Hughes Springs Independent School District. Acceptable Use Policy

Size: px
Start display at page:

Download "Hughes Springs Independent School District. Acceptable Use Policy"

Transcription

1 Acceptable Use Plicy Hughes Springs Independent Schl District Acceptable Use Plicy The term user and users in this dcument refers t any persns using Hughes Springs Independent Schl District (HSISD) technlgy resurces, whether they are a staff member, student, r any ther affiliate f HSISD. Intrductin Hughes Springs ISD recgnizes that access t technlgy in schl gives students greater pprtunities t learn, engage, cmmunicate, and develp skills that will prepare them fr wrk, life, and citizenship. We are cmmitted t helping students develp mdern technlgy and cmmunicatin skills. Within ur cmmitment t these skills, HSISD may prvide Internet access, desktp cmputers, mbile cmputing devices, videcnferencing capabilities, nline cllabratin capabilities, message bards, , and mre t users. The plicies utlined in this dcument are intended t cver all available technlgies, nt just thse specifically listed. This Acceptable Use Plicy utlines the guidelines and behavirs that users are expected t fllw when using schl technlgies r persnally wned devices n campus r fr any ther schl functin. All users are expected t use gd judgment and t fllw the specifics f this dcument as well as the intent in which it is written: be safe, apprpriate, careful and kind; d nt try t get arund technlgical prtectin measures; use gd cmmn sense; ask if yu re unsure. General Usage All resurces prvided by HSISD are intended fr educatinal purpses. Any use f resurces nt in supprt f HSISD s educatinal gals is prhibited. All activity n the HSISD netwrk, District devices, r ther technlgy services, including clud services, may be mnitred and retained fr security, discipline, recrd keeping, and analytical reasns. Students are expected t fllw the same rules fr gd behavir and respectful cnduct nline as ffline. Misuse f schl resurces can result in disciplinary actin. Hughes Springs ISD makes a reasnable effrt t ensure students safety and security nline but will nt be held accuntable fr any harm r damages that result frm use f schl technlgies. Any mdificatins, unauthrized by the Technlgy Department, that harm the integrity f HSISD systems can result in disciplinary actin fr the user and ptential financial respnsibility. Users f any District resurces r persnal devices while within the District are expected t alert the campus ffice and/r the I.T. staff immediately f any cncerns fr safety r security. Page 1 Rev. July 2018

2 Acceptable Use Plicy Cmputing Devices Hughes Springs ISD may prvide users with cmputing devices t prmte learning/prductivity inside and utside the classrm setting. These devices shuld be brught t schl with the student r staff member every day they reprt t schl. Users shuld abide by the same acceptable use plicies when using schl devices ff the schl netwrk as n the schl netwrk. Schl-issued devices may be mnitred utside f the schl netwrk. Any vilatin f schl plicy r misuse f schl resurces regardless f physical lcatin may result in disciplinary actin. Users are expected t treat these devices with extreme care and cautin; these are expensive resurces that the schl is entrusting t the user s care. It is the respnsibility f the user t bring the device t schl charged; the schl is nt respnsible fr r expected t prvide charging ptins fr devices. Users shuld reprt any lss, damage, r malfunctin t teacher, campus ffice, r I.T. staff immediately. Users may be financially accuntable fr any damage resulting frm negligence r misuse as determined by the Technlgy Department. Persnally Owned Devices / Bring Yur Own Device Students with persnally wned devices (including, but nt limited t, laptps, tablets, smart phnes, and cell phnes) are encuraged t use their devices in supprt f their learning if their teacher grants them permissin t d s r ther campus rules allw such use. Otherwise, the devices shuld be turned ff and put away during schl hurs unless in the event f an emergency. During the schl day, n device may be used t recrd, stre, r transmit any type f image, sund, r vide, except fr apprved prjects with the express permissin f the teacher f the class the student is attending at the time f the recrding. It is the respnsibility f the user t bring the device t the schl charged; the schl is nt respnsible fr r expected t prvide charging ptins fr devices. Campus persnnel r the Technlgy Department may deny usage f persnal devices t any user due t miscnduct r if the device is deemed a security threat t the District r ther users. Devices may be cnfiscated if in vilatin f HSISD plicies, including this. Return f the device is cntingent n ffense and/r handbk guidelines. Because f security and cntent cncerns, students are nt allwed t use their wn cellular r any ther cnnectin t access the internet r ther data surces. Student wned devices must be cnnected t the HSISD wireless netwrk designated fr them. Staff wned devices shuld be cnnected t the HSISD wireless netwrk designated fr them especially when using the device fr instructinal purpses. Fr infrmatin regarding which netwrk(s) are apprpriate t cnnect t, cntact yur campus ffice r the Technlgy Department. HSISD is nt liable, financially r therwise, fr damages r repairs resulting frm persnal device usage. Page 2 Rev. July 2018

3 Acceptable Use Plicy Internet Access Hughes Springs ISD prvides its users with access t the Internet, including web sites, resurces, cntent, and nline tls. Access t nline cntent may be restricted and/r censred in accrdance with HSISD plicies and federal regulatins, such as the Children s Internet Prtectin Act (CIPA). Web brwsing may be mnitred and web activity recrds may be retained indefinitely. Users shuld respect that the web filter is a safety precautin and shuld nt try t circumvent it when brwsing the Web. If a site is blcked and a user believes it shuldn t be, the user shuld fllw District prtcl t submit the site fr review. Hughes Springs ISD may prvide users with accunts fr the purpse f schl related cmmunicatin. Availability and use may be restricted based n schl plicies. If users are prvided with accunts, they shuld be used with care. Hughes Springs ISD has chsen nt t limit students capabilities t cmmunicate with rganizatins acrss the cuntry including clleges, testing institutins, schlarship pprtunities, etc. With this capability there is a need t emphasize that capabilities prvided by HSISD are fr schl use nly. Any nn-educatinal cmmunicatin culd be remved withut warning and culd result in disciplinary actin. Users shuld nt send persnal infrmatin; shuld nt use their schl accunt t cnduct r prmte cmmerce; shuld nt use their schl address in assciatin with third party services fr persnal use like Amazn, Facebk, itunes, etc.; shuld nt attempt t pen files r fllw links frm unknwn r untrusted rigin; shuld use apprpriate language; and shuld nly cmmunicate with ther peple as allwed by the District plicy r the teacher. If yu are nt cmpletely sure an r attachment is safe t pen, cnsult the Technlgy Department fr assistance. Users are expected t cmmunicate with the same apprpriate, safe, mindful, curteus cnduct nline as ffline. usage will be mnitred and archived fr a minimum f 10 years in accrdance with state and federal law. Online Strage Staff members and sme students will have access t nline strage allwing them t access their files and shared files n any device anywhere. This brings unique pprtunities t teaching staff and students t cntinue the learning prcess utside the classrm. As with , users shuld nly use this resurce fr schl purpses. Any cntent fund t be withut educatinal value r f malicius intent will be remved withut the user s cnsent. Users fund t be string such cntent culd be subject t disciplinary actin. HSISD des nt directly backup r archive data hsted in the nline platfrm. Instead, HSISD utilizes fault tlerances built int the platfrm. Upn leaving HSISD, it is the user s respnsibility t secure cpies f their persnal data utside f the clud platfrm befre their last date f attendance at HSISD. Users may nt use any nline strage platfrm ther than that which is prvided by the district t stre files and data cntaining infrmatin cncerning students r staff members. Ding s may be in vilatin Page 3 Rev. July 2018

