Deutsche Bank. Policy Implementation Guideline: Telecommuting



Similar documents
MAKING WORK-AT-HOME WORK FOR YOUR COMPANY: PART 2

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012

Stable and Secure Network Infrastructure Benchmarks

Attraction and Retention Series A focus on people and business. Flexible work practices: Assessment proformas Resource document 5

US/firefox/new/

NASA DESK GUIDE ON TELEWORK PROGRAMS. Version 2

Responsible Access and Use of Information Technology Resources and Services Policy

Business Checklist for Severe Weather

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Virtual Office Agreement

Basics. How can I use the Internet to make free calls?

Telecommuting Program Manual

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Employee Injury/Illness Reporting and Managed Return to Work. April 15, 2011 HR 23. Human Resources Responsible Key Business

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy

Communication systems designed exclusively for small businesses

Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

How can I use the internet to make free calls?

USING GENIE REMOTELY

How To Record A Voip Conference On A Computer Or Laptop (For A Free) On A Pc Or Mac) On An Ipod Or Ipod (For Free)

How To Manage A Network Safely

JOB DESCRIPTION CONTRACTUAL POSITION

ACCC-ITL QUICK GUIDE Install Blackboard Collaborate - PC

The benefits of Cloud Computing

10 How to Accomplish SaaS

How To Protect Your Data From Being Hacked

c) Password Management The assignment/use of passwords is controlled in accordance with the defined Password Policy.

Managed Services. Business Intelligence Solutions

CSG Windows Support Policy

For assistance, contact CASL Tech : casltech@ucd.ie. Usage Requirements 1. System capabilities 5 Instructions for Use.. 6

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

Avaya IP Office Unified Communications for Small Business

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

How To Use Blackboard Collaborate Web Conferencing On A Computer Or Phone (For Students)

A Guide to Information Technology Security in Trinity College Dublin

Course: Information Security Management in e-governance

White Paper: Introduction to cloud computing

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

Using Microsoft Lync for Point to Point or Multiparty Connections

LYNC 2013 STAFF GUIDE

Web/Cloud based CATI using quexs

Step 1: Select the Start Menu, then Control Panel.

Before you start your SKE course:

Contents. Introduction. What is the Cloud? How does it work? Types of Cloud Service. Cloud Service Providers. Summary

DNA IT - Business IT On Demand

Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed)

Human Capital Management Challenge: Fostering Employee Mentoring, Engagement, and Development in a Limited Budget Environment

Court Services and Offender Supervision Agency Page 2

Total Rewards Overview. For employees in Denmark

Business Continuity and Disaster Recovery Planning from an Information Technology Perspective

SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE

Video conferencing with its multiple simultaneous video chats demands a good deal from your computer. The following platforms are required:

24x Overview. Communication systems designed exclusively for small businesses

Sage CRM Technical Specification

GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop

Debunking the Top 10 CloudHosted Virtual Desktop Myths

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Help Desk Coordinator Provincial Court Judiciary / Office of the Chief Judge

Top Desktop Management Pain Points

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

Firewall, Mail and File server solution

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

Information Technology Services Core Services SLA

National Cyber Security Month 2015: Daily Security Awareness Tips

VidyoConferencing Network Administrators Guide

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version /03/2014

Hosted voice pricing begins with a flat monthly rate per line for service and features.

FORUM FOR THE FUTURE ) (plus 3550 London Weighting Allowance)

Recognition of Prior Learning (RPL) Kit. BSB50607 Diploma of Human Resources Management

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Lync Web App 2013 Guide

How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications

ABSENCE FROM WORK ABSENCE FROM WORK

Transcription:

Deutsche Bank Policy Implementation Guideline: Telecommuting

TELECOMMUTING I. Definition: Work from home or anywhere other than the home office enabled by information and communications technology. II. Important Considerations: Proper policy, system controls and reporting must be in place prior to implementation. Culture of trust and output focus within the organisation is a critical enabler for a successful implementation of telecommuting. A degree of control over this FWA is needed depending on the company s policies (security system, clock in hours, reporting). Employees have to be connected and contactable at all times during business hours. The telecommuting work arrangement is exercised with the expectation that the job responsibilities can be successfully completed within the defined time period regardless of work location. The telecommuting work arrangement should be reviewed at least once per year. Employees have to complete the Technology Checklist for home equipment such as laptops and WiFi connectivity. III. Policy Guidelines: Eligibility: All full time employees with work tasks that can be completed off-site (e.g. operations support, sales) Application and Approval Process: A typical application process for telecommuting work arrangement; a. Eligible employees intending to apply for telecommuting work arrangement should discuss their intentions with their immediate supervisor. b. Employees should then apply in writing directly to the relevant approving authority and copy the appropriate individuals. c. The employee should include in the application: 1.1.1. Intended duration of telecommuting work arrangement. 1.1.2. Reasons supporting approval of the telecommuting work arrangement. A formal approval process is required for each individual application that takes into account: a. Employee s job responsibilities. 1

b. Employee s eligibility. c. Accountability and reporting structure d. Dependency on other co-workers, managers, internal or external customers e. Access to sensitive or confidential information f. Access to data or sensitive information while away from work. g. Access to software and hardware requirements to support work from home. h. The impacts to the business and the requesting employee. i. Clear communication of expectations. Review of Telecommuting Work Arrangement: a. The telecommuting work arrangement should be reviewed regularly against business needs. b. The employee and supervisor must agree on a review timeline prior to commencing the telecommuting work arrangement in order to evaluate effectiveness of the arrangement. c. Supervisor and HR may enhance or discontinue the policy in alignment with business needs. Expectations of Employees on Telecommuting Work Arrangement: a. Employees on a telecommuting work arrangement will not be excluded from being staffed on out-of-town projects and/or from having to travel as and when required by the business. b. Employees utilising the option are accountable of delivering proven quality of work. c. Employees utilising the option is expected to remain accessible over phone in order to attend to urgent work related matters within the defined working hours. d. Employees utilizing this option should choose a location that is feasible and conducive with no disruption. e. Employees should not consider the option an entitlement and will not abuse the privilege. Rewards and Salary: Typically, telecommuting work arrangement will not have an impact on the employee s salary and bonus. Performance Management: The employer s standard performance management process will continue to apply for employees telecommuting work arrangement. 2

Checklist for Employers: Define eligibility of workforce and employees. Develop communication to share the intent of the initiative with eligible employees. Develop Technology Checklist as a guide to employees to ensure laptops, internet connection and other office equipment are adequately setup from home / alternative work location. Encourage eligible employees to initiate request for this arrangement from immediate supervisor. Prepare Work From Home schedule. Share schedule and checklist with the team. Employee and supervisor agree on a review timeline at least once during the business year. Monitor utilisation and effectiveness of telecommuting work arrangement to ensure it does not impact the focus on work delivery and quality of the participating employee. Outline performance improvement process if employees do not adhere to the terms and conditions of telecommuting. 3

Technology Checklist Sample: Please confirm the following items are in place prior to commencing telecommuting work arrangement Getting Connected: Stable internet service connectivity. Hardware and Software: Laptop or computer. Headphones and microphones. Webcams (for video conferencing). Pre-installed work-related software. VPN (if applicable). Security: Keep software up-to date to prevent hackers from exploiting security flaws (operating systems, web browsers, third-party plug-ins and other software). Prevent identify theft by protecting account numbers, and other personal information. Turn on personal firewalls. Run antivirus software. Back up files to minimize risk of losing important files. Home Office Equipment: Telephone or VoIP technology (internet-based phone service). Surge protector. Printer or multipurpose machine. External hard disk. 4