2017 HSC Information and Digital Technology Networking and Hardware Marking Guidelines
|
|
- George Adams
- 5 years ago
- Views:
Transcription
1 2017 HSC Information and Digital Technology Networking and Hardware Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 A 3 B 4 D 5 C 6 B 7 D 8 D 9 C 10 A 11 A 12 D 13 B 14 C 15 C 16 A 17 A 18 D 19 C 20 B 1
2 Section II Question 21 (a) Identifies the purpose of a file extension and provides an example 2 Identifies the purpose of a file extension OR 1 Provides an example A file extension identifies the application required to open the particular file, eg.doc. Question 21 (b) Outlines TWO accessibility features of an operating system 2 Outlines ONE accessibility feature of an operating system OR Names TWO accessibility features Text to speech narration allows people with visual impairments to access written text by having it read out loud. Sticky keys makes it possible to use keyboard shortcuts without needing to press more than one key at once. Magnifier Voice control. 1 2
3 Question 21 (c) Explains the effect that the convergence of technologies has had on the ICT industry 4 Provides relevant examples Outlines the effect that the convergence of technologies has had on the ICT industry 3 Provides at least one relevant example Identifies some features of the convergence of technologies OR 2 Outlines ONE features of the convergence of technologies Shows a basic understanding of convergence 1 The incorporation of multiple functions within a single device has led to major changes in the ICT industry. Devices are now more complex and greater training is required for staff providing service and support for these devices. It has also led to a growth in the demand for software applications that run on mobile platforms. For example the smartphone usually includes a camera, a GPS, web browsing, ecommerce payment facilities, music, video and game player as well as a telephone. Other examples include multi-function printers that also scan, fax and copy. Question 22 Provides a description of the role of SafeWork NSW 2 Identifies a function of SafeWork NSW 1 SafeWork NSW is responsible for providing advice to organisations on improving work health and safety, investigating workplace incidents and enforcing WHS laws in NSW. Its main purpose is to help organisations to meet their WHS obligations. Licensing and registration for dangerous work. 3
4 Question 23 (a) Explains how a business may be affected by malicious software 2 Provides some relevant information 1 Malicious software such as viruses can cause corruption of files, leading to employee downtime or inability to work effectively while repairs are made. Data loss Security breaches Slow loading times / processing speeds. Question 23 (b) Provides a list of relevant troubleshooting steps 3 Identifies some relevant troubleshooting steps 2 Identifies a relevant troubleshooting step 1 Check: there is power to the device the keyboard is plugged in username and password are correct Caps Lock key not on Wi-Fi on / network connectivity cable in server is running networking equipment proxy settings if applicable. 4
5 Question 24 (a) Outlines TWO relevant factors 2 Outlines ONE relevant factor OR identifies relevant factors 1 To ensure adequate signal strength, the distance between the router and the furthest user should be less than 30 metres and the path between users and the router should have minimum obstacles, eg walls. Number of users Physical placement eg ceiling Power over ethernet Proximity to power / data points. Question 24 (b) Identifies circumstances when satellite is the most effective option for a SOHO to access the internet Identifies a circumstance when satellite is effective for a SOHO to access the internet 2 1 Office may be in a remote or rural area where other services may not be available, eg NBN, fibre, ADSL. Office may be in an area where the cost of such other services is prohibitive. 5
6 Question 24 (c) Explains how the long-term reliability of networked desktop computers 4 can be improved Outlines how the long-term reliability of networked desktop computers 3 can be improved Outlines a way of improving the long-term reliability of desktop computers OR 2 Identifies ways of improving the long-term reliability of desktop computers Identifies a way of improving the long-term reliability of desktop 1 computers Regular updates of operating system software to overcome security vulnerabilities and be compatible with relevant hardware and software. Use preventative maintenance tools such as defrag, disk cleanup and check disk to maintain efficiency of the hard drive. Ensure antivirus updates and scans are regularly performed to identify and remove potential threats. Ensure hardware components are kept appropriately clean and free of dust and dirt to prevent physical damage. Question 25 Explains the role of port assignment when configuring a firewall 3 Shows some understanding of port assignment and/or firewalls 2 Provides some relevant information 1 Individual software applications require specific ports to be available in order to operate, eg Port 80 is used by HTTP. Ports that are not required are normally closed to reduce the risk of unauthorised access or virus activity. 6
