Users Policies. PRAN-RFL Group. [Owner: MIS Department, PRAN-RFL Group] Approved by: MIS Department Version: 1.0

Size: px
Start display at page:

Download "Users Policies. PRAN-RFL Group. [Owner: MIS Department, PRAN-RFL Group] Approved by: MIS Department Version: 1.0"

Transcription

1 2012 Users Policies PRAN-RFL Group [Owner: MIS Department, PRAN-RFL Group] Approved by: MIS Department Version: 1.0

2 e Governing Policy The employee must read the PRAN-RFL Group MIS Policies and Procedures Manual. This policy applies to all employees, consultants, temporaries, and others not mentioned who access PRAN-RFL Group s system, applications and networks. Hierarchical Picture Governing Policy Data Storage Policy Accounts and Rules Administrative Privileges Prohibition Safety Guidelines for Users Software Usages Polices Equipment Movement Rules Users should use only the equipments and software provided by MIS. Only MIS approved equipment may be connected to PRAN-RFL Group MIS resources. Data Storage Policy 1. Users can not create and have any personal files/folder into any network drives e.g. W: or X: drives etc. User's file server (X :) will only use for official documents. No personal documents can store in File server from PC/Laptop. If there found any file except mail archive, will deleted permanently without informing the owner. 2. MIS end-users can keep their Private or Personal data only into their local PC inside folders named as `Private' or `Personal'. Private or Personal data cannot be stored in network drives. 2

3 3. Disk space limit will be 500 MB ( X:\) per User. It may increase as per his/her departmental head recommendation (if need). 4. MIS Service Desk will not take any backup of your C:\ Drive, My Documents, Desktop files and Folders stored into user PC's local drive while troubleshooting user PC s in MIS Service Desk lab. So should not keep any Files and Folders on Desktop, C:\ Drive, My Documents also. MIS will not be responsible for any data loss of PC's local drive while troubleshooting user s PC. 5. Any software installation request has to be made to MIS. 6. MIS may specifically monitor activity and/or accounts of individuals without notice. Accounts and Rules To open a new user mail account there will be a mail from respective departmental head or from HRM to MIS dept. with the following information's -Company, Designation, Department, Name, Key job, Staff ID User address name will be as follows, Company-Dept-KeyJob- Designation-Name of employee. User allowed to send/receive individual (including attachment) is 02 (Two) MB. With prior 7 days notice, MIS will delete all s older than 01 (One) month from mail server. These deleted s will not be available for restore at any time. So user will archive her/his older than 1 Month from mail. managements are entitled to send to all users of PRAN-RFL Group as per his/her nature of job and top management has discretion to approve user as per his/her nature of job. User can use signature with the following information's -Full Name, Designation, Company Name, Company Address, Office telephone (Ext), Office Mobile, Fax, Address, Web Address. 3

4 Software Usages Polices 1. Users should logon using his/her Logon user ID and Password, direct Access in Database is blocked for normal user. 2. When a software user leaves our company should give up all Official Documents and information about software to the Department Head or appropriate authorized person. Equipment Movement Rules 1. In case of any MIS equipment Movement/Handover, need to send a mail to MIS from Head of concerned department. MIS will take necessary action against the mail within 07 (Seven) working days after received the mail. So that MIS can plan accordingly and accommodate the movement. 2. If any MIS equipment Movement/Handover takes place without prior notice to MIS, MIS have full rights to acquire the full system. 3. MIS End-users are not authorized to remove PRAN-RFL Group MIS asset tag from any MIS Asset e.g. Desktop, Notebook, Printer, Scanner etc. Administrative Privileges Local Administrator user password on user PCs is not provided to endusers. Only authorized and responsible IT persons should hold the password. Prohibition 1. Storing or Sending of inappropriate files should be prohibited including those which are sexually harassing or offensive to others on the grounds of race, religion or gender. 2. Users are allowed to use only PRAN-RFL Group MIS provided hardware. They are not allowed to use any personal computer equipment (Like CD/DVD ROM or Writer, sound system, removable disk drive etc.). Exception to this rule can only be accord by MIS Department. 3. Copying confidential PRAN-RFL Group Business Information into unencrypted storage media such as CD or floppy disk is prohibited. 4. Use of IT resources (hardware, software, bandwidth etc.) should not be in violation of PRANRFL Group rules of Code of conducts. 4

