ADMINISTRATION COMPUTER NETWORK
|
|
|
- William Blankenship
- 10 years ago
- Views:
Transcription
1 ADMINISTRATION COMPUTER NETWORK
2 School Administrative Computer Network The Cumberland School operates a network of computers specifically for administrative purposes in the school. This network is electronically integrated with the curriculum computer systems in the school. The primary uses of this system are: To maintain and process Financial Information Reports Orders, invoices and payments Financial planning Staffing cost calculations Pupil Records Family and home data Attendance records Academic information Examination data Academic progress profiles Timetable information Special needs data Staff Records Personal data Contract details Timetable information Curriculum Management Constructing the timetable Option choices Cover Examination entries This data is managed by a suite of computer programs known as SIMS (School Information Management System). The operations are carried out by a number of separate but interlinked modules, which the user selects from a launcher program. The nature and extent of data held by the system means that access to each module is via a password known only to the individual user. Users are expected to change their passwords every term to protect the integrity of the system. The access rights (what the user can view or edit) are set by the System Manager.
3 Training on the use of the various modules is provided in house and directly from SIMS or SIMS authorised centres. The System Manager also supports staff learning to use modules. In addition to the SIMS suite the computers also support other software essential to the successful operation of the school. The Microsoft Office 2013 suite of programs is accessible from any computer in the school and allows word processing, spreadsheet, database creation, and desktop publishing. Staff can be accessed through the Microsoft Outlook 2013 program which allows staff to send and receive both internally and externally. is also accessible remotely via the internet using the following address: The Cumberland School also has a dedicated Citrix server farm which allows staff to log onto the school network from any remote location with internet access. The address for this is The internet is accessible from any computer in the school. There is a web filtering policy which is active during normal working hours. There is an after school policy is active from 3:15pm onwards which allows web based sites such as Hotmail. All electronic data created and stored by staff is backed up to disk every night and stored in a secure location to ensure that the data is protected and available for restore in accordance with the school s disaster recovery policy. Antivirus software is installed on every computer in the school. The antivirus software checks for updates every 4 hours to ensure adequate protection is available against any malicious software as soon as possible. Network Security and Data Protection In order to maintain the security of the schools network, all staff members must ensure that they follow guidelines regarding the usage of the schools network. By accepting a user account and password, staff members also agree to the following rules: 1. Access to the network and Internet are for school business purposes only. 2. Access to the network is only permitted throughout the term of employment as outlined in your contract. 3. The schools system is to be used primarily for school business purposes only. 4. Any data and/or s created/transmitted using the school s system are the
4 property of The Cumberland School and the school reserve the right to monitor, filter or block such content. 5. Staff are permitted to log on to the network using their own credentials only. 6. Downloading or installing information/software which is considered unsafe, offensive or discriminatory is strictly prohibited. 7. All technical computer problems will be promptly reported to the ICT Helpdesk. The school is registered under the Data Protection Act and has to take steps to ensure the integrity of the data held on the system. The systems in place are: 1. All data on administrative servers are backed up at the end of each working day onto a tape. This tape is stored in a fireproof safe. This can be used to restore any data that becomes corrupted or lost for any reason. A different tape is used for a two week cycle, so there are always 10 working days of data in safe storage. In addition, special end of term back ups are made and stored on a 2 year cycle. 2. All SIMS modules require a user ID and a password and appropriate access rights. Not all users can use every module. Access to modules is also limited to certain workstations only. 3. The system has virus checking software. 4. Every effort is made to ensure that internet downloads are only made from known safe sites (eg. DfES) 5. SIMS is installed on the teacher s computer in all teaching rooms and staff are reminded to close SIMS immediately after they have completed their tasks and never leave a SIMS module unattended. 6. No user is permitted to put software onto the system unless it has been vetted by the System Manger. Only software purchased for use in school is allowed on the system. Use of unauthorised copies of programs is strictly forbidden. 7. Any member of staff found deliberately misusing the Administration computer system or any of the data held on it will be dealt with via the school s disciplinary procedure. To keep track of identify of staff, photos are taken to be used for ID cards, SIMs and s. This is all for identity purposes ONLY and will not be used externally. The school operates a Biometric Cashless Catering system. This will require taking an electronic snapshot of your fingerprint (which is recorded as a barcode) which will then be used to purchase items from the staff room or dinner hall. The catering company do not accept cash, so in order to use the school catering service, all staff must use the biometric system and top up their account at the four reval stations
