Deutsche Bank. Policy Implementation Guideline: Telecommuting

Size: px
Start display at page:

Download "Deutsche Bank. Policy Implementation Guideline: Telecommuting"

Transcription

1 Deutsche Bank Policy Implementation Guideline: Telecommuting

2 TELECOMMUTING I. Definition: Work from home or anywhere other than the home office enabled by information and communications technology. II. Important Considerations: Proper policy, system controls and reporting must be in place prior to implementation. Culture of trust and output focus within the organisation is a critical enabler for a successful implementation of telecommuting. A degree of control over this FWA is needed depending on the company s policies (security system, clock in hours, reporting). Employees have to be connected and contactable at all times during business hours. The telecommuting work arrangement is exercised with the expectation that the job responsibilities can be successfully completed within the defined time period regardless of work location. The telecommuting work arrangement should be reviewed at least once per year. Employees have to complete the Technology Checklist for home equipment such as laptops and WiFi connectivity. III. Policy Guidelines: Eligibility: All full time employees with work tasks that can be completed off-site (e.g. operations support, sales) Application and Approval Process: A typical application process for telecommuting work arrangement; a. Eligible employees intending to apply for telecommuting work arrangement should discuss their intentions with their immediate supervisor. b. Employees should then apply in writing directly to the relevant approving authority and copy the appropriate individuals. c. The employee should include in the application: Intended duration of telecommuting work arrangement Reasons supporting approval of the telecommuting work arrangement. A formal approval process is required for each individual application that takes into account: a. Employee s job responsibilities. 1

3 b. Employee s eligibility. c. Accountability and reporting structure d. Dependency on other co-workers, managers, internal or external customers e. Access to sensitive or confidential information f. Access to data or sensitive information while away from work. g. Access to software and hardware requirements to support work from home. h. The impacts to the business and the requesting employee. i. Clear communication of expectations. Review of Telecommuting Work Arrangement: a. The telecommuting work arrangement should be reviewed regularly against business needs. b. The employee and supervisor must agree on a review timeline prior to commencing the telecommuting work arrangement in order to evaluate effectiveness of the arrangement. c. Supervisor and HR may enhance or discontinue the policy in alignment with business needs. Expectations of Employees on Telecommuting Work Arrangement: a. Employees on a telecommuting work arrangement will not be excluded from being staffed on out-of-town projects and/or from having to travel as and when required by the business. b. Employees utilising the option are accountable of delivering proven quality of work. c. Employees utilising the option is expected to remain accessible over phone in order to attend to urgent work related matters within the defined working hours. d. Employees utilizing this option should choose a location that is feasible and conducive with no disruption. e. Employees should not consider the option an entitlement and will not abuse the privilege. Rewards and Salary: Typically, telecommuting work arrangement will not have an impact on the employee s salary and bonus. Performance Management: The employer s standard performance management process will continue to apply for employees telecommuting work arrangement. 2

4 Checklist for Employers: Define eligibility of workforce and employees. Develop communication to share the intent of the initiative with eligible employees. Develop Technology Checklist as a guide to employees to ensure laptops, internet connection and other office equipment are adequately setup from home / alternative work location. Encourage eligible employees to initiate request for this arrangement from immediate supervisor. Prepare Work From Home schedule. Share schedule and checklist with the team. Employee and supervisor agree on a review timeline at least once during the business year. Monitor utilisation and effectiveness of telecommuting work arrangement to ensure it does not impact the focus on work delivery and quality of the participating employee. Outline performance improvement process if employees do not adhere to the terms and conditions of telecommuting. 3

5 Technology Checklist Sample: Please confirm the following items are in place prior to commencing telecommuting work arrangement Getting Connected: Stable internet service connectivity. Hardware and Software: Laptop or computer. Headphones and microphones. Webcams (for video conferencing). Pre-installed work-related software. VPN (if applicable). Security: Keep software up-to date to prevent hackers from exploiting security flaws (operating systems, web browsers, third-party plug-ins and other software). Prevent identify theft by protecting account numbers, and other personal information. Turn on personal firewalls. Run antivirus software. Back up files to minimize risk of losing important files. Home Office Equipment: Telephone or VoIP technology (internet-based phone service). Surge protector. Printer or multipurpose machine. External hard disk. 4

