Information Security Policy
|
|
- Edwina Fleming
- 6 years ago
- Views:
Transcription
1 Infrmatin Security Plicy Versin: 2.4 Dcument ID: 3541
2 Cpyright Ntice Cpyright 2015, ehealth Ontari All rights reserved N part f this dcument may be reprduced in any frm, including phtcpying r transmissin electrnically t any cmputer, withut prir written cnsent f ehealth Ontari. The infrmatin cntained in this dcument is prprietary t ehealth Ontari and may nt be used r disclsed except as expressly authrized in writing by ehealth Ontari. Trademarks Other prduct names mentined in this dcument may be trademarks r registered trademarks f their respective cmpanies and are hereby acknwledged. ehealth Ontari EHR Plicy Infrmatin Security Plicy i
3 Dcument Cntrl Next Review Date : Annually r therwise established by the Cnnecting Security Cmmittee. Apprval Histry APPROVER(S) APPROVED DATE Cnnecting Security Cmmittee Revisin Histry VERSION NO. DATE SUMMARY OF CHANGE CHANGED BY Nv 2013 versin adpted frm the cgta PSWG and revisin. Mark Carter Updated based n feedback f CSC Members. Added a reference t the Privacy and Assurance Plicy including bullet pints t supprt cntent. Mark Carter Plicy apprved at the CSC meeting September 9 th. Mark Carter Aligned name f access cntrl plicy based n final wave 3 CSC decisin. Mark Carter Updated plicies t nte the change in gvernance. The Steering Cmmittee was replaced by the Applicable Oversight Bdy. The reginal privacy and security cmmittee has been remved frm the exemptin decisin prcess. Gvernance respnsibilities f the Cnnecting Security Cmmittee have been added t the rles and respnsibilities sectin. Mark Carter ehealth Ontari EHR Plicy Infrmatin Security Plicy ii
4 Infrmatin Security Plicy Purpse T prtect the cnfidentiality, integrity, and availability f [the EHR Slutin] and persnal health infrmatin (PHI) stred in r prcessed by [the EHR Slutin]. In ding s, this plicy will utline the framewrk fr [the EHR Slutin] infrmatin security gvernance by: Defining the infrmatin security principles t manage: PHI and [The EHR Slutin] and infrmatin systems r infrmatin technlgies that cnnect t [the EHR Slutin]; and Scpe Establishing the rles and respnsibilities fr ensuring the principles in this plicy are implemented and maintained. This plicy applies t [the EHR Slutin] Prgram, their agents and their Electrnic Service Prviders and t [the EHR Slutin]. Fr health infrmatin custdians (HICs) that use [the EHR Slutin] t view, handle r therwise deal with PHI by prvisining access thrugh: Lcal identity prvider technlgy (lcal IdP), this plicy applies t: The HIC s lcal access cntrl and identity management infrastructure ( identity prvider services ) that manages the authenticatin and authrizatin used t prvisin access t [the EHR Slutin] (e.g., [the EHR Slutin] Security Tken Service Slutin, Micrsft Active Directry Federatin Services 2.0, etc.) Direct netwrk cnnectivity t [the EHR Slutin] Prvider Prtal and administrative functinality, including cmpnents in the cnnectin path (firewalls, prxies, etc.), and The integratin f [the EHR Slutin] Prvider Prtal with the HIC s lcal health infrmatin system (HIS) r electrnic medical recrd (EMR) applicatin(s). ehealth Ontari s ONE ID service, this plicy applies t: Direct netwrk cnnectivity t [the EHR Slutin] administrative functinality, including cmpnents in the cnnectin path (firewalls, prxies, etc.). In additin t the scpe set ut fr viewing sites, fr HICs that create r cntribute PHI t [the EHR Slutin] Clinical Data Repsitry ( cntributing sites ), this plicy als applies t: The data cntributin endpints that prvide PHI t [the EHR Slutin] s Clinical Data Repsitry; and ehealth Ontari EHR Plicy Infrmatin Security Plicy 1
5 The infrmatin technlgy and prcesses that ensure the quality f the data submitted (e.g., terminlgy mapping). This plicy des nt apply t any HIC, their agents r their Electrnic Service Prviders wh d nt view, create r cntribute t [the EHR Slutin]. Definitins [The EHR Slutin]: [The EHR Slutin] and supprting systems designed t stre and make available specified electrnic PHI frm the electrnic health infrmatin systems f HICs that may nt be available in planned prvincial r reginal repsitries s as t act as a single repsitry f such infrmatin t reduce the lad n surce systems. This des nt include any participating HIC s infrmatin systems r infrmatin technlgies. Privacy and Security Operatins Team: The Privacy and Security Operatins Team is made up f [The EHR Slutin] agents wh supprt [the EHR Slutin] privacy and security-related activities, initiatives and prcesses. Privacy and Security Cmmittee (PSC): The Privacy and Security Cmmittee (PSC) is a cmmittee cmprised f agents frm participating HICs t supprt the privacy and infrmatin security gvernance structure. Applicable Oversight Bdy: The Applicable Oversight Bdy is cmprised f senir-level executives wh versee all aspects f [the EHR Slutin]. See Plicy Gvernance Structure sectin belw. Cnnecting Security Cmmittee (CSC): The prvincial security frum cnsisting f senir security representatives frm acrss the regins and ehealth Ontari. This is a decisin making bdy respnsible fr establishing a functinal and usable infrmatin security gvernance framewrk fr participating rganizatins in the EHR. Electrnic Service Prvider: A persn that prvides gds r services fr the purpse f enabling a HIC t use electrnic means t cllect, use, mdify, disclse, retain r dispse f PHI, and includes a health infrmatin netwrk prvider. Infrmatin security: Refers t the prtectin f all types f infrmatin, infrmatin systems and infrmatin technlgies frm unauthrized access, cllectin, use, disclsure, transfer, disruptin, mdificatin, destructin r dispsal. Infrmatin system: A discrete set f infrmatin technlgy rganized fr the cllectin, prcessing, maintenance, use, disclsure, destructin, r dispsal f infrmatin. Data Cntributin End Pint(s): Technlgy and related prcesses that prvide data t the Clinical Data Repsitry r are queried t prvide data t a Clinical Viewer. Typically these systems are the Infrmatin System (e.g. Hspital Infrmatin System, Labratry Infrmatin System, Clinical Infrmatin System, etc.) that directly cnnects t [the EHR Slutin] t prvide clinical data. Identity Prvider Services: Technlgy and related supprting services, plicies, prcesses, and prcedures that are used t create, maintain, secure, validate, assert and manage electrnic identities t [the EHR Slutin]. Infrmatin technlgy: Any asset (physical r lgical) that is used in the autmatic acquisitin, strage, manipulatin, management, mvement, cntrl, display, switching, interchange, transmissin, r receptin f data r infrmatin. It includes, but is nt limited t, hardware, sftware, firmware, ancillary equipment, and related resurces. ehealth Ontari EHR Plicy Infrmatin Security Plicy 2
6 Shall/Must: Used fr abslute requirements, i.e., they are nt ptinal. Shuld: Used when valid reasns exist in certain circumstances nt t implement the requirement; hwever, the implementer must understand the implicatins befre chsing a different curse and must cnsider implementing cmpensating cntrls. May: The requirement is nly a recmmendatin, r prvided as an implementatin example and is nt intended n being exhaustive. ehealth Ontari EHR Plicy Infrmatin Security Plicy 3
