PROCEDURE FOR MOBILE DEVICE & TELEWORKING POLICY
|
|
- Chad Owens
- 5 years ago
- Views:
Transcription
1 CLASSIFICATION Internal DOCUMENT NO: DOCUMENT TITLE: OIL-IS-PRO-MDTP PROCEDURE FOR MOBILE DEVICE & TELEWORKING POLICY VERSION NO 1.0 RELEASE DATE 28/02/2015 LAST REVIEW DATE PROCEDURE FOR MOBILE DEVICE & TELEWORKING POLICY Prepared by Reviewed by : Information Security Manager : CISO
2 Owner : CISO Document Control Document Owner Classification Publication Date CISO Internal 23/03/2015 Revision History Version Date Summary of Changes /02/2015 Initial Release
3 Contents 1 Objective Scope Responsibilities Procedure Statement... 4
4 1. Objective The objective of this procedure is to ensure that security of information and systems, accessed through teleworking and mobile working are given due importance. It is essential that employees have the knowledge that security procedures and policies exist and they are understood and adhered to. 2. Scope The scope of these procedures includes all persons/parties who have access to information and information systems belonging to or under the control of. Processing devices that can be used as part of teleworking or mobile working include: PCs (home based, touchdown centres etc.), laptops and notebooks, tablet PCs, smart phones, personal digital assistants (PDAs), digital cameras, mobile phones and any other mobile device that record and/or process information. Removable media is anything that data can be copied, saved and/or written on to which can then be taken away and restored onto another computer (e.g. CD, DVD, flash drives, USB data sticks, portable hard drives). 3. Responsibilities ISC is responsible for ensuring that all employees and managers are aware of security policies and that they are observed. Managers need to be aware they have a responsibility to ensure employees have sufficient, relevant knowledge concerning the security of information and systems. Designated owners of systems, who have responsibility for the management of the information systems and information, need to ensure that staff are aware of their responsibilities towards security. Designated owners of systems and information need to ensure they uphold the security policies and procedures. 4. Procedure Statement 1. For teleworking and mobile working, access to IT information, networks and applications (including ) can be attained via the ADSL link provided to selected people in OIL or by secure VPN (Virtual Private Network) connection, on the desktop of IT commissioned devices, wherever OIL network is not or cannot be provided. 2. It is possible to access OIL from a remote location (such as home) using non-wireless or wireless technology. This should only be attempted using a web browser via Employees should ensure they pick the tick box stating if they are using a private or shared computer according to the rules given on the entry web page. Employees must ensure when using this service that https is displayed at the start of the address line and the padlock symbol is displayed on the browser window. At the end of using this service employees must logoff OIL webmail and close the browser window. Failure to do so can leave the account accessible to hackers. 3. Connection to the OIL network, for accessing SAP and other applications, through VPN should only be attempted using the domain logon and password credentials which employees are issued with.
5 4. Extra care should be taken to properly close all applications, network connections and web browsers when using PCs, mobile devices and software not officially provided by OIL. Passwords, logon credentials and sensitive files can be left behind on un-trusted devices, making them readily available to subsequent users. 5. Pursuing a connection via Wi-Fi to the OIL Network should not be attempted unless connection can be assured through the known OIL user ID/password based authentication. Free Wi-Fi provided in malls, airports or hotels should not be used to connect to OIL network to access OIL information resources. 6. Users conducting teleworking/mobile working should not allow or give permission for unauthorised users (including family and friends) to use that PC/mobile device. 7. Any information concerning passwords, usernames, network credentials or requirements/ability used to access OIL s information and systems by teleworking/mobile working must not be shared with other staff, unauthorised users, third party vendors, family, friends or members of the public. 8. Teleworking and/or mobile devices provided by OIL should only be used by authorized parties for authorized OIL business or purposes in accordance with OIL s Acceptable Use Policy and associated security policies. 9. A password should be set up and used on all mobile equipment that can be locked by use of a password. For example android devices can be set locked using a password and this facility should not be disabled by the user. 10. In the event that a user becomes aware of an information or data breach or accidental disclosure, this matter must be reported immediately via the OIL s Incident Reporting Procedures. In such an event, password for the user ID of the affected user will be reset immediately to minimise the risk.
Enabling Safe Multi-Computer Usage with Flash Memory. Flash Memory Summit Session 101 Consumer Applications Panelist: Jay Elliot
Enabling Safe Multi-Computer Usage with Flash Memory Flash Memory Summit Session 101 Consumer Applications Panelist: Jay Elliot 1 Migo is a terrific little product that makes life simpler. -Walter Mossberg,
More informationTalk IN THIS EDITION. Fall 2017
August 2017 IN THIS EDITION Life: World Tour Advanced Threat Protection (ATP) Xfinity Cable and Streaming Lineup Multipass Enabled Computer Labs Duquesne Partners With EduRoam And More! Fall 2017 The Newsletter
More informationTeleworking and access to ECHA IT systems
Teleworking and access to ECHA IT systems Biocides CA meeting 16 May 2013 Hugues KENIGSWALD Background The same security model is used to access both REACH/CLP and Biocides data Unified Security Declaration
More informationSecurity Risk Analysis
Security Risk Analysis Risk analysis and risk management may be performed by reviewing and answering the following questions and keeping this review (with date and signature) for evidence of this analysis.
More informationWISHIN Statement on Privacy, Security, and HIPAA Compliance - for WISHIN Pulse
Contents Patient Choice... 2 Security Protections... 2 Participation Agreement... 2 Controls... 3 Break the Glass... 3 Auditing... 3 Privacy Protections... 4 HIPAA Compliance... 4 State Law Compliance...
