presents Cell Warden Prison Protocol Beacon Technology DISABLES 100% OF CONTRABAND CELL PHONES

Size: px
Start display at page:

Download "presents Cell Warden Prison Protocol Beacon Technology DISABLES 100% OF CONTRABAND CELL PHONES"

Transcription

1 presents Cell Warden Prison Protocol Beacon Technology DISABLES 100% OF CONTRABAND CELL PHONES NO Talk NO Text SMS TEXT NO NO WiFi NO Camera NO Video For More Information Contact John Fischer (770) * john.fischer@cellcommand.tech US B2, JP , CN , KR , (plus allowances in 47 countries)

2 Table of Slides Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Cell Command presents Cell Warden Table of Slides Contraband Cell Phones Behind Bars Overview of the Problem The Solution - Cell Warden Cell Warden - How It Works FCC Assistance = Carrier & Manufacturer Compliance Protocol Inclusion How Phones Become Protocol Enabled Protocol Inclusion Timeline Prison Example Cell Warden - Cost Comparison Key Aspects of Cell Warden

3 Contraband Cell Phones Behind Bars Overview of the Problem From carrier pigeons to drones to body cavities to corrupt correctional officers cell phones have quickly become the newest and most deadly form of contraband found inside prison walls. Tens of thousands are being smuggled into our prisons every year. Bribery, extortion, fraud, identity theft, hit murders, escapes and terrorist activities are being carried out everyday. Death threats to witnesses, judges and prosecuting attorneys have become commonplace. According to Peter Neumann, director of London s International Centre for the Study of Radicalization. "Prisons are very important to extremist movements - prison is often the place where it comes together," Fox News - Prisoners using cell phones coordinated militant attacks from 'Lebanon's Guantanamo'. Jan. 22nd, 2015.

4 The Solution - Cell Warden Prison Protocol Beacon Technology Cell Warden is a Carrier centric, BEACON based cell phone interdiction system specifically designed to win the war on contraband cell phones. Nine and a half years in the making, the 100% solution is the first of its kind to completely eradicate ALL functionality of ALL illegal cell phones when in the restricted safety zones of a correctional compound. ALL functionality means just that NO TALK, NO TEXT, NO , NO WiFi, NO VIDEO, NO CAMERA. The Cell Warden system literally shuts the device down. 100% means ALL cell phones operational across ALL frequencies 2G, 3G, & 4G networks are all included. The system is frontwards compatible meaning that future network advances will automatically be included. The system is simple. A unique prison confined correctional system code is triple broadcast (across 3 frequencies) through strategically placed and overlapping beacons inside a correctional facility. Software protocol instruction (provided via a Carrier system update and continued via firmware embedded by the cell phone manufacturers) will equip all devices with perfect understanding to disable themselves immediately upon beacon recognition. CORRECTIONAL CONFINED SECURITY The Cell Warden system is designed with security at the highest level possible. The Carrier updated protocol is security encrypted and installed at the firmware level. The prison beacons receive their securitized software onsite when connected inline in the Cell Warden 24/7 monitoring system. The beacons are uniquely designed with an electronic erasure that automatically engages if the unit is removed and becomes inactive in the monitoring system in essence turning the device into an empty hardware component. The system is right and the time is now!!!

5 Prison Protocol Beacon Technology Cell Warden - How It Works The Cell Warden Prison Protocol System developed by CELL COMMAND, INC. presets a phone s firmware so the device will operate according to official guidelines when operating within a Restricted Safety Zone inside a Prison Facility. The Cell Warden Prison Protocol System can be applied and updated across all networks for all mobile phones throughout the world. It is operational across the control channel, Wifi, and Bluetooth frequencies, can be precisely programmed down to one meter, radiates no outside molestation and emits zero frequency interference. For the Cell Warden System to be possible, all devices operating across all carrier networks in any given country must be firmware embedded with the Prison Protocol software. The following 5 step process will accomplish this mission: Step 1 - Communication Agency updates Carrier Agreement adding Cell Warden Prison Protocol clause. Step 2 - CCI provides SDK to all wireless Carriers and Phone manufacturers. Step 3 - Carriers upload and Manufacturers add Cell Warden Prison Protocol into all phones. Step 4 - Prisons install PTDB s (Protocol Trigger Device Beacons) in select areas (Restricted Safety Zones). Step 5 - System is activated and all phones in prohibited areas are rendered useless. Once the Cell Warden Prison Protocol is firmware embedded into all phones and the Protocol Trigger Devices (also known as BEACON TRANSMITTERS) are installed in the select areas where cell phone use is prohibited, a prison official simply turns on the system and all phones operating within the restricted safety areas of the prison facility will automatically shut down. The phones will remain non-operational until either they enter an area inside the prison that is not restricted or they exit the prison facility premises altogether. Step 1 Step 2 Step 3 Step 4 Step 5 CW Prison Protocol added to Carrier Agreement CCI provides SDK to Carriers & Phone Mfr s Carriers Upload & Mfr s embed CW Prison Protocol Prisons install PTDB s in Restricted Safety Zones System activation renders phone useless!

