How To Manage Keys At Trent University
|
|
|
- Marsha Powers
- 5 years ago
- Views:
Transcription
1 POLICY ACCESS CONTROL Category: Approval: Responsibility: Date: Operations & Governance PVP Vice President Administration Date initially approved: September 1, 2005 Date of last revision: April 2012 Definitions: Change Keys keys that allow access into a single room, or a suite of two or three rooms all keyed alike eg. An office or office area. Master Keys keys that allow access into a group of rooms or buildings. Generally, a Grand Master will allow access to all doors on a single keyway; a Master will allow access to all rooms in a building or a number of common function doors in one or more buildings eg, residence rooms, mechanical spaces; a Sub Master will allow access to number of functionally or organizationally related rooms in a building such as all spaces controlled by a University Department. Shift keys one or more keys that are issued to an employee for the duration of their work shift to allow them access to spaces that are not occupied and/or controlled solely by them. For example, several sub-masters to allow a custodian access to all spaces in a building for cleaning. Purpose/Reason for Policy: The purpose of the Access Control Policy is to: protect the personal safety of faculty, staff and students. safeguard both university and privately owned material assets. clearly define the approved procedures and authorities for access control at Trent University. Scope of this Policy: This policy applies to all Trent owned infrastructure and access control systems. It applies to all employees, students, contractors and visitors who require key or card access to Trent infrastructure. Policy Statement: It is the policy of Trent University to safeguard persons and property by controlling access to university buildings so that only authorized users of a space have access to that space. To minimize the risk of lost or stolen keys, Trent University will work towards installing card access systems on all external doors. We will also operate a decentralized key/card access system that places the authority and responsibility for maintaining internal building security through effective key/card control at the departmental level. The Access Control Supervisor will assist departments in establishing and maintaining a key/card access system. 1
2 Responsibilities: VPs, AVPs, Deans, Associate Deans, Department Chairs and Directors are the Designated Access Control Authority for the facilities allocated to their unit. They may delegate the authority to request and control keys/access cards and/or requisition changes to locks to a staff member using the Access Control Delegated Authority Form (Appendix 1), which is to be submitted to the Director, Risk Management. All requests for master keys must be approved by the appropriate Vice-President, AVP or Dean and the Director, Risk Management. Requests for sub-master keys must be approved by all AVPs, Directors or Department Chairs who control spaces that can be accessed by the sub-master. The Director, Risk Management is responsible to approve the selection of cost effective access control hardware and software (standard locking system) to provide appropriate physical security commensurate with the risk inherent in each location. The Director, Risk Management will ensure adherence to this policy and has the authority to deny any requests for keys/cards that contravene the intent of this policy or compromise the security of the university. Such denials may be appealed to the Vice President Administration. The Director, Risk Management is responsible to ensure department key control practices are audited when required. The audit will, as a minimum, verify that unused keys/cards are securely stored, that keys are properly signed out and recovered, that all individuals with keys/cards still have a bona fide requirement for those keys and that the department only retains keys for spaces allocated to that department. The Locksmith and Locksmith assistants are responsible for the maintenance, repair and replacement of door lock cylinders and lock sets. They are responsible to receive key/card and lock change requests, ensure that the requests are signed by a valid Authority and perform the requested work within a reasonable time frame. The Locksmith is responsible to maintain up to date records of all keys produced, issued, returned and destroyed, as well as the keyways and codes for all locking devices installed throughout the university, with the exception of desks, cabinets etc. The Designated/Delegated Authorities (hereafter referred to as the Authority ) are responsible to secure keys/cards that have not been issued. The Authority is responsible to keep a record of all keys issued to faculty, staff, students, contractors and visitors and ensure that those keys are returned when the individual is no longer authorized to have access to the space. Authorities must ensure individuals who are not faculty, staff or students at Trent University read and sign the Key Holder Agreement (Appendix 2) when they are issued university keys/cards. Students, staff and faculty are to be informed by the Authority that they are required to read and comply with this policy when their keys/cards are issued. Authorities requesting a change or upgrade to the standard locking system such as re-keying, replacing lock sets and cylinders or installation of a different security system such as electronic (keypad), biometric or card access, are responsible to cover the cost of the change and the ongoing cost of maintaining the upgraded locking system from their departmental operating