MAKING WORK-AT-HOME WORK FOR YOUR COMPANY: PART 2

MAKING WORK-AT-HOME WORK FOR YOUR COMPANY: PART 2 MAKING WORK-AT-HOME WORK FOR YOUR COMPANY: PART 2 AGENDA IMPLEMENTING WORK-AT-HOME MANAGING YOUR PROGRAM RESOLVING COMMON ISSUES QUESTIONS IN REVIEW THE BUSINESS CASE FOR WORK-AT-HOME: Saves money Increases

More information

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012 Teleworking Technology Guide and Checklist UW Information Technology November 2012 1 Contents Teleworking Technology Guide for UW Faculty and Staff... 3 UW Information Technology Service Catalog and IT

More information

Stable and Secure Network Infrastructure Benchmarks

Stable and Secure Network Infrastructure Benchmarks Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day

More information

Attraction and Retention Series A focus on people and business. Flexible work practices: Assessment proformas Resource document 5

Attraction and Retention Series A focus on people and business. Flexible work practices: Assessment proformas Resource document 5 Attraction and Retention Series A focus on people and business Flexible work practices: Assessment proformas Resource document 5 Issue 1 February 2009 Initial Checklist CREATING FLEXIBLE WORKPLACES Please

More information

https://www.mozilla.org/en- US/firefox/new/ http://www.google.com/chrome/

https://www.mozilla.org/en- US/firefox/new/ http://www.google.com/chrome/ Video Conference Details Below are the details of your videoconference with participants at The University of Queensland. Date Time URL For assistance please call Video Conferencing with UQ The University

More information

NASA DESK GUIDE ON TELEWORK PROGRAMS. Version 2

NASA DESK GUIDE ON TELEWORK PROGRAMS. Version 2 NASA DESK GUIDE ON TELEWORK PROGRAMS Version 2 Office of Human Capital Management NASA Headquarters NSREF-3000-0012 Document History Log Status (Basic/Revision /Cancelled) Basic Revision (Version 2) Revision

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

Business Checklist for Severe Weather

Business Checklist for Severe Weather Business Checklist for Severe Weather When faced with a hurricane watch or warning, flood warning or other impending potential natural disaster, refer to this checklist for guidelines on how to prepare

More information

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information

More information

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical

More information

Virtual Office Agreement

Virtual Office Agreement Virtual Office Agreement Name: Alternative Work Site Information Program: Alternative Work Site Address: Position Number: City, State, Zip: Class Title: Alternative Work Site Phone: ( ) - ext Network ID:

More information

Basics. How can I use the Internet to make free calls?

Basics. How can I use the Internet to make free calls? Basics Use this document with the glossary A helper should take you through this guide Keeping in touch 4.3 Making calls on Skype How can I use the Internet to make free calls? Skype is a free service

More information

Telecommuting Program Manual

Telecommuting Program Manual Telecommuting Program Manual The Telecommuting Program at the University of Central Florida has been in existence for nearly ten years, offering a flexible work schedule and the ability to work offsite

More information

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems

More information

Employee Injury/Illness Reporting and Managed Return to Work. April 15, 2011 HR 23. Human Resources Responsible Key Business

Employee Injury/Illness Reporting and Managed Return to Work. April 15, 2011 HR 23. Human Resources Responsible Key Business Managed Return to Work Date Effective April 15, 2011 City Manager Revision Date Effective Code Number HR 23 Human Resources Responsible Key Business Objective: The City of Charlotte seeks to ensure the

More information

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy Page 1 of 10 Contents 1 Preamble...3 2 Purpose...3 3 Scope...3 4 Roles and responsibilities...3

More information

Communication systems designed exclusively for small businesses

Communication systems designed exclusively for small businesses Allworx 6x Overview Communication systems designed exclusively for small businesses Finally, the phone and PC network system that Saves you money Doesn t compromise on features Provides an easy transition

More information

Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications

Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications Oracle s Solution for Secure Remote Workers Providing Protected Access to Enterprise Communications Our forecast shows that the worldwide mobile worker population will increase to more than 1.3 billion

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

How can I use the internet to make free calls?

How can I use the internet to make free calls? Keeping in touch 4.3 Making calls on Skype How can I use the internet to make free calls? Skype is a free service that enables anyone to make free voice or video calls between computers regardless of location.

