COLORADO DEPARTMENT OF LABOR AND EMPLOYMENT Arapahoe Street Denver, CO
|
|
- Amelia Chandler
- 6 years ago
- Views:
Transcription
1 STANDARD PROCEDURE COLORADO DEPARTMENT OF LABOR AND EMPLOYMENT 1515 Arapahoe Street Denver, CO Number... Effective Date...12/13/90 Supersedes... Revision Date... Executive Director's SP-71 Approval... Under Revision... Document Title: SP-71 Computer Systems Access and Security Clearance Document Category: Automation Technology Subject Matter: Computer Management Originator: Number of Pages: 11 Contact: Contact Phone: Body: I. PURPOSE This procedure is administered by the Investigations and Criminal Enforcement Section (ICE) and is effective on the date shown in the heading. The purpose of this procedure is to minimize the potential for a USER to obtain transaction level access to CDLE Computer Systems or other NON-CDLE Computer Systems presenting opportunities for financial gain by illegal means or with fraudulent intentions. Transaction level access is that condition which allows one to create, modify or delete any data element in any record or file of any application program or any operating system within Computer Systems. This document establishes procedures for: A. Authorizing USERs to obtain transaction level access to such CDLE Computer Systems. B. Authorizing CDLE Employees to obtain access to such NON-CDLE Computer Systems. C. Conducting an ADP Security Clearance. The DEPARTMENT has the obligation to protect the taxpayers' investment in the assets and information used to conduct necessary government operations. This responsibility is made more complicated by the need for computer systems and the enormous impact these systems have on the way business obligations are satisfied. Since computer systems can be surreptitiously subverted for illegal purposes, possibly causing severe financial losses to Colorado taxpayers or possibly disrupting the Department's ability to serve Colorado citizens, the following criteria are established: 1. Any USER requiring transaction level access to any CDLE computer system in which opportunities exist for illicit financial gain, must comply with the procedures described herein. This does not include current USERs who have transaction level access or new users needing "inquiry or read only" access to such CDLE computer systems. The two CDLE applications currently identified as having potential opportunities for illicit financial gain are CUBS and CATS. These applications are designated as security-sensitive applications. 2. Any CDLE employee requiring access to such NON-CDLE Computer Systems must comply with the procedures described herein. This may include USERs currently having any level of
2 transaction access and will include all new CDLE USERs requiring transaction access to NON-CDLE Computer Systems. NON-CDLE USERs (i.e., local partners and community based organizations) seeking access to NON-CDLE Computer Systems must request such authorization directly from the NON-CDLE Computer System Owner. USER, as defined herein, is anyone requiring access to the CDLE or NON-CDLE Computer Systems in order to perform an authorized function or series of functions 3. The security clearance procedures defined herein will be implemented to determine whether any USER requesting transaction level access or requesting that any transaction level access be added to his/her existing access should be given that privilege. If it is deemed that access should not be granted, access will be denied and the user requesting access may be subject to other appropriate administrative action based on the grounds for denial. II. POLICY This procedure supplements the USER security and access authorization elements set forth in the CDLE ADP Security Policy (transmitted under DL (OIS) ) and the ADP security procedures manual that is restricted to Local Security Coordinators. III. OBTAINING ACCESS TO CDLE COMPUTER SYSTEMS CDLE Cost Center Managers are responsible for approving all CDLE employees access to CDLE Computer Systems. Only Cost Center Manager signatures will be accepted by OIS for the processing of documents and forms requesting such access. Requests for access to CDLE Computer Systems by other than CDLE employees must be approved by the appropriate "CDLE contracting authority" as defined in section B of this procedure. The following describes the procedures for obtaining access to CDLE Computer Systems: A. CDLE USER/EMPLOYEE 1. The Cost Center Manager will: a. Inform the USER of all stipulations and restrictions relative to his/her use of CDLE Computer Systems as outlined in the CDLE ADP Security Policy. b. Obtain a completed and signed "Statement of Personal Compliance" form from the USER (sample attached). This form will be forwarded to the CDLE Personnel Unit for inclusion in the individual's file and made available during periods of compliance review. Copies may be retained by Cost Center Managers if they so desire. c. Obtain a completed and signed "Computer Access: Authorization to Conduct Security Clearance" form (sample attached). This form is required IF the USER is authorized for first-time transaction level access or is being authorized for additional transaction level access to a security-sensitive application(s) and has not had a security clearance performed within the last twelve calendar months. Send the signed form to Investigations and Criminal Enforcement Section (ICE). IF the USER declines to authorize an ADP security clearance: 1) The Cost Center Manager will cease all activity related to authorizing CDLE Computer System transaction access to security-sensitive applications for the USER. 2) The USER must check the "declination box", sign the form and provide a written explanation of