6 AT A MINIMUM A NEW TECHNICAL ACT IS NEEDED FCC Assistance = Carrier & Manufacturer Compliance For the Cell Warden Prison Protocol Beacon Technology to be 100% effective, 100% compliance must be achieved. The only way this will occur is for The FCC to establish & indoctrinate a new securitized prison protocol safety standard for the wireless industry. The FCC must issue at a minimum a Technical Specification Act which ALL Carriers and Manufacturers are bound to comply. The new Act will create and establish a new rule with two independent parts. One part will apply to the Carriers and the other part will apply to the Device Manufacturers. The FCC will also establish a migration period with a firm deadline. NEW RULE: A phone is not permitted to access any network unless the phone is safety protocol verified by the carrier. Whenever the phone boots up or attempts to access any carrier network, the network must system check the phone to make sure it is protocol enabled. Part 1 - Carrier Frequency Agreement A new provision will be added to the Carrier Agreement. The provision to be included in the carrier agreement will state that no phone is permitted access to any carrier network that isn t safety protocol enabled. Part 2 - Pertains to manufacturers, importers and distributors A new component requirement will be added to the product certification process for all wireless telecommunication devices. The requirement will state no wireless telecommunication device will receive product certification approval unless the device is firmware embedded with the securitized safety protocol for prisons.

7 PROTOCOL INCLUSION HOW PHONES BECOME PROTOCOL ENABLED 1. The phone will come prison protocol loaded from the manufacturer. (preferred method and eventual be all end all) 2. The phone will receive a system update from the Carrier using FOTA Firmware-Over-The-Air. (The Carrier will perform the system update only after receiving an updated source code containing our protocol from the Mfr.) 3. Consumer may be required to visit Carrier store. The phone will become protocol enabled following a system update via USB hardwire to the manufacturer website. 4. Cell Command will set up a website linked to both manufacturers and carriers. On phones that do not properly receive the FOTA update, Cell Command engineers will provide customer service and support to guide Carrier customers thru a hardwire down load. In the event a customer s phone is so outdated (instances might include old analog phones where the manufacturer is out of business and there is no source code available) we have to be prepared to offer the customer either a used replacement phone or encourage the customer to upgrade their device through their carrier.

8 2 YEAR PROTOCOL INCLUSION TIMELINE Example (To Be Established by the FCC) : FCC issues new regulation including timelines : Carrier supplies to Cell Command complete contact information for all phone manufacturers currently operating on Carrier s network : Cell Command contacts cell phone manufacturers and delivers Software Development Kit (SDK) containing securitized safety protocol for prisons : Existing Phones: Manufacturers will write a source code update and supply the Carrier with the update for FOTA (see Below) : New Phones: All new phones manufactured, imported and/or distributed in the U.S. must be Safety Protocol Enabled. Phones that are not will NOT pass the FCC Product Certification Process and will not be able to access any carrier network : Manufacturer/Cell Command Special Website Link Manufacturers will also be required to either (1) include a website link where existing customers can connect via wired line from their computer to accept a system update for phones unable to accept FOTA (see below), or (2) provide Cell Command the updated source code and Cell Command engineers will offer customer support for the wired update : Carrier - FOTA Firmware-Over-The-Air: This is the process where the carrier will perform a system update to all phones on their network. Between 80% - 90% of phones will be able to be updated over-the-air. Once the update is complete, the carrier will perform a system check and provide Cell Command a complete listing of all phones and manufacturers that were not able to accept the system update. The carrier will send an automated response to the customer stating the security update was not completed properly. The customer will be provided a special call-in number to discuss upgrade options : Carriers must system verify the phone is in good standing (security protocol enabled) prior to granting network access.

9 Prison Fence Line Prison Example Cell Warden Prison Protocol Enabled Phones Understand Restricted Safety Zone Parking Area Prison Fence Line Prison Fence Line ne ed n r n U.S. Penitentiary Phone operates normal outside fence line and limited range devices. Prison Fence Line Limited range Protocol Trigger Device Beacons (PTDB s) are strategically placed inside the prison fences and buildings to broadcast the Restricted Safety Zone prison protocol trigger signal. All phones housing Restricted Safety Protocols (RSP s) will operate according to federal, state & local laws once inside a prison fence line and in range of an Active Protocol Trigger Device. (PTDB s can be programmed 1-20 m) Cell Command, Inc. all rights reserved patent(s) and patent(s) pending.

10 Cell Warden Cost Comparison MEASURE CELL WARDEN BEACON SYSTEM Jamming Systems Managed Access Systems Detect & Locate Systems Installation¹ $0* - $250K $350K - $1.2M $1.2M - $5.2M $350K - $1M Yearly Monitoring On-Site Facility Staff Required $36K $250K $500K $350K NO YES YES YES * With the Cell Warden Beacon System, ZERO to little installation cost to a correctional facility is possible in many circumstances. Here, the Inmate Phone System Provider (ISP) will be encouraged to absorb the fees as implementation of the Cell Warden Beacon System will bring many inmates back onto their system and as such will significantly increase their revenue. In circumstances where there is or will be a WiFi/tablet system in place, Cell Command can actually use that system to broadcast the Cell Warden Beacon bringing the cost down to almost nothing. And in instances where a facility isn t large or complex the Cell Warden mobile beacon may be utilized, again bringing the initial installation cost to almost nothing. VERY IMPORTANT Using the Cell Warden Beacon System, once all phones become protocol enabled, every single correctional facility in the U.S. will immediately have at a minimum the mobile beacon option available to them with ZERO installation cost. ¹Cost sources available upon request.

