NMSU Procedural Guidelines (Policy Security Cameras on University Premises)
|
|
|
- Antony Charles
- 10 years ago
- Views:
Transcription
1 NMSU Procedural Guidelines (Policy Security Cameras on University Premises) A. NMSU Entities requesting security cameras will be required to follow the procedures outlined below. 1. Justification and Approval: Individual NMSU Entities desiring to install security camera equipment shall submit a written request to their appropriate unit administrator, dean or vice president describing the proposed location of security camera (s), justifying the proposed installation, as well as identifying the funding source for purchase and ongoing maintenance. (See Appendix 2-A - Security Camera Proposal & Justification Form). a. Upon approval by appropriate administrator, dean or vice president, the Security Camera Proposal & Justification Form will be submitted to the CIO for information purposes and maintain a copy on-site. b. The University s Chief Information Officer or designee is responsible to assure compliance with this policy and operating guidelines. 2. Installation: Installation of all networked security cameras should be coordinated through Networking Services to ensure they are on a secure network and access is restricted. a. All networked security cameras and related equipment should be configured to require proper authentication (user IDs and passwords) and not use default or common logins. b. Networking Services, Security Camera Coordinator and Facilities Services will collaborate to install network infrastructure to ensure all relating building codes are followed. c. When appropriate, installing department is encouraged to seek the assistance of the ICT Computer Systems function to ensure proper system setup, configuration and to clearly identify location of software i.e. PC or Server. 3. Signage: Signage for security cameras shall be placed conspicuously in areas with cameras, as determined by the Chief Information Officer and consistent with requirements of Policy 9.60, Wayfinding and Signage. 4. Training: a. Authorized personnel responsible for security cameras shall receive a copy of the security camera policy, procedures and provide written acknowledgement that they have read and understood the contents. (See Appendix B - Training Acknowledgment Form) b. Authorized personnel shall attend any meetings or trainings convened by the CIO. 5. Transitioning Security Cameras In Use Prior to Policy Effective Date: The use of existing security cameras shall comply with this policy requirements for professional, legal and ethical use. To the extent that existing equipment or software make it infeasible to comply with technical requirements, the NMSU Entities shall proposed a transition plan to the CIO explaining the steps needed for compliance and a proposed timeline. 6. Unit Level Camera Security Operations: a. Unit Level Protocols Required: NMSU Entities will need to Develop Security Camera Protocols: All NMSU Entities responsible for security cameras governed by this policy shall develop and maintain written policies and processes detailing operation of cameras and how tampering with, intercepting, or duplicating of recorded information will be prevented. Written protocols shall be no less stringent than those outlined in this policy. b. Inventory and Documentation: Each NMSU Entity shall maintain a master inventory and associated documentation of all existing and approved components to their security camera, including but not limited to equipment, software and authorizations received. Inventories must include but may not be limited to: i. Name of responsible person for security cameras and review/approval date; ii. Name and contact information of the person requesting the installation and/or approval of Page 1 of 5
2 the security camera; iii. List of authorized personnel and other members of management, by position and by name, who may be permitted access to the recorded images/information; iv. Purpose and justification for the proposed security camera, consistent with the permitted uses of this policy; v. Explanation of how the recorded information may be reviewed and/or used; vi. Measures that have been taken to minimize the impact on personal privacy; vii. Assertion that the planned installation and operation of the security camera system shall comply with applicable law and this policy; viii. Nature of the physical space in which the security camera will be placed, and a description of the types of activities reasonably likely to be captured on the recordings by the security camera; ix. Implementation details, including: physical location of installation, field of view of the camera(s), capabilities of the camera(s) (video, audio, pan, tilt, zoom, etc.) or microphone(s) that have been disabled, and the make and model of equipment and software; the location and the timing relating to storage and retention of the recorded information. c. Acknowledgement of Training and Compliance Requirements: All authorized personnel, and supervisors involved in security camera operations, including the review of recorded images, will perform their duties in accordance with this policy and any supplemental procedures which may be issued by the University s Chief Information Officer. They shall each indicate acceptance of this responsibility by signing the Security Camera Training Acknowledgment Form. d. Maintenance of Log for Security Camera Recordings Access or Use: A log shall be maintained of all instances of access to or use of security camera recordings. At a minimum, the log shall include the date and identification of the person or persons to whom access was granted. (See Appendix C Example Access Log Form) e. Prohibition of Tampering with Security Cameras: Security cameras shall be configured to prevent authorized personnel from altering or otherwise tampering with recorded information. Allegation of tampering with a security camera, software, or other instrument or documentation related to the administration of this policy will be treated seriously, investigated thoroughly and appropriate criminal, civil, or administration action taken. 7. Storage and Retention of Recordings: Recordings from all security cameras governed by this policy shall be stored by the individual NMSU Entities in accordance with the document retention requirements of the State of New Mexico, codified at NMAC et seq, and also as directed by the NMSU Records Management and Retention Office, summarized below: a. All administrative records relating to the Security Cameras program initiative, including training materials generated or utilized by it, shall be retained until the information value ceases, and then shall be transferred to Library Archives and Special Collections for review for further disposition; b. Routinely recorded images shall be retained for a minimum of thirty (30) calendar days from the date of recording or creation. c. Excepted from this retention policy are security camera images and any other program maintenance information when related to a criminal investigation or civil administrative or legal proceeding, or other bona fide use approved by the NMSU Police Chief and University General Counsel. Page 2 of 5