3 the reasons for the declination. 3) The Cost Center Manager will forward the signed declination form and written explanation to ICE. d. Complete and sign a "CDLE Employee Request for Access" form. Send the completed form to the Office of Information Systems (OIS) Customer Assistance for processing. e. The OIS Director is responsible for obtaining a signed Notice of Personal Compliance and a signed security clearance form from each individual contracted for overflow ADP services. 2. OIS will: a. Verify the proper completion and authorization of the "CDLE Employee Request for Access" form. IF any documentation elements are incomplete or missing, all documents will be returned to the originating Cost Center Manager for appropriate action and no further action will be taken. b. Process the requested USER access and contact the Cost Center Manager with the access information. c. Notify the CDLE Controller of the appropriate billing code associated with the new USERID. 3. The ICE will: a. Record/log the receipt of all documents and perform all activities related to security clearances or declinations in a timely and trackable manner. b. IF the USER's security clearance report is accepted, the ICE will make the appropriate notation on the form and retain the original form for future reference. It is not required that notification of acceptable security clearance be sent to the USER, appropriate Cost Center Manager or CDLE ADP Security Administrator. c. IF the USER's security clearance is not acceptable, ICE will: 1) Notify the CDLE ADP Security Administrator by telephone to immediately revoke the USER's access to all CDLE and NON-CDLE Computer Systems' security-sensitive applications. A follow-up written notification will be provided and will be signed and dated by the CDLE ADP Security Administrator as verification of USER access revocation and returned to the ICE. 2) Verbally notify the appropriate Appointing Authority, who, in turn, will verbally notify the Cost Center Manager of the revocation of existing transaction access and that the USER is restricted from any further transaction access. Reinstatement of the USER's access will be based upon the decision of the Executive Director. 3) Maintain a USER case file relative to all phases of the security clearance, investigative efforts and the final decision. d. IF the USER declines to authorize a security clearance, ICE will maintain a case file relative to the information gathered and present the findings to the Executive Director for decision. 4. The Executive Director will: a. Review the "reason for declination findings" resulting from investigative efforts presented by ICE, or;
4 b. Review the "reason for unacceptable security clearance findings" resulting from investigative efforts presented by ICE. c. Render a decision as to the USER's CDLE Computer Systems access and employment status in the Department. 1) Normally, the affected USER will be given the option, not a right, to transfer to another position which does not require transaction level access to a security-sensitive application(s), IF such a position is available and IF the USER is otherwise qualified. 2) IF such a position is not available, the Executive Director will then consider further action and the options available under Chapters 8 and 9 of the Colorado State Personnel Rules and Regulations. These options include termination of employment. d. Notify the appropriate Appointing Authority of the decision. The Appointing Authority will coordinate the decision and any required actions with the Personnel Director and/or ICE. B. NON-CDLE USER/EMPLOYEE Only the Executive Director has the authority to negotiate contracts resulting in CDLE Computer Systems access for USERs employed by vendors and their agents, state, federal and foreign agencies. CDLE Cost Center Managers have the authority to negotiate contracts resulting in CDLE Computer Systems access for USERs employed by local agencies/entities (Community Based Organizations, etc. The Executive Director and CDLE Cost Center Managers will be referred to hereafter as the "CDLE Contracting Authority" for the purpose of this procedure. 1. The CDLE Contracting Authority will: a. Coordinate all aspects of "acceptable security clearance" with the contracting agency/entity; specifically: 1) Cease all activities related to requesting transaction level access to security-sensitive applications (e.g. the currently identified CUBS and/or CATS), IF a NON-CDLE USER declines to provide security clearance documentation; otherwise, 2) Obtain an "acceptable security clearance" based upon the "security clearance" criteria set forth in the contract negotiated between CDLE and the agency/entity. The basic elements of this criteria are: a) The criminal record check must be arranged through a legitimate law enforcement agency. b) The criminal record check must fully identify the issuing law enforcement agency and must bear the signature of the issuing law enforcement official. c) The criminal record check must reveal that the NON-CDLE USER has no job-related felony conviction arising from an offense(s) occurring in the five-year period preceding the request for new or additional transaction level access to security-sensitive applications, or such transaction level access will not be granted. d) The NON-CDLE USER or contracting agency/entity must be responsible for all costs of the criminal record check. IF a NON-CDLE USER receives an "unacceptable security clearance", the contracting agency/entity will not submit a request to the CDLE Contracting Authority for CDLE Computer Systems transaction level access for that USER.