11 KEY ASPECTS f CE WA DEN Listen, listen, listen was the mantra for the past 9.5 years during the development of Cell Warden - Cell Command s Prison Protocol Beacon Technology System. From this, Cell Command created a unique system to meet the specific requirements of Corrections, the Carriers and the FCC all combined. Requirements of: CORRECTIONS: CARRIERS: FCC: 1. BRICK THE PHONE Disable ALL functionality of the device. 2. LOW COST Must be affordable for ALL correctional facilities. 3. MINIMAL OBSOLESCENCE Industry advancements must NOT hinder system. 1. VOLUNTARY Similar to the WARN ACT. No Mandates. 2. NO FREQUENCY INTERFERENCE Must NOT harm their frequencies in any manner. 3. NO STAFF CONSTRAINTS Once implemented, NO ongoing staff requirements. 1. LEGAL System must not violate the 1934 Telecommunications Act. 2. NO OUTSIDE MOLESTATION System must NOT affect areas outside prison walls OPERATIONAL Emergency calling to 911 must remain available. CONCLUSION: The Cell Warden technology can be implemented with 100% compliance for all the above requirements.

Testimony of Gerard Keegan CTIA. Before the South Carolina Joint Bond Review Special Subcommittee July 26, 2018

Testimony of Gerard Keegan CTIA. Before the South Carolina Joint Bond Review Special Subcommittee July 26, 2018 Testimony of Gerard Keegan CTIA Before the South Carolina Joint Bond Review Special Subcommittee July 26, 2018 On behalf of CTIA, the trade association for the wireless communications industry, thank you

More information

Bi Directional Wireless IR Repeater System User Guide

Bi Directional Wireless IR Repeater System User Guide PRODUCT FEATURES: 1. It works not only as a IR Repeater but also works as a wireless IR Extender 2. Radio Frequency (RF): 915 MHz 3. RF working Range up to 100+ meters in Open Space. 4. IR carrier tuning

More information

SAN IPSE CAPITAL OF SILICON VALLEY

SAN IPSE CAPITAL OF SILICON VALLEY CITY OF C 3 SAN IPSE CAPITAL OF SILICON VALLEY TO: HONORABLE MAYOR AND CITY COUNCIL COUNCIL AGENDA: 10/06/15 ITEM: A.io Memorandum FROM: Kim Walesh SUBJECT: AMENDING THE MASTER DATE: October 2, 2015 AGREEMENT

More information

DEPARTMENT OF LICENSING AND REGULATORY AFFAIRS PUBLIC SERVICE COMMISSION BASIC LOCAL EXCHANGE SERVICE CUSTOMER MIGRATION

DEPARTMENT OF LICENSING AND REGULATORY AFFAIRS PUBLIC SERVICE COMMISSION BASIC LOCAL EXCHANGE SERVICE CUSTOMER MIGRATION DEPARTMENT OF LICENSING AND REGULATORY AFFAIRS PUBLIC SERVICE COMMISSION BASIC LOCAL EXCHANGE SERVICE CUSTOMER MIGRATION (By authority conferred on the public service commission by sections 202 and 213

More information

An ordinance adding Section to CHAPTER 28, MOTOR VEHICLES AND

An ordinance adding Section to CHAPTER 28, MOTOR VEHICLES AND DRAFT 2/14/08 ORDINANCE NO. An ordinance adding Section 28-41.2 to CHAPTER 28, MOTOR VEHICLES AND TRAFFIC, of the Dallas City Code, as amended; prohibiting the use of a hand-held mobile telephone to engage

More information

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way. 1. INTRODUCTION Accesshosting.com's ("AUP") is intended to help enhance the use of the Access Hosting Service by preventing unacceptable use. All users of Accesshosting.com s Access Hosting Services (the

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

Cellular Phone Control System for Prisons and Corrective Services Facilities

Cellular Phone Control System for Prisons and Corrective Services Facilities Cellular Phone Control System for Prisons and Corrective Services Facilities ENGAGE CELLGUARD October 2011 Table of Contents 1 Introduction... 1 2 ENGAGE CELLGUARD Overview... 2 3 ENGAGE CELLGUARD Main

More information

vendor guide CONNECTED DEVICES HELP CONTROL ELECTRICITY USE Smart Meter Connected Devices Service LOOK WHAT YOUR HOME S SMART METER CAN DO FOR YOU

vendor guide CONNECTED DEVICES HELP CONTROL ELECTRICITY USE Smart Meter Connected Devices Service LOOK WHAT YOUR HOME S SMART METER CAN DO FOR YOU vendor guide LOOK WHAT YOUR HOME S SMART METER CAN DO FOR YOU Updated June 2015* CONNECTED DEVICES HELP CONTROL ELECTRICITY USE ComEd is committed to offering information and options to customers so they