5 Safety Guidelines for Users Users are expected to protect themselves by following these guidelines: 1. Do not reveal any personal information of yours or that of any other person (User ID, Password etc.). 2. Avoid common Word as Password, use Long Password; it can be contained Alphanumeric, Special Character, Capital Letter and Small Letters. 3. Should not share your password with anyone. N.B.: This document is a live document. It will be updated when needed. Thanks to All 5

PUPIL ICT ACCEPTABLE USE POLICY

PUPIL ICT ACCEPTABLE USE POLICY PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status

More information

GENERAL ORDER PORT WASHINGTON POLICE DEPARTMENT

GENERAL ORDER PORT WASHINGTON POLICE DEPARTMENT GENERAL ORDER PORT WASHINGTON POLICE DEPARTMENT SUBJECT: DEPARTMENT INTERNET & EMAIL NUMBER: 1.10.1 ACCESS AND USE ISSUED: 3/31/09 SCOPE: All Police Personnel EFFECTIVE: 3/31/09 DISTRIBUTION: General Orders

More information

Roche Directive on the Use of Roche Electronic Communication Tools

Roche Directive on the Use of Roche Electronic Communication Tools Group Legal Roche Directive on the Use of Roche Electronic Communication Tools Version 1.2, 21 February 2012 Name: Roche Directive on the Use of Roche Electronic Communication Tools Version No: 1.2 Date:

More information

STUDENT ICT ACCEPTABLE USE POLICY

STUDENT ICT ACCEPTABLE USE POLICY The Olive School, Blackburn This policy is in line with the Mission Statement of the School To promote a culture of educational excellence, from within a caring and secure Islamic environment enriched

More information

Acceptable Use Policy

Acceptable Use Policy IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations

More information

SYLLABUS. Departmental Syllabus CIST0145. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus CIST0145. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 11/6/2018 CIP CODE: 52.0104 SEMESTER: COURSE TITLE: COURSE NUMBER: Computer Operating Systems: (Windows Vista) CIST0145 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE

More information

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads)

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads) ADMINISTRATIVE POLICY NO. 13-01 ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads) I. POLICY ISSUANCE This policy provides uniform guidelines and policies on the issuance and return of

More information

SECURITY POLICY FOR USER. 1.Purpose: The policy aims at providing secure and acceptable use of client systems.

SECURITY POLICY FOR USER. 1.Purpose: The policy aims at providing secure and acceptable use of client systems. SECURITY POLICY FOR USER 1.Purpose: The policy aims at providing secure and acceptable use of client systems. 2.Scope: This policy is applicable to the employees in the Ministry / Department / Subordinate

More information

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment. Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist

More information

ACCEPTABLE USE OF HCHD INTERNET AND SYSTEM

ACCEPTABLE USE OF HCHD INTERNET AND  SYSTEM Page Number: 1 of 6 TITLE: PURPOSE: ACCEPTABLE USE OF HCHD INTERNET AND EMAIL SYSTEM To establish the guidelines for the use of the Harris County Hospital District s Internet and email system. POLICY STATEMENT:

More information

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance.

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance. Cell Phone Policy 1. Purpose: Establish a policy for cell phone use and compensation allowance. 2. Authority: The Clinton County Board of Commissioners. 3. Application: This Cell Phone Policy (the Policy)

More information

Introduction to Windows XP

Introduction to Windows XP 1 Introduction to Windows XP 1.1 INTRODUCTION The windows operating system started with the introduction of Windows OS and Windows for work group for networking. Since then it has come a long way and Windows

More information

FERPA & Student Data Communication Systems

FERPA & Student Data Communication Systems FERPA & Student Data Ellevation is subject to the Family Educational Rights and Privacy Act (FERPA) as operating under the "school official" exception, wherein student directory and PII (Personal Identifying

More information

CSR Computer Policy Statement

CSR Computer Policy Statement CSR Computer Policy Statement This is required reading for everyone with a CSR computer account. General Guidelines As an employee of the Center for Space Research, you are entitled to a computer account

More information

University Policies and Procedures ELECTRONIC MAIL POLICY

University Policies and Procedures ELECTRONIC MAIL POLICY University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must

More information

Wireless Communication Device Policy Policy No September 2, Standard. Practice

Wireless Communication Device Policy Policy No September 2, Standard. Practice Standard This establishes the business need and use of cellular phones (hereinafter referred to as wireless communication devices ) as an effective means of conducting City of Richland business, and to

