Tata Power Company Ltd. TATA POWER
|
|
- Diana Boyd
- 5 years ago
- Views:
Transcription
1 Tata Power Company Ltd. IT Policy- , Internet Browsing, and VPN Access TATA POWER Information Technology Division March
2 Creation Date March 2003 First Revision Due on March 2004 Second Revision due on Dec Third Revision due on Fourth Revision due on IT Policy Revision History Approval History Created By Shrikant H. Agarwal March 2003 Checked By V. N. Prabhu March 2003 Approved By VP (F) March 2003 Revision 1.0 Created By Shrikant H. Agarwal January 2004 Checked By V. N. Prabhu January 2004 Approved By VP (F) March
3 About This Document Tata Power Co. Ltd Tata Power Co. Ltd IT Policy - and Internet Browsing Facility This document details the infrastructure available within the Organization for (internal and external), and Internet browsing facility. This document also details the organizational policy laid out. Infrastructure Access to latest and accurate information and data is critical to Organizational business of Tata Power. Due to heavy organizational dependence on electronic information, Tata Power employs a variety of Electronic Systems (Hardware and Software) Personal Computers (Desktops, Laptops, and PDAs), Servers for providing services such as SAP, Office Productivity tools, MIS. All the offices have LAN connectivity to desktop and Laptops are interconnected to the network either via copper, fiber or wireless media. In all, there are about 1000 PCs in the organization deployed for a variety of use. Tata Power has Optical and Microwave links connecting all the divisions and departments in and around Mumbai. All the stations are interconnected to the corporate WAN via 10/100 Mbps network except Bhivpuri and Ambernath where we have a microwave link with a speed of 64/128 Kbps. The TPC WAN thus provides a very high-speed connectivity to the various network services/resources such as Servers (SAP, Internet, Intranet, PMS etc.) The outlying SBUs are connected to Mumbai via VSAT links or thro leased lines/vpn. Various Backup devices have been made available such as CDROMs, Tape, and Backup Server etc. in order to facilitate the software and corporate data. Backup servers have been provided by IT in order to facilitate storage and retrieval of user generated data in compressed form and password protected at different locations. A. within TPC 1. Eligibility: All PC users in TPC B. Policy Guidelines 2. Specific Approval: Business partners/consultants who are working in TPC premises for specific assignments: On specific approval, by the SBU Head (at the level of DGM and above (Form B) for a specified period as per requirements. A. Internet A. Internet Browsing 1. Eligibility: All officers. 2. Specific Approval: All other employees on need basis on specific approval by SBU Head at the level of DGM and above (Form A). 3
4 1. Eligibility: All Officers. 2. Specific Approval: All other employees on need basis on specific approval by SBU Head and VP/ED (Form A). B. VPN Access from Home for 1. Eligibility: AGM and above. 2. All other officers on need basis on specific approval from their SBU Heads and VP/ED (Form A). The officer will need to have a PC with a modem and an Internet connection at home. VPN client will be installed on the home PC for this purpose. 4
5 THE TATA POWER COMPANY LIMITED Request for , Internet Account (TPC Employees) (Form A) To, GM (IT & TELECOM) InfoTech Dharavi DATE: Please arrange to provide /connectivity to Internet for the following employee as per the category given below: Name: Dept / Div: (Last name Middle name First name) Employee Number: ContactNumber IC/MW/P&T/Mobile Designation Any other information: Duration: Temporary / Permanent If Temporary account Period from: To: Category of account: Internet browsing & Internet Internet Only VPN Connectivity Nature of equirement: Requested by: Date: Recommended by: (Head of the Dept.) Approved by: (Sr. GM\VP\ED\MD) Date: Date: B. For InfoTech Use Only Account opened on: Login Name: To be terminated on: (If temporary) System Administrator 5
6 6
7 To, Tata Power Co. Ltd THE TATA POWER COMPANY LIMITED Request for , Internet Account (External Users, Partners, Consultants) (Form B) GM (IT & TELECOM) InfoTech Dharavi DATE: Please arrange to provide connectivity to Internet for the following person as per the category given below: Name:Organization (Last name Middle name First name) Employee ID: Contact Number: Inter Com /Land line /Mobile Designation Any other information: Reporting Division in Tata Power Co.: Duration: Period from: To: [All accounts to be given for the required period only and in any case not more than 1 Year, after which renewal may be considered if required with the consent of the Divisional Head. The cost of service will be billed to the requesting Division.] Category of account: Internet browsing & Internet Internet Only VPN Connectivity Nature of TPC Assignment: Requested by: Date: Recommended by: (Tata Power Head of the Dept.) Approved by: (Sr. GM\VP\ED\MD) Date: Date: 7