5 b. Obtain a completed and signed "Statement of Personal Compliance" form for each NON-CDLE USER requesting access. c. Complete and sign an "Employee Request for Access" form. This form may be the Departments form or another agencies form as long as it contains all information required by CDLE for processing. d. Send the completed and signed "Employee Request for Access" form along with the completed and signed "Statement of Personal Compliance" to OIS. If transaction level (update) access is being requested send the original proof of security clearance document to ICE. 2. The ICE will: a. Verify that the security clearance is acceptable and mark the "Employee Request for Access" form appropriately. b. Retain the original proof of security clearance document for future reference. c. Send the "Employee Request for Access" form to the CDLE ADP Security Administrator for processing. 3. OIS will: a. Verify the proper completion and authorization of the "Employee Request for Access" form. b. Process the requested USER access and notify the CDLE Contracting Authority of all accesses granted. c. Notify the CDLE Controller of the appropriate billing code associated with the new USERID. IV. OBTAINING ACCESS TO NON-CDLE COMPUTER SYSTEMS Access to NON-CDLE Computer Systems will be determined, coordinated and processed in the following manner: A. OIS Customer Assistance will be the primary contact between CDLE and all other NON-CDLE Computer System Security Administrators. B. All requests for access will be coordinated through the OIS in accordance with NON-CDLE Computer Systems security/access policies and procedures. C. Access will be administered by the NON-CDLE Computer System Owner, who has the exclusive right to authorize or revoke access. D. CDLE Cost Center Managers will: 1. Notify the CDLE ADP Security Administrator in writing of all CDLE USERs requiring transaction access to NON-CDLE Computer Systems security-sensitive applications as identified herein (none at present). This notification will include an accurate and detailed description of the information/data needed by the USER. 2. Provide any additional information and perform any procedural elements requested by the CDLE ADP Security Administrator on behalf of the NON-CDLE Security Administrator. 3. NOT become involved with NON-CDLE USER requests for access to other NON-CDLE Computer
6 E. OIS will: Systems. The NON-CDLE USER will be directed to contact the NON-CDLE Computer System Owners. 1. When applicable, request that the Executive Director negotiate a contract or agreement for system access between CDLE and the NON-CDLE Computer System Owners. 2. Insure that all NON-CDLE Computer Systems access and security requirements are satisfied per contract. 3. Process all forms and/or documentation related to security-sensitive application(s) transaction access authorization. 4. Coordinate billing arrangements with the CDLE Controller. 5. Maintain a record of all authorized USERs and coordinate it with CDLE Cost Center Managers based upon the USER's employment status. V. SECURITY CLEARANCE CRITERIA Security clearance for transaction level access to CDLE Computer Systems' security-sensitive applications, by any CDLE or NON-CDLE USER or to NON-CDLE Computer Systems' security-sensitive application(s), by CDLE USERs will be the responsibility of ICE and will be recognized as an ICE priority task. A. SECURITY CLEARANCE CONVICTION CATEGORIES 1. A criminal record check will be performed with respect to job-related felony convictions arising from offenses that occurred during the previous five-year period. 2. Job-related conviction categories include, but are not necessarily limited to, the following: a. Theft b. Robbery c. Burglary d. Fraud e. Forgery f. Embezzlement g. Computer Crime h. Other white-collar or government operations crimes 3. Only actual job-related criminal felony convictions, not arrests, will be considered as a factor relating to the USER's suitability for computer transaction level access to security-sensitive applications. Felony convictions arising out of an offense occurring more than five years prior to the date of ICE review of the USER will not be considered. Felony conviction, as defined herein, is considered to include a plea of nolo contendere or acceptance of a deferred sentence when a felony charge was made. B. THE ICE CHIEF SPECIAL INVESTIGATOR RESPONSIBILITIES 1. Maintain all internal ICE procedures related to this standard procedure and make them available during periods of compliance review. 2. Conduct criminal record background checks of USERs in accordance with United States Department of Justice regulations. While a USER is required to submit a "Computer Access: Authorization to Conduct Security Clearance" form, or proof of acceptable security clearance document, each time new or additional
7 transaction level access to security-sensitive applications is being sought after July 1, 1990, ICE is required to conduct or request only one complete criminal background check on that USER in any twelve-month period. VI. LOCATION OF ALL SECURITY ACCESS FORMS The only forms that will be accepted for the purposes of authorizing access to CDLE Computer Systems are: A. Computer Access: Authorization for Security Clearance Form. (Sample attached) B. Statement of Personal Compliance Form. (Sample attached) C. CDLE Employee Request for Access Form. D. NON-CDLE Employee Request for Access Form. E. Other agencies access Request forms as specified in paragraph III B 1 c, above. * A copy of these forms will be supplied to all Cost Center Managers, Local Security Coordinators and NON-CDLE Security Coordinators by the OIS Customer Assistance for local reproduction. All forms required to access NON-CDLE Computer Systems will be made available by OIS Customer Assistance upon request. VII. QUESTIONS CONCERNING SECURITY CLEARANCE OR COMPUTER ACCESS Questions regarding the security clearance criteria and procedures, or the current status of an ongoing security clearance investigation, should be addressed to: CDLE ICE Chief Special Investigator Investigations and Criminal Enforcement Section 600 Grant Street, Suite 900 Denver, CO Phone: (303) Questions related to the CDLE ADP Security Policy and its supplemental procedures, or the preparation of the above noted forms, should be addressed to: Attachments : CDLE ADP Security Administrator, c/o Customer Assistance Office of Information Systems 251 East 12th Avenue, Room 313 Denver, CO Phone: (303) Statement of Personal Compliance Form. Computer Access: Authorization for Security Clearance Form. CDLE Employee Request for Access Form. NON-CDLE Employee Request for Access Form.