More information

ICS-ACI Policy Series

ICS-ACI Policy Series ICS-ACI Policy Series This is part of a series of documents that make up the formal policies adopted by the Institute for CyberScience at the Pennsylvania State University. Last Updated: September 5, 2017

More information

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,

More information

Steganos Safe Professional th June 2007

Steganos Safe Professional th June 2007 Steganos Safe Professional 2007 26 th June 2007 Contents Page Introduction 4 Installation and Deployment 5 Managing and Policies 6 Recovery Using EDK 8 Setting Up Network Shares 8 Creating A Key Pair 8

More information

PCA Staff guide: Information Security Code of Practice (ISCoP)

PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Information Risk and Privacy Version 2015.1.0 December 2014 PCA Information Risk and Privacy Page 1 Introduction Prudential Corporation

More information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an

More information

COMPUTER USAGE AND SECURITY POLICY

COMPUTER USAGE AND SECURITY POLICY Page 1 of 12 PURPOSE: To establish the proper use of the City of Moreno Valley's computer systems. The procedures and principles represented in this policy apply to anyone accessing the City network, including

More information

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 3.63 REVISED TOTAL PAGES Dec. 30, 2007 8 Division Computer Systems Cross Reference: I. Definitions A. Executable File A program or file

More information

INDEPENDENT PROCEDURE. Corporate FirstClass Conferences and FirstClass Procedures

INDEPENDENT PROCEDURE. Corporate  FirstClass Conferences and FirstClass  Procedures INDEPENDENT PROCEDURE Title: Department: Corporate Email FirstClass Conferences and FirstClass E-Mail Procedures Learning Support Services Procedure No.: 9037 Effective Date: 2002 Feb. 26 Reference(s):

More information

POLICIES AND PROCEDURES

POLICIES AND PROCEDURES Integrated Information Technology Services POLICIES AND PROCEDURES Utica College Email POLICY: Email is Utica College s sole accepted mechanism for official electronic communication in the normal conduct

More information

ELECTRONIC MAIL POLICY

ELECTRONIC MAIL POLICY m acta I. PURPOSE The Information Systems (IS) Department is responsible for development and maintenance of this policy. The Finance and Administration Division is responsible for publishing and distributing

More information

Records Management and Retention

Records Management and Retention Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors

More information

Windows 2000 Disk Management

Windows 2000 Disk Management LAB PROCEDURE 25 Windows 2000 Disk Management OBJECTIVES 1. Use Disk Cleanup. 2. Backup a file. 3. Restore a backup. 4. Compress a file. 5. Encrypt a file. Troubleshooting RESOURCES 1. Marcraft 8000 Trainer

More information

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial Corporate Policy Information Systems Acceptable Use Document No: ISY-090-10 Effective Date: 2014-06-10 Page 1 of 5 Rev. No: 0 Issuing Policy: Information Systems Department Policy Originator: Erick Edstrom

More information

Policy General Policy GP20

Policy General Policy GP20 Email Policy General Policy GP20 Applies to All employees Committee for Approval Quality and Governance Committee Date of Approval September 2012 Review Date June 2014 Name of Lead Manager Head of Technology

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established

More information

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources

More information

Computer Use and File Sharing Policy

Computer Use and File Sharing Policy Computer Use and File Sharing Policy Williamson College recognizes the value of computer and other electronic resources to improve student learning and enhance the administration and operation of its school.

More information

ADOPTED STANDARDS/POLICIES. Information Technology Security Policy

ADOPTED STANDARDS/POLICIES. Information Technology Security Policy INFORMATION TECHNOLOGY POLICY BOARD ADOPTED STANDARDS/POLICIES Information Technology Security Policy COUNTY OF SACRAMENTO Office of Communications and Information Technology TO: Agency Administrators,

More information

Springfield, Illinois Police Department

Springfield, Illinois Police Department Directive Number: ADM-46 01-084 Issue Date: 05/28/01 Distribution: C,E* Revision Dates: 06/01/01 Effective Date: 06/01/01 Related CALEA Standards: 82.1.7 References: CALEA Standards Manual Rescinds: ADM-46/01-015