4 f State and Federal law and culd result in discipline, terminatin, and/r criminal charges. Acceptable Use Plicy Web Based Cllabrative Cntent Recgnizing the benefits cllabratin brings t educatin, Hughes Springs ISD may prvide users with access t web sites r tls that allw cmmunicatin, cllabratin, sharing, and messaging amng users. Due t infrmatin security cncerns, staff members shall nt use any nline resurces r sftware which require user registratin r gather any type f user-specific usage data withut the written cnsent f the Directr f Technlgy. The Directr f Technlgy will evaluate the infrmatin security practices as well as the infrmatin used and stred by the third party and allw r deny usage based n these findings. Users are expected t cmmunicate with the same apprpriate, safe, mindful, curteus cnduct nline as ffline. Psts, chats, and messaging may be mnitred and archived. Users shuld be careful nt t share persnally identifying infrmatin nline. Netiquette Users shuld always use the Internet, netwrk resurces, and nline sites in a curteus and respectful manner. Users shuld als recgnize that amng the valuable cntent nline there is als unverified, incrrect, r inapprpriate cntent. Users shuld use trusted surces when cnducting research via the Internet. Users shuld als remember nt t pst anything nline that they wuldn t want parents, teachers, future clleges, r emplyers t see. Once smething is nline, it s ut there and can smetimes be shared and spread in ways never intended. Cyberbullying Cyberbullying will nt be tlerated. Harassing, dissing, flaming, denigrating, impersnating, uting, tricking, excluding, and cyberstalking are all examples f cyberbullying. D nt be mean. D nt send s r pst cmments with the intent f scaring, hurting, r intimidating smene else. Engaging in these behavirs, r any nline activities intended t harm (physically r emtinally) anther persn, will result in disciplinary actin and lss f privileges. In sme cases, cyberbullying can be a crime. Remember that nline activities are mnitred and retained. Plagiarism Users shuld nt plagiarize (r use as their wn, withut citing the riginal creatr) cntent, including wrds r images, frm the Internet. Users shuld nt take credit fr things they didn t create themselves, r misrepresent themselves as an authr r creatr f smething fund nline. Research cnducted via the Internet shuld be apprpriately cited, giving credit t the riginal authr. Cntact instructinal staff fr mre infrmatin n prperly citing research. Page 4 Rev. July 2018

5 Acceptable Use Plicy Netwrk Security Users are expected t take reasnable safeguards against the transmissin f security threats ver the schl netwrk. This includes nt pening r distributing infected files r prgrams, and nt pening files r prgrams f unknwn r untrusted rigin. If a user believes a cmputing device might be infected with a virus, malware, r ther types f malicius sftware, the user shuld turn ff the device and alert the Technlgy Department immediately. Users shuld nt attempt t remve the virus r dwnlad any prgram t remve the malicius cntent. Sftware Dwnlads and Installatin Users shuld nt dwnlad, install, r execute any prgram ver the schl netwrk r nt schl resurces withut express permissin frm the Technlgy Department. Users may dwnlad ther file types, such as images r vides. Fr the security f the HSISD netwrk, dwnlad such files nly frm reputable sites, and nly fr educatin purpses. Persnal & Infrmatin Security Users shuld never share persnal infrmatin including user accunts, passwrds, phne numbers, addresses, scial security numbers, birthdays, r financial infrmatin, ver the Internet withut adult permissin. Users shuld recgnize that cmmunicating ver the Internet brings annymity and assciated risks, and shuld carefully safeguard the persnal infrmatin f themselves and thers. Users shuld never agree t meet smene they meet nline in real life withut parental permissin. HSISD I.T. persnnel may ask fr username and passwrd infrmatin while assisting with prblems and shuld nly d s in persn r ver the HSISD phne system. D nt share this infrmatin with anyne ther than members f HSISD I.T. staff. Requests fr lgin infrmatin by any persn ther than HSISD Technlgy Department persnnel shuld be handled as an attempted system breach and reprted t the Technlgy Department immediately. If a user ever encunters a message, cmment, image, r anything else nline that causes cncern fr their wn r anther users persnal safety, bring it t the attentin f an adult (teacher r staff if at schl; parent if using the device ff-campus) immediately. HSISD staff shuld bring any such cncerns t I.T. staff immediately. Data Classificatin and Handling Data classificatin and handling prvides a framewrk fr classifying and securing data based n the assciated risks, as well as fr applying the apprpriate levels f prtectin as required by State and/r Federal law taking int cnsideratin prprietary, ethical, peratinal, and privacy cncerns. All HSISD data, whether electrnic r printed, shuld be categrized within these criteria. It is the respnsibility f all HSISD users t prtect their wn infrmatin as well as any ther data they may access as part f their duties r accessed inadvertently. These classificatin and handling prcedures apply t all data wned and managed by HSISD. Page 5 Rev. July 2018

