ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose
|
|
- Karen Barker
- 8 years ago
- Views:
Transcription
1 ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related Policy: Installation and Use of Video Surveillance Equipment Policy Procedure content: Purpose St. Cloud State University is committed to providing a safe environment for students, employees, visitors and guests. To achieve this outcome the University integrates the best practices of policing with technology through the implementation and maintenance of a comprehensive security plan. A comprehensive security plan incorporates the use of video surveillance technology to deter crime and to assist the Department of Safety and Security in the protection of university property and, when necessary, to gather evidence. Scope These procedures provide guidelines for the implementation of the Installation and Use of Video Surveillance Equipment Policy. These procedures apply to all students, faculty, staff, Schools and Departments within the University community. The goal of these procedures is to enhance the safety and security of the campus community, to provide protection to buildings and property and to document and ensure authorized use of controlled access points or alarms, while respecting the reasonable expectation of privacy among members of the community. Nothing in this procedure reduces or is intended to reduce the requirements of Minnesota State Colleges and Universities (MnSCU) Procedure , Acceptable Use of Computers and Information Technology Resources. Use of Video Surveillance Equipment Video surveillance equipment may be used on campus for one or more of the following purposes; to enhance safety and security, to provide protection to buildings and property, and to document activity and ensure authorized use of controlled access 1 P a g e
2 points or alarms. The availability of and allocation of resources in combination with circumstances or specific situations will determine when and if video surveillance equipment is monitored in real time, continuously, or otherwise. 1. Public Safety and Security Video surveillance equipment is used to assist in the protection and safety of the university community, its visitors and guests. Viewing and/or recording of video data of public spaces allows for the detection, assessment, and deterrence of unlawful behavior and student code of conduct violations. 2. Building and Property Protection Video surveillance equipment is used to assist in the protection of, persons, buildings, and property; valuable, hazardous, or sensitive information/materials from interference, damage, demolition, or theft. 3. Access Point and Security Verification Video surveillance equipment is used to document activity and ensure authorized access at controlled access points or alarms. Video Cameras (or web cams) for Marketing, Training, or General Observation Video cameras (or web cams) may be used for viewing and/or recording video images of public spaces for university marketing, employee training, or general observation; e.g., to enhance customer service. Prior authorization will be requested in writing to the Associate Vice President of Safety and Security. Authorization will be determined by the Associate Vice President of Safety and Security in collaboration with the Vice President for Finance and Administration, the Assistant Vice President of Communications and the data privacy compliance officer. Off-Campus Use (access) of Video Surveillance Equipment Certain employees may have a business need to access surveillance equipment data from a non-campus location. Any St. Cloud State University employee who has a business need to access surveillance equipment data must submit a written request for authorization. Authorization will be approved by the Associate Vice President for Safety and Security in collaboration with the Vice President for Finance and Administration. A record of approved off campus authorizations will be maintained by the Department of Safety and Security. 2 P a g e
3 Responsibilities for Off Campus Use Employees will comply with all relevant laws and policies, including but not limited to MnSCU Procedure , Acceptable Use of Computers and Information Technology Resources Only St. Cloud State University approved VPN (Virtual Private Network) connections may be used to access video surveillance equipment data. It is the responsibility of employees with VPN privileges to ensure that unauthorized users are not allowed access to St. Cloud State University internal networks or data. Employees authorized to access video surveillance data are prohibited from recording or manipulating data in any way. Use of VPN technology with personal equipment represents a de facto extension of St. Cloud State University s network. As such users personal equipment are subject to the same rules and regulations that apply to the University-owned equipment, i.e., their machines must be configured to comply with appropriate Security Policies including but not limited to a current operating system and current anti-virus software. Employees will be solely responsible for any Internet provider, equipment, and other costs and charges incurred in the process of using or accessing the video surveillance equipment data. General Principles A. Video surveillance equipment and its associated monitoring are used to protect the safety of persons and property of the University community, to deter crime, and to retrieve data about specific events or incidents. Purposes include, but are not limited to: Protection of individuals, including students, employees, visitors, and guests; Protection of University owned and/or operated property, and buildings, including building perimeters, entrances and exits, lobbies, elevators and corridors, receiving docks, special storage areas, laboratories, cashier locations, and other areas where surveillance is determined necessary to achieve compliance with the scope of the Installation and Use of Video Surveillance Equipment Policy; 3 P a g e
