Information & Communications Technology ICT Security Compliance Guide (Student)

Size: px
Start display at page:

Download "Information & Communications Technology ICT Security Compliance Guide (Student)"

Transcription

1 Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011

2 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr Mar 2010 Initial Release. Replaces Security EMC Cnsultant Plicy Gverning the Use f Cmputer Resurces at the Singapre Plytechnic Nv 2011 Change f passwrd plicy t meet passwrd cmplexity requirement. Anthny Lau Reviewers Name Rle Status All Members Cmmittee n ICT Security Endrsed Anthny Lau ICT Security Manager Endrsed Apprvals Name Title Date Chairman & Members ICT Steering Cmmittee 25 March 2010 Versin May 2010 Page 2 f 8

3 Table f Cntents Dcument Cntrl Intrductin Student Security Awareness Passwrds Yur Accunts Apprpriate Use SP s Cmputer Resurces Security Vilatins... 8 Versin May 2010 Page 3 f 8

4 1. Intrductin As a student f Singapre Plytechnic, yu will make use f the Plytechnic s ICT Assets such as infrmatin, cmputers, netwrks and sftware in yur day-t-day activities. It is imprtant that these imprtant resurces prvide the service t yu and t thers fr which they were intended. An imprtant part f the prper peratin f these ICT Assets is security. Trjans, viruses, wrms and spyware can wreak havc n these assets s the Plytechnic has taken great care t prtect them against such threat. That said, yu, the student, perfrm a very imprtant rle in maintaining the security and availability f the Plytechnics student cmputer resurces. We have written this guide t help explain what yu need t d, and what rules yu need t cmply with t help ensure that the cnfidentiality, availability and integrity f the cmputing resurces f the Plytechnic are prtected. Students must cmply with the ICT Security Plicies f the Plytechnic. These plicies are very serius and are meant t make sure that the Plytechnic s cmputers and netwrks keep running smthly and securely. This cmpliance guide is intended t explain these plicies t yu. All Students f SP are required t strictly cmply with the Infrmatin Cmmunicatins Technlgy (ICT) Security Plicy and Standards issued by the Plytechnic. 2. Student Security Awareness Reference Plicy Paragraph 5.5, Yu shuld receive security awareness training as part f yur intrductin t the Plytechnic. This training will ensure that yu understand the risks and yur respnsibilities twards helping t reduce thse risks. Yu understand that yu are respnsible t cmply with all security related plicies. These plicies are imprtant and prtect nt nly yu, but everybdy else wh needs t use these resurces. 3. Passwrds Reference Plicy Paragraphs , Versin May 2010 Page 4 f 8

5 Yu will be given a passwrd t access any cmputer accunts that yu need. Yu must keep yur passwrd secret, and never ever tell anybdy else what it is 1 ; We have sme rules t help yu select a gd passwrd: It needs t be at least 9 characters lng; It has t cntain at least 1 letter frm the alphabet and 1 number; It can t have blanks; It can t be yur username r User ID; It can t be yur name r part f yur name; It can t cntain yur NRIC/Passprt Number; It can t cntain r be anything that can be assciated with yu, e.g. yur dg s name r street name; It can t cntain YES r NO. S, yu need t use great care when yu pick a passwrd. One easy way t pick ne yu can remember is t think f a phrase. Fr example, the phrase I like Ice Cream culd be cnverted int a passwrd like 1l1ke1cecream by just putting 1 instead f I ; this is a very gd passwrd. (Dn t use this ne thugh!) Dn t write yur passwrd dwn n a piece f paper r put it in a file n a cmputer. Smebdy else culd find it. If yu think smene has guessed yur passwrd, r if yu accidently revealed it t smebdy else, yu need t change it immediately. One mre thing yur passwrd needs t be changed every 180 days, and yu can t use the same passwrd again. 4. Yur Accunts Reference Plicy Paragraph Yur accunt is just that yur accunt, just fr yu and yu alne. Yu cannt share it with smebdy else, fr any reasn. Yu are respnsible fr everything that cmes frm yur accunt. S if smebdy were t send an , write a blg, r pst smething n FaceBk using yur accunt defaming the schl, a teacher, r a friend, it s yur prblem. S again, keeping yur passwrd a secret helps t avid prblems like this. Yu can t use smene else s accunt, just like smene else can t use yurs. Yu als can t d things that attempt t mask yur accunt t thers t try and hide. Yu can't use the Plytechnic s resurces t spy n thers, and yu can t change, read, delete, cpy r therwise mdify anther persns files unless they give yu permissin t d s. 1 One really gd example f when this rule is imprtant is when yu are the ptential victim f a phishing attack, where yu get an asking yu t reveal yur passwrd. A legitimate site r rganizatin will never ever ask yu t reveal yur passwrd. Versin May 2010 Page 5 f 8

