Information Security Policy

Size: px
Start display at page:

Download "Information Security Policy"

Transcription

1 Infrmatin Security Plicy Versin: 2.4 Dcument ID: 3541

2 Cpyright Ntice Cpyright 2015, ehealth Ontari All rights reserved N part f this dcument may be reprduced in any frm, including phtcpying r transmissin electrnically t any cmputer, withut prir written cnsent f ehealth Ontari. The infrmatin cntained in this dcument is prprietary t ehealth Ontari and may nt be used r disclsed except as expressly authrized in writing by ehealth Ontari. Trademarks Other prduct names mentined in this dcument may be trademarks r registered trademarks f their respective cmpanies and are hereby acknwledged. ehealth Ontari EHR Plicy Infrmatin Security Plicy i

3 Dcument Cntrl Next Review Date : Annually r therwise established by the Cnnecting Security Cmmittee. Apprval Histry APPROVER(S) APPROVED DATE Cnnecting Security Cmmittee Revisin Histry VERSION NO. DATE SUMMARY OF CHANGE CHANGED BY Nv 2013 versin adpted frm the cgta PSWG and revisin. Mark Carter Updated based n feedback f CSC Members. Added a reference t the Privacy and Assurance Plicy including bullet pints t supprt cntent. Mark Carter Plicy apprved at the CSC meeting September 9 th. Mark Carter Aligned name f access cntrl plicy based n final wave 3 CSC decisin. Mark Carter Updated plicies t nte the change in gvernance. The Steering Cmmittee was replaced by the Applicable Oversight Bdy. The reginal privacy and security cmmittee has been remved frm the exemptin decisin prcess. Gvernance respnsibilities f the Cnnecting Security Cmmittee have been added t the rles and respnsibilities sectin. Mark Carter ehealth Ontari EHR Plicy Infrmatin Security Plicy ii

4 Infrmatin Security Plicy Purpse T prtect the cnfidentiality, integrity, and availability f [the EHR Slutin] and persnal health infrmatin (PHI) stred in r prcessed by [the EHR Slutin]. In ding s, this plicy will utline the framewrk fr [the EHR Slutin] infrmatin security gvernance by: Defining the infrmatin security principles t manage: PHI and [The EHR Slutin] and infrmatin systems r infrmatin technlgies that cnnect t [the EHR Slutin]; and Scpe Establishing the rles and respnsibilities fr ensuring the principles in this plicy are implemented and maintained. This plicy applies t [the EHR Slutin] Prgram, their agents and their Electrnic Service Prviders and t [the EHR Slutin]. Fr health infrmatin custdians (HICs) that use [the EHR Slutin] t view, handle r therwise deal with PHI by prvisining access thrugh: Lcal identity prvider technlgy (lcal IdP), this plicy applies t: The HIC s lcal access cntrl and identity management infrastructure ( identity prvider services ) that manages the authenticatin and authrizatin used t prvisin access t [the EHR Slutin] (e.g., [the EHR Slutin] Security Tken Service Slutin, Micrsft Active Directry Federatin Services 2.0, etc.) Direct netwrk cnnectivity t [the EHR Slutin] Prvider Prtal and administrative functinality, including cmpnents in the cnnectin path (firewalls, prxies, etc.), and The integratin f [the EHR Slutin] Prvider Prtal with the HIC s lcal health infrmatin system (HIS) r electrnic medical recrd (EMR) applicatin(s). ehealth Ontari s ONE ID service, this plicy applies t: Direct netwrk cnnectivity t [the EHR Slutin] administrative functinality, including cmpnents in the cnnectin path (firewalls, prxies, etc.). In additin t the scpe set ut fr viewing sites, fr HICs that create r cntribute PHI t [the EHR Slutin] Clinical Data Repsitry ( cntributing sites ), this plicy als applies t: The data cntributin endpints that prvide PHI t [the EHR Slutin] s Clinical Data Repsitry; and ehealth Ontari EHR Plicy Infrmatin Security Plicy 1

5 The infrmatin technlgy and prcesses that ensure the quality f the data submitted (e.g., terminlgy mapping). This plicy des nt apply t any HIC, their agents r their Electrnic Service Prviders wh d nt view, create r cntribute t [the EHR Slutin]. Definitins [The EHR Slutin]: [The EHR Slutin] and supprting systems designed t stre and make available specified electrnic PHI frm the electrnic health infrmatin systems f HICs that may nt be available in planned prvincial r reginal repsitries s as t act as a single repsitry f such infrmatin t reduce the lad n surce systems. This des nt include any participating HIC s infrmatin systems r infrmatin technlgies. Privacy and Security Operatins Team: The Privacy and Security Operatins Team is made up f [The EHR Slutin] agents wh supprt [the EHR Slutin] privacy and security-related activities, initiatives and prcesses. Privacy and Security Cmmittee (PSC): The Privacy and Security Cmmittee (PSC) is a cmmittee cmprised f agents frm participating HICs t supprt the privacy and infrmatin security gvernance structure. Applicable Oversight Bdy: The Applicable Oversight Bdy is cmprised f senir-level executives wh versee all aspects f [the EHR Slutin]. See Plicy Gvernance Structure sectin belw. Cnnecting Security Cmmittee (CSC): The prvincial security frum cnsisting f senir security representatives frm acrss the regins and ehealth Ontari. This is a decisin making bdy respnsible fr establishing a functinal and usable infrmatin security gvernance framewrk fr participating rganizatins in the EHR. Electrnic Service Prvider: A persn that prvides gds r services fr the purpse f enabling a HIC t use electrnic means t cllect, use, mdify, disclse, retain r dispse f PHI, and includes a health infrmatin netwrk prvider. Infrmatin security: Refers t the prtectin f all types f infrmatin, infrmatin systems and infrmatin technlgies frm unauthrized access, cllectin, use, disclsure, transfer, disruptin, mdificatin, destructin r dispsal. Infrmatin system: A discrete set f infrmatin technlgy rganized fr the cllectin, prcessing, maintenance, use, disclsure, destructin, r dispsal f infrmatin. Data Cntributin End Pint(s): Technlgy and related prcesses that prvide data t the Clinical Data Repsitry r are queried t prvide data t a Clinical Viewer. Typically these systems are the Infrmatin System (e.g. Hspital Infrmatin System, Labratry Infrmatin System, Clinical Infrmatin System, etc.) that directly cnnects t [the EHR Slutin] t prvide clinical data. Identity Prvider Services: Technlgy and related supprting services, plicies, prcesses, and prcedures that are used t create, maintain, secure, validate, assert and manage electrnic identities t [the EHR Slutin]. Infrmatin technlgy: Any asset (physical r lgical) that is used in the autmatic acquisitin, strage, manipulatin, management, mvement, cntrl, display, switching, interchange, transmissin, r receptin f data r infrmatin. It includes, but is nt limited t, hardware, sftware, firmware, ancillary equipment, and related resurces. ehealth Ontari EHR Plicy Infrmatin Security Plicy 2

6 Shall/Must: Used fr abslute requirements, i.e., they are nt ptinal. Shuld: Used when valid reasns exist in certain circumstances nt t implement the requirement; hwever, the implementer must understand the implicatins befre chsing a different curse and must cnsider implementing cmpensating cntrls. May: The requirement is nly a recmmendatin, r prvided as an implementatin example and is nt intended n being exhaustive. ehealth Ontari EHR Plicy Infrmatin Security Plicy 3