4 Verification of alarms and access control systems; Patrol of common areas and areas accessible to the public, including transit stops, parking lots, public streets, pedestrian walks; and fire exits; Investigation of alleged criminal activity, student code of conduct violations, disciplinary activity, such as, sabotage of research projects, vandalism, theft, and similar incidents. Any diversion of, or use of video surveillance equipment or security technologies for purposes other than those defined in the Installation and Use of Video Surveillance Equipment Policy or Procedures is prohibited. B. Information Technology Services will coordinate the purchase and support of all video surveillance equipment including; hardware, software data storage and outside vendor service contracts. C. The Department of Safety and Security will manage the placement, installation, function and operation of video surveillance equipment as part of a comprehensive campus safety and security plan. A comprehensive campus safety and security plan is developed in collaboration with the appropriate campus constituents. D. Video surveillance and monitoring will be conducted in a manner consistent with University policies and in compliance with relevant professional, ethical and legal standards, including Non-Discrimination, and Sexual Harassment. Selection of subjects for surveillance and monitoring activities based on the characteristics and classifications contained in the Non-Discrimination Policy (e.g., race, gender, sexual orientation, national origin, disability, etc.) are strictly prohibited. E. All personnel involved in monitoring or control of video surveillance equipment and data will be trained and supervised. Training will include review and confirmation of understanding of SCSU s Video Surveillance Protocol (see below) and appropriate policies, procedures, professional, ethical and legal standards. 4 P a g e
5 Violations of professional, ethical, and legal standards or SCSU s surveillance procedures protocol may result in disciplinary action consistent with the rules and regulations governing university employees. F. Use of video surveillance and monitoring will not violate the reasonable expectation of privacy. A reasonable expectation of privacy exists for students in their personal residential rooms/apartments. Surveillance and monitoring for safety and security purposes will not be routinely used in residential hallways and lounges. When a specific safety or security risk has been determined to exist by the Associate Vice President for Safety and Security, in consultation with the Director of Residential Life, surveillance equipment will be utilized in hallways and lounge areas. Surveillance and monitoring of residential rooms shared by more than one resident or apartment common areas is not permitted under the policy without authorization from all residents of the subject apartment or room. G. The existence of the Installation and Use of Video Surveillance Equipment Policy and Procedure does not imply or guarantee that video surveillance equipment will be constantly monitored in real time. H. All existing uses of video surveillance equipment will be brought in to compliance with the Installation and Use of Video Surveillance Equipment Policy and Procedures within twelve (12) months of the approval of the policy. All departments with existing equipment will work with Information Technology Services to integrate their CCTV systems with University standard. All departments with existing video surveillance equipment will provide a written plan to Information Technology Services and The Department of Safety and Security within six (6) months of policy approval. All departments with existing video surveillance equipment who are not in compliance twelve (12) months after policy approval will be required to discontinue video surveillance equipment use until compliance is achieved. 5 P a g e
6 I. One year following the adoption of the Installation and Use of Video Surveillance Equipment Policy and Procedure, the Associate Vice President for Safety and Security shall assemble a representative user group to review the implementation of the policy and procedure and develop recommendations for revision. If policy and procedure revision is needed a revised draft will be provided to the Vice President of Finance and Administration in accordance with the university policy revision process. General Responsibilities A. All University areas using or intending to use video surveillance equipment are responsible for compliance with the Installation and Use of Video Surveillance Equipment Policy and Procedures, including SCSU s Video Surveillance Protocol. B. SCSU s Video Surveillance Protocol is in addition to applicable Federal, State, Local and University Policies related to video surveillance. C. Information Technology Services and the Department of Safety and Security are responsible for reviewing video surveillance equipment operations, including recording, storage, monitoring, access, and retention. D. Decision by the Associate Vice President for Safety and Security regarding video surveillance equipment may be appealed to the Vice President of Finance and Administration. The Vice President of Finance and Administration will review available information and render a decision. Responsibility and Authority It is everyone s responsibility to share concerns and raise awareness of safety and security issues to contribute to the creation of a safe and secure community. It is the responsibility of all administrators and department heads, and SCSU Department of Safety and Security, to make recommendations about the level of security required on campus. Decisions to install video surveillance equipment as a component of a comprehensive safety and security plan may be reached through consultation and deliberation with certain individuals and groups. Department of Safety and Security 6 P a g e