7 Question 26 Clearly shows how Bluetooth and Wi-Fi technologies are different 4 Identifies features of Bluetooth and Wi-Fi technologies showing some 3 understanding of their differences Identifies features of Bluetooth and/or Wi-Fi technologies 2 Identifies a feature of Bluetooth or Wi-Fi 1 Bluetooth is normally one-to-one connection and Wi-Fi is capable of a one-to-many connection. Bluetooth has a simple authentication with low security whereas Wi-Fi has more security options. Wi-Fi allows for file sharing between devices on the same network. Bluetooth (V4) is capable of long-range connections and higher data rates. Older versions (BR/EDR V2) of Bluetooth had a shorter range than Wi-Fi and were often used for streaming audio. Bluetooth (BR/EDR V2) uses a lower bandwidth that makes data transfer slower than Wi-Fi. 7
8 Section III Question 27 (a) Explains the benefits of entering into a vendor contract for the company 3 Shows some understanding of vendor contracts 2 Provides some relevant information 1 A benefit of a vendor contract is guaranteed support from the specific supplier within an agreed timeframe. Usually a specific technician is assigned to your business for continuity and familiarity. Also training is provided to users to allow them to quickly troubleshoot common problems. Preferential pricing (discounts) Replacement of faulty parts/equipment Software/product customisation. Question 27 (b) Explains how to efficiently achieve the required file sharing 4 Outlines how to achieve the required file sharing 3 Shows some understanding of file sharing 2 Provides some relevant information 1 Appropriate groups need to be created, for example staff and managers. A shared folder needs to be created on a network drive. The file needs to be saved in this shared folder and staff group members are allocated read only permission while members of the managers group have full permissions that allow them read/write/delete access. 8
9 Question 27 (c) Outlines ways to reduce problems with the printer showing thorough understanding of the issues indicated by the log 8 Justifies all the ways Outlines ways to reduce problems with the printer showing sound understanding of the issues indicated by the log 6 7 Justifies some of the ways Identifies ways to reduce problems with the printer in the scenario 4 5 Provides some justification for at least one of the ways Shows some understanding of how to reduce printer problems 2 3 Provides some relevant information 1 Page count (approximately 5000 per week) is too high for a small laser printer. This results in frequent toner cartridge changes. Moving to a higher capacity printer would enable longer periods between cartridge changes and lower maintenance costs. Toner cartridges are needed frequently yet each time they are required, a member of the service staff is required to order a single replacement. This means that the printer is unavailable for up to three days. Estimating the usage and ensuring there is always an adequate stock of cartridges on hand would reduce the downtime. A networked printer would be able to alert support staff when consumables such as toner and drums would need to be replaced. This would enable service staff to be proactive and undertake the replacements prior to the toner becoming exhausted. There appears to be no regular preventative maintenance taking place on this printer. If this was implemented issues such as drum replacement and cleaning could be undertaken before they cause the printer to fail. 9
10 Section IV Question 28 Addresses all components of the question Provides a cohesive, well-reasoned, sequenced response that reflects a high level of organisation, judgement, synthesis and problem-solving skills Demonstrates an in-depth understanding of how to raise awareness on the importance of consultation and participation in WHS processes with reference to the scenario Consistently uses relevant industry terminology Addresses most components of the question Provides a reasoned, sequenced response that reflects a high level of organisation and problem-solving skills Demonstrates a detailed understanding of how to raise awareness on the importance of consultation and participation in WHS processes with reference to the scenario Uses relevant industry terminology Addresses the majority of the components of the question Provides a response displaying sound organisation and problem-solving skills Demonstrates a sound understanding of how to raise awareness on the importance of consultation and participation in WHS processes with reference to the scenario Uses some relevant industry terminology Addresses some components of the question Provides a response displaying some organisation and problem-solving skills Demonstrates some understanding of how to assist the organisation in the scenario Addresses at least one component of the question Provides a response displaying basic organisation Demonstrates a basic understanding of concerns in the scenario Facilitate a supportive workplace culture Cater for the needs of people with disabilities Address language and literacy levels of participants Promote a systematic approaches to work Improve poor communication skills Cater for cultural differences Encourage communication between workers on different shifts Improve workplace procedures Understand employer and staff roles and responsibilities relating to WHS Need to comply with WHS regulations. 10