3 New Mexico State University Security Camera Proposal & Justification Form Security Camera Proposal & Justification Form The purpose of this form is to document the need of a security camera and justify the business need and consideration of ongoing costs and ensure compliance with Policy Security Cameras on University Premises. Submitted Date: Department: College/Branch: Contact: Describe the business purpose, justification and location of security camera(s) (Provide all relating detail): Who will be responsible for coordination of Security Camera(s) (Security Camera Coordinator)? Funding: Funding source or sources for purchase of security camera(s) and installation costs: Index Fund Account Funding source or sources for ongoing maintenance: Index Fund Account Approvals: Dean or Vice President: Security Camera Review Committee: Print Name Yes No Signature Page 3 of 5
4 New Mexico State University Security Camera Training Acknowledgment Form Training Acknowledgment Form This Form is intended to define the responsibilities of those employees handling surveillance devices and related information, which are considered NMSU records that could contain sensitive or confidential information about students, employees, donors or other individuals, and to record his or her recognition and acceptance of that responsibility. New Mexico State University maintains the confidentiality and security of records in compliance with the Family Educational Rights and Privacy Act of 1974 (FERPA), the Health Insurance Portability and Accountability Act (HIPAA) and the Gramm-Leach-Bliley Act (GLBA), in addition to other federal and state laws. These laws pertain to the security and privacy of personal academic, medical and financial information, along with identifying information such as social security numbers, names and photographs (surveillance recordings could reveal/contain identifying information). Within NMSU, employees are authorized access to university records only to the extent necessary to perform their official university duties, and are responsible for protecting such information against unauthorized access or disclosure. Employee: Recognizing this responsibility, I agree to the following (please initial each line): I will access university records only as required to perform my assigned duties. I will store information under secure conditions and make every effort to ensure individual s privacy. I will not divulge, copy, release, sell, loan, review, alter or destroy records except as properly authorized by the appropriate university official within the scope of applicable state or federal laws, record retention schedules and internal policies. I will forward all requests for information via an open records request to the university s general counsel for guidance. I will not release information covered by these requests until instructed to by university s general counsel or my supervisor. I will not release information about students, staff or employees that was requested on the basis of non-public information (for example recordings, verbal talk, etc.) I have read the NMSU Security Camera Policy and Procedures and agree to comply with its provisions. I understand that failure to comply may result in disciplinary action, including termination of employment. Print Name Employee Signature/Date Page 4 of 5
5 Access Log Form New Mexico State University Access Log of Security Camera Records The purpose of this form is to provide an example of a log that should be maintained for all accesses to or use of security camera records and to ensure compliance with Policy Security Cameras on University Premises. No. Rec. Date Name Purpose Page 5 of 5
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
Surveillance Equipment
University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related
M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General
M E M O R A N D U M To: From: IT Steering Committee Brian Cohen Date: March 26, 2009 Subject: Revised Information Technology Security Procedures The following is a revised version of the Information Technology
Camera Use. Policy Statement and Purpose. Table of Contents
Camera Use Policy Type: Administrative Responsible Office: VCU Police Department Initial Policy Approved: 12/04/2015 Current Revision Approved: New Policy Statement and Purpose VCU is committed to enhancing
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
Information Security Policy
Information Security Policy Policy Title Responsible Executive Responsible Office Information Security Policy Vice President for Information Technology and CIO, Jay Dominick Office of Information Technology,
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version V.D. Closed Circuit Television Monitoring and Recording of Public Areas for Safety and Security Purposes (Source:
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Network Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
Chapter 2.82 - RECORDS MANAGEMENT Sections:
Chapter 82 - RECORDS MANAGEMENT Sections: 8010 - Government records findings Recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake
Valdosta Technical College. Information Security Plan
Valdosta Technical College Information Security 4.4.2 VTC Information Security Description: The Gramm-Leach-Bliley Act requires financial institutions as defined by the Federal Trade Commision to protect
ACCESS, PRODUCTION AND RETENTION OF CITY RECORDS
1.05-3 1 of 6 I. PURPOSE This directive prescribes the rules regarding access, production, and retention of City records. II. POLICY A. All records and other matters in City offices are presumed to be
