Mobile investment toolkit: Device selection considerations

Size: px
Start display at page:

Download "Mobile investment toolkit: Device selection considerations"

Transcription

1 Mobile investment toolkit: Device selection considerations Summary notes There are many mobile devices on the market today and the scope and capabilities of these devices will continue to change and improve rapidly. You should consider the possible impact of changing device supplier in the future. There is no right or wrong answer - it s down to the requirements of your organisation and the business purpose of each mobile device. There are many factors to consider in selecting the appropriate mobile device. Input and consultation with users is crucial to ensure that the combination of devices selected meets user needs and are usable in situ. Purpose: This list summarises key considerations in selecting a device based on previous procurments and experiences in use of mobile devices purchased. DISCLAIMER This list of considerations has been assembled by HSCIC from on a variety of existing sources with a view to providing a base line for NHS trusts wishing to procure mobile capabilities. However, it does not necessarily contain the definitive set of requirements for any such procurement and NHS trusts using it, either with or without amendment, do so at their own risk. HSCIC cannot be held responsible for any gap in provision resulting from its use. 1 Copyright 2016, Health and Social Care Information Centre.

2 Area Specific considerations Features and functions Screen size Safety: There may be safety risks in using small form factors to review lists such as medications or images that are designed to be used on larger screen screens where a summary view of all data is required. Ensure all screen views can be viewed on the selected device without compromising safety. Usability: If sofware is not designed specifically to scale to the specific device then usability will be compromised. Its easy to enable mobile access but more investment can be required to optimise the software for mobile use. Screen resolution Portability Usage Battery life Protective case If using tablets, ensure the screen size is sufficient once the on screen keyboard is displayed. If not, external keyboards may be required. Is the software, functionality and use designed for touchscreens, e.g. is it mainly tickboxes or drop down lists? If a lot of information is displayed or a lot of typing is required, you may want to consider giving your users a choice of different size screens e.g. someone booking appointments and creating reports may need a different set up from someone updating a medical record. If the devices are being used to view medical images ensure that the resolution supports this e.g.mammography, x-rays require a higher resolution to review. Clinical risk is present if resolution is not sufficient. Consider the weight and practicalities of carrying the device and associated accessories (e.g. keyboard, chargers etc.). Consider if backpacks or carrying cases are also required. Communicate with HR to understand possible safety impacts for staff in the field. Work with users to understand access required to telephony, messaging, basic web services, applications and standard office software. Is the device use specific or multipurpose. E.g. can a tablet be used for a clinical app as well as and intranet access? Can it easily be linked into corporate networks where a 'portable desktop' is required? Battery life will vary when using different applications. Ideally this should be tested with the intended install to ensure that the device battery can sustain its charge adequately. Some batteries will have a finite life which is less than the device life. Be aware of this and the cost and process for replacing batteries. Be clear on how long batteries will take to charge. Understand the recommended ways of preserving battery life; e.g does the device need to be completely switched off and build this into any new work processes. Some batteries required configuration and may need to be reconfigures once in live use. Understand the requirements and plan to support this. For tablets ensure a full wrap around case is supplied to minimise breakages. This will reduce costs of replacing devices. 2 Copyright 2016, Health and Social Care Information Centre.

3 Ability to use a cross network SIM Robustness Storage Peripherals Keyboard provided External keyboards Ability to charge in car Based on local network provision ensure that you have the correct bundles or cross network SIMs or services to cater for travel accross network boundaries. In some geographic areas the organisation may want to conside using a mobile network integrator to enable a higher level of network coverage. Ensure the device is robust enough for the expected use and locations where it will be used. Ensure data storage capacity is appropriate for use. Limitations on file size attachments might apply (e.g. some photos for wound care or some patient records which need to be scanned can be quite large). Also, if users are able to download music/pacs images then larger capacity might be required. Ensure that where tablets are provided, that you allow for users who still require keyboards to input data where typing rather than picklists are required. You may need to provide external keyboards for tablets if significant typing is required or the screen size (see above) is too small with the keyboard displayed. Ensure users who require chargers are identified and provision is factored into any purchasing decisions to avoid additional procurement activities. Other peripherals Smart Card Readers Docking Stations Camera Mobile devices have varied shapes and dimensions of hardware, it is important that you determine your need for peripherals i.e. keyboards, digital pens, pointing devices; built-in ports, slots, USB slots etc. If staff will use any applications requiring smart cards, then consider options for smartcard readers. Will any users require docking stations? You may want to consider setting up fully connected docking stations in any main hubs to allows for more screen intense work/easy printing/faster connectivity for laptop users. Ensure if cameras are being used to take images to aid diagnosis or track patient progress e.g. wound care, then the quality of the camera supports this. Inbuilt camera's must be compatible with 2D and Data Matrix code scanning. Ensure this is tested and is fit for purpose for use in meetings and conference calls with Microphone multiple participants in a room. Printers Evaluate if any staff required portable printers Brackets/holders Evaluate if any modifications are required to vehicles or sites to accommodate mobile devices e.g. brackets, docking stations? Software 3 Copyright 2016, Health and Social Care Information Centre.