7 Plicy 1. Principles Acceptable Use f Infrmatin and Infrmatin Technlgy 1.1. [The EHR Slutin] Prgram and HICs must define behaviural requirements gverning the acceptable use f infrmatin and infrmatin technlgy t which [the EHR Slutin] s agents and Electrnic Service Prviders, and HICs, their agents and Electrnic Services Prviders with access t [the EHR Slutin] must adhere. Infrmatin Security Training Refer t the Acceptable Use f Infrmatin and Infrmatin Technlgy Plicy [The EHR Slutin] Prgram and HICs must fster an infrmatin security-psitive culture. This may be achieved by implementing an infrmatin security awareness and educatin prgram t help all persns with access t [the EHR Slutin] t understand their infrmatin security-related bligatins. Threat Risk Management Cryptgraphy Refer t the Privacy and Security Training Plicy [The EHR Slutin] Prgram must perfrm infrmatin security threat risk assessments (TRAs) n [the EHR Slutin] and must track, and mitigate r frmally accept all f their risks that are identified thrugh a TRA HICs shuld perfrm infrmatin security TRAs n their identity prvider services and data cntributin endpints. Refer t the Threat Risk Management Plicy [The EHR Slutin] Prgram must implement cryptgraphic slutins in [the EHR Slutin] t prtect the cnfidentiality and integrity f PHI where apprpriate, as well as t cnfirm the identity f the riginatr f a cmmunicatin HICs must implement cryptgraphic slutins n their relevant infrmatin systems t prtect the cnfidentiality and integrity f PHI that is accessed thrugh [the EHR Slutin]. Refer t the Cryptgraphy Plicy. Infrmatin and Asset Management 1.7. [The EHR Slutin] Prgram must classify and define prtectin requirements fr PHI in [the EHR Slutin] in a manner that prtects its cnfidentiality, integrity, and availability in any frm (e.g., paper r electrnic) thrughut its infrmatin lifecycle. ehealth Ontari EHR Plicy Infrmatin Security Plicy 4

8 Refer t the Infrmatin and Asset Management Plicy. Access Cntrl and Identity Management 1.8. [The EHR Slutin] Prgram and HICs must establish apprpriate access and identity management cntrls t manage all persns and infrmatin system access t [the EHR Slutin]. These cntrls must: Define the infrmatin security respnsibilities f all persns wh have access t [the EHR Slutin] Ensure that nly authrized persns are granted access t [the EHR Slutin] and that persnal accuntability is assured Ensure that nly authrized infrmatin systems are granted access t [the EHR Slutin], and Prvide authrized persns r infrmatin systems with nly the least amunt f privileges that are sufficient t enable them t perfrm their duties but d nt permit them t exceed their authrity. Lgging and Mnitring Refer t the Access Cntrl and Identity Management Plicy fr System Level Access and the Identity Federatin Standard [The EHR Slutin] Prgram must lg and mnitr all access t [the EHR Slutin], and must lg and mnitr infrmatin system events n [the EHR Slutin] HICs must lg and mnitr all access by the HIC, their agents r Electrnic Service Prviders t [the EHR Slutin] s Prvider Prtal, and must lg and mnitr infrmatin system events n their identity prvider services and data cntributin endpints. Netwrk and Operatins Refer t the Security Lgging and Mnitring Plicy [The EHR Slutin] Prgram must implement cntrls t secure their netwrk infrastructure, and establish prcedures t secure the nging management and peratin f [the EHR Slutin] HICs must implement cntrls t secure their netwrk infrastructure, and establish prcedures t secure the nging management and peratin f their identity prvider services and data cntributin endpints. System Develpment Lifecycle Refer t the Netwrk and Operatins Plicy [The EHR Slutin] Prgram must define infrmatin system develpment and change cntrl requirements, and ensure that all system develpment activities perfrmed n [the EHR Slutin] are carried ut in accrdance with these requirements. ehealth Ontari EHR Plicy Infrmatin Security Plicy 5

9 1.14. HICs shuld define infrmatin system develpment and change cntrl requirements and ensure that identity prvider services and data cntributin endpint develpment activities are carried ut in accrdance with these requirements. Electrnic Service Prviders Refer t the System Develpment Lifecycle Plicy [The EHR Slutin] Prgram must ensure that their Electrnic Service Prviders wh will have access t [the EHR Slutin], r wh manage r prvide supprt t [the EHR Slutin] have adequate infrmatin security cntrls in place t prtect and maintain the level f cnfidentiality, integrity and availability HICs must ensure that their Electrnic Service Prviders wh will have access t their identity prvider services r data cntributin endpints, r wh manage r prvide supprt t these systems have adequate infrmatin security cntrls in place t prtect and maintain the level f cnfidentiality, integrity and availability. Physical Security Refer t the Electrnic Service Prvider Plicy [The EHR Slutin] Prgram must implement cntrls t prtect against the risks f unauthrized physical access and envirnmental damage t [the EHR Slutin] HICs must implement cntrls t prtect against the risks f unauthrized physical access and envirnmental damage t their identity prvider services and data cntributin endpints. Business Cntinuity Refer t the Physical Security Plicy [The EHR Slutin] Prgram must implement prcedures necessary t ensure that [the EHR Slutin]: Remains available, especially in the event f a disaster, r Can be recvered in the event that peratins are disrupted HICs shuld develp business cntinuity plans t ensure that their identity prvider services and data cntributin endpints: Remain available, especially in the event f disaster, r Can be recvered in the event that peratins are disrupted. Refer t the Business Cntinuity Plicy. Infrmatin Security Incident Management ehealth Ontari EHR Plicy Infrmatin Security Plicy 6

10 1.21. [The EHR Slutin] Prgram and HICs must implement an infrmatin security incident management prcess t identify and reslve infrmatin security incidents related t [the EHR Slutin] quickly and effectively, while minimizing their impact and reducing the risk f similar infrmatin security incidents frm ccurring. Refer t the Infrmatin Security Incident Management Plicy. Privacy and Security Assurance HICs must identify and mitigate privacy and security risks and areas f nn-cmpliance in respect f [the EHR Slutin], including thrugh privacy and security readiness self-assessments, privacy and security peratinal self-attestatins, auditing and mnitring activities and assurance f agents and Electrnic Service Prviders [The EHR Slutin] Prgram Office must identify and mitigate privacy and security risks and areas f nn-cmpliance in respect f [the EHR Slutin], including thrugh privacy impact assessments, threat risk assessments, privacy and security readiness self-assessments, privacy and security peratinal self-attestatins, auditing and mnitring activities and assurance f agents, Electrnic Service Prviders and third parties. Refer t the Privacy and Security Harmnized Assurance Plicy. 2. Infrmatin Security Exemptin Requirements 2.1. All shall/must requirements are mandatry. Any deviatin frm a mandatry requirement in a [the EHR Slutin] infrmatin security plicy, standard, r supprting dcument must be apprved by the Applicable Oversight Bdy All infrmatin security exemptin requests must be assessed by the Privacy and Security Operatins Team and then reviewed by the Applicable Oversight Bdy fr apprval [The EHR Slutin] Prgram must lg all infrmatin security exemptin requests Infrmatin security exemptins may be requested and granted fr any length f time. Hwever, all apprved exemptins must be reviewed by the Privacy and Security Operatins Team at a minimum, every tw years, t ensure that the level f risk has nt increased r that new risks have nt appeared. If the Privacy and Security Operatins Team reassesses the risk at a higher level r identifies additinal risks, then the exemptin must be presented t the Applicable Oversight Bdy fr re-apprval The Applicable Oversight Bdy has the right t revke any apprved infrmatin security exemptins. Hwever, HICs must be prvided with at least six mnths t cmply with the plicy if their infrmatin security exemptin is revked. Refer t Appendix A: Infrmatin Security Exemptin Requests ehealth Ontari EHR Plicy Infrmatin Security Plicy 7

