Information & Communications Technology ICT Security Compliance Guide (Student)
|
|
|
- Lorraine Bradford
- 10 years ago
- Views:
Transcription
1 Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011
2 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr Mar 2010 Initial Release. Replaces Security EMC Cnsultant Plicy Gverning the Use f Cmputer Resurces at the Singapre Plytechnic Nv 2011 Change f passwrd plicy t meet passwrd cmplexity requirement. Anthny Lau Reviewers Name Rle Status All Members Cmmittee n ICT Security Endrsed Anthny Lau ICT Security Manager Endrsed Apprvals Name Title Date Chairman & Members ICT Steering Cmmittee 25 March 2010 Versin May 2010 Page 2 f 8
3 Table f Cntents Dcument Cntrl Intrductin Student Security Awareness Passwrds Yur Accunts Apprpriate Use SP s Cmputer Resurces Security Vilatins... 8 Versin May 2010 Page 3 f 8
4 1. Intrductin As a student f Singapre Plytechnic, yu will make use f the Plytechnic s ICT Assets such as infrmatin, cmputers, netwrks and sftware in yur day-t-day activities. It is imprtant that these imprtant resurces prvide the service t yu and t thers fr which they were intended. An imprtant part f the prper peratin f these ICT Assets is security. Trjans, viruses, wrms and spyware can wreak havc n these assets s the Plytechnic has taken great care t prtect them against such threat. That said, yu, the student, perfrm a very imprtant rle in maintaining the security and availability f the Plytechnics student cmputer resurces. We have written this guide t help explain what yu need t d, and what rules yu need t cmply with t help ensure that the cnfidentiality, availability and integrity f the cmputing resurces f the Plytechnic are prtected. Students must cmply with the ICT Security Plicies f the Plytechnic. These plicies are very serius and are meant t make sure that the Plytechnic s cmputers and netwrks keep running smthly and securely. This cmpliance guide is intended t explain these plicies t yu. All Students f SP are required t strictly cmply with the Infrmatin Cmmunicatins Technlgy (ICT) Security Plicy and Standards issued by the Plytechnic. 2. Student Security Awareness Reference Plicy Paragraph 5.5, Yu shuld receive security awareness training as part f yur intrductin t the Plytechnic. This training will ensure that yu understand the risks and yur respnsibilities twards helping t reduce thse risks. Yu understand that yu are respnsible t cmply with all security related plicies. These plicies are imprtant and prtect nt nly yu, but everybdy else wh needs t use these resurces. 3. Passwrds Reference Plicy Paragraphs , Versin May 2010 Page 4 f 8
5 Yu will be given a passwrd t access any cmputer accunts that yu need. Yu must keep yur passwrd secret, and never ever tell anybdy else what it is 1 ; We have sme rules t help yu select a gd passwrd: It needs t be at least 9 characters lng; It has t cntain at least 1 letter frm the alphabet and 1 number; It can t have blanks; It can t be yur username r User ID; It can t be yur name r part f yur name; It can t cntain yur NRIC/Passprt Number; It can t cntain r be anything that can be assciated with yu, e.g. yur dg s name r street name; It can t cntain YES r NO. S, yu need t use great care when yu pick a passwrd. One easy way t pick ne yu can remember is t think f a phrase. Fr example, the phrase I like Ice Cream culd be cnverted int a passwrd like 1l1ke1cecream by just putting 1 instead f I ; this is a very gd passwrd. (Dn t use this ne thugh!) Dn t write yur passwrd dwn n a piece f paper r put it in a file n a cmputer. Smebdy else culd find it. If yu think smene has guessed yur passwrd, r if yu accidently revealed it t smebdy else, yu need t change it immediately. One mre thing yur passwrd needs t be changed every 180 days, and yu can t use the same passwrd again. 4. Yur Accunts Reference Plicy Paragraph Yur accunt is just that yur accunt, just fr yu and yu alne. Yu cannt share it with smebdy else, fr any reasn. Yu are respnsible fr everything that cmes frm yur accunt. S if smebdy were t send an , write a blg, r pst smething n FaceBk using yur accunt defaming the schl, a teacher, r a friend, it s yur prblem. S again, keeping yur passwrd a secret helps t avid prblems like this. Yu can t use smene else s accunt, just like smene else can t use yurs. Yu als can t d things that attempt t mask yur accunt t thers t try and hide. Yu can't use the Plytechnic s resurces t spy n thers, and yu can t change, read, delete, cpy r therwise mdify anther persns files unless they give yu permissin t d s. 1 One really gd example f when this rule is imprtant is when yu are the ptential victim f a phishing attack, where yu get an asking yu t reveal yur passwrd. A legitimate site r rganizatin will never ever ask yu t reveal yur passwrd. Versin May 2010 Page 5 f 8