4 Operating system Which operating system will fit the requirements. ios, android and Microsoft Windows Mobile are the main chocies currently. See this list for a summary of features and functions to evaluate however capabilities change rapidly and wiki pages are not necessarily kept up to date consistently. Compatibility Software installed by default Bring your own device (BYOD) Your device selection is likely to be limited by your current software choices for key systems, collaborate with suppliers and user groups to understand the options which are most compatible based on their experience. Some operating systems give minimal control over upgrades and others allow control on when these are applied. This can cause issues as it might be necessary to delay the operating system upgrade to allow for the development timelines of the applications used on the devices. The organisation will need to define it's approach to software updates and apply these rules to all mobile devices. Evaluate options for Business Provisioned or BYOD? You will need to define the policy around corporate provided verses bring your own device model? Or can the trust support a mixed model based on functionality matrix? With a corporate provided device The make and model is known, it can be locked down to limit the applications /systems available. The device will have a defined support process in place. N3 connection VPN With a BYOD model, there are a number of constraints that should be considered, these may include: A code of conduct for using a BOYD The user/owner would need to agree to have a secure environment for corporate applications/data Corporate enterprise management tools must be installed No or limited support services available Information Governance and Security procedures must be implemented on the device Access to either the organisations network or N3 will need to be either an inbuilt wifi service on the device, or by use of a mobile signal service. Evaluate if the device support secure communication. Any access to clinical applications that the user requires will not directly connected to the local network must be completed via a secure communications path. Ensure that the device 4 Copyright 2016, Health and Social Care Information Centre.

5 supports the trusts VPN service. Ability to configure Device Management Security Remote wipe and tracking Support for multidisciplinary team meetings N3 compliant Packaged software After purchase Insurance End of life Device Support If devices are partitioned with a split configuration, then the organisation protected area should be limited to approved applications only. Controls will need to be in place to detect any risky applications that are installed which could compromise data security, with appropriate remedial action taken to protect the organisation. All mobile devices must be configured with an Enterprise Mobile Management suite (EMM). The organisation will need to implement a consistant use policy on the features of the EMM suite that are enabled. Consider if you need devices to be encrypted or if sufficient security will be provided by the software. All patient data must be encrypted while in transit between the device and the organisations services. Evaluate options to secure devices. Do you need to be able to track the device in case of loss or theft? Do you need to be able to remotely wipe or disable the device in case of loss or theft? If used for multidisciplinary team meetings image sharing and conferencing will be required. Is the device tested on N3 Does standard software such as MS Office come with the device pre-installed. If not ensure that a suite of "lite-office" applications can be installed and used on the device. Do device suppliers offer pre-configuration for users to decrease effort locally to configure and set up. Is there a standard insurance policy for devices that are lost, stolen and damaged and what is the service standard for replacement? What is the approach to WEEE Manufacturers have 'To provide a fully functioning return system whereby those wishing to return end-of-life electronic and electrical goods can do so.' Mobile devices will require a different support model to fixed or traditional laptops. How will this work? What level of support will be required for both the device and the aplications? Ensure that clear lines of demarcation are established around the service offering. 5 Copyright 2016, Health and Social Care Information Centre.