8 Supporting Documents Press the associated DocLink below to view the Supporting Document(s) - Supporting Document (CDOLE Computer Access: Authorization to Conduct Security Clearance) - Supporting Document (Statement of Personal Compliance Relating to the Access and Use of CDOLE Computer Systems)
CELL PHONE POLICY Page 1 of 5 City of Manteca Administrative Policy and Procedure
CELL PHONE POLICY Page 1 of 5 Section 1: Purpose The City of Manteca recognizes that cellular telephones enhance the level of City services by allowing employees to remain in contact with the office or
More informationCell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance.
Cell Phone Policy 1. Purpose: Establish a policy for cell phone use and compensation allowance. 2. Authority: The Clinton County Board of Commissioners. 3. Application: This Cell Phone Policy (the Policy)
More informationOverview Bank IT examination perspective Background information Elements of a sound plan Customer notifications
Gramm-Leach Bliley Act Section 501(b) and Customer Notification Roger Pittman Director of Operations Risk Federal Reserve Bank of Atlanta Overview Bank IT examination perspective Background information
More informationUnion Bank s NMLS REGISTRATION GUIDE. PREVIOUSLY REGISTERED Mortgage Loan Originator (MLO)
Union Bank s NMLS REGISTRATION GUIDE PREVIOUSLY REGISTERED Mortgage Loan Originator (MLO) Revised 4/17/2012 Table of Contents 1.0 S.A.F.E. ACT... 3 1.1 Background... 3 1.2 Registration Overview for s...
More informationATTACHMENT A POLICES AND PROCEDURES REGARDING CELLULAR TELEPHONES AND MOBILE COMMUNICATION DEVICES
ATTACHMENT A POLICES AND PROCEDURES REGARDING CELLULAR TELEPHONES AND MOBILE COMMUNICATION DEVICES 1. INTRODUCTION 1.1 The Office of Information Technology Services ( OITS ) has the responsibility of managing
More informationDATA SUBJECT ACCESS REQUEST PROCEDURE
DATA SUBJECT ACCESS REQUEST PROCEDURE DATA PROTECTION ACT 1998 This procedure seeks to ensure that the Transport Executive receives and processes Data Subject Access Requests in accordance with the Data
More informationOhio Supercomputer Center
Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
More informationCertification Requirements and Application Procedures for Persons and Firms.
391-3-24-.05 Certification Requirements and Application Procedures for Persons and Firms. (1) Scope. (a) Following the submission of an application demonstrating that all the requirements of this Rule
More informationPage 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax
1. PURPOSE The Loss Prevention Foundation, ( the foundation, LPF, the examiner ) makes high-stakes retail loss prevention certification Exams publicly available for the purpose of earning certification
More informationCUMBRE VISTA HOMEOWNERS ASSOCIATION, INC. RECORDS INSPECTION AND COMMUNICATIONS POLICY AND PROCEDURE. 1-Pl) ~ \ 1
CUMBRE VISTA HOMEOWNERS ASSOCIATION, INC. RECORDS INSPECTION AND EMAIL COMMUNICATIONS POLICY AND PROCEDURE Effective Date: ~ \ 1 1-Pl) Pursuant to Article XIII of the Association's Bylaws, "records and
More informationUse of Controlled Substances in Research
Use of Controlled Substances in Research A Tutorial on Regulatory Requirements and the Emory University Policy 7.25 Research Use of Controlled Substances Emory University, Office of Compliance Tutorial
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationData Subject Access Request
Data Subject Access Request DATA PROTECTION ACT 1998 Version: 10.0 Approval Status: Approved Document Owner: Graham Feek Classification: Internal Review Date: 03/07/2017 Effective from: 1 July 2015 Table
More informationRed Flag Policy and Identity Theft Prevention Program
Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationDISADVANTAGED BUSINESS ENTERPRISE PROGRAM. Unified Certification Program OKLAHOMA
DISADVANTAGED BUSINESS ENTERPRISE PROGRAM Unified Certification Program OKLAHOMA TABLE OF CONTENTS General... 1 Ratification Process... 1 Implementation Schedule... 2 Regulatory Requirements... 2 DBE Directory...
More informationPrivacy Policy Effective May 25 th 2018
Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand
More informationUnion Bank s NMLS REGISTRATION GUIDE. UNREGISTERED Mortgage Loan Originator (MLO)
Union Bank s NMLS REGISTRATION GUIDE UNREGISTERED Mortgage Loan Originator (MLO) Revised 4/17/2012 Table of Contents 1.0 S.A.F.E. ACT... 3 1.1 Background... 3 1.2 Registration Overview... 3 1.3 Expenses...
