Payment Card Industry (PCI) Policy Manual. Network and Computer Services



Similar documents
Miami University. Payment Card Data Security Policy

Credit Card Processing and Security Policy

Payment Card Industry Compliance

PCI Data Security and Classification Standards Summary

CREDIT CARD SECURITY POLICY PCI DSS 2.0

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL

Information Technology

PCI General Policy. Effective Date: August Approval: December 17, Maintenance of Policy: Office of Student Accounts REFERENCE DOCUMENTS:

Payment Cardholder Data Handling Procedures (required to accept any credit card payments)

Credit Card Security

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Credit Card Handling Security Standards

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

2.0 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS (PCI-DSS)

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

New York University University Policies

CREDIT CARD PROCESSING POLICY AND PROCEDURES

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

CREDIT CARD PROCESSING & SECURITY POLICY

How To Complete A Pci Ds Self Assessment Questionnaire

This policy applies to all GPC units that process, transmit, or handle cardholder information in a physical or electronic format.

Becoming PCI Compliant

Payment Card Industry Data Security Standard

GRINNELL COLLEGE CREDIT CARD PROCESSING AND SECURITY POLICY

Standards for Business Processes, Paper and Electronic Processing

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

CAL POLY POMONA FOUNDATION. Policy for Accepting Payment (Credit) Card and Ecommerce Payments

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

Appendix 1 Payment Card Industry Data Security Standards Program

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

Purpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS)

Viterbo University Credit Card Processing & Data Security Procedures and Policy

University of Sunderland Business Assurance PCI Security Policy

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures

INFORMATION SECURITY POLICY. Policy for Credit Card Acceptance to Conduct College Business

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY

Saint Louis University Merchant Card Processing Policy & Procedures

This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.

PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01

CREDIT CARD NUMBER HANDLING PROCEDURES POLICY October

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

Josiah Wilkinson Internal Security Assessor. Nationwide

TERMINAL CONTROL MEASURES

POLICY SECTION 509: Electronic Financial Transaction Procedures

Accepting Payment Cards and ecommerce Payments

Policies and Procedures

Merchant Card Processing Best Practices

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Appendix 1 - Credit Card Security Incident Response Plan

Emory University & Emory Healthcare

. Merchant Accounts are special bank accounts issued by a merchant. . Merchant Level: This classification is based on transaction volume.

Vanderbilt University

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

PCI DSS Requirements - Security Controls and Processes

CREDIT CARD MERCHANT POLICY. All campuses served by Louisiana State University (LSU) Office of Accounting Services

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

SAN DIEGO STATE UNIVERSITY RESEARCH FOUNDATION CREDIT CARD PROCESSING & SECURITY POLICY MERCHANT SERVICES POLICIES & PROCEDURES

Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009

PCI Compliance Security Awareness Program For Marine Corps Community Services Contacts: Paul Watson

CREDIT CARD MERCHANT PROCEDURES MANUAL. Effective Date: 5/25/2011

LSE PCI-DSS Cardholder Data Environments Information Security Policy

E-Market Policy Accepting Online Payment for Conducting University Business

Enforcing PCI Data Security Standard Compliance

University of Maine System ADMINISTRATIVE PRACTICE LETTER

How To Control Credit Card And Debit Card Payments In Wisconsin

Information Security Policy

POLICY & PROCEDURE DOCUMENT NUMBER: DIVISION: Finance & Administration. TITLE: Policy & Procedures for Credit Card Merchants

Failure to follow the following procedures may subject the state to significant losses, including:

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6

Information Security Policy

Fraud Protection, You and Your Bank

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

Frequently Asked Questions

SECTION 509: Payment Card and Electronic Funds Transfer (EFT) Procedures

CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9.

Virginia Commonwealth University School of Medicine Information Security Standard

Credit Card Processing Overview

Transcription:

Payment Card Industry (PCI) Policy Manual Network and Computer Services

Forward This policy manual outlines acceptable use Black Hills State University (BHSU) or University herein, Information Technology (IT) Network and Computer Services (NCS) and applies to students, faculty, staff, visitors, guests, affiliated campus organizations or non- profit groups, and other individuals, groups and organizations relying on the Black Hills State University as a host through contractual relationships (users). BHSU operates under the governing control of South Dakota Board of Regents (SDBOR). All policies in this manual are superseded by South Dakota Codified Law and SDBOR policies. Should you have any questions regarding use of IT systems, please contact NCS.