Acquisition & Use of University Supplied Mobile Devices Policy

Acquisition & Use of University Supplied Mobile Devices Policy Acquisition & Use of University Supplied Mobile Devices Policy 1. Introduction 2. Device Definitions 3. Principles of the Policy 4. Eligibility 5. Tariffs & Hardware 6. Administration of Mobile Contracts

More information

Enterprise Mobility Management: completing the EMM story

Enterprise Mobility Management: completing the EMM story Enterprise Mobility Management: completing the EMM story Contents BYOD & EMM 3 Enterprise Mobility Management what is it? 4 Accessing corporate systems, apps 5 and data with EMM Apps in the container 6

More information

NHSmail Migration Communications Plan Template

NHSmail Migration Communications Plan Template NHSmail Migration Communications Plan Template June 2018 Version 2 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created

More information

Policies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors

Policies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors Policies, Procedures, Guidelines and Protocols Document Details Title Staff Mobile Phone Policy Trust Ref No 2036-39774 Local Ref (optional) N/A Main points the document Procurement, allocation and use

More information

Accelerated Technology Refresh Project (ATRP) at VCH and PHC. Frequently Asked Questions

Accelerated Technology Refresh Project (ATRP) at VCH and PHC. Frequently Asked Questions Accelerated Technology Refresh Project (ATRP) at VCH and PHC Frequently Asked Questions About the Desktop Transformation Program What is the Accelerated Technology Refresh Project? What are the costs to

More information

BHIG - Mobile Devices Policy Version 1.0

BHIG - Mobile Devices Policy Version 1.0 Version 1.0 Authorised by: CEO Endorsed By: Chief Operations Officer 1 Document Control Version Date Amended by Changes Made 0.1 20/01/2017 Lars Cortsen Initial document 0.2 29/03/2017 Simon Hahnel Incorporate

More information

Trinity Multi Academy Trust

Trinity Multi Academy Trust Trinity Multi Academy Trust Policy: Bring Your Own Device Date of review: October 2018 Date of next review: October 2020 Lead professional: Status: Director of ICT and Data Non-Statutory Page 1 of 5 Scope

More information

Information Security BYOD Procedure

Information Security BYOD Procedure Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,

More information

Communication and Telecommunications

Communication and Telecommunications Information Booklet Communication and Telecommunications ~ Choosing Your Device ~ Easy English Format Table of Content Communication... 3 Telecommunication... 3 Telecommunication Functions... 4 Types of

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy SH IG 58 Information Security Suite of Policies Bring Your Own Device (BYOD) Policy Version 1 Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This

More information

If we provide the device, it is managed through Citrix XenMobile Enterprise. If you want access to our internal sites, then you have to be managed

If we provide the device, it is managed through Citrix XenMobile Enterprise. If you want access to our internal sites, then you have to be managed If we provide the device, it is managed through Citrix XenMobile Enterprise. If you want access to our internal sites, then you have to be managed through Citrix XenMobile Enterprise. House member office

More information

Mobile Working Policy

Mobile Working Policy Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of

More information

Five Tips to Mastering Enterprise Mobility

Five Tips to Mastering Enterprise Mobility Five Tips to Mastering Enterprise Mobility Table of Contents Introduction Tip 1: Assess Your Environment Tip 2: Review Security Protocols Tip 3: Be Smart About BYOD Tip 4: Consider Customized Mobility

More information

When saving minutes means saving lives. Windows Clinical Mobility

When saving minutes means saving lives. Windows Clinical Mobility When saving minutes means saving lives Windows Clinical Mobility True mobility in healthcare. It s about time From home health and community care to doctors sharing their time between facilities, healthcare

More information

General Dynamics Itronix GD3015 Semi-Rugged Tablet

General Dynamics Itronix GD3015 Semi-Rugged Tablet General Dynamics Itronix Semi-Rugged Tablet The semi-rugged tablet from General Dynamics Itronix delivers the full functionality of a notebook with the critical components and options mobile professionals

More information

3-Part Guide to Developing a BYOD Strategy

3-Part Guide to Developing a BYOD Strategy An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)

More information

BRING YOUR OWN DEVICE (BYOD)

