PROCEDURE FOR MOBILE DEVICE & TELEWORKING POLICY

Size: px
Start display at page:

Download "PROCEDURE FOR MOBILE DEVICE & TELEWORKING POLICY"

Transcription

1 CLASSIFICATION Internal DOCUMENT NO: DOCUMENT TITLE: OIL-IS-PRO-MDTP PROCEDURE FOR MOBILE DEVICE & TELEWORKING POLICY VERSION NO 1.0 RELEASE DATE 28/02/2015 LAST REVIEW DATE PROCEDURE FOR MOBILE DEVICE & TELEWORKING POLICY Prepared by Reviewed by : Information Security Manager : CISO

2 Owner : CISO Document Control Document Owner Classification Publication Date CISO Internal 23/03/2015 Revision History Version Date Summary of Changes /02/2015 Initial Release

3 Contents 1 Objective Scope Responsibilities Procedure Statement... 4

4 1. Objective The objective of this procedure is to ensure that security of information and systems, accessed through teleworking and mobile working are given due importance. It is essential that employees have the knowledge that security procedures and policies exist and they are understood and adhered to. 2. Scope The scope of these procedures includes all persons/parties who have access to information and information systems belonging to or under the control of. Processing devices that can be used as part of teleworking or mobile working include: PCs (home based, touchdown centres etc.), laptops and notebooks, tablet PCs, smart phones, personal digital assistants (PDAs), digital cameras, mobile phones and any other mobile device that record and/or process information. Removable media is anything that data can be copied, saved and/or written on to which can then be taken away and restored onto another computer (e.g. CD, DVD, flash drives, USB data sticks, portable hard drives). 3. Responsibilities ISC is responsible for ensuring that all employees and managers are aware of security policies and that they are observed. Managers need to be aware they have a responsibility to ensure employees have sufficient, relevant knowledge concerning the security of information and systems. Designated owners of systems, who have responsibility for the management of the information systems and information, need to ensure that staff are aware of their responsibilities towards security. Designated owners of systems and information need to ensure they uphold the security policies and procedures. 4. Procedure Statement 1. For teleworking and mobile working, access to IT information, networks and applications (including ) can be attained via the ADSL link provided to selected people in OIL or by secure VPN (Virtual Private Network) connection, on the desktop of IT commissioned devices, wherever OIL network is not or cannot be provided. 2. It is possible to access OIL from a remote location (such as home) using non-wireless or wireless technology. This should only be attempted using a web browser via Employees should ensure they pick the tick box stating if they are using a private or shared computer according to the rules given on the entry web page. Employees must ensure when using this service that https is displayed at the start of the address line and the padlock symbol is displayed on the browser window. At the end of using this service employees must logoff OIL webmail and close the browser window. Failure to do so can leave the account accessible to hackers. 3. Connection to the OIL network, for accessing SAP and other applications, through VPN should only be attempted using the domain logon and password credentials which employees are issued with.

5 4. Extra care should be taken to properly close all applications, network connections and web browsers when using PCs, mobile devices and software not officially provided by OIL. Passwords, logon credentials and sensitive files can be left behind on un-trusted devices, making them readily available to subsequent users. 5. Pursuing a connection via Wi-Fi to the OIL Network should not be attempted unless connection can be assured through the known OIL user ID/password based authentication. Free Wi-Fi provided in malls, airports or hotels should not be used to connect to OIL network to access OIL information resources. 6. Users conducting teleworking/mobile working should not allow or give permission for unauthorised users (including family and friends) to use that PC/mobile device. 7. Any information concerning passwords, usernames, network credentials or requirements/ability used to access OIL s information and systems by teleworking/mobile working must not be shared with other staff, unauthorised users, third party vendors, family, friends or members of the public. 8. Teleworking and/or mobile devices provided by OIL should only be used by authorized parties for authorized OIL business or purposes in accordance with OIL s Acceptable Use Policy and associated security policies. 9. A password should be set up and used on all mobile equipment that can be locked by use of a password. For example android devices can be set locked using a password and this facility should not be disabled by the user. 10. In the event that a user becomes aware of an information or data breach or accidental disclosure, this matter must be reported immediately via the OIL s Incident Reporting Procedures. In such an event, password for the user ID of the affected user will be reset immediately to minimise the risk.