budget, unless the Director, Risk Management determines that the upgrade is required for the university to maintain appropriate security. The criteria for approving upgrades to the standard locking system are if the space is multi-occupant (4 or more) and/or if the space contains extremely sensitive, vulnerable, dangerous or valuable contents that cannot be effectively secured by the standard locking system. The department is also responsible for the cost of replacing lost, stolen, broken or worn keys and the cost of re-keying in the event of lost or stolen keys. The department may recover these costs at their discretion from the individual who has signed out the keys. Keyholders. Keys to University spaces issued to individuals affiliated with the university remain the property of Trent University. Upon receipt of a key/card, the individual key/card holder agrees: a. to the proper use and care of the key/card; b. not to loan, duplicate or use the key/card in any unauthorized manner; 2
3 c. to return it to the issuing authority upon demand. All Trent community members are responsible to refrain from installing unauthorized locking devices on university doors. To ensure access in the event of an emergency, no campus area may be secured except by a locking device approved by the Locksmith. Keys to filing cabinets, desks, cabinets, lockers etc. will remain the responsibility of the person in charge of the area. Space allocation authorities are responsible to provide up to date lists annually to the Director, Risk Management of rooms and spaces allocated to each department/unit on campus. They are also to advise the Director, Risk Management of any changes to those lists as they occur. Contact Officer Director, Risk Management Date for Next Review 2015 May 01 Related Policies, Procedures and Guidelines Policies Superseded by This Policy Campus Card Policy N/A 3
4 APPENDIX B PROCEDURE ACCESS CONTROL Contact Officer Director, Risk Management Purpose To detail the procedures for obtaining, safeguarding and disposing of keys and key cards, and effecting repairs or changes to access control hardware. Procedure Designated or delegated authority A Trent University Key Request Form (Appendix 3) must be completed and signed by the Authority for all key/card requests. Forms can be found at The completed form must be submitted to [email protected] or by fax to as per the instructions on the form. PROCEDURE authority Keyholder When the locksmith completes an order, the Authority will be informed to make pick up arrangements. The Authority will sign out the keys to individual recipients, keeping a written record of each key issue and informing the recipient of their responsibilities under this policy. A sample Key Control Record is attached at Appendix 4. A downloadable database called Simkey, which is compatible with the locksmith s key control database, is available at Username is Trent and password is University. The Key Holder Agreement Form (Appendix 2) must be completed before keys are issue to any individuals who are not Trent University faculty, staff or students. All lost or stolen building keys/cards must be reported to Campus Security and the appropriate Authority. The Authority will complete a Key Request Form (Appendix 3) if replacement keys are required and a will [email protected] to initiate lock cylinder changes or other lock related work as required. The Authority may consult the Access Control Supervisor or the Director, Risk Management to reach a mutual decision on lock changes based on the risk involved. Lost or stolen cards will be immediately deprogrammed. Costs associated with the missing key/card are born by the issuing department who may in turn assess these costs against the individual who lost the key/card. It is recommended that departments create internal policies to clearly outline who is responsible for the cost of replacing lost keys/cards, any contingent changes to locks and/or any damages or losses to Trent property resulting from the loss of the key/card. 3 Authorities Authorities will ensure that individuals return their keys/cards when they are no longer affiliated with the department, or when they are no longer authorized to access a particular room or building. Returned keys may 4
5 be retained by the Authority for reissue to the replacement staff member, unless they have an employee number stamped on them. In such cases, the key is to be returned to the Locksmith for re-stamping. As well, Authorities will promptly return all keys/cards to the locksmith that are no longer required by that department. Examples include reductions in staff or a reallocation of space. Authority Only the locksmith or a contractor authorized by the Access Control Supervisor are authorized to re-key, repair and relocate university lock cylinders or arrange the installation of new locking systems. All repairs or additions to any locking device, key or door hardware will be controlled by the Risk Management Department and documented with a work request to [email protected]. Authorities Contractors requiring access to specific areas on campus may be issued keys by Campus Security, Physical Resources or Information Technology. The Authority for a department sponsoring contractor work may request single keys or contractor rings made up of a number of keys using the key request form (Appendix 3). The requester will indicate that these keys are for contractor use. Master keys will not normally be issued to contractors unless approved by the appropriate Vice President, the Director, Risk Management and Director of Physical Resources or Information Technology. When the locksmith produces the