BRING YOUR OWN DEVICE (BYOD) BRING YOUR OWN DEVICE (BYOD) Bring your own device (BYOD) Some employees will often prefer to use their own personal mobile devices to access company networks/systems. However, this is potentially a security

More information

E-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019

E-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019 Ormiston Academies Trust E-Security policy Date adopted: Autumn Term 2018 Next review date: Autumn Term 2019 Policy type Author Statutory James Miller OAT DPO Approved by Exec, July 2018 Release date July

More information

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:

More information

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti SECTION 2 (Part B) Types And Components Of Computer Systems 2 Hardware & Software Hardware: is the physical parts of the computer system the part that you can touch and see. Hardware can be either external

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Document Control Sheet Q Pulse Reference Number Version Number Document Author Lead Executive Director Sponsor Ratifying Committee POL-F-IMT-2 V02 Information Governance Manager

More information

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017 Wye Valley NHS Trust Data protection audit report Executive summary June 2017 1. Background The Information Commissioner is responsible for enforcing and promoting compliance with the Data Protection Act

More information

Microsoft 365 Business FAQs

Microsoft 365 Business FAQs Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft

More information

Protecting Health Information

Protecting Health Information Agenda Protecting Health Information BRONSON HEALTHCARE GROUP INFORMATION TECHNOLOGY SECURITY ENGINEERING MICHAEL SMITH Personal device usage with sensitive data Mobile devices and BYOD Secure messaging

More information

Enterprise Mobile Management (EMM) Policies

Enterprise Mobile Management (EMM) Policies Enterprise Mobile Management (EMM) Policies Best Practices Guide Copyright 2016 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software

More information

Mobile configuration guide for NHSmail

Mobile configuration guide for NHSmail Mobile configuration guide for NHSmail Version 3 Published July 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created

More information

Broward College Telecommuting and Hoteling Technology Proposal (2017)

Broward College Telecommuting and Hoteling Technology Proposal (2017) Broward College Telecommuting and Hoteling Technology Proposal (2017) CONTENTS Introduction... 2 Telecommuting or Telework (Offsite)... 2 Equipment, Software and Communication Requirements... 2 Standard

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

The essential guide to creating a School Bring Your Own Device Policy. (BYOD)

The essential guide to creating a School Bring Your Own Device Policy. (BYOD) The essential guide to creating a School Bring Your Own Device Policy. (BYOD) Contents Introduction.... 3 Considerations when creating a BYOD policy.... 3 General Guidelines for use (Acceptable Use Policy)....

More information

TAG GD3030 rugged tablet

TAG GD3030 rugged tablet white paper TAG GD3030 rugged tablet The rugged design that boost efficiency in critical situations The TAG GD3030 Makes Every Task More Efficient The TAG GD3030 is the latest 10.1 IP65 Windows tablet

More information

USB for Portable Devices

USB for Portable Devices 1 USB for Portable Devices 2 USB for Desktops USB was first introduced as a solution to desktop interconnectivity ity At the time, desktops had a number of different wired interfaces Printer, mouse, keyboard,

More information

Bring Your Own Device (BYOD) Information for Parents and Carers

Bring Your Own Device (BYOD) Information for Parents and Carers Bring Your Own Device (BYOD) Information for Parents and Carers Overview Students attending North Lakes State College will bring their own portable computing device to the College as a tool to enhance

More information

Mobile Security using IBM Endpoint Manager Mobile Device Management

Mobile Security using IBM Endpoint Manager Mobile Device Management Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?

More information

MANAGING THE COMPLEXITY.

MANAGING THE COMPLEXITY. AS A SERVICE MANAGING THE COMPLEXITY. HOW WILL YOU SIMPLIFY ESN MIGRATION? Control room IT solutions play a vital role in incident management. Technologies such as Integrated Communications Control Systems

More information

Date Approved: Board of Directors on 7 July 2016

Date Approved: Board of Directors on 7 July 2016 Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory

More information

BYOD in the Workplace. A Webanywhere Free Guide

BYOD in the Workplace. A Webanywhere Free Guide What is BYOD? BYOD is an acronym for Bring your own device. This refers to when staff bring personally owned hardware to work. This can be anything but most commonly comprises handheld devices such as