More information

Corporate Guideline. Export Compliance Policy

Corporate Guideline. Export Compliance Policy Export Compliance Policy Table of contents EXPORT INFORMATION ON UTIMACO PRODUCTS... 3 GLOBAL EXPORT CONTROLS... 4 GOBAL EXPORT CONTROLS PRODUCT CLASSIFICATION... 5 2 EXPORT INFORMATION ON UTIMACO PRODUCTS

More information

DIGITAL SUBSCRIBER LINE (DSL) SERVICE GUIDE

DIGITAL SUBSCRIBER LINE (DSL) SERVICE GUIDE DIGITAL SUBSCRIBER LINE (DSL) SERVICE GUIDE REGULATIONS, RATES, AND CHARGES Applying to the Provision of DSL For Customers of Wilson Telephone Company, Inc. This DSL Service Guide does not include Internet

More information

DIGITAL SUBSCRIBER LINE (DSL) SERVICE GUIDE

DIGITAL SUBSCRIBER LINE (DSL) SERVICE GUIDE Title Page DIGITAL SUBSCRIBER LINE (DSL) SERVICE GUIDE REGULATIONS, RATES, AND CHARGES Applying to the Provision of DSL For Customers of This DSL Service Guide does not include Internet Access, Content

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance

More information

Wireless-N PCI Adapter User Manual

Wireless-N PCI Adapter User Manual Wireless-N PCI Adapter User Manual V1.0 2010-06-28 FCC Certifications Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class

More information

Complying with RBI Guidelines for Wi-Fi Vulnerabilities

Complying with RBI Guidelines for Wi-Fi Vulnerabilities A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Reserve Bank of India (RBI) guidelines

More information

DIGITAL SUBSCRIBER LINE (DSL) SERVICE GUIDE

DIGITAL SUBSCRIBER LINE (DSL) SERVICE GUIDE Title Page DIGITAL SUBSCRIBER LINE (DSL) SERVICE GUIDE REGULATIONS, RATES, AND CHARGES Applying to the Provision of DSL For Customers of This DSL Service Guide does not include Internet Access, Content

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

focus HAND channel wireless DMX riggers remote Users Manual Software version: 1.0

focus HAND channel wireless DMX riggers remote Users Manual Software version: 1.0 focus HAND 3 512 channel wireless DMX riggers remote Users Manual Software version: 1.0 FocusHAND 3 System description focushand 3 is a wireless remote control unit with a DMX output, to be used for controlling

More information

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo. Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third

More information

Information Technology Standards

Information Technology Standards Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this

More information

Data security statement Volunteers

Data security statement Volunteers Data security statement Volunteers 1 Register controller 2 Contact information for matters pertaining to the handling of personal information 3 Personal data group 4 The purpose for processing personal

More information

QubeVu DimStation XL QUICKSTART GUIDE. FIRMWARE v4.9.4

QubeVu DimStation XL QUICKSTART GUIDE. FIRMWARE v4.9.4 QubeVu DimStation XL QUICKSTART GUIDE FIRMWARE v4.9.4 SAFETY AND REGULATORY INFORMATION Regulatory Information This product is a Class 1 Laser Product according to IEC 60825-1:2007 Ed. 2.0 and complies

More information

CUSTOMER COMPLIANCE IN A NON-TECHNICAL CONTEXT Dileep John Middle Manager Energy & Revenue Losses Eskom South Africa

CUSTOMER COMPLIANCE IN A NON-TECHNICAL CONTEXT Dileep John Middle Manager Energy & Revenue Losses Eskom South Africa CUSTOMER COMPLIANCE IN A NON-TECHNICAL CONTEXT Dileep John Middle Manager Energy & Revenue Losses Eskom South Africa CONTEXT: ELECTRICITY THEFT: A GLOBAL THREAT FEATURES AMONG TOP 10 CRIMES GLOBALLY FORMS

More information

2 University International Medical University

2 University International Medical University POLICY OWNER : Information Technology Services TITLE : Document Code : IMU/POL/ITS/09 Edition : 1 Approval Body : Management Approval : 03/05/17 Committee Date Effective Date : 03/05/17 Pages : 6 1.0 OBJECTIVE

More information

BTH-808 WIRELESS BLUETOOTH HEADSET USER S MANUAL

BTH-808 WIRELESS BLUETOOTH HEADSET USER S MANUAL BTH-808 WIRELESS BLUETOOTH HEADSET USER S MANUAL 1. INTRODUCTION The headset BTH-808 is the ultimate hands-free and wire-free solution that connects your mobile phones to your headset via Bluetooth radio

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

HS6000 Wireless Headset

HS6000 Wireless Headset HS6000 Wireless Headset OPERATING INSTRUCTIONS SETUP Power On/Off To turn the power on Press and release the power button on the inside of the headset housing, shown in Figure 1. A voice message in the

More information

Tabel of Content. What s in the Box 01. Feature Introduction 02. Setting Up the Camera and Monitor 03. Replacing the Camera lens 11.