keys, the key ring is to be locked to reduce the chances of loss and print do not duplicate on each key. The entire key set, with each key itemized, will be issued to and signed for by the requesting department authority. The department is then responsible to secure these sets and issue them to contractors in accordance with the following procedures: a. the contracting authority provides the name of the company and/or tradesperson contracted to do the work as well as the areas to which they are to have access and the duration of that access. b. the contractor/tradesperson provides photo ID to verify that they are employees of the contracted firm. c. the contractor signs a key holder agreement form (Appendix 2) and signs for each key/key ring. d. the issuing authority advises the contractor of when and where to return the keys and ensures that the keys are returned as required. If the contractor arrives when the Parking Office is closed, they will contact the on duty Security Officer by phone to arrange return or issue of keys. 8.2 If a sponsoring department requires Campus Security to issue keys or access contractors on their behalf, they will provide the information in para 8.1.a to Campus Security, along with the appropriate keys (where applicable). Authority 8.3 Shift Keys are useful for employees who require access to university spaces in excess of their normal workplace, such as security officers, custodians, residence staff, PRD staff, IT staff and anyone who needs a master key or building master to perform their duties. These keys are not to be removed from Trent property because the impact of 5
6 them being lost or stolen is significant. The risk of criminal acts, including crimes against persons, and the cost of re-keying an entire building or buildings are high. These keys are not issued to a specific individual, rather they are placed on a locked key chain, secured within the department and signed out for a shift and returned at the end of that shift. Key holders may be permanently issued a single building and/or office key to access the shift keys. Shift keys may be issued by an individual or though an automated key watcher system. 8.4 Master Keys are to be treated with the greatest care and not to be issued to individuals unless approved by the appropriate Vice President, AVP or Dean and the Director, Risk Management. Individuals in permanent possession of Master keys must provide a Canadian Police Information Certificate (police records check) to the Director, Risk Management before the keys are issued. Master keys will normally be treated as shift keys and remain on site in a secure key lockup when the regular user is not at work. Grand Master keys will not be issued to anyone other than the locksmith and Campus Security. All master keys will be stamped do not duplicate. Date Approved Approval Authority Date of Commencement Month Day Year PVPs, VP, Dean, Director, etc. Year Month Day Amendment Dates List the dates the policy has been amended (Year Month Day ) Date for Next Review Related Policies, Procedures and Guidelines Year Month Day Name and link to related policies, procedures and guidelines 6
7 APPENDIX C GUIDELINE TEMPLATE NAME OF GUIDELINE Contact Officer Provide the position title rather than the name of a person Purpose A statement about the purpose of the guideline. Guideline Actual guideline. Related Policies / Procedures Name and link to related policies, procedures and guidelines. Links Links to relevant documentation, forms, explanatory notes. Date Approved Approval Authority Year Month Day Board, Senate, PVPs, VP, Dean, Director, etc. 7
Security, Access Management and Key Control Policy and Procedures
1 Policy Security, Access Management and Key Control Policy 1.1.1 The goal of the Vice President, Business Affairs and Facilities and Services is to provide a safe, comfortable, secure learning environment
FACILITIES MANAGEMENT DEPARTMENT
FACILITIES MANAGEMENT DEPARTMENT Policy Title: Key Control and Card Access Policy Policy Number D-12 Section: Safety and Security Effective Date: April 12, 2007 Last Review: April 12, 2007 Purpose: The
Access Control Regulations
Access Control Regulations 6 August 2008 1 TABLE OF CONTENTS I. Regulations... 3 II. Introduction... 3 III. Definitions... 3 IV. Single Access Control Alarm Coordinator (SACC)... 4 V. Access to Closed
KEY / CARD ACCESS CONTROL POLICY FOR FACULTY, STAFF AND STUDENTS
Facilities Management Revised 4/12/2010 KEY / CARD ACCESS CONTROL POLICY FOR FACULTY, STAFF AND STUDENTS I. Purpose II. Scope The purpose of the Key/ Card Access Control Policy is to provide reasonable
CAMPUS KEY POLICY. Gerry, Bomotti, Senior Vice President for Finance and Business
Gerry, Bomotti, Senior Vice President for Finance and Business 1. PURPOSE The purpose of this policy is to provide optimal physical security and safety for building occupants and to protect the assets
University of Nevada, Reno. UNR Building Access Cards and Key Control Procedures 1
University of Nevada, Reno Building Access Cards and Key Control Procedures PURPOSE The purpose of this document is to specify procedures for obtaining access to facilities using card keys and hard keys,
PHYSICAL ACCESS CONTROL
Contact: Administrative Services Issued: June 24, 2013 Supersedes: Keys - Administration and Control of Keys, September 2007; and Keys - Issuance and Retrieval, March 1986 Pages: 13 OVERVIEW PHYSICAL ACCESS
Key and Lock Change Guidelines
Applies to: All University Employees Issued: August 2013 TABLE OF CONTENTS I. PURPOSE:... 2 II. DEFINITIONS:.2 III. BACKGROUND:... 5 IV. GUIDELINES:... 5 1. Key Request:.5 2. Key Control: 10 3. Key Fabrication/Completion:.