More information

Bring Your Own Device (BYOD) Policy and Procedure

Bring Your Own Device (BYOD) Policy and Procedure Bring Your Own Device (BYOD) Policy and Procedure BYOD Policy 1. Preamble 1.1. Policy Purpose This policy is to ensure that students and staff are aware of their responsibilities regarding Bring Your Own

More information

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) Bring Your Own Device (BYOD) Information Session Tue 30 th October 2018 3:20pm & 5:00pm Welcome Mr Anthony Lanskey Principal Topics covered during this session 1. The what, how and why of BYOD and online

More information

HP ELITEPAD 1000 G2 POWERED BY INTEL IN HEALTHCARE

HP ELITEPAD 1000 G2 POWERED BY INTEL IN HEALTHCARE HP ELITEPAD 1000 G2 POWERED BY INTEL IN HEALTHCARE * in Allscripts Wand for TouchWorks app in VitalHub Chart Every day, technology improves productivity in professional fields around the world and healthcare

More information

Student Computer Devices 2019

Student Computer Devices 2019 Student Computer Devices 2019 This document describes technology that KWS students may encounter at different stages from 2019. Students will use different devices as they progress through school KWS provides

More information

CDW.ca/lenovo

CDW.ca/lenovo Choose Lenovo Lenovo is built for work Lenovo has a wide selection of powerful and adaptable mobile devices, from laptop solutions to touch-enabled Windows 8 devices. CDW.ca/lenovo 800.732.8197 Why choose

More information

Data ownership within governance: getting it right

Data ownership within governance: getting it right Data ownership within governance: getting it right Control your data An Experian white paper Data Ownership within Governance : Getting it right - 1 Table of contents 1. Introduction 03 2. Why is data

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

Work with Lap Top computers (Portable Display Screen Equipment)

Work with Lap Top computers (Portable Display Screen Equipment) Work with Lap Top computers (Portable Display Screen Equipment) 1 Portable DSE, such as laptop and notebook computers, is subject to the Occupational Safety and Health (Display Screen Equipment) Regulations

More information

Bring Your Own Device Handbook

Bring Your Own Device Handbook Bring Your Own Device Handbook Introduction from the Principal In 2018, the College moved to a BYOD program for all Year 6 students and gave this choice for any student in Years 7-12. In 2019, we will

More information

Data Handling Security Policy

Data Handling Security Policy Data Handling Security Policy May 2018 Newark Orchard School Data Handling Security Policy May 2018 Page 1 Responsibilities for managing IT equipment, removable storage devices and papers, in the office,

More information

XenApp, XenDesktop and XenMobile Integration

XenApp, XenDesktop and XenMobile Integration XA, XD and XM Integration XenApp, XenDesktop and XenMobile Integration for a Comprehensive Mobility and Digital Workspace Solution Citrix.com 1 Desktop and application virtualization have enhanced mobility

More information

ICT Portable Devices and Portable Media Security

ICT Portable Devices and Portable Media Security ICT Portable Devices and Portable Media Security Who Should Read This Policy Target Audience All Trust Staff, contractors, and other agents, who utilise trust equipment and access the organisation s data

More information

CABOOLTURE STATE HIGH SCHOOL BRING YOUR OWN DEVICE PROGRAM INFORMATION

CABOOLTURE STATE HIGH SCHOOL BRING YOUR OWN DEVICE PROGRAM INFORMATION LOGO DESIGN: JACKSON LANYON 10B2 CABOOLTURE STATE HIGH SCHOOL BRING YOUR OWN DEVICE 2018-19 - PROGRAM INFORMATION www.cabooltureshs.eq.edu.au byod@cabooltureshs.eq.edu.au 54980111 Bring Your Own Device

More information

BYOD Portal Information Pack

BYOD Portal Information Pack BYOD Portal Information Pack 2015 Program Page 1 of 11 Contents Why Dell?... 3 About Datacom Systems... 3 Dell Warranty, Accidental Damage and Insurance options... 3 Dell Pro Support Onsite Warranty Solution

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy 2015 City of Glasgow College Charity Number: SCO 36198 Page 1 of 9 Table of Contents 1. Introduction... 3 2. Purpose and Aims... 4 3. Scope... 4 4. Policy Statement... 5 4.1

More information

Introducing. Worldpay Total. Worldpay international omni-channel payment solution

Introducing. Worldpay Total. Worldpay international omni-channel payment solution Introducing Worldpay Total Worldpay international omni-channel payment solution All your channels, connected Whatever the sales channel, however your customers want to pay, Worldpay Total has it covered.