Table of Contents 07-100. Compliance with Payment Card Industry (PCI) Policy... 1 07-100.1. Compliance with Payment Card Industry Data Security Standards (PCI DSS)... 5 07-100.2. Credit Card Processing (PCI DSS)... 6 07-100.3. Credit Cardholder Data Access Control in Compliance with Payment Card Industry Data Security Standards (PCI DSS)... 8 07-100.4. Authorizing Third Party Service Providers in Compliance with Payment Card Industry Data Security Standards (PCI DSS)... 10 07-100.5. Use of Employee Facing Technologies in Compliance with Payment Card Industry Data Security Standards (PCI DSS)... 11 07-100.6. Information Security Responsibilities Related to Compliance with Payment Card Industry Data Security Standards (PCI DSS)... 13 07-100.7. Vulnerability Scans in Compliance with Payment Card Industry Data Security Standards (PCI DSS)... 15

07-100. Compliance with Payment Card Industry (PCI) Policy Introduction The payment card industry (PCI) denotes the debit, credit, prepaid, e- purse, ATM (Automated Teller Machine), and POS (Point of Sale) cards and associated businesses. The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent data security measures. PCI DSS comprises a minimum set of requirements for protecting cardholder data. Definitions Access Control: Mechanisms that limit availability of information or information- processing resources only to authorized persons or applications. Card Verification Code or Value: Data element on a card'ʹs magnetic stripe that uses a secure cryptographic process to protect data integrity on the stripe and reveals any alteration or counterfeiting (referred to as CAV, CVC, CVV or CSC, depending on payment card) CVC Card Validation Code (MasterCard payment cards) CVV Card Verification Value (Visa and Discover payment cards) CSC Card Security Code (American Express) Cardholder Data: Cardholder data is any personally identifiable information associated with a user of a credit/debit. Primary account number (PAN), name, expiry date, and card verification value 2 (CVV2) are included in this definition. Cardholder Data Environment: Area of computer system network that possesses cardholder data or sensitive authentication data and those systems and segments that directly attach or support cardholder processing, storage, or transmission. Adequate network segmentation, which isolates systems that store, process, or transmit cardholder Network and Computer Services - Information Technology Policy Manual 1

data from those that do not, may reduce the scope of the cardholder data environment and thus the scope of the PCI assessment. Data: Pieces of information from which understandable information is derived. Data are a collection of information or facts usually gathered as the result of experience, observation, experiment or processes within a computer system or premises. Data may consist of numbers, words or images, particularly as measurements or observations of a set of variables. Data are often viewed as the lowest level of abstraction from which information and knowledge are derived. Database: Structured format for organizing and maintaining easily retrievable information. Simple database examples are tables and spreadsheets. Degaussing: Also called disk degaussing, it is the process or technique that demagnetizes the disk so that all data stored on the disk are permanently destroyed. Disk Encryption: Technique or technology (either software or hardware) for encrypting all stored data on a device (e.g., hard disk, flash drive). Alternatively, File- Level Encryption or Column- Level Database Encryption is used to encrypt contents of specific files or columns. ecommerce: Business transactions over electronic means. This normally means the internet, but can include any electronic interaction including automated phone banks, touch screen kiosks, or even ATMs. Transactions can include debit/credit cards, but also include any electronic transfer of funds via ACH. Encryption: Process of converting information into a form only intelligible to holders of a specific cryptographic key. The use of encryption protects information between the encryption process and the decryption process (the inverse of encryption) against unauthorized disclosure. Full Magnetic Stripe Data: Also referred to as track data. Data encoded in the magnetic stripe or chip is used for authorization during payment transactions. Can be the magnetic stripe image on a chip or the data on the track 1 and/or track 2 portion of the magnetic stripe. Entities must not retain full magnetic stripe data after obtaining transaction authorization. Primary Account Number (PAN): Acronym for primary account number and also referred to as account number. Unique payment card number (typically for credit or debit cards) that identifies the issuer and the particular cardholder account. 2 Network and Computer Services - Information Technology Policy Manual