8 C. For InfoTech Use Only Account opened on: To be terminated on: Login Name: System Administrator Undertaking Form Received Date Undertaking For External Users of , Internet Connectivity Facility in Tata Power Co. Ltd. I, an employee of am presently working at Division at Location. During the course of my assignment at Tata Power Co. Ltd. I require to avail /internet connectivity and other network resources in Tata Power in order to fulfill my assignment. I/my Organization hereby agree to strictly abide by the Information Security Rules laid out at Tata Power Co. Ltd.. I understand that the /internet connectivity is being extended to me by Tata Power for the sole purpose of completing my assignment at Tata Power Ltd., and I agree to use this facility for this purpose alone. I/my Organization will be totally responsible for any Cyber Law or copyright violation arising due to my usage of internet/ connectivity. I/my Organization agrees to not to disclose any information (Business, commercial, network, plant) verbally, electronically or in writing to any third party unless such a disclosure is officially approved in writing by Tata Power Co. Ltd. I/my Organization shall destroy all information (Electronic or Hardcopy) obtained upon the completion of my assignment at Tata Power unless specifically permitted by Tata Power in writing. Name: Organization: Designation: Date: Company Seal 8
Tata Power Company Ltd. Corporate Information Technology. IT Policy- Proxy Bypass IP Address Allocation
IT Policy- Proxy Bypass IP Address Allocation Tata Power Company Ltd. February 2005 1 2 Approval History Rev. 0. February 2005 Created By Checked By Approved By Shrikant H. Agarwal E. R. Batliwala VP 3
More informationApex Information Security Policy
Apex Information Security Policy Table of Contents Sr.No Contents Page No 1. Objective 4 2. Policy 4 3. Scope 4 4. Approval Authority 5 5. Purpose 5 6. General Guidelines 7 7. Sub policies exist for 8
More informationEmsi Privacy Shield Policy
Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (
More informationWireless Security Access Policy and Agreement
Wireless Security Access Policy and Agreement Purpose The purpose of this policy is to define standards, procedures, and restrictions for connecting to Fort Valley State University s internal network(s)
More informationINFORMATION ASSET MANAGEMENT POLICY
INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives
More informationRegistration & Log In Guide Government Portal
Government Support Portal Those municipal, township, or county authorities who are aggregators, actively bill a municipal utility tax, or are considering a municipal utility tax can use this self-service
More informationPrimenet Global Ltd A CLASS INTERNET SERVICE PROVIDER COMPLETE SOLUTIONS FOR NETWORKING & INTERNET SERVICES
Primenet Global Ltd.Valuing Trust A CLASS INTERNET SERVICE PROVIDER COMPLETE SOLUTIONS FOR NETWORKING & INTERNET SERVICES DELHI NCR MUMBAI CHENNAI BANGALORE HYDERABAD PUNE www.primenet.in Who we are Primenet
More informationGM Information Security Controls
: Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5
More informationTerms and Conditions - Dedicated Internet Access Service
Terms and Conditions - Dedicated Internet Access Service 1. Description of Service: Dedicated Internet Access ( DIA ) Service ( Service ), which includes T1, DS-3, Ethernet, Fast Ethernet, Gigabit Ethernet
More informationUse of Mobile Devices on Voice and Data Networks Policy
World Agroforestry Centre Policy Series MG/C/4/2012 Use of Mobile Devices on Voice and Data Networks Policy One of the policies on information security and business continuity which will be audited by
More informationPersonal Communication Devices and Voic Procedure
Personal Communication Devices and Voicemail Procedure Reference No. xx Revision No. 1 Relevant ISO Control No. 11.7.1 Issue Date: January 23, 2012 Revision Date: January 23, 2012 Approved by: Title: Ted
More informationGlobal Communication Certification Council Communication Management Professional Certification Application
INSTRUCTIONS FOR COMPLETING AND SUBMITTING YOUR APPLICATION AND DOCUMENTATION Carefully follow the instructions to complete your application. Be sure to complete all appropriate sections and sign your
More informationWhat kind of information do you collect, when and how?