11 3. Rles and Respnsibilities Privacy and Security Cmmittee 3.1. The Privacy and Security Cmmittee must: Applicable Oversight Bdy Review, prvide feedback, and ratify all [the EHR Slutin] infrmatin security plicies 3.2. The Applicable Oversight Bdy must: Apprve all infrmatin security plicies Apprve r deny all infrmatin security exemptin requests Where applicable, hld all [the EHR Slutin] agents and Electrnic Service Prviders, and HICs accuntable fr unauthrized r inapprpriate access, cllectin, use, disclsure, dispsal, mdificatin, r interference with [the EHR Slutin], PHI r [the EHR Slutin] infrmatin. Privacy and Security Operatins Team 3.3. Privacy and Security Operatins Team must: Prvide infrmatin security leadership and guidance t HICs Develp, implement and maintain an infrmatin security prgram that will establish an infrmatin security gvernance, strategy and plicy framewrk fr the HICs and external service prviders Develp, implement and maintain supprting plicies, standards and supprting dcuments that uphld and expand upn the principles f this plicy Prvide guidance t the HICs n infrmatin security training and awareness activities Mnitr, reprt, and make recmmendatins fr actin r imprvement t the PSC n infrmatin security psture, infrmatin security incidents, and the status and effectiveness f the infrmatin security prgram Review, and prvide recmmendatins n all infrmatin security plicy exemptins t the Applicable Oversight Bdy. Health Infrmatin Custdians (HICs) 3.4. All HICs must: Develp, implement and maintain an infrmatin security plicy fr their rganizatin that uphlds the principles f this plicy and any ther applicable infrmatin security plicies, standards and supprting dcuments ehealth Ontari EHR Plicy Infrmatin Security Plicy 8

12 Designate an infrmatin security lead t ensure cmpliance with the principles utlined in this plicy. The infrmatin security lead may be the same persn as the appinted cntact persn required by Persnal Health Infrmatin and Prtectin Act, 2004 (PHIPA) sectin15 r the site cntact identified in the participatin agreement Ensure that all agents and Electrnic Service Prviders wh have access t [the EHR Slutin] Services are apprpriately infrmed f their infrmatin security respnsibilities Require all agents and Electrnic Service Prviders wh have access t [the EHR Slutin] t agree t an end user agreement that includes cnfidentiality prvisins befre being prvided with access t [the EHR Slutin] Hld individual agents and Electrnic Service Prviders accuntable fr unauthrized r inapprpriate access, cllectin, use, disclsure, dispsal, destructin, mdificatin, r interference with [the EHR Slutin], r their infrmatin systems. Cnnecting Security Cmmittee Apprve all infrmatin security plicies Review trend reprting f security exemptins Review security incident reprts Exemptins Any exemptins t this Plicy must be apprved by the Applicable Oversight Bdy, wh will authrize exemptins nly where there is clear justificatin t d s and nly t the minimum extent necessary t meet the justified need. See Appendix A: Infrmatin Security Exemptin Requests in the Infrmatin Security Plicy Enfrcement All instances f nn-cmpliance will be reviewed by the Applicable Oversight Bdy. Plicy Gvernance Structure The Applicable Oversight Bdy has the authrity t impse apprpriate penalties, up t and including terminatin f the Agreements with the HIC, Electrnic Service Prviders r terminatin f the access privileges f agents, and t require the implementatin f remedial actins. EHR Slutin Applicable Oversight Bdy Cnnecting Ontari CDR ehealth Ontari Strategy Cmmittee References ehealth Ontari EHR Plicy Dcuments ehealth Ontari EHR Plicy Infrmatin Security Plicy 9

13 Infrmatin Security Plicy Acceptable Use f Infrmatin and Infrmatin Technlgy Access Cntrl and Identity Management Plicy fr System Level Access Lcal Registratin Authrity Prcedures Identity Federatin Standard Business Cntinuity Plicy Cryptgraphy Plicy Electrnic Service Prviders Plicy Infrmatin Security Incident Management Plicy Infrmatin and Asset Management Plicy Netwrk and Operatins Plicy Security Lgging and Mnitring Plicy Systems Develpment Lifecycle Plicy Physical Security Plicy Threat Risk Management Plicy Harmnized Privacy Prtectin Plicies Canada Health Infway Reference Canada Health Infway Electrnic Health Recrd Privacy and Security Requirements (Versin 1.1 Revised February 7, 2005) Other Infrmatin and Privacy Cmmissiner f Ontari s Guidelines n Facsimile Transmissin Security (January 2003) ehealth Ontari EHR Plicy Infrmatin Security Plicy 10

14 Appendix A: Infrmatin Security Exemptin Requests Stage Respnsibility Descriptin 1 [The EHR Slutin] s agent r Electrnic Service Prvider Cmpletes sectin 1 f the Infrmatin Security Exemptin Request Frm and sends the frm t Privacy and Security Operatins Team - OR A HIC, their agent r Electrnic Service Prvider ( Requestr ) 2 Privacy and Security Operatins Team Reviews the Infrmatin Security Exemptin Request Frm and cmpletes sectin tw. 1 3 Applicable Oversight Bdy Reviews the request and either: Apprves the request Apprves the request with cnditins, OR Denys the request 4 Privacy and Security Operatins Team Lgs the Applicable Oversight Bdy s decisin. Infrms the requestr f the Applicable Oversight Bdy s decisin and sends the HIC a cpy f the Infrmatin Security Exemptin Request Frm. Stres the Infrmatin Security Exemptin Request Frm. The fllwing is the prcess fr reviewing, and if necessary, reapprving infrmatin security exemptins that were riginally apprved fr a perid f greater than tw years. Stage Respnsibility Descriptin 1 Privacy and Security Operatins Team Reviews the apprved Infrmatin Security Exemptin Request Frm t assess if there is any change t the levels f risk riginally identified. 1 This sectin is dne in cnsultatin with the requestr, and is usually a cyclical prcess. Fr example, after Privacy and Security Operatins Team cnsults with the requestr, the requestr may agree t implement additinal cmpensating cntrls. The request frm wuld then be updated and the residual risk may be lwered. ehealth Ontari EHR Plicy Infrmatin Security Plicy 11

