Cross Country Healthcare, Inc.

Size: px
Start display at page:

Download "Cross Country Healthcare, Inc."

Transcription

1 Cross Country Healthcare, Inc. Acceptable Use Policy Handbook March 2015 Version 1.0 Document # SC_IT_ Park of Commerce Blvd. Boca Raton, Florida crosscountryhealthcare.com

2 Table of Contents 1. Introduction What Will I Gain by Reading This Handbook? Whom Do I Contact If I Have Questions? Users Information Security Quick Reference Card User Responsibilities Desktop Computer (PC) Security Appropriate Use Physical Security Software Desktop Computer Data Backup Viruses Laptop and Portable Computers Appropriate Use Physical Security Data Backup Internet Use And Access Appropriate Use Inappropriate Use File Transfer Guidelines Privacy Enforcement and Non-Compliance of Internet Guidelines Electronic Mail Appropriate Use Privacy Receiving Unwanted or Offensive messages Message Retention Mailing Lists and ListServs General Caution Voice Mail Appropriate Use Voice Mail Passwords Privacy Receiving Malicious or Offensive Voice Messages Network Use Appropriate Use Responsibilities Privacy Password Security Difficult-to-Guess Passwords Required; Cyclical Passwords Prohibited Minimum Password Length

3 3.7.3 User-Chosen Passwords Will Not Be Reused Suspected Disclosure Forces Password Changes Password-Sharing Prohibition Leaving Sensitive Systems without Logging Off Communications Security Insertion of Computer-Related Contact Numbers in Directories Leaving Sensitive Information on Answering Services Telephone Directories That Contain Restricted Information Physical Security Consistent Protection of Information Storage of Sensitive Information When Not in Use Testing of Access Controls Forbidden Approval Needed for Removal of Computer/Communications Equipment Managers Information Security Quick Reference Card (See CCH Security Brochure for pull out card) Manager Responsibilities Personnel Security Reporting Changes in User Duties to Systems Security Administration Transfer of Information Custodian Duties after Employee Terminations Responsibility for Taking Action in Response to Employee Terminations Information Security Responsibilities in Job Descriptions Information Security Considered in Employee Performance Evaluations Disaster Recovery Planning Compliance with Standards Required for Emergency/Disaster Support Framework for Segmenting Information Resources by Recovery Priority Organization and Maintenance of Computer Emergency Response Team Preparation and Maintenance of Computer Disaster Recovery Plans Preparation and Maintenance of Business Contingency Plans Computer and Communications System Contingency Plan Testing Physical Access Control Physical Access Control for Areas Containing Sensitive Information Information Security Policy Introduction Purpose Scope Responsibilities CCH Policy And Requirements Overview Use Of Company Data, Information Systems, Company Rights, And Security Requirements Employee And Non-Employee Responsibilities Consequences Of Noncompliance Reporting Procedures

4 4

5 1. Introduction Cross Country Healthcare Security s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Cross Country Healthcare s established culture of openness, trust, and integrity. The Cross Country Healthcare Security & Compliance team is committed to protecting Cross Country Healthcare's employees, partners and the company from illegal or damaging actions by individuals, either knowingly or unknowingly. The Acceptable Use Policy Handbook is intended to be a resource to all CCH and subsidiary employees. This handbook contains important information to help employees understand and comply with the CCH Information Systems Policies distributed in March Information Security & Compliance applies to all of us. Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and use of FTP, are the property of Cross Country Healthcare. These systems are to be used for business purposes only, in serving the interests of the company, our clients and of our customers in the course of normal day-to-day business operations. Please review Human Resources Policies for further details. Effective security over company systems and data is a team effort involving the participation and support of every Cross Country Healthcare employee, subsidiary employee, and affiliates who deals with information and/or information systems. It is the responsibility of every computer user to know and understand these guidelines, and to conduct their activities accordingly. Failure to comply with and enforce this Acceptable Use Handbook and CCH Information Systems Policies will result in disciplinary action up to and including termination. 1.1 What Will I Gain by Reading This Handbook? The proper use of all CCH system resources, protection of company data, and information security does not need to be intrusive or difficult. This handbook describes in simple, concise language what users and supervisors need to know about the acceptable use of our internal systems and bring awareness to ensure how everyone in the company can help keep our company data secure. Our ability to do the basics will make a huge difference in keeping our company data safe and our systems and applications more secure. This Handbook will answer simple questions such as: What can I use the Internet for? What are the requirements for passwords? (Keep them secret!) Are electronic mail and voice mail private? Should I turn my computer off at night and when I leave the office? Can I share my User ID? What do I do if I get a computer virus? 1.2 Whom Do I Contact If I Have Questions? Questions regarding information security and/or this acceptable use handbook should be directed to your supervisor, your local Human Resources representative, or the Director, IT Security & Compliance. 5

6 2. Users Information Security Quick Reference Card 3. User Responsibilities Every employee is responsible for information security on a day-to-day basis. 3.1 Desktop Computer (PC) Security Appropriate Use Employees are authorized to use CCH desktop computing resources only for legitimate business purposes. Desktop computing resources include personal computers (PC s), and other computing devices such as printers, scanners, faxes, modems, etc. CCH desktop resources may not be used for conducting personal business. Use of company desktop resources for personal business could result in disciplinary action up to and including termination. 6