Associated Telecom Solutions Privacy Policy Action- Tec Services Ltd T/A Associated Telecom Solutions collects business data in order to provide our services to our business customers. During the relationship
More informationInformation Security Management Criteria for Our Business Partners
Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents
More informationWireless Communication Device Policy Policy No September 2, Standard. Practice
Standard This establishes the business need and use of cellular phones (hereinafter referred to as wireless communication devices ) as an effective means of conducting City of Richland business, and to
More informationNEOBROADBAND LTE SERVICE SCHEDULE
Liquid Telecommunications South Africa (Pty) Ltd 401 Old Pretoria Main Road Halfway House, Midrand 1685 South Africa T +27 11 585 0000 NEOBROADBAND LTE SERVICE SCHEDULE Liquid Telecom Offices Mauritius
More informationINDIA TOURISM DEVELOPMENT CORPORATION LIMITED Unit : Ashok Travels & Tours, Bangalore
GENERAL TERMS & CONDITIONS FOR APPOINTMENT OF CONSOLIDATOR FOR ATT BANGALORE 1. Should own minimum of 5 Coaches ( High Tech 35 Seater registration not earlier than 2003). 2. Should have minimum of three
More informationAccredited & Approved
Accredited & Approved Tawasul Telecom has been providing MPLS Services with 24/7 support and monitoring to AT&T since 2011 supporting AT&Ts presence in the Middle East & North Africa region. As of 2003,
More informationChapter 6. CFA Planning for developing areas
Chapter 6 CFA Planning for developing areas For internal circulation of BSNL only Page 1 CFA Planning in Developing Areas CFA (Consumer Fixed Access ) mainly comprises of two things i.e. fixed line access
More informationManagement Instruction
Management Instruction The Advanced Computing Environment This Management Instruction sets forth policy for the Advanced Computing Environment (ACE) within the United States Postal Service. All Web links
More informationVerified Volunteers. A division of Sterling Talent Solutions. Privacy Policy. Last Updated: June 21, 2016
Verified Volunteers A division of Sterling Talent Solutions Privacy Policy Last Updated: June 21, 2016 Verified Volunteers, a division of Sterling Talent Solutions ( Company, we, us, or our ) provide this
More informationLecture 8 Winter 2006 Enterprise and Personal Communications Networks
Information Technology Lecture 8 Winter 2006 Enterprise and Personal Communications Networks 1 Objectives Identify the reasons that multiuser systems are used in business. Describe eight network service
More informationVFS GLOBAL PVT LTD PRIVACY DISCLAIMER
VFS GLOBAL PVT LTD PRIVACY DISCLAIMER Version 1.0 Privacy Disclaimer Scope VFS GLOBAL (hereinafter referred to as VFS GLOBAL ) is an outsourced partner of Diplomatic Missions across globe, and is authorized
More informationSTRATEGIC COMMUNICATION MANAGEMENT PROFESSIONAL CERTIFICATION
STRATEGIC COMMUNICATION MANAGEMENT PROFESSIONAL CERTIFICATION INSTRUCTIONS FOR COMPLETING AND SUBMITTING YOUR APPLICATION AND DOCUMENTATION Carefully follow the instructions to complete your application.
More informationPrivacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES
Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY Cookeville Communications Media is committed to maintaining robust privacy protections for its users. Our privacy policy is designed to help you
More informationSubject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer:
Section Number Section Header: Subject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer: TABLE OF CONTENTS Introduction...1
More informationGEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures IIA (204.07) Authority: Effective Date: Page 1 of Bryson/Jacobs 04/21/15 6
GEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures Facility /Education Subject: Inmate Use of Computers (204.07) Revises Previous Authority: Page 1 of Bryson/Jacobs I. POLICY: It is the policy
More informationThis policy is a public document and has been prepared in light of the National Privacy Principle 5: Openness.
Privacy Policy: Wireless Life Pty Ltd trading as ISP Connect Effective: 11 November 2015 Wireless Life Pty Ltd t/as ISP Connect ( ISP Connect ) is committed to protecting the privacy of its customer s
More informationDepartment Name: Budget Unit: Office of Communications & Information Technology (OCIT)
Department Name: Budget Unit: 7600000 Office of Communications & Information Technology () 1. Program Title: Applications Support Program Description: Communications and Media Officers coordinate with
More informationAMS Electronic Journals License Agreement
Sales & Member Services Department cust-serv@ams.org 401.455.4000 401.455.4046 (f) www.ams.org AMS Electronic Journals License Agreement By this Agreement, the American Mathematical Society (AMS) grants
More informationNATIONAL COMMODITY & DERIVATIVES EXCHANGE LIMITED
NATIONAL COMMODITY & DERIVATIVES EXCHANGE LIMITED Circular to all trading and clearing members of the Exchange Circular No. : NCDEX/CSG-003/2018/185 Date : August 01, 2018 Subject : Formats - Creation
More informationMay 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems
Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 3.63 REVISED TOTAL PAGES Dec. 30, 2007 8 Division Computer Systems Cross Reference: I. Definitions A. Executable File A program or file
More informationGIFTePay XML SVS/GCS. Installation & Configuration Guide. Version Part Number: (ML) (SL) GIFTePay XML for SVS/GCS 4.
GIFTePay XML Installation & Configuration Guide SVS/GCS Version 4.01 Part Number: 8662.97 (ML) 8662.98 (SL) GIFTePay XML for SVS/GCS 4.01 1 GIFTePay XML Installation & Configuration Guide Copyright 2008
More informationObjectives. Network Structure. Network Structure
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Communicating over the Network Network Fundamentals Chapter 2 Chapter 1 1 Describe the structure of a network, including the devices
More informationFitness Manager V4 Install Guide
Fitness Manager V4 Install Guide Table of Contents 1 Welcome to V4...3 License Agreement...4 Copyright...4 2. Minimum System Requirements...5 3. Navigating the Install...6 4. Installing V4 on the Server...7
More informationINSTRUCTIONS ON TECHNICAL SUPPORT AND BACKUP FOR THE ELECTRONIC INTERBANK CLEARING SYSTEM
INSTRUCTIONS ON TECHNICAL SUPPORT AND BACKUP FOR THE ELECTRONIC INTERBANK CLEARING SYSTEM In accordance with UNMIK Regulation Nr. 2001/26 on Payments Transactions and based on Section 9 of Rule XVIII on
More information"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.
Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and
More informationONLINE LEARNING MOODLE INSTRUCTIONS FOR STUDENTS TAFENSW.EDU.AU
ONLINE LEARNING MOODLE INSTRUCTIONS FOR STUDENTS TAFENSW.EDU.AU welcome CONTENTS TECHNICAL REQUIREMENTS FOR USING MOODLE 4 LOGGING INTO YOUR MOODLE COURSE 5 WELCOME TO YOUR STUDY EDITING YOUR MOODLE PROFILE
More informationUniversity of Wyoming Mobile Communication Device Policy Effective January 1, 2013
University of Wyoming Mobile Communication Device Policy Effective January 1, 2013 Introduction and Purpose This policy allows the University to meet Internal Revenue Service (IRS) regulations and its
More informationTable of Contents. Blog and Personal Web Site Policy
Table of Contents Blog and Personal Web Sites Policy... 2 Policy... 2 Rights to content... 3 Option for More Restrictive License Terms... 3 Attribution... 4 Guidelines... 4 Personal Website and Blog Guidelines
More information<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device
More informationPerfect Time Pro v User Manual
Perfect Time Pro v 2.0 - User Manual With Perfect Time Pro Version 2.0, we have combined two of our very successful product lines into one comprehensive time management solution. Merging our Point Of Entry
More informationMARVEL CREATE YOUR OWN
Tap Tap Comics Pty Ltd. MARVEL CREATE YOUR OWN Privacy Policy December 4, 2017 By accessing or using the MARVEL CREATE YOUR OWN interactive software application, the MARVEL CREATE YOUR OWN service, and/or
More informationBombay Stock Exchange Limited
Bombay Stock Exchange Limited APPLICATION FOR NETWORK CONNECTIITY FOR CDSL OPEARTION To be filled in by the CDSL Member and submitted to CDSL 16 th Floor, P.J. Towers, Mumbai 400 001. 1. Participant details
More informationeprost System Policies & Procedures
eprost System Policies & Procedures Initial Approval Date: 12/07/2010 Revision Date: 02/25/2011 Introduction eprost [ Electronic Protocol Submission and Tracking ] is the Human Subject Research Office's
More informationCOMPANY CREDENTIALS. Sheng Li Telecom India Pvt. Ltd. Sheng Li Telecom click & Learn more.
COMPANY CREDENTIALS Sheng Li Telecom click & Learn more Sheng Li Telecom India Pvt. Ltd. www.shenglitelecom.in Company Overview Sheng Li Telecom India Pvt. Ltd. is incorporated on 21 August 2012. It is
More informationBGAN. Global voice and broadband data. The mobile satellite company
BGAN Global voice and broadband data The mobile satellite company Broadband Global Area Network Redefining remote Inmarsat s Broadband Global Area Network service BGAN is the world s first mobile communications
More informationAnnals of Mathematics Electronic License Agreement
Annals of Mathematics Electronic License Agreement Annals of Mathematics, Fine Hall-Washington Road, Princeton University, Princeton, NJ 08544-1000, USA. Fax: 1-609-258-1367 Phone: 1-609-258-4191. By this
More informationAT&T Dynamic Traffic Management Enterprise Attachment Last Revised 1/24/2018
AT&T Dynamic Traffic Management Enterprise Attachment Last Revised 1/24/2018 1. General. Pursuant to the terms and conditions of the Agreement (including, without limitation, this Attachment), AT&T will
More informationInstallation & Set-Up Guide (For PFW users)
STC Utilities Installation & Set-Up Guide (For PFW users) Service Technologies Corporation makes no representations or warranties with respect to the contents of this guide and disclaims any implied warranties
More informationACCEPTABLE USE OF INFORMATION SYSTEMS
Manual/Section: Administrative Manual/Information Services Key Words: Policy No.153 1. PURPOSE: 1.1 Use of Information Systems is an essential means for doing business at the Children s Hospital of Eastern
More informationResponsible Officer Approved by
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
More informationInformation Technology Department (ITD) Fort Peck Assiniboine & Sioux Tribes Policy for Software and Hardware. June 2013
Information Technology Department (ITD) Fort Peck Assiniboine & Sioux Tribes Policy for Software and Hardware June 2013 Introduction Since the IT department is a new department within the Fort Peck Tribes
More informationAcceptable Use Policy
Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications
More informationRevised September 2011 Broadband Access Agreement for BIT Communications
Revised September 2011 Broadband Access Agreement for BIT Communications 1 This Broadband Access Agreement for BIT Communications High Speed Internet serves as a confirmation and acknowledgment of the
More informationBroadband Internet Access Disclosure
Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided
More informationCenteris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information
Section 01 Document Information Creation Date: 12/1/2016 Centeris Data Centers - Security Procedure Revision Date: 2/28/2018 Effective Date: 2/28/2018 Section 02 Site Information Site Information Document
More informationGuidelines. Technical and Financial Support. State Wide Area Network (SWAN)
No. 1(3)/2004-EGD Guidelines For Technical and Financial Support For Establishment Of State Wide Area Network (SWAN) 20 th October, 2004 Department of Information Technology, Govt. of India, Electronics
More informationprovides for a single domain name. Additional domain names are available upon request in accordance with the rates, terms and conditions below.