More information

USING GENIE REMOTELY

USING GENIE REMOTELY USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.

More information

How To Record A Voip Conference On A Computer Or Laptop (For A Free) On A Pc Or Mac) On An Ipod Or Ipod (For Free)

How To Record A Voip Conference On A Computer Or Laptop (For A Free) On A Pc Or Mac) On An Ipod Or Ipod (For Free) Setting up VOIP conferencing on a PC You must have your computer and an internet connection. Your computer must have a supported sound card (most computers do). It is recommended that you use a computer

More information

How To Manage A Network Safely

How To Manage A Network Safely ICANWK303A Configure and administer a network operating system Release: 1 ICANWK303A Configure and administer a network operating system Modification History Release Release 1 Comments This Unit first

More information

JOB DESCRIPTION CONTRACTUAL POSITION

JOB DESCRIPTION CONTRACTUAL POSITION Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical

More information

ACCC-ITL QUICK GUIDE Install Blackboard Collaborate - PC

ACCC-ITL QUICK GUIDE Install Blackboard Collaborate - PC ACCC-ITL QUICK GUIDE Install Blackboard Collaborate - PC Blackboard Collaborate offers a Web Conferencing service as a virtual learning environment to facilitate real-time online learning. Blackboard Collaborate

More information

The benefits of Cloud Computing

The benefits of Cloud Computing WHITE PAPER The benefits of Cloud Computing by Richard Ferriman, CEO (UK) of appichar Ltd The boom in Cloud computing over the past few years has led to a situation that is common to many innovations and

More information

10 How to Accomplish SaaS

10 How to Accomplish SaaS 10 How to Accomplish SaaS When a business migrates from a traditional on-premises software application model, to a Software as a Service, software delivery model, there are a few changes that a businesses

More information

How To Protect Your Data From Being Hacked

How To Protect Your Data From Being Hacked Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW

More information

c) Password Management The assignment/use of passwords is controlled in accordance with the defined Password Policy.

c) Password Management The assignment/use of passwords is controlled in accordance with the defined Password Policy. Responsible Office: Chief Information Officer Pages of these Procedures 1 of 5 Procedures of Policy No. (2) - 1. User Access Management a) User Registration The User ID Registration Procedure governs the

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

CSG Windows Support Policy

CSG Windows Support Policy CSG Windows Support Policy This document describes the policies for service and support of computers running Microsoft Windows used by faculty and staff in the departments of Computer Science, Mathematics

More information

For assistance, contact CASL Tech : [email protected]. Usage Requirements 1. System capabilities 5 Instructions for Use.. 6

For assistance, contact CASL Tech : casltech@ucd.ie. Usage Requirements 1. System capabilities 5 Instructions for Use.. 6 CASL Video Conference Guide For assistance, contact CASL Tech : [email protected] Table of Contents Usage Requirements 1 - Hardware Requirements 2 - Physical connectivity of the Polycom HDX 7000 unit 3 -

More information

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service Services > Overview MaaS360 Ensure Technical Safeguards for EPHI are Working Monitor firewalls, anti-virus packages, data encryption solutions, VPN clients and other security applications to ensure that

More information

Avaya IP Office Unified Communications for Small Business

Avaya IP Office Unified Communications for Small Business Avaya IP Office Unified Communications for Small Business Unified Communications for Small Business is a suite of applications that: Turns a home phone into an IP Office telephone with the Phone Manager

More information

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY FACT: WORKSTATIONS AND SERVERS ARE STILL AT RISK CONVENTIONAL TOOLS NO LONGER MEASURE

More information

How To Use Blackboard Collaborate Web Conferencing On A Computer Or Phone (For Students)

How To Use Blackboard Collaborate Web Conferencing On A Computer Or Phone (For Students) Texas Southern University Student Guide to Blackboard Collaborate Web Conferencing 1 Table of Contents Page Blackboard Collaborate Web Conferencing System Requirements... 3 Getting Started with Blackboard

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2

More information

Course: Information Security Management in e-governance

Course: Information Security Management in e-governance Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security

More information

White Paper: Introduction to cloud computing

White Paper: Introduction to cloud computing White Paper: Introduction to cloud computing The boom in cloud computing over the past few years has led to a situation that is common to many innovations and new technologies: many have heard of it,