7 Plicy 1. Principles Acceptable Use f Infrmatin and Infrmatin Technlgy 1.1. [The EHR Slutin] Prgram and HICs must define behaviural requirements gverning the acceptable use f infrmatin and infrmatin technlgy t which [the EHR Slutin] s agents and Electrnic Service Prviders, and HICs, their agents and Electrnic Services Prviders with access t [the EHR Slutin] must adhere. Infrmatin Security Training Refer t the Acceptable Use f Infrmatin and Infrmatin Technlgy Plicy [The EHR Slutin] Prgram and HICs must fster an infrmatin security-psitive culture. This may be achieved by implementing an infrmatin security awareness and educatin prgram t help all persns with access t [the EHR Slutin] t understand their infrmatin security-related bligatins. Threat Risk Management Cryptgraphy Refer t the Privacy and Security Training Plicy [The EHR Slutin] Prgram must perfrm infrmatin security threat risk assessments (TRAs) n [the EHR Slutin] and must track, and mitigate r frmally accept all f their risks that are identified thrugh a TRA HICs shuld perfrm infrmatin security TRAs n their identity prvider services and data cntributin endpints. Refer t the Threat Risk Management Plicy [The EHR Slutin] Prgram must implement cryptgraphic slutins in [the EHR Slutin] t prtect the cnfidentiality and integrity f PHI where apprpriate, as well as t cnfirm the identity f the riginatr f a cmmunicatin HICs must implement cryptgraphic slutins n their relevant infrmatin systems t prtect the cnfidentiality and integrity f PHI that is accessed thrugh [the EHR Slutin]. Refer t the Cryptgraphy Plicy. Infrmatin and Asset Management 1.7. [The EHR Slutin] Prgram must classify and define prtectin requirements fr PHI in [the EHR Slutin] in a manner that prtects its cnfidentiality, integrity, and availability in any frm (e.g., paper r electrnic) thrughut its infrmatin lifecycle. ehealth Ontari EHR Plicy Infrmatin Security Plicy 4
8 Refer t the Infrmatin and Asset Management Plicy. Access Cntrl and Identity Management 1.8. [The EHR Slutin] Prgram and HICs must establish apprpriate access and identity management cntrls t manage all persns and infrmatin system access t [the EHR Slutin]. These cntrls must: Define the infrmatin security respnsibilities f all persns wh have access t [the EHR Slutin] Ensure that nly authrized persns are granted access t [the EHR Slutin] and that persnal accuntability is assured Ensure that nly authrized infrmatin systems are granted access t [the EHR Slutin], and Prvide authrized persns r infrmatin systems with nly the least amunt f privileges that are sufficient t enable them t perfrm their duties but d nt permit them t exceed their authrity. Lgging and Mnitring Refer t the Access Cntrl and Identity Management Plicy fr System Level Access and the Identity Federatin Standard [The EHR Slutin] Prgram must lg and mnitr all access t [the EHR Slutin], and must lg and mnitr infrmatin system events n [the EHR Slutin] HICs must lg and mnitr all access by the HIC, their agents r Electrnic Service Prviders t [the EHR Slutin] s Prvider Prtal, and must lg and mnitr infrmatin system events n their identity prvider services and data cntributin endpints. Netwrk and Operatins Refer t the Security Lgging and Mnitring Plicy [The EHR Slutin] Prgram must implement cntrls t secure their netwrk infrastructure, and establish prcedures t secure the nging management and peratin f [the EHR Slutin] HICs must implement cntrls t secure their netwrk infrastructure, and establish prcedures t secure the nging management and peratin f their identity prvider services and data cntributin endpints. System Develpment Lifecycle Refer t the Netwrk and Operatins Plicy [The EHR Slutin] Prgram must define infrmatin system develpment and change cntrl requirements, and ensure that all system develpment activities perfrmed n [the EHR Slutin] are carried ut in accrdance with these requirements. ehealth Ontari EHR Plicy Infrmatin Security Plicy 5
9 1.14. HICs shuld define infrmatin system develpment and change cntrl requirements and ensure that identity prvider services and data cntributin endpint develpment activities are carried ut in accrdance with these requirements. Electrnic Service Prviders Refer t the System Develpment Lifecycle Plicy [The EHR Slutin] Prgram must ensure that their Electrnic Service Prviders wh will have access t [the EHR Slutin], r wh manage r prvide supprt t [the EHR Slutin] have adequate infrmatin security cntrls in place t prtect and maintain the level f cnfidentiality, integrity and availability HICs must ensure that their Electrnic Service Prviders wh will have access t their identity prvider services r data cntributin endpints, r wh manage r prvide supprt t these systems have adequate infrmatin security cntrls in place t prtect and maintain the level f cnfidentiality, integrity and availability. Physical Security Refer t the Electrnic Service Prvider Plicy [The EHR Slutin] Prgram must implement cntrls t prtect against the risks f unauthrized physical access and envirnmental damage t [the EHR Slutin] HICs must implement cntrls t prtect against the risks f unauthrized physical access and envirnmental damage t their identity prvider services and data cntributin endpints. Business Cntinuity Refer t the Physical Security Plicy [The EHR Slutin] Prgram must implement prcedures necessary t ensure that [the EHR Slutin]: Remains available, especially in the event f a disaster, r Can be recvered in the event that peratins are disrupted HICs shuld develp business cntinuity plans t ensure that their identity prvider services and data cntributin endpints: Remain available, especially in the event f disaster, r Can be recvered in the event that peratins are disrupted. Refer t the Business Cntinuity Plicy. Infrmatin Security Incident Management ehealth Ontari EHR Plicy Infrmatin Security Plicy 6
10 1.21. [The EHR Slutin] Prgram and HICs must implement an infrmatin security incident management prcess t identify and reslve infrmatin security incidents related t [the EHR Slutin] quickly and effectively, while minimizing their impact and reducing the risk f similar infrmatin security incidents frm ccurring. Refer t the Infrmatin Security Incident Management Plicy. Privacy and Security Assurance HICs must identify and mitigate privacy and security risks and areas f nn-cmpliance in respect f [the EHR Slutin], including thrugh privacy and security readiness self-assessments, privacy and security peratinal self-attestatins, auditing and mnitring activities and assurance f agents and Electrnic Service Prviders [The EHR Slutin] Prgram Office must identify and mitigate privacy and security risks and areas f nn-cmpliance in respect f [the EHR Slutin], including thrugh privacy impact assessments, threat risk assessments, privacy and security readiness self-assessments, privacy and security peratinal self-attestatins, auditing and mnitring activities and assurance f agents, Electrnic Service Prviders and third parties. Refer t the Privacy and Security Harmnized Assurance Plicy. 