6 5. Apprpriate Use SP s Cmputer Resurces Reference Plicy Paragraphs , , , 11.5 The cmputer systems, including netwrks that have been set aside fr yur use are tls t facilitate yur educatin. These systems shuld be usable by yu just the way they are, and yu shuld nt need t change their cnfiguratin r add any sftware. Use cmmn sense in what yu d n these systems - if it feels wrng, it prbably is. Yu shuld nly use Plytechnic cmputer systems and the Plytechnic s netwrks fr Plytechnic related activities such as cursewrk r research, and fr n ther purpse. Yu shuld nt use these systems fr: Cmmercial r financial gain; Gambling; Unauthrized strage; Attacking r hacking Plytechnic r external resurces Installatin f malicius sftware r cde Disruptive activities t ther students r the Plytechnic as a whle Only install authrized sftware n the Plytechnic s systems. Authrized sftware is sftware that is licensed fr use, legally acquired, and apprved by the Plytechnic fr use. By installing unauthrized sftware yu culd inadvertently intrduce malicius cde and cause great harm t the Plytechnic. Yu culd als break the licensing agreements that the Plytechnic has with varius sftware vendrs, and withut even knwing it. Only use resurces that are fr students. Staff cmputers are fr staff and students shuld nt use them. If yu have a questin as t if a cmputer system is fr student r staff, please ask. We have spent a lt f time and expense installing security safeguards such as anti-virus, persnal firewalls and anti-spyware prgrams n the Plytechnic s ICT systems. Please d nt try and circumvent these safeguards, as yu will be endangering bth the system and yur fellw students. Infrmatin that ges n the Internet frm the Plytechnic is traceable t the Plytechnic. S dn t use the Plytechnic s netwrk t pst r anything that is: Distasteful; Objectinable; Prejudicial t the gd name f Singapre Plytechnic; Illegal as defined under the laws f the Republic f Singapre; nt public Blgs, scial netwrking sites 2, websites, r any ther publicly accessible cmmunicatin channel. Again, gd sense prevails defamatin, prngraphy, pictures that are disturbing if yu think it s bad, then it prbably is. Yu must nt use the Plytechnic s ICT Systems t illicitly exchange 3 r therwise infringe n the cpyrighted intellectual prperty f thers by any means, including but nt limited t the 2 Scial netwrking sites include sites such as MySpace, Facebk, Twitter, Picasa and s n. Versin May 2010 Page 6 f 8