More information

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017 THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017 An IT Architect s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy As the consumerization

More information

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015 Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually

More information

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device

More information

MaaS360 Secure Productivity Suite

MaaS360 Secure Productivity Suite MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity

More information

TAG GD700 rugged tablet

TAG GD700 rugged tablet white paper TAG GD700 rugged tablet Designed to be ready for always-connected duty The TAG GD700 Suitable for a wide range of deployments The TAG GD700 is a 7-inch tablet that s part of TAG Global System

More information

Procedure: Bring your own device

Procedure: Bring your own device Procedure: Bring your own device Purpose This procedure defines the obligations for all authorised users who choose to connect a personally owned device to the University s network or who use their personal

More information

ZM Schools 1:1 Mobile Device Program for

ZM Schools 1:1 Mobile Device Program for ZM Schools 1:1 Mobile Device Program for 2017-18 ZM will continue the very successful model we implemented last year with students in grades 6-12 being required to carry a personal mobile device every

More information

Remote Working & Mobile Devices Security Standard

Remote Working & Mobile Devices Security Standard TRUST-WIDE NON-CLINICAL DOCUMENT Remote Working & Mobile Devices Security Standard Standard Number: Scope of this Document: Recommending Committee: Approving Committee: SS02 All Staff Joint Information

More information

Catalogue. Assembling... 1 Unpack Charge the Battery Install the Memory Card Product Basics Buttons and Connections...

Catalogue. Assembling... 1 Unpack Charge the Battery Install the Memory Card Product Basics Buttons and Connections... Catalogue Assembling... 1 Unpack... 1 Charge the Battery... 1 Install the Memory Card... 1 1 Product Basics... 2 1.1 Buttons and Connections... 2 1.2 Start Up and Shut Down... 2 2 Introduction of Google

More information

ITONLINEEXAM.COM. Chapter 1 Basic Introduction to Computers

ITONLINEEXAM.COM. Chapter 1 Basic Introduction to Computers ITONLINEEXAM.COM Chapter 1 Basic Introduction to Computers A World of Computers Computers are everywhere 2 What Is a Computer? A computer is an electronic device, operating under the control of instructions

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

AVANTUS TRAINING PTE LTD

AVANTUS TRAINING PTE LTD [ICDL-CS]: WSQ ICDL Computer Essentials Length Technology Delivery Method : 2 Days : Computers, Microsoft Windows : Instructor-led (Classroom) Course Overview This module sets out essential concepts and

More information

New Schools Teacher Workstation and Classroom Summary

New Schools Teacher Workstation and Classroom Summary Teacher Workstation and Classroom Summary Workstation: Mobile Device Printer: All Schools, All Classrooms NISD Approved Desktop In HS GT, Journalism and Photography Classrooms, Apple imac Computer is provided

More information

Guide Series. How to upgrade to Microsoft Windows 10? Guide Series

Guide Series. How to upgrade to Microsoft Windows 10? Guide Series How to upgrade to Microsoft Windows 10? Acuutech All rights reserved 2016 1 Contents Introduction... 2 Why use Windows 10?... 3 What are the advantages of Windows 10?... 4 Windows 10 editions comparison...

More information

Bring Your Own Device (BYOD) Launches September, 2017 Now Includes Students in Grades The How of BYOD. Preparing the Learners

Bring Your Own Device (BYOD) Launches September, 2017 Now Includes Students in Grades The How of BYOD. Preparing the Learners Bring Your Own Device (BYOD) Launches September, 2017 Now Includes Students in Grades 7-12 The How of BYOD How is the school preparing for a successful launch of a BYOD for students in Grades 7 8? This

More information

2016 HSC Information and Digital Technology Networking and hardware Marking Guidelines

2016 HSC Information and Digital Technology Networking and hardware Marking Guidelines 2016 HSC Information and Digital Technology Networking and hardware Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 B 3 A 4 D 5 A 6 D 7 B 8 A 9 B 10 C 11 B 12 C 13 A 14 C