7 3.1.2 Physical Security While it is not physically possible to completely secure all company desktop computing resources, all employees must take reasonable measures to secure these resources when not in use. Reasonable measures include reporting any suspicious persons or activity in your work area to building security and Human Resources immediately and securing unattached computing components when unattended Software Every software package includes a licensing agreement. This licensing agreement, along with the federal copyright law, defines rights and usage limitations for the software package. When an individual breaks the seal of a software package, that individual accepts the terms of the license agreement for CCH. Software copyright and licensing policies vary from vendor to vendor and from one program to another. When it comes to the software on end user desktop resource, it should be noted that CCH has purchased these software packages (i.e. MS Office Suite) and gives IT the right to install and use the software, but does not imply that IT or CCH end users have complete ownership of the program. CCH Employees may not copy the written materials accompanying the software. Multiple installations (desktop installation and laptop installation) and all home use of CCH software must comply with licensing restrictions and be approved by your department director and IT System Administrator. No personal software may be used on CCH network or desktop workstations. All data disks or files brought from home or received from an outside source must be checked for viruses Desktop Computer Data Backup Users must be aware that any files that are stored in the user s local hard drive and not on the network cannot be backed up by IT. Please contact the CCH Service Desk at or Ext for instructions on how to ensure your files are stored and backed up via our company s network Viruses A computer virus is an unauthorized program that replicates itself and spreads onto various data storage media (CD/DVD, USB thumb drives, etc.) and/or across a network via or file share directories. The symptoms of virus infection include much slower computer response time, unexplainable loss of files, changed modification dates for files, increased file sizes, and total failure of computers. CCH has deployed anti-virus software (TrendMicro) throughout the company. This software is maintained and supported by Information Technology, and users may not tamper with these programs or their settings. Because viruses have become very complex, users must not attempt to eradicate them from their systems themselves. Computer viruses can spread quickly, and they must be eradicated as soon as possible to limit serious damage to computers and data. If you suspect that a virus has infected your computer, you should do the following: 1. Contact the CCH Service Desk ( or Ext ) immediately 2. Stop using your computer 3. Disconnect Ethernet Cable (looks like a large phone plug) 4. Be prepared to provide documentation and to participate in the investigation of how your computer became infected 7

8 3.2 Laptop and Portable Computers Appropriate Use Employees are authorized to use CCH laptops and portable computer resources, such as smartphones, tablets only for legitimate business purposes. CCH laptops and portable computer resources may not be used for conducting personal business. Use of these company resources for personal business could result in disciplinary action up to and including termination Physical Security Laptop theft worldwide is on the increase. Employees must take responsibility for safeguarding all laptops and portable computing accessories in their possession at all times. Security Tips: Never leave laptops unattended, especially in airports, taxi cabs, or hotel rooms Keep a watchful eye whenever you must pass your laptop through an X-ray security conveyor such as ones you will find in an airport. Be careful to place the laptop on the belt immediately before passing through yourself so you will be able to receive the item on the other side without delay Do not leave laptops unattended in the office, especially overnight. If you must leave your laptop in the office overnight, you must ensure that it is secured in a locked drawer or office A lost laptop not only causes a monetary loss to the company, but the potential that data stored in the laptop is exposed to unauthorized parties also exposes the company to legal and regulatory consequences Laptop thefts must be reported immediately (2 hours) to the CCH Service Desk as follows: Phone: After hours call / Ext Using another computer send CCHServiceDesk@crosscountry.com See Laptop Theft Policy for additional details Data Backup Due to risk of loss/theft or system failure, it is especially critical that all files on your laptop computer be backed up on a regular basis. The contents of Your Home Directory (R :) are backed up to the network; consequently any critical files must be stored there. Critical or important files stored on your laptops local My Documents folder will not be backed up. For additional instructions on how to back up your files, please contact the Service Desk. 3.3 Internet Use And Access CCH encourages the use of the Internet because it makes communications more efficient and effective, and because it is a valuable resource for researching information about our vendors, customers, and business partners. However, the Internet must be used responsibly, and therefore, the following guidelines apply to all Internet use that is: Accessed on or from company premises Accessed using company equipment, including laptops and home computers connected to the company network Used in a manner which identifies CCH as the Company 8

9 3.3.1 Appropriate Use The Internet is intended for company business use only. Although use of the Internet for personal business use may be understandable and acceptable at times, this is a privilege that the company reserves the right to control, similar to personal phone calls. Legitimate company business use of the Internet includes but is not limited to: Product and company research Business, industry, and competitive news and information research Access to CCH information, products, and services Communication with vendors, business partners, and customers Any electronic communications sent via the Internet must responsibly represent the Company just like any other official company communication. Documents, programs, or data (collectively referred to as Files ) downloaded from the Internet are automatically scanned for viruses, if a virus is detected on a downloaded file please contact the CCH Service Desk at Ext immediately. Further, all files downloaded from the Internet are subject to any applicable copyright limitations Inappropriate Use The Internet may not be used for any illegal or unethical purpose (Refer to Business Ethics Policy (page 12) of the Cross Country Healthcare, Inc. Policy & Procedure on our local Human Resources Portal). It also may not be used for transmitting, retrieving, or storing any communications of an obscene, discriminatory, or harassing nature, or in any other way that violates company policy. Employees may not use CCH Internet resources to read or hack into other systems or to breach any computer or network security measures Employees may not send electronic media or communications via the Internet that attempt to conceal the identity of the sender or which represent the sender as someone other than his/her true identity Employees who use the Internet to obtain access to online information sources may not further copy, distribute, or forward copyrighted materials accessed thereon except as explicitly permitted by the copyright owner, or after consulting CCH s legal counsel, as allowed under applicable copyright law No employee may use the Internet to upload or download any files, documents, programs, or data (collectively referred to as Files ) to or from the Internet or to or from any other on-line service, regardless of whether such Files belong to the company, the employee, or a third party, without prior written consent of company management and/or the employee s supervisor No programs or applications may be downloaded or installed from the Internet without the approval of the Information Technology group File Transfer Guidelines CCH employees may be granted authority by management to transfer files across the Internet using the File Transfer Protocol (FTP) Service. The following guidelines apply to all uses of the FTP Service: Employees will need to make a formal FTP access request via the CCH Service Desk Employees must obtain written consent from company management and/or the employee s supervisor prior to using the FTP Service 9