6 Definitins: Acceptable Use Plicy Infrmatin Resurces (IR): Any cmputer printuts, nline display devices, magnetic strage media, and all cmputerrelated activities invlving any device capable f receiving , brwsing Web sites, r therwise capable f receiving, string, managing, r transmitting electrnic data including, but nt limited t, mainframes, servers, persnal cmputers, cellular devices, ntebk cmputers, tablet cmputers, hand-held cmputers, persnal digital assistants (PDA), pagers, distributed prcessing systems, netwrk attached and cmputer cntrlled medical and labratry equipment (i.e. embedded technlgy), telecmmunicatin resurces, netwrk envirnments, telephnes, fax machines, printers, and service bureaus and the prcedures, equipment, facilities, sftware, and data that are designed, built, perated, and maintained t create, cllect, recrd, prcess, stre, retrieve, display, and transmit infrmatin n thse resurces. Data Owner: Persns assigned the respnsibility f apprving user accunts and granting access rights t a specific data set within an Infrmatin Resurce by its System Owner. There may be multiple Data Owners within an Infrmatin Resurce, but there will be nly ne Data Owner fr a defined data set. The System Owner will be respnsible fr managing the use f Data Owners, applicable frms and rules t be fllwed. Sensitive Persnal Infrmatin (SPI): An individual s first name r first initial and last name in cmbinatin f any ne r mre f the fllwing items, if the name and the items are nt encrypted. Scial security number; Accunt number r credit r debit card number in cmbinatin with any required security cde, access cde, r passwrd that wuld permit access t an individual's financial accunt; Infrmatin that identifies an individual and relates t: The physical r mental health r cnditin f the individual; The prvisin f health care t the individual; Payment fr the prvisin f health care t the individual. Persnally Identifiable Infrmatin (PII): Infrmatin that alne r in cnjunctin with ther infrmatin identifies an individual, including an individual's: Name, date f birth, r gvernment-issued identificatin number; Mther's maiden name; Unique bimetric data, including the individual's fingerprint, vice print, and retina r iris image; Unique electrnic identificatin number, address, r ruting cde; and Certain telecmmunicatin access device as defined by regulatin Family Educatinal Rights and Privacy Act (FERPA) Prtected Infrmatin: Any infrmatin nt determined t be directry infrmatin by HSISD must be cnsented t by the student s guardian r student f legal age prir t release. Examples include: Any SPI r PII data elements Grade Pint Average/Letter Grades Academic Standing Indicatin f Financial Aid Status Cunseling recrds Academic Cmments General Infrmatin: Any infrmatin that is nt related t SPI, PII, and/r FERPA r nt therwise prtected by regulatin(s) and/r publicly available. This infrmatin will include mst directry infrmatin. Examples include a persn s: Name alng with residential address and/r telephne numbers. Page 6 Rev. July 2018

7 address Age and Sex Title r Psitin Acceptable Use Plicy SPI DATA HANDLING POLICY: All SPI data elements must be encrypted upn remval frm surce repsitry. All SPI data shuld be stred in lcatins nly accessible by the user r ther users wh are permitted t view SPI data. All SPI must be purged as sn as reasnably pssible if residing utside surce repsitry. SPI infrmatin is nly allwed t be transferred frm the surce repsitry t an HSISD managed device r an apprved third party. Only individuals authrized by the Superintendent r Technlgy Directr may have access t SPI. Prcess in place t audit infrmatin resurces that cntain SPI data must be fllwed. Access t SPI data will nly be granted by the data wner r designee. SPI data transmitted ver public netwrks must be encrypted. If any SPI data is prcessed and/r stred by a third-party, the third-party must be evaluated by the Technlgy Directr. Any agreements with third parties that invlve SPI data must be assessed by the Technlgy Directr. Any emplyee that suspects SPI data has been cmprmised, lst, r therwise disclsed withut authrizatin must disclse the incident immediately t their supervisr, Technlgy Directr, and Superintendent. PII DATA HANDLING POLICY: Any PII data element alne r in cmbinatin must have the apprval f the data wner, applicatin manager, r Technlgy Directr prir t being accessed frm the surce repsitry. All PII data shuld be stred in lcatins nly accessible by the user r ther users wh are permitted t view PII data. Any recrd and/r dcument with mre than 3 PII data elements must be encrypted prir t being transmitted and/r stred n public netwrks. PII data stred utside the surce repsitry must be purged as sn as reasnably pssible. PII infrmatin is nly allwed t be transferred frm the surce repsitry t an HSISD managed device r an apprved third party. If any PII data is prcessed and/r stred by a third-party, the third-party must be evaluated by the Technlgy Directr. Any agreements with third parties that invlve PII data must be assessed by the Technlgy Directr. Any emplyee that suspects PII data has been cmprmised, lst, r therwise disclsed withut authrizatin must disclse the incident immediately t their supervisr, Technlgy Directr, and Superintendent. FERPA PROTECTED DATA HANDLING POLICY: All FERPA prtected data elements, alne r in cmbinatin, must have the apprval f the data wner, applicatin manager, r Technlgy Directr prir t being accessed frm the surce repsitry. All FERPA data shuld be stred in lcatins nly accessible by the user r ther users wh are permitted t view FERPA data. Any FERPA prtected data element that can be easily assciated with the individual student must be encrypted prir t being transmitted and/r stred n public netwrks. FERPA prtected data stred utside the surce repsitry must be purged as sn as reasnably pssible. Page 7 Rev. July 2018

8 Acceptable Use Plicy FERPA infrmatin is nly allwed t be transferred frm the surce repsitry t an HSISD managed device r an apprved third party. If any FERPA data is prcessed and/r stred by a third-party, the third-party must be evaluated by the Technlgy Directr. Any agreements with third parties that invlve FERPA data must be assessed by the Technlgy Directr. Any emplyee that suspects FERPA data has been cmprmised, lst, r therwise disclsed withut authrizatin must disclse the incident immediately t their supervisr, Technlgy Directr, and Superintendent. Failure t cmply with these data handling guidelines may be in vilatin f State and Federal law and culd result in discipline, terminatin, and/r criminal charges. Limitatin f Liability Hughes Springs ISD will nt be respnsible fr damage r harm t persns, data, r hardware while using technlgy resurces. While Hughes Springs ISD emplys cntent filtering and ther safety and security mechanisms, and attempts t ensure their prper functin, it makes n guarantees as t their effectiveness. Hughes Springs ISD will nt be respnsible, financially r therwise, fr unauthrized transactins cnducted ver the schl netwrk. Examples f Acceptable Use I will: Use technlgies at schl fr schl related purpses and activities. Fllw the same guidelines fr respectful, respnsible behavir nline that I am expected t fllw ffline. Treat schl resurces carefully, and alert staff if there is any prblem with their peratin. Encurage psitive, cnstructive discussin when allwed t use cmmunicative r cllabrative technlgies. Alert a teacher r ther staff member if I see threatening, inapprpriate, r harmful cntent (images, messages, psts) nline. Cite surces when using nline sites and resurces fr research. Recgnize that use f schl technlgies is a privilege and treat it as such. Be cautius t prtect the safety f myself and thers. Help t prtect the security f schl resurces. This is nt intended t be an exhaustive list. Users shuld use gd judgment when using technlgies at schl. Page 8 Rev. July 2018