Enabling Safe Multi-Computer Usage with Flash Memory. Flash Memory Summit Session 101 Consumer Applications Panelist: Jay Elliot

Enabling Safe Multi-Computer Usage with Flash Memory. Flash Memory Summit Session 101 Consumer Applications Panelist: Jay Elliot Enabling Safe Multi-Computer Usage with Flash Memory Flash Memory Summit Session 101 Consumer Applications Panelist: Jay Elliot 1 Migo is a terrific little product that makes life simpler. -Walter Mossberg,

More information

Talk IN THIS EDITION. Fall 2017

Talk IN THIS EDITION. Fall 2017 August 2017 IN THIS EDITION Life: World Tour Advanced Threat Protection (ATP) Xfinity Cable and Streaming Lineup Multipass Enabled Computer Labs Duquesne Partners With EduRoam And More! Fall 2017 The Newsletter

More information

Teleworking and access to ECHA IT systems

Teleworking and access to ECHA IT systems Teleworking and access to ECHA IT systems Biocides CA meeting 16 May 2013 Hugues KENIGSWALD Background The same security model is used to access both REACH/CLP and Biocides data Unified Security Declaration

More information

Security Risk Analysis

Security Risk Analysis Security Risk Analysis Risk analysis and risk management may be performed by reviewing and answering the following questions and keeping this review (with date and signature) for evidence of this analysis.

More information

WISHIN Statement on Privacy, Security, and HIPAA Compliance - for WISHIN Pulse

WISHIN Statement on Privacy, Security, and HIPAA Compliance - for WISHIN Pulse Contents Patient Choice... 2 Security Protections... 2 Participation Agreement... 2 Controls... 3 Break the Glass... 3 Auditing... 3 Privacy Protections... 4 HIPAA Compliance... 4 State Law Compliance...

More information

(1) COMNAVRESFOR Telework Information Technology Strategy

(1) COMNAVRESFOR Telework Information Technology Strategy DEPARTMENT OF THE NA VY COMMANDER NAVY RESERVE FORCE 1915 FORRESTALDRIVE NORFOLK. V IRGINIA 2355 1-4615 COMNAVRESFOR INSTRUCTION 12610.2A COMNAVRESFORINST 12610.2A NOOCP From : Subj : Commander, Navy Reserve

More information

Updated FY15 Dignity Health General Compliance Education for Staff Module 2

Updated FY15 Dignity Health General Compliance Education for Staff Module 2 Updated FY15 Dignity Health General Compliance Education for Staff Module 2 This course will provide you with important information about the laws and regulations that affect the healthcare industry, our

More information

VCU Health System PatientKeeper Connect. Request Instructions

VCU Health System PatientKeeper Connect. Request Instructions VCU Health System PatientKeeper Connect Request Instructions Remote Clinical User 1. Complete pages 2, 4, and 5. All items are required. 2. Have your Site Supervisor complete and sign page 3. 3. Send forms

More information

Emergency Medical Services Division Policies Procedures Protocols

Emergency Medical Services Division Policies Procedures Protocols Emergency Medical Services Division Policies Procedures Protocols Patient Medical Record Security and Privacy Policies and Procedures (1003.00) I. GENERAL PROVISIONS: A. The intent of these policies and

More information

Guide to Enterprise Telework and Remote Access Security (Draft)

Guide to Enterprise Telework and Remote Access Security (Draft) Special Publication 800-46 Revision 1 (Draft) Guide to Enterprise Telework and Remote Access Security (Draft) Recommendations of the National Institute of Standards and Technology Karen Scarfone Paul Hoffman

More information

Advanced HIPAA Communications and University Relations

Advanced HIPAA Communications and University Relations Advanced HIPAA Communications and University Relations accepts no liability of any use reliance placed on it, as it is warranty, express, or implied, or completeness of 1 the HIPAA Health Insurance Portability

More information

The Application and Use of Telepresence Robots. April 2011

The Application and Use of Telepresence Robots. April 2011 The Application and Use of Telepresence Robots April 2011 1 Personal Robots? 2 Telepresence Robots 3 The New York Times - Sept 5, 2010 4 Bloomberg Business Week - Feb 21, 2011 5 Three Components of Robotic

More information

Android Guide January 2017

Android Guide January 2017 Android Guide January 2017 Table of Contents Welcome to imeet for Android 3 Install imeet on your Android smartphone 4 Download the app 4 System requirements 4 Getting started 5 Sign in (hosts and registered

More information

STEP BY STEP SCHOOL. Data Protection Policy and Privacy Notice

STEP BY STEP SCHOOL. Data Protection Policy and Privacy Notice Data Protection Policy and Privacy Notice 1 Contents 1. Aims... 3 2. Legislation and guidance... 3 3. Definitions... 3 4. The data controller... 4 5. Data protection principles... 4 6. Roles and responsibilities...