10 All files transmitted to or from CCH resources remain the property of the Company, must serve a legitimate business purpose, and must abide by the appropriate use guidelines included in this handbook Files that contain sensitive, company protected, or personal information must not be transmitted through the FTP service without taking appropriate measures, such as encryption and password protection, to safeguard the information Privacy CCH routinely monitors Internet and network usage and periodically reviews individual employee use. Therefore, employees should not assume that electronic communications are private and confidential, and should transmit personally sensitive information in other ways. Again, employees should have no expectation of privacy in the use of electronic communications using company resources. Such communications should not contain sensitive information, company-protected information, or personal content Enforcement and Non-Compliance of Internet Guidelines The guidelines contained above are enforced through the company Information Security Policy. Management will monitor employee use of the Internet to ensure that the above guidelines are adhered to. The Information Technology Department will also monitor Internet use and inform company management when violations occur. Employee violation of these guidelines will result in discipline up to and including termination. 3.4 Electronic Mail Appropriate Use Employees are authorized to use Electronic Mail, or , only for legitimate business purposes. Such usage includes but is not limited to communication with co-workers, vendors, customers, and other people and organizations engaged in business with CCH. Since each outgoing Internet message is identified as originating within CCH or one of its subsidiaries, the same rules of usage apply as for telephone and business letter communications. Electronic mail may not be used for conducting personal business. Use of electronic mail for personal business could result in disciplinary action up to and including termination Privacy All computers located at or issued or distributed by CCH and the data stored on them are and remain at all times the property of the Company. As such, all electronic mail messages composed, sent, and received on the Company s computers are and remain the property of the Company. The Company reserves the right to retrieve and read any electronic mail message composed, sent, and/or received. Because it is possible to recreate a message even after it has been erased, the privacy of messages cannot be guaranteed to anyone. Electronic mail messages are potentially subject to interception and to disclosure to third parties in the course of litigation or investigation. Also, the Company retains the right to monitor the use of . Although interception, disclosure to third parties, and monitoring are likely to occur infrequently, employees should have no expectation of privacy in these communications. Therefore, such messages should not contain sensitive information such as credit card numbers, company-protected information, or other personal or confidential material. Although access to the Company s system includes the use of passwords, the reliability of passwords for maintaining confidentiality cannot be guaranteed. Each user must assume that any and all messages may be read by someone other than the intended recipient(s). 10

11 3.4.3 Receiving Unwanted or Offensive messages Although CCH has implemented technology to filter and block unsolicited , also known as Spam, it is possible to receive unsolicited and/or unwanted messages much the same as it is possible to receive junk mail or chain letters at home. If the message is inoffensive and not repeated, erase it and forget it. However, if the message is repeated or offensive, contains objectionable material or language, or is damaging to the Company, you are required to report that message to your supervisor, department head, Human Resources, or Director, IT Security & Compliance immediately. This is necessary to allow the Company to take the appropriate steps to protect both the employee and the Company. Employees are not to send electronic mail messages containing material or language that may reasonably be considered offensive or disruptive to any employee. This includes sexual comments, racial slurs, or any other comments that would offend someone on the basis of his or her age, gender, sexual orientation, race, color, national origin, marital status, veteran s status, disability, or religion. Any user who generates offensive or disruptive messages is subject to disciplinary action up to and including termination Message Retention Because messages are not private and are subject to interception and disclosure to third parties, it is critical to retain messages (both sent and received) only as long as necessary. The Company s document retention policy applies to and other computer records as well as to hard copies of documents, and employees are to refer to that policy to determine the appropriate retention period for individual messages. As a general rule, messages are considered either non-essential communications, which are to be retained for no longer than one month, or intracompany memoranda, which may be retained for no longer than one year, unless otherwise directed by the Company s HR or Legal Department. The Company retains ownership of all messages transmitted over company-owned equipment Mailing Lists and ListServs Subscriptions to mailing lists and list services (RSS Feeds, ListServs) should be for legitimate business purposes only and are subject to the appropriate use guidelines described above. Traffic volume for these services may be monitored and excessive use curtailed General Caution is a quick and powerful tool with many legitimate uses. The fact that it is connected to the Internet means that the Company cannot guarantee that you will never be offended by messages sent to you. It also cannot guarantee that messages you send will not be read by anyone other than the intended recipients. 3.5 Voice Mail Appropriate Use Voice mail users are authorized to use the voice mail system for legitimate business purposes. Such usage includes but is not limited to communication with coworkers, vendors, customers, and other people and organizations engaged in business with CCH. Users are also required to report all incidents referenced in the Receiving Malicious or Offensive Voice Messages section below. Inappropriate use of the voice mail system could result in disciplinary action up to and including termination. 11

12 3.5.2 Voice Mail Passwords The requirements for a voice mail password are as follows: The minimum length of a voice mail password is four digits The new password must be different from the password being changed The new password cannot be the default password Privacy All telephone equipment, including the voice mail system and its contents, is the property of the Company. As such, all voice mail messages composed, sent, and/or received on the Company s voice mail systems are and remain the property of the Company. The Company reserves the right to retrieve and document any voice mail message on the company system at any time. Unless marked as a private message, a voice mail message may be forwarded to any other user on the system by the receiver of the message. For example, if you create and send a voice mail message to mailbox 1234 and do not mark the message private, voice mail user 1234 may forward that message to any other voice mailbox on the system Receiving Malicious or Offensive Voice Messages CCH prohibits the use of malicious and offensive messages. A voice mail user who receives a malicious or offensive voice mail message should first save the message, and then report the incident to her/his supervisor or department head immediately. The supervisor should, in turn, notify your local Human Resources representative and the Director, IT Security & Compliance (Ext ). 3.6 Network Use Appropriate Use Employees are authorized to use company network resources, including the Internet, only for legitimate Company purposes. The Company s network resources may not be used for personal business. Inappropriate use of network resources may result in disciplinary action up to and including termination Responsibilities All employees are responsible for the appropriate use of network resources. Each network user is responsible for reading and abiding by the Information Security Policy and the guidelines contained herein Network users must adhere to computer password standards as defined in the Global Password Standards document Privacy Network resources may be monitored by the Company. Although monitoring is likely to occur infrequently, employees should have no expectation of privacy regarding their communications over the Company s network. Therefore, no documents should contain personally sensitive information, and all documents should be maintained and protected within the guidelines of this handbook. 12