More informationOnline Filing Guide for Charities and Professional Fundraisers
South Carolina Secretary of State Online Filing Guide for Charities and Professional Fundraisers April 2010 1205 Pendleton Street, Suite 525 Columbia, South Carolina 29201 www.sos.sc.gov Charitable Organizations
More informationSLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004
SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 This document provides an overview of the program put into place by the South Carolina Law Enforcement Division (SLED)
More informationParticipation Agreement for the ehealth Exchange
Participation Agreement for the ehealth Exchange This Participation Agreement for the ehealth Exchange ("Agreement") is entered into as of the last date written below ( Effective Date ) by and between
More informationLANDER COUNTY SCHOOL DISTRICT P.O. Box Weaver Avenue Battle Mountain, Nevada PH: (775) FAX: (775)
APPLICATION FOR EMPLOYMENT Applicant's Full Name (Last) (First) (MI) Other Name(s) (Please provide any additional information relative to change of name, use of an assumed name, maiden name, or nickname,
More informationCare Recruitment Matters Limited Privacy Notice
Care Recruitment Matters Limited Privacy Notice Care Recruitment Matters Limited (CRM) is a specialist recruitment agency, sourcing permanent candidates for companies focused in the Health and Social Care
More informationHBW LAW LTD T/A HESELTINE BRAY & WELSH
HBW LAW LTD T/A HESELTINE BRAY & WELSH CLIENT INFORMATION POLICY HOW WE STORE AND USE YOUR PERSONAL INFORMATION INFORMATION WE COLLECT AND HOLD ABOUT YOU To enable us to provide you with our services we
More informationSTOCKTON UNIVERSITY PROCEDURE DEFINITIONS
STOCKTON UNIVERSITY PROCEDURE Identity Theft Prevention Program Procedure Administrator: Director of Risk Management and Environmental/Health/Safety Authority: Fair and Accurate Credit Transactions Act
More informationNEWTON COUNTY OPEN RECORDS ACT POLICY
NEWTON COUNTY OPEN RECORDS ACT POLICY As a public entity, Newton County is subject to the Open Records Act, O. C. G.A. 50-18- 70 et seq. Newton County is committed to conducting its business in a manner
More informationChange Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account
PAYER ID: SUBMITTER ID: 1 Provider Organization Practice/ Facility Name Change Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account Provider
More informationAcceptable Use Policy
IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations
More informationTITLE 595. DEPARTMENT OF PUBLIC SAFETY CHAPTER 10. CLASS D DRIVER LICENSES AND IDENTIFICATION CARDS AND MOTOR LICENSE AGENT PROCEDURES
TITLE 595. DEPARTMENT OF PUBLIC SAFETY CHAPTER 10. CLASS D DRIVER LICENSES AND IDENTIFICATION CARDS AND MOTOR LICENSE AGENT PROCEDURES RULEMAKING ACTION: EMERGENCY adoption PROPOSED RULES: Subchapter 11.
More informationYou are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person.
Middlesex Bank Person to Person Service You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person. This Agreement
More informationAGENCY APPLICATION AND PARTICIPATION AGREEMENT MISSOURI POLICE CHIEFS CHARITABLE FOUNDATION CERTIFICATION PROGRAM
AGENCY APPLICATION AND PARTICIPATION AGREEMENT MISSOURI POLICE CHIEFS CHARITABLE FOUNDATION CERTIFICATION PROGRAM This Application and Participation Agreement (hereinafter the "Agreement") is entered into
More informationEnterprise Income Verification (EIV) System User Access Authorization Form
Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be
More informationCalifornia Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT
California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program
More informationMissouri Housing Development Commission Certified Property Management Agent Program
Missouri Housing Development Commission Certified Property Management Agent Program History Over the past few years, MHDC has been working towards establishing a management certification program that fairly
More informationChange Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account
PAYER ID: SUBMITTER ID: 1 Provider Organization Practice/ Facility Name Change Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account Provider
More informationINDEPENDENT REGISTERED REPRESENTATIVE ANNUAL CERTIFICATION
IMS Securities, Inc. Member FINRA/SIPC IMS Financial Advisors, Inc. INDEPENDENT REGISTERED REPRESENTATIVE ANNUAL CERTIFICATION The Firm and you are subject to a multitude of laws and regulations governing
More informationEDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017
This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,
More informationa completed Verification of Interior Designer Examination and Certification Form to provide evidence of having passed the NCIDQ Examination.