11 2017 HSC Information and Digital Technology Networking and hardware Mapping Grid Section I Question HSC content focus area Section II 1 1 (Mandatory) Working in the industry nature of the industry page (Mandatory) Safety safe work practices and procedures pages (Mandatory) Operating system software operating systems page (Mandatory) Operating system software operating systems page (Mandatory) Diagnostic testing troubleshooting page (Mandatory) Safety risk management page (Mandatory) Diagnostic testing destructive and malicious software protection pages (Mandatory) Operating system software operating systems page (Mandatory) Working in the industry nature of the industry page (Mandatory) Diagnostic testing preventative maintenance page (Stream) Networking and hardware components, protocols and standards page 48 (Stream) Networking and hardware components, protocols and standards page (Stream) Networking and hardware network security page (Stream) Networking and hardware network security page (Stream) Networking and hardware determining requirements page 49 (Stream) Networking and hardware components, protocols and standards page 49 (Stream) Networking and hardware components, protocols and standards page (Stream) Networking and hardware network security page (Stream) Networking and hardware network and hardware testing page 51 (Stream) Networking and hardware network and hardware testing page 51 Question HSC content focus area 21 (a) 2 21 (b) 2 (Mandatory) Operating system software configuring an operating system page 30 (Mandatory) Operating system software selecting an operating system page (c) 4 (Mandatory) Working in the industry nature of the industry page (Mandatory) Safety WHS page (a) 2 (Mandatory) Diagnostic testing client business context page (b) 3 (Mandatory) Diagnostic testing troubleshooting page 45 11
12 24 (a) 2 24 (b) 2 24 (c) (Stream) Networking and hardware network and hardware installation page 50 (Stream) Networking and hardware determining requirements page 49 (Stream) Networking and hardware network and hardware installation page 50 (Stream) Networking and hardware components, protocols and standards page 49 (Stream) Networking and hardware components, protocols and standards page 49 Section III Question HSC content focus area 27 (a) 3 (Stream) Networking and hardware provision of client/user support services page (b) 4 (Stream) Networking and hardware network security page (c) 8 (Stream) Networking and hardware documentation, logs of client/user problems page 52 Networking and hardware provision of client/user support services page 52 Section IV Question HSC content focus area (Mandatory) Working in the industry working with others pages (Mandatory) Safety WHS consultation and participation page 39 12
2017 HSC Information and Digital Technology Web and Software Applications Marking Guidelines
2017 HSC Information and Digital Technology Web and Software Applications Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 A 3 B 4 D 5 C 6 B 7 D 8 D 9 C 10 A 11 A 12 B 13 D
More information2016 HSC Information and Digital Technology Networking and hardware Marking Guidelines
2016 HSC Information and Digital Technology Networking and hardware Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 B 3 A 4 D 5 A 6 D 7 B 8 A 9 B 10 C 11 B 12 C 13 A 14 C
More information2016 HSC Information and Digital Technology Web and software applications Marking Guidelines
2016 HSC Information and Digital Technology Web and software applications Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 B 3 A 4 D 5 A 6 D 7 B 8 A 9 B 10 C 11 C 12 D 13 C
More information2013 HSC Information Technology Marking Guidelines
201 HSC Information Technology Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 A 2 B D 4 A 5 C 6 B 7 D 8 B 9 B 10 D 11 C 12 A 1 C 14 A 15 C 1 Section II Question 16 (a) Identifies
More informationInformation and Digital Technology
2017 HIGHER SCHOOL CERTIFICATE EXAMINATION Information and Digital Technology Web and software applications General Instructions Reading time 5 minutes Working time 2 hours Write using black pen NESA approved
More informationESKIUMD2 (SQA Unit Code - F9AA 04) Using mobile IT devices
