Deutsche Bank. Policy Implementation Guideline: Telecommuting
|
|
|
- Lee Warner
- 10 years ago
- Views:
Transcription
1 Deutsche Bank Policy Implementation Guideline: Telecommuting
2 TELECOMMUTING I. Definition: Work from home or anywhere other than the home office enabled by information and communications technology. II. Important Considerations: Proper policy, system controls and reporting must be in place prior to implementation. Culture of trust and output focus within the organisation is a critical enabler for a successful implementation of telecommuting. A degree of control over this FWA is needed depending on the company s policies (security system, clock in hours, reporting). Employees have to be connected and contactable at all times during business hours. The telecommuting work arrangement is exercised with the expectation that the job responsibilities can be successfully completed within the defined time period regardless of work location. The telecommuting work arrangement should be reviewed at least once per year. Employees have to complete the Technology Checklist for home equipment such as laptops and WiFi connectivity. III. Policy Guidelines: Eligibility: All full time employees with work tasks that can be completed off-site (e.g. operations support, sales) Application and Approval Process: A typical application process for telecommuting work arrangement; a. Eligible employees intending to apply for telecommuting work arrangement should discuss their intentions with their immediate supervisor. b. Employees should then apply in writing directly to the relevant approving authority and copy the appropriate individuals. c. The employee should include in the application: Intended duration of telecommuting work arrangement Reasons supporting approval of the telecommuting work arrangement. A formal approval process is required for each individual application that takes into account: a. Employee s job responsibilities. 1
3 b. Employee s eligibility. c. Accountability and reporting structure d. Dependency on other co-workers, managers, internal or external customers e. Access to sensitive or confidential information f. Access to data or sensitive information while away from work. g. Access to software and hardware requirements to support work from home. h. The impacts to the business and the requesting employee. i. Clear communication of expectations. Review of Telecommuting Work Arrangement: a. The telecommuting work arrangement should be reviewed regularly against business needs. b. The employee and supervisor must agree on a review timeline prior to commencing the telecommuting work arrangement in order to evaluate effectiveness of the arrangement. c. Supervisor and HR may enhance or discontinue the policy in alignment with business needs. Expectations of Employees on Telecommuting Work Arrangement: a. Employees on a telecommuting work arrangement will not be excluded from being staffed on out-of-town projects and/or from having to travel as and when required by the business. b. Employees utilising the option are accountable of delivering proven quality of work. c. Employees utilising the option is expected to remain accessible over phone in order to attend to urgent work related matters within the defined working hours. d. Employees utilizing this option should choose a location that is feasible and conducive with no disruption. e. Employees should not consider the option an entitlement and will not abuse the privilege. Rewards and Salary: Typically, telecommuting work arrangement will not have an impact on the employee s salary and bonus. Performance Management: The employer s standard performance management process will continue to apply for employees telecommuting work arrangement. 2
4 Checklist for Employers: Define eligibility of workforce and employees. Develop communication to share the intent of the initiative with eligible employees. Develop Technology Checklist as a guide to employees to ensure laptops, internet connection and other office equipment are adequately setup from home / alternative work location. Encourage eligible employees to initiate request for this arrangement from immediate supervisor. Prepare Work From Home schedule. Share schedule and checklist with the team. Employee and supervisor agree on a review timeline at least once during the business year. Monitor utilisation and effectiveness of telecommuting work arrangement to ensure it does not impact the focus on work delivery and quality of the participating employee. Outline performance improvement process if employees do not adhere to the terms and conditions of telecommuting. 3
5 Technology Checklist Sample: Please confirm the following items are in place prior to commencing telecommuting work arrangement Getting Connected: Stable internet service connectivity. Hardware and Software: Laptop or computer. Headphones and microphones. Webcams (for video conferencing). Pre-installed work-related software. VPN (if applicable). Security: Keep software up-to date to prevent hackers from exploiting security flaws (operating systems, web browsers, third-party plug-ins and other software). Prevent identify theft by protecting account numbers, and other personal information. Turn on personal firewalls. Run antivirus software. Back up files to minimize risk of losing important files. Home Office Equipment: Telephone or VoIP technology (internet-based phone service). Surge protector. Printer or multipurpose machine. External hard disk. 4
MAKING WORK-AT-HOME WORK FOR YOUR COMPANY: PART 2