6 5. Apprpriate Use SP s Cmputer Resurces Reference Plicy Paragraphs , , , 11.5 The cmputer systems, including netwrks that have been set aside fr yur use are tls t facilitate yur educatin. These systems shuld be usable by yu just the way they are, and yu shuld nt need t change their cnfiguratin r add any sftware. Use cmmn sense in what yu d n these systems - if it feels wrng, it prbably is. Yu shuld nly use Plytechnic cmputer systems and the Plytechnic s netwrks fr Plytechnic related activities such as cursewrk r research, and fr n ther purpse. Yu shuld nt use these systems fr: Cmmercial r financial gain; Gambling; Unauthrized strage; Attacking r hacking Plytechnic r external resurces Installatin f malicius sftware r cde Disruptive activities t ther students r the Plytechnic as a whle Only install authrized sftware n the Plytechnic s systems. Authrized sftware is sftware that is licensed fr use, legally acquired, and apprved by the Plytechnic fr use. By installing unauthrized sftware yu culd inadvertently intrduce malicius cde and cause great harm t the Plytechnic. Yu culd als break the licensing agreements that the Plytechnic has with varius sftware vendrs, and withut even knwing it. Only use resurces that are fr students. Staff cmputers are fr staff and students shuld nt use them. If yu have a questin as t if a cmputer system is fr student r staff, please ask. We have spent a lt f time and expense installing security safeguards such as anti-virus, persnal firewalls and anti-spyware prgrams n the Plytechnic s ICT systems. Please d nt try and circumvent these safeguards, as yu will be endangering bth the system and yur fellw students. Infrmatin that ges n the Internet frm the Plytechnic is traceable t the Plytechnic. S dn t use the Plytechnic s netwrk t pst r anything that is: Distasteful; Objectinable; Prejudicial t the gd name f Singapre Plytechnic; Illegal as defined under the laws f the Republic f Singapre; nt public Blgs, scial netwrking sites 2, websites, r any ther publicly accessible cmmunicatin channel. Again, gd sense prevails defamatin, prngraphy, pictures that are disturbing if yu think it s bad, then it prbably is. Yu must nt use the Plytechnic s ICT Systems t illicitly exchange 3 r therwise infringe n the cpyrighted intellectual prperty f thers by any means, including but nt limited t the 2 Scial netwrking sites include sites such as MySpace, Facebk, Twitter, Picasa and s n. Versin May 2010 Page 6 f 8
7 use f peer-t-peer r client-t-client technlgies 4, r FTP. If yu have peer-tpeer r client-t-client sftware n yur persnal laptp, either turn it ff r dn t cnnect yur cmputer int the Plytechnic s netwrk. When yu use yur wn cmputer r laptp, yu can nly cnnect it t netwrks that are allcated specifically fr student r guest use. Yu cannt attach it t any netwrk reserved fr the staff f the Plytechnic. If yur cmputer runs the Micrsft Windws perating system, yu must ensure that it has an apprpriate antivirus prgram installed, peratinal and up-t-date befre yu cnnect it t the Plytechnic s netwrk. This is t prtect bth yu and yur fellw students against malware. Ensure that yur cmputer is nt attached t a secnd netwrk 5 and Singapre Plytechnic s netwrk at the same time; fr example, if yu have a USB dngle that facilitates cnnectins t a 3G netwrk, then yu can t use that dngle at the same time as yur cmputer is attached t the Plytechnic s netwrk. 