Overview This is the ability to set up and use mobile or handheld devices such as a smartphone, PDA, portable media player, electronic organiser or data logger, for data capture, processing, exchange and
More informationUMD: Using mobile IT devices
UMD: Using mobile IT s This is the ability to set up and use mobile or handheld s such as a smartphone, PDA, portable media player, electronic organiser or data logger, for data capture, processing, exchange
More informationBCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1. Version 5.0
BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1 Version 5.0 March 2009 2.1 Operating System 2.2 File Management 2.1.1 First Steps 2.1.1.1 Start the computer
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationA practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
More informationData protection policy
Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees
More informationSAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2
APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,
More informationData protection. 3 April 2018
Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd
More information<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device
More informationTo use centralised systems for remote control of computers and deployment of software, system images and security updates.
JOB DESCRIPTION POST: First Line Support Desk Analyst GRADE: Support Staff Grade 2/3 RESPONSIBLE TO: KEY PURPOSE: IT Manager To work as part of the ilrc team to provide on-going proactive technical and
More informationControls Electronic messaging Information involved in electronic messaging shall be appropriately protected.
I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To
More informationMobile Working Policy
Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of
More informationThe essential guide to creating a School Bring Your Own Device Policy. (BYOD)
The essential guide to creating a School Bring Your Own Device Policy. (BYOD) Contents Introduction.... 3 Considerations when creating a BYOD policy.... 3 General Guidelines for use (Acceptable Use Policy)....
More informationEnviro Technology Services Ltd Data Protection Policy
Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:
More informationGUIDANCE ON ELECTRONIC VOTING SYSTEM PREPARATION AND SECURITY
September, 2016 GUIDANCE ON ELECTRONIC VOTING SYSTEM PREPARATION AND SECURITY As a reminder for counties, and refresher on good cyber hygiene practices, DOS recommends the following procedures in the preparation
More informationCompTIA A+ Accelerated course for & exams
CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is
More information2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY
2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on
More informationUKIP needs to gather and use certain information about individuals.
UKIP Data Protection Policy Context and overview Key details Policy Update Prepared by: D. Dennemarck / S. Turner Update approved by Management on: November 6, 2015 Policy update became operational on:
More informationGet to know your Modem 1. Modem Technical Overview 3
User Manual Get to know your Modem 1 Modem Technical Overview 3 Managing your Modem Settings How to view your Modem settings 5 Understanding the front page 6 Changing your Modem login password 7 Upgrading
More informationLakeshore Technical College Official Policy
Policy Title Original Adoption Date Policy Number Information Security 05/12/2015 IT-720 Responsible College Division/Department Responsible College Manager Title Information Technology Services Director
More informationData Protection Policy
Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please
More informationCyber Security Guidelines for Public Wi-Fi Networks
Cyber Security Guidelines for Public Wi-Fi Networks Version: 1.0 Author: Cyber Security Policy and Standards Document Classification: PUBLIC Published Date: April 2018 Document History: Version Description
More informationUnit 11: Computer Networks
Unit 11: Computer Networks Level: 1 and 2 Unit type: Mandatory or Optional specialist Guided learning hours: 60 Assessment type: Internal Unit introduction Computer networking is an important part of our
More informationNDIS Quality and Safeguards Commission. Incident Management System Guidance
NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationPUPIL ICT ACCEPTABLE USE POLICY
PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status
More informationSetting up an IT Network
Unit 16: Setting up an IT Network Unit code: M/601/3274 QCF Level 2: BTEC Specialist Credit value: 10 Guided learning hours: 60 Aim and purpose This unit enables learners to understand the role of IT networks
More informationDepartment of Public Health O F S A N F R A N C I S C O
PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:
More informationPolicy. London School of Economics & Political Science. Network Connection IMT. Jethro Perkins. Information Security Manager. Version 1.