MAKING WORK-AT-HOME WORK FOR YOUR COMPANY: PART 2 AGENDA IMPLEMENTING WORK-AT-HOME MANAGING YOUR PROGRAM RESOLVING COMMON ISSUES QUESTIONS IN REVIEW THE BUSINESS CASE FOR WORK-AT-HOME: Saves money Increases
Teleworking Technology Guide and Checklist. UW Information Technology. November 2012
Teleworking Technology Guide and Checklist UW Information Technology November 2012 1 Contents Teleworking Technology Guide for UW Faculty and Staff... 3 UW Information Technology Service Catalog and IT
Stable and Secure Network Infrastructure Benchmarks
Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day
Attraction and Retention Series A focus on people and business. Flexible work practices: Assessment proformas Resource document 5
Attraction and Retention Series A focus on people and business Flexible work practices: Assessment proformas Resource document 5 Issue 1 February 2009 Initial Checklist CREATING FLEXIBLE WORKPLACES Please
https://www.mozilla.org/en- US/firefox/new/ http://www.google.com/chrome/
Video Conference Details Below are the details of your videoconference with participants at The University of Queensland. Date Time URL For assistance please call Video Conferencing with UQ The University
NASA DESK GUIDE ON TELEWORK PROGRAMS. Version 2
NASA DESK GUIDE ON TELEWORK PROGRAMS Version 2 Office of Human Capital Management NASA Headquarters NSREF-3000-0012 Document History Log Status (Basic/Revision /Cancelled) Basic Revision (Version 2) Revision
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
Business Checklist for Severe Weather
Business Checklist for Severe Weather When faced with a hurricane watch or warning, flood warning or other impending potential natural disaster, refer to this checklist for guidelines on how to prepare
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Virtual Office Agreement
Virtual Office Agreement Name: Alternative Work Site Information Program: Alternative Work Site Address: Position Number: City, State, Zip: Class Title: Alternative Work Site Phone: ( ) - ext Network ID:
Basics. How can I use the Internet to make free calls?
Basics Use this document with the glossary A helper should take you through this guide Keeping in touch 4.3 Making calls on Skype How can I use the Internet to make free calls? Skype is a free service
Telecommuting Program Manual
Telecommuting Program Manual The Telecommuting Program at the University of Central Florida has been in existence for nearly ten years, offering a flexible work schedule and the ability to work offsite
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems
Employee Injury/Illness Reporting and Managed Return to Work. April 15, 2011 HR 23. Human Resources Responsible Key Business
Managed Return to Work Date Effective April 15, 2011 City Manager Revision Date Effective Code Number HR 23 Human Resources Responsible Key Business Objective: The City of Charlotte seeks to ensure the
School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy
School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy Page 1 of 10 Contents 1 Preamble...3 2 Purpose...3 3 Scope...3 4 Roles and responsibilities...3
Communication systems designed exclusively for small businesses
Allworx 6x Overview Communication systems designed exclusively for small businesses Finally, the phone and PC network system that Saves you money Doesn t compromise on features Provides an easy transition
Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications
Oracle s Solution for Secure Remote Workers Providing Protected Access to Enterprise Communications Our forecast shows that the worldwide mobile worker population will increase to more than 1.3 billion
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
How can I use the internet to make free calls?
Keeping in touch 4.3 Making calls on Skype How can I use the internet to make free calls? Skype is a free service that enables anyone to make free voice or video calls between computers regardless of location.
USING GENIE REMOTELY
USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.
How To Record A Voip Conference On A Computer Or Laptop (For A Free) On A Pc Or Mac) On An Ipod Or Ipod (For Free)
Setting up VOIP conferencing on a PC You must have your computer and an internet connection. Your computer must have a supported sound card (most computers do). It is recommended that you use a computer
How To Manage A Network Safely
ICANWK303A Configure and administer a network operating system Release: 1 ICANWK303A Configure and administer a network operating system Modification History Release Release 1 Comments This Unit first
JOB DESCRIPTION CONTRACTUAL POSITION
Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical
ACCC-ITL QUICK GUIDE Install Blackboard Collaborate - PC
ACCC-ITL QUICK GUIDE Install Blackboard Collaborate - PC Blackboard Collaborate offers a Web Conferencing service as a virtual learning environment to facilitate real-time online learning. Blackboard Collaborate
The benefits of Cloud Computing
WHITE PAPER The benefits of Cloud Computing by Richard Ferriman, CEO (UK) of appichar Ltd The boom in Cloud computing over the past few years has led to a situation that is common to many innovations and
10 How to Accomplish SaaS
10 How to Accomplish SaaS When a business migrates from a traditional on-premises software application model, to a Software as a Service, software delivery model, there are a few changes that a businesses
How To Protect Your Data From Being Hacked
Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW
c) Password Management The assignment/use of passwords is controlled in accordance with the defined Password Policy.