7 The Department of Safety and Security, in consultation with the Vice President for Finance and Administration, has authority to oversee the use of video surveillance equipment and its monitoring as part of a comprehensive safety and security plan. The Associate Vice President for Safety and Security, or designee, is responsible for authorization of all video surveillance equipment use and monitoring. This includes any temporary installation deemed necessary in connection with criminal investigation, enhanced security for special events or as otherwise deemed necessary to protect the safety and security of the university. The Department of Safety and Security will work in consultation and collaboration with Information Technology Services to achieve video surveillance equipment goals. The Department of Safety and Security is actively involved in an advisory and advocacy role in all projects which either have or use video surveillance equipment. The Department of Safety and Security will assist the office/department/group in preparing a request for video surveillance equipment installation and use, or video surveillance equipment removal. The Department of Safety and Security will maintain a list of all video surveillance equipment deployed throughout campus and will, with the designated surveillance equipment contacts, monitor system operability for all video surveillance equipment on campus. The Department of Safety and Security will coordinate any necessary interfaces to the security system and local vendors with the support of Information Technology Services. Requesting Office/Department/Group An office/department/group requesting to install video surveillance equipment must prepare an application for video surveillance equipment installation and use. The requesting office/department/group is responsible for ensuring that all video surveillance equipment installed is assigned to a designated surveillance equipment contact. The requesting office/department/group is responsible for lifecycle funding for video surveillance equipment and for compliance with established standards. Surveillance Equipment Contact 7 P a g e
8 The surveillance equipment contact is an individual designated by the head of the requesting department who has duties within the department related to surveillance equipment management. The surveillance equipment contact is the custodian of the assigned video surveillance equipment. The surveillance equipment contact is specifically responsible for proper operation of video surveillance equipment and ensuring lawful and sound use as standards and policies are revised and changed. The surveillance equipment contact will be a departmental liaison with the Department of Safety and Security and Information Technology Services and a representative on the video surveillance user group. Role of the Vice President The vice president of the requesting unit has the authority to approve or deny installation and use of video surveillance equipment. The vice president will be included in the development of a proposal for installation of video surveillance equipment Role of Information Technology Services Information Technology Services will support the development of system design, operating standards, replacement cycles, system maintenance, and procurement of equipment. Information Technology Services will determine and allocate the necessary data storage required for video surveillance equipment and compliance with storage and retention schedules. Information Technology Services will identify necessary back up criteria and disposal schedules. Information Technology Services are responsible for developing and maintaining standards for the operation of video surveillance equipment open to public web browsers for both on and off campus use. Video surveillance feeds including data and images that are available via public web browser will be neither monitored nor archived under normal operations. Release of Data Data obtained through use of video surveillance equipment will only be released when approved by the Associate Vice President for Safety and Security in collaboration with the Vice President of Finance and Administration and the data privacy compliance officer. 8 P a g e
9 Requests for release of data obtained through use of video surveillance equipment Must be received in writing. Must identify the entity/person/campus office/department/outside agency making the request. Must specify the purpose of the request and the manner in which the data is intended to be used. Must provide justification for release of data and support (as needed). The Department of Safety and Security will log and keep a record of data release requests and outcomes. Prior to release of data the Department of Safety and Security may be required to obscure the images of incidental or non-subject persons captured in surveillance video in compliance with data privacy. All warrants received for video surveillance data from outside law enforcement agencies will be referred to the Associate Vice President for Safety and Security. The Associate Vice President for Safety and Security, or designee in consultation with the Special Advisor to the President will comply with warrants received from outside law enforcement agencies. A copy of the warrant will be retained and forwarded to legal counsel. Subpoenas received for release of information will be referred to legal counsel. When legal counsel approves release of subpoenaed information the Associate Vice President of Safety and Security, in consultation with the Special Advisor to the President, will be responsible for providing the require information. St. Cloud State University is committed to the protection of data and compliance with government data privacy act regulations. SCSU s Video Surveillance Protocol 1. All operators and supervisors working with video surveillance equipment will perform their duties in accordance with the Installation and Use of Video Surveillance Equipment Policy and Procedures. 2. The Department of Safety and Security will limit video surveillance equipment positions and views of residential housing in compliance with the Installation and Use of Video Surveillance Equipment Policy and the reasonable expectation of privacy. 9 P a g e