9 Examples f Unacceptable Use I will nt: Acceptable Use Plicy Use technlgies at schl in a way that culd be persnally r physically harmful. Attempt t find inapprpriate images r cntent. This includes: viewing, psting, r distributin f messages that are bscene, vulgar, prfane, harassing, sexually riented, sexually explicit, prngraphic, ffensive t thers, r threatening t thers. View r participate in scial netwrk sites r chat rms ther than thse spnsred and verseen by the District. Engage in cyberbullying, harassment, r disrespectful cnduct tward thers. Try t find ways t circumvent the schl s safety measures and filtering tls r tamper with anyne else s cmputer, files, r . Use technlgies at schl t send spam r chain mail. This includes: frgery f electrnic mail messages r transmissin f unslicited junk chain messages. Plagiarize cntent I find nline r engage in unauthrized use f cpyrighted material, including vilating District sftware licensing agreement(s) Install any persnal sftware n District equipment withut apprval f the Technlgy Department. Engage in unauthrized disclsure, use, r distributin f persnal identificatin infrmatin regarding students r emplyees. Engage in persnal plitical use t advcate fr r against a candidate, ffice hlder, plitical party, r plitical psitin, measure, r prpsitin. ( Such activity is nt a vilatin when fulfilling an assignment fr curse credit.) Agree t meet in real life smene I met nline. Use language nline that wuld be unacceptable in the classrm. Engage in use that vilates the applicable cde f cnduct r handbk. Use technlgies at schl fr illegal activities, pursue infrmatin n such activities, r engage in any use that wuld be unlawful under state r federal law. Attempt t hack r access sites, servers, r cntent within the District s netwrk r utside it that is nt intended fr my use. Engage in use related t cmmercial activities r fr cmmercial gain. Advertise fr purchase r sale f a prduct. This is nt intended t be an exhaustive list. Users shuld use gd judgment when using technlgies at schl. Vilatins f this Acceptable Use Plicy Vilatins f this plicy may have disciplinary repercussins, including: Suspensin f netwrk, technlgy, r cmputer privileges Ntificatin t parents Detentin r suspensin frm schl and schl related activities Incur cnsequences under the schl s Student Cde f Cnduct r handbk Incur cnsequences under the Emplyee Handbk Legal actin and/r prsecutin Page 9 Rev. July 2018

10 Acceptable Use Plicy Page Intentinally Left Blank Page 10 Rev. July 2018

11 I have read and understd this Acceptable Use Plicy and agree t abide by it: Acceptable Use Plicy User Printed Name User Signature Date IF FOR A STUDENT: I have read and discussed this Acceptable Use Plicy with my student: Parent/Guardian Printed Name Parent/Guardian Signature Date Page 11 Rev. July 2018

Software Usage Policy Template

Software Usage Policy Template Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/

More information

Town of Warner, New Hampshire Information Security Policy

Town of Warner, New Hampshire Information Security Policy Twn f Warner, New Hampshire Infrmatin Security Plicy Date Adpted: Bard f Selectmen David E. Hartman David Karrick, Jr. Clyde Carsn Table f Cntents Table f Cntents 1 Intrductin 2 Ethics and Acceptable Use

More information

MHS BYOD Policy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY

MHS BYOD Policy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY MHS BYOD Plicy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY Intrductin This dcument prvides advice and directin t students wh chse t use BYOD t access the Department f Educatin (DOE)

More information

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services Privacy Plicy Last Mdified: September 26, 2016 Pictry is a fast and fun way t share memes with yur friends and the wrld arund yu. Yu can send a Pictry game t friends and view the pictures they submit in

More information

UNSW Technology Policy:

UNSW Technology Policy: UNSW Technlgy Plicy: UNSW Plicy Respnsible Officer Cntact Officer Apprving Authrity UNSW Data Netwrk Cnnectin Plicy Chief Infrmatin Officer Manager Infrastructure Services Supprt UNSW IT Services Ph: x

More information

Internet/Intranet Publishing Guidelines

Internet/Intranet Publishing Guidelines Muntain View-Ls Alts Unin High Schl District In trductin Internet/Intranet Publishing Guidelines Using the Internet t further the educatinal prcess, gals and bjectives is a natural extensin f Muntain View-Ls

More information

Students will have opportunities available throughout the year to have their devices registered.

Students will have opportunities available throughout the year to have their devices registered. www.readingtn.k12.nj.us December 9, 2013 Dear Readingtn Middle Schl Families, We are excited t annunce that the Bring Yur Own Device is available fr all middle schl students! We recgnize that many f ur

More information

For students to participate in BYOD please follow these two steps

For students to participate in BYOD please follow these two steps Octber 14, 2015 www.readingtn.k12.nj.us Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many

More information

USD 373 s General Guidelines for Web Page Publishing. The USD 373 Internet community domain address will be located at

USD 373 s General Guidelines for Web Page Publishing. The USD 373 Internet community domain address will be located at 8-14-08 District Web Pages USD 373 s General Guidelines fr Web Page Publishing General Guidelines The purpse f any USD 373 publicatin is t share infrmatin regarding issues, events, persnnel, students and

More information

Imagine for MSDNAA Student SetUp Instructions

Imagine for MSDNAA Student SetUp Instructions Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS

More information

Regroup Quick Start User Guide

Regroup Quick Start User Guide Regrup Quick Start User Guide Ver 1.0 Table f Cntents Hme Screen... 2 Change Hw Yu Receive Grup Cmmunicatin... 2 Pst Annuncements t Yur Grups... 3 Add Optinal Phne and Emails... 4 Regrup Sftware User Infrmatin

More information

Security of Information Technology Resources

Security of Information Technology Resources CORNELL UNIVERSITY POLICY LIBRARY Security f Infrmatin Technlgy Resurces Technlgies Chapter: 4, Security and Vice President fr Infrmatin Technlgies Originally Issued: June 1, 2004 Last Full Review: December

More information

UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL

UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Electrnic Data Prtectin and Encryptin REFERENCE: Refrmat CATEGORY: Infrmatin Technlgy PAGE: 1 SUPERSEDES: POL-UMIT- A175-014-01 APPROVER: David Ertel

More information

All members of the UNNC Community and users of the University network.

All members of the UNNC Community and users of the University network. Bulk Email Plicy Audience: All members f the UNNC Cmmunity and users f the University netwrk. Definitin: Bulk email, by definitin, is unslicited email sent quickly in large quantities, and is recgnized

More information

PRIVACY AND E-COMMERCE POLICY STATEMENT

PRIVACY AND E-COMMERCE POLICY STATEMENT PRIVACY AND E-COMMERCE POLICY STATEMENT Tel-Tru Manufacturing Cmpany ( Tel-Tru ) is dedicated t develping lng-lasting relatinships that are built n trust. Tel-Tru is cmmitted t respecting the wishes f

More information

Data Processing Information for Users of the Career and Alumni Portal of HTW Berlin (Data Privacy Policy)

Data Processing Information for Users of the Career and Alumni Portal of HTW Berlin (Data Privacy Policy) Data Prcessing Infrmatin fr Users f the Career and Alumni Prtal f HTW Berlin (Data Privacy Plicy) The prtectin f yur data is imprtant t us. In view f this and in rder t cmply with all f ur statutry disclsure

More information

INFORMATION TECHNOLOGY SERVICES NIST COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION

INFORMATION TECHNOLOGY SERVICES NIST COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION NIST 800-171 COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION WHAT IS NIST 800-171 COMPLIANCE AND WHY DO WE HAVE TO DO IT? Any Cntrlled Unclassified Infrmatin (CUI) residing in nnfederal infrmatin

More information

Privacy Policy. We may collect information about you in a variety of ways. The information we collect on the Site includes:

Privacy Policy. We may collect information about you in a variety of ways. The information we collect on the Site includes: Privacy Plicy BHIP Glbal, Inc. ( BHIP, we r us ) respects the privacy f ur users ( User r Yu ). This Privacy Plicy explains hw Pruvit cllects, uses, and disclses, and safeguards Yur Infrmatin when yu visit

More information

Access the site directly by navigating to in your web browser.