6. Reference Plicy Paragraph , The Plytechnic may have created a student accunt fr yur exclusive use. Yu are fully accuntable fr all s transmitted frm yur Plytechnic accunt s yu must ensure that nbdy else can access this accunt. When yu use yur Plytechnic accunt, yu are in effect representing the Plytechnic. Yu must exercise care and discretin when yu send mail, and yu must nt use yur Plytechnic accunt t: Send spam r cmmercial s; Slicit fr plitical candidates; Engage in illegal, unethical r imprper activities; Disseminate internal addresses t external mailing lists; Cnduct persnal business 3 By illicitly exchange, we mean exchange withut the permissin f the cpyright wner r exchange in vilatin f nrmal fair use principles; this generally applies t music, mvies, sftware, and ther frms f intellectual prperty. 4 Examples include ednkey, Gnutella and Bit Trrent 5 A Secnd Netwrk is meant t be an un-trusted third-party netwrk such as the Internet; the effect f cnnecting a cmputer t tw netwrks at the same time is t circumvent prtectin mechanisms that may be in place n the trusted netwrk. A gd example f cnnecting t a secnd netwrk is at the same time wuld be t cnnect t the SPICE netwrk using a LAN prt while at the same time being cnnected t Wireless@SG n the WiFi prt. Versin May 2010 Page 7 f 8
8 7. Security Vilatins Reference Plicy Paragraph RESTRICTED If yu see smething that yu think might indicate a security prblem, malfunctin f a security device r prgram, r a security vilatin, please prmptly reprt the matter t the SPICE Service Desk it is yur respnsibility t d s. If there is an investigatin being cnducted by the Plytechnic relating t system misuse, abuse r a security incident/vilatin, then yu understand that during the curse f the investigatin the Plytechnic s management has the right t examine yur accunt, s, and user files even n yur PC if yur PC is attached t the Plytechnic s netwrk. Yu als understand that vilatin f the Plytechnics cmputer security plicies and acceptable use plicies is a very serius matter. Vilatins may result in: Fines against the ffending party; Withdrawal f access t the Plytechnic s cmputing resurces and/r netwrk Suspensin r expulsin frm the Plytechnic. Finally, Singapre Plytechnic reserves the right t take disciplinary r legal actin against an ffending user in the event that he r she cnducts himself r herself in any manner which is cnsidered by the Plytechnic t be irrespnsible; r in the event that the individual is misusing the cmputing resurces allcated t him r her. Versin May 2010 Page 8 f 8
Internet and E-Mail Policy User s Guide
Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin
RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer
RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible
Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network
2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal
COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
Meopham School Information Technology Code of Conduct
1. Intrductin Infrmatin technlgy resurces are essential fr accmplishing Mepham Schl s missin f pursuing excellence in teaching and learning, research and cmmunity service. Members f the Schl cmmunity are
VCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
Session 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
Immaculate Conception School, Prince George Bring Your Own Device Policy for Students
Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,
IT Account and Access Procedure
IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1
Yur Infrmatin technlgy Security Plicy
INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE Cunty f Orange Infrmatin Technlgy Usage Plicy 1 INTRODUCTION: The Cunty f Orange Infrmatin Technlgy (IT) Usage Plicy is the fundatin f the Cunty s infrmatin
GUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
HIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
Remote Working (Policy & Procedure)
Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer
HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
How To Ensure That The Internet Is Safe For A Health Care Worker
POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy
Amazon Marketing Services Content Policies and Standards
Amazn Marketing Services Cntent Plicies and Standards Cntents Intrductin... 2 Acceptance f Creative Assets... 2 General Creative Plicies... 3 Reprting Abuse... 3 Cnsequences fr Vilatins... 3 Image Guidelines...