2. Infrmatin Security Exemptin Requirements 2.1. All shall/must requirements are mandatry. Any deviatin frm a mandatry requirement in a [the EHR Slutin] infrmatin security plicy, standard, r supprting dcument must be apprved by the Applicable Oversight Bdy All infrmatin security exemptin requests must be assessed by the Privacy and Security Operatins Team and then reviewed by the Applicable Oversight Bdy fr apprval [The EHR Slutin] Prgram must lg all infrmatin security exemptin requests Infrmatin security exemptins may be requested and granted fr any length f time. Hwever, all apprved exemptins must be reviewed by the Privacy and Security Operatins Team at a minimum, every tw years, t ensure that the level f risk has nt increased r that new risks have nt appeared. If the Privacy and Security Operatins Team reassesses the risk at a higher level r identifies additinal risks, then the exemptin must be presented t the Applicable Oversight Bdy fr re-apprval The Applicable Oversight Bdy has the right t revke any apprved infrmatin security exemptins. Hwever, HICs must be prvided with at least six mnths t cmply with the plicy if their infrmatin security exemptin is revked. Refer t Appendix A: Infrmatin Security Exemptin Requests ehealth Ontari EHR Plicy Infrmatin Security Plicy 7
11 3. Rles and Respnsibilities Privacy and Security Cmmittee 3.1. The Privacy and Security Cmmittee must: Applicable Oversight Bdy Review, prvide feedback, and ratify all [the EHR Slutin] infrmatin security plicies 3.2. The Applicable Oversight Bdy must: Apprve all infrmatin security plicies Apprve r deny all infrmatin security exemptin requests Where applicable, hld all [the EHR Slutin] agents and Electrnic Service Prviders, and HICs accuntable fr unauthrized r inapprpriate access, cllectin, use, disclsure, dispsal, mdificatin, r interference with [the EHR Slutin], PHI r [the EHR Slutin] infrmatin. Privacy and Security Operatins Team 3.3. Privacy and Security Operatins Team must: Prvide infrmatin security leadership and guidance t HICs Develp, implement and maintain an infrmatin security prgram that will establish an infrmatin security gvernance, strategy and plicy framewrk fr the HICs and external service prviders Develp, implement and maintain supprting plicies, standards and supprting dcuments that uphld and expand upn the principles f this plicy Prvide guidance t the HICs n infrmatin security training and awareness activities Mnitr, reprt, and make recmmendatins fr actin r imprvement t the PSC n infrmatin security psture, infrmatin security incidents, and the status and effectiveness f the infrmatin security prgram Review, and prvide recmmendatins n all infrmatin security plicy exemptins t the Applicable Oversight Bdy. Health Infrmatin Custdians (HICs) 3.4. All HICs must: Develp, implement and maintain an infrmatin security plicy fr their rganizatin that uphlds the principles f this plicy and any ther applicable infrmatin security plicies, standards and supprting dcuments ehealth Ontari EHR Plicy Infrmatin Security Plicy 8
12 Designate an infrmatin security lead t ensure cmpliance with the principles utlined in this plicy. The infrmatin security lead may be the same persn as the appinted cntact persn required by Persnal Health Infrmatin and Prtectin Act, 2004 (PHIPA) sectin15 r the site cntact identified in the participatin agreement Ensure that all agents and Electrnic Service Prviders wh have access t [the EHR Slutin] Services are apprpriately infrmed f their infrmatin security respnsibilities Require all agents and Electrnic Service Prviders wh have access t [the EHR Slutin] t agree t an end user agreement that includes cnfidentiality prvisins befre being prvided with access t [the EHR Slutin] Hld individual agents and Electrnic Service Prviders accuntable fr unauthrized r inapprpriate access, cllectin, use, disclsure, dispsal, destructin, mdificatin, r interference with [the EHR Slutin], r their infrmatin systems. Cnnecting Security Cmmittee Apprve all infrmatin security plicies Review trend reprting f security exemptins Review security incident reprts Exemptins Any exemptins t this Plicy must be apprved by the Applicable Oversight Bdy, wh will authrize exemptins nly where there is clear justificatin t d s and nly t the minimum extent necessary t meet the justified need. See Appendix A: Infrmatin Security Exemptin Requests in the Infrmatin Security Plicy Enfrcement All instances f nn-cmpliance will be reviewed by the Applicable Oversight Bdy. Plicy Gvernance Structure The Applicable Oversight Bdy has the authrity t impse apprpriate penalties, up t and including terminatin f the Agreements with the HIC, Electrnic Service Prviders r terminatin f the access privileges f agents, and t require the implementatin f remedial actins. EHR Slutin Applicable Oversight Bdy Cnnecting Ontari CDR ehealth Ontari Strategy Cmmittee References ehealth Ontari EHR Plicy Dcuments ehealth Ontari EHR Plicy Infrmatin Security Plicy 9
13 Infrmatin Security Plicy Acceptable Use f Infrmatin and Infrmatin Technlgy Access Cntrl and Identity Management Plicy fr System Level Access Lcal Registratin Authrity Prcedures Identity Federatin Standard Business Cntinuity Plicy Cryptgraphy Plicy Electrnic Service Prviders Plicy Infrmatin Security Incident Management Plicy Infrmatin and Asset Management Plicy Netwrk and Operatins Plicy Security Lgging and Mnitring Plicy Systems Develpment Lifecycle Plicy Physical Security Plicy Threat Risk Management Plicy Harmnized Privacy Prtectin Plicies Canada Health Infway Reference Canada Health Infway Electrnic Health Recrd Privacy and Security Requirements (Versin 1.1 Revised February 7, 2005) Other Infrmatin and Privacy Cmmissiner f Ontari s Guidelines n Facsimile Transmissin Security (January 2003) ehealth Ontari EHR Plicy Infrmatin Security Plicy 10
14 Appendix A: Infrmatin Security Exemptin Requests Stage Respnsibility Descriptin 1 [The EHR Slutin] s agent r Electrnic Service Prvider Cmpletes sectin 1 f the Infrmatin Security Exemptin Request Frm and sends the frm t Privacy and Security Operatins Team - OR A HIC, their agent r Electrnic Service Prvider ( Requestr ) 2 Privacy and Security Operatins Team Reviews the Infrmatin Security Exemptin Request Frm and cmpletes sectin tw. 1 3 Applicable Oversight Bdy Reviews the request and either: Apprves the request Apprves the request with cnditins, OR Denys the request 4 Privacy and Security Operatins Team Lgs the Applicable Oversight Bdy s decisin. Infrms the requestr f the Applicable Oversight Bdy s decisin and sends the HIC a cpy f the Infrmatin Security Exemptin Request Frm. Stres the Infrmatin Security Exemptin Request Frm. The fllwing is the prcess fr reviewing, and if necessary, reapprving infrmatin security exemptins that were riginally apprved fr a perid f greater than tw years. Stage Respnsibility Descriptin 1 Privacy and Security Operatins Team Reviews the apprved Infrmatin Security Exemptin Request Frm t assess if there is any change t the levels f risk riginally identified. 1 This sectin is dne in cnsultatin with the requestr, and is usually a cyclical prcess. Fr example, after Privacy and Security Operatins Team cnsults with the requestr, the requestr may agree t implement additinal cmpensating cntrls. The request frm wuld then be updated and the residual risk may be lwered. ehealth Ontari EHR Plicy Infrmatin Security Plicy 11