Access the site directly by navigating to   in your web browser. GENERAL QUESTIONS Hw d I access the nline reprting system? Yu can access the nline system in ne f tw ways. G t the IHCDA website at https://www.in.gv/myihcda/rhtc.htm and scrll dwn the page t Cmpliance

More information

ONTARIO LABOUR RELATIONS BOARD. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Ontario Labour Relations Board

ONTARIO LABOUR RELATIONS BOARD. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Ontario Labour Relations Board ONTARIO LABOUR RELATIONS BOARD Filing Guide A Guide t Preparing and Filing Frms and Submissins with the Ontari Labur Relatins Bard This Filing Guide prvides general infrmatin nly and shuld nt be taken

More information

SOFTWARE PRODUCT LICENSE

SOFTWARE PRODUCT LICENSE End User License Agreement This End-User License Agreement ("EULA") is a legal agreement between yu (either an individual r a single entity) and Casper Antivirus, Inc.. fr the sftware prducts as fllws:

More information

PAY EQUITY HEARINGS TRIBUNAL. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Pay Equity Hearings Tribunal

PAY EQUITY HEARINGS TRIBUNAL. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Pay Equity Hearings Tribunal PAY EQUITY HEARINGS TRIBUNAL Filing Guide A Guide t Preparing and Filing Frms and Submissins with the Pay Equity Hearings Tribunal This Filing Guide prvides general infrmatin nly and shuld nt be taken

More information

E-Lock Policy Manager White Paper

E-Lock Policy Manager White Paper White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...

More information

Privacy Policy concerning the use of the website and the use of cookies

Privacy Policy concerning the use of the website and the use of cookies Privacy Plicy cncerning the use f the website and the use f ckies Agria understands the imprtance f the privacy f its custmers and the prtectin f their persnal data. Present plicy utlines the handling

More information

IHIS Research Access Request Guidelines

IHIS Research Access Request Guidelines Eservices: https://sumc.service-nw.cm/ 1. FOR NEWLY HIRED EMPLOYEES: Use On-barding Services & On-Barding Guide Frm Please Nte the fields required fr Research IHIS access are the same as thse utlined in

More information

HP Server Virtualization Solution Planning & Design

HP Server Virtualization Solution Planning & Design Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP

More information

Patch Management Policy

Patch Management Policy Patch Management Plicy (Versin 1) Dcument Cntrl Infrmatin: Date: 21/5/18 Master Tracking Name Patch Management Plicy Master Tracking Reference Owning Service / Department Exeter IT Issue: 1 Apprvals: Authrs:

More information

Disaster Recovery. Practical Applications. Eric LaFollette. Director of Information Resources Lake County Clerk of Courts

Disaster Recovery. Practical Applications. Eric LaFollette. Director of Information Resources Lake County Clerk of Courts Disaster Recvery Practical Applicatins Eric LaFllette Directr f Infrmatin Resurces Lake Cunty Clerk f Curts Presentatin Outline Imprtance f a plan Disaster Recvery Scenaris Disaster Recvery Basics Lake

More information

Level 2 Cambridge Technical in IT

Level 2 Cambridge Technical in IT Level 2 Cambridge Technical in IT Unit 1: Essentials f IT Sample assessment material Time: 45 minutes This test is a cmputer based test and will be cmpleted using Surpass n OCR Secure Assess prtal. This

More information

INTRODUCTION THE NETWORK

INTRODUCTION THE NETWORK INTRODUCTION The purpse f this dcument is t prvide an understanding f Internet Slutins' Acceptable Use Plicy. This plicy serves t define the accepted behaviur f users n Internet Slutins' (IS) netwrk. This

More information

Name of School. Date of next Review. Who reviewed this policy?

Name of School. Date of next Review. Who reviewed this policy? Name f Schl Gverning Bdy Ratified Plicy, 08.12.11 Date f next Review Wh reviewed this plicy? The Jenny Hammnd Primary Schl Signed Chair f Gvernrs As Apprpriate Stephné Hpe-ICT Curriculum Lead Leadership

More information

Privacy Policy. What this policy covers. What information we collect about you

Privacy Policy. What this policy covers. What information we collect about you Effective starting: May 25, 2018 What this plicy cvers Privacy Plicy Yur privacy is imprtant t us, and s is being transparent abut hw we cllect, use, and share infrmatin abut yu. This plicy is intended

More information

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform Supprt Guide Yur New Service Request Prcess: Technical Supprt Reference Guide fr Cisc Custmer Jurney Platfrm September 2018 2018 Cisc and/r its affiliates. All rights reserved. This dcument is Cisc Public

More information

Performance and communication of works and audio visual material in class What am I allowed to do?

Performance and communication of works and audio visual material in class What am I allowed to do? Perfrmance and cmmunicatin f wrks and audi visual material in class What am I allwed t d? Schls are allwed t perfrm and cmmunicate cpyright material in class under a free exceptin in the Cpyright Act (sectin

More information

html o Choose: Java SE Development Kit 8u45

html o Choose: Java SE Development Kit 8u45 ITSS 3211 Intrductin f Prgramming 1 Curse ITSS 3211 Intrductin t Prgramming Instructr Jytishka Ray Term Summer 2016 Meetings Mndays, 6 p.m. 8:45 p.m. Rm JSOM 12.202 Instructr: Jytishka Ray Email: jxr114030@utdallas.edu

More information

CAMPBELL COUNTY GILLETTE, WYOMING

CAMPBELL COUNTY GILLETTE, WYOMING CAMPBELL COUNTY GILLETTE, WYOMING System Supprt Analyst I System Supprt Analyst II Senir System Supprt Analyst Class specificatins are intended t present a descriptive list f the range f duties perfrmed

More information

Skype Meetings

Skype Meetings http://www.jeffersnstate.edu/resurces-fr-instructrs-de/ Skype Meetings Skype-t-Skype is used fr cmmunicatin thrugh vice, vide, chat (Instant Messaging) and/r desktp sharing fr ne-n-ne cnferences, meetings,

More information

Background Check Procedures for Sponsors

Background Check Procedures for Sponsors Backgrund Check Prcedures fr Spnsrs 1 On-Site Backgrund Check and Credential Requirements Little League Internatinal requires all guests n the cmplex in a wrking capacity t cmplete a Natinal Criminal Backgrund

More information

Information on using ChurchApp

Information on using ChurchApp Infrmatin n using ChurchApp 1. Intrductin What is ChurchApp? ChurchApp is an nline system which enables us t d many things at its mst simple level it serves as an nline address bk fr Emmanuel; we are als