Tabel of Content. What s in the Box 01. Feature Introduction 02. Setting Up the Camera and Monitor 03. Replacing the Camera lens 11. Tabel of Content What s in the Box 01 Feature Introduction 02 Setting Up the Camera and Monitor 03 Replacing the Camera lens 11 Safety 12 Customer service 15 What s in the Box Feature Introduction Monitor

More information

FCWnx 7.7 Upgrade Manual

FCWnx 7.7 Upgrade Manual FCWnx 7.7 Upgrade Manual P/N 460645003A 09AUG11 Copyright Disclaimer Trademarks and patents Intended use FCC compliance Certification and compliance 2011 UTC Fire & Security. All rights reserved. This

More information

Professional HD Security Camera

Professional HD Security Camera Professional HD Security Camera 5MP HD Bullet Camera EN INSTRUCTION MANUAL 1 Welcome Congratulations on your purchase of the Swann 5MP Professional HD Security Camera. You ve made a fine choice for keeping

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

1. Package contents. 2. Connecting ADSL modem and wireless router

1. Package contents. 2. Connecting ADSL modem and wireless router 1. Package contents WL-500W wireless router x 1 Power adapter x 1 Utility CD x 1 RJ45 cable x 1 Quick Start Guide x 1 2. Connecting ADSL modem and wireless router 1) Cable connection Wall power outlet

More information

New Zealand Telecommunications Forum. Code for Vulnerable End Users of Telecommunication Services. ( Vulnerable End User Code )

New Zealand Telecommunications Forum. Code for Vulnerable End Users of Telecommunication Services. ( Vulnerable End User Code ) New Zealand Telecommunications Forum Code for Vulnerable End Users of Telecommunication Services ( Vulnerable End User Code ) Code Status: Code Classification: Date: Review Status: For Public Consultation

More information

Internet, , and Computer Usage Policy

Internet,  , and Computer Usage Policy Important disclaimer: The policy available on this page is only an example and is furnished merely as an illustration of its category. It is not meant to be taken and used without consultation with a licensed

More information

Revisions to the Right-of-Way Management Ordinance for Wireless Providers Implementing SB1004

Revisions to the Right-of-Way Management Ordinance for Wireless Providers Implementing SB1004 Revisions to the Right-of-Way Management Ordinance for Wireless Providers Implementing SB1004 Economic Development & Housing Committee August 21, 2017 Don Knight, Senior Assistant City Attorney Rick Galceran,

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

CHARTER TOWNSHIP OF ALLENDALE, OTTAWA COUNTY, MICHIGAN WIRELESS COMMUNICATION FACILITIES APPLICATION

CHARTER TOWNSHIP OF ALLENDALE, OTTAWA COUNTY, MICHIGAN WIRELESS COMMUNICATION FACILITIES APPLICATION CHARTER TOWNSHIP OF ALLENDALE, OTTAWA COUNTY, MICHIGAN WIRELESS COMMUNICATION FACILITIES APPLICATION This application is to be completed in compliance with Article 25 of the Charter Township of Allendale

More information

TERMS AND CONDITIONS

TERMS AND CONDITIONS TERMS AND CONDITIONS BACKGROUND: This agreement applies as between you, the User of this Website and IT Works (Scotland) Ltd, the owner(s) of this Website. Your agreement to comply with and be bound by

More information

Data Centre Security. Presented by: M. Javed Wadood Managing Director (MEA)

Data Centre Security. Presented by: M. Javed Wadood Managing Director (MEA) Data Centre Security Presented by: M. Javed Wadood Managing Director (MEA) EPI history and global locations UK origin, 1987 Singapore office, 1999 9 EPI offices worldwide Global partner network spanning

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

The RAD Getting Started Guide

The RAD Getting Started Guide The RAD Getting Started Guide The RAD Getting Started Guide i ii The RAD Getting Started Guide The RAD Getting Started Guide Published by: SentriLock, LLC Copyright 2012 by SentriLock, LLC All rights reserved.

More information

ISSP Network Security Plan

ISSP Network Security Plan ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...

More information

Federal Communications Commission (FCC) Statement

Federal Communications Commission (FCC) Statement FCC Information This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept

More information

i9 MID User Manual ShenZhen Ramos Digital Technology Co.,Ltd

i9 MID User Manual ShenZhen Ramos Digital Technology Co.,Ltd i9 MID User Manual ShenZhen Ramos Digital Technology Co.,Ltd 1 Thank you for your choosing and buying the i9 tablet. Please carefully read this operation manual before using the product. Precautions 1.

More information

PTT-100-VZ Wireless Speaker Microphone

PTT-100-VZ Wireless Speaker Microphone Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits

More information

MO-01J. Quick Start Guide

MO-01J. Quick Start Guide MO-01J Quick Start Guide 1 LEGAL INFORMATION Copyright 2016 ZTE CORPORATION. All rights reserved. No part of this publication may be quoted, reproduced, translated or used in any form or by any means,

More information

Information technology security and system integrity policy.