Commonwealth of Virginia Department of Professional and Occupational Regulation 9960 Mayland Drive, Suite 400 Richmond, Virginia 23233-1485 (804) 367-8506 www.dpor.virginia.gov BOARD FOR ARCHITECTS, PROFESSIONAL
More informationPRELIMINARY - PENDING APPROVAL
Commonwealth of Virginia Department of Professional and Occupational Regulation 9960 Mayland Drive, Suite 400 Richmond, Virginia 23233-1485 (804) 367-8506 www.dpor.virginia.gov BOARD FOR ARCHITECTS, PROFESSIONAL
More informationRailroad Medicare Electronic Data Interchange Application
Electronic Data Interchange Application Action Requested: Add New EDI Provider(s) Change/Update Submitter Information Apply for New Submitter ID Apply for New Receiver ID Delete Date: Submitter ID: ERN
More informationPrivacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES
Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY Cookeville Communications Media is committed to maintaining robust privacy protections for its users. Our privacy policy is designed to help you
More informationWhat information is collected from you and how it is used
Richmond Road Runners Club PRIVACY POLICY Board Approved: 10/11/2017 Our Commitment to Privacy Richmond Road Runners Club (RRRC) is the sole owner of the information collected on its sites and through
More informationSANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018
SANMINA CORPORATION PRIVACY POLICY Effective date: May 25, 2018 This Privacy Policy (the Policy ) sets forth the privacy principles that Sanmina Corporation and its subsidiaries (collectively, Sanmina
More informationXpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;
65 Gilbert Street, Adelaide SA 5000 Tel: 1300 216 890 Fax: 08 8221 6552 Australian Financial Services Licence: 430962 Privacy Policy This Privacy Policy was last updated on 27 February 2017. Our Commitment
More informationData Subject Access Request Form (GDPR)
Data Subject Access Request Form (GDPR) Data Subject Access Request Form Article 15 of the EU General Data Protection Regulation (Regulation (EU) 2016/679) (GDPR) grants you the right to access your personal
More informationMEDICARE Texas (TRAILBLAZERS) PRE-ENROLLMENT INSTRUCTIONS 00900
MEDICARE Texas (TRAILBLAZERS) PRE-ENROLLMENT INSTRUCTIONS 00900 HOW LONG DOES PRE-ENROLLMENT TAKE? Standard processing time is 5 business days after receipt. WHAT FORM(S) SHOULD I COMPLETE? EDI Provider
More informationConditions of Rental
Conditions of Rental Post Office Private Boxes 1. To apply for a Post Office Private Box (the box hereunder), the applicant shall submit a duly completed application form, together with all the necessary
More informationFinFit will request and collect information in order to determine whether you qualify for FinFit Loans*.
FinFit Web Privacy Policy General: This Privacy Policy ( Policy ) describes the ways FinFit, LLC ( FinFit, we, us) collects, stores, uses and protects information we receive from you or that you may provide
More informationCh. 5 UPC SCANNING SYSTEMS CHAPTER 5. UPC SCANNING SYSTEMS AND PLU DEVICES GENERAL
Ch. 5 UPC SCANNING SYSTEMS 70 5.1 CHAPTER 5. UPC SCANNING SYSTEMS AND PLU DEVICES GENERAL Sec. 5.1. Purpose. 5.2. Requirement of annual testing and inspection. 5.3. Testing and inspection standards. 5.4.
More informationCustomer Proprietary Network Information
Customer proprietary network information (CPNI) means information that relates to the quantity, technical configuration, type, destination, location, and amount of use of our service by you and information
More informationCertified Assessor. Application for COBIT Certified Assessor
Application for COBIT Certified Application for COBIT Certified REQUIREMENTS TO BECOME A COBIT CERTIFIED ASSESSOR There is a required US $100 Application processing fee. Payment of the COBIT Certified
More informationPostal Inspection Service Mail Covers Program
Postal Inspection Service Mail Covers Program May 28, 2014 AUDIT REPORT Report Number HIGHLIGHTS BACKGROUND: In fiscal year 2013, the U.S. Postal Inspection Service processed about 49,000 mail covers.
More informationAPPLICATION CHECKLIST IMPORTANT Submit all items on the checklist below with your application to ensure faster processing. APPLICATION REQUIREMENTS
1 of 12 State of Florida Department of Business and Professional Regulation Building Code Administrators and Inspectors Board Application for Provisional Certificate- Building Code Administrator Form #
More informationTEXAS MEDICARE (TRAILBLAZERS) CHANGE FORM MR085
TEXAS MEDICARE (TRAILBLAZERS) CHANGE FORM MR085 HOW LONG DOES PRE-ENROLLMENT TAKE? Standard processing time is 20 days WHAT PROVIDER NUMBERS DO I USE? Six digit Medicare legacy provider ID NPI Number WHAT
More informationELECTRIC RULE NO. 25 Sheet 1 RELEASE OF CUSTOMER DATA TO THIRD PARTIES
Original 34333-E ELECTRC RULE NO. 25 Sheet 1 RELEASE OF CUSTOMER DATA TO THRD PARTES. APPLCABLTY. The following rules apply to PG&E s automated, ongoing provisioning of electric SmartMeter TM interval
More informationPrivacy Policy of
Privacy Policy of www.bitminutes.com This Application collects some Personal Data from its Users. Owner and Data Controller BitMinutes Inc Owner contact email: privacy@bitminutes.com Types of Data collected
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationCERTIFICATE POLICY CIGNA PKI Certificates
CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...