Responsible Office: Chief Information Officer Pages of these Procedures 1 of 5 Procedures of Policy No. (2) - 1. User Access Management a) User Registration The User ID Registration Procedure governs the
Managed Services. Business Intelligence Solutions
Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services
CSG Windows Support Policy
CSG Windows Support Policy This document describes the policies for service and support of computers running Microsoft Windows used by faculty and staff in the departments of Computer Science, Mathematics
For assistance, contact CASL Tech : [email protected]. Usage Requirements 1. System capabilities 5 Instructions for Use.. 6
CASL Video Conference Guide For assistance, contact CASL Tech : [email protected] Table of Contents Usage Requirements 1 - Hardware Requirements 2 - Physical connectivity of the Polycom HDX 7000 unit 3 -
Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service
Services > Overview MaaS360 Ensure Technical Safeguards for EPHI are Working Monitor firewalls, anti-virus packages, data encryption solutions, VPN clients and other security applications to ensure that
Avaya IP Office Unified Communications for Small Business
Avaya IP Office Unified Communications for Small Business Unified Communications for Small Business is a suite of applications that: Turns a home phone into an IP Office telephone with the Phone Manager
PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY
PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY FACT: WORKSTATIONS AND SERVERS ARE STILL AT RISK CONVENTIONAL TOOLS NO LONGER MEASURE
How To Use Blackboard Collaborate Web Conferencing On A Computer Or Phone (For Students)
Texas Southern University Student Guide to Blackboard Collaborate Web Conferencing 1 Table of Contents Page Blackboard Collaborate Web Conferencing System Requirements... 3 Getting Started with Blackboard
A Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2
Course: Information Security Management in e-governance
Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security
White Paper: Introduction to cloud computing
White Paper: Introduction to cloud computing The boom in cloud computing over the past few years has led to a situation that is common to many innovations and new technologies: many have heard of it,
NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
Using Microsoft Lync for Point to Point or Multiparty Connections
Using Microsoft Lync for Point to Point or Multiparty Connections All DEECD employees who have an edumail account, automatically have an MS Lync account. Lync is installed on all Teacher laptops and CASES
LYNC 2013 STAFF GUIDE
LYNC 2013 STAFF GUIDE Updated 21/05/15 This guide provides a comprehensive introduction to Lync. It covers the Lync app, instant messaging, video and telephone conferencing as well as Lync 2013 s integration
Web/Cloud based CATI using quexs
Web/Cloud based CATI using quexs Session 8E 10:45am-12:00pm Tuesday May 17 2011 Presentations and Discussion: Cloud Computing International Field Directors and Technologies Conference 2011 Adam Zammit
Step 1: Select the Start Menu, then Control Panel.
Part of the Adobe Connect 9 software includes functionality to support full audio in addition to chat areas, shared spaces, and video. The technology that makes this possible is Voice- Over-IP (VOIP).
Before you start your SKE course:
Before you start your SKE course: We are looking forward to supporting you in your studies with us. As you know the course is entirely delivered online. In preparation, we just need to check with you about
Contents. Introduction. What is the Cloud? How does it work? Types of Cloud Service. Cloud Service Providers. Summary
Contents Introduction What is the Cloud? How does it work? Types of Cloud Service Cloud Service Providers Summary Introduction The CLOUD! It seems to be everywhere these days; you can t get away from it!
DNA IT - Business IT On Demand
DNA IT - Business IT On Demand September 1 2011 DNA IT White Paper: Introduction to Cloud Computing The boom in cloud computing over the past few years has led to a situation that is common to many innovations
Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed) 01.1 Purpose
Human Capital Management Challenge: Fostering Employee Mentoring, Engagement, and Development in a Limited Budget Environment
Human Capital Management Challenge: Fostering Employee Mentoring, Engagement, and Development in a Limited Budget Environment By Carolyn M. Taylor Chief Human Capital Officer, Government Accountability
Court Services and Offender Supervision Agency Page 2
Court Services and Offender Supervision Agency Page 2 C. Eligible Employee A non-trainee CSOSA employee whose current performance is fully satisfactory ( Fully Met ) or better, is not on a Performance
Total Rewards Overview. For employees in Denmark
Total Rewards Overview For employees in Denmark Page 2 Benefits are an important part of your total compensation, and we re proud to offer a comprehensive, balanced, and competitive benefits package. Keysight
Business Continuity and Disaster Recovery Planning from an Information Technology Perspective
Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Presenter: David Bird, Director of Sales, Business Technology Consultant phone: 215-672-7100 email: [email protected]
SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE
SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE Checklist for taking personally identifiable information (PII) out of the workplace: q Does your organization s policy permit the removal of PII from the office?