More information

6G Invigilation of Exams: Procedure

6G Invigilation of Exams: Procedure Owner: Student Administration Version: 2.2 Effective date: August 2017 (for Academic Year 2018-19) Date of last review: September 2015 (interim review July 2018) Due for review: July 2019 This document

More information

10/24/2012. ebenefits. ebenefits Briefing Objectives. Provide ebenefits overview. How to obtain a Premium account

10/24/2012. ebenefits. ebenefits Briefing Objectives. Provide ebenefits overview. How to obtain a Premium account ebenefits Thomas A. Beasley, Iowa Department of Education, Iowa State Approving Agency 1 ebenefits Briefing Objectives Provide ebenefits overview How to obtain a Premium account Introduce the new DoD Registration

More information

INCOMPLETE APPLICATIONS WILL NOT BE PROCESSED

INCOMPLETE APPLICATIONS WILL NOT BE PROCESSED Dear Applicant: Enclosed in this reappointment application for membership to the Guadalupe Regional Medical Center (GRMC) Allied Health Professionals Staff, you will find the following. Allied Health Professional

More information

VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM

VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM AirWatch v9.3 Have documentation feedback? Submit a Documentation

More information

Helping healthcare: How Clinical Desktop can enrich patient care

Helping healthcare: How Clinical Desktop can enrich patient care Helping healthcare: How Clinical Desktop can enrich patient care Microsoft UK, 2013 Technology should essentially be about delivering benefits for the whole Trust, from clinical staff using the desktop

More information

Glossary for the Information Society Questionnaire Definitions and methods of calculation

Glossary for the Information Society Questionnaire Definitions and methods of calculation Glossary for the Information Society Questionnaire 2002 Definitions and methods of calculation GENERAL NOTES Scope of the data The glossary has been elaborated in order to define the scope and content

More information

NORTHWEST TERRITORIES INFORMATION AND PRIVACY COMMISSIONER Review Recommendation File: July 13, 2015

NORTHWEST TERRITORIES INFORMATION AND PRIVACY COMMISSIONER Review Recommendation File: July 13, 2015 NORTHWEST TERRITORIES INFORMATION AND PRIVACY COMMISSIONER Review Recommendation 15-138 File: 14-192-4 July 13, 2015 BACKGROUND In November of 2014, a physician working on contract with the Stanton Territorial

More information

LAKE COUNTY COMMON PLEAS COURT GENERAL DIVISION

LAKE COUNTY COMMON PLEAS COURT GENERAL DIVISION LAKE COUNTY COMMON PLEAS COURT GENERAL DIVISION REQUEST FOR PROPOSAL FOR COURTROOM AUDIO/VISUAL SYSTEMS January 29, 2015 Lake County Common Pleas Court 47 North Park Place Painesville, OH 44077 LAKE_AVbid_RFP_final.doc

More information

Subj: BUREAU OF NAVAL PERSONNEL POLICY FOR USING NAVY MOBILE DEVICES (SMART PHONE/TABLETS)

Subj: BUREAU OF NAVAL PERSONNEL POLICY FOR USING NAVY MOBILE DEVICES (SMART PHONE/TABLETS) BUPERS-07 BUPERS INSTRUCTION 2060.1 From: Chief of Naval Personnel Subj: BUREAU OF NAVAL PERSONNEL POLICY FOR USING NAVY MOBILE DEVICES (SMART PHONE/TABLETS) Ref: (a) CNO WASHINGTON DC 211645Z Apr 15 (NAVADMIN

More information

U.S. Department of Defense: Defense Logistics Agency (DLA) achieves unmatched agility through telework and BYOD strategy

U.S. Department of Defense: Defense Logistics Agency (DLA) achieves unmatched agility through telework and BYOD strategy DLA achieves unmatched agility through telework and BYOD strategy White Paper U.S. Department of Defense: Defense Logistics Agency (DLA) achieves unmatched agility through telework and BYOD strategy Redefining

More information

The future of patient care. 6 ways workflow automation will transform the healthcare experience

The future of patient care. 6 ways workflow automation will transform the healthcare experience The future of patient care 6 ways workflow automation will transform the healthcare experience Workflow automation: The foundation for improved patient care The patient lifecycle goes through many phases.

More information

Looking Ahead The Future of Health Information and Informatics

Looking Ahead The Future of Health Information and Informatics 10 chapter ten Looking Ahead The Future of Health Information and Informatics Learning Outcomes At the end of this chapter, the student should be able to: 10.1 Compare information management to health

More information

Report No. DODIG March 26, Improvements Needed With Tracking and Configuring Army Commercial Mobile Devices

Report No. DODIG March 26, Improvements Needed With Tracking and Configuring Army Commercial Mobile Devices Report No. DODIG-2013-060 March 26, 2013 Improvements Needed With Tracking and Configuring Army Commercial Mobile Devices Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden

More information

INFORMATION TECHNOLOGY, MOBILES DIGITAL MEDIA POLICY AND PROCEDURES

INFORMATION TECHNOLOGY, MOBILES DIGITAL MEDIA POLICY AND PROCEDURES INFORMATION TECHNOLOGY, MOBILES AND DIGITAL MEDIA POLICY AND PROCEDURES Updates Who Updated Comments Aug annually Lewis External version TABLE OF CONTENTS AIMS AND LEGISLATION... 3 MOBILE PHONES PARENTS/CARERS

More information

Department of Homeland Security Management Directives System MD Number: Issue Date: 06/29/2004 PORTABLE ELECTRONIC DEVICES IN SCI FACILITIES