15 If there are n new risks and the riginal levels f risk have nt increased: The infrmatin security exemptin request lg is updated t indicate that the review was perfrmed but there were n additinal risks r increase t level f riginal risks. Advises the requestr that the exemptin request has been renewed. Lgs renewal. [Prcess ends here] If new risks have been identified r the riginal level f risks have increased: Privacy and Security Operatins Team updates the infrmatin security exemptin request frm and ntifies the requestr f the change in assessed risk. 2 Requestr Reviews the updated infrmatin security exemptin frm and updates the frm with any additinal cmpensating cntrls that have been put in place r that they will be put in place t address the additinal r increased level f risk. 3 Privacy and Security Operatins Team Reviews the updated infrmatin security exemptin frm and revises the residual risk rating if necessary. 4 Applicable Oversight Bdy Reviews the request and either: Sends the infrmatin security exemptin request frm t the Applicable Oversight Bdy. Renews the exemptin Renews the exemptin with cnditins, OR Revkes the exemptin. 5 Privacy and Security Operatins Team Lgs the Applicable Oversight Bdy s decisin. Infrms the requestr f the Applicable Oversight Cmmittee s decisin and sends the HIC a cpy f the Infrmatin Security Exemptin Request Frm. Stres the Infrmatin Security Exemptin Request Frm. ehealth Ontari EHR Plicy Infrmatin Security Plicy 12
16 Infrmatin Security Exemptin Request Frm Use this frm t request an infrmatin security exemptin. Frm Cmpletin Instructins 1. Cmplete all fields as specified. Mandatry fields fr the requestr are marked with an asterisk (*). If the frm is incmplete, it will be returned t yu. Indicate Nt Applicable r N/A if the field is nt applicable. 2. Once cmpleted, please the cmpleted frm t the Privacy and Security Operatins Team. 3. If yu have any questins regarding the cmpletin f this frm, please cntact yur [EHR Slutin] Site Crdinatr r the Privacy and Security Operatins Team. FORM TIPS: The frm will pen with the pinter in the start psitin. Begin typing yur infrmatin. Use the TAB key n yur keybard t mve t the next bx. Yu can use SHIFT + TAB t mve back. Click yur left muse buttn t fill in checkbxes. SECTION 1: Request (T be cmpleted by the requestr ) Requestr infrmatin First Name * Last Name * Title * (e.g., CEO, CIO) Business Telephne * (include ext.) ( ) Organizatin/Site/Hspital Name (e.g., ABC Hspital) Business * Name f plicy/standard/supprting dcument fr which an exemptin is being requested: * Requirement(s) * Reasn(s) fr nn-cmpliance: * Lists the infrmatin systems r specific infrmatin technlgies fr which this exemptin will be applied: * Type and sensitivity f affected data: * Prpsed plan fr managing/mitigating the risks assciated with nn-cmpliance r list f cmpensating cntrls that have been implemented: * Anticipated duratin (length f time) fr exemptin: * Additinal Infrmatin: Internal Endrsement (e.g., endrsement by HIC s CIO): Please list the endrser s full name and jb title (e.g., Jhn Smith, Chief Infrmatin Officer) and an frm the endrser when yu ehealth Ontari EHR Plicy Infrmatin Security Plicy 13
17 yur t exemptin request t the [the EHR Slutin] Prgram. SECTION 2: Assessment (t be cmpleted by Privacy and Security Operatins Team) [The EHR Slutin] Reviewer s Infrmatin First Name * Last Name * Title * (e.g., Security Analyst) Business Telephne * (include ext.) ( ) Business * Descriptin f Risk(s) t [the EHR Slutin] Prgram r the Cnnecting Slutin* Level f Residual Risk * (e.g., high, medium, r lw) Recmmendatin by Privacy and Security Operatins Team* [NOTE: Recmmendatin ptins are either: 1) apprve request as is, 2) apprve request with cnditins (must list cnditins), OR 3) deny request.] SECTION 3: Decisin (t be cmpleted by Privacy and Security Operatins Team) Applicable Oversight Bdy s Decisin* Date f Endrsement* [NOTE: Endrsement ptins are either: 1) recmmend apprving request as is, 2) recmmend apprving request with cnditins (must list cnditins), OR 3) recmmend denying request.] Evidence f decisin* (An frm a Applicable Oversight Bdy chair r a cpy f the meeting minutes is acceptable, please attach t the evidence in the space belw (e.g., by inserting a.msg r PDF file as an bject int this dcument. Nte: Yu must unlck the frm t attach file.) ehealth Ontari EHR Plicy Infrmatin Security Plicy 14
HP Server Virtualization Solution Planning & Design
Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP
More informationPatch Management Policy
Patch Management Plicy (Versin 1) Dcument Cntrl Infrmatin: Date: 21/5/18 Master Tracking Name Patch Management Plicy Master Tracking Reference Owning Service / Department Exeter IT Issue: 1 Apprvals: Authrs:
More informationIHIS Research Access Request Guidelines
Eservices: https://sumc.service-nw.cm/ 1. FOR NEWLY HIRED EMPLOYEES: Use On-barding Services & On-Barding Guide Frm Please Nte the fields required fr Research IHIS access are the same as thse utlined in
More informationUNSW Technology Policy:
UNSW Technlgy Plicy: UNSW Plicy Respnsible Officer Cntact Officer Apprving Authrity UNSW Data Netwrk Cnnectin Plicy Chief Infrmatin Officer Manager Infrastructure Services Supprt UNSW IT Services Ph: x
More informationAdmin Report Kit for Exchange Server
Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses
More informationCaseWare Working Papers. Data Store user guide
CaseWare Wrking Papers Data Stre user guide Index 1. What is a Data Stre?... 3 1.1. When using a Data Stre, the fllwing features are available:... 3 1.1.1.1. Integratin with Windws Active Directry... 3
More informationDate: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems
Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance
More informationPRIVACY AND E-COMMERCE POLICY STATEMENT
PRIVACY AND E-COMMERCE POLICY STATEMENT Tel-Tru Manufacturing Cmpany ( Tel-Tru ) is dedicated t develping lng-lasting relatinships that are built n trust. Tel-Tru is cmmitted t respecting the wishes f
More informationGuidance for Applicants: Submitting an application in AAS Ishango Grants Management
Guidance fr Applicants: Submitting an applicatin in AAS Ishang Grants Management Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1
More informationTown of Warner, New Hampshire Information Security Policy
Twn f Warner, New Hampshire Infrmatin Security Plicy Date Adpted: Bard f Selectmen David E. Hartman David Karrick, Jr. Clyde Carsn Table f Cntents Table f Cntents 1 Intrductin 2 Ethics and Acceptable Use
More informationGuidance for Submitting an application or Nomination in AAS Ishango Online System
Guidance fr Submitting an applicatin r Nminatin in AAS Ishang Online System Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1 General
More informationOATS Registration and User Entitlement Guide
OATS Registratin and User Entitlement Guide The OATS Registratin and Entitlement Guide prvides the fllwing infrmatin: OATS Registratin The prcess and dcumentatin required fr a firm r Service Prvider t
More informationSoftware Usage Policy Template
Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/
More informationOverview of Data Furnisher Batch Processing
Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...