TELUS Communications Company 4th Revised Page 226-1 Cancels 3rd Revised Page 226-1 226 Wholesale Internet ADSL Service 226.1 Service Description Wholesale Internet ADSL Service is a broadband access service
More informationI n s t r u c t i o n S h e e t on the Handling of Information Classified VS - NUR FÜR DEN DIENSTGEBRAUCH (VS-NfD) (RESTRICTED) in Industry
I n s t r u c t i o n S h e e t on the Handling of Information Classified VS - NUR FÜR DEN DIENSTGEBRAUCH (VS-NfD) (RESTRICTED) in Industry (VS-NfD-Merkblatt) This Instruction Sheet determines the handling
More informationTIER Program Funding Memorandum of Understanding For UCLA School of
TIER Program Funding Memorandum of Understanding For UCLA School of This Memorandum of Understanding is made between the Office of Information Technology (OIT) and the School of ( Department ) with reference
More informationData Processing Agreement
Data Processing Agreement This Data Processing Agreement ( the Agreement or DPA ) constitutes the obligations for TwentyThree ApS Sortedam Dossering 5D 2200 Copenhagen N Denmark (hereinafter The Data Processor
More informationWELLSBORO AREA SCHOOL DISTRICT
No. 815.2 SECTION: OPERATIONS WELLSBORO AREA SCHOOL DISTRICT TITLE: DISTRICT-ISSUED LAPTOPS: STUDENT USE, RIGHTS, AND RESPONSIBILITIES ADOPTED: April 14, 2015 REVISED: October 7, 2015 815.2. DISTRICT-ISSUED
More informationFrontier Telephone Companies TARIFF FCC NO. 3 Original Page 16-1 ACCESS SERVICE
Original Page 16-1 16. Grandfathered Services Grandfathered services are tariff offerings which are limited to existing customers and are not available to new customers. The services listed in this section
More informationSynchrotron Light Source Australia Pty Ltd
Document no: 22670 Revision no: 2.0 Date: 11 August 2014 Synchrotron Light Source Australia Pty Ltd ABN 18 159 468 256 ACN 159 468 256 www.synchrotron.org.au 800 Blackburn Road, CLAYTON, VIC, 3168 p +613
More informationUlster University Policy Cover Sheet
Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective
More informationa. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard
Kiosk Security Standard 1. Purpose This standard was created to set minimum requirements for generally shared devices that need to be easily accessible for faculty, staff, students, and the general public,
More informationMarshall University Information Technology Council. Procedure ITP-16 IT INFRASTRUCTURE AUTHORIZATION PROCEDURE
Marshall University Information Technology Council Procedure ITP-16 IT INFRASTRUCTURE AUTHORIZATION PROCEDURE General Information: 1.1 Scope: This procedure applies to all University employees, including
More informationGUIDELINES FOR RWANDA INTERNET EXCHANGE POINT (RINEX) MANAGEMENT
REPUBLIC OF RWANDA RWANDA UTILITIES REGULATORY AGENCY P.O BOX 7289 KIGALI RWANDA http://www.rura.gov.rw E-mail: dgoffice@rura.gov.rw Phone: (250) 58 45 63 GUIDELINES FOR RWANDA INTERNET EXCHANGE POINT
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationPENN MANOR SCHOOL DISTRICT