More information

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools. Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are

More information

TPCH Data Sharing Policies and Procedures

TPCH Data Sharing Policies and Procedures TPCH Data Sharing Plicies and Prcedures Intrductin: The TPCH Data Sharing Plicies and Prcedures were created based n the CC apprved Pima Cunty: HMIS Data Sharing Plan apprved by TPCH bard n February 24,

More information

SchoolMessenger School Notification is a product of Henrico County Public Schools (HCPS)

SchoolMessenger School Notification is a product of Henrico County Public Schools (HCPS) 1 SchlMessenger: Staff and Parent Cmmunicatin Henric Cunty, Virginia Shrt Overview SchlMessenger Schl Ntificatin is a prduct f Henric Cunty Public Schls (HCPS) that assists the schl divisin with simplifying

More information

This Policy sets down acceptable behaviours for use of the College s IT and communications facilities and the consequences of unacceptable conduct.

This Policy sets down acceptable behaviours for use of the College s IT and communications facilities and the consequences of unacceptable conduct. Dcument Name: Oaklands Cllege Infrmatin Security Management System Appendix C Acceptable Use Plicy Creatin Date: 19 th January 2012 Next Review Date: 19 th January 2013 Creatr Name: Tristan Self (Head

More information

AT&T Corporate Voice Mail Unified Messaging (CVM-UM) Quick Start

AT&T Corporate Voice Mail Unified Messaging (CVM-UM) Quick Start AT&T Crprate Vice Mail Unified Messaging (CVM-UM) Quick Start 2011 AT&T Intellectual Prperty. All rights reserved. AT&T the lg and all ther AT&T marks cntained herein are trademarks f AT&T Intellectual

More information

SmartPass User Guide Page 1 of 50

SmartPass User Guide Page 1 of 50 SmartPass User Guide Table f Cntents Table f Cntents... 2 1. Intrductin... 3 2. Register t SmartPass... 4 2.1 Citizen/Resident registratin... 4 2.1.1 Prerequisites fr Citizen/Resident registratin... 4

More information

Overview of Data Furnisher Batch Processing

Overview of Data Furnisher Batch Processing Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...

More information

Group Policy Manager Quick start Guide

Group Policy Manager Quick start Guide Grup Plicy Manager Quick start Guide Sftware versin 4.0.0.0 General Infrmatin: inf@cinsystems.cm Online Supprt: supprt@cinsystems.cm Cpyright CinSystems Inc., All Rights Reserved Page 1 CinSystems Inc.

More information

Yes. If you are an iphone user, you can download a free application via the App Store in itunes. Download the BSP iphone app.

Yes. If you are an iphone user, you can download a free application via the App Store in itunes. Download the BSP iphone app. Frequently Asked Questins General 1. What is BSP Mbile Banking App? BSP Mbile Banking App, is a smartphne applicatin that allws yu t securely access yur bank accunt (s) anywhere, anytime at yur cnvenience

More information

Joining SportsWare. Dear Wiley College Student-Athletes:

Joining SportsWare. Dear Wiley College Student-Athletes: 1 Dear Wiley Cllege Student-Athletes: Prir t participating n a team frm Wiley Cllege, all student-athletes must prvide the Athletic Training Department with current address, emergency cntact, insurance,

More information

Product Handbook. 5. Student Access. a. Retrieve Login Credentials. b. Tax Information. 14 P a g e. TaxSelect: 1098-T Statement Services

Product Handbook. 5. Student Access. a. Retrieve Login Credentials. b. Tax Information. 14 P a g e. TaxSelect: 1098-T Statement Services 5. Student Access Prduct Handbk The Student Infrmatin Website (http://www.ecsi.net/taxinf.html) is available 24/7. This prtal allws students t view valuable infrmatin related t their 1098-T statements

More information

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance

More information

Element Creator for Enterprise Architect

Element Creator for Enterprise Architect Element Creatr User Guide Element Creatr fr Enterprise Architect Element Creatr fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins... 3 Installatin... 4 Verifying the

More information

Forcepoint UEBA Management of Personal Data

Forcepoint UEBA Management of Personal Data Frcepint UEBA Management f Persnal Data 2018 Frcepint LLC. All Rights Reserved Dcument Classificatin: Public FPWSCMPD-2018MAY24 Frcepint UEBA Management f Persnal Data CONTENTS Disclaimer... 2 General...

More information

Custod. July 30, 20100

Custod. July 30, 20100 AgriLife Infrmatin Technlgy Custd dian Prcedures and Best Practices July 30, 20100 TABLE OF CONTENTS Intrductin.. 3 Custdian Requirements...... 4 Appendix A - Definitins........ 13 Appendix B - IT Security

More information

Guidance for Applicants: Submitting an application in AAS Ishango Grants Management

Guidance for Applicants: Submitting an application in AAS Ishango Grants Management Guidance fr Applicants: Submitting an applicatin in AAS Ishang Grants Management Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1

More information

First Aid and Choking, Fire Safety, Medication Administration, and Standard Precautions Roster Submission:

First Aid and Choking, Fire Safety, Medication Administration, and Standard Precautions Roster Submission: The Wiscnsin CBRF Training Registry is lcated at www.uwgb.edu/cbrf-registry. This guide prvides directins fr submitting rsters and applicatins. Rster Submissin First Aid and Chking, Fire Safety, Medicatin

More information

Employee ID Conversion Workshop. Florida Department of Financial Services Division of Accounting & Auditing

Employee ID Conversion Workshop. Florida Department of Financial Services Division of Accounting & Auditing Emplyee ID Cnversin Wrkshp Flrida Department f Financial Services Divisin f Accunting & Auditing Agenda Summary f the Agency Impact Statements System Requirements Timeline Agency Readiness Next Steps Impact

More information

Enrolling onto the Open Banking Directory How To Guide

Enrolling onto the Open Banking Directory How To Guide Enrlling nt the Open Banking Directry Hw T Guide Date: Octber 2017 Versin: v3.0 Classificatin: PUBLIC OPEN BANKING LIMITED ENROLLING ONTO THE OPEN BANKING DIRECTORY Page 1 f 14 Cntents 1. Intrductin 3

More information

MARYLAND PHYSICIANS CARE (00247) ERA ENROLLMENT INSTRUCTIONS

MARYLAND PHYSICIANS CARE (00247) ERA ENROLLMENT INSTRUCTIONS MARYLAND PHYSICIANS CARE (00247) ERA ENROLLMENT INSTRUCTIONS WHICH FORM(S) SHOULD I DO? Emden EnrllNw (Click here) NOTE: This is cmpleted nline. Office Ally supprts nly the payers listed n the Emden ERA