Department of Homeland Security Management Directives System MD Number: Issue Date: 06/29/2004 PORTABLE ELECTRONIC DEVICES IN SCI FACILITIES Department of Homeland Security Management Directives System MD Number: 11021 Issue Date: 06/29/2004 PORTABLE ELECTRONIC DEVICES IN SCI FACILITIES I. Purpose This Directive establishes policy and procedures

More information

VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM

VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM AirWatch v9.2 Have documentation feedback? Submit a Documentation

More information

MedCheck Frequently Asked Questions (FAQ) (Physician, AHP) GETTING STARTED

MedCheck Frequently Asked Questions (FAQ) (Physician, AHP) GETTING STARTED GETTING STARTED What is MedCheck? MedCheck is an application used to electronically enter and approve home medication orders. MedCheck will act as the place for maintaining the home med lists for your

More information

CASE STUDIES TACTICAL ADVICE RESOURCES Infrastructure Optimization Security Storage Networking Mobile & Wireless Hardware & Software Management CURRENT ISSUE Subscribe SIGN UP FOR FedTECH E NEWSLETTERS

More information

Mobile Device Use: Increasing Privacy and Security Awareness for Nurse Practitioners

Mobile Device Use: Increasing Privacy and Security Awareness for Nurse Practitioners La Salle University La Salle University Digital Commons Economic Crime Forensics Capstones Economic Crime Forensics Program Spring 5-18-2015 Mobile Device Use: Increasing Privacy and Security Awareness

More information

Rialto Police Department Policy Manual

Rialto Police Department Policy Manual Rialto Police Department Policy Manual Policy 451 BODY WORN VIDEO SYSTEMS 451.1 PURPOSE AND SCOPE (a) To provide policy and procedures for use of the portable video recording system (BWV) including both

More information

ONESOURCE FRINGE BENEFITS TAX ONESOURCE FBT INSTALLATION GUIDE 2017 STAND-ALONE INSTALLATION AND UPGRADE GUIDE. Thomson Reuters ONESOURCE Support

ONESOURCE FRINGE BENEFITS TAX ONESOURCE FBT INSTALLATION GUIDE 2017 STAND-ALONE INSTALLATION AND UPGRADE GUIDE. Thomson Reuters ONESOURCE Support ONESOURCE FRINGE BENEFITS TAX ONESOURCE FBT INSTALLATION GUIDE 2017 STAND-ALONE INSTALLATION AND UPGRADE GUIDE Thomson Reuters ONESOURCE Support Date of issue: 03 Feb 2017 Getting started: Decision tree

More information

work without walls Best Business Practices to Enable Remote Working By Rieva Lesonsky

work without walls Best Business Practices to Enable Remote Working By Rieva Lesonsky Microsoft work without walls Best Business Practices to Enable Remote Working By Rieva Lesonsky About Microsoft Founded in 1975, Microsoft (Nasdaq MSFT ) is the worldwide leader in software, services,

More information

GLOBALMEET RELEASE 4.0

GLOBALMEET RELEASE 4.0 GLOBALMEET RELEASE 4.0 This release includes a major enhancement to webcam sharing, usability improvements, and fixes to issues reported by our customers. SUMMARY OF CHANGES NEW FEATURES AND ENHANCEMENTS

More information

DOCUMENT CONTROL Title: Use of Mobile Phones and Tablets (by services users & visitors in clinical areas) Policy. Version: Reference Number: CL062

DOCUMENT CONTROL Title: Use of Mobile Phones and Tablets (by services users & visitors in clinical areas) Policy. Version: Reference Number: CL062 DOCUMENT CONTROL Title: Version: Reference Number: Use of Mobile Phones and Tablets (by services users & visitors in clinical areas) Policy 5 CL062 Scope: This Policy applies all employees of the Trust,

More information

HIPAA Training

HIPAA Training 2011-2012 HIPAA Training New Hire Orientation and General Training 1 This training is to ensure all Health Management workforce members (associates, contracted individuals, volunteers and students) understand

More information

Precedence Privacy Policy

Precedence Privacy Policy Precedence Privacy Policy This Policy describes how Precedence Health Care Pty Ltd (Precedence), and any company which it owns or controls, manages personal information for which it is responsible, specifically

More information

ethesis Submission Guide: PGR Students

ethesis Submission Guide: PGR Students ethesis Submission Guide: PGR Students Table of Contents ethesis submission overview... 2 Notice of Submission... 3 Submitting via My Manchester... 3 Logging in... 3 Unable to see My ETD portlet... 3 ethesis

More information

Student Orientation: HIPAA Health Insurance Portability & Accountability Act

Student Orientation: HIPAA Health Insurance Portability & Accountability Act _ Student Orientation: HIPAA Health Insurance Portability & Accountability Act HIPAA: National Privacy Law History of HIPAA What was once an ethical responsibility to protect a patient s privacy is now

More information

Edith Cowan University Research Management System. Reviewing Research Proposals in ECURMS: A guide for Associate Deans (Research)

Edith Cowan University Research Management System. Reviewing Research Proposals in ECURMS: A guide for Associate Deans (Research) Research Management System Reviewing Research Proposals in ECURMS: A guide for Associate Deans (Research) V5 - November 2016 Contents Introduction... 2 Processes... 2 Expression of Interest... 2 Pre-submission...