13 3.7 Password Security Difficult-to-Guess Passwords Required; Cyclical Passwords Prohibited All computer system users must choose passwords that cannot easily be guessed. This means that passwords will NOT be related to the user s job or personal life, e.g., a car license plate number, a spouse s name, or address. Words found in a dictionary should also be avoided. Users may not construct passwords using a basic sequence of characters that is then partially changed based on the date or some other predictable factor. For example, users may not employ passwords like JAN01 in January, FEB02 in February, etc Minimum Password Length All passwords must have at least eight characters User-Chosen Passwords Will Not Be Reused Users may not employ passwords that are identical or substantially similar to passwords that have been employed within the last six months Suspected Disclosure Forces Password Changes The user is responsible for promptly changing any password that he or she suspects or knows has been disclosed to unauthorized parties. The Director, IT Security and Compliance should also be notified immediately in the event of such disclosure Password-Sharing Prohibition Regardless of the circumstances, passwords must never be shared or revealed to anyone. To do so exposes the authorized user to responsibility for any actions a third party takes with the password. If users need to share computerresident data, they should use electronic mail or public directories on local area network servers, or should contact the Security Administrator for access (with the manager s written approval) Leaving Sensitive Systems without Logging Off Users may not leave their workstation or terminal unattended without first logging off or enabling other access controls such as screen locks (Ctrl-Alt-Del). Any exceptions must be pre-approved in writing by the Director, IT Security and Compliance and the Department Director, Vice President, or equivalent member of management. 3.8 Communications Security Insertion of Computer-Related Contact Numbers in Directories Information regarding access to CCH computer and communications systems, such as wireless networks SSID and keys, is considered confidential. This information may NOT be posted on social media sites, listed in online directories, placed on business cards, or otherwise made available to third parties without the advance written permission of the appropriate department director. 13

14 3.8.2 Leaving Sensitive Information on Answering Services Employees must refrain from leaving messages containing sensitive information on answering machines or voice mail systems. CCH may monitor any and all electronic communications originated at, received by, or passed through CCH resources Telephone Directories That Contain Restricted Information Internal telephone directories may not be distributed to third parties without the specific authorization of a department manager. Contractors, consultants, temporaries, and other third parties working for CCH may have telephone directories as their jobs require. 3.9 Physical Security Consistent Protection of Information Information must be protected in a manner commensurate with its sensitivity, value, and criticality. This policy applies regardless of the media on which information is stored, the locations where the information is stored, the systems used to process the information, and the processes by which information is handled. Examples of media for information storage include paper, presentations, CD/DVD and USB thumb drives. Examples of locations where information is stored include a headquarters building or a remote location. Examples of systems used for information processing include voice mail systems, fax machines, and laptop personal computers. Examples of processes used to handle information include the in-house systems development methodology, annual budget preparation procedure, and employee background-checking procedure Storage of Sensitive Information When Not in Use When not being used by authorized employees, all hardcopy sensitive information must be locked in file cabinets, desks, or other secure location. Likewise, when not being used or when not in a clearly visible and attended area, all computer media (CD/DVD and USB thumb drives, etc.) containing sensitive information must be stored in secure locations Testing of Access Controls Forbidden Employees may not attempt to enter restricted areas on the premises of CCH, such as the Data Center, Network Closet, or Operations center, nor break computer network restrictions, such as firewalls and password measures, to which they have not received access authorization Approval Needed for Removal of Computer/Communications Equipment Personal computers, portable computers, modems, printers, and other related information systems equipment may not be taken from CCH premises unless management has first been notified and has given written approval. 14

15 4. Managers Information Security Quick Reference Card (See CCH Security Brochure for pull out card) 5. Manager Responsibilities Managers are responsible for knowing and enforcing all End User Guidelines in addition to Manager Guidelines. 15

16 5.1 Personnel Security Reporting Changes in User Duties to Systems Security Administration Human Resource Management must promptly report all significant changes in end-user duties or employment status to the Director, Security & Compliance and/or Security & Compliance Administrator(s) for appropriate handling of the access entitlement for User IDs of the affected persons Transfer of Information Custodian Duties after Employee Terminations When an employee leaves a position, both computer-resident files and paper files must promptly be reviewed by his or her immediate manager to determine who should become the custodian of such files and/or which methods should be used for file disposal. Human Resources together with the employee s manager must then promptly reassign the employee s duties as well as specifically delegate responsibility for information formerly in the previous employee s possession Responsibility for Taking Action in Response to Employee Terminations In the event that an employee s (regular or contract) relationship with CCH is terminated, the employee s immediate manager together with Human Resources is responsible for ensuring that all company property in the custody of the employee is returned. This manager must also make sure that administrators handling the computer and communications accounts used by the employee are promptly notified and that all other work-related privileges of the employee are promptly revoked. Notification of all terminations will be communicated to Information Technology via Human Resources Information Security Responsibilities in Job Descriptions Specific information security responsibilities should be incorporated into employee job descriptions for employees who have access to sensitive or controlled information Information Security Considered in Employee Performance Evaluations Compliance with information security policies and procedures should be considered in employee performance evaluations for those employees who have access to CCH information. 5.2 Disaster Recovery Planning Compliance with Standards Required for Emergency/Disaster Support Subsidiaries, divisions, departments, and other CCH organizational units must implement hardware and software policies and related procedures to follow in the event of an emergency or a disaster Framework for Segmenting Information Resources by Recovery Priority Management will establish and use a logical framework for segmenting information resources by recovery priority. This will allow the most critical information resources to be recovered first. All departments will use such a framework when preparing information systems contingency plans. 16