More informationPrevention of Identity Theft in Student Financial Transactions AP 5800
Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to
More informationDigital Signatures Act 1
Issuer: Riigikogu Type: act In force from: 01.07.2014 In force until: 25.10.2016 Translation published: 08.07.2014 Digital Signatures Act 1 Amended by the following acts Passed 08.03.2000 RT I 2000, 26,
More informationWe collect information from you when You register for an Traders account to use the Services or Exchange and when You use such Services. V.
Privacy Policy General A. The parties involved in reference to this policy are Company and You, the User of these sites: www.bittrademarket.com A.1 Bittrade Market decentralize system is the publisher
More informationCCAM (Certified Community Association Manager) Certification Application
REQUIREMENTS FOR CCAM CERTIFICATION 1. Complete and pass the three required courses (A, B & C noted below). 2. Email a completed CCAM certification application including certification fee to certification@cacm.org.
More informationRecords Retention Policy
June 21, 2017 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Review Cycle...3 1.4 Document Owner...3 1.5 Definitions...3 2 Policy...4 2.1 Records and Record Storage...4 2.2 Applicable
More informationDRAFT. Amendment to Chapter 102 Taxation Article I In General, by adding a new Section titled Omitted Real Property Assessments.
ATTACHMENT #1 Regular LF&A Meeting of August 13, 2007 DRAFT Amendment to Chapter 102 Taxation Article I In General, by adding a new Section 102-4 titled Omitted Real Property Assessments. Sec. 102-4 Omitted
More informationUSER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.
These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection
More informationInformation Security Incident Response and Reporting
Information Security Incident Response and Reporting Original Implementation: July 24, 2018 Last Revision: None This policy governs the actions required for reporting or responding to information security
More informationREGULATION BOARD OF EDUCATION FRANKLIN BOROUGH
R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources
More informationAcceptable Use Policy
Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications
More informationThe CERT Top 10 List for Winning the Battle Against Insider Threats
The CERT Top 10 List for Winning the Battle Against Insider Threats Dawn Cappelli CERT Insider Threat Center Software Engineering Institute Carnegie Mellon University Session ID: STAR-203 Session Classification:
More informationECLIPSE FOUNDATION, INC. INDIVIDUAL COMMITTER AGREEMENT
ECLIPSE FOUNDATION, INC. INDIVIDUAL COMMITTER AGREEMENT THIS INDIVIDUAL COMMITTER AGREEMENT (THE AGREEMENT ) is entered into as of the day of, 20 (the Effective Date ) by and between Eclipse Foundation,
More informationACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION
ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or
More informationEDI ENROLLMENT AGREEMENT INSTRUCTIONS
EDI ENROLLMENT AGREEMENT INSTRUCTIONS The Railroad EDI Enrollment Form (commonly referred to as the EDI Agreement) should be submitted when enrolling for electronic billing. It should be reviewed and signed
More informationOnlineNIC PRIVACY Policy
OnlineNIC PRIVACY Policy ONLINENIC INC (ONLINENIC) TAKES YOUR PRIVACY SERIOUSLY. Our Privacy Policy is intended to describe to you how and what data we collect, and how and why we use your personal data.
More informationINFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ
INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄN YLIOPISTO Introduction With the principles described in this document, the management of the University of Jyväskylä further specifies
More informationShaw Privacy Policy. 1- Our commitment to you
Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of
More informationHPE DATA PRIVACY AND SECURITY
ARUBA, a Hewlett Packard Enterprise company, product services ( Services ) This Data Privacy and Security Agreement ("DPSA") Schedule governs the privacy and security of Personal Data by HPE in connection
More information(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and
SUB-LRA AGREEMENT BETWEEN: (1) Jisc (Company Registration Number 05747339) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and (2) You, the Organisation using the Jisc
More informationMississippi Medicaid. Mississippi Medicaid Program Provider Enrollment P.O. Box Jackson, Mississippi Complete form and mail original to:
Mississippi Medicaid Complete form and mail original to: Blank forms may by copied. Call LTC at 888-941-8967 if you have questions. Please complete the following Mississippi Medicaid Provider EDI Enrollment
More informationPart A/Part B/HHH EDI Enrollment (Agreement) Form and Instructions
Part A/Part B/HHH EDI Enrollment (Agreement) Form and Instructions The EDI Enrollment Form (commonly referred to as the EDI Agreement) should be submitted when enrolling for electronic billing. It should