More informationTPP: Date: October, 2012 Product: ShoreTel PathSolutions System version: ShoreTel 13.x
I n n v a t i n N e t w r k A p p N t e TPP: 10320 Date: Octber, 2012 Prduct: ShreTel PathSlutins System versin: ShreTel 13.x Abstract PathSlutins sftware can find the rt-cause f vice quality prblems in
More informationONTARIO LABOUR RELATIONS BOARD. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Ontario Labour Relations Board
ONTARIO LABOUR RELATIONS BOARD Filing Guide A Guide t Preparing and Filing Frms and Submissins with the Ontari Labur Relatins Bard This Filing Guide prvides general infrmatin nly and shuld nt be taken
More informationE. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering
IT2042 - Infrmatin Security 1-1 E. G. S. Pillay Engineering Cllege, Nagapattinam Cmputer Science and Engineering Elective II IT 2042 INFORMATION SECURITY VIII Sem CSE QUESTION BANK - UNIT-IV 1) What is
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This
More informationCSC IT practix Recommendations
CSC IT practix Recmmendatins CSC Healthcare 17 th June 2015 Versin 3.1 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins
More informationApp Center User Experience Guidelines for Apps for Me
App Center User Experience Guidelines fr Apps fr Me TABLE OF CONTENTS A WORD ON ACCESSIBILITY...3 DESIGN GUIDELINES...3 Accunt Linking Prcess... 3 Cnnect... 5 Accept Terms... 6 Landing Page... 6 Verificatin...
More informationPoint-to-Point Encryption (P2PE)
Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard
More informationAll members of the UNNC Community and users of the University network.
Bulk Email Plicy Audience: All members f the UNNC Cmmunity and users f the University netwrk. Definitin: Bulk email, by definitin, is unslicited email sent quickly in large quantities, and is recgnized
More informationPrivacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services
Privacy Plicy Last Mdified: September 26, 2016 Pictry is a fast and fun way t share memes with yur friends and the wrld arund yu. Yu can send a Pictry game t friends and view the pictures they submit in
More informationPrivacy Policy concerning the use of the website and the use of cookies
Privacy Plicy cncerning the use f the website and the use f ckies Agria understands the imprtance f the privacy f its custmers and the prtectin f their persnal data. Present plicy utlines the handling
More informationINSTALLING CCRQINVOICE
INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a
More informationE-Lock Policy Manager White Paper
White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...
More informationNet1 Mobile Solutions (Pty) Ltd COMPLAINT HANDLING PROCEDURE
Net1 Mbile Slutins (Pty) Ltd Name: Cmplaint Handling Prcedure Net1 Mbile Slutins (Pty) Ltd COMPLAINT HANDLING PROCEDURE I. General Purpse It is the prcedure f Net1 Mbile Slutins (Pty) Ltd (the Cmpany )
More informationCustomer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist
This checklist is used t prvide guidance and clarificatin n aspects f the auxillary Startup Service (G2949CA) including Security Pack Installatin and Familiarizatin f yur Agilent 2100 Bianalyzer System
More informationGroup Policy Manager Quick start Guide
Grup Plicy Manager Quick start Guide Sftware versin 4.0.0.0 General Infrmatin: inf@cinsystems.cm Online Supprt: supprt@cinsystems.cm Cpyright CinSystems Inc., All Rights Reserved Page 1 CinSystems Inc.
More informationSircon User Guide A Guide to Using the Vertafore Sircon Self-Service Portal
Sircn User Guide A Guide t Using the Vertafre Sircn Self-Service Prtal September 2016 Versin 16.8 Cntents Cntents Using the Vertafre Sircn Self-Service Prtal... 3 Lg In... 3 Hme Page... 4 Lg New Cases...