Removable Electronic Media: Media that store digitized data and can be easily removed and/or transported from one computer system to another. Examples of removable electronic media include CD- ROM, DVD- ROM, USB flash drives and removable hard drives. Sanitization: Process for deleting sensitive data from a file, device or system; or for rendering data useless if accessed in an attack Secure Wipe: Also called secure delete, a program utility used to delete specific files permanently from a computer system Sensitive Authentication Data: Security- related information (card validation codes/values, full magnetic- stripe data, PINs and PIN blocks) used to authenticate cardholders, appearing in plain- text or otherwise unprotected form Service Code: Three- digit or four- digit value in magnetic- stripe that follows the expiration date of the payment card on the track data. It is used for various things such as defining service attributes, differentiating between international and national interchange or identifying usage restrictions. System Components: Any network component, server or application included in or connected to the cardholder data environment Types of Data: Data may be in electronic media or in hardcopy format. The following is a list of where data and, specifically, cardholder data may reside: Electronic Media: Electronic media are the bits and bytes contained in hard drives, random access memory (RAM), read- only memory (ROM), disks, memory devices, phones, mobile computing devices, networking equipment and various others. Hard drives Tapes/media CDs DVDs Compact flash drives, SD Dynamic Random Access Memory (DRAM) Read Only Memory (ROM and the different variations thereof) Random Access Memory (RAM) Flash cards USB drives, removable media, memory sticks Network and Computer Services - Information Technology Policy Manual 3

Hardcopy Format: Hard copy media are physical representations of information. Paper printouts, printers, facsimile ribbons, drums and platens are all examples of hardcopy media. Paper receipts or other supporting hardcopy documents and receipts Credit card printouts from processing machines Invoices Purchase orders Off- line hard copy batch printouts Other hardcopy formats as identified by organizations 4 Network and Computer Services - Information Technology Policy Manual

07-100.1. Compliance with Payment Card Industry Data Security Standards (PCI DSS) NUMBER: 07-100.1 OFFICE OF RECORD: Network and Computer Services ISSUED BY: Director of Network and Computer Services APPROVED BY: Dr. Kay Schallenkamp, President EFFECTIVE DATE: October 17, 2012 REVIEWED DATE: February 14, 2013 REPLACES: N/A Purpose In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, Black Hills State University has established a formal policy and supporting procedures regarding PCI Security Policies. This policy shall be reviewed by the NCS director or designee on an annual basis for compliance and for ensuring its adequacy and relevancy regarding the University'ʹs needs and goals. Scope This policy applies to all Black Hills State University PCI DSS related security policies. Policy Black Hills State University shall publish all PCI DSS related policies on the BHSU web site. The policies shall also be disseminated to all relevant vendors, contractors, and business partners. Enforcement Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Please see the Employee Handbook for guidelines. Network and Computer Services - Information Technology Policy Manual 5

07-100.2. Credit Card Processing (PCI DSS) NUMBER: 07-100.2 OFFICE OF RECORD: Network and Computer Services ISSUED BY: Director of Network and Computer Services APPROVED BY: Dr. Kay Schallenkamp, President EFFECTIVE DATE: November 11, 2012 REVIEWED DATE: February 14, 2013 REPLACES: October 17, 2012 Purpose In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, Black Hills State University (BHSU) has established a formal policy for credit card processing. This policy shall be reviewed for content and compliance by the NCS director or designee on an annual basis. Scope This policy applies to all systems that are subject to PCI DSS requirements. Policy BHSU employees who receive credit card information on paper shall process the transaction immediately. As soon as the transaction has been processed, the credit card information shall be destroyed by shredding through a cross- cut shredder. Credit card transactions shall not be conducted via e- mail or other unsecured communication methods (chat, instant messaging, voicemail, etc.) nor stored on any form of media such as a computer, flash drive, external hard- drive, etc. (including scanned images). If an employee receives an email or other unsecured communication with cardholder data, that employee must delete the message immediately. The employee must then contact the sender to inform them that the transaction cannot be processed and to provide an alternative means to complete their transaction. If it is necessary for staff to accept credit card information over the phone, the information is to be written on a piece of paper and hand- delivered to the appropriate office for processing. The paper containing the credit card information shall be held in secure storage until the transaction is verified. It 6 Network and Computer Services - Information Technology Policy Manual