More information

Working with Information Governance INFORMATION GOVERNANCE REFRESHER TRAINING WORK BOOK

Working with Information Governance INFORMATION GOVERNANCE REFRESHER TRAINING WORK BOOK Working with Information Governance INFORMATION GOVERNANCE REFRESHER TRAINING WORK BOOK Name: Date:.. Training Material & Assessment. Accreditation for Completed Assessments Included 1 IG Refresher Training

More information

HIPAA Privacy and Security Training for Researchers

HIPAA Privacy and Security Training for Researchers HIPAA Privacy and Security Training for Researchers Version April 2017 Mountain States Health Alliance Bringing Loving Care to Health Care 1 Course Objectives This learning course covers HIPAA, HITECH,

More information

Security Risk Analysis and 365 Days of Meaningful Use. Rodney Gauna & Val Tuerk, Object Health

Security Risk Analysis and 365 Days of Meaningful Use. Rodney Gauna & Val Tuerk, Object Health Security Risk Analysis and 365 Days of Meaningful Use Rodney Gauna & Val Tuerk, Object Health 2 3 Agenda Guidelines for Conducting a Security Risk Analysis Scope of Analysis Risk of a Breach Security Risks

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Document Number 2010/35/V1 Document Title Data Protection Policy Author Nic McCullagh Author s Job Title Information Governance Manager Department IM&T Ratifying Committee Capacity

More information

Instructions to apply for fellowships

Instructions to apply for fellowships Instructions to apply for fellowships 2017-2018 Important Note: It is the responsibility of the applicant to be aware of the fellowships deadlines New applicants who are in the process of being admitted

More information

Healthcare Privacy Officer on Evaluating Breach Incidents A look at tools and processes for monitoring compliance and preserving your reputation

Healthcare Privacy Officer on Evaluating Breach Incidents A look at tools and processes for monitoring compliance and preserving your reputation Healthcare Privacy Officer on Evaluating Breach Incidents A look at tools and processes for monitoring compliance and preserving your reputation June 20, 2012 ID Experts Webinar www.idexpertscorp.com Mahmood

More information

Diabetes Eye Screener / Photographer Job Description

Diabetes Eye Screener / Photographer Job Description Diabetes Eye Screener / Photographer Job Description Post Title: Band: Directorate: Base: Managerially accountable to: Professional Accountable to: Diabetes Eye Screener / Photographer 4 (Subject to AFC)

More information

Performance Centre Hirer s Handbook (Schools) 2018

Performance Centre Hirer s Handbook (Schools) 2018 1 Performance Centre Hirer s Handbook (Schools) 2018 Introduction Thank you for choosing Doncaster Secondary College Performance Centre for your next event/s. Please read College Hire Conditions carefully.-

More information

Downloading Application Viewer

Downloading Application Viewer Downloading Application Viewer In order to access, complete and submit applications, you will need to download and install the PureEdge Viewer, a small, free program. PureEdge Viewer: Minimum System Requirements

More information

ACCME Data Request Form 792_ Page 1 of 8

ACCME Data Request Form 792_ Page 1 of 8 The Accreditation Council for Continuing Medical Education (ACCME ) is committed to promoting a dynamic CME enterprise that is well-positioned to adapt to the changing educational needs and expectations

More information

!"#$%&'"()!&*+,'#-).!/)*0() 1."+2. Kevin Glinski Lead Developer Evangelist

!#$%&'()!&*+,'#-).!/)*0() 1.+2. Kevin Glinski Lead Developer Evangelist !"#$%&'"()!&*+,'#-).!/)*0() 1."+2 Kevin Glinski Lead Developer Evangelist PureCloud Platform API REST Based API OAuth2 Authentication API First Design Anatomy of an API URI https://api.mypurecloud.com/v2/users/f8ca529b-4fcb-4196-a34e-

More information

Facility scheduler hca medcity login

Facility scheduler hca medcity login Facility scheduler hca medcity login System in cooperation with Hospital Corporation of America (HCA) offers the ADN programs. Care Manual (on campus only); Joanna Briggs Institute (login required). Nurses

More information

GLOBALMEET GLOBALMEET WEB & AUDIO USER GUIDE

GLOBALMEET GLOBALMEET WEB & AUDIO USER GUIDE GLOBALMEET GLOBALMEET WEB & AUDIO USER GUIDE FOR ipad, iphone, AND ipod TOUCH Release 2.9 July 2017 TABLE OF CONTENTS TABLE OF CONTENTS GlobalMeet Overview 4 Install GlobalMeet 5 Download the App 5 System