More information

1.1. Pre-requisites System Requirements The E-TRAC Home Page Notifications...1-6

1.1. Pre-requisites System Requirements The E-TRAC Home Page Notifications...1-6 Last Updated: 11/13/2007 4:34:00 PM 1. Using E-TRAC 1.1 Pre-requisites 1.1. Pre-requisites...1-1 1.2. System Requirements...1-1 1.3. The E-TRAC Home Page...1-2 1.3.1. Filter My E-TRAC Transactions... 1-3

More information

CARE International in Tanzania P.O. Box Dar es-salaam, Tanzania Tel: , , Fax:

CARE International in Tanzania P.O. Box Dar es-salaam, Tanzania Tel: , , Fax: dkdkdkdkdkd CARE International in Tanzania P.O. Box 10242 Dar es-salaam, Tanzania Tel: 022-266-6775, 266-8061, 266-8048 Fax: +022-266-6944 2 November 2011 ALTAN #423 Subject: Updated Communication Policy

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

Enterprise Income Verification (EIV) System User Access Authorization Form

Enterprise Income Verification (EIV) System User Access Authorization Form Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be

More information

Medical Sciences Division IT Services (MSD IT)

Medical Sciences Division IT Services (MSD IT) Medical Sciences Division IT Services (MSD IT) Security Policy Effective date: 1 December 2017 1 Overview MSD IT provides IT support services support and advice to the University of Oxford Medical Sciences

More information

Acceptable Usage Policy (Student)

Acceptable Usage Policy (Student) Acceptable Usage Policy (Student) Author Arthur Bogacki Date 18/10/2017 Version 1.1 (content sourced and consolidated from existing Email and Electronic Communication, and User Code of Practice policies.)

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Author: Janice M. Anderson Date: 5/1/2006

Author: Janice M. Anderson Date: 5/1/2006 Subject: AHC-IS Desktop Policies, Proc and Standards Policy No. 3001 Applicable to: AHC-IS Pages: 6 Author: Janice M. Anderson Date: 5/1/2006 Replaces version Dated: 2005 POLICY: AHC-IS goals for Workstation

More information

GEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures IIA (204.07) Authority: Effective Date: Page 1 of Bryson/Jacobs 04/21/15 6

GEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures IIA (204.07) Authority: Effective Date: Page 1 of Bryson/Jacobs 04/21/15 6 GEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures Facility /Education Subject: Inmate Use of Computers (204.07) Revises Previous Authority: Page 1 of Bryson/Jacobs I. POLICY: It is the policy

More information

Internet and Policy

Internet and  Policy CITY OF JOHNSON CITY Internet and E-mail Policy Revision Number: 4 Page: 1 of 4 1.0 POLICY STATEMENT: The purpose of the Internet Policy is to implement guidelines for the establishment, administration,

More information

Waterman Group / Microsoft Software Home Use Program

Waterman Group / Microsoft Software Home Use Program As part of the Subscription Agreement between Waterman Group and Microsoft, qualifying Waterman Group employees are entitled to free use of Microsoft Office suite software on their home computers. The

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.

More information

Cornish College of the Arts, Information Technology Policy

Cornish College of the Arts, Information Technology Policy Table of Contents 1.0 Introduction and Overview 1.1 Mission 1.2 Preamble 1.3 Privacy 1.4 Liability 2.0 Responsibilities and Accountability 2.1 Students 2.2 Faculty and Staff 2.3 Violations of Policy 3.0

More information

Cape Breton- Victoria Regional School Board

Cape Breton- Victoria Regional School Board Cape Breton- Victoria Regional School Board APPLICATION PROCEDURE FOR SUBSTITUTE TEACHING Complete substitute application form and attach a photocopy of your valid Nova Scotia teaching license, along with

More information

The Lee Wiggins Childcare Centre E-SAFETY, PHOTOGRAPHY and VIDEO POLICY

The Lee Wiggins Childcare Centre E-SAFETY, PHOTOGRAPHY and VIDEO POLICY Policy for the acceptable use of mobile phones and cameras by the staff of the Lee Wiggins Childcare Centre (LWCC) Mobile Phones In order to provide a safe environment for children, parents and staff we

More information

Allan Hancock College Computer Training

Allan Hancock College Computer Training Allan Hancock College Computer Training This document is intended to help you better understand your computer and the network at Allan Hancock College. Computer and Network Terminology Understanding Data