7 use f peer-t-peer r client-t-client technlgies 4, r FTP. If yu have peer-tpeer r client-t-client sftware n yur persnal laptp, either turn it ff r dn t cnnect yur cmputer int the Plytechnic s netwrk. When yu use yur wn cmputer r laptp, yu can nly cnnect it t netwrks that are allcated specifically fr student r guest use. Yu cannt attach it t any netwrk reserved fr the staff f the Plytechnic. If yur cmputer runs the Micrsft Windws perating system, yu must ensure that it has an apprpriate antivirus prgram installed, peratinal and up-t-date befre yu cnnect it t the Plytechnic s netwrk. This is t prtect bth yu and yur fellw students against malware. Ensure that yur cmputer is nt attached t a secnd netwrk 5 and Singapre Plytechnic s netwrk at the same time; fr example, if yu have a USB dngle that facilitates cnnectins t a 3G netwrk, then yu can t use that dngle at the same time as yur cmputer is attached t the Plytechnic s netwrk. 6. Reference Plicy Paragraph , The Plytechnic may have created a student accunt fr yur exclusive use. Yu are fully accuntable fr all s transmitted frm yur Plytechnic accunt s yu must ensure that nbdy else can access this accunt. When yu use yur Plytechnic accunt, yu are in effect representing the Plytechnic. Yu must exercise care and discretin when yu send mail, and yu must nt use yur Plytechnic accunt t: Send spam r cmmercial s; Slicit fr plitical candidates; Engage in illegal, unethical r imprper activities; Disseminate internal addresses t external mailing lists; Cnduct persnal business 3 By illicitly exchange, we mean exchange withut the permissin f the cpyright wner r exchange in vilatin f nrmal fair use principles; this generally applies t music, mvies, sftware, and ther frms f intellectual prperty. 4 Examples include ednkey, Gnutella and Bit Trrent 5 A Secnd Netwrk is meant t be an un-trusted third-party netwrk such as the Internet; the effect f cnnecting a cmputer t tw netwrks at the same time is t circumvent prtectin mechanisms that may be in place n the trusted netwrk. A gd example f cnnecting t a secnd netwrk is at the same time wuld be t cnnect t the SPICE netwrk using a LAN prt while at the same time being cnnected t Wireless@SG n the WiFi prt. Versin May 2010 Page 7 f 8

8 7. Security Vilatins Reference Plicy Paragraph RESTRICTED If yu see smething that yu think might indicate a security prblem, malfunctin f a security device r prgram, r a security vilatin, please prmptly reprt the matter t the SPICE Service Desk it is yur respnsibility t d s. If there is an investigatin being cnducted by the Plytechnic relating t system misuse, abuse r a security incident/vilatin, then yu understand that during the curse f the investigatin the Plytechnic s management has the right t examine yur accunt, s, and user files even n yur PC if yur PC is attached t the Plytechnic s netwrk. Yu als understand that vilatin f the Plytechnics cmputer security plicies and acceptable use plicies is a very serius matter. Vilatins may result in: Fines against the ffending party; Withdrawal f access t the Plytechnic s cmputing resurces and/r netwrk Suspensin r expulsin frm the Plytechnic. Finally, Singapre Plytechnic reserves the right t take disciplinary r legal actin against an ffending user in the event that he r she cnducts himself r herself in any manner which is cnsidered by the Plytechnic t be irrespnsible; r in the event that the individual is misusing the cmputing resurces allcated t him r her. Versin May 2010 Page 8 f 8

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Meopham School Information Technology Code of Conduct

Meopham School Information Technology Code of Conduct 1. Intrductin Infrmatin technlgy resurces are essential fr accmplishing Mepham Schl s missin f pursuing excellence in teaching and learning, research and cmmunity service. Members f the Schl cmmunity are

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

Yur Infrmatin technlgy Security Plicy

Yur Infrmatin technlgy Security Plicy INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE Cunty f Orange Infrmatin Technlgy Usage Plicy 1 INTRODUCTION: The Cunty f Orange Infrmatin Technlgy (IT) Usage Plicy is the fundatin f the Cunty s infrmatin

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

How To Ensure That The Internet Is Safe For A Health Care Worker

How To Ensure That The Internet Is Safe For A Health Care Worker POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy

More information

Amazon Marketing Services Content Policies and Standards

Amazon Marketing Services Content Policies and Standards Amazn Marketing Services Cntent Plicies and Standards Cntents Intrductin... 2 Acceptance f Creative Assets... 2 General Creative Plicies... 3 Reprting Abuse... 3 Cnsequences fr Vilatins... 3 Image Guidelines...