More informationPassword Management Guidelines
Unified Cntract System Passwrd Management Guidelines Versin 2.5 Revisin date: 26-06-2006 Authr:J.Thiyagarajan Cpyright 2006 by Hexaware Technlgies Limited All rights reserved. All text and figures included
More informationGUIDELINES TUE ENQUIRIES
Wrld Anti-Dping Prgram GUIDELINES TUE ENQUIRIES BY ACCREDITED LABORATORIES Versin 2.0 June 2018 Objective The fllwing guideline is the result f cntinuing effrts t harmnize Labratry reprting prcedures based
More informationOutreach Portal User Guide
Outreach Prtal User Guide Natinal Resurce Center West Virginia University and Natinal Labr Cllege 3604 Cllins Ferry Rad, P.O. Bx 6615, Mrgantwn, WV 26506-6615 (304) 293-3096 r (800) 626-4748 http://extensin.wvu.edu/cmmunity-business-safety/safety-health/sha-educatin-center
More informationDocAve Governance Automation 2
DcAve Gvernance Autmatin 2 Business User Guide Service Pack 2 Issued March 2018 The Enterprise-Class Management Platfrm fr SharePint Gvernance Table f Cntents What s New in this Guide... 3 Submitting Dcumentatin
More informationAvePoint Pipeline Pro 2.0 for Microsoft Dynamics CRM
AvePint Pipeline Pr 2.0 fr Micrsft Dynamics CRM Installatin and Cnfiguratin Guide Revisin E Issued April 2014 1 Table f Cntents Abut AvePint Pipeline Pr... 3 Required Permissins... 4 Overview f Installatin
More informationOmniPCX Record PCI Compliance 2.3
S T R A T E G I C W H I T E P A P E R OmniPCX Recrd PCI Cmpliance 2.3 Alcatel-Lucent Enterprise Services Page 1/11 OmniPCX-Recrd R2.3 PCI Cmpliance White Paper Legal ntice Alcatel, Lucent, Alcatel-Lucent
More informationEnrolling onto the Open Banking Directory How To Guide
Enrlling nt the Open Banking Directry Hw T Guide Date: Octber 2017 Versin: v3.0 Classificatin: PUBLIC OPEN BANKING LIMITED ENROLLING ONTO THE OPEN BANKING DIRECTORY Page 1 f 14 Cntents 1. Intrductin 3
More informationDoctoral Dissertation and Capstone Project Submission Guide
Dctral Dissertatin and Capstne Prject Submissin Guide Part I: Dctral Dissertatin/Capstne Prject Submissin Prcess 1. Dctral Dissertatin/Capstne Prject apprved by cmmittee and department 4. Student receives
More informationTPCH Data Sharing Policies and Procedures
TPCH Data Sharing Plicies and Prcedures Intrductin: The TPCH Data Sharing Plicies and Prcedures were created based n the CC apprved Pima Cunty: HMIS Data Sharing Plan apprved by TPCH bard n February 24,
More informationUsers, groups, collections and submissions in DSpace. Contents
Users, grups, cllectins and submissins in DSpace Cntents Key cncepts... 2 User accunts and authenticatin... 2 Authrisatin and privileges... 2 Resurce plicies... 2 User rles and grups... 3 Submissin wrkflws...
More informationAdverse Action Letters
Adverse Actin Letters Setup and Usage Instructins The FRS Adverse Actin Letter mdule was designed t prvide yu with a very elabrate and sphisticated slutin t help autmate and handle all f yur Adverse Actin
More informationLiveEngage and Microsoft Dynamics Integration Guide Document Version: 1.0 September 2017
LiveEngage and Micrsft Dynamics Integratin Guide Dcument Versin: 1.0 September 2017 Cntents Intrductin... 3 Step 1: Sign Up... 3 CRM Widget Signing Up... 3 Step 2: Cnfiguring the CRM Widget... 4 Accessing
More informationPAY EQUITY HEARINGS TRIBUNAL. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Pay Equity Hearings Tribunal
PAY EQUITY HEARINGS TRIBUNAL Filing Guide A Guide t Preparing and Filing Frms and Submissins with the Pay Equity Hearings Tribunal This Filing Guide prvides general infrmatin nly and shuld nt be taken
More informationSecurity of Information Technology Resources
CORNELL UNIVERSITY POLICY LIBRARY Security f Infrmatin Technlgy Resurces Technlgies Chapter: 4, Security and Vice President fr Infrmatin Technlgies Originally Issued: June 1, 2004 Last Full Review: December
More informationRefreshing Axiom TEST with a Current Copy of Production Axiom EPM June 20, 2014
Refreshing Axim TEST with a Current Cpy f Prductin Axim EPM June 20, 2014 Refreshing Axim TEST If yu maintain an Axim TEST envirnment yu will want t refresh it with a current cpy f yur PROD database when
More informationReporting Requirements Specification
Cmmunity Mental Health Cmmn Assessment Prject OCAN 2.0 - ing Requirements Specificatin May 4, 2010 Versin 2.0.2 SECURITY NOTICE This material and the infrmatin cntained herein are prprietary t Cmmunity
More informationPlease contact technical support if you have questions about the directory that your organization uses for user management.
Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP
More informationPerformance of usage of MindSphere depends on the bandwidth of your internet connection.
MindSphere MindAccess User Data Sheet MindAccess User prvides yu with an Accunt in rder t access the MindSphere Platfrm. This allws yu t cnfigure Assets and Users, access Applicatins and stre data. Such
More informationInternet/Intranet Publishing Guidelines
Muntain View-Ls Alts Unin High Schl District In trductin Internet/Intranet Publishing Guidelines Using the Internet t further the educatinal prcess, gals and bjectives is a natural extensin f Muntain View-Ls
More informationIntroduction to Mindjet on-premise
Intrductin t Mindjet n-premise Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 www.mindjet.cm 2012 Mindjet. All Rights Reserved
More informationWELMEC Guide on evaluation of Purely Digital Parts
WELMEC 10.10 2016 Guide n evaluatin f Purely Digital Parts WELMEC is a cperatin between the legal metrlgy authrities f the Member States f the Eurpean Unin and EFTA. This dcument is ne f a number f Guides
More informationDoctoral Dissertation and Capstone Project Submission Guide
Dctral Dissertatin and Capstne Prject Submissin Guide Part I: Dctral Dissertatin/Capstne Prject Submissin Prcess 1. Dctral Dissertatin/Capstne Prject apprved by cmmittee and department 2. Student submits
More informationMaster s Thesis Submission Guide
The Graduate Schl Master s Thesis Submissin Guide Part I: Master s Thesis Submissin Prcess 1. Thesis apprved by cmmittee and department 4. Student receives email with any necessary revisins. If n revisins
More informationAccess the site directly by navigating to in your web browser.
GENERAL QUESTIONS Hw d I access the nline reprting system? Yu can access the nline system in ne f tw ways. G t the IHCDA website at https://www.in.gv/myihcda/rhtc.htm and scrll dwn the page t Cmpliance
More informationForcepoint UEBA Management of Personal Data
Frcepint UEBA Management f Persnal Data 2018 Frcepint LLC. All Rights Reserved Dcument Classificatin: Public FPWSCMPD-2018MAY24 Frcepint UEBA Management f Persnal Data CONTENTS Disclaimer... 2 General...