More information

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering IT2042 - Infrmatin Security 1-1 E. G. S. Pillay Engineering Cllege, Nagapattinam Cmputer Science and Engineering Elective II IT 2042 INFORMATION SECURITY VIII Sem CSE QUESTION BANK - UNIT-IV 1) What is

More information

Texas A&M Veterinary Medical Diagnostic Laboratory Procedures V0.01 Information Resource Procedures

Texas A&M Veterinary Medical Diagnostic Laboratory Procedures V0.01 Information Resource Procedures Texas A&M Veterinary Medical Diagnstic Labratry Prcedures 29.01.03.V0.01 Infrmatin Resurce Prcedures Revised: January 23, 2017 Next Scheduled Review: January 23, 2022 Click t View Revisin Histry PROCEDURE

More information

Guidance for Submitting an application or Nomination in AAS Ishango Online System

Guidance for Submitting an application or Nomination in AAS Ishango Online System Guidance fr Submitting an applicatin r Nminatin in AAS Ishang Online System Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1 General

More information

Release Notes Version: - v18.13 For ClickSoftware StreetSmart September 22, 2018

Release Notes Version: - v18.13 For ClickSoftware StreetSmart September 22, 2018 Release Ntes Versin: - v18.13 Fr ClickSftware StreetSmart September 22, 2018 Cpyright Ntice Cpyright 2018 ClickSftware Technlgies Ltd. All rights reserved. N part f this publicatin may be cpied withut

More information

Introduction to Mindjet on-premise

Introduction to Mindjet on-premise Intrductin t Mindjet n-premise Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 www.mindjet.cm 2012 Mindjet. All Rights Reserved

More information

CaseWare Working Papers. Data Store user guide

CaseWare Working Papers. Data Store user guide CaseWare Wrking Papers Data Stre user guide Index 1. What is a Data Stre?... 3 1.1. When using a Data Stre, the fllwing features are available:... 3 1.1.1.1. Integratin with Windws Active Directry... 3

More information

PowerTeacher Classroom Management Tool Quick Reference Card

PowerTeacher Classroom Management Tool Quick Reference Card PwerTeacher Classrm Management Tl PwerTeacher is an essential part f the PwerSchl Student Infrmatin System. PwerTeacher cncentrates all features teachers need in ne spt, including a web-based gradebk.

More information

Authorised Acceptable Use Policy (Staff, Governors and Volunteers)

Authorised Acceptable Use Policy (Staff, Governors and Volunteers) Newbld Verdn Primary Schl Authrised Acceptable Use Plicy fr Staff, Gvernrs and Vlunteers Authrised Acceptable Use Plicy (Staff, Gvernrs and Vlunteers) Why have an Authrised Acceptable Use Plicy? An Authrised

More information

Using the National Police Library

Using the National Police Library Using the Natinal Plice Library Including terms, cnditins and privacy infrmatin Versin 1.1 Updated 23 July 2018 Using the Natinal Plice Library The Natinal Plice Library prvides access t a wide range f

More information

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 1. What are tw functins f an perating system? (Chse tw.) cntrlling hardware access managing applicatins text prcessing flw chart editing prgram

More information

ANNUAL COMPUTER SECURITY REFRESHER TRAINING

ANNUAL COMPUTER SECURITY REFRESHER TRAINING Cmputer DD Nvember 27, 2017 ANNUAL COMPUTER SECURITY REFRESHER TRAINING Nrthrp Grumman has a requirement t prvide annual cmputer security training t all emplyees wh have access t classified cmputing systems.

More information

CyCop FAQ For Internal Use Only. CyCop Frequently Asked Questions

CyCop FAQ For Internal Use Only. CyCop Frequently Asked Questions CyCp FAQ Fr Internal Use Only CyCp Frequently Asked Questins Questin What are the cre Feature Sets fr CyCp? Features Security Prfessinal Tracking and Supervisin Incident, Facility Inspectins and Daily

More information

Basic Technology Fee. Page 1

Basic Technology Fee. Page 1 Basic Technlgy Fee Cntents Basic Tech Fee Overview... 1 BTF Calculatin... 1 BTF Distributin... 1 Basic BTF Cverage... 1 Services Outside BTF Cverage/Additinal Charges... 1 Specifics Items Cvered by the

More information

St Joseph s Roman Catholic High School. Anti-Cyberbullying Policy

St Joseph s Roman Catholic High School. Anti-Cyberbullying Policy St Jseph s Rman Cathlic High Schl Anti-Cyberbullying Plicy This schl believes that all peple in ur cmmunity have the right t teach and learn in a supprtive, caring and safe envirnment withut fear f being

More information

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu BANNER BASICS What is Banner? Definitin Prduct Mdules Self-Service-Fish R Net Lg int Banner Banner Envirnment The Main Windw My Banner Pages What is it? What frm d yu use? Steps t create a persnal menu

More information

CCNA 1 Chapter 1 v5.03 Exam Answers 2016

CCNA 1 Chapter 1 v5.03 Exam Answers 2016 CCNA 1 Chapter 1 v5.03 Exam Answers 2016 1. A cmpany is cntemplating whether t use a client/server r a peer-t-peer netwrk. What are three characteristics f a peer-t-peer netwrk? (Chse three.) better security

More information

S4S Support Services. Audit4 version 14+ Aug Copyright 2017 S4S Pty Ltd. S4S Pty Ltd. Phone: Web:

S4S Support Services. Audit4 version 14+ Aug Copyright 2017 S4S Pty Ltd. S4S Pty Ltd. Phone: Web: S4S Pty Ltd ABN: 26 104 845 909 Phne: 1300 133 308 Web: http://www.s4s.cm.au Audit4 versin 14+ Aug 2018 Cpyright S4S Pty Ltd S4S Supprt prvides cmprehensive services s that yu can get the maximum benefit

More information

DELL EMC PERSONALIZED SUPPORT SERVICES

DELL EMC PERSONALIZED SUPPORT SERVICES DELL EMC PERSONALIZED SUPPORT SERVICES Optimize yur Dell EMC investment based n yur unique requirements ESSENTIALS Dell EMC Persnalized Supprt Services: Custmize and enhance yur Dell EMC Custmer Service

More information

Point-to-Point Encryption (P2PE)

Point-to-Point Encryption (P2PE) Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard

More information

A introduction to GNH Community

A introduction to GNH Community A intrductin t GNH Cmmunity What is GNH Cmmunity? The basics: - An nline cmmunity fr nn-prfits in the Greater New Haven area - A tl t cmmunicate and share infrmatin: Prgrams Available resurces Cntact details

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questins What are the benefits f activech? activech allws yur rganizatin t prvide an n-premise, managed and secure alternative t Drpbx and ther file synching and sharing slutins. Benefits