More information

IT Governance Committee Review and Recommendation

IT Governance Committee Review and Recommendation IT Governance Committee Review and Recommendation Desired Change: Approval of this policy will establish Security Standards for the UCLA Logon Identity for anyone assigned a UCLA Logon ID/password and

More information

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope Jacksonville State University Acceptable Use Policy 1. Overview Information Technology s (IT) intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Jacksonville

More information

Physical Safeguards Policy July 19, 2016

Physical Safeguards Policy July 19, 2016 Physical Safeguards Policy July 19, 2016 SCOPE This policy applies to Florida Atlantic University s Covered Components and those working on behalf of the Covered Components (collectively FAU ) for purposes

More information

SPRING-FORD AREA SCHOOL DISTRICT

SPRING-FORD AREA SCHOOL DISTRICT No. 801.1 SPRING-FORD AREA SCHOOL DISTRICT SECTION: TITLE: OPERATIONS ELECTRONIC RECORDS RETENTION ADOPTED: January 25, 2010 REVISED: October 24, 2011 801.1. ELECTRONIC RECORDS RETENTION 1. Purpose In

More information

EMPLOYEE USE OF TECHNOLOGY AGREEMENT

EMPLOYEE USE OF TECHNOLOGY AGREEMENT 2000--ADMINISTRATION 2600--OFFICE TECHNOLOGY EMPLOYEE USE OF TECHNOLOGY AR 2620 Page 1 of 10 EMPLOYEE USE OF TECHNOLOGY AGREEMENT Revised: 4/01/02, 5/24/04, 2/10/10 Superintendent of Schools Page 2 of

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

Guest Network Account Request Form

Guest Network Account Request Form Guest Network Account Request Form Applicant Information Name: Telephone Number: E-mail Address: Company Information Company Name: Address: State: Telephone Number: City: Zip: DURATION OF VISIT - Please

More information

IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) ITS Responsible Use of Telephone, Telecommunications, and Networking Resources ISUPP 2280

IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) ITS Responsible Use of Telephone, Telecommunications, and Networking Resources ISUPP 2280 IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) ITS Responsible Use of Telephone, Telecommunications, and Networking Resources ISUPP 2280 POLICY INFORMATION Policy Section: Information Technology

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Department of Technology Policy Title: Information Technology Acceptable Use Policy Authority: Chief Information Officer Effective Date: January 1, 2017 Purpose: This policy outlines the acceptable use

More information

Policy & Procedure. IT Password Policy. Policy Area. Version Number 2. Approving Committee SMT. Date of Approval 26 September 2017

Policy & Procedure. IT Password Policy. Policy Area. Version Number 2. Approving Committee SMT. Date of Approval 26 September 2017 Policy & Procedure Policy Area IT Password Policy IT Version Number 2 Approving Committee SMT Date of Approval 26 September 2017 Date of Equality Impact Assessment 03 August 2016 Date of Review 01 November

More information

Installing Your Multifunction to Additional Computers on Your Network

Installing Your Multifunction to Additional Computers on Your Network Installing Your Multifunction to Additional Computers on Your Network PIXMA MG6120 Mac OS 1 Installing Your Multifunction to Additional Computers on Your Network PIXMA MG6120 Mac OS Preparing to Connect

More information

Writer Corporation. Data Protection Policy

Writer Corporation. Data Protection Policy Writer Corporation Data Protection Policy 1. Introduction The Data Protection Policy (DPP) lays a solid foundation for the development and implementation of secure practices within Writer Corporation (the

More information

Employee Computer Usage Policies and Procedures

Employee Computer Usage Policies and Procedures Employee Computer Usage Policies and Procedures I. Campus Computer Usage Overview The purpose of this document is to define the policies and procedures for using the administrative systems, computer resources,

More information

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard Kiosk Security Standard 1. Purpose This standard was created to set minimum requirements for generally shared devices that need to be easily accessible for faculty, staff, students, and the general public,

More information

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY Introduction The college offer an extensive range of IT systems across campuses and online for course related activities and drop-in purposes. This policy applies

More information

BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1. Version 5.0

BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1. Version 5.0 BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1 Version 5.0 March 2009 2.1 Operating System 2.2 File Management 2.1.1 First Steps 2.1.1.1 Start the computer

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

Table of Contents. A. Introduction...2. B. General Description...2. C. Features...3. D. Before Using the Security Application Program LOCK...