More informationITIL 2011 Service Offerings and Agreements (SOA)
IT SERVICE MANAGEMENT ITIL 2011 Service Offerings and Agreements (SOA) CERTIFICATE: DURATION: COURSE DELIVERY: LANGUAGE: ITIL 2011 Service Offerings and Agreements (SOA) 5 Days Classrm, Live Virtual Classrm
More informationNCTA-Certified Cloud Technologist (NCT) Exam NCT-110
NCTA-Certified Clud Technlgist (NCT) Exam NCT-110 Exam Infrmatin Candidate Eligibility: The NCTA-Certified Clud Technlgist (NCT) exam requires n applicatin fee, supprting dcumentatin, nr ther eligibility
More informationAnonymous User Manual
Annymus User Manual esuppliercnnect Versin 9.4 January 15 th, 2017 Page 1/32 January 15 th, 2017 v9.4 Table f cntents: 1 Intrductin 3 2 Abut esuppliercnnect 5 2.1 Prtal Access 6 2.1 Prtal Structure 7 2.2
More informationPrivacy Policy. What this policy covers. What information we collect about you
Effective starting: May 25, 2018 What this plicy cvers Privacy Plicy Yur privacy is imprtant t us, and s is being transparent abut hw we cllect, use, and share infrmatin abut yu. This plicy is intended
More informationEMV. Terminal Type Approval Contactless Product. Administrative Process. Version 2.6 February 2017
EMV Terminal Type Apprval Cntactless Prduct Administrative Prcess Versin 2.6 February 2017 Legal Ntice Page i / v Legal Ntice This dcument summarizes EMVC s present plans fr evaluatin services and related
More informationData Processing Information for Users of the Career and Alumni Portal of HTW Berlin (Data Privacy Policy)
Data Prcessing Infrmatin fr Users f the Career and Alumni Prtal f HTW Berlin (Data Privacy Plicy) The prtectin f yur data is imprtant t us. In view f this and in rder t cmply with all f ur statutry disclsure
More informationMySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION
MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION These release ntes pertain t the Prductin release fr MySabre Release 7.0 cntaining MySabre API
More informationNiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel
NiceLabel LMS Installatin Guide fr Single Server Deplyment Rev-1702 NiceLabel 2017. www.nicelabel.cm 1 Cntents 1 Cntents 2 2 Architecture 3 2.1 Server Cmpnents and Rles 3 2.2 Client Cmpnents 3 3 Prerequisites
More informationValidation Plan. Version 4.0 September 8, Copyright 2014 Healtheway, Inc. All rights reserved.
Validatin Plan Versin 4.0 September 8, 2014 Cpyright 2014 Healtheway, Inc. All rights reserved. Status: FINAL Apprved by CC Effective Date: 9/8/14 Versin: 4.0 Final 1 Purpse and Scpe... 2 1.1 Defined Terms...2
More informationImagine for MSDNAA Student SetUp Instructions
Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS
More informationWorldShip PRE-INSTALLATION INSTRUCTIONS: INSTALLATION INSTRUCTIONS: Window (if available) Install on a Single or Workgroup Workstation
PRE-INSTALLATION INSTRUCTIONS: This dcument discusses using the WrldShip DVD t install WrldShip. Yu can als install WrldShip frm the Web. G t the fllwing Web page and click the apprpriate dwnlad link:
More informationMySabre API RELEASE NOTES MYSABRE API VERSION 2.1 (PART OF MYSABRE RELEASE 7.1) DECEMBER 02, 2006 PRODUCTION
MySabre API RELEASE NOTES MYSABRE API VERSION 2.1 (PART OF MYSABRE RELEASE 7.1) DECEMBER 02, 2006 PRODUCTION These release ntes pertain t the Prductin release fr MySabre Release 7.1 cntaining MySabre API
More informationUSO RESTRITO. SNMP Agent. Functional Description and Specifications Version: 1.1 March 20, 2015
Functinal Descriptin and Specificatins Versin: 1.1 March 20, 2015 SNMP Agent Simple Netwrk Management Prtcl Optin S fr IE and PM Mdules Supplement t Functinal Descriptin and Specificatins f RUB Ethernet
More informationUNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL
UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Electrnic Data Prtectin and Encryptin REFERENCE: Refrmat CATEGORY: Infrmatin Technlgy PAGE: 1 SUPERSEDES: POL-UMIT- A175-014-01 APPROVER: David Ertel
More informationContingency Planning Template
Cntingency Planning Template Prject Name: U.S. Department f Husing and Urban Develpment Octber, 2010 Cntigency Planning Template (V1.0) Ntes t the Authr [This dcument is a template f a Security Apprach
More informationAvigilon Control Center Virtual Matrix User Guide. Version 6.8
Avigiln Cntrl Center Virtual Matrix User Guide Versin 6.8 2006-2018, Avigiln Crpratin. All rights reserved. AVIGILON, the AVIGILON lg, AVIGILON CONTROL CENTER, ACC, and TRUSTED SECURITY SOLUTIONS. are
More informationIMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7
IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 Prepared by: March Haber, march@il.ibm.cm Last Updated: January, 2012 IBM MetaData Wrkbench Enablement Series Table f Cntents: Table f
More informationEU General Data Protection Regulation
EU General Data Prtectin Regulatin Sally Ubnske, Senir Business Systems Analyst, subnske@ariessys.cm Sean MacRae, Business Systems Analyst, smacrae@ariessys.cm GDPR Summary The Eurpean Parliament, the
More informationAvePoint Timeline Enterprise for Microsoft Dynamics CRM
AvePint Timeline Enterprise 1.0.2 fr Micrsft Dynamics CRM Installatin and Cnfiguratin Guide Revisin B Issued Nvember 2013 Timeline Enterprise fr Micrsft Dynamics CRM Install and Cnfig 1 Table f Cntents
More informationAdditional License Authorizations
Additinal License Authrizatins Fr HPE CMS SIM Management sftware prducts Prducts and suites cvered PRODUCTS E-LTU OR E-MEDIA AVAILABLE * NON-PRODUCTION USE OPTION HPE Dynamic SIM Prvisining Yes Yes HPE
More informationService Description: Advanced Services Fixed Price
Page 1 f 6 Service Descriptin: Advanced Services Fixed Price Cisc WLAN Advise and Implement Services Fixed (ASF-CORE-WLAN) This dcument describes Advanced Services Fixed Price: Cisc WLAN Advise and Implement
More informationSOLA and Lifecycle Manager Integration Guide
SOLA and Lifecycle Manager Integratin Guide SOLA and Lifecycle Manager Integratin Guide Versin: 7.0 July, 2015 Cpyright Cpyright 2015 Akana, Inc. All rights reserved. Trademarks All prduct and cmpany names
More informationHow to Guide. DocAve Extender for MOSS 2007 and SPS Installing DocAve Extender and Configuring a Basic SharePoint to Cloud Extension
Hw t Guide DcAve Extender fr MOSS 2007 and SPS 2010 Installing DcAve Extender and Cnfiguring a Basic SharePint t Clud Extensin This dcument is intended fr anyne wishing t familiarize themselves with the
More informationSMART Room System for Microsoft Lync. Software configuration guide
SMART Rm System fr Micrsft Lync Sftware cnfiguratin guide Fr mdels SRS-LYNC-S, SRS-LYNC-M and SRS-LYNC-L In this guide: Fr yur recrds 1 Preparing fr yur rm system 2 Befre cnfiguring yur rm system s sftware
More informationCA CMDB Connector for z/os
PRODUCT SHEET: CA CMDB CONNECTOR FOR Z/OS CA CMDB Cnnectr fr z/os CA CMDB Cnnectr fr z/os discvers mainframe cnfiguratin items (CIs) and enables ppulatin f that infrmatin int the CA CMDB repsitry. Designed
More informationFirst Aid and Choking, Fire Safety, Medication Administration, and Standard Precautions Roster Submission:
The Wiscnsin CBRF Training Registry is lcated at www.uwgb.edu/cbrf-registry. This guide prvides directins fr submitting rsters and applicatins. Rster Submissin First Aid and Chking, Fire Safety, Medicatin
More informationStock Affiliate API workflow
Adbe Stck Stck Affiliate API wrkflw The purpse f this dcument is t illustrate the verall prcess and technical wrkflw fr Adbe Stck partners wh want t integrate the Adbe Stck Search API int their applicatins.