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies

More information

Customers FAQs for Webroot SecureAnywhere Identity Shield

Customers FAQs for Webroot SecureAnywhere Identity Shield Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Aladdin HASP SRM Key Problem Resolution

Aladdin HASP SRM Key Problem Resolution Aladdin HASP SRM Key Prblem Reslutin Installatin flwchart fr EmbrideryStudi and DecStudi e1.5 Discnnect frm the Internet and disable all anti-virus and firewall applicatins. Unplug all dngles. Insert nly

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

FAQs for Webroot SecureAnywhere Identity Shield

FAQs for Webroot SecureAnywhere Identity Shield FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt

More information

CSAT Account Management

CSAT Account Management CSAT Accunt Management User Guide March 2011 Versin 2.1 U.S. Department f Hmeland Security 1 CSAT Accunt Management User Guide Table f Cntents 1. Overview... 1 1.1 CSAT User Rles... 1 1.2 When t Update

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Privacy and Security Training Policy (PS.Pol.051)

Privacy and Security Training Policy (PS.Pol.051) Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider

More information

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free. 990 e-pstcard FAQ Fr frequently asked questins abut filing the e-pstcard that are nt listed belw, brwse the FAQ at http://epstcard.frm990.rg/frmtsfaq.asp# (cpy and paste this link t yur brwser). General

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

IT Help Desk Service Level Expectations Revised: 01/09/2012

IT Help Desk Service Level Expectations Revised: 01/09/2012 IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

SBClient and Microsoft Windows Terminal Server (Including Citrix Server) SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

ISMF Standard 141 Endpoint Protection. OCIO/S4.6 Government standard on cyber security

ISMF Standard 141 Endpoint Protection. OCIO/S4.6 Government standard on cyber security ISMF Standard 141 OCIO/S4.6 Gvernment standard n cyber security Prepared by: Office f the Chief Infrmatin Officer Versin: v1.0 Date: 12 September 2014 GOVERNMENT STANDARD ON CYBER SECURITY OCIO/S4.6 Cnfidentiality:

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

EA-POL-015 Enterprise Architecture - Encryption Policy

EA-POL-015 Enterprise Architecture - Encryption Policy Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet

More information

Social Media Security Awareness for Business or Home Computing Users

Social Media Security Awareness for Business or Home Computing Users Scial Media Security Awareness fr Business r Hme Cmputing Users The purpse f all scial media sites, whether fr business r persnal use, is cmmunicatin, sharing, and smetimes cllabratin. The benefits f the

More information

Preventing Identity Theft

Preventing Identity Theft Preventing Identity Theft Each year, millins f Americans have their identity stlen. ENG Lending wants yu t have the infrmatin yu need t prtect yurself against identity theft. While there are n guarantees

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT 1 FERRIS STATE UNIVERSITY SCHOOL f NURSING CODE f CONDUCT The Schl f Nursing (SON) at Ferris State University uphlds the University Cde f Student Cnduct and the American Nurses Assciatin Cde f Ethics.

More information

Helpdesk Support Tickets & Knowledgebase

Helpdesk Support Tickets & Knowledgebase Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate

More information

For students to participate in BYOD please follow these two steps

For students to participate in BYOD please follow these two steps www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many

More information

Licensing Windows Server 2012 for use with virtualization technologies

Licensing Windows Server 2012 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This

More information

Service Desk Self Service Overview

Service Desk Self Service Overview Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service

More information

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position Psitin Title I.T Prject Officer Classificatin Higher Educatin Wrker, Level 7 Respnsible t The Psitin I.T Manager The psitin assists with the cmpletin f varius IT prjects intended t enable the nging administratin

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services

Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services Erie Cmmunity Cllege Acceptable Use Plicy Last Revisin: December 17, 2009 Cllege Infrmatin Technlgy Services Erie Cmmunity Cllege Cllege Infrmatin Technlgy Services Acceptable Use Plicy Last Revisin:

More information

esupport Quick Start Guide

esupport Quick Start Guide esupprt Quick Start Guide Last Updated: 5/11/10 Adirndack Slutins, Inc. Helping Yu Reach Yur Peak 908.725.8869 www.adirndackslutins.cm 1 Table f Cntents PURPOSE & INTRODUCTION... 3 HOW TO LOGIN... 3 SUBMITTING