More information

Data protection policy

Data protection policy Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees

More information

Bring Your Own Device 2018 Handbook

Bring Your Own Device 2018 Handbook Bring Your Own Device 2018 Handbook Introduction from the Principal In recent years the College has provided a laptop for each student from Years 6-12. This centrally driven and supported model for the

More information

Using GIGABYTE Tablet PC for the First Time

Using GIGABYTE Tablet PC for the First Time Congratulations on your purchase of the GIGABYTE Tablet PC! This manual will help you to get started with setting up your Tablet PC. The final product configuration depends on the model at the point of

More information

FY18 ITS Service Rates

FY18 ITS Service Rates Updated by Richard Hu Updated on 4/25/17 FY18 ITS Service Rates Desktops, Laptops, Mobile & Other Devices Standard Devices FY18 Rate New Connection, Replacement, Reconnect, FY17 Rate Relocation Standard

More information

Introducing K-12 Solutions for:

Introducing K-12 Solutions for: Introducing K-12 Solutions for: Mobile Devices Collaboration Software Mobile Peripherals Content Filtering Mobile Device Management (MDM) Curriculum Configuration Services Wireless Infrastructure Learning

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Is your business future ready?

Is your business future ready? Is your business future ready? Does your organization have this user type? On-the-Go-Pro Convenience: Connectivity: Comfort: Be more mobile with lightweight, portable devices. Stay connected, and even

More information

DELL BYOD Portal Information Pack

DELL BYOD Portal Information Pack DELL BYOD Portal Information Pack 2017 Program Page 1 of 13 Contents Why Dell?... 3 About Datacom Systems... 3 Dell Warranty, Accidental Damage and Insurance options... 3 Dell Pro Support Onsite Warranty

More information

Managing Windows 8.1 Devices with XenMobile

Managing Windows 8.1 Devices with XenMobile Managing Windows 8.1 Devices with XenMobile Mobile Device Management for Windows 8.1 Devices The Bring Your Own Device Challenge With the advent of the bring your own device (BYOD) trend, employees expect

More information

INDIA The Changing Face of the Workplace: Going Light and Mobile

INDIA The Changing Face of the Workplace: Going Light and Mobile An IDC InfoBrief May 2016 Commissioned by Executive Summary In today s hypercompetitive business environment, organizations are pushing for greater efficiencies to drive business growth. The growing diversity

More information

Healthcare mobility: selecting the right device for better patient care

Healthcare mobility: selecting the right device for better patient care Healthcare mobility: selecting the right device for better patient care How Fujitsu Mobile Solutions help accelerate digital transformation with human-centric innovation* Fujitsu Thought Leadership Report

More information

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy NHS Gloucestershire Clinical Commissioning Group 1 Document Control Title of Document Gloucestershire CCG Author A Ewens (Emergency Planning and Business Continuity Officer) Review Date February 2017 Classification

More information

Accessing CharityMaster data from another location

Accessing CharityMaster data from another location Accessing CharityMaster data from another location When all of your computers are on the same Local Area Network (LAN), you can place the back end files (including your data and the Word templates) onto

More information

Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013

Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013 Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board Issued: September 2013 Document reference: 495A2013 Status of report This document has been prepared for the internal

More information

Managing BYOD Networks

Managing BYOD Networks Managing BYOD Networks SPS-2013 Raghu Iyer raghu.iyer@nevisnetworks.com 1 What is BYOD Bring Your Own Device Are you allowing a Rogue? SPS-2013 Raghu Iyer raghu.iyer@nvisnetworks.com 2 Why BYOD Increased

More information

MOBILE DEVICES FOR SURVEY WORK

MOBILE DEVICES FOR SURVEY WORK MOBILE DEVICES FOR SURVEY WORK Guidelines for administrators (Sep 6, 2013) Mobile Devices: Android-based phones and tablets, also referred to as mobile devices, have become a reliable tool in assisting

More information

BYOD AT GLENWOOD HIGH SCHOOL 2018 2 Dear Parent / Carer Glenwood High School uses a BYOD model where parents are given the option of purchasing a device of their choosing, as long as it meets a set of