More informationERS IT Portfolio Report
Administratin and Operatins Cmmittee ERS IT Prtfli Reprt July 15 th, 2014 1 Agenda Infrmatin Technlgy Prjects Summary Applicatin Stats What s Next IT Prtfli 2 Infrmatin Technlgy Prjects Summary Remte Office
More informationCase Metrics Guide. January 11, 2019 Version For the most recent version of this document, visit our documentation website.
Case Metrics Guide January 11, 2019 Versin 9.6.202.10 Fr the mst recent versin f this dcument, visit ur dcumentatin website. Table f Cntents 1 Case Metrics 3 1.1 Case Metrics Cmpatibility Matrix 3 1.2
More informationSERVICE LEVEL AGREEMENT. Mission: Certificates Management
SERVICE LEVEL AGREEMENT BSM: This SLA is cvered by BSM s fr Infrastructure, Supprt and Prjects This SLA is a cmplement t the Master Service Agreement V5.0 as described in art 2.2 (MSA) Missin: Certificates
More informationAvePoint Perimeter Pro 1.9
G09 AvePint Perimeter Pr 1.9 Secured Share User Guide Issued December 2017 Table f Cntents What s New in this Guide... 4 Overview... 5 Internal Users... 6 Site Cllectin Administratrs... 7 External Prtal
More informationData Center Advantage Incentive Program Distribution
Data Center Advantage Incentive Prgram Distributin Prgram rules Data Center Advantage April 28, The Cisc Data Center Advantage Incentive Prgram (DCAIP) rewards distributrs wh resell Cisc MDS Fabric Strage
More informationNovember MCES INDUSTRIAL ONLINE REPORTING SYSTEM System Documentation Guide
Nvember 2015 MCES INDUSTRIAL ONLINE REPORTING SYSTEM System Dcumentatin Guide The Cuncil s missin is t fster efficient and ecnmic grwth fr a prsperus metrplitan regin The Metrplitan Cuncil is the reginal
More informationUser Manual. Revised June 18, 2007
User Manual Revised June 18, 2007 TABLE OF CONTENTS 1. AN INTRODUCTION TO NVTREC... 3 2. NVTREC HOME PAGE... 3 3. ACCOUNT REGISTRATION... 5 4. ACCOUNT HOME PAGE... 5 5. FACILITY REGISTRATION... 6 6. EDITING
More informationRICOH IMAGING COMPANY, LTD. wishes to announce the release of Firmware Update Software Version
Dwnlads : Firmware Update Thank yu fr using GR II digital camera. RICOH IMAGING COMPANY, LTD. wishes t annunce the release f Firmware Update Sftware Versin 3.00 fr GR II. Firmware in this dcument is the
More informationCustod. July 30, 20100
AgriLife Infrmatin Technlgy Custd dian Prcedures and Best Practices July 30, 20100 TABLE OF CONTENTS Intrductin.. 3 Custdian Requirements...... 4 Appendix A - Definitins........ 13 Appendix B - IT Security
More informationMHS BYOD Policy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY
MHS BYOD Plicy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY Intrductin This dcument prvides advice and directin t students wh chse t use BYOD t access the Department f Educatin (DOE)
More informationConfiguring Database & SQL Query Monitoring With Sentry-go Quick & Plus! monitors
Cnfiguring Database & SQL Query Mnitring With Sentry-g Quick & Plus! mnitrs 3Ds (UK) Limited, Nvember, 2013 http://www.sentry-g.cm Be Practive, Nt Reactive! One f the best ways f ensuring a database is
More informationGraduate Application Review Process Documentation
Graduate Applicatin Review Prcess Cntents System Cnfiguratin... 1 Cgns... 1 Banner Dcument Management (ApplicatinXtender)... 2 Banner Wrkflw... 4 Navigatin... 5 Cgns... 5 IBM Cgns Sftware Welcme Page...
More informationSEMA Memorial Scholarship Fund Scholarship & Loan Forgiveness Programs
SEMA Memrial Schlarship Fund Schlarship & Lan Frgiveness Prgrams Schlarship Prgram Frequently Asked Questins Wh is eligible t apply? Hw d I get an applicatin? What are the details f the award? If I am
More informationCAMPBELL COUNTY GILLETTE, WYOMING
CAMPBELL COUNTY GILLETTE, WYOMING System Supprt Analyst I System Supprt Analyst II Senir System Supprt Analyst Class specificatins are intended t present a descriptive list f the range f duties perfrmed
More informationElement Creator for Enterprise Architect
Element Creatr User Guide Element Creatr fr Enterprise Architect Element Creatr fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins... 3 Installatin... 4 Verifying the
More informationManaging Your Access To The Open Banking Directory How To Guide
Managing Yur Access T The Open Banking Directry Hw T Guide Date: June 2018 Versin: v2.0 Classificatin: PUBLIC OPEN BANKING LIMITED 2018 Page 1 f 32 Cntents 1. Intrductin 3 2. Signing Up 4 3. Lgging In
More informationDocAve Governance Automation
DcAve Gvernance Autmatin Business User Guide Service Pack 9 Issued Nvember 2016 Table f Cntents Submitting Dcumentatin Feedback t AvePint... 4 What s New in this Guide... 5 Abut DcAve Gvernance Autmatin...
More informationWave IP 4.5. CRMLink Desktop User Guide
Wave IP 4.5 CRMLink Desktp User Guide 2015 by Vertical Cmmunicatins, Inc. All rights reserved. Vertical Cmmunicatins and the Vertical Cmmunicatins lg and cmbinatins theref and Vertical ViewPint, Wave Cntact
More information