Information technology security and system integrity policy. 3359-11-10.3 Information technology security and system integrity policy. (A) Need for security and integrity. The university abides by and honors its long history of supporting the diverse academic values

More information

CDMA2000-1X Tracker GL300VC. User Manual. Application Notes: TRACGL300VCUM001 Revision:

CDMA2000-1X Tracker GL300VC. User Manual. Application Notes: TRACGL300VCUM001 Revision: CDMA2000-1X Tracker GL300VC User Manual Application Notes: TRACGL300VCUM001 Revision: 1.00 http://www.queclink.com sales@queclink.com Document Title GL300VC User manual Version 1.00 Date 2014-11-15 Status

More information

WiMAX Forum Trademark Policy and Trademark Usage Guidelines Part 1 WiMAX. Adopted March 27, 2007; Amended September 6, 2007

WiMAX Forum Trademark Policy and Trademark Usage Guidelines Part 1 WiMAX. Adopted March 27, 2007; Amended September 6, 2007 Introduction. WiMAX Forum Adopted March 27, 2007; Amended September 6, 2007 This policy provides usage guidelines and requirements for WiMAX. WiMAX is a trademark and service mark of the WiMAX Forum. As

More information

WELLSBORO AREA SCHOOL DISTRICT

WELLSBORO AREA SCHOOL DISTRICT No. 815.2 SECTION: OPERATIONS WELLSBORO AREA SCHOOL DISTRICT TITLE: DISTRICT-ISSUED LAPTOPS: STUDENT USE, RIGHTS, AND RESPONSIBILITIES ADOPTED: April 14, 2015 REVISED: October 7, 2015 815.2. DISTRICT-ISSUED

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

Models Aruba AT-BT pack of Battery Powered Asset Tracking Bluetooth Beacons

Models Aruba AT-BT pack of Battery Powered Asset Tracking Bluetooth Beacons Overview BLE-Powered Asset Tracking Models Aruba AT-BT10-50 50-pack of Battery Powered Asset Tracking Bluetooth Beacons JX987A Product overview (or tags ) are a key component of the Aruba Location Services

More information

Supertooth One Users manual

Supertooth One Users manual Supertooth One Users manual Bluetooth Handsfree Kit For Bluetooth Mobile Phones A. Product Description SUPERTOOTH ONE is a Bluetooth handsfree kit that supports headset or handsfree profile phones. Its

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents

More information

Decommissioning Legacy Networks

Decommissioning Legacy Networks Decommissioning Legacy Networks How Vertix Consulting Helped a Top US Wireless Carrier Decommission Its CDMA Network in Mexico for Future LTE Deployments THE CHALLENGE A major carrier in Mexico was in

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

RMU-IT-SEC-01 Acceptable Use Policy

RMU-IT-SEC-01 Acceptable Use Policy 1.0 Purpose 2.0 Scope 2.1 Your Rights and Responsibilities 3.0 Policy 3.1 Acceptable Use 3.2 Fair Share of Resources 3.3 Adherence with Federal, State, and Local Laws 3.4 Other Inappropriate Activities

More information

Communication and Usage of Internet and Policy

Communication and Usage of Internet and  Policy Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority

More information

Don t plug me in just yet.

Don t plug me in just yet. Easy Transfer Cable for Windows 7 Don t plug me in just yet. We need to do a few things first to get your computers ready to transfer your files and user accounts. Quick Start Guide F5U279 i 1 Prepare

More information

Health & Safety and Warranty Guide. Please read this manual before operating your device and keep it for future reference.

Health & Safety and Warranty Guide. Please read this manual before operating your device and keep it for future reference. A N D R O I D T A B L E T Health & Safety and Warranty Guide Please read this manual before operating your device and keep it for future reference. Legal Information Important legal information can be

More information

TITLE SOCIAL MEDIA AND COLLABORATION POLICY

TITLE SOCIAL MEDIA AND COLLABORATION POLICY DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the

More information

WiFi PODZ & Battery Booster Kit Quick Start Guide

WiFi PODZ & Battery Booster Kit Quick Start Guide WiFi PODZ & Battery Booster Kit Quick Start Guide WiFi PODZ & Battery Booster Kit Quick Start Guide EN 1. Getting to know your WiFi PODZ and BatterBooster ion WiFi PODZ provides the wireless capability

More information

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources

More information

TECHNICAL MANUAL CHEETAH V5 DVI MODULES

TECHNICAL MANUAL CHEETAH V5 DVI MODULES TECHNICAL MANUAL CHEETAH V5 DVI MODULES Publication: 81-9059-0611-0, Rev. E September, 2008 Thank You!! for purchasing your new V5 System from QuStream. We appreciate your confidence in our products. QuStream

More information

Wireless Communication Stipend Effective Date: 9/1/2008

Wireless Communication Stipend Effective Date: 9/1/2008 Category: Financial Policy applicable for: Faculty/Staff Policy Title: Policy Number: Wireless Communication Stipend Effective Date: 9/1/2008 Enabling Act(s) IRS rule 2.1.7 Policy Owner: Sr. VP for Administration

More information

telensa.com @Telensa Telensa is the only firm monetizing multiple IoT applications including smart lighting and smart parking. We deliver ultra-scalable, private network solutions through Ultra Narrow

More information

Wall Controller WALLC

Wall Controller WALLC Wall Controller WALLC Quick Start Please refer to the chapters below for detailed information about all aspects of the products usage. The device operates in normal control mode or in management mode.