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
UNIVERSITY EQUIPMENT
Authority: History: Source of Authority: 05.164 Related Links: Responsible Office: UNIVERSITY EQUIPMENT Vice Chancellor for Business Affairs Effective September 20, 1994; Updated October 16, 1995; Updated
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04
2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04 A. Keys 1) Sul Ross State University maintains a centralized key and lock system to enhance the control and security of property
8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES. Policy Statement COLLEGE OF CHARLESTON POLICY ON
OFFICIAL POLICY 8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES 03/21/11 Policy Statement COLLEGE OF CHARLESTON POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES 1.0 PURPOSE OF POLICY The purpose
Account Management Standards
Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
KEY AND LOCK POLICY Physical Plant Division April 2003
Physical Plant Division April 2003 Revised June 2003 Revised March 2004 Revised August 2004 APRIL 2003 (Revision: February 2004) Table of Contents Page A. Objective 1 B. General 1 C. Responsibilities 1
BEConnected User Agreement
BEConnected User Agreement Page 1 of 5 INTRODUCTION This is a legal document between you and the owner ( Belmont College ) of the Apple ipad tablet ( ipad ) in connection with the delivery of an ipad to
New River Community College. Information Technology Policy and Procedure Manual
New River Community College Information Technology Policy and Procedure Manual 1 Table of Contents Asset Management Policy... 3 Authentication Policy... 4 Breach Notification Policy... 6 Change Management
KEY, SWIPE CARD AND ELECTRONIC FOB POLICY
KEY, SWIPE CARD AND ELECTRONIC FOB POLICY DOCUMENT CONTROL Version: 3 Ratified by: Risk Management Group Date Ratified: 30 th April 2014 Name of originator / author: Head of Health, Safety & Security Name
AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND
AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND THIS AGREEMENT for Access to Protected Health Information ( PHI ) ( Agreement ) is entered
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
FLORIDA ATLANTIC UNIVERSITY. Property Policy
FLORIDA ATLANTIC UNIVERSITY Property Policy 2014 1 Table of Contents 1. PURPOSE 2. INTRODUCTION 3. DEFINITIONS 3.1. Property 3.2. Property Manager 3.3. Accountable Officer 3.4. Surplus 3.5. Salvage 3.6.
Administration Procedure
Administration Procedure Complete Procedure Title: Procedures related to Tracking, Loss, Damage and Disposition of University Assets Approved by: Assistant Vice President Administration and CFO Date of
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
HIPAA SECURITY RULES FOR IT: WHAT ARE THEY?
HIPAA SECURITY RULES FOR IT: WHAT ARE THEY? HIPAA is a huge piece of legislation. Only a small portion of it applies to IT providers in healthcare; mostly the Security Rule. The HIPAA Security Rule outlines
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
DEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
Overview. Responsibility
Overview Property management is an important function at the University. Prudent inventory practices help protect the University s multi-million dollar investment in equipment, provide documentation needed
OFFICE OF THE PREMIER ACCESS CONTROL POLICY
OFFICE OF THE PREMIER ACCESS CONTROL POLICY - 1 THE ACCESS CONTROL POLICY 1. Purpose 1.1 To propose for the introduction of an ID card policy for the Office of the Premier. 2. Background 2.1 The Office
IT FACILITY STANDARD NO. 5 DATA CENTER & IT FACILITY ACCESS
Function Affected: IT Facilities including data centers and network rooms (BDFs and IDFs) Issued Date: 06/01/15 Issue Superseded: 12/15/13 Number of Pages: 6 I. Background The UCSF data centers and network
1.0 PREAMBLE... 2 2.0 WEB POLICY...
Name: Web Policy and Procedures Policy Number: 2-2003 Origin: Information Technology Systems & Support (ITSS) Approved: 28 July 2004 Issuing Authority: Executive Management Group Responsibility: Director,
This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.