More information

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017 GMSS Information Governance & Cyber Security Incident Reporting Procedure February 2017 Review Date; April 2018 1 Version Control: VERSION DATE DETAIL D1.0 20/04/2015 First Draft (SC) D 2.0 28/04/2015

More information

Deployments Teacher Workstation and Classroom Summary

Deployments Teacher Workstation and Classroom Summary Teacher Workstation and Classroom Summary All Schools, All Classrooms Workstation: NISD Approved Desktop In HS GT, Journalism and Photography Classrooms, Apple imac Computer is provided for teacher. Mobile

More information

HIPAA and HIPAA Compliance with PHI/PII in Research

HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA Compliance Federal Regulations-Enforced by Office of Civil Rights State Regulations-Texas Administrative Codes Institutional Policies-UTHSA HOPs/IRB

More information

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) Bring Your Own Device (BYOD) Guidelines/FAQs July 27, 2012 1 As new and emerging technologies continue to change the world we live in, they also provide an opportunity for many unique and positive educational

More information

Rugged Computing Range

Rugged Computing Range Rugged Computing Range A leader in the global ICT Industry, MiTAC International Corp. was founded in 1982, and designs and manufactures awardwinning technology products for the automotive, enterprise,

More information

User Guide. CG666 Page 2. Open the back cover and remove the battery. Insert the SIM card correctly in the card slot as shown below.

User Guide. CG666 Page 2. Open the back cover and remove the battery. Insert the SIM card correctly in the card slot as shown below. GET TO KNOW YOUR PHONE... 2 INSERT SIM AND MEMORY CARD... 2 CHARGE THE BATTERY VIA POWER SOCKET OR USB... 4 HELPFUL KEYS AND SHORTCUTS...5 SWITCH PHONE ON/OFF... 6 LOCK/UNLOCK THE PHONE... 6 MAKE A CALL...

More information

Introduction to Android Tablets and Smartphones

Introduction to Android Tablets and Smartphones The name Android describes mobile devices which use the Android operating system developed by Google and used in many brands of Smartphones and Tablets types and models. Such as Samsung, Sony, Aldi, Huawie,

More information

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more - Samsung Tablet Photo - Tablets Mean Business Survey of IT pros reflects growing trend toward tablets for workforce mobility and more Table of contents Introduction 2 Giving employees what they want pays

More information

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved. Rethinking VDI: The Role of Client-Hosted Virtual Desktops White Paper 2011 Virtual Computer, Inc. All Rights Reserved. www.virtualcomputer.com The Evolving Corporate Desktop Personal computers are now

More information

Dell BYOD Portal Information Pack

Dell BYOD Portal Information Pack Dell BYOD Portal Information Pack 2016-2017 Program Kelvin Grove State College BYOD Portal Site https://myschoolshop-qld.datacom.com.au/kgsc Access Key: kgsc Pin: f5j3pc Page 1 of 12 Contents Why Dell?...

More information

Financial Conduct Authority. Financial Crime : A Guide for Firms

Financial Conduct Authority. Financial Crime : A Guide for Firms WHITEPAPER Financial Conduct Authority Financial Conduct Authority Financial Crime : A Guide for Firms Summary The Financial Conduct Authority regulates the financial services industry in the UK. Tackling

More information

Types of Computers. Computer Technology (S1 Obj 1-1)

Types of Computers. Computer Technology (S1 Obj 1-1) Types of Computers Computer Technology (S1 Obj 1-1) Introduction There are many different types of computers available today. They are categorized into different types depending on their size and processing

More information

Dell BYOD Portal Information Pack

Dell BYOD Portal Information Pack Dell BYOD Portal Information Pack 2018 Program Page 1 of 15 Contents Why Dell?... 3 About Datacom Systems... 3 Dell Warranty, Accidental Damage and Insurance options... 3 Dell Pro Support Onsite Warranty

More information

Remote Working Policy

Remote Working Policy [Type text] [Type text] [Type text] Information Management & Policy Services (IMPS) Remote Working Policy 1 Scope and definitions 1.1 This policy applies to all staff who use or access University systems

More information