2.82.010 Government records findings--recognition of public policy.
Chapter 2.82 RECORDS MANAGEMENT 2.82.010 Government records findings--recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake County
David Coble Internal Control Officer
WESTERN WASHINGTON UNIVERSITY S RED FLAGS IDENTITY THEFT PREVENTION PROGRAM IMPLEMENTING SECTIONS 114 AND 315 OF THE FAIR AND ACCURATE CREDIT TRANSACTIONS ACT OF 2003 David Coble Internal Control Officer
Computer, Communication, and Network Technology Acceptable Use
Policy V. 2.10.2 Responsible Official: Dean of University Libraries and Chief Information Officer Effective Date: April 12, 2010 Computer, Communication, and Network Technology Acceptable Use Policy Statement
College of DuPage Information Technology. Information Security Plan
College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
Microsoft Online Subscription Agreement/Open Program License Agreement Business Associate Amendment Amendment ID MOS13
Microsoft Online Subscription Agreement/Open Program License Agreement Business Associate Amendment Amendment ID To be valid, Customer must have accepted this Amendment as set forth in the Microsoft Online
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
Corporate Policy and Procedure
Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install
FRONTIER REGIONAL/UNION#38 SCHOOL DISTRICTS. Records Retention Policy for Electronic Correspondence
EH I. Introduction FRONTIER REGIONAL/UNION#38 SCHOOL DISTRICTS Records Retention Policy for Electronic Correspondence All business conducted by government agencies are subject to the Public Records law
DEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008
United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008 I. Introduction United Cerebral Palsy of Greater Chicago ( UCP ) recognizes that
NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section
I. U.S. Government Privacy Laws
I. U.S. Government Privacy Laws A. Privacy Definitions and Principles a. Privacy Definitions i. Privacy and personally identifiable information (PII) b. Privacy Basics Definition of PII 1. Office of Management
RUTGERS POLICY. Policy Name: Standards for Privacy of Individually Identifiable Health Information
RUTGERS POLICY Section: 100.1.9 Section Title: HIPAA Policies Policy Name: Standards for Privacy of Individually Identifiable Health Information Formerly Book: 00-01-15-05:00 Approval Authority: RBHS Chancellor
Security Awareness Training Policy
Security Awareness Training Policy I. PURPOSE This policy is intended to set the training standard for several key audiences in Salem State University, including, but not limited to: University executives,
Rowan University IT ACQUISITION POLICY
Rowan University IT ACQUISITION POLICY Effective: January 2014 Data Governance: IT Acquisition Policy Page 1 of 6 IT ACQUISITION POLICY Title: Data Governance: IT Acquisition Policy Subject: Information
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Federal Trade Commission Privacy Impact Assessment
Federal Trade Commission Privacy Impact Assessment for the: W120023 ONLINE FAX SERVICE December 2012 1 System Overview The Federal Trade Commission (FTC, Commission or the agency) is an independent federal
Compliance and Industry Regulations
Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy
SAMPLE BUSINESS ASSOCIATE AGREEMENT
SAMPLE BUSINESS ASSOCIATE AGREEMENT This is a draft business associate agreement based on the template provided by HHS. It is not intended to be used as is and you should only use the agreement after you
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS I. Introduction 2 II. Definitions 3 III. Program Oversight and Responsibilities 4 A. Structure B. Compliance Committee C.
Health Sciences Compliance Plan
INDIANA UNIVERSITY Health Sciences Compliance Plan 12.18.2014 approved by University Clinical Affairs Council Table of Contents Health Sciences Compliance Plan I. INTRODUCTION... 2 II. SCOPE... 2 III.