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

Avaya 9610 IP Telephone End User Guide

Avaya 9610 IP Telephone End User Guide Avaya 9610 IP Telephne End User Guide 9610 IP Telephne End User Guide 1 P age Table f Cntents Abut Yur Telephne... 3 Abut Scrlling and Navigatin... 3 Selecting Names, Numbers, r Features... 3 Starting

More information

CLIENT. Corporation. Hosting Services. August 24, Marc Gray Flywire Technology CLIENT. 104 West Candler St Winder, GA

CLIENT. Corporation. Hosting Services. August 24, Marc Gray Flywire Technology CLIENT. 104 West Candler St Winder, GA CLIENT Crpratin Hsting Services August 24, 2011 PRESENTED TO: PRESENTED BY: Marc Gray Flywire Technlgy CLIENT 104 West Candler St Winder, GA 30680 770-771-5299 Marc@ flywiretechnlgy.cm TABLE OF CONTENTS

More information

2. POLICY 2.01 This policy shall govern the use of LED signs situated on municipal property.

2. POLICY 2.01 This policy shall govern the use of LED signs situated on municipal property. TOWNSHIP OF LAKE OF BAYS PROCEDURE MANUAL Chapter: ADMINISTRATION Index N. AD-12.1 Sectin: Municipal Prperty Effective Date: July 21, 2015 Subject: LED Sign and Messaging Revisin Date: Page: 1 f 3 1. PURPOSE

More information

Q-CERT Incident Reporting Guidelines

Q-CERT Incident Reporting Guidelines Classificatin : Public Q-CERT Incident Reprting Guidelines Q-CERT prvides limited incident handling services t its cnstituents, which include Qatar's gvernment, business, and educatinal institutins as

More information

Investor Services Online Quick Reference Guide FTP Delivery

Investor Services Online Quick Reference Guide FTP Delivery The File Transfer Prtcl (FTP) feature f Investr Services Online enables yu t autmatically transmit any reprt frm Investr Services Online n t yur cmpany s FTP servers thrugh a secure methd f cmmunicatin

More information

Parent Assistant FAQs

Parent Assistant FAQs Parent Assistant FAQs Page 1 f 14 1- System Requirements: First time user has t: - Set the brwser language setting t English (Canada) and Arabic (UAE) - Use Internet Explrer 9 (IE9) r Internet Explrer

More information

LuxSci Acceptable Use Policy Background. Customer Security Responsibilities

LuxSci Acceptable Use Policy Background. Customer Security Responsibilities LuxSci Acceptable Use Plicy 2016.03.10 Backgrund Frm time t time Lux Scientiae may impse reasnable rules and regulatins regarding the use f its services. Such rules and regulatins are called Acceptable

More information

Creating an Online Account

Creating an Online Account The Standard uses secure, nline accunts t prtect yur data and prvide access t yur emplyer s absence services. T use these services, yu will need t create an nline accunt. Getting started Allw 15 minutes

More information

Case Metrics Guide. January 11, 2019 Version For the most recent version of this document, visit our documentation website.

Case Metrics Guide. January 11, 2019 Version For the most recent version of this document, visit our documentation website. Case Metrics Guide January 11, 2019 Versin 9.6.202.10 Fr the mst recent versin f this dcument, visit ur dcumentatin website. Table f Cntents 1 Case Metrics 3 1.1 Case Metrics Cmpatibility Matrix 3 1.2

More information

ITD Information Security October 19, 2015

ITD Information Security October 19, 2015 ITD Infrmatin Security Octber 19, 2015 Cntents Intrductin... 3 Synpsis... 3 ITD Security Team... 3 Cunty Emplyees... 3 Malware Prtectin... 4 Physical Security... 4 Data... 4 Internet... 4 Micrsft Office

More information

India Market Softech Pvt. Ltd. (indiamarkethub.com) Acceptable Use Policy (AUP)

India Market Softech Pvt. Ltd. (indiamarkethub.com) Acceptable Use Policy (AUP) India Market Sftech Pvt. Ltd. (indiamarkethub.cm) Acceptable Use Plicy (AUP) We've develped this Acceptable Use Plicy (AUP) t help ur Custmers understand their respnsibilities when using ur services. It

More information

EU General Data Protection Regulation

EU General Data Protection Regulation EU General Data Prtectin Regulatin Sally Ubnske, Senir Business Systems Analyst, subnske@ariessys.cm Sean MacRae, Business Systems Analyst, smacrae@ariessys.cm GDPR Summary The Eurpean Parliament, the

More information

Medtech Evolution. Installation Guide

Medtech Evolution. Installation Guide Medtech Evlutin Installatin Guide Versin 10.4.2. Build 5850 August 2018 Cpyright Medtech Healthcare Pty Ltd Page 1 f 11 Table f Cntents Intrductin... 3 Installatin Pre-requisites... 4 Medtech Evlutin Server

More information

APPLICATION FORM. CISAS opening hours: 9:00am to 5:00pm, Monday to Friday

APPLICATION FORM. CISAS opening hours: 9:00am to 5:00pm, Monday to Friday Enquiry reference number: (Office use nly) Administered by the Centre fr Effective Dispute Reslutin (CEDR) APPLICATION FORM What is this Applicatin fr? What d I need t d? This applicatin frm is fr custmers

More information

Wave IP 4.5. CRMLink Desktop User Guide

Wave IP 4.5. CRMLink Desktop User Guide Wave IP 4.5 CRMLink Desktp User Guide 2015 by Vertical Cmmunicatins, Inc. All rights reserved. Vertical Cmmunicatins and the Vertical Cmmunicatins lg and cmbinatins theref and Vertical ViewPint, Wave Cntact

More information

Keeping Dynamics GP Secure

Keeping Dynamics GP Secure Keeping Dynamics GP Secure February 23, 2017 Charles Allen Senir Managing Cnsultant BKD Technlgies callen@bkd.cm T Receive CPE Credit Participate in entire webinar Answer attendance checks & plls when

More information

Doctoral Dissertation and Capstone Project Submission Guide

Doctoral Dissertation and Capstone Project Submission Guide Dctral Dissertatin and Capstne Prject Submissin Guide Part I: Dctral Dissertatin/Capstne Prject Submissin Prcess 1. Dctral Dissertatin/Capstne Prject apprved by cmmittee and department 2. Student submits

More information

FAMIS Services Policy for FAMIS Interfaces

FAMIS Services Policy for FAMIS Interfaces FAMIS Services Plicy fr FAMIS Interfaces FAMIS is the accunting system f recrd fr the Members f The A&M System that use FAMIS as their primary accunting system. FAMIS was designed primarily fr the Fiscal/Business

More information

SOLA and Lifecycle Manager Integration Guide

SOLA and Lifecycle Manager Integration Guide SOLA and Lifecycle Manager Integratin Guide SOLA and Lifecycle Manager Integratin Guide Versin: 7.0 July, 2015 Cpyright Cpyright 2015 Akana, Inc. All rights reserved. Trademarks All prduct and cmpany names

More information