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationPRIVACY NOTICE. 1.2 We may obtain or collect your Personal Data from various sources including but not limited to:
PRIVACY NOTICE This Privacy Notice is issued by BGR FOODSERVICE SDN. BHD. (445653-K) ( the Company or BFSB ) and/or its related companies, as defined in the Companies Act, 1965 (collectively Group ) pursuant
More informationJURISDICTION 11 EDI CONTRACT INSTRUCTIONS
JURISDICTION 11 EDI CONTRACT INSTRUCTIONS Submit the completed form to: ABILITY Network, ATTN: Enrollment FAX: 888.837.2232 EMAIL: setup@abilitynetwork.com INSTRUCTIONS Refer to these instructions as you
More informationIdentity Theft Prevention Program. Effective beginning August 1, 2009
Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Christian Brothers University developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission's
More informationPetroleum Mechanic Certification Program Policies and Procedures
Certification Program Effective: Document Uncontrolled if Printed Table of Contents 1. Background... 3 2. Certificate Requirements... 3 3. Training Standards... 4 4. Certification Rights, Privileges and
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More informationWireless Communication Stipend Effective Date: 9/1/2008
Category: Financial Policy applicable for: Faculty/Staff Policy Title: Policy Number: Wireless Communication Stipend Effective Date: 9/1/2008 Enabling Act(s) IRS rule 2.1.7 Policy Owner: Sr. VP for Administration
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationSouth Carolina Association of School Business Officials. Certification Program Guidelines
South Carolina Association of School Business Officials Certification Program Guidelines SCASBO Certification Guidelines The South Carolina Association of School Business Officials announced the launch
More informationASP Professional Standards and Certification Program for Strategic Planning and Strategic Management ASP CERTIFICATION
ASP Professional Standards and Certification Program for Strategic Planning and Strategic Management ASP CERTIFICATION 1 ASP Certification Policies (version 4.0 - Sept 2016) Table of Contents Section I:
More informationWireless Services Allowance Procedure
Wireless Services Allowance Procedure Office: Information Technology Procedure Contact: Chief Information Officer Related Policy or Policies: Wireless Services Allowance Policy FAD.042 Revision History
More informationOrange County EMT Accreditation Application
Welcome (Step 1 of 7) Welcome Dear Applicant, Orange County EMS would like to welcome you to the Orange County EMT Accreditation application process. Make sure that you read the information and instructions
More informationRenewal Registration & CPE for CPAs in Iowa
1. When must I renew my certificate? Renewal Registration Process You must renew your certificate annually with the Iowa Accountancy Examining Board (IAEB). Online renewal is typically available May 15
More informationBirmingham Midshires - Terms and Conditions Mortgage Intermediaries On-line Terms of Use (June 2017)
Birmingham Midshires - Terms and Conditions http://www.bmsolutions.co.uk/terms/ Mortgage Intermediaries On-line Terms of Use (June 2017) 1. General Which Terms Apply? - Directly Authorised Firms:If you
More informationSUBJECT: Cellular Phone Policy Effective Date: 7/1/2010. Department: Information Technology Policy No.: IT-1002
Person County Government STANDARD PROCEDURE SUBJECT: Cellular Phone Policy Effective Date: 7/1/2010 Department: Information Technology Policy No.: IT-1002 Prepared by: Gary Latta, IT Director Revised:
More informationSECTION.0900 LEAD-BASED PAINT HAZARD MANAGEMENT PROGRAM FOR RENOVATION, REPAIR AND PAINTING
SECTION.0900 LEAD-BASED PAINT HAZARD MANAGEMENT PROGRAM FOR RENOVATION, REPAIR AND PAINTING 10A NCAC 41C.0901 GENERAL (a) In addition to the definitions found in 40 CFR Part 745 Subpart E and Subpart L
More informationSDR EDUCATIONAL CONSULTANTS
Foreign Educational Equivalencies APPLICATION for EVALUATION www.sdreducational.org Email: info@sdreducational.org Personal Information (all information is required unless indicated as optional) Full Name:
More informationPRIVACY NOTICE STORM RECRUITMENT UNIT 11, 2 ND FLOOR CHARLESLAND CENTRE, GREYSTONES, CO. WICKLOW 1. INTRODUCTION
PRIVACY NOTICE STORM RECRUITMENT UNIT 11, 2 ND FLOOR CHARLESLAND CENTRE, GREYSTONES, CO. WICKLOW 1. INTRODUCTION 1.1 STORM RECRUITMENT is strongly committed to protecting your Personal Data. This Privacy
More informationBusiness Banking Online application
Business Banking Online application This application will register you to Business Banking Online and allow you to: l l l Access accounts held by ONE company or business entity Process Credit Direct Entry
More informationRENEW or UPGRADE APPLICATION CAREER AND TECHNICAL TRADE AND INDUSTRIAL EDUCATION (CTTIE) CERTIFICATE
STATE OF LOUISIANA DEPARTMENT OF EDUCATION POST OFFICE BOX 94064, BATON ROUGE, LOUISIANA 70804-9064 Toll Free #: 1-877-453-2721 http://www.doe.state.la.us RENEW or UPGRADE APPLICATION CAREER AND TECHNICAL
More information