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

Using Microsoft Lync for Point to Point or Multiparty Connections

Using Microsoft Lync for Point to Point or Multiparty Connections Using Microsoft Lync for Point to Point or Multiparty Connections All DEECD employees who have an edumail account, automatically have an MS Lync account. Lync is installed on all Teacher laptops and CASES

More information

LYNC 2013 STAFF GUIDE

LYNC 2013 STAFF GUIDE LYNC 2013 STAFF GUIDE Updated 21/05/15 This guide provides a comprehensive introduction to Lync. It covers the Lync app, instant messaging, video and telephone conferencing as well as Lync 2013 s integration

More information

Web/Cloud based CATI using quexs

Web/Cloud based CATI using quexs Web/Cloud based CATI using quexs Session 8E 10:45am-12:00pm Tuesday May 17 2011 Presentations and Discussion: Cloud Computing International Field Directors and Technologies Conference 2011 Adam Zammit

More information

Step 1: Select the Start Menu, then Control Panel.

Step 1: Select the Start Menu, then Control Panel. Part of the Adobe Connect 9 software includes functionality to support full audio in addition to chat areas, shared spaces, and video. The technology that makes this possible is Voice- Over-IP (VOIP).

More information

Before you start your SKE course:

Before you start your SKE course: Before you start your SKE course: We are looking forward to supporting you in your studies with us. As you know the course is entirely delivered online. In preparation, we just need to check with you about

More information

Contents. Introduction. What is the Cloud? How does it work? Types of Cloud Service. Cloud Service Providers. Summary

Contents. Introduction. What is the Cloud? How does it work? Types of Cloud Service. Cloud Service Providers. Summary Contents Introduction What is the Cloud? How does it work? Types of Cloud Service Cloud Service Providers Summary Introduction The CLOUD! It seems to be everywhere these days; you can t get away from it!

More information

DNA IT - Business IT On Demand

DNA IT - Business IT On Demand DNA IT - Business IT On Demand September 1 2011 DNA IT White Paper: Introduction to Cloud Computing The boom in cloud computing over the past few years has led to a situation that is common to many innovations

More information

Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed)

Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed) Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed) 01.1 Purpose

More information

Human Capital Management Challenge: Fostering Employee Mentoring, Engagement, and Development in a Limited Budget Environment

Human Capital Management Challenge: Fostering Employee Mentoring, Engagement, and Development in a Limited Budget Environment Human Capital Management Challenge: Fostering Employee Mentoring, Engagement, and Development in a Limited Budget Environment By Carolyn M. Taylor Chief Human Capital Officer, Government Accountability

More information

Court Services and Offender Supervision Agency Page 2

Court Services and Offender Supervision Agency Page 2 Court Services and Offender Supervision Agency Page 2 C. Eligible Employee A non-trainee CSOSA employee whose current performance is fully satisfactory ( Fully Met ) or better, is not on a Performance

More information

Total Rewards Overview. For employees in Denmark

Total Rewards Overview. For employees in Denmark Total Rewards Overview For employees in Denmark Page 2 Benefits are an important part of your total compensation, and we re proud to offer a comprehensive, balanced, and competitive benefits package. Keysight

More information

Business Continuity and Disaster Recovery Planning from an Information Technology Perspective

Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Presenter: David Bird, Director of Sales, Business Technology Consultant phone: 215-672-7100 email: [email protected]

More information

SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE

SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE Checklist for taking personally identifiable information (PII) out of the workplace: q Does your organization s policy permit the removal of PII from the office?

More information

Video conferencing with its multiple simultaneous video chats demands a good deal from your computer. The following platforms are required:

Video conferencing with its multiple simultaneous video chats demands a good deal from your computer. The following platforms are required: VIDEO CONFERENCING TECHNICAL REQUIREMENTS AND SETUP TUTORIAL Conferences are conducted through the class website. No special conferencing software or service is required. Participation requires that your

More information

24x Overview. Communication systems designed exclusively for small businesses

24x Overview. Communication systems designed exclusively for small businesses Allworx 24x Overview Communication systems designed exclusively for small businesses Finally, a VoIP system with a fully integrated T1/PRI that Saves you money Doesn t compromise on features Provides an

More information

Sage CRM Technical Specification

Sage CRM Technical Specification Sage CRM Technical Specification Client Software This document outlines the recommended minimum software and hardware requirements for running Sage CRM. Please note that while this document refers to Sage

More information

GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop

GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Contents: Executive Summary... 1

More information

Debunking the Top 10 CloudHosted Virtual Desktop Myths

Debunking the Top 10 CloudHosted Virtual Desktop Myths Debunking the Top 10 CloudHosted Virtual Desktop Myths Page 1 Summary Desktops as a Service (DaaS) is the delivery of a virtual desktop offered as a hosted service offered by a service provider. DaaS has

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.