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
University of Wisconsin-Madison Policy and Procedure
Page 1 of 14 I. Policy II. A. The, the units of the UW-Madison Health Care Component and each individual or unit within UW-Madison that is a Business Associate of a covered entity (hereafter collectively
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
State HIPAA Security Policy State of Connecticut
Health Insurance Portability and Accountability Act State HIPAA Security Policy State of Connecticut Release 2.0 November 30 th, 2004 Table of Contents Executive Summary... 1 Policy Definitions... 3 1.
ESI Incident Response Procedures 1
ESI Incident Response Procedures 1 Core Document Approval Date, USNH Legal Counsel: 2/12/2010 Core Document Approval Date, UNH CIO: Pending Objectives 1. Understand which policies, procedures and laws
CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number 95.51 PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9.
95.5 of 9. PURPOSE.. To establish a policy that outlines the requirements for compliance to the Payment Card Industry Data Security Standards (PCI-DSS). Compliance with this standard is a condition of
Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY
Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140
DATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
Document Title: System Administrator Policy
Document Title: System REVISION HISTORY Effective Date:15-Nov-2015 Page 1 of 5 Revision No. Revision Date Author Description of Changes 01 15-Oct-2015 Terry Butcher Populate into Standard Template Updated
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
PRINCIPLE IV: THE SOCIAL WORK AND SOCIAL SERVICE WORK RECORD
PRINCIPLE IV: THE SOCIAL WORK AND SOCIAL SERVICE WORK RECORD The creation and maintenance of records by social workers and social service workers is an essential component of professional practice. The
Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)
Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative
HIPAA BUSINESS ASSOCIATE ADDENDUM
HIPAA BUSINESS ASSOCIATE ADDENDUM This Addendum, dated as of, 2007 ( Addendum ), supplements and is made a part of the Services Agreement (as defined below) by and between ( Covered Entity ) and FUJIFILM
Rowan University Data Governance Policy
Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
Electronic Records Management Guidelines
Electronic Records Management Guidelines I. Objectives The employees of the Fort Bend Independent School District (the District ) routinely create, use, and manage information electronically in their daily
Mobile Devices Security Policy
Mobile Devices Security Policy 1.0 Policy Administration (for completion by Author) Document Title Mobile Devices Security Policy Document Category Policy ref. Status Policy Unique ref no. Issued by GSU
Cal Poly Information Security Program
Policy History Date October 5, 2012 October 5, 2010 October 19, 2004 July 8, 2004 May 11, 2004 January May 2004 December 8, 2003 Action Modified Separation or Change of Employment section to address data
(1) regulate the storage, retention, transmission, and security measures for credit card, debit card, and other payment-related data;
Legal Updates & News Legal Updates Pending Changes to California s Data Breach Law: New Burdens for Retailers? September 2007 by Christine E. Lyon, William L. Stern Related Practices: Privacy and Data
Security Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
Information Security Policy
Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED
Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:
Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal
Information Security Plan May 24, 2011
Information Security Plan May 24, 2011 REVISION CONTROL Document Title: Author: HSU Information Security Plan John McBrearty Revision History Revision Date Revised By Summary of Revisions Sections Revised
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS 2014 I. Ethics (18%) This area assesses the candidate s ability to comply with ethical standards of private investigators regarding privacy rights, confidentiality,
Code No.: PS 708 03/09. Video Surveillance Procedures
Video Surveillance Procedures CONTENTS: Definition of Terms Purchase, Installation, and Maintenance of Surveillance Cameras and Equipment Location for Use/Operation of Surveillance Cameras Access and Use
Matrix Technical Support Mailer - 72 Procedure for Image Upload through Email Server in SATATYA DVR,NVR & HVR
Matrix Technical Support Mailer - 72 Procedure for Image Upload through Email Server in SATATYA DVR,NVR & HVR Dear Friends, This mailer will help you configure Email Notification in SATATYA Web Client
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Handheld Mobile Device Security Standard This standard is applicable to all VCU School of Medicine personnel.
CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006)
CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006) WHAT IS THE PURPOSE OF RECORDS MANAGEMENT? 1. To implement a cost-effective Department-wide program that provides for adequate and proper documentation
Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5
Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose
CODE OF BUSINESS CONDUCT AND ETHICS
CODE OF BUSINESS CONDUCT AND ETHICS Wellgreen Platinum Ltd. Suite 1128-1090 West Georgia Street 604.569.3690 [email protected] CODE OF BUSINESS CONDUCT AND ETHICS I. INTRODUCTION This Code of