More information

Joint Base Lewis-McChord (JBLM), WA Network Enterprise Center (NEC) COMPUTER-USER AGREEMENT Change 1 (30 Jun 2008)

Joint Base Lewis-McChord (JBLM), WA Network Enterprise Center (NEC) COMPUTER-USER AGREEMENT Change 1 (30 Jun 2008) Joint Base Lewis-McChord (JBLM), WA Network Enterprise Center (NEC) COMPUTER-USER AGREEMENT Change 1 (30 Jun 2008) Your Information Management Officer (IMO), System Administrator (SA) or Information Assurance

More information

a health care puzzle 911 System

a health care puzzle 911 System EMS and Data Management An Evolving Standard Raymond L. Fowler, MD, FACEP Professor of Emergency Medicine Chief of EMS Operations Co-Chief Chief in the Section on EMS, Disaster Medicine, and Homeland Security

More information

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 Incorporating Change 1, October 27, 2017 SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure

More information

Deadline for bid submissions: 9:00 a.m. CST, Monday, September 10, INTRODUCTION

Deadline for bid submissions: 9:00 a.m. CST, Monday, September 10, INTRODUCTION August 21, 2018 Deadline for bid submissions: 9:00 a.m. CST, Monday, September 10, 2018. INTRODUCTION Colby Community College will replace 75 HP Prodesk Mini G3 Desktops, 75 HP Probook 450 G5 Laptops,

More information

Report No. D September 25, Controls Over Information Contained in BlackBerry Devices Used Within DoD

Report No. D September 25, Controls Over Information Contained in BlackBerry Devices Used Within DoD Report No. D-2009-111 September 25, 2009 Controls Over Information Contained in BlackBerry Devices Used Within DoD Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for

More information

I. PURPOSE DEFINITIONS. Page 1 of 5

I. PURPOSE DEFINITIONS. Page 1 of 5 Policy Title: Computer, E-mail and Mobile Computing Device Use Accreditation Reference: Effective Date: October 15, 2014 Review Date: Supercedes: Policy Number: 4.31 Pages: 1.5.9 Attachments: October 15,

More information

Personal Electronic Devices Acceptable Use Policy

Personal Electronic Devices Acceptable Use Policy Personal Electronic Devices Acceptable Use Policy Version 1.0 Purpose: For use by: This document is compliant with /supports compliance with: This document supersedes: Approved by: To advise Trust staff

More information

CONTINUOUS IMPROVEMENT INITIATIVE GUIDELINES OCTOBER 2017

CONTINUOUS IMPROVEMENT INITIATIVE GUIDELINES OCTOBER 2017 CONTINUOUS IMPROVEMENT INITIATIVE GUIDELINES 2017 2018 OCTOBER 2017 What is the purpose of the Continuous Improvement Initiative? Continuous Improvement Initiative Guidelines Launched in February 2007,

More information

East Carolina University 2010 Annual HIPAA Privacy Training

East Carolina University 2010 Annual HIPAA Privacy Training East Carolina University 2010 Annual HIPAA Privacy Training What are the HIPAA Privacy and Security Rules? Federal laws that govern the use and disclosure of health information of our patients and research

More information

MANITOBA GOVERNMENT INVENTORY OF PERSONAL INFORMATION SYSTEMS WORKSHEET. Here are a few important pointers to help you fill out the Worksheet:

MANITOBA GOVERNMENT INVENTORY OF PERSONAL INFORMATION SYSTEMS WORKSHEET. Here are a few important pointers to help you fill out the Worksheet: MANITOBA GOVERNMENT INVENTORY OF PERSONAL INFORMATION SYSTEMS WORKSHEET Here are a few important pointers to help you fill out the Worksheet: Read the Inventory Instructions. Print copies of this Worksheet.

More information

1:1 Computer RFP School Year Harrison School District Two

1:1 Computer RFP School Year Harrison School District Two 1:1 Computer RFP School Year 2018-2019 Harrison School District Two 1060 Harrison Road Colorado Springs, CO 80905 Email: rfp@hsd2.org Supervisor of Technology: Mike Peterson Bids DUE DATE: February 25

More information

AIM Alberta Online Measurement Tool Manual. Instructions for Use Part 1: Set Up and Data Collection

AIM Alberta Online Measurement Tool Manual. Instructions for Use Part 1: Set Up and Data Collection AIM Alberta Online Measurement Tool Manual Instructions for Use Part 1: Set Up and Data Collection Spring 2015 Table of Contents Introduction... 2 Getting Started... 3 Set up your Clinic Profile... 4 Enter

More information

Grants emanagement System (GeMS)

Grants emanagement System (GeMS) Grants emanagement System (GeMS) Affiliate Applicant User Guide Version 2.0 1 Table of Contents Grant emanagement System Guide Overview... 3 Create a Grants emanagement System (GeMS) Account... 5 Creating