5 located around the school. The school uses a Cisco telephone system for communication. There is a phone in every classroom, office and staffroom. You can use any phone to make internal calls but you must log in to a phone using your credentials to be able to make calls outside of the school and to retrieve voic . Please request an extension number and login ID from the ICT Support Team. The school operates a computer room booking system. Keys and a checklist form must be collected from the Library Manager before using of a computer room. If a computer room is left open staff still need to let the Library manager know that they will be using the room. The checklist must be filled in at the beginning and end of each lesson when using a computer room, so that any faults of damages can be dealt with quickly. Staff must be vigilant and aware of what students are doing so that less damage is done to equipment. Each member of permanent teaching staff will be issued with a brand new laptop from the start of their contract. This laptop is given for personal use and is a helping hand for those who do not already possess one. Once the laptop has been signed over to staff it is their responsibility for the upkeep of the laptop. Such as, if the laptop gets damage, it is up to the member of staff in possession of the laptop to pay for repairs, replacement parts and the school will not issue a new laptop in the event of the laptop being stolen. System Maintenance The system is maintained by The Cumberland School Network Team with direct support from SIMS. In the event of a network failure the Network Team will see if it is possible to quickly remedy the problem and get the system back in service. It is important to report system problems promptly to the ICT Helpdesk so that they may be tracked and resolved. Any user having a problem accessing or using a SIMS module should consult the System Manager for advice or support. Advice To Minimise Common User Problems 1. When working with the Word Processor or Spreadsheets, save the work at least every half-hour. This can prevent hours of unnecessary re-typing in the event of a problem. 2. When working on a long document save under a different name each time you save, this way there will always be a copy to go back to in an emergency. E.g. Original text: Policy.doc next version: Policy1.doc etc. Use Save As rather than Save from the menu. Unwanted earlier versions can be deleted later. 3. If you need to work on a document at home and bring in a disk or memory stick
6 you need to make sure of the following: a. Your system is PC compatible. b. A virus checker is fitted to check your system each time it is turned on. c. Your Word Processor produces files that can be read by the school system. If you do not have Microsoft Office Suite please consult the Network Team for advice on transferring files. Please note that Word 2007 documents may not be read by earlier versions of Word; this can cause a problem when taking documents home. 4. Exit all programs via the correct exit route. Incorrect shut down causes data to be lost and SIMS modules to lock. 5. Please exit SIMS when you are not using it. Do not leave your office with SIMS still running. Certain tasks in SIMS require exclusive use and keeping SIMS open unnecessarily can cause serious problems and time wasting for other users. 6. Passwords are case sensitive, if the system does not respond to a password check it has been entered in the right case. e.g. password is not the same as PASSWORD.
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access
Mountain Ash Comprehensive School Ysgol Gyfun Aberpennar. Network Security Policy
Mountain Ash Comprehensive School Ysgol Gyfun Aberpennar Network Security Policy Updated: September 2010 Next update: September 2013 Table of Contents: Supervised Use page 1 Privacy...page 1 User Access..page
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS
1/04/2015 Secondary School ICT Service Specification by: 1 Andrea Warburton ONE IT SERVICES AND SOLUTIONS SERVICE SPECIFICATION One IT Services and Solutions offer a one stop shop ICT support service,
How To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
Berwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
Information Security Policy. Policy and Procedures
Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Lowanna College 2015 BYOD PROGRAM AGREEMENT. BYOD Program 2015. BYOD Student Agreement/Acceptable Use Policy/Online Services Policy
BYOD Program 2015 BYOD Student Agreement/Acceptable Use Policy/Online Services Policy The student and parent/guardian must carefully read the above contract before signing it. Any questions should be addressed
NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures. (March 2012)
NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures (March 2012) Contents Ownership... 3 Privately-owned devices... 4 Optional peripherals... 4 Warranty & Insurance... 4 Stolen or Lost Laptops...