More information

User Guide Wireless Charging Plate DT-903

User Guide Wireless Charging Plate DT-903 User Guide Wireless Charging Plate DT-903 Issue 1.0 EN User Guide Wireless Charging Plate DT-903 Contents Safety 3 About your accessory 4 Keys and parts 5 Charge your phone 6 Get notifications 7 About

More information

Contents. Get Started Install SIM Card

Contents. Get Started Install SIM Card Contents Get Started... 2 Install SIM Card... 2 Insert Micro SD card... 2 Charge Mobile Phone... 3 PC-Phone File Transfer... 4 Keys and Parts... 5 Fingerprint... 7 Lock and Unlock the Screen... 9 Notification

More information

DIAMOND ELITE SERIES USERS GUIDE

DIAMOND ELITE SERIES USERS GUIDE DIAMOND ELITE SERIES USERS GUIDE COVERS MODELS L2-E L2S-E L2-5E L2S-5E L2-10E L2S-10E DIAMOND ELITE SERIES TELEPHONE DIAGRAM Hold Key Line 1 Line 2 Conference Key Handset Holder Ringer Volume Control Data

More information

WHAT YOU LL NEED TO BEGIN:

WHAT YOU LL NEED TO BEGIN: W ipnet INSTALLATION GUIDE v1.1 WHAT YOU LL NEED TO BEGIN: THE PARTS WiPNET or WiPNET WiFi* WiPLOCK Filter (as needed) OR WiPNET MoCA Amplifier-Splitter (suggested) Surface Mount (as needed) Low Voltage

More information

Summary Comparison of Current Data Security and Breach Notification Bills

Summary Comparison of Current Data Security and Breach Notification Bills Topic S. 117 (Nelson) S. (Carper/Blunt) H.R. (Blackburn/Welch) Comments Data Security Standards The FTC shall promulgate regulations requiring information security practices that are appropriate to the

More information

Opportunity Lives Here

Opportunity Lives Here Opportunity Lives Here Southern Virginia Higher Education Center Policy Policy # 4107 Policy Title: INFORMATION TECHNOLOGY (IT) PHYSICAL ACCESS CONTROL POLICY Responsible Oversight Director: Chief Finance

More information

Security SSID Selection: Broadcast SSID:

Security SSID Selection: Broadcast SSID: 69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will

More information

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. Gramm Leach Bliley Act 15 U.S.C. 6801-6809 GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 11/30/2016 1 Objectives for GLBA Training GLBA Overview Safeguards Rule

More information

Service Specific Terms & Conditions

Service Specific Terms & Conditions These Service Specific Terms and Conditions together with the General Terms and Conditions apply when We provide Service to You. You are deemed to have accepted these Service Specific Terms and Conditions

More information

Office for Capital Facilities Guidance Document

Office for Capital Facilities Guidance Document Guidance Document September 17, 2018 Telecommunications Site Manager Agreement A reference guide to assist in the use of the NYS Police Crown Castle Telecommunications Agreement Contents Overview Benefits

More information

Homologation of telecommunication equipment experience in India Vineet Verma Director, Department of Telecom India

Homologation of telecommunication equipment experience in India Vineet Verma Director, Department of Telecom India Conformity and Interoperability regimes of Telecommunication/ICT equipment in [India] Homologation of telecommunication equipment experience in India Vineet Verma Director, Department of Telecom India

More information

ZIPATILE. Quick Start Guide v.1.3

ZIPATILE. Quick Start Guide v.1.3 ZIPATILE Quick Start Guide v.1.3 8 screen SD card HD camera 1.0 INSTALLATION Thank you for purchasing ZipaTile. ZipaTile is the complete home control and automation system in a form of a single device.

More information

USER MANUAL FOR MF0200 GATEWAY BOX VERSION 2.0

USER MANUAL FOR MF0200 GATEWAY BOX VERSION 2.0 USER MANUAL FOR MF0200 GATEWAY BOX VERSION 2.0 COPYRIGHT & TRADEMARKS 2016 Mentor Graphics Corporation, all rights reserved. This document contains information that is proprietary to Mentor Graphics Corporation

More information

PENN MANOR SCHOOL DISTRICT

PENN MANOR SCHOOL DISTRICT No. 815.2 SECTION: OPERATIONS PENN MANOR SCHOOL DISTRICT TITLE: DISTRICT-ISSUED LAPTOPS: STUDENT USE, RIGHTS, AND RESPONSIBILITIES ADOPTED: August 19, 2013 REVISED: April 20, 2015 815.2. DISTRICT-ISSUED