15 If there are n new risks and the riginal levels f risk have nt increased: The infrmatin security exemptin request lg is updated t indicate that the review was perfrmed but there were n additinal risks r increase t level f riginal risks. Advises the requestr that the exemptin request has been renewed. Lgs renewal. [Prcess ends here] If new risks have been identified r the riginal level f risks have increased: Privacy and Security Operatins Team updates the infrmatin security exemptin request frm and ntifies the requestr f the change in assessed risk. 2 Requestr Reviews the updated infrmatin security exemptin frm and updates the frm with any additinal cmpensating cntrls that have been put in place r that they will be put in place t address the additinal r increased level f risk. 3 Privacy and Security Operatins Team Reviews the updated infrmatin security exemptin frm and revises the residual risk rating if necessary. 4 Applicable Oversight Bdy Reviews the request and either: Sends the infrmatin security exemptin request frm t the Applicable Oversight Bdy. Renews the exemptin Renews the exemptin with cnditins, OR Revkes the exemptin. 5 Privacy and Security Operatins Team Lgs the Applicable Oversight Bdy s decisin. Infrms the requestr f the Applicable Oversight Cmmittee s decisin and sends the HIC a cpy f the Infrmatin Security Exemptin Request Frm. Stres the Infrmatin Security Exemptin Request Frm. ehealth Ontari EHR Plicy Infrmatin Security Plicy 12

16 Infrmatin Security Exemptin Request Frm Use this frm t request an infrmatin security exemptin. Frm Cmpletin Instructins 1. Cmplete all fields as specified. Mandatry fields fr the requestr are marked with an asterisk (*). If the frm is incmplete, it will be returned t yu. Indicate Nt Applicable r N/A if the field is nt applicable. 2. Once cmpleted, please the cmpleted frm t the Privacy and Security Operatins Team. 3. If yu have any questins regarding the cmpletin f this frm, please cntact yur [EHR Slutin] Site Crdinatr r the Privacy and Security Operatins Team. FORM TIPS: The frm will pen with the pinter in the start psitin. Begin typing yur infrmatin. Use the TAB key n yur keybard t mve t the next bx. Yu can use SHIFT + TAB t mve back. Click yur left muse buttn t fill in checkbxes. SECTION 1: Request (T be cmpleted by the requestr ) Requestr infrmatin First Name * Last Name * Title * (e.g., CEO, CIO) Business Telephne * (include ext.) ( ) Organizatin/Site/Hspital Name (e.g., ABC Hspital) Business * Name f plicy/standard/supprting dcument fr which an exemptin is being requested: * Requirement(s) * Reasn(s) fr nn-cmpliance: * Lists the infrmatin systems r specific infrmatin technlgies fr which this exemptin will be applied: * Type and sensitivity f affected data: * Prpsed plan fr managing/mitigating the risks assciated with nn-cmpliance r list f cmpensating cntrls that have been implemented: * Anticipated duratin (length f time) fr exemptin: * Additinal Infrmatin: Internal Endrsement (e.g., endrsement by HIC s CIO): Please list the endrser s full name and jb title (e.g., Jhn Smith, Chief Infrmatin Officer) and an frm the endrser when yu ehealth Ontari EHR Plicy Infrmatin Security Plicy 13

17 yur t exemptin request t the [the EHR Slutin] Prgram. SECTION 2: Assessment (t be cmpleted by Privacy and Security Operatins Team) [The EHR Slutin] Reviewer s Infrmatin First Name * Last Name * Title * (e.g., Security Analyst) Business Telephne * (include ext.) ( ) Business * Descriptin f Risk(s) t [the EHR Slutin] Prgram r the Cnnecting Slutin* Level f Residual Risk * (e.g., high, medium, r lw) Recmmendatin by Privacy and Security Operatins Team* [NOTE: Recmmendatin ptins are either: 1) apprve request as is, 2) apprve request with cnditins (must list cnditins), OR 3) deny request.] SECTION 3: Decisin (t be cmpleted by Privacy and Security Operatins Team) Applicable Oversight Bdy s Decisin* Date f Endrsement* [NOTE: Endrsement ptins are either: 1) recmmend apprving request as is, 2) recmmend apprving request with cnditins (must list cnditins), OR 3) recmmend denying request.] Evidence f decisin* (An frm a Applicable Oversight Bdy chair r a cpy f the meeting minutes is acceptable, please attach t the evidence in the space belw (e.g., by inserting a.msg r PDF file as an bject int this dcument. Nte: Yu must unlck the frm t attach file.) ehealth Ontari EHR Plicy Infrmatin Security Plicy 14

HP Server Virtualization Solution Planning & Design

HP Server Virtualization Solution Planning & Design Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP

More information

Patch Management Policy

Patch Management Policy Patch Management Plicy (Versin 1) Dcument Cntrl Infrmatin: Date: 21/5/18 Master Tracking Name Patch Management Plicy Master Tracking Reference Owning Service / Department Exeter IT Issue: 1 Apprvals: Authrs:

More information

IHIS Research Access Request Guidelines

IHIS Research Access Request Guidelines Eservices: https://sumc.service-nw.cm/ 1. FOR NEWLY HIRED EMPLOYEES: Use On-barding Services & On-Barding Guide Frm Please Nte the fields required fr Research IHIS access are the same as thse utlined in

More information

UNSW Technology Policy:

UNSW Technology Policy: UNSW Technlgy Plicy: UNSW Plicy Respnsible Officer Cntact Officer Apprving Authrity UNSW Data Netwrk Cnnectin Plicy Chief Infrmatin Officer Manager Infrastructure Services Supprt UNSW IT Services Ph: x

More information

Admin Report Kit for Exchange Server

Admin Report Kit for Exchange Server Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses

More information

CaseWare Working Papers. Data Store user guide

CaseWare Working Papers. Data Store user guide CaseWare Wrking Papers Data Stre user guide Index 1. What is a Data Stre?... 3 1.1. When using a Data Stre, the fllwing features are available:... 3 1.1.1.1. Integratin with Windws Active Directry... 3

More information

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance

More information

PRIVACY AND E-COMMERCE POLICY STATEMENT

PRIVACY AND E-COMMERCE POLICY STATEMENT PRIVACY AND E-COMMERCE POLICY STATEMENT Tel-Tru Manufacturing Cmpany ( Tel-Tru ) is dedicated t develping lng-lasting relatinships that are built n trust. Tel-Tru is cmmitted t respecting the wishes f

More information

Guidance for Applicants: Submitting an application in AAS Ishango Grants Management

Guidance for Applicants: Submitting an application in AAS Ishango Grants Management Guidance fr Applicants: Submitting an applicatin in AAS Ishang Grants Management Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1

More information

Town of Warner, New Hampshire Information Security Policy

Town of Warner, New Hampshire Information Security Policy Twn f Warner, New Hampshire Infrmatin Security Plicy Date Adpted: Bard f Selectmen David E. Hartman David Karrick, Jr. Clyde Carsn Table f Cntents Table f Cntents 1 Intrductin 2 Ethics and Acceptable Use

More information

Guidance for Submitting an application or Nomination in AAS Ishango Online System

Guidance for Submitting an application or Nomination in AAS Ishango Online System Guidance fr Submitting an applicatin r Nminatin in AAS Ishang Online System Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1 General

More information

OATS Registration and User Entitlement Guide

OATS Registration and User Entitlement Guide OATS Registratin and User Entitlement Guide The OATS Registratin and Entitlement Guide prvides the fllwing infrmatin: OATS Registratin The prcess and dcumentatin required fr a firm r Service Prvider t

More information

Software Usage Policy Template

Software Usage Policy Template Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/

More information

Overview of Data Furnisher Batch Processing

Overview of Data Furnisher Batch Processing Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...