shall then continue to be held in secure storage until it is shredded on a cross- cut shredder. Credit card information may be faxed to an office. However, the fax machine must be in a secure area. Faxed information must be immediately hand delivered to the appropriate office for processing. Any electronic memory on fax/scanning machines used to disseminate credit card information must be fully erased or physically destroyed when the equipment is retired. All forms shall be designed so that any credit card information can be easily cut off and shredded after processing. Any forms containing cardholder information must be held in secure storage, until the transaction is verified, and then it shall be shredded on a cross- cut shredder. Terminals and underlying applications must be configured to mask the PAN when displayed. The security code shall not be requested for any transaction unless through an authorized third party service provider. All terminals and underlying systems must be configured to truncate account numbers on printed copies of receipts. Recurring payments shall be handled by the credit card service provider and will not require access to the PAN by BHSU employees. Enforcement Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Please see the Employee Handbook for guidelines. Revision History 1.1 17 October 2012 1.2 30 November 2012 (Clarified electronic cardholder data transaction) Network and Computer Services - Information Technology Policy Manual 7

07-100.3. Credit Cardholder Data Access Control in Compliance with Payment Card Industry Data Security Standards (PCI DSS) NUMBER: 07-100.3 OFFICE OF RECORD: Network and Computer Services ISSUED BY: Director of Network and Computer Services APPROVED BY: Dr. Kay Schallenkamp, President EFFECTIVE DATE: October 17, 2012 REVIEWED DATE: February 14, 2013 REPLACES: October 17, 2012 Purpose In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, Black Hills State University has established a formal policy and supporting procedures regarding cardholder data access control. This policy shall be reviewed for content and compliance by the NCS director or designee on an annual basis. Scope This policy applies to all systems in the cardholder data environment. Policy Black Hills State University shall protect cardholder data by ensuring the following access controls are in place in the cardholder data environment: Access rights for privileged users are restricted to the fewest privileges necessary to perform job responsibilities Privileges are assigned to individuals based on job classification and function, such as Role- Based Access Control (RBAC) An e- mail process is utilized to request access to cardholder. This request must specify the privileges requested and the duration of the request. The message must be submitted to the Director of Network and Computer Services by the individual s supervisor. Access controls are implemented via an automated access control system Access control systems are in place on all system components Access control systems are configured to enforce privileges assigned to individuals based on job classification and function 8 Network and Computer Services - Information Technology Policy Manual

Access control systems have a deny all setting Enforcement Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Please see the Employee Handbook for guidelines. Network and Computer Services - Information Technology Policy Manual 9

07-100.4. Authorizing Third Party Service Providers in Compliance with Payment Card Industry Data Security Standards (PCI DSS) NUMBER: 07-100.4 OFFICE OF RECORD: Network and Computer Services ISSUED BY: Director of Network and Computer Services APPROVED BY: Dr. Kay Schallenkamp, President EFFECTIVE DATE: October 17, 2012 REVIEWED DATE: February 14, 2013 REPLACES: N/A Purpose In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, Black Hills State University has established formal procedures regarding the addition of an authorized third party service provider. This policy shall be reviewed for content and compliance by the NCS director or designee on an annual basis. Scope This policy applies to the addition of any third party service provider to the list of authorized service providers. Policy To add a new Service Provider, a department must: 1. Discuss the reasons for adding the Service Provider with the Controller or Vice President for Finance and Administration. 2. The credentials of the Service Provider must be researched. To be considered, the Service Provider should be a Level 1 processer and be named on the list of processors approved by Visa and MasterCard. 3. Obtain a copy of the proposed contract from the Service Provider. 4. Submit the contract to the Controller and Vice President for Finance and Administration. Enforcement Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Please see the Employee Handbook for guidelines. 10 Network and Computer Services - Information Technology Policy Manual

07-100.5. Use of Employee Facing Technologies in Compliance with Payment Card Industry Data Security Standards (PCI DSS) NUMBER: 07-100.5 OFFICE OF RECORD: Network and Computer Services ISSUED BY: Director of Network and Computer Services APPROVED BY: Dr. Kay Schallenkamp, President EFFECTIVE DATE: October 17, 2012 REVIEWED DATE: February 14, 2013 REPLACES: N/A Purpose In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, Black Hills State University (BHSU) has established a formal policy and supporting procedures regarding the use of employee facing technologies. This policy shall be reviewed for content and compliance by the NCS director or designee on an annual basis. Scope This policy applies to all BHSU employees facing mobile technology used in the cardholder data environment. Employees facing mobile technologies are system components and additional IT resources deemed critical by Black Hills State University. Some examples of employee facing technologies are: Remote access technologies Wireless technologies Removable electronic media Laptops Personal Data Assistants (PDA) Cell phone For definitions of certain terms see the Compliance with Payment Card Industry Data Security Standards (PCI DSS) policy document. Policy BHSU will ensure that the usage policies for critical employee facing technologies shall adhere to the following conditions for purposes of complying with the Payment Card Network and Computer Services - Information Technology Policy Manual 11