London School of Economics & Political Science IMT Policy Network Connection Jethro Perkins Information Security Manager Version 1.1 Date 18/03/2015 Library reference ISM-PY-126 For latest version and
More informationSalary Scale in accordance with the school s support staff structure and/or any local agreements that are in place.
ICT TECHNICIAN: JOB DESCRIPTION Salary Scale 14-18 in accordance with the school s support staff structure and/or any local agreements that are in place. Line of responsibility The ICT technician will
More informationNetwork Services Enterprise Broadband
Contents 1. 2. ADSL/Broadband Provisions 3. Network Services Customer Responsibilities 4. Network Services General 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects
More informationSample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.
Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring
More informationInformation Security Management Criteria for Our Business Partners
Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents
More informationThe Learner can: 1.1 Describe the common types of security breach that can affect the organisation, such as:
Unit Title: OCR unit number 38 Level: 3 Credit value: 12 Guided learning hours: 100 Unit reference number: Security of ICT Systems D/500/7220 Candidates undertaking this unit must complete real work activities
More informationIt s still very important that you take some steps to help keep up security when you re online:
PRIVACY & SECURITY The protection and privacy of your personal information is a priority to us. Privacy & Security The protection and privacy of your personal information is a priority to us. This means
More informationName of Policy: Computer Use Policy
Page: Page 1 of 5 Director Approved By: Approval Date: Reason(s) for Change Responsible: Corporate Services Leadership April 22, Reflect current technology and practice Corporate Services Leadership Leadership
More informationINFORMATION ASSET MANAGEMENT POLICY
INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives
More informationStandard for Security of Information Technology Resources
MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information
More informationChecklist: Credit Union Information Security and Privacy Policies
Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC
More informationCompTIA A+ Certification ( ) Study Guide Table of Contents
CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System
More informationCyber security tips and self-assessment for business
Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this
More informationACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010
INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig
More informationTable of Contents. PCI Information Security Policy
PCI Information Security Policy Policy Number: ECOMM-P-002 Effective Date: December, 14, 2016 Version Number: 1.0 Date Last Reviewed: December, 14, 2016 Classification: Business, Finance, and Technology
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationHigher National Unit specification: general information
Higher National Unit specification: general information Unit code: H1EM 34 Superclass: CD Publication date: June 2013 Source: Scottish Qualifications Authority Version: 03 Unit purpose This Unit is designed
More informationNetwork Security Policy
Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business
More informationInformation Security Policy
April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING
More informationPOLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents
POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND October 2005 Table of Contents Introduction... 1 Purpose Of This Policy... 1 Responsibility... 1 General Policy... 2 Data Classification Policy...
More informationPhysician Office Name Ambulatory EHR Security Risk Analysis
Process is in place to verify access granted is appropriate (ie: Role Based access indicates that the biller has access to billing screens and the nurse has access to the patient medical information).