Personal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
ensure that all users understand how mobile phones supplied by the council should and should not be used.
Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended
Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013
Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies
Customers FAQs for Webroot SecureAnywhere Identity Shield
Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch
Aladdin HASP SRM Key Problem Resolution
Aladdin HASP SRM Key Prblem Reslutin Installatin flwchart fr EmbrideryStudi and DecStudi e1.5 Discnnect frm the Internet and disable all anti-virus and firewall applicatins. Unplug all dngles. Insert nly
Data Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
FAQs for Webroot SecureAnywhere Identity Shield
FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt
CSAT Account Management
CSAT Accunt Management User Guide March 2011 Versin 2.1 U.S. Department f Hmeland Security 1 CSAT Accunt Management User Guide Table f Cntents 1. Overview... 1 1.1 CSAT User Rles... 1 1.2 When t Update
First Global Data Corp.
First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First
Privacy and Security Training Policy (PS.Pol.051)
Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider
990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.
990 e-pstcard FAQ Fr frequently asked questins abut filing the e-pstcard that are nt listed belw, brwse the FAQ at http://epstcard.frm990.rg/frmtsfaq.asp# (cpy and paste this link t yur brwser). General
Christchurch Polytechnic Institute of Technology Access Control Security Standard
CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin
IT Help Desk Service Level Expectations Revised: 01/09/2012
IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+
Deployment Overview (Installation):
Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int
In addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor
ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library
SBClient and Microsoft Windows Terminal Server (Including Citrix Server)
SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance
Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
ISMF Standard 141 Endpoint Protection. OCIO/S4.6 Government standard on cyber security
ISMF Standard 141 OCIO/S4.6 Gvernment standard n cyber security Prepared by: Office f the Chief Infrmatin Officer Versin: v1.0 Date: 12 September 2014 GOVERNMENT STANDARD ON CYBER SECURITY OCIO/S4.6 Cnfidentiality:
BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS
BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin
EA-POL-015 Enterprise Architecture - Encryption Policy
Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:
Online Banking Agreement
Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet
Social Media Security Awareness for Business or Home Computing Users
Scial Media Security Awareness fr Business r Hme Cmputing Users The purpse f all scial media sites, whether fr business r persnal use, is cmmunicatin, sharing, and smetimes cllabratin. The benefits f the
Preventing Identity Theft
Preventing Identity Theft Each year, millins f Americans have their identity stlen. ENG Lending wants yu t have the infrmatin yu need t prtect yurself against identity theft. While there are n guarantees
THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM
THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant
expertise hp services valupack consulting description security review service for Linux
expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS
FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT
1 FERRIS STATE UNIVERSITY SCHOOL f NURSING CODE f CONDUCT The Schl f Nursing (SON) at Ferris State University uphlds the University Cde f Student Cnduct and the American Nurses Assciatin Cde f Ethics.