Table of Contents. A. Introduction...2. B. General Description...2. C. Features...3. D. Before Using the Security Application Program LOCK... v1.00 Table of Contents A. Introduction...2 B. General Description...2 C. Features...3 D. Before Using the Security Application Program LOCK...4 E. Introduction to the Security Application Program LOCK...5

More information

CA IT Client Manager. Packager and Installer for Windows Administration Guide. Release 12.8

CA IT Client Manager. Packager and Installer for Windows Administration Guide. Release 12.8 CA IT Client Manager Packager and Installer for Windows Administration Guide Release 12.8 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

Terminal Services User Guide. HBSASB Ministry of Transportation

Terminal Services User Guide. HBSASB Ministry of Transportation Terminal Services User Guide HBSASB Ministry of Transportation Table of Contents Terminal Services User Guide PHM Suite 2 Prepared by Highways and Business Services Application Solutions Branch 1 - Microsoft

More information

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance. Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV

More information

Mobile Computing Policy

Mobile Computing Policy Mobile Computing Policy Issue sheet Document reference NHSBSAIS004 Document location Title NHS Business Services Authority Mobile computing policy Author Head of Security and Information Assurance Issued

More information

HOW TO APPLY. Access to the Internal Job Openings (click here)

HOW TO APPLY. Access to the Internal Job Openings (click here) HOW TO APPLY Access to the Internal Job Openings (click here) Create a log in Enter your email address and create a password. Then, select and answer one security questions. This step will enable you to

More information

Installation Instructions

Installation Instructions Help Desk 0117 918 1271 software@jordans.co.uk Installation Instructions Installing PCSec to a new PC Adding a new user Jordans Limited First Floor, Templeback, 10 Temple Back, Bristol BS1 6FL Help desk:

More information

ELECTRONIC COMMUNICATION AND DATA MANAGEMENT

ELECTRONIC COMMUNICATION AND DATA MANAGEMENT ACCEPTABLE USE All District students and employees shall sign and acknowledge receipt of an Acceptable Use Agreement.(eform) Non compliance may result in suspension of access or termination of privileges

More information

State of Colorado Cyber Security Policies

State of Colorado Cyber Security Policies TITLE: State of Colorado Cyber Security Policies Access Control Policy Overview This policy document is part of the State of Colorado Cyber Security Policies, created to support the State of Colorado Chief

More information

Basic Computer Operations

Basic Computer Operations Basic Computer Operations Goals By learning terms associated with computers and some basic operations, you'll be ready to make best use of a computer. Contents Computer terms Starting up and shutting down

More information

XAVIER UNIVERSITY Building Access Control Policy

XAVIER UNIVERSITY Building Access Control Policy Effective: March 25, 2019 Last Updated: March 20, 2019 XAVIER UNIVERSITY Building Access Control Policy Responsible University Office: Auxiliary Services, Physical Plant Responsible Executive: Vice President,

More information

Ashford Board of Education Ashford, Connecticut POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION

Ashford Board of Education Ashford, Connecticut POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION Ashford Board of Education Ashford, Connecticut Series 2000 Administration POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I. POLICY The Board of Education (the Board ) complies with all

More information

Cross Country Healthcare, Inc.

Cross Country Healthcare, Inc. Cross Country Healthcare, Inc. Acceptable Use Policy Handbook March 2015 Version 1.0 Document # SC_IT_001 6551 Park of Commerce Blvd. Boca Raton, Florida 33487 800.347.2264 crosscountryhealthcare.com Table

More information

Horry County IT /GIS Policy Acce table Use Com uter S stems

Horry County IT /GIS Policy Acce table Use Com uter S stems HORRY COUNTY IT/GIS DEPARTMENT 1301 Second Avenue Conway, South Carolina 29526 www.horrycounty.org Post Office Box 296 Conway, South Carolina 29528-0296 Phone: (843) 915-5240 Fax: (843) 915-6240 Horry

More information

Brazosport Independent School District Employee/Agent Acceptable Use Agreement For Internet/Network Access and Use

Brazosport Independent School District Employee/Agent Acceptable Use Agreement For Internet/Network Access and  Use Brazosport Independent School District Employee/Agent Acceptable Use Agreement For Internet/Network Access and Email Use Please read this agreement carefully. Sign and date the last page and return to

More information

HIPAA FOR BROKERS. revised 10/17

HIPAA FOR BROKERS. revised 10/17 HIPAA FOR BROKERS revised 10/17 COURSE PURPOSE The purpose of this information is to help ensure that all Optima Health Brokers are prepared to protect the privacy and security of our members health information.