17 5.2.3 Organization and Maintenance of Computer Emergency Response Team Management will organize and maintain an in-house computer emergency response team that will provide accelerated problem notifications, damage control, and problem-correction services in the event of computer-related emergencies such as virus infections, data breaches, natural disasters, and the like Preparation and Maintenance of Computer Disaster Recovery Plans Management will prepare, periodically update, and regularly test a disaster recovery plan that will allow critical computer and communications systems to be readily available and to resume processing quickly in the event of an interruption of service due to a major disaster such as a flood, earthquake, or tornado Preparation and Maintenance of Business Contingency Plans Management will prepare, periodically update, and regularly test a business contingency plan. This plan will specify how alternative facilities such as offices, furniture, telephones, and copiers will be provided so that employees can continue operations in the event of either an emergency or a disaster Computer and Communications System Contingency Plan Testing To the extent practical and feasible, computer and communications system contingency plans will be tested at regular intervals to ensure that they are still relevant and effective. After each test, a brief report will be submitted to top management officials detailing the results of the test and any remedial actions to be taken. 5.3 Physical Access Control Physical Access Control for Areas Containing Sensitive Information Access to all computer rooms and file servers containing sensitive information will be controlled in such a way that will protect that information. 6. Information Security Policy 6.1 Introduction Information and information systems are critical CCH assets that provide a significant business benefit to our Company. Accordingly, CCH management has a responsibility to protect and manage our Company s data and information systems. This means that we will take appropriate steps to ensure that data and information systems are properly protected from a variety of threats such as natural disaster, service interruptions, error, fraud, unauthorized changes, and embezzlement. The following is the information protection policy for all the organizations and corporate functions within the Company. 6.2 Purpose Computing resources are the hardware, software, networks, and data used to conduct the Company s business by employees and by other organizations and individuals authorized to do so. The purpose of this policy is to ensure that 17

18 the Company s computing resources are protected and commensurate with the value they represent to the Company. This will ensure the confidentiality, availability, and integrity of data while reducing the risk of data loss. 6.3 Scope This policy encompasses all the Company s computing resources, including interfaces with external systems and networks. All employees, vendors, suppliers, and other authorized individuals are required to observe this policy. This applies to all corporate information systems, facilities, communications, and networks and the information stored and processed on these facilities. Noncompliance with information security policies, standards, or procedures is a serious matter and is grounds for disciplinary action, including termination. 6.4 Responsibilities All employees are responsible for reading, understanding, and complying with the policies, standards, and guidelines for protecting CCH s information assets. Management is responsible for establishing and maintaining security for data and computing resources within their functional area. Management will, specifically: Evaluate and implement adequate controls to secure data and computing resources Authorize individuals access to corporate data Monitor compliance with this policy The Information Technology Department is responsible for supporting the corporation in the design, installation, maintenance, training, and use of Information Security controls. In addition, the Information Technology Department will monitor compliance with this policy and consult with each division as needed to ensure protection of the Company s data and computing assets. 6.5 CCH Policy And Requirements 6.6 Overview CCH will exercise basic Information Security precautions based on sound business judgment, the value of the data being protected, and the risk associated with the protected data. The Company will implement the Information Security precautions in such a way as to: 1. Hold individuals accountable for their use of corporate data 2. Authorize access to data on a need-to-know basis; access will be granted only to that set of data necessary to accomplish authorized endeavors 3. Ensure the timely recovery of data and provide backup processing capabilities in the event of lost data or information system capabilities 6.7 Use Of Company Data, Information Systems, Company Rights, And Security Requirements 1. CCH internal information systems are defined as including the computers, networks, and software and the data that they process. They are the private property of the Company. They shall be used only for business purposes that are in the interest of the Company as authorized by company management. Without specific written 18

19 exception, all programs, data, files, records, and documentation generated by or provided by employees, consultants, or contractors on the information systems of CCH are the property of CCH. 2. CCH information systems shall be protected commensurate with their value, sensitivity, and criticality. Although complete, constant protection is not feasible, CCH personnel must exercise due diligence and implement reasonable and prudent security measures, such as protecting information systems in a manner that meets legal and contractual requirements. Protection of information should be at least as secure as that of other organizations in the same industry. 3. Security measures shall include safeguards to protect information systems and their data against accidental or intentional unauthorized access, modification, damage, disclosure, corruption, or degradation of service. 4. Security measures shall be employed regardless of the media on which information is stored, the systems that process it, or the methods by which it is moved. CCH may monitor its systems and their data content at any time. 5. The computer and communications system privileges of all users, systems, and programs will be restricted based on the individual s need to know. Privileges will be granted only to those who need specific information for business purposes. Once granted, access privileges that are not used regularly or are no longer required shall be retracted. 6. Management shall conduct periodic reviews of risks to CCH systems and the effectiveness of CCH security measures. 7. Whenever a review of a security incident shows that the security of information systems is insufficient, management will take appropriate remedial action. 8. CCH information (databases, mailing lists, internal software, computer documentation, etc.) may be used only for the business purposes specifically allowed by management in conducting the business of CCH. Use of these information resources for any other reason will be permitted only after written permission has been granted by the appropriate manager authorized to do so. 9. CCH software, documentation, and all other types of internal information may not be sold or otherwise transferred to any non-company employee for any purposes other than business purposes expressly preauthorized by management. 10. All CCH internal information will be protected from disclosure to third parties. Third parties may be given access to internal company information only when a need to know exists and when such a disclosure has been expressly authorized by CCH management. 11. The utilization of computer programs licensed from third parties will be periodically reviewed by each business unit and/or department to ensure compliance with licensing agreements. 6.8 Employee And Non-Employee Responsibilities 1. A user is any person, whether an employee or not, who uses CCH information systems or their data in any way. Each user has an obligation to protect CCH information systems and to use them only as authorized and 19