THE EDINBURGH NAPIER UNIVERSITY WINDOWS VIRTUAL PRIVATE NETWORK (VPN) GUIDE FOR MAC USERS
THE EDINBURGH NAPIER UNIVERSITY WINDOWS VIRTUAL PRIVATE NETWORK (VPN) GUIDE FOR MAC USERS INTRODUCTION... 2 WHAT SERVICES CAN I ACCESS USING THE VPN?... 2 WHAT ARE THE REQUIREMENTS OF THE VPN SERVICE?...
Complete Managed Services. Proposal for managed services for the City of Tontitown
Complete Managed Services Proposal for managed services for the City of Tontitown Complete Managed Services Components Windows Server 2008, Windows Server 2012 1. Proactive Maintenance of Server(s) Proactive
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
Protection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only
Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only Imhotep Academy is committed to staying on the forefront of educational practices of the 21st century. We are piloting a new policy
SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0
SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
NETWORK AND INTERNET SECURITY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
Chapter 8: Security Measures Test your knowledge
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
TECHNICAL SECURITY AND DATA BACKUP POLICY
TECHNICAL SECURITY AND DATA BACKUP POLICY PURPOSE Effective technical security depends not only on technical measures, but also on appropriate policies and procedures and on good user education and training.
SNAP WEBHOST SECURITY POLICY
SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Acceptable Use Policy - Staff
Acceptable Use Policy - Staff 'Acceptable and Responsible Use of ICT Resources' This version was last modified APRIL 2013 by European Electronique IT Support 1. The benefits of Internet access for education
Sagari Ltd. Service Catalogue and Service Level Agreement For Outsource IT Services
Sagari Ltd Service Catalogue and Service Level Agreement For Outsource IT Services Managed Services Service Level Agreement 1 Introduction This Service Catalogue and Service Level Agreement (SLA) constitutes
ICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
Standard Operating Procedure. Secure Use of Memory Sticks
Standard Operating Procedure Secure Use of Memory Sticks DOCUMENT CONTROL: Version: 2.1 (Amendment) Ratified by: Finance, Infrastructure and Business Development Date ratified: 20 February 2014 Name of
Dulwich College ICT Acceptable Use Policy
Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
4. The Importance of Internet Use in the Primary Curriculum
Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education
ONE TO ONE LAPTOP PROGRAMME POLICY
ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...
1:1 COMPUTER PROGRAM LAPTOP POLICY
1:1 COMPUTER PROGRAM LAPTOP POLICY STATEMENT The focus of learning with laptops at Greater Clark County Schools (GCCS) is to prepare students for their future, a world of digital technology and information.
Simon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
Albany Senior High School
Albany Senior High School Bring your own device (BYOD) Usage Policy for Students and Parents BYOD Usage Policy S:\AdminShared\Teaching Staff\ICT\BYOD\BYOD Policy for Parents.doc Table of Contents 1 Introduction
Portage Township Schools
Portage Township Schools Student/Parent BYOD Technology Handbook 1.1 BYOD Description: BYOD stands for Bring Your Own Device. Students will be encouraged to bring a recommended device to school to be used
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
Data and Information Security Policy
St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
Working Together Aiming High!
Poplar Street Primary School ICT Security and Acceptable Use Policy E-Safety policy 2013/14 Working Together Aiming High! 1 Contents 1. Introduction... 3 2. Policy Objectives... 3 3. Application... 3 4.