10 3. Surveillance monitoring centers will be configured to prevent video surveillance equipment operators tampering with or duplicating recorded information. 4. Recordings will be retained in a secure location with access by authorized personnel only. 5. Recordings may be retained for a period not to exceed 30 days and will then be erased, unless retained as part of a criminal investigation or court proceedings (criminal or civil), or other bona fide use as approved by the Associate Vice President for Safety and 6. Video surveillance equipment operators who view recordings must do so in the presence of a supervisor to maintain the integrity of the recording. 7. Video surveillance equipment operators will be trained in the technical, legal and ethical parameters of appropriate use. Video surveillance equipment operators will receive a copy of the Installation and Use of Video Surveillance Equipment Policy and Procedures, including the SCSU surveillance procedures Code of Conduct and provide written acknowledgement that they have read and understood its contents. 8. Video surveillance equipment operators will not select subjects to monitor based on characteristics of race, gender, ethnicity, sexual orientation, disability, or other classifications protected by Non-Discrimination Policy. Video surveillance equipment operators will monitor based on suspicious behavior, not individual characteristics. 9. Video surveillance equipment operators will not view private rooms or areas through windows. 10. Video surveillance equipment operators will operate equipment in a manner consistent with the intent of the Installation and Use of Video Surveillance Equipment Policy. Video surveillance equipment will be used: to enhance security; to detect, asses and deter unlawful behavior and student code of conduct violations; to protect person, buildings and property; and to monitor and ensure authorized access at controlled access points and alarms. Any operation or use that falls outside of these parameters is expressly prohibited. 11. Portable hidden cameras, with or without recording equipment, will only be used for law enforcement purposes and with the knowledge and approval of the Associate Vice President of Safety and Security. Procedure Owner: Vice President of Finance and Administration Procedure Contact: Associate Vice President of Safety and Security 10 P a g e
11 Other Documents: Minnesota State Colleges and Universities (MnSCU) Procedure , Acceptable Use of Computers and Information Technology Resources. Effective Date: Enter effective date here. 11 P a g e
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version V.D. Closed Circuit Television Monitoring and Recording of Public Areas for Safety and Security Purposes (Source:
More informationSurveillance Equipment
University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of
More informationContra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
More informationTitle of the Policy: Surveillance Policy
Title of the Policy: Surveillance Policy Functional Area: University Police Applies To: All Faculty and Staff Policy Reference(s): Number: Version 1.0 Date First Issued: March 15, 2016 Date Last Reviewed:
More informationCamera Use. Policy Statement and Purpose. Table of Contents
Camera Use Policy Type: Administrative Responsible Office: VCU Police Department Initial Policy Approved: 12/04/2015 Current Revision Approved: New Policy Statement and Purpose VCU is committed to enhancing
More informationPOLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same
POLICY TEMPLATE Video Surveillance Category: Approval: Responsibility: Date: Operations PVP VP Finance and Administration Date initially approved: November 5, 2013 Date of last revision: same Definitions:
More informationStanford University Video Surveillance System Guidelines
Stanford University Video Surveillance System Guidelines Effective Date: May 1, 2014 Stanford University / Video Surveillance System Guidelines Page 1 Video Surveillance System Guidelines Statement All
More informationMODESTO CITY SCHOOLS Administrative Regulation
MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized
More informationNMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises)
NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises) A. NMSU Entities requesting security cameras will be required to follow the procedures outlined below. 1. Justification
More informationBates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
More informationUniversity of Maryland Baltimore Information Technology Acceptable Use Policy
The UMB School of Nursing follows and adheres to the UMB Campus Information Technology Acceptable Use Policy. The UMSON further defines Authorized User to also include any person who receives a password
More informationClear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
More informationPolicy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
More informationComputer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
More informationWestmoreland Intermediate Unit Internet Acceptable Use Policy
Westmoreland Intermediate Unit Internet Acceptable Use Policy Overview: The Westmoreland Intermediate Unit provides Internet access to administrators, teachers, and students in the school districts of
More informationResponsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
More informationOIPC Guidelines for Video Surveillance by Public Bodies in Newfoundland and Labrador, June 2015 ATIPPA, 2015 Criminal Code of Canada