More information

TPP: Date: October, 2012 Product: ShoreTel PathSolutions System version: ShoreTel 13.x

TPP: Date: October, 2012 Product: ShoreTel PathSolutions System version: ShoreTel 13.x I n n v a t i n N e t w r k A p p N t e TPP: 10320 Date: Octber, 2012 Prduct: ShreTel PathSlutins System versin: ShreTel 13.x Abstract PathSlutins sftware can find the rt-cause f vice quality prblems in

More information

ONTARIO LABOUR RELATIONS BOARD. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Ontario Labour Relations Board

ONTARIO LABOUR RELATIONS BOARD. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Ontario Labour Relations Board ONTARIO LABOUR RELATIONS BOARD Filing Guide A Guide t Preparing and Filing Frms and Submissins with the Ontari Labur Relatins Bard This Filing Guide prvides general infrmatin nly and shuld nt be taken

More information

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering IT2042 - Infrmatin Security 1-1 E. G. S. Pillay Engineering Cllege, Nagapattinam Cmputer Science and Engineering Elective II IT 2042 INFORMATION SECURITY VIII Sem CSE QUESTION BANK - UNIT-IV 1) What is

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This

More information

CSC IT practix Recommendations

CSC IT practix Recommendations CSC IT practix Recmmendatins CSC Healthcare 17 th June 2015 Versin 3.1 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins

More information

App Center User Experience Guidelines for Apps for Me

App Center User Experience Guidelines for Apps for Me App Center User Experience Guidelines fr Apps fr Me TABLE OF CONTENTS A WORD ON ACCESSIBILITY...3 DESIGN GUIDELINES...3 Accunt Linking Prcess... 3 Cnnect... 5 Accept Terms... 6 Landing Page... 6 Verificatin...

More information

Point-to-Point Encryption (P2PE)

Point-to-Point Encryption (P2PE) Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard

More information

All members of the UNNC Community and users of the University network.

All members of the UNNC Community and users of the University network. Bulk Email Plicy Audience: All members f the UNNC Cmmunity and users f the University netwrk. Definitin: Bulk email, by definitin, is unslicited email sent quickly in large quantities, and is recgnized

More information

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services Privacy Plicy Last Mdified: September 26, 2016 Pictry is a fast and fun way t share memes with yur friends and the wrld arund yu. Yu can send a Pictry game t friends and view the pictures they submit in

More information

Privacy Policy concerning the use of the website and the use of cookies

Privacy Policy concerning the use of the website and the use of cookies Privacy Plicy cncerning the use f the website and the use f ckies Agria understands the imprtance f the privacy f its custmers and the prtectin f their persnal data. Present plicy utlines the handling

More information

INSTALLING CCRQINVOICE

INSTALLING CCRQINVOICE INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a

More information

E-Lock Policy Manager White Paper

E-Lock Policy Manager White Paper White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...

More information

Net1 Mobile Solutions (Pty) Ltd COMPLAINT HANDLING PROCEDURE

Net1 Mobile Solutions (Pty) Ltd COMPLAINT HANDLING PROCEDURE Net1 Mbile Slutins (Pty) Ltd Name: Cmplaint Handling Prcedure Net1 Mbile Slutins (Pty) Ltd COMPLAINT HANDLING PROCEDURE I. General Purpse It is the prcedure f Net1 Mbile Slutins (Pty) Ltd (the Cmpany )

More information

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist This checklist is used t prvide guidance and clarificatin n aspects f the auxillary Startup Service (G2949CA) including Security Pack Installatin and Familiarizatin f yur Agilent 2100 Bianalyzer System

More information

Group Policy Manager Quick start Guide

Group Policy Manager Quick start Guide Grup Plicy Manager Quick start Guide Sftware versin 4.0.0.0 General Infrmatin: inf@cinsystems.cm Online Supprt: supprt@cinsystems.cm Cpyright CinSystems Inc., All Rights Reserved Page 1 CinSystems Inc.

More information

Sircon User Guide A Guide to Using the Vertafore Sircon Self-Service Portal

Sircon User Guide A Guide to Using the Vertafore Sircon Self-Service Portal Sircn User Guide A Guide t Using the Vertafre Sircn Self-Service Prtal September 2016 Versin 16.8 Cntents Cntents Using the Vertafre Sircn Self-Service Prtal... 3 Lg In... 3 Hme Page... 4 Lg New Cases...

More information

Password Management Guidelines

Password Management Guidelines Unified Cntract System Passwrd Management Guidelines Versin 2.5 Revisin date: 26-06-2006 Authr:J.Thiyagarajan Cpyright 2006 by Hexaware Technlgies Limited All rights reserved. All text and figures included

More information

GUIDELINES TUE ENQUIRIES

GUIDELINES TUE ENQUIRIES Wrld Anti-Dping Prgram GUIDELINES TUE ENQUIRIES BY ACCREDITED LABORATORIES Versin 2.0 June 2018 Objective The fllwing guideline is the result f cntinuing effrts t harmnize Labratry reprting prcedures based

More information

Outreach Portal User Guide

Outreach Portal User Guide Outreach Prtal User Guide Natinal Resurce Center West Virginia University and Natinal Labr Cllege 3604 Cllins Ferry Rad, P.O. Bx 6615, Mrgantwn, WV 26506-6615 (304) 293-3096 r (800) 626-4748 http://extensin.wvu.edu/cmmunity-business-safety/safety-health/sha-educatin-center

More information

DocAve Governance Automation 2

DocAve Governance Automation 2 DcAve Gvernance Autmatin 2 Business User Guide Service Pack 2 Issued March 2018 The Enterprise-Class Management Platfrm fr SharePint Gvernance Table f Cntents What s New in this Guide... 3 Submitting Dcumentatin

More information

AvePoint Pipeline Pro 2.0 for Microsoft Dynamics CRM

AvePoint Pipeline Pro 2.0 for Microsoft Dynamics CRM AvePint Pipeline Pr 2.0 fr Micrsft Dynamics CRM Installatin and Cnfiguratin Guide Revisin E Issued April 2014 1 Table f Cntents Abut AvePint Pipeline Pr... 3 Required Permissins... 4 Overview f Installatin

More information

OmniPCX Record PCI Compliance 2.3

OmniPCX Record PCI Compliance 2.3 S T R A T E G I C W H I T E P A P E R OmniPCX Recrd PCI Cmpliance 2.3 Alcatel-Lucent Enterprise Services Page 1/11 OmniPCX-Recrd R2.3 PCI Cmpliance White Paper Legal ntice Alcatel, Lucent, Alcatel-Lucent

More information

Enrolling onto the Open Banking Directory How To Guide

Enrolling onto the Open Banking Directory How To Guide Enrlling nt the Open Banking Directry Hw T Guide Date: Octber 2017 Versin: v3.0 Classificatin: PUBLIC OPEN BANKING LIMITED ENROLLING ONTO THE OPEN BANKING DIRECTORY Page 1 f 14 Cntents 1. Intrductin 3

More information

Doctoral Dissertation and Capstone Project Submission Guide

Doctoral Dissertation and Capstone Project Submission Guide Dctral Dissertatin and Capstne Prject Submissin Guide Part I: Dctral Dissertatin/Capstne Prject Submissin Prcess 1. Dctral Dissertatin/Capstne Prject apprved by cmmittee and department 4. Student receives

More information

TPCH Data Sharing Policies and Procedures

TPCH Data Sharing Policies and Procedures TPCH Data Sharing Plicies and Prcedures Intrductin: The TPCH Data Sharing Plicies and Prcedures were created based n the CC apprved Pima Cunty: HMIS Data Sharing Plan apprved by TPCH bard n February 24,

More information

Users, groups, collections and submissions in DSpace. Contents

Users, groups, collections and submissions in DSpace. Contents Users, grups, cllectins and submissins in DSpace Cntents Key cncepts... 2 User accunts and authenticatin... 2 Authrisatin and privileges... 2 Resurce plicies... 2 User rles and grups... 3 Submissin wrkflws...

