Program For HIPAA Compliance Plan Goal The purpose of this manual is to instruct our
Onboarding and De-boarding of Personnel in the MICH Community
Onboarding and De-boarding of Personnel in the MICH Community Approved by: MICH CEO and Scientific Director Date Approved: 2013 Owner: MICH Resource Manager Supersedes: - Section number: 3.5 Next Scheduled
Travel Card Policy and Procedure Manual
Policy and Procedure Manual Table of contents 1. Introduction... 3 2. Reason for Policies and Procedures... 3 3. Who Needs To Know the Policies and Procedures... 3 4. Definitions... 3 5. Contact Information...
Home Working Policy Version Date Status Comments
Home Working Policy Version Date Status Comments 1.0 June 2010 Draft 1.0 August 2010 Draft Policy sent out for consultation via JCC and Corporate Bulletin Board. 1.0 November 2010 Final Resources Portfolio
University of Limerick Data Protection Compliance Regulations June 2015
University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick
MASTERCARD PREPAID CARDHOLDER TERMS & AGREEMENT
MASTERCARD PREPAID CARDHOLDER TERMS & AGREEMENT This MasterCard Prepaid Cardholder Terms & Agreement (this agreement ) is the terms and conditions governing our issuance and your use of the First National