Helpdesk Support Tickets & Knowledgebase
Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate
For students to participate in BYOD please follow these two steps
www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many
Licensing Windows Server 2012 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This
Service Desk Self Service Overview
Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service
POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position
Psitin Title I.T Prject Officer Classificatin Higher Educatin Wrker, Level 7 Respnsible t The Psitin I.T Manager The psitin assists with the cmpletin f varius IT prjects intended t enable the nging administratin
A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015
A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY
Erie Community College. Acceptable Use Policy Last Revision: December 17, 2009. College Information Technology Services
Erie Cmmunity Cllege Acceptable Use Plicy Last Revisin: December 17, 2009 Cllege Infrmatin Technlgy Services Erie Cmmunity Cllege Cllege Infrmatin Technlgy Services Acceptable Use Plicy Last Revisin:
esupport Quick Start Guide
esupprt Quick Start Guide Last Updated: 5/11/10 Adirndack Slutins, Inc. Helping Yu Reach Yur Peak 908.725.8869 www.adirndackslutins.cm 1 Table f Cntents PURPOSE & INTRODUCTION... 3 HOW TO LOGIN... 3 SUBMITTING
Tipsheet: Sending Out Mass Emails in ApplyYourself
GEORGETOWN GRADUATE SCHOOL Tipsheet: Sending Out Mass Emails in ApplyYurself In ApplyYurself (AY), it is very simple and easy t send a mass email t all f yur prspects, applicants, r students with applicatins
What Happens To My Benefits If I Get a Bunch of Money? TANF Here is what happens if you are on the TANF program when you get lump-sum income:
126 Sewall Street Augusta, Maine 04330-6822 TTY/Vice: (207) 626-7058 Fax: (207) 621-8148 www.mejp.rg What Happens T My Benefits If I Get a Bunch f Mney? Each prgram, (TANF, SSI, MaineCare, etc.) has its
Internet and Social Media Solicitations: Wise Giving Tips
Internet and Scial Media Slicitatins: Wise Giving Tips Charities use a wide variety f methds t slicit charitable dnatins. New and pwerful technlgies utilize nt just the internet and email, but als scial
CLOUD COMPUTING: SECURITY THREATS AND MECHANISM
CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel
Solving the Patch Management Dilemma Using SCCM 2007
White Paper Slving the Patch Management Dilemma Using SCCM 2007 Abstract If yu find it difficult t patch r update yur enterprise cmputers, a Micrsft System Center Family prduct System Center Cnfiguratin
Licensing Windows Server 2012 R2 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents
Key Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
Malpractice and Maladministration Policy
TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs
How To Get A Credit By Examination
LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION FACT SHEET Texas Ri Salad Cllege, a Maricpa Cunty Cmmunity Cllege in Tempe, Arizna, is prud t annunce its Credit by Examinatin prgram in Law Enfrcement
Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008
Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,
Williamson County Board of Education Procedures and Guidelines
Williamsn Cunty Bard f Educatin Prcedures and Guidelines Effective Date: 6/21/10; 8/15/11; Page 1 f 7 PURPOSE Williamsn Cunty Schls prvides student and emplyee access t the Internet as a means t increase
StarterPak: Dynamics CRM Opportunity To NetSuite Sales Order
StarterPak: Dynamics CRM Opprtunity T NetSuite Sales Order Versin 1.0 7/20/2015 Imprtant Ntice N part f this publicatin may be reprduced, stred in a retrieval system, r transmitted in any frm r by any
KronoDesk Migration and Integration Guide Inflectra Corporation
/ KrnDesk Migratin and Integratin Guide Inflectra Crpratin Date: September 24th, 2015 0B Intrductin... 1 1B1. Imprting frm Micrsft Excel... 2 6B1.1. Installing the Micrsft Excel Add-In... 2 7B1.1. Cnnecting
MaaS360 Cloud Extender
MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument
FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS
APPENDIX A FORM ADV (Paper Versin) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS Frm ADV: General Instructins Read these instructins carefully befre
LISTSERV ADMINISTRATION Department of Client Services Information Technology Systems Division
LISTSERV ADMINISTRATION Department f Client Services Infrmatin Technlgy Systems Divisin E-MAIL LIST INSTRUCTIONS Yur List s Admin Webpage...2 Fr assistance cntact the Technlgy Assistance Center: 962-4357
Frequently Asked Questions About I-9 Compliance
Frequently Asked Questins Abut I-9 Cmpliance What is required t verify wrk authrizatin? The basic requirement t verify wrk authrizatin is the Frm I-9. This frm is available n the HR website: http://www.fit.edu/hr/dcuments/frms/i-9.pdf
Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012
Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.