No. 815.2 SECTION: OPERATIONS PENN MANOR SCHOOL DISTRICT TITLE: DISTRICT-ISSUED LAPTOPS: STUDENT USE, RIGHTS, AND RESPONSIBILITIES ADOPTED: August 19, 2013 REVISED: April 20, 2015 815.2. DISTRICT-ISSUED
More informationPublic Fixed Telecommunications Networks and Services Tariff Number B17-01
General Tariff Information Service Provider Name Qatar Telecom (QTel) Q.S.C. License Public Fixed Telecommunications Networks and Services Tariff Number B17-01 Service Name Global IP VPN Service Tariff
More informationSPECIAL SERVICES AND FACILITIES
MTS Inc. SUPPLEMETARY TARIFF RT 24002 SPEIAL SERVIES AD FAILITIES 2nd Revised Page 89 ancels 1st Revised Page 89 ITEGRATED DIGITAL ETWORK SERVIES Because the ommission has forborne, in Telecom Regulatory
More informationFarmers Mutual Telephone Company. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and
Farmers Mutual Telephone Company Broadband Internet Access Services Network Management Practices, Performance Characteristics, and Commercial Terms and Conditions for Fixed Services Farmers Mutual Telephone
More informationTerms and Conditions 01 January 2016
Terms and Conditions 01 January 2016 thehealthsource: Terms and Conditions Page 1 of 7 This Agreement (the Agreement ) is entered into by and between thehealthsource (Pty) Ltd and the entity agreeing to
More informationAT&T Texas Section: 44 Dallas, Texas Sheet: 1 Issued: October 31, 2014 Revision: 1 DEER PARK EMERGENCY NETWORK SERVICE
Dallas, Texas Sheet: 1 1. Service Description 1.1 Deer Park Emergency Network Service (ENS) is an optional, specific use communications arrangement. ENS is a private switched network which permits calling
More informationICT Security Policy. ~ 1 od 21 ~
ICT Security Policy ~ 1 od 21 ~ Index 1 INTRODUCTION... 3 2 ELEMENTS OF SECURITY CONTROL... 4 2.1 INFORMATION MEDIA MANAGEMENT... 4 2.2 PHYSICAL PROTECTION... 6 2.3 COMMUNICATION AND PRODUCTION MANAGEMENT...
More informationMonthly Performance Metrics. December 2018
Department of Technology Monthly Performance Metrics December 2018 Compliance Level Legend In Compliance Out of Compliance Within Tolerance Insufficient Data SERVICE AVAILABILITY Target Performance Actual
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More informationD2-01_12 DISASTER-RESILIENT TELECOMMUNICATIONS SYSTEMS FOR SMART GRID IN JAPAN
D2-01_12 DISASTER-RESILIENT TELECOMMUNICATIONS SYSTEMS FOR SMART GRID IN JAPAN by Atsushi Ohara Shikoku Electric Power Co., Inc. (JP) Ryouichi Ito Fujitsu Ltd. (JP) Kousuke Kimura Tohoku Electric Power
More informationAPPENDIX H: McMURDO STATION COMPUTER INFORMATION For more information, visit
APPENDIX H: McMURDO STATION COMPUTER INFORMATION For more information, visit http://www.usap.gov/technology/contenthandler.cfm?id=94 In this appendix, you will find information on the following: H.1 Information
More informationNetworks. Computer Technology
Networks Computer Technology Network Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing data and programs Advantages of Networks Communication
More informationWHITE PAPER- Managed Services Security Practices
WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to
More informationInformation technology security and system integrity policy.