More information

Writer Corporation. Data Protection Policy

Writer Corporation. Data Protection Policy Writer Corporation Data Protection Policy 1. Introduction The Data Protection Policy (DPP) lays a solid foundation for the development and implementation of secure practices within Writer Corporation (the

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

CHAPTER WIRELESS TELECOMMUNICATION FACILITIES

CHAPTER WIRELESS TELECOMMUNICATION FACILITIES CHAPTER 19.85 WIRELESS TELECOMMUNICATION FACILITIES Section 19.85.010 PURPOSE 19.85.020 DEFINITIONS 19.85.030 APPLICABILITY 19.85.040 STANDARDS FOR WIRELESS TELECOMMUNICATION FACILITIES 19.85.050 LOCATIONAL

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

VOIP in the TAL group. June 15 th, 2005 Buenos Aires, Argentina

VOIP in the TAL group. June 15 th, 2005 Buenos Aires, Argentina VOIP in the TAL group June 15 th, 2005 Buenos Aires, Argentina IP Telephony: IP Telephony shall be defined as the SERVICE and PROTOCOL suite associated with the transport of voice communication over the

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

TransTalk 9000 Digital Wireless System. MDW 9031/9031DCP Dual Zone Wireless Pocket Phone Quick Reference

TransTalk 9000 Digital Wireless System. MDW 9031/9031DCP Dual Zone Wireless Pocket Phone Quick Reference TransTalk 9000 Digital Wireless System MDW 9031/9031DCP Dual Zone Wireless Pocket Phone Quick Reference Document No. Comcode 108484023 Issue 2 April 1999 Copyright 1999 by Lucent Technologies. All rights

More information

Decommissioning Legacy Networks

Decommissioning Legacy Networks ERTIX Consulting Decommissioning Legacy Networks How Vertix Consulting Helped a Top US Wireless Carrier Decommission Its CDMA Network in Mexico for Future LTE Deployments ERTIX Consulting Decommissioning

More information

Farmers Mutual Telephone Company. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and

Farmers Mutual Telephone Company. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and Farmers Mutual Telephone Company Broadband Internet Access Services Network Management Practices, Performance Characteristics, and Commercial Terms and Conditions for Fixed Services Farmers Mutual Telephone

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

XO SITE SECURITY SERVICES

XO SITE SECURITY SERVICES XO SITE SECURITY SERVICES 1.0 Product and Services 1.1 Product Description. XO Site Security (the "Service") is a managed security service which uses Premises-based, multi-threat sensing Customer Premises

More information

CITY MANAGER MEMORANDUM. The Honorable Mayor Partington and City Commissioners

CITY MANAGER MEMORANDUM. The Honorable Mayor Partington and City Commissioners 8.I City Manager 22 S. Beach Street Ormond Beach Florida 32174 (386) 676-3200 Fax (386) 676-3384 CITY MANAGER MEMORANDUM To: Through: From: The Honorable Mayor Partington and City Commissioners Joyce A.

More information

OSSIA: LICENSE COTA TECHNOLOGY FAQ

OSSIA: LICENSE COTA TECHNOLOGY FAQ OSSIA: LICENSE COTA TECHNOLOGY FAQ TM COTA LICENSE OVERVIEW What does it mean to license Cota wireless power technology? With Cota, you ll leverage the world s first global standard in wireless power,

More information

Introduction. Package Contents. System Requirements

Introduction. Package Contents. System Requirements VP6230 Page 1 Page 2 Introduction Congratulations on your purchase of the Blu-Link Folding Bluetooth Keyboard. This innovative portable folding keyboard connects via Bluetooth technology to provide a wireless

More information

Craig J. Nichols, Secretary

Craig J. Nichols, Secretary Craig J. Nichols, Secretary Gainesville, FL Nov. 5, 2014 Interim Solution Text-to-911 Text messaging using Short Message Service (SMS) is the common technology method On Dec. 6, 2012 AT&T, Verizon, Sprint

More information

User Manual. eufy Security SpaceView Baby Monitor

User Manual. eufy Security SpaceView Baby Monitor User Manual Anker Innovations Limited. All rights reserved. Eufy and the Eufy logo are trademarks of Anker Innovations Limited, registered in the United States and other countries. All other trademarks

More information

OUTDATED. Policy and Procedures 1-12 : University Institutional Data Management Policy

OUTDATED. Policy and Procedures 1-12 : University Institutional Data Management Policy Policy 1-16 Rev. Date: May 14, 2001 Back to Index Subject: WORLD WIDE WEB RESOURCES POLICY PURPOSE To outline the University's policy for students, faculty and staff concerning the use of the University's

More information

PART 8 - Miscellaneous Services Original Sheet 1 SECTION 10 - Travel and Transportation Information Services

PART 8 - Miscellaneous Services Original Sheet 1 SECTION 10 - Travel and Transportation Information Services PART 8 - Miscellaneous Services Original Sheet 1 8.10.1 AT&T 211 A. DESCRIPTION AT&T 211 is a service that allows local exchange end users to reach the 211 provider (Customer) by dialing an abbreviated

More information