More informationBSO CLEAR DESK AND SCREEN POLICY (version 1.0)
BSO CLEAR DESK AND SCREEN POLICY (version 1.0) Approved at BSO Board on 25 th February 2010 CONTENT 1. PURPOSE...3 2. DATA CLASSIFICATION...3 3. THE DESK / OFFICE ENVIRONMENT...3 4. THE PC ENVIRONMENT...4
More informationInformation Security BYOD Procedure
Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,
More informationCompTIA A+ Complete Study Guide (Exams / ). Text with CD- ROM for Windows and Macintosh
CompTIA A+ Complete Study Guide (Exams 220-801/220-802). Text with CD- ROM for Windows and Macintosh Docter, Q ISBN-13: 9781118324059 Table of Contents Introduction xxxi Assessment Test liv Part I 220-801
More informationPCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1
PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman
More informationMade In Hackney Data Protection Policy Last Updated:
Made In Hackney Data Protection Policy Last Updated: 16.05.2018 Definitions Charity GDPR Responsible Person Register of Systems Made In Hackney (MIH), a registered charity. means the General Data Protection
More informationNetwork Services ADSL Managed Service
Contents 1. 2. ADSL/Broadband Provisions 3. Network Services Customer Responsibilities 4. Network Services General 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects
More informationSTUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY
STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY Introduction The college offer an extensive range of IT systems across campuses and online for course related activities and drop-in purposes. This policy applies
More informationTrust Services Principles and Criteria
Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access
More informationStandards and Competencies ITS 1.0 Perform maintenance on systems and components
Skill Performance This portion of the contest will be a series of modules through which each contestant will rotate on a fixed time schedule to troubleshoot or complete tasks with client, server, or end
More informationWHITE PAPER- Managed Services Security Practices
WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to
More informationPolicy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.
London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate
More informationAVANTUS TRAINING PTE LTD
[ICDL-CS]: WSQ ICDL Computer Essentials Length Technology Delivery Method : 2 Days : Computers, Microsoft Windows : Instructor-led (Classroom) Course Overview This module sets out essential concepts and
More informationSTUDENT ICT ACCEPTABLE USE POLICY
The Olive School, Blackburn This policy is in line with the Mission Statement of the School To promote a culture of educational excellence, from within a caring and secure Islamic environment enriched
More informationCredentials Policy. Document Summary
Credentials Policy Document Summary Document ID Credentials Policy Status Approved Information Classification Public Document Version 1.0 May 2017 1. Purpose and Scope The Royal Holloway Credentials Policy
More informationNetwork Services BT Internet Connect
Contents 1. 2. Network Services Customer responsibilities 3. Network Services General 4. Domain Name Registration 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects
More informationThe Apple Store, Coombe Lodge, Blagdon BS40 7RG,
1 The General Data Protection Regulation ( GDPR ) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union ( EU ) and will be directly applicable in all EU Member
More informationPreparing for the NBN. Fixed Wireless Connections
Preparing for the NBN Fixed Wireless Connections Congratulations on choosing to join the National Broadband Network Your new fixed wireless connection will give you access to world-class high speed broadband.
More informationF9A0 04 (ESKINT2): Using the Internet 2
F9A0 04 (ESKINT2): Using the Internet 2 4 SCQF credit points at SCQF level 5 Description: This is the ability to set up and use appropriate connection methods to access the internet; make the best use
More informationPayment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Version 1.0 Release: December 2004 How to Complete the Questionnaire The questionnaire is divided into six sections. Each
More informationPreparing for the NBN. Fixed Wireless Connections
Preparing for the NBN Fixed Wireless Connections Preparing for the NBN Congratulations on choosing to join the National Broadband Network Your new fixed wireless connection will give you access to world-class
More informationST VENERA BOYS SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2014~15 Information and Communication Technology
Form 4 ST VENERA BOYS SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2014~15 Information and Communication Technology Time: 1hr 30mins Name: Class: Please read the following instructions carefully: 1. Answer
More informationPS 176 Removable Media Policy
PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data
More informationSonicWALL Network Anti-Virus