Remote Access Password Tips
Introduction: The following document was created to assist Remote Access users with password change and synchronization issues. IT&S has identified the following five (5) scenarios for remote access password
Kenmore State High School Student Laptop Charter
Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6
Mary Immaculate. ICT Services. ICT Helpdesk. User Guide
Mary Immaculate ICT Services ICT Helpdesk User Guide Table of Contents 1. Introduction 3 2. How To Log A Call With The ICT Helpdesk 3 2.1 Email 3 2.2 Phone 3 2.3 Voicemail 3 2.4 Web Self Service Option
CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3
CLEO ~Remote Access Services Remote Desktop Access User guide CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 August 2007 page 1 of 16 CLEO 2007 CLEO Remote Access Services 3SGD
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
User Guide Microsoft Exchange Remote Test Instructions
User Guide Microsoft Exchange Remote Test Instructions University of Louisville Information Technology 1.1 Who Should Use It This guide is intended for University of Louisville Faculty and Staff participating
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
Data Backup on Network Drive for Windows 7
Information Technology Services Page 1 of 8 Data Backup on Network Drive for Windows 7 Document No: V 1 Information Technology Services Page 2 of 8 Contents 2.0 Introduction... 3 3.0 Definitions:... 3
School Information Security Policy
School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...
Finance & Information Management Network Operations
Finance & Information Management Network Operations Accessing Advance via External Affairs remote access system, Citrix. 1. Using a web browser, it s possibly to access Advance without the application
Guide: Using Citrix for Home/ Office
Guide: Using Citrix for Home/ Office Contents Important information about disconnecting from Citrix 1 How to access Citrix Site 2 How to install Citrix Receiver for Home/ Personal Device (ipad, android
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
Installation Guide: Delta Module Manager Launcher
Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...
Grasmere Primary School Asset Management Policy
Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the
Karen Winter Service Manager Schools and Traded Services 01823 355267 [email protected]
Somerset Services to Education Providers 2014-2015 SOUTHWEST ONE TECHNOLOGY SERVICES Service Provider: Southwest One Service Category: Academy Schools - Chargeable Contact: Karen Winter Service Manager
Birkenhead Sixth Form College IT Disaster Recovery Plan
Author: Role: Mal Blackburne College Learning Manager Page 1 of 14 Introduction...3 Objectives/Constraints...3 Assumptions...4 Incidents Requiring Action...4 Physical Safeguards...5 Types of Computer Service
ESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
COLEG GWENT FURTHER EDUCATION CORPORATION. HUMAN RESOURCES & REMUNERATION COMMITTEE 2 nd November 2010
HR&R/Nov/10/22 COLEG GWENT FURTHER EDUCATION CORPORATION HUMAN RESOURCES & REMUNERATION COMMITTEE 2 nd November 2010 Report on Policies reviewed under the 2 year cycle: IT Security Policy Purpose of Report:
Remote Broadband Access (RBA3) Hertfordshire County Council. vworkspace Client Install
Remote Broadband Access (RBA3) vworkspace Client Install Introduction... 3 1 Policy... 3 2 The two ways of accessing RBA3 SecurEnvoy & RSA SecurID Fob.... 3 2.1 SecurEnvoy... 3 2.2 RSA SecurID Fob (Only
Version: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Information Technology Policy and Procedures
Information Technology Policy and Procedures Responsible Officer Author Ben Bennett, Business Planning & Resources Director Policy Development Group Date effective from April 2005 Date last amended February
Managed Security Services SLA Document. Response and Resolution Times
Managed Security Services SLA Document Appendix A Response and Resolution Times The following table shows the targets of response and resolution times for each priority level: Trouble Priority Response
Cashless Prepaid Card Systems Vending Systems for Prisons Biometrics Time & Attendance Kiosks Custom Technology Solutions
Cashless Prepaid Card Systems Vending Systems for Prisons Biometrics Time & Attendance Kiosks Custom Technology Solutions Classroom Attendance Reporting Via Fingerprint iclock 2500 Large 8-inch screen
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Accessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
Certified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
ScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
E- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
Home and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows
Overview Home and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows Ithaca College provides network file sharing for all faculty members, all staff