Privacy Breach No.: 6700 PR2 Policy Reference: 6700 Category: Information Management Department Responsible: Privacy and Records Management Current Approved Date: 2012 May 01 Objectives This procedure
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
Equipment Management Guidelines
Equipment Management Guidelines The following guidelines were developed by the CSU Financial Officers Association to assist campuses in implementing Executive Order 649, Safeguarding State Property. Revised
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) 2. Name of IT System: Defense Biometric Identification System (DBIDS)
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) (Use N/A where appropriate) 1. DoD Component: Defense Manpower Data Center (DMDC) 2. Name of IT System: Defense Biometric Identification System (DBIDS) 3. Budget
IT TECHNOLOGY ACCESS POLICY
IT TECHNOLOGY ACCESS POLICY Effective Date May 19, 2016 Cross- Reference 1. IT Access Control and User Access Management Policy Responsibility Director, Information 2. IT Acceptable Use Policy Technology
Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY
Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140
IT Governance Committee Review and Recommendation
IT Governance Committee Review and Recommendation Desired Change: Approval of this policy will establish Security Standards for the UCLA Logon Identity for anyone assigned a UCLA Logon ID/password and
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Access Control REFERENCE:
UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Access Control REFERENCE: CATEGORY: Real Estate and Facilities PAGE: 1 of 6 SUPERSEDES: APPROVER: Larry Marbert Vice President, Real Estate and Facilities
PROCEDURES for CAMPUS CASH MANAGEMENT POLICY ADM-0113 California State University, Sacramento. CASH HANDLING Updated February 2014
PROCEDURES for CAMPUS CASH MANAGEMENT POLICY ADM-0113 California State University, Sacramento CASH HANDLING Updated February 2014 I. ACCEPTING UNIVERSITY FUNDS II. III. IV. CASH CHANGE FUNDS SAFEGUARDING
University Policy: Corporate Credit Card Policy and Procedures
University Policy: Corporate Credit Card Policy and Procedures Policy Category: Operational Policies Subject: Use of Corporate Credit Card Office Responsible for Review of this Policy: Office of Finance
4.00 Student means a Student registered, enrolled or participating in any course or program offered by the university.
ENVIRONMENTAL HEALTH AND SAFETY POLICY University Policy No: SS9200 Classification: Safety and Security Approving authority: Board of Governors Effective date: March, 2012 Supersedes: May, 1999 Last Editorial
13.19 ETHICS REPORTING POLICY AND PROCEDURE
13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment
Data Center Access Policies and Procedures
Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 1 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,
Key Management Policy
THE LAMBTON COLLEGE OF APPLIED ARTS AND TECHNOLOGY Issued Date: Supersedes Date: Policy #: January 04, 2006 October 02, 2003 4000-4-7 Key Management Policy Policy It is the policy of the Lambton College
Wright State University Information Security
Wright State University Information Security Controls Policy Title: Category: Audience: Reason for Revision: Information Security Framework Information Technology WSU Faculty and Staff N/A Created / Modified
California State University, East Bay Property Management. Policies And Procedures
California State University, East Bay Property Management Policies And Procedures PROPERTY MANAGEMENT POLICIES AND PROCEDURES Table of Contents 1.0 INTRODUCTION 3 2.0 DEFINITIONS 3 2.1 Definition of Equipment
Competitive Bid Request for Proposal Re-Keying Project Fairfield & Alfond Campuses
Competitive Bid Request for Proposal Re-Keying Project Fairfield & Alfond Campuses 1.0 Overview and Objectives Kennebec Valley Community College (KVCC) is requesting proposals from experienced and qualified
PROCEDURES: Purchasing Policy
AUTHORITY: University Administration POLICY: A:VPFA # / RESPONSIBILITY: Vice President Finance and Administration Effective Date: April 1, 2013 Purpose To implement the, the following specific actions
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee
Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting
Purchasing Card Procedure Manual
Purchasing Card Procedure Manual Draft 05/26/11 Table of Contents PURCHASING CARD PROGRAM... 3 ACQUIRING A PURCHASING CARD... 3 TRAINING... 4 ACTIVATION AND RENEWAL... 4 CARDHOLDER ROLES & RESPONSIBILITIES...
WINONA STATE UNIVERSITY TRAVEL CREDIT CARD PROGRAM USERS GUIDE
WINONA STATE UNIVERSITY TRAVEL CREDIT CARD PROGRAM USERS GUIDE 1 WSU TRAVEL CARD PROGRAM Part 1. Authority MnSCU System Procedure 7.3.3 Credit Cards, provides authority for a college, university or office
REMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
MOBILE DEPOSIT AGREEMENT AND DISCLOSURE ONLINE BANKING AGREEMENT ADDENDUM
MOBILE DEPOSIT AGREEMENT AND DISCLOSURE ONLINE BANKING AGREEMENT ADDENDUM This Addendum ( Addendum ) to the Citizens State Bank of Paola Online Banking Agreement between you and Citizens State Bank of
SECTION 15 INFORMATION TECHNOLOGY
SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