20 only in the interest of the Company. This means that each user must employ appropriate security measures to prevent harm to CCH s interests that might stem from a variety of threats to information systems such as error, fraud, damage, service interruptions, or privacy violations. 2. Users have an obligation to educate themselves about the importance of computer security and the methods they should use to protect company information and assets. Users shall each obtain a copy of the CCH Security Policy Handbook and follow the measures stipulated. 3. All users who have access to company information systems shall be held accountable for the use of such access as defined in CCH s Non-Disclosure Agreement. Users must request access to use CCH information systems and applications by submitting a request to the CCH Service Desk- ( CCHServiceDesk@crosscountry.com, or call at / Ext. 7777). Each account (User ID) shall be assigned to a specific individual and, at a minimum, be protected by a password. Users shall keep their passwords secret and change them at appropriate intervals. 4. Users responsible for systems that can accept public or private network connections to CCH systems shall ensure that they are password-protected at a minimum, and follow specific requirements defined in the CCH Security Policy Handbook. 5. Users shall report, through appropriate means, any violations of this policy that they may observe or become aware of. 6. Anyone found in violation of this policy may be subject to disciplinary or legal measures. 7. Employees may not disclose to any persons outside CCH either the information system controls that are in use or the way in which they are implemented. 8. No one shall be granted a User ID or otherwise be given privileges to use CCH computers or communications systems unless the advance written approval of both the requestor s department head and the Director, IT Security & Compliance have been obtained. 9. All computer-resident information, including information on individual hard drives, which is sensitive, critical, or valuable, must be protected through system access controls to ensure that it is not improperly disclosed, modified, deleted, or rendered unavailable. 6.9 Consequences of Noncompliance Because data and computer security are critical to the corporate well-being, failure to comply with this policy can have severe consequences for the individuals involved and for the Company. Employees who violate the CCH Acceptable Use Policy will be subject to discipline up to and including termination. In addition, supervisors who reasonably should have detected and reported a violation of this policy may be disciplined. Of course, an employee suspected of such a violation will be afforded an opportunity to explain his or her actions fully before any disciplinary action is taken Reporting Procedures All CCH employees have a duty to report promptly all information security violations and problems to their Local System/Network Administrator, Human Resources, or to the Director, IT Security & Compliance on a timely basis so 20

21 that immediate remedial action may be taken. Management must promptly report known information security violations to the Director, IT Security and Compliance and Human Resources. If necessary, external authorities will be contacted in conjunction with corporate counsel. Whenever evidence shows that CCH has been or may have been victimized by a computer or communications crime, a thorough investigation will be performed by the Director, IT Security & Compliance and appropriate Human Resources staff. This investigation will provide sufficient information so that management can take steps to ensure that (1) effective security measures have been re-established so that incidents cannot reasonably take place again, and (2) appropriate disciplinary actions have been taken. How do I report a possible Information Security or Acceptable Use violation? 1. Contact your Local Human Resources representative as soon as possible 2. Notify your own manager 3. Document the problem and be prepared to cooperate as necessary with the investigation of the possible violation Any inquiries relating to this Acceptable Use Policy or the application of IT Policies should be referred to Director, IT Security & Compliance. 21

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.

More information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established

More information

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope Jacksonville State University Acceptable Use Policy 1. Overview Information Technology s (IT) intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Jacksonville

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial Corporate Policy Information Systems Acceptable Use Document No: ISY-090-10 Effective Date: 2014-06-10 Page 1 of 5 Rev. No: 0 Issuing Policy: Information Systems Department Policy Originator: Erick Edstrom

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Enviro Technology Services Ltd Data Protection Policy

Enviro Technology Services Ltd Data Protection Policy Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:

More information

IT ACCEPTABLE USE POLICY

IT ACCEPTABLE USE POLICY CIO Signature Approval & Date: IT ACCEPTABLE USE POLICY 1.0 PURPOSE The purpose of this policy is to define the acceptable and appropriate use of ModusLink s computing resources. This policy exists to

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

Acceptable Usage Policy (Student)

Acceptable Usage Policy (Student) Acceptable Usage Policy (Student) Author Arthur Bogacki Date 18/10/2017 Version 1.1 (content sourced and consolidated from existing Email and Electronic Communication, and User Code of Practice policies.)

More information

Seven Requirements for Successfully Implementing Information Security Policies and Standards

Seven Requirements for Successfully Implementing Information Security Policies and Standards Seven Requirements for Successfully Implementing and Standards A guide for executives Stan Stahl, Ph.D., President, Citadel Information Group Kimberly A. Pease, CISSP, Vice President, Citadel Information

More information

FERPA & Student Data Communication Systems

FERPA & Student Data Communication Systems FERPA & Student Data Ellevation is subject to the Family Educational Rights and Privacy Act (FERPA) as operating under the "school official" exception, wherein student directory and PII (Personal Identifying

More information

ACCEPTABLE USE OF HCHD INTERNET AND SYSTEM

ACCEPTABLE USE OF HCHD INTERNET AND  SYSTEM Page Number: 1 of 6 TITLE: PURPOSE: ACCEPTABLE USE OF HCHD INTERNET AND EMAIL SYSTEM To establish the guidelines for the use of the Harris County Hospital District s Internet and email system. POLICY STATEMENT:

More information

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment. Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist

More information

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems. BACKED BY REFERENCE GUIDE Acceptable Use Policy GENERAL GUIDANCE NOTE: This sample policy is not legal advice or a substitute for consultation with qualified legal counsel. Laws vary from country to country.