3359-11-10.3 Information technology security and system integrity policy. (A) Need for security and integrity. The university abides by and honors its long history of supporting the diverse academic values
More informationCarrier Line Service
Issue date 15.02018 Replaces version 2-2 Agreement Contract for Data Services Contract for Mietleitung FMG 1/8 Table of contents Table of contents...2 1 Introduction...3 2 Service overview...3 3 Service
More informationCC COMMUNICATIONS TELEPHONE TARIFF NO. 21 Reissued PAGE NO. 1 CANCELS PAGE NO. 1 INTEGRATED SERVICES DIGITAL NETWORK TABLE OF CONTENTS: REVISION PAGE
Reissued PAGE NO. 1 CANCELS PAGE NO. 1 TABLE OF CONTENTS: REVISION PAGE Table of Contents Reissued 1 Description of ISDN Service Reissued 2 Regulations and Conditions Reissued 2 Regulations and Conditions
More informationNetApp Cloud Volumes Service for AWS
NetApp Cloud Volumes Service for AWS AWS Account Setup Cloud Volumes Team, NetApp, Inc. March 29, 2019 Abstract This document provides instructions to set up the initial AWS environment for using the NetApp
More informationMedicalDirector Data Consent Form
MedicalDirector Data Consent Form Dear Doctor, MedicalDirector is committed to ethical and appropriate practices to maintain the expectations of the community and the requirements of the law for the security,
More informationSERVICE TERMS AND SLA FOR LEASE OF DARK FIBER
SERVICE TERMS AND SLA FOR LEASE OF DARK FIBER Dark Fiber Lease. These are the service terms and service level agreement for the lease of Global Crossing Dark Fiber which apply to the provision of Dark
More informationTata Power Company. Ltd.
System Backup Policy and Procedures Guidelines Tata Power Company. Ltd. October 2005 Corporate Information Technology 1 2 Approval History Rev. 0 October, 2005. Signature Created By SHA/FKT/CPS October,
More informationGENERAL TARIFF CRTC 21461
410 Resale and Sharing 410.1 Service escription Original Page 410-1 TELUS telecommunications services may be shared or resold in accordance with the terms and conditions specified in this Tariff. However,
More informationNote on. Alternative of BRI Connection For MAX-NG subscriber
Note on Alternative of BRI Connection For MAX-NG subscriber Released On : 12 th March 2012 CENTRE FOR DEVELOPMENT OF TELEMATICS MANDI ROAD, MEHRAULI, NEW DELHI 110030, INDIA ELECTRONICS CITY (PHASE I),
More information*Please mention service provider name i.e. Airtel or TCL in the order of choice i.e., first choice and second choice.
Date: Membership Department National Spot Exchange limited, Suren Road Chakala, Andheri East Fax- 022 6761 9931 Dear Sir, Sub: Request for MPLS leased circuit feasibility check This has reference to your
More informationAshford Board of Education Ashford, Connecticut POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION
Ashford Board of Education Ashford, Connecticut Series 2000 Administration POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I. POLICY The Board of Education (the Board ) complies with all
More informationNetwork Services Enterprise Broadband
Contents 1. 2. ADSL/Broadband Provisions 3. Network Services Customer Responsibilities 4. Network Services General 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects
More informationHPE DATA PRIVACY AND SECURITY
ARUBA, a Hewlett Packard Enterprise company, product services ( Services ) This Data Privacy and Security Agreement ("DPSA") Schedule governs the privacy and security of Personal Data by HPE in connection
More informationFiling Date: Effective Date: Issued pursuant to Telecom Regulatory Policy CRTC ,
CARRIER ACCESS TARIFF CRTC 21462 TELUS Communications Company 2nd Revised Page 226-1 Cancels 1st Revised Page 226-1 226 Wholesale Internet ADSL Service 226.1 Service Description Wholesale Internet ADSL
More informationGIFTePay XML. Valuelink. Installation & Configuration Guide. Version Part Number: (ML) (SL)
GIFTePay XML Installation & Configuration Guide Valuelink Version 4.10 Part Number: 8662.92 (ML) 8662.93 (SL) GIFTePay XML Installation & Configuration Guide Copyright 2008 Datacap Systems Inc. All rights
More informationInformation Security BYOD Procedure
Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,
More informationInformation Security Policy
April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING
More information