More information

eprint MOBILE DRIVER User Guide

eprint MOBILE DRIVER User Guide eprint MOBILE DRIVER User Guide eprint Mobile Driver User Guide Copyright and License 2011 Copyright Hewlett-Packard Development Company, L.P. Reproduction, adaptation, or translation without prior written

More information

SM-PGN 01- Security Management Practice Guidance Note Closed Circuit Television (CCTV)-V03

SM-PGN 01- Security Management Practice Guidance Note Closed Circuit Television (CCTV)-V03 Security Management Practice Guidance Note Closed Circuit Television (CCTV)-V03 Date Issued Issue 7 Sep 17 Issue 8 Dec 17 Issue 9 Mar 18 Planned Review September- 2018 SM-PGN 01- Part of NTW(O)21 Security

More information

Find & Apply. User Guide

Find & Apply. User Guide Find & Apply User Guide Version 2.0 Prepared April 9, 2008 Grants.gov Find and Apply User Guide Table of Contents Introduction....3 Find Grant Opportunities...4 Search Grant Opportunities...5 Email Subscription...8

More information

DEFCON Authenticator. with Dual USB Port Hub

DEFCON Authenticator. with Dual USB Port Hub DEFCON Authenticator with Dual USB Port Hub DEFCON TM Authenticator 2 Introduction Thank you for purchasing the Targus DEFCON Authenticator fingerprint scanner with Dual USB Port Hub. The DEFCON Authenticator

More information

Sample Privacy Impact Assessment Report Project: Outsourcing clinical audit to an external company in St. Anywhere s hospital

Sample Privacy Impact Assessment Report Project: Outsourcing clinical audit to an external company in St. Anywhere s hospital Sample Privacy Impact Assessment Report Project: Outsourcing clinical audit to an external company in St. Anywhere s hospital October 2010 2 Please Note: The purpose of this document is to demonstrate

More information

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA This Application is for Non-employed Clinical Assistants (RN, dental assistant, orthotist, etc) who wish to assist a supervising physician at one or more of our facilities. Advanced Practice Nurses (CRNA,

More information

A protocol for using electronic notes in psychological therapies (talking treatments)

A protocol for using electronic notes in psychological therapies (talking treatments) Sheffield Health and Social Care NHS Foundation Trust Psychological Therapies Governance Committee A protocol for using electronic notes in psychological therapies (talking treatments) Review version June

More information

Performance Centre Hirer s Handbook 2018

Performance Centre Hirer s Handbook 2018 Performance Centre Hirer s Handbook 2018 1 Introduction Thank you for choosing Doncaster Secondary College Performance Centre for your next event/s. Please read College Hire Conditions carefully. 1. To

More information

Allworx Reach and Reach Link

Allworx Reach and Reach Link Allworx Reach and Reach Link A Complete Business Communication System That Fits in Your Pocket Always stay connected with Allworx Reach. The Reach mobile app extends the rich functionality of your Allworx

More information

Genesis Touch Video Conferencing Customer Training. Honeywell HomMed

Genesis Touch Video Conferencing Customer Training. Honeywell HomMed Genesis Touch Video Conferencing Customer Training Honeywell HomMed Genesis Touch - Video Option High Level Overview Allows real time video conferencing between Telehealth Clinicians, Case Managers, Patients,

More information

GDPR Records Management Policy

GDPR Records Management Policy GDPR Records Management Policy Last updated: April 2018 0 Contents: Statement of intent 1. Legal framework 2. Responsibilities 3. Benefits of a retention policy 4. Retention of pupil records and other

More information

One Size Doesn t Fit All

One Size Doesn t Fit All Brazil The workplace is changing but in Brazil, some traditional practices still hold fast. Working in the office is an expectation, and face time with management is still important. However, mobile technologies

More information

Netrust SSL Web Server Certificate Renewal Application Enrolment Guide

Netrust SSL Web Server Certificate Renewal Application Enrolment Guide Netrust SSL Web Server Certificate Renewal Application Enrolment Guide Updated: September 2010 Version: 2.0 Table of Contents 1 Introduction 3 2 Requirements 3 3 Launching Netrust SSL Web Server Certificate

More information

Soarian Clinicals View Only

Soarian Clinicals View Only Soarian Clinicals View Only Participant Guide Table of Contents 1. Welcome!... 5 Course Description... 5 Learning Objectives... 5 What to Expect... 5 Evaluation... 5 Agenda... 5 2. Getting Started... 6

More information

HIMSS Security Survey

HIMSS Security Survey NOVEMBER 3, HIMSS Security Survey sponsored by Intel Supported by Sponsored by HIMSS Security Survey Sponsored by Intel Final Report November 3, Now in its third year, the HIMSS Security Survey, sponsored

More information

Report Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Report Number: R

Report Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Report Number: R Report Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Report Number: R08-1935 Date issued: 24 December 2008 Loss of Patient s Personal Data by United Christian Hospital