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

Data protection policy

Data protection policy Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees

More information

Name of Policy: Computer Use Policy

Name of Policy: Computer Use Policy Page: Page 1 of 5 Director Approved By: Approval Date: Reason(s) for Change Responsible: Corporate Services Leadership April 22, Reflect current technology and practice Corporate Services Leadership Leadership

More information

PCA Staff guide: Information Security Code of Practice (ISCoP)

PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Information Risk and Privacy Version 2015.1.0 December 2014 PCA Information Risk and Privacy Page 1 Introduction Prudential Corporation

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

Horry County IT /GIS Policy Acce table Use Com uter S stems

Horry County IT /GIS Policy Acce table Use Com uter S stems HORRY COUNTY IT/GIS DEPARTMENT 1301 Second Avenue Conway, South Carolina 29526 www.horrycounty.org Post Office Box 296 Conway, South Carolina 29528-0296 Phone: (843) 915-5240 Fax: (843) 915-6240 Horry

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

13. Acceptable Use Policy

13. Acceptable Use Policy 13. Acceptable Use Policy Purpose Indian River State College s intention for publishing an Acceptable Use Policy is to outline the acceptable use of computer equipment and services at Indian River State

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY Introduction The college offer an extensive range of IT systems across campuses and online for course related activities and drop-in purposes. This policy applies

More information

Electronic Network Acceptable Use Policy

Electronic Network Acceptable Use Policy Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

Writer Corporation. Data Protection Policy

Writer Corporation. Data Protection Policy Writer Corporation Data Protection Policy 1. Introduction The Data Protection Policy (DPP) lays a solid foundation for the development and implementation of secure practices within Writer Corporation (the

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

State of New Mexico Public School Facilities Authority Information Technology (IT) Acceptable Use Policy

State of New Mexico Public School Facilities Authority Information Technology (IT) Acceptable Use Policy State of New Mexico Public School Facilities Authority Information Technology (IT) Acceptable Use Policy Public School Facilities Authority, IT Acceptable Use Policy 1 State of NM Public School Facilities

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

Apex Information Security Policy

Apex Information Security Policy Apex Information Security Policy Table of Contents Sr.No Contents Page No 1. Objective 4 2. Policy 4 3. Scope 4 4. Approval Authority 5 5. Purpose 5 6. General Guidelines 7 7. Sub policies exist for 8

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

Security and Privacy Breach Notification

Security and Privacy Breach Notification Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains

More information

REPORTING INFORMATION SECURITY INCIDENTS

REPORTING INFORMATION SECURITY INCIDENTS INFORMATION SECURITY POLICY REPORTING INFORMATION SECURITY INCIDENTS ISO 27002 13.1.1 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-13.1.1 Version No: 1.0 Date: 1 st

More information

Communication and Usage of Internet and Policy

Communication and Usage of Internet and  Policy Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

ELECTRONIC MAIL POLICY

ELECTRONIC MAIL POLICY m acta I. PURPOSE The Information Systems (IS) Department is responsible for development and maintenance of this policy. The Finance and Administration Division is responsible for publishing and distributing

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

Table of Contents. PCI Information Security Policy

Table of Contents. PCI Information Security Policy PCI Information Security Policy Policy Number: ECOMM-P-002 Effective Date: December, 14, 2016 Version Number: 1.0 Date Last Reviewed: December, 14, 2016 Classification: Business, Finance, and Technology

More information

UKIP needs to gather and use certain information about individuals.

UKIP needs to gather and use certain information about individuals. UKIP Data Protection Policy Context and overview Key details Policy Update Prepared by: D. Dennemarck / S. Turner Update approved by Management on: November 6, 2015 Policy update became operational on:

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Status: Released Page 2 of 7 Introduction Our Data Protection policy indicates that we are dedicated to and responsible of processing the information of our employees, customers,

More information

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected. I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

This Policy applies to all staff and other authorised users in St Therese School.

This Policy applies to all staff and other authorised users in St Therese School. St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Effective: September 2, 2016 Purpose Montreat College is committed to protecting its employees, partners, and itself from illegal or damaging actions by individuals, either knowingly

More information

University Policies and Procedures ELECTRONIC MAIL POLICY

University Policies and Procedures ELECTRONIC MAIL POLICY University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Element Finance Solutions Ltd Data Protection Policy

Element Finance Solutions Ltd Data Protection Policy Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

Guest Wireless Policy

Guest Wireless Policy Effective: April 1, 2016 Last Revised: November 27, 2017 Responsible University Office: Information Technology Services Responsible University Administrator: Chief Information Officer Policy Contact: Deb

More information

RMU-IT-SEC-01 Acceptable Use Policy

RMU-IT-SEC-01 Acceptable Use Policy 1.0 Purpose 2.0 Scope 2.1 Your Rights and Responsibilities 3.0 Policy 3.1 Acceptable Use 3.2 Fair Share of Resources 3.3 Adherence with Federal, State, and Local Laws 3.4 Other Inappropriate Activities

More information

Creative Funding Solutions Limited Data Protection Policy

Creative Funding Solutions Limited Data Protection Policy Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

ICS-ACI Policy Series

ICS-ACI Policy Series ICS-ACI Policy Series This is part of a series of documents that make up the formal policies adopted by the Institute for CyberScience at the Pennsylvania State University. Last Updated: September 5, 2017

More information

Information Security Data Classification Procedure

Information Security Data Classification Procedure Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

Staff Information System Acceptable Use Policy

Staff Information System Acceptable Use Policy Staff Information System Acceptable Use Policy Hing Shung Chan Vice President of Information Technology Information Security Officer Table of Contents I. Definitions II. Rights and Responsibilities III.