More information

Tipsheet: Sending Out Mass Emails in ApplyYourself

Tipsheet: Sending Out Mass Emails in ApplyYourself GEORGETOWN GRADUATE SCHOOL Tipsheet: Sending Out Mass Emails in ApplyYurself In ApplyYurself (AY), it is very simple and easy t send a mass email t all f yur prspects, applicants, r students with applicatins

More information

What Happens To My Benefits If I Get a Bunch of Money? TANF Here is what happens if you are on the TANF program when you get lump-sum income:

What Happens To My Benefits If I Get a Bunch of Money? TANF Here is what happens if you are on the TANF program when you get lump-sum income: 126 Sewall Street Augusta, Maine 04330-6822 TTY/Vice: (207) 626-7058 Fax: (207) 621-8148 www.mejp.rg What Happens T My Benefits If I Get a Bunch f Mney? Each prgram, (TANF, SSI, MaineCare, etc.) has its

More information

Internet and Social Media Solicitations: Wise Giving Tips

Internet and Social Media Solicitations: Wise Giving Tips Internet and Scial Media Slicitatins: Wise Giving Tips Charities use a wide variety f methds t slicit charitable dnatins. New and pwerful technlgies utilize nt just the internet and email, but als scial

More information

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel

More information

Solving the Patch Management Dilemma Using SCCM 2007

Solving the Patch Management Dilemma Using SCCM 2007 White Paper Slving the Patch Management Dilemma Using SCCM 2007 Abstract If yu find it difficult t patch r update yur enterprise cmputers, a Micrsft System Center Family prduct System Center Cnfiguratin

More information

Licensing Windows Server 2012 R2 for use with virtualization technologies

Licensing Windows Server 2012 R2 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs

More information

How To Get A Credit By Examination

How To Get A Credit By Examination LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION FACT SHEET Texas Ri Salad Cllege, a Maricpa Cunty Cmmunity Cllege in Tempe, Arizna, is prud t annunce its Credit by Examinatin prgram in Law Enfrcement

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

Williamson County Board of Education Procedures and Guidelines

Williamson County Board of Education Procedures and Guidelines Williamsn Cunty Bard f Educatin Prcedures and Guidelines Effective Date: 6/21/10; 8/15/11; Page 1 f 7 PURPOSE Williamsn Cunty Schls prvides student and emplyee access t the Internet as a means t increase

More information

StarterPak: Dynamics CRM Opportunity To NetSuite Sales Order

StarterPak: Dynamics CRM Opportunity To NetSuite Sales Order StarterPak: Dynamics CRM Opprtunity T NetSuite Sales Order Versin 1.0 7/20/2015 Imprtant Ntice N part f this publicatin may be reprduced, stred in a retrieval system, r transmitted in any frm r by any

More information

KronoDesk Migration and Integration Guide Inflectra Corporation

KronoDesk Migration and Integration Guide Inflectra Corporation / KrnDesk Migratin and Integratin Guide Inflectra Crpratin Date: September 24th, 2015 0B Intrductin... 1 1B1. Imprting frm Micrsft Excel... 2 6B1.1. Installing the Micrsft Excel Add-In... 2 7B1.1. Cnnecting

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS APPENDIX A FORM ADV (Paper Versin) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS Frm ADV: General Instructins Read these instructins carefully befre

More information

LISTSERV ADMINISTRATION Department of Client Services Information Technology Systems Division

LISTSERV ADMINISTRATION Department of Client Services Information Technology Systems Division LISTSERV ADMINISTRATION Department f Client Services Infrmatin Technlgy Systems Divisin E-MAIL LIST INSTRUCTIONS Yur List s Admin Webpage...2 Fr assistance cntact the Technlgy Assistance Center: 962-4357

More information

Frequently Asked Questions About I-9 Compliance

Frequently Asked Questions About I-9 Compliance Frequently Asked Questins Abut I-9 Cmpliance What is required t verify wrk authrizatin? The basic requirement t verify wrk authrizatin is the Frm I-9. This frm is available n the HR website: http://www.fit.edu/hr/dcuments/frms/i-9.pdf

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information