More information

M Supporting Users Running Microsoft Windows XP Desktop Operating Systems 3 Day Course

M Supporting Users Running Microsoft Windows XP Desktop Operating Systems 3 Day Course Module 1: Introduction to the Desktop Support Technical Role and Environment This module introduces the role of the Desktop Support Technician (DST) and the role of the DST within the Microsoft Operations

More information

Name of Policy: Computer Use Policy

Name of Policy: Computer Use Policy Page: Page 1 of 5 Director Approved By: Approval Date: Reason(s) for Change Responsible: Corporate Services Leadership April 22, Reflect current technology and practice Corporate Services Leadership Leadership

More information

Information Technology Department (ITD) Fort Peck Assiniboine & Sioux Tribes Policy for Software and Hardware. June 2013

Information Technology Department (ITD) Fort Peck Assiniboine & Sioux Tribes Policy for Software and Hardware. June 2013 Information Technology Department (ITD) Fort Peck Assiniboine & Sioux Tribes Policy for Software and Hardware June 2013 Introduction Since the IT department is a new department within the Fort Peck Tribes

More information

5 MANAGING USER ACCOUNTS AND GROUPS

5 MANAGING USER ACCOUNTS AND GROUPS MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content

More information

Clear Desk, Clear Screen Policy

Clear Desk, Clear Screen Policy Clear Desk, Clear Screen Policy 1 P a g e Table of Contents 1 Introduction... 3 2 Purpose... 3 3 Non Operations Policy... 3 4 Operations Policy.4 5 Review and Approvals... 5 2 P a g e 1 Introduction Synchronoss

More information

Server Security Procedure

Server Security Procedure Server Security Procedure Reference No. xx Revision No. 1 Relevant ISO Control No. 11.7.1 Issue Date: January 23, 2012 Revision Date: January 23, 2012 Approved by: Title: Ted Harvey Director, Technology

More information

Smeal College of Business - Central Firewall Rules and Policies

Smeal College of Business - Central Firewall Rules and Policies Smeal College of Business - Central Firewall Rules and Policies 1.0 Purpose The purpose of this policy is to outline the College s use and management of centralized firewall services. This policy will

More information

Appendix A: Version 4.0 Networking Guidelines

Appendix A: Version 4.0 Networking Guidelines Appendix A: Version 4.0 Networking Guidelines Notice Users are responsible for network setup and maintenance, including installation and configuration of all necessary hardware and software. Carl Zeiss

More information

Information Technology Access Control Policy & Procedure

Information Technology Access Control Policy & Procedure Information Technology Access Control Policy & Procedure Version 1.0 Important: This document can only be considered valid when viewed on the PCT s intranet/u: Drive. If this document has been printed

More information

REPORTING INFORMATION SECURITY INCIDENTS

REPORTING INFORMATION SECURITY INCIDENTS INFORMATION SECURITY POLICY REPORTING INFORMATION SECURITY INCIDENTS ISO 27002 13.1.1 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-13.1.1 Version No: 1.0 Date: 1 st

More information

COURSE OUTLINE. School of Engineering Technology and Applied Science. Computer Systems and Network Technology

COURSE OUTLINE. School of Engineering Technology and Applied Science. Computer Systems and Network Technology COURSE OUTLINE SCHOOL: School of Engineering Technology and Applied Science DEPARTMENT: Information and Communication Engineering Technology (ICET) PROGRAM: Computer Systems and Network Technology COURSE

More information

Full User Manual and Quick Start Guide

Full User Manual and Quick Start Guide Full User Manual and Quick Start Guide 2 W hile every precaution has been taken in the preparation of this manual, we assume no responsibility for errors or omissions. Neither, is any liability assumed

More information

Mobile Working Policy

Mobile Working Policy Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

Quick Facts About IT Support from Student Affairs IT

Quick Facts About IT Support from Student Affairs IT Welcome to SAIT Support Student Affairs Information Technology (SAIT) provides technical support for all departments in the Division of Student Affairs. This site will explain how your computer and account

More information