More information

Adverse Action Letters

Adverse Action Letters Adverse Actin Letters Setup and Usage Instructins The FRS Adverse Actin Letter mdule was designed t prvide yu with a very elabrate and sphisticated slutin t help autmate and handle all f yur Adverse Actin

More information

LiveEngage and Microsoft Dynamics Integration Guide Document Version: 1.0 September 2017

LiveEngage and Microsoft Dynamics Integration Guide Document Version: 1.0 September 2017 LiveEngage and Micrsft Dynamics Integratin Guide Dcument Versin: 1.0 September 2017 Cntents Intrductin... 3 Step 1: Sign Up... 3 CRM Widget Signing Up... 3 Step 2: Cnfiguring the CRM Widget... 4 Accessing

More information

PAY EQUITY HEARINGS TRIBUNAL. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Pay Equity Hearings Tribunal

PAY EQUITY HEARINGS TRIBUNAL. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Pay Equity Hearings Tribunal PAY EQUITY HEARINGS TRIBUNAL Filing Guide A Guide t Preparing and Filing Frms and Submissins with the Pay Equity Hearings Tribunal This Filing Guide prvides general infrmatin nly and shuld nt be taken

More information

Security of Information Technology Resources

Security of Information Technology Resources CORNELL UNIVERSITY POLICY LIBRARY Security f Infrmatin Technlgy Resurces Technlgies Chapter: 4, Security and Vice President fr Infrmatin Technlgies Originally Issued: June 1, 2004 Last Full Review: December

More information

Refreshing Axiom TEST with a Current Copy of Production Axiom EPM June 20, 2014

Refreshing Axiom TEST with a Current Copy of Production Axiom EPM June 20, 2014 Refreshing Axim TEST with a Current Cpy f Prductin Axim EPM June 20, 2014 Refreshing Axim TEST If yu maintain an Axim TEST envirnment yu will want t refresh it with a current cpy f yur PROD database when

More information

Reporting Requirements Specification

Reporting Requirements Specification Cmmunity Mental Health Cmmn Assessment Prject OCAN 2.0 - ing Requirements Specificatin May 4, 2010 Versin 2.0.2 SECURITY NOTICE This material and the infrmatin cntained herein are prprietary t Cmmunity

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

Performance of usage of MindSphere depends on the bandwidth of your internet connection.

Performance of usage of MindSphere depends on the bandwidth of your internet connection. MindSphere MindAccess User Data Sheet MindAccess User prvides yu with an Accunt in rder t access the MindSphere Platfrm. This allws yu t cnfigure Assets and Users, access Applicatins and stre data. Such

More information

Internet/Intranet Publishing Guidelines

Internet/Intranet Publishing Guidelines Muntain View-Ls Alts Unin High Schl District In trductin Internet/Intranet Publishing Guidelines Using the Internet t further the educatinal prcess, gals and bjectives is a natural extensin f Muntain View-Ls

More information

Introduction to Mindjet on-premise

Introduction to Mindjet on-premise Intrductin t Mindjet n-premise Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 www.mindjet.cm 2012 Mindjet. All Rights Reserved

More information

WELMEC Guide on evaluation of Purely Digital Parts

WELMEC Guide on evaluation of Purely Digital Parts WELMEC 10.10 2016 Guide n evaluatin f Purely Digital Parts WELMEC is a cperatin between the legal metrlgy authrities f the Member States f the Eurpean Unin and EFTA. This dcument is ne f a number f Guides

More information

Doctoral Dissertation and Capstone Project Submission Guide

Doctoral Dissertation and Capstone Project Submission Guide Dctral Dissertatin and Capstne Prject Submissin Guide Part I: Dctral Dissertatin/Capstne Prject Submissin Prcess 1. Dctral Dissertatin/Capstne Prject apprved by cmmittee and department 2. Student submits

More information

Master s Thesis Submission Guide

Master s Thesis Submission Guide The Graduate Schl Master s Thesis Submissin Guide Part I: Master s Thesis Submissin Prcess 1. Thesis apprved by cmmittee and department 4. Student receives email with any necessary revisins. If n revisins

More information

Access the site directly by navigating to in your web browser.

Access the site directly by navigating to   in your web browser. GENERAL QUESTIONS Hw d I access the nline reprting system? Yu can access the nline system in ne f tw ways. G t the IHCDA website at https://www.in.gv/myihcda/rhtc.htm and scrll dwn the page t Cmpliance

More information

Forcepoint UEBA Management of Personal Data

Forcepoint UEBA Management of Personal Data Frcepint UEBA Management f Persnal Data 2018 Frcepint LLC. All Rights Reserved Dcument Classificatin: Public FPWSCMPD-2018MAY24 Frcepint UEBA Management f Persnal Data CONTENTS Disclaimer... 2 General...

More information

ITIL 2011 Service Offerings and Agreements (SOA)

ITIL 2011 Service Offerings and Agreements (SOA) IT SERVICE MANAGEMENT ITIL 2011 Service Offerings and Agreements (SOA) CERTIFICATE: DURATION: COURSE DELIVERY: LANGUAGE: ITIL 2011 Service Offerings and Agreements (SOA) 5 Days Classrm, Live Virtual Classrm

More information

NCTA-Certified Cloud Technologist (NCT) Exam NCT-110

NCTA-Certified Cloud Technologist (NCT) Exam NCT-110 NCTA-Certified Clud Technlgist (NCT) Exam NCT-110 Exam Infrmatin Candidate Eligibility: The NCTA-Certified Clud Technlgist (NCT) exam requires n applicatin fee, supprting dcumentatin, nr ther eligibility

More information

Anonymous User Manual

Anonymous User Manual Annymus User Manual esuppliercnnect Versin 9.4 January 15 th, 2017 Page 1/32 January 15 th, 2017 v9.4 Table f cntents: 1 Intrductin 3 2 Abut esuppliercnnect 5 2.1 Prtal Access 6 2.1 Prtal Structure 7 2.2

More information

Privacy Policy. What this policy covers. What information we collect about you

Privacy Policy. What this policy covers. What information we collect about you Effective starting: May 25, 2018 What this plicy cvers Privacy Plicy Yur privacy is imprtant t us, and s is being transparent abut hw we cllect, use, and share infrmatin abut yu. This plicy is intended

More information

EMV. Terminal Type Approval Contactless Product. Administrative Process. Version 2.6 February 2017

EMV. Terminal Type Approval Contactless Product. Administrative Process. Version 2.6 February 2017 EMV Terminal Type Apprval Cntactless Prduct Administrative Prcess Versin 2.6 February 2017 Legal Ntice Page i / v Legal Ntice This dcument summarizes EMVC s present plans fr evaluatin services and related

More information

Data Processing Information for Users of the Career and Alumni Portal of HTW Berlin (Data Privacy Policy)

Data Processing Information for Users of the Career and Alumni Portal of HTW Berlin (Data Privacy Policy) Data Prcessing Infrmatin fr Users f the Career and Alumni Prtal f HTW Berlin (Data Privacy Plicy) The prtectin f yur data is imprtant t us. In view f this and in rder t cmply with all f ur statutry disclsure

More information

MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION

MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION These release ntes pertain t the Prductin release fr MySabre Release 7.0 cntaining MySabre API

More information

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel NiceLabel LMS Installatin Guide fr Single Server Deplyment Rev-1702 NiceLabel 2017. www.nicelabel.cm 1 Cntents 1 Cntents 2 2 Architecture 3 2.1 Server Cmpnents and Rles 3 2.2 Client Cmpnents 3 3 Prerequisites

More information

Validation Plan. Version 4.0 September 8, Copyright 2014 Healtheway, Inc. All rights reserved.