More information

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office The University of Toledo Corporate Compliance and HIPAA Training Presented by: The Compliance and Privacy Office Topics Compliance HIPAA (Health Insurance Portability and Accountability Act) FERPA( Family

More information

Request for Proposal OGL Information Technology Security Audit

Request for Proposal OGL Information Technology Security Audit Request for Proposal Issued August 11, 2017 Table of Contents Page Background I. MARC Organizational Structure and Activities 1 II. Operation Green Light Program Description 2 III. OGL Information Technology

More information

Tenet ICD-10 Training Information AFFILIATED PHYSICIANS

Tenet ICD-10 Training Information AFFILIATED PHYSICIANS Tenet ICD-10 Training Information AFFILIATED PHYSICIANS ICD-10: Coming October 1, 2015 Let us help you make a successful transition Dear BHS physician and allied health providers, Per congressional and

More information

Trillium Health Grant Management Requirements Document. Version: Draft Prepared by: Matthew Metcalf 10/6/2014

Trillium Health Grant Management Requirements Document. Version: Draft Prepared by: Matthew Metcalf 10/6/2014 Trillium Health Grant Management Requirements Document Version: Draft Prepared by: Matthew Metcalf 10/6/2014 Requirements Document Sign Off Karen Elam AJ Blythe Russ Matthew Metcalf Brian To Akshay Karnawat

More information

Information Privacy and Security

Information Privacy and Security Information Privacy and Security 2015 Purpose of HIPAA HIPAA stands for the Health Insurance Portability and Accountability Act. Its purpose is to establish nationwide protection of patient confidentiality,

More information

ASSESSMENT REGULATIONS

ASSESSMENT REGULATIONS Level 2 Certificate in British/Irish Sign Language Unit BSL/ISL 202 - British Sign Language Productive Skills Unit BSL/ISL 203 - British Sign Language Conversational Skills ASSESSMENT REGULATIONS Please

More information

GROW AFRICA INVESTMENT FORUM

GROW AFRICA INVESTMENT FORUM F O UNDED BY GROW AFRICA INVESTMENT FORUM 2-4 JUNE 2015, CAPE TOWN INTERNATIONAL CONFERENCE CENTRE (CTICC) CAPE TOWN, SOUTH AFRICA USEFUL INFORMATION This brochure is designed to help you prepare for and

More information

Technical Considerations of Telecommuting

Technical Considerations of Telecommuting Technical Whitepaper Technical Considerations of Telecommuting Executive Summary: Corporate devices that are connected back to the corporate network via Virtual Private Networks (VPN) leave critical vulnerabilities

More information

REQUEST FOR PROPOSALS (RFP) Information Technology Services

REQUEST FOR PROPOSALS (RFP) Information Technology Services Northwest Workforce Council PO Box 2009 (101 Prospect Street), Bellingham, WA 98227-360.676.3209 2005 E. College Way, Mount Vernon, WA 98273-360.416.3600 265 NE Kettle St., Ste. 102, Oak Harbor, WA 98277-360.675.5966

More information

CENTRAL TEXAS MEDICAL CENTER

CENTRAL TEXAS MEDICAL CENTER CENTRAL TEXAS MEDICAL CENTER Date: To: Physician Office Staff Personnel or Billing Agents From: Jan Knott, CMSCICPCS Re: Security Registration In order to register you through the CTMC security system

More information

GEMSD Clinical and Anatomical Skills Guide

GEMSD Clinical and Anatomical Skills Guide GEMSD0004.1 Clinical and Anatomical Skills Guide Graduate Entry Medical School Clinical and Anatomical Laboratory Guide CONTENTS 1.0 WELCOME 3 2.0 INTRODUCTION 4 3.0 CLINICAL SKILLS LABORATORIES 4 4.0

More information

HIPAA Privacy Training for Non-Clinical Workforce

HIPAA Privacy Training for Non-Clinical Workforce Office of Compliance Programs HIPAA Privacy Training for Non-Clinical Workforce Revised: January 24, 2017 HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA)

More information

Privacy and Security Training for Connecting Ontario. PACE Cardiology April, 2017

Privacy and Security Training for Connecting Ontario. PACE Cardiology April, 2017 Privacy and Security Training for Connecting Ontario PACE Cardiology April, 2017 Session Goals By the end of this session you will: Review key elements of privacy protection Know your privacy obligations

More information

Strengthening Regulations Governing Use of Portable Media. Captain Stuart C. Smith Jr. Major Amy B. Irvin

Strengthening Regulations Governing Use of Portable Media. Captain Stuart C. Smith Jr. Major Amy B. Irvin Strengthening Regulations Governing Use of Portable Media Captain Stuart C. Smith Jr. Major Amy B. Irvin 20 February 2009 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden

More information

The Impact of New Technology in Health Care on Privacy

The Impact of New Technology in Health Care on Privacy The Impact of New Technology in Health Care on Privacy Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Ontario College of Social Workers and Social Service Workers June 18, 2008 Presentation

More information