Industry Data Security Standards (PCI DSS) initiatives (Security Standards Council 2009): BHSU shall require explicit management approval to use the technologies. BHSU shall require all technology use be authenticated with user ID and password or other authentication item. BHSU maintains a list of all devices. BHSU shall require acceptable uses for the technology. BHSU shall require acceptable network locations for the technology. BHSU shall require a list of company- approved products. BHSU shall require automatic disconnect of sessions for remote- access technologies after a specific period of inactivity. BHSU shall require activation of remote- access technologies used by vendors only when needed by vendors, with immediate deactivation after use. BHSU shall prohibit copying, moving or storage of cardholder data onto local hard drives or removable electronic media when accessing such data via remote- access technologies. Enforcement Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Please see the Employee Handbook for guidelines. 12 Network and Computer Services - Information Technology Policy Manual

07-100.6. Information Security Responsibilities Related to Compliance with Payment Card Industry Data Security Standards (PCI DSS) NUMBER: 07-100.6 OFFICE OF RECORD: Network and Computer Services ISSUED BY: Director of Network and Computer Services APPROVED BY: Dr. Kay Schallenkamp, President EFFECTIVE DATE: October 17, 2012 REVIEWED DATE: February 14, 2013 REPLACES: N/A Purpose In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, Black Hills State University (BHSU) has established a formal policy and supporting procedures regarding Information Security Responsibilities. This policy shall be reviewed for content and compliance by the NCS director or designee on an annual basis. Scope This policy applies to all employees and contractors who have access to the BHSU cardholder data environment. Policy BHSU shall ensure that the Information Security Responsibilities policy adheres to the following conditions for purposes of complying with the Payment Card Industry Data Security Standards (PCI DSS) initiatives (Security Standards Council 2009): Formal assignment of information security is to be given to the BHSU Chief Information Officer (CIO) and Director of Network and Computer Services. The responsibility for creating and distributing security policies and procedures is to be formally assigned to the CIO and Director of Network and Computer Services. The responsibility for monitoring and analyzing security alerts and distributing information to appropriate information security and business Network and Computer Services - Information Technology Policy Manual 13

unit management personnel is to be formally assigned to the Network and Computer Services Network Security Officer. The responsibility for creating and distributing security incident response and escalation procedures is to be formally assigned to the BHSU Network Security Officer. The responsibility for administering user account and authentication management is to be formally assigned to the Director of BHSU Network and Computer Services. The responsibility for monitoring and controlling all access to cardholder data is to be formally assigned to the Controller. Enforcement Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Please see the Employee Handbook for guidelines. 14 Network and Computer Services - Information Technology Policy Manual

07-100.7. Vulnerability Scans in Compliance with Payment Card Industry Data Security Standards (PCI DSS) NUMBER: 07-100.7 OFFICE OF RECORD: Network and Computer Services ISSUED BY: Director of Network and Computer Services APPROVED BY: Dr. Kay Schallenkamp, President EFFECTIVE DATE: October 17, 2012 REVIEWED DATE: February 14, 2013 REPLACES: N/A Purpose In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, Black Hills State University (BHSU) has established a formal policy for conducting vulnerability scans. This policy shall be reviewed for content and compliance by the NCS director or designee on an annual basis. Scope This policy applies to all systems that are subject PCI DSS requirements. Policy BHSU shall conduct quarterly internal/external vulnerability scans for all hosts in the campus cardholder data environment. Audited external scans will be performed by an authorized third party. Internal scans shall be performed by the BHSU Infrastructure Security Manager or designee. Logs of the quarterly internal/external scans shall be provided to the Director of Network and Computer Services. Enforcement Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Please see the Employee Handbook for guidelines. Network and Computer Services - Information Technology Policy Manual 15