Validation Plan. Version 4.0 September 8, Copyright 2014 Healtheway, Inc. All rights reserved. Validatin Plan Versin 4.0 September 8, 2014 Cpyright 2014 Healtheway, Inc. All rights reserved. Status: FINAL Apprved by CC Effective Date: 9/8/14 Versin: 4.0 Final 1 Purpse and Scpe... 2 1.1 Defined Terms...2

More information

Imagine for MSDNAA Student SetUp Instructions

Imagine for MSDNAA Student SetUp Instructions Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS

More information

WorldShip PRE-INSTALLATION INSTRUCTIONS: INSTALLATION INSTRUCTIONS: Window (if available) Install on a Single or Workgroup Workstation

WorldShip PRE-INSTALLATION INSTRUCTIONS: INSTALLATION INSTRUCTIONS: Window (if available) Install on a Single or Workgroup Workstation PRE-INSTALLATION INSTRUCTIONS: This dcument discusses using the WrldShip DVD t install WrldShip. Yu can als install WrldShip frm the Web. G t the fllwing Web page and click the apprpriate dwnlad link:

More information

MySabre API RELEASE NOTES MYSABRE API VERSION 2.1 (PART OF MYSABRE RELEASE 7.1) DECEMBER 02, 2006 PRODUCTION

MySabre API RELEASE NOTES MYSABRE API VERSION 2.1 (PART OF MYSABRE RELEASE 7.1) DECEMBER 02, 2006 PRODUCTION MySabre API RELEASE NOTES MYSABRE API VERSION 2.1 (PART OF MYSABRE RELEASE 7.1) DECEMBER 02, 2006 PRODUCTION These release ntes pertain t the Prductin release fr MySabre Release 7.1 cntaining MySabre API

More information

USO RESTRITO. SNMP Agent. Functional Description and Specifications Version: 1.1 March 20, 2015

USO RESTRITO. SNMP Agent. Functional Description and Specifications Version: 1.1 March 20, 2015 Functinal Descriptin and Specificatins Versin: 1.1 March 20, 2015 SNMP Agent Simple Netwrk Management Prtcl Optin S fr IE and PM Mdules Supplement t Functinal Descriptin and Specificatins f RUB Ethernet

More information

UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL

UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Electrnic Data Prtectin and Encryptin REFERENCE: Refrmat CATEGORY: Infrmatin Technlgy PAGE: 1 SUPERSEDES: POL-UMIT- A175-014-01 APPROVER: David Ertel

More information

Contingency Planning Template

Contingency Planning Template Cntingency Planning Template Prject Name: U.S. Department f Husing and Urban Develpment Octber, 2010 Cntigency Planning Template (V1.0) Ntes t the Authr [This dcument is a template f a Security Apprach

More information

Avigilon Control Center Virtual Matrix User Guide. Version 6.8

Avigilon Control Center Virtual Matrix User Guide. Version 6.8 Avigiln Cntrl Center Virtual Matrix User Guide Versin 6.8 2006-2018, Avigiln Crpratin. All rights reserved. AVIGILON, the AVIGILON lg, AVIGILON CONTROL CENTER, ACC, and TRUSTED SECURITY SOLUTIONS. are

More information

IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7

IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 Prepared by: March Haber, march@il.ibm.cm Last Updated: January, 2012 IBM MetaData Wrkbench Enablement Series Table f Cntents: Table f

More information

EU General Data Protection Regulation

EU General Data Protection Regulation EU General Data Prtectin Regulatin Sally Ubnske, Senir Business Systems Analyst, subnske@ariessys.cm Sean MacRae, Business Systems Analyst, smacrae@ariessys.cm GDPR Summary The Eurpean Parliament, the

More information

AvePoint Timeline Enterprise for Microsoft Dynamics CRM

AvePoint Timeline Enterprise for Microsoft Dynamics CRM AvePint Timeline Enterprise 1.0.2 fr Micrsft Dynamics CRM Installatin and Cnfiguratin Guide Revisin B Issued Nvember 2013 Timeline Enterprise fr Micrsft Dynamics CRM Install and Cnfig 1 Table f Cntents

More information

Additional License Authorizations

Additional License Authorizations Additinal License Authrizatins Fr HPE CMS SIM Management sftware prducts Prducts and suites cvered PRODUCTS E-LTU OR E-MEDIA AVAILABLE * NON-PRODUCTION USE OPTION HPE Dynamic SIM Prvisining Yes Yes HPE

More information

Service Description: Advanced Services Fixed Price

Service Description: Advanced Services Fixed Price Page 1 f 6 Service Descriptin: Advanced Services Fixed Price Cisc WLAN Advise and Implement Services Fixed (ASF-CORE-WLAN) This dcument describes Advanced Services Fixed Price: Cisc WLAN Advise and Implement

More information

SOLA and Lifecycle Manager Integration Guide

SOLA and Lifecycle Manager Integration Guide SOLA and Lifecycle Manager Integratin Guide SOLA and Lifecycle Manager Integratin Guide Versin: 7.0 July, 2015 Cpyright Cpyright 2015 Akana, Inc. All rights reserved. Trademarks All prduct and cmpany names

More information

How to Guide. DocAve Extender for MOSS 2007 and SPS Installing DocAve Extender and Configuring a Basic SharePoint to Cloud Extension

How to Guide. DocAve Extender for MOSS 2007 and SPS Installing DocAve Extender and Configuring a Basic SharePoint to Cloud Extension Hw t Guide DcAve Extender fr MOSS 2007 and SPS 2010 Installing DcAve Extender and Cnfiguring a Basic SharePint t Clud Extensin This dcument is intended fr anyne wishing t familiarize themselves with the

More information

SMART Room System for Microsoft Lync. Software configuration guide

SMART Room System for Microsoft Lync. Software configuration guide SMART Rm System fr Micrsft Lync Sftware cnfiguratin guide Fr mdels SRS-LYNC-S, SRS-LYNC-M and SRS-LYNC-L In this guide: Fr yur recrds 1 Preparing fr yur rm system 2 Befre cnfiguring yur rm system s sftware

More information

CA CMDB Connector for z/os

CA CMDB Connector for z/os PRODUCT SHEET: CA CMDB CONNECTOR FOR Z/OS CA CMDB Cnnectr fr z/os CA CMDB Cnnectr fr z/os discvers mainframe cnfiguratin items (CIs) and enables ppulatin f that infrmatin int the CA CMDB repsitry. Designed

More information

First Aid and Choking, Fire Safety, Medication Administration, and Standard Precautions Roster Submission:

First Aid and Choking, Fire Safety, Medication Administration, and Standard Precautions Roster Submission: The Wiscnsin CBRF Training Registry is lcated at www.uwgb.edu/cbrf-registry. This guide prvides directins fr submitting rsters and applicatins. Rster Submissin First Aid and Chking, Fire Safety, Medicatin

More information

Stock Affiliate API workflow

Stock Affiliate API workflow Adbe Stck Stck Affiliate API wrkflw The purpse f this dcument is t illustrate the verall prcess and technical wrkflw fr Adbe Stck partners wh want t integrate the Adbe Stck Search API int their applicatins.