PURPOSE: To enhance protection for employees and visitors, strengthen security of infrastructure/town facilities and assist law enforcement agencies with investigations. AUTHORITY: OIPC Guidelines for
More informationMedford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
More informationResponsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
More informationCCTV Cameras Policy. Policy Guidelines
CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes
More informationCOMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
More informationOLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
More informationSOUTH DAKOTA BOARD OF REGENTS. Policy Manual
SOUTH DAKOTA BOARD OF REGENTS Policy Manual SUBJECT: Acceptable Use of Information Technology Systems NUMBER: 7:1 1. Purpose The Board acquires, maintains and operates information technology systems to
More informationNORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES
NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES 1. PROCEDURE SUMMARY STATEMENT To establish procedures relating
More informationUNIVERSITY OF MANITOBA POLICY CLOSED CIRCUIT TV (CCTV) MONITORING. Part I Reason for Policy
UNIVERSITY OF MANITOBA POLICY Policy: Effective Date: October 1, 2012 Revised Date: November 20, 2012 Review Date: October 1, 2022 Approving Body: Authority: Responsible Executive Officer: Delegate: Contact:
More informationInformation Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
More informationBERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
More informationUNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
More informationConditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
More informationAcceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
More informationSouthern Law Center Law Center Policy #IT0004. Title: Email Policy
Southern Law Center Law Center Policy #IT0004 Title: Email Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/2012 1.0 Purpose: To provide members of
More informationEthical and Responsible Use of EagleNet 03/26/14 AMW
Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of
More informationCollege of DuPage Information Technology. Information Security Plan
College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data
More informationAcceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
More informationJHSPH Acceptable Use Policy
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More informationLAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
More informationUNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
More informationSUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
More informationCOLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
More informationInformation Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
More informationAPPENDIX C. HARASSMENT, BULLYING, DISCRIMINATION, AND HATE CRIMES (Adaptedfrom the Attorney General's Safe Schools initiative)
APPENDIX C HARASSMENT, BULLYING, DISCRIMINATION, AND HATE CRIMES (Adaptedfrom the Attorney General's Safe Schools initiative) This section of the Code of Conduct has been adapted from the Greenfield Public
More informationLutheran Education Association of Houston Acceptable Use Policy (Students)
Lutheran Education Association of Houston Acceptable Use Policy (Students) With the use of technology, including the Internet, Intranet, hardware and software, the Lutheran Education Association of Houston
More informationTECHNOLOGY ACCEPTABLE USE POLICY
Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and
More informationBLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
More information8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES. Policy Statement COLLEGE OF CHARLESTON POLICY ON
OFFICIAL POLICY 8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES 03/21/11 Policy Statement COLLEGE OF CHARLESTON POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES 1.0 PURPOSE OF POLICY The purpose
More information2013 Annual Security Report: Boston University Brussels
2013 Annual Security Report: Boston University Brussels 1. Brief Overview of Program, Enrollment and Facilities Boston University Brussels serves 140 to 200 students each year, offering graduate certificate
More informationAdministrative Procedure
Administrative Procedure Effective: 12/21/2012 Supersedes: N/A Page: 1 of 5 Subject: SECURITY ALARMS 1.0. PURPOSE: The purpose of this procedure is to coordinate and control the installation, monitoring,
More informationLINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
More informationAppendix I. The City University of New York Policy on Acceptable Use of Computer Resources
Appendix I The City University of New York Policy on Acceptable Use of Computer Resources Introduction CUNY s computer resources are dedicated to the support of the university s mission of education, research
More informationInformation Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
More informationInformation and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools
Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of
More informationPOLICY SUPPORT OPERATIONS 5042 ACCEPTABLE USE POLICY FOR NETWORK AND INTERNET ACCESS
I. Overview Network and Internet access is available to students, teachers and staff in the Oneida City School District. The District s goal in providing such services is to promote educational excellence
More informationAPPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES
APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,
More informationIII. RESPONSIBILITIES
Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 1 of 5 I. POLICY & SCOPE This is the SUNY College at Old Westbury policy on College-provided access to electronic information
More informationCITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
More informationState University of New York College at Old Westbury. Domestic Violence and the Workplace Policy
State University of New York College at Old Westbury Domestic Violence and the Workplace Policy Policy Statement The persons covered by this policy are: employees of SUNY College at Old Westbury (the College
More informationDIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
More informationCOMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
More informationPolicy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
More informationAdministrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
More informationELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
More informationStandard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
More informationElectronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
More informationPeer to Peer File Sharing and Copyright Infringement Policy
Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct
More informationHow To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
More informationInternet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
More informationUse of ESF Computing and Network Resources
Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among
More informationProcedure 1B.1.1 Report/Complaint of Discrimination/Harassment Investigation and Resolution
Minnesota State Colleges and Universities System Procedures Chapter 1B System Organization and Administration / Equal Education and Employment Opportunity Report/Complaint of Discrimination/Harassment
More informationIAPE STANDARDS SECTION 16 DIGITAL EVIDENCE
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict
More informationVICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
More informationRIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
More informationDocument Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy
Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)
More informationOdessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
More informationThe District's Electronic Communications System - A Review
ROBINSON INDEPENDENT SCHOOL DISTRICT ACCEPTABLE USE POLICY (AUP) The Superintendent or designee will oversee the District's electronic communications system. The District's system will be used only for
More informationCODE OF ETHICS AND BUSINESS CONDUCT
CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business
More informationMICHIGAN JEWISH INSTITUTE Policy and Procedure Manual
Effective Date: June 2003 Page No. 1 of 12 GENERAL PURPOSE: This policy is intended to provide a process and procedure that will increase awareness of campus safety and security issues and to communicate
More information2.82.010 Government records findings--recognition of public policy.
Chapter 2.82 RECORDS MANAGEMENT 2.82.010 Government records findings--recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake County
More informationCity of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
More information2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04
2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04 A. Keys 1) Sul Ross State University maintains a centralized key and lock system to enhance the control and security of property
More informationCentral Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
More informationUNIVERSITY OF CALIFORNIA SANTA CRUZ LABOR STRIKE PLAN
UNIVERSITY OF CALIFORNIA SANTA CRUZ LABOR STRIKE PLAN Revised: March 2014 TABLE OF CONTENTS UC STRIKE - PROCEDURE... 3 UC STRIKE OBJECTIVES... 3 UCSC STATEMENT ON FREE SPEECH AND ASSEMBLY..3 INCIDENT COMMAND
More informationResponsible Use of Technology and Information Resources
Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni
More informationAll individuals with access to Twin Falls School District technology and computer networks will:
Twin Falls School District #411 Computer and Network Use Policy 201 Main Avenue West Twin Falls, Idaho 83301 Telephone: 208-733-6900 Fax: 208-733-6987 Technology users responsibilities go beyond general
More informationGENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of
More information5. Users of ITS are the persons described above under Policy Application of the diocese of Springfield in Illinois.
Diocese of Springfield in Illinois Section I General Statement 1. Information Technology Systems (ITS), when properly used, provide timely communication and technological support to help fulfill the mission
More informationChapter 2.82 - RECORDS MANAGEMENT Sections:
Chapter 82 - RECORDS MANAGEMENT Sections: 8010 - Government records findings Recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake
More informationTITLE: SCCD ELECTRONIC INFORMATION RESOURCES
SEATTLE COMMUNITY COLLEGE DISTRICT PROCEDURE NUMBER: 259.10-40 TITLE: SCCD ELECTRONIC INFORMATION RESOURCES 259.10 Definitions: 259.10.01 Electronic Information Resources (EIRs). All electronic hardware,
More informationNorth Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
More informationESI Incident Response Procedures 1
ESI Incident Response Procedures 1 Core Document Approval Date, USNH Legal Counsel: 2/12/2010 Core Document Approval Date, UNH CIO: Pending Objectives 1. Understand which policies, procedures and laws
More informationUK SBS Physical Security Policy
UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following
More informationSecurity Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationNon-Discrimination and Anti-Harassment Policy OP 03.03
Non-Discrimination and Anti-Harassment Policy OP 03.03 Policy Mississippi State University is committed to assuring that the University and its programs are free from discrimination and harassment based
More informationMARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
More informationHyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
More informationSecurity Management Plan
Effective Date: 03/2015 1 of 10 I. Table of Contents: I Table of Contents II Authority III Purpose & Scope IV Policy Statement V The Joint Commission Standards VI Performance Standards VII DUPD Services
More informationCorporate Policy and Procedure
Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install
More information