More information

Help Desk Coordinator Provincial Court Judiciary / Office of the Chief Judge

Help Desk Coordinator Provincial Court Judiciary / Office of the Chief Judge Help Desk Coordinator Provincial Court Judiciary / Office of the Chief Judge POSITION TITLE: Help Desk Coordinator POSITION NUMBER(S): DIVISION: (e.g., Division, Region, Department) UNIT: (e.g., Branch,

More information

Top Desktop Management Pain Points

Top Desktop Management Pain Points Top Desktop Management Pain Points 2010 Table of Contents Managing Desktops and Laptops is a Challenge... 3 A Proactive Approach... 3 Asset Inventory is Key... 3 Mobile Workforce Support Challenges...

More information

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview

More information

Firewall, Mail and File server solution

Firewall, Mail and File server solution Firewall, Mail and File server solution Table of Contents Introduction......2 Overview......3 Detailed description....4 Firewall......4 Other services offered by IPCop:......4 Mail and File Server......5

More information

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT

More information

Information Technology Services Core Services SLA

Information Technology Services Core Services SLA Information Technology Services Information Technology Services Core Services SLA This Service Level Agreement defines the levels of service provided by Information Technology Services to Victoria University

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

VidyoConferencing Network Administrators Guide

VidyoConferencing Network Administrators Guide VidyoConferencing Network Administrators Guide Windows 8, 7, XP, Vista and Apple Mac OS - updated 30/11/2012 Introduction The Attend Anywhere management platform is a cloud based management, facilitation

More information

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014 BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective

More information

Hosted voice pricing begins with a flat monthly rate per line for service and features.

Hosted voice pricing begins with a flat monthly rate per line for service and features. TABLE OF CONTENTS OVERVIEW...3 LOWER START-UP COSTS...4 MAINTENANCE SAVINGS...4 LONG-DISTANCE SAVINGS...4 SCALABILITY AND FLEXIBILITY...4 MULTI-SITE COORDINATION...5 TRAVELING AND REMOTE WORKERS...5 BUSINESS

More information

FORUM FOR THE FUTURE 1040519) 19477-21594 (plus 3550 London Weighting Allowance)

FORUM FOR THE FUTURE 1040519) 19477-21594 (plus 3550 London Weighting Allowance) FORUM FOR THE FUTURE Current Holder Job Title: Name of Organisation: Location: Responsible to: Salary: Working Hours: Contract: Special Conditions: Holiday: Equal Opportunities: Vacant IT Support Officer

More information

Recognition of Prior Learning (RPL) Kit. BSB50607 Diploma of Human Resources Management

Recognition of Prior Learning (RPL) Kit. BSB50607 Diploma of Human Resources Management Recognition of Prior Learning (RPL) Kit BSB50607 Diploma of Human Resources Management Applicant: Date: Diploma of Human Resources Management RPL Kit 1 Applicant declaration: I have completed the following

More information

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0 BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4

More information

Lync Web App 2013 Guide

Lync Web App 2013 Guide Lync Web App 2013 Guide Contents Introduction... 1 Getting Started... 2 System Requirements... 2 Install a Webcam... 2 Headsets and Speakerphones... 2 Joining Lync Web App Meetings... 3 Overview... 3 Plug

More information

How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications

How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications Small businesses will find this booklet useful for learning how VoIP works and for clarifying

More information

ABSENCE FROM WORK ABSENCE FROM WORK

ABSENCE FROM WORK ABSENCE FROM WORK ABSENCE FROM WORK Revised 12/17/2015 Employee Handbook: Absence From Work 1 of 11 VACATION To define time-off from regular work hours. It is company policy to grant time off from work under specific rules

More information