More information

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program

More information

Acceptable Use Policy

Acceptable Use Policy IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010 INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig

More information

Draft. Policies of Colorado State University University Policy. Category: Information Technology

Draft. Policies of Colorado State University University Policy. Category: Information Technology Policies of Colorado State University University Policy Policy Title: Acceptable Use for Computing and Networking Resources Category: Information Technology Owner: Vice President for Information Technology

More information

EMPLOYEE USE OF TECHNOLOGY AGREEMENT

EMPLOYEE USE OF TECHNOLOGY AGREEMENT 2000--ADMINISTRATION 2600--OFFICE TECHNOLOGY EMPLOYEE USE OF TECHNOLOGY AR 2620 Page 1 of 10 EMPLOYEE USE OF TECHNOLOGY AGREEMENT Revised: 4/01/02, 5/24/04, 2/10/10 Superintendent of Schools Page 2 of

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Internet, , and Computer Usage Policy

Internet,  , and Computer Usage Policy Important disclaimer: The policy available on this page is only an example and is furnished merely as an illustration of its category. It is not meant to be taken and used without consultation with a licensed

More information

Each member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network

Each member of the St. Margaret s Community has the privilege to access Google Apps  provided by the school s network NETWORK APPROPRIATE USE AGREEMENT 2018-2019 We are pleased to offer students of St. Margaret s School access to our computer network for electronic mail and the Internet. To gain access to e-mail and the

More information

COMPUTER & INFORMATION TECHNOLOGY CENTER. Information Transfer Policy

COMPUTER & INFORMATION TECHNOLOGY CENTER. Information Transfer Policy COMPUTER & INFORMATION TECHNOLOGY CENTER Information Transfer Policy Document Controls This document is reviewed every six months Document Reference Document Title Document Owner ISO 27001:2013 reference

More information

Baseline Information Security and Privacy Requirements for Suppliers

Baseline Information Security and Privacy Requirements for Suppliers Baseline Information Security and Privacy Requirements for Suppliers INSTRUCTION 1/00021-2849 Uen Rev H Ericsson AB 2017 All rights reserved. The information in this document is the property of Ericsson.

More information

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

Electronic Communication of Personal Health Information

Electronic Communication of Personal Health Information Electronic Communication of Personal Health Information A presentation to the Porcupine Health Unit (Timmins, Ontario) May 11 th, 2017 Nicole Minutti, Health Policy Analyst Agenda 1. Protecting Privacy

More information

Wireless Communication Device Policy Policy No September 2, Standard. Practice

Wireless Communication Device Policy Policy No September 2, Standard. Practice Standard This establishes the business need and use of cellular phones (hereinafter referred to as wireless communication devices ) as an effective means of conducting City of Richland business, and to

More information

Louisiana State University System

Louisiana State University System Louisiana State University System PM-36: Attachment 1 TABLE OF CONTENTS AND CHAPTERS 1-12 SECTION PAGE I. Chapter 1 -Securing Systems, Hardware, Software and Peripherals...6 A. Subunit 1 -Purchasing and

More information

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance

More information

HPE DATA PRIVACY AND SECURITY

HPE DATA PRIVACY AND SECURITY ARUBA, a Hewlett Packard Enterprise company, product services ( Services ) This Data Privacy and Security Agreement ("DPSA") Schedule governs the privacy and security of Personal Data by HPE in connection

More information

Enterprise Income Verification (EIV) System User Access Authorization Form

Enterprise Income Verification (EIV) System User Access Authorization Form Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents

More information

Records Retention Policy

Records Retention Policy June 21, 2017 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Review Cycle...3 1.4 Document Owner...3 1.5 Definitions...3 2 Policy...4 2.1 Records and Record Storage...4 2.2 Applicable

More information

Internet, , Social Networking, Mobile Device, and Electronic Communication Policy

Internet,  , Social Networking, Mobile Device, and Electronic Communication Policy TABLE OF CONTENTS Internet, Email, Social Networking, Mobile Device, and... 2 Risks and Costs Associated with Email, Social Networking, Electronic Communication, and Mobile Devices... 2 Appropriate use

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

Digital Computing Asset Management

Digital Computing Asset Management Document title: Digital Computing Asset Management Approval date: Purpose of document: This document is to keep the AUC community aware of the existence of security requirements to protect the digital

More information

Information Technology Cyber Security Policy. Convergint Technologies, LLC

Information Technology Cyber Security Policy. Convergint Technologies, LLC Information Technology Cyber Security Policy Convergint Technologies, LLC September 2015 Convergint Technologies, LLC POLICY MANUAL Subject: CYBER SECURITY POLICY Approved: Tom Schmitt Effective Date:

More information

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016 Section 3.9 PCI DSS Information Security Policy Issued: vember 2017 Replaces: June 2016 I. PURPOSE The purpose of this policy is to establish guidelines for processing charges on Payment Cards to protect

More information

NMHC HIPAA Security Training Version

NMHC HIPAA Security Training Version NMHC HIPAA Security Training 2017 Version HIPAA Data Security HIPAA Data Security is intended to provide the technical controls to ensure electronic Protected Health Information (PHI) is kept secure and

More information

PURPOSE: To establish policies and procedures for the use of University-owned and -operated information technology resources.

PURPOSE: To establish policies and procedures for the use of University-owned and -operated information technology resources. MERCER UNIVERSITY SECTION: Policies and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY ACCESS AND USE POLICY EFFECTIVE: January 1, 2004 PURPOSE: To establish policies and procedures for the use of University-owned

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

PUPIL ICT ACCEPTABLE USE POLICY

PUPIL ICT ACCEPTABLE USE POLICY PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status

More information