Video conferencing with its multiple simultaneous video chats demands a good deal from your computer. The following platforms are required:
VIDEO CONFERENCING TECHNICAL REQUIREMENTS AND SETUP TUTORIAL Conferences are conducted through the class website. No special conferencing software or service is required. Participation requires that your
24x Overview. Communication systems designed exclusively for small businesses
Allworx 24x Overview Communication systems designed exclusively for small businesses Finally, a VoIP system with a fully integrated T1/PRI that Saves you money Doesn t compromise on features Provides an
Sage CRM Technical Specification
Sage CRM Technical Specification Client Software This document outlines the recommended minimum software and hardware requirements for running Sage CRM. Please note that while this document refers to Sage
GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop
Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Contents: Executive Summary... 1
Debunking the Top 10 CloudHosted Virtual Desktop Myths
Debunking the Top 10 CloudHosted Virtual Desktop Myths Page 1 Summary Desktops as a Service (DaaS) is the delivery of a virtual desktop offered as a hosted service offered by a service provider. DaaS has
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
Help Desk Coordinator Provincial Court Judiciary / Office of the Chief Judge
Help Desk Coordinator Provincial Court Judiciary / Office of the Chief Judge POSITION TITLE: Help Desk Coordinator POSITION NUMBER(S): DIVISION: (e.g., Division, Region, Department) UNIT: (e.g., Branch,
Top Desktop Management Pain Points
Top Desktop Management Pain Points 2010 Table of Contents Managing Desktops and Laptops is a Challenge... 3 A Proactive Approach... 3 Asset Inventory is Key... 3 Mobile Workforce Support Challenges...
APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW
EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview
Firewall, Mail and File server solution
Firewall, Mail and File server solution Table of Contents Introduction......2 Overview......3 Detailed description....4 Firewall......4 Other services offered by IPCop:......4 Mail and File Server......5
IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST
INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT
Information Technology Services Core Services SLA
Information Technology Services Information Technology Services Core Services SLA This Service Level Agreement defines the levels of service provided by Information Technology Services to Victoria University
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
VidyoConferencing Network Administrators Guide
VidyoConferencing Network Administrators Guide Windows 8, 7, XP, Vista and Apple Mac OS - updated 30/11/2012 Introduction The Attend Anywhere management platform is a cloud based management, facilitation
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective
Hosted voice pricing begins with a flat monthly rate per line for service and features.
TABLE OF CONTENTS OVERVIEW...3 LOWER START-UP COSTS...4 MAINTENANCE SAVINGS...4 LONG-DISTANCE SAVINGS...4 SCALABILITY AND FLEXIBILITY...4 MULTI-SITE COORDINATION...5 TRAVELING AND REMOTE WORKERS...5 BUSINESS
FORUM FOR THE FUTURE 1040519) 19477-21594 (plus 3550 London Weighting Allowance)
FORUM FOR THE FUTURE Current Holder Job Title: Name of Organisation: Location: Responsible to: Salary: Working Hours: Contract: Special Conditions: Holiday: Equal Opportunities: Vacant IT Support Officer
Recognition of Prior Learning (RPL) Kit. BSB50607 Diploma of Human Resources Management
Recognition of Prior Learning (RPL) Kit BSB50607 Diploma of Human Resources Management Applicant: Date: Diploma of Human Resources Management RPL Kit 1 Applicant declaration: I have completed the following
BCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
Lync Web App 2013 Guide
Lync Web App 2013 Guide Contents Introduction... 1 Getting Started... 2 System Requirements... 2 Install a Webcam... 2 Headsets and Speakerphones... 2 Joining Lync Web App Meetings... 3 Overview... 3 Plug
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications Small businesses will find this booklet useful for learning how VoIP works and for clarifying
ABSENCE FROM WORK ABSENCE FROM WORK
ABSENCE FROM WORK Revised 12/17/2015 Employee Handbook: Absence From Work 1 of 11 VACATION To define time-off from regular work hours. It is company policy to grant time off from work under specific rules