More information

ERS IT Portfolio Report

ERS IT Portfolio Report Administratin and Operatins Cmmittee ERS IT Prtfli Reprt July 15 th, 2014 1 Agenda Infrmatin Technlgy Prjects Summary Applicatin Stats What s Next IT Prtfli 2 Infrmatin Technlgy Prjects Summary Remte Office

More information

Case Metrics Guide. January 11, 2019 Version For the most recent version of this document, visit our documentation website.

Case Metrics Guide. January 11, 2019 Version For the most recent version of this document, visit our documentation website. Case Metrics Guide January 11, 2019 Versin 9.6.202.10 Fr the mst recent versin f this dcument, visit ur dcumentatin website. Table f Cntents 1 Case Metrics 3 1.1 Case Metrics Cmpatibility Matrix 3 1.2

More information

SERVICE LEVEL AGREEMENT. Mission: Certificates Management

SERVICE LEVEL AGREEMENT. Mission: Certificates Management SERVICE LEVEL AGREEMENT BSM: This SLA is cvered by BSM s fr Infrastructure, Supprt and Prjects This SLA is a cmplement t the Master Service Agreement V5.0 as described in art 2.2 (MSA) Missin: Certificates

More information

AvePoint Perimeter Pro 1.9

AvePoint Perimeter Pro 1.9 G09 AvePint Perimeter Pr 1.9 Secured Share User Guide Issued December 2017 Table f Cntents What s New in this Guide... 4 Overview... 5 Internal Users... 6 Site Cllectin Administratrs... 7 External Prtal

More information

Data Center Advantage Incentive Program Distribution

Data Center Advantage Incentive Program Distribution Data Center Advantage Incentive Prgram Distributin Prgram rules Data Center Advantage April 28, The Cisc Data Center Advantage Incentive Prgram (DCAIP) rewards distributrs wh resell Cisc MDS Fabric Strage

More information

November MCES INDUSTRIAL ONLINE REPORTING SYSTEM System Documentation Guide

November MCES INDUSTRIAL ONLINE REPORTING SYSTEM System Documentation Guide Nvember 2015 MCES INDUSTRIAL ONLINE REPORTING SYSTEM System Dcumentatin Guide The Cuncil s missin is t fster efficient and ecnmic grwth fr a prsperus metrplitan regin The Metrplitan Cuncil is the reginal

More information

User Manual. Revised June 18, 2007

User Manual. Revised June 18, 2007 User Manual Revised June 18, 2007 TABLE OF CONTENTS 1. AN INTRODUCTION TO NVTREC... 3 2. NVTREC HOME PAGE... 3 3. ACCOUNT REGISTRATION... 5 4. ACCOUNT HOME PAGE... 5 5. FACILITY REGISTRATION... 6 6. EDITING

More information

RICOH IMAGING COMPANY, LTD. wishes to announce the release of Firmware Update Software Version

RICOH IMAGING COMPANY, LTD. wishes to announce the release of Firmware Update Software Version Dwnlads : Firmware Update Thank yu fr using GR II digital camera. RICOH IMAGING COMPANY, LTD. wishes t annunce the release f Firmware Update Sftware Versin 3.00 fr GR II. Firmware in this dcument is the

More information

Custod. July 30, 20100

Custod. July 30, 20100 AgriLife Infrmatin Technlgy Custd dian Prcedures and Best Practices July 30, 20100 TABLE OF CONTENTS Intrductin.. 3 Custdian Requirements...... 4 Appendix A - Definitins........ 13 Appendix B - IT Security

More information

MHS BYOD Policy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY

MHS BYOD Policy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY MHS BYOD Plicy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY Intrductin This dcument prvides advice and directin t students wh chse t use BYOD t access the Department f Educatin (DOE)

More information

Configuring Database & SQL Query Monitoring With Sentry-go Quick & Plus! monitors

Configuring Database & SQL Query Monitoring With Sentry-go Quick & Plus! monitors Cnfiguring Database & SQL Query Mnitring With Sentry-g Quick & Plus! mnitrs 3Ds (UK) Limited, Nvember, 2013 http://www.sentry-g.cm Be Practive, Nt Reactive! One f the best ways f ensuring a database is

More information

Graduate Application Review Process Documentation

Graduate Application Review Process Documentation Graduate Applicatin Review Prcess Cntents System Cnfiguratin... 1 Cgns... 1 Banner Dcument Management (ApplicatinXtender)... 2 Banner Wrkflw... 4 Navigatin... 5 Cgns... 5 IBM Cgns Sftware Welcme Page...

More information

SEMA Memorial Scholarship Fund Scholarship & Loan Forgiveness Programs

SEMA Memorial Scholarship Fund Scholarship & Loan Forgiveness Programs SEMA Memrial Schlarship Fund Schlarship & Lan Frgiveness Prgrams Schlarship Prgram Frequently Asked Questins Wh is eligible t apply? Hw d I get an applicatin? What are the details f the award? If I am

More information

CAMPBELL COUNTY GILLETTE, WYOMING

CAMPBELL COUNTY GILLETTE, WYOMING CAMPBELL COUNTY GILLETTE, WYOMING System Supprt Analyst I System Supprt Analyst II Senir System Supprt Analyst Class specificatins are intended t present a descriptive list f the range f duties perfrmed

More information

Element Creator for Enterprise Architect

Element Creator for Enterprise Architect Element Creatr User Guide Element Creatr fr Enterprise Architect Element Creatr fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins... 3 Installatin... 4 Verifying the

More information

Managing Your Access To The Open Banking Directory How To Guide

Managing Your Access To The Open Banking Directory How To Guide Managing Yur Access T The Open Banking Directry Hw T Guide Date: June 2018 Versin: v2.0 Classificatin: PUBLIC OPEN BANKING LIMITED 2018 Page 1 f 32 Cntents 1. Intrductin 3 2. Signing Up 4 3. Lgging In

More information

DocAve Governance Automation

DocAve Governance Automation DcAve Gvernance Autmatin Business User Guide Service Pack 9 Issued Nvember 2016 Table f Cntents Submitting Dcumentatin Feedback t AvePint... 4 What s New in this Guide... 5 Abut DcAve Gvernance Autmatin...

More information

Wave IP 4.5. CRMLink Desktop User Guide

Wave IP 4.5. CRMLink Desktop User Guide Wave IP 4.5 CRMLink Desktp User Guide 2015 by Vertical Cmmunicatins, Inc. All rights reserved. Vertical Cmmunicatins and the Vertical Cmmunicatins lg and cmbinatins theref and Vertical ViewPint, Wave Cntact

More information