SonicWALL Network Anti-Virus Contents Copyright Notice...2 Limited Warranty...2 Introduction...4 Managing Network Anti-Virus...5 Activating the Network Anti-Virus Subscription...6 Configuring Network Anti-Virus...7
More informationECDL / ICDL IT Security. Syllabus Version 2.0
ECDL / ICDL IT Security Syllabus Version 2.0 Module Goals Purpose This document details the syllabus for the IT Security module. The syllabus describes, through learning outcomes, the knowledge and skills
More informationWelcome to Cogeco UltraFibre Internet. UltraFibre Internet User Guide
Welcome to Cogeco UltraFibre Internet UltraFibre Internet User Guide Hi there. Thanks for joining us. Welcome to your new UltraFibre Internet service from Cogeco. This User Guide is a reference tool for
More informationCAPPELLA NOVOCASTRIENSIS Data Protection Policy
CAPPELLA NOVOCASTRIENSIS Data Protection Policy Overview Key details Policy prepared by: Sarah Lawrance, Choir Secretary Approved by committee on: 02/05/2018 Next review date: 01/10/2018 Introduction In
More informationSAFE USE OF MOBILE PHONES AT WORK POLICY
SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31
More informationINFORMATION GOVERNANCE. Caldicott Approval Procedure
NHS TAYSIDE INFORMATION GOVERNANCE Caldicott Approval Procedure Author: Peter McKenzie Review Group: Information Governance Group Review Date: September 2010 Last Update: September 2009 Document : NHST-ISC-CAP
More informationData Handling Security Policy
Data Handling Security Policy May 2018 Newark Orchard School Data Handling Security Policy May 2018 Page 1 Responsibilities for managing IT equipment, removable storage devices and papers, in the office,
More informationBring Your Own Device (BYOD) Policy
SH IG 58 Information Security Suite of Policies Bring Your Own Device (BYOD) Policy Version 1 Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This
More informationCorporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial
Corporate Policy Information Systems Acceptable Use Document No: ISY-090-10 Effective Date: 2014-06-10 Page 1 of 5 Rev. No: 0 Issuing Policy: Information Systems Department Policy Originator: Erick Edstrom
More information"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.
Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and
More informationSECURE USE OF IT Syllabus Version 2.0
ICDL MODULE SECURE USE OF IT Syllabus Version 2.0 Purpose This document details the syllabus for the Secure Use of IT module. The syllabus describes, through learning outcomes, the knowledge and skills
More informationISSP Network Security Plan
ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...
More informationANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And
ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief
More informationCompTIA A+ Complete Lab Manual
CompTIA A+ Complete Lab Manual Pyles, J ISBN-13: 9781118324073 Table of Contents Introduction xxxi Phase 1 Installing Hardware and Software 1 Task 1.1: Preventing ESD Damage 2 Objective 3 Scenario 3 Scope
More informationEntry Level Assessment Blueprint Computer Technology
Entry Level Assessment Blueprint Computer Technology Test Code: 4122 / Version: 01 Specific Competencies and Skills Tested in this Assessment: Professional Standards, Ethics, and Business Practices Identify
More informationOPEN INTERNET POLICY
OPEN INTERNET POLICY Inland Networks adopts this Open Internet Policy to promote the Internet as an open platform enabling customer choice, freedom of expression, end-user control, competition, and the
More informationData Protection Policy
Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...
More informationSystems and Principles Unit Syllabus
Systems and Principles Unit Syllabus Level 3 Testing ICT systems 3 7540-321 www.cityandguilds.com September 2010 Version 1.0 About City & Guilds City & Guilds is the UK s leading provider of vocational
More informationNCH Swift Sound Office Intercom: Audio Communication Software
NCH Swift Sound Office Intercom: Audio Communication Software This manual is intended for use with OfficeIntercom Version 4.01. More information on other versions of OfficeIntercom can be found at www.nch.com.au/oi/index.html.
More informationBrighton-Le-Sands Public School BRING YOUR OWN DEVICE (BYOD) PROCEDURES
Brighton-Le-Sands Public School BRING YOUR OWN DEVICE (BYOD) PROCEDURES 2017 35 Crawford Road Brighton-Le-Sands NSW 2216 9567 5449 brightonle-p.school@det.nsw.edu.au www.brightonle-p.schools.nsw.edu.au
More informationModule 1 Concepts of Information and Communication Technology (ICT)
Module 1 Concepts of Information and Communication Technology (ICT) The following is the Syllabus for Module 1, Concepts of Information and Communication Technology (ICT), which provides the basis for
More informationThe Eight Rules of Security
The Eight Rules of Security The components of every security decision. Understanding and applying these rules builds a foundation for creating strong and formal practices through which we can make intelligent
More informationma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018
ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:
More information