More information(1) COMNAVRESFOR Telework Information Technology Strategy
DEPARTMENT OF THE NA VY COMMANDER NAVY RESERVE FORCE 1915 FORRESTALDRIVE NORFOLK. V IRGINIA 2355 1-4615 COMNAVRESFOR INSTRUCTION 12610.2A COMNAVRESFORINST 12610.2A NOOCP From : Subj : Commander, Navy Reserve
More informationUpdated FY15 Dignity Health General Compliance Education for Staff Module 2
Updated FY15 Dignity Health General Compliance Education for Staff Module 2 This course will provide you with important information about the laws and regulations that affect the healthcare industry, our
More informationVCU Health System PatientKeeper Connect. Request Instructions
VCU Health System PatientKeeper Connect Request Instructions Remote Clinical User 1. Complete pages 2, 4, and 5. All items are required. 2. Have your Site Supervisor complete and sign page 3. 3. Send forms
More informationEmergency Medical Services Division Policies Procedures Protocols
Emergency Medical Services Division Policies Procedures Protocols Patient Medical Record Security and Privacy Policies and Procedures (1003.00) I. GENERAL PROVISIONS: A. The intent of these policies and
More informationGuide to Enterprise Telework and Remote Access Security (Draft)
Special Publication 800-46 Revision 1 (Draft) Guide to Enterprise Telework and Remote Access Security (Draft) Recommendations of the National Institute of Standards and Technology Karen Scarfone Paul Hoffman
More informationAdvanced HIPAA Communications and University Relations
Advanced HIPAA Communications and University Relations accepts no liability of any use reliance placed on it, as it is warranty, express, or implied, or completeness of 1 the HIPAA Health Insurance Portability
More informationThe Application and Use of Telepresence Robots. April 2011
The Application and Use of Telepresence Robots April 2011 1 Personal Robots? 2 Telepresence Robots 3 The New York Times - Sept 5, 2010 4 Bloomberg Business Week - Feb 21, 2011 5 Three Components of Robotic
More informationAndroid Guide January 2017
Android Guide January 2017 Table of Contents Welcome to imeet for Android 3 Install imeet on your Android smartphone 4 Download the app 4 System requirements 4 Getting started 5 Sign in (hosts and registered
More informationSTEP BY STEP SCHOOL. Data Protection Policy and Privacy Notice
Data Protection Policy and Privacy Notice 1 Contents 1. Aims... 3 2. Legislation and guidance... 3 3. Definitions... 3 4. The data controller... 4 5. Data protection principles... 4 6. Roles and responsibilities...
More information6G Invigilation of Exams: Procedure
Owner: Student Administration Version: 2.2 Effective date: August 2017 (for Academic Year 2018-19) Date of last review: September 2015 (interim review July 2018) Due for review: July 2019 This document
More information10/24/2012. ebenefits. ebenefits Briefing Objectives. Provide ebenefits overview. How to obtain a Premium account
ebenefits Thomas A. Beasley, Iowa Department of Education, Iowa State Approving Agency 1 ebenefits Briefing Objectives Provide ebenefits overview How to obtain a Premium account Introduce the new DoD Registration
More informationINCOMPLETE APPLICATIONS WILL NOT BE PROCESSED
Dear Applicant: Enclosed in this reappointment application for membership to the Guadalupe Regional Medical Center (GRMC) Allied Health Professionals Staff, you will find the following. Allied Health Professional
More informationVMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM
VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM AirWatch v9.3 Have documentation feedback? Submit a Documentation
More informationHelping healthcare: How Clinical Desktop can enrich patient care
Helping healthcare: How Clinical Desktop can enrich patient care Microsoft UK, 2013 Technology should essentially be about delivering benefits for the whole Trust, from clinical staff using the desktop
More informationGlossary for the Information Society Questionnaire Definitions and methods of calculation
Glossary for the Information Society Questionnaire 2002 Definitions and methods of calculation GENERAL NOTES Scope of the data The glossary has been elaborated in order to define the scope and content
More informationNORTHWEST TERRITORIES INFORMATION AND PRIVACY COMMISSIONER Review Recommendation File: July 13, 2015
NORTHWEST TERRITORIES INFORMATION AND PRIVACY COMMISSIONER Review Recommendation 15-138 File: 14-192-4 July 13, 2015 BACKGROUND In November of 2014, a physician working on contract with the Stanton Territorial
More informationLAKE COUNTY COMMON PLEAS COURT GENERAL DIVISION
LAKE COUNTY COMMON PLEAS COURT GENERAL DIVISION REQUEST FOR PROPOSAL FOR COURTROOM AUDIO/VISUAL SYSTEMS January 29, 2015 Lake County Common Pleas Court 47 North Park Place Painesville, OH 44077 LAKE_AVbid_RFP_final.doc
More informationSubj: BUREAU OF NAVAL PERSONNEL POLICY FOR USING NAVY MOBILE DEVICES (SMART PHONE/TABLETS)
BUPERS-07 BUPERS INSTRUCTION 2060.1 From: Chief of Naval Personnel Subj: BUREAU OF NAVAL PERSONNEL POLICY FOR USING NAVY MOBILE DEVICES (SMART PHONE/TABLETS) Ref: (a) CNO WASHINGTON DC 211645Z Apr 15 (NAVADMIN
More informationU.S. Department of Defense: Defense Logistics Agency (DLA) achieves unmatched agility through telework and BYOD strategy
DLA achieves unmatched agility through telework and BYOD strategy White Paper U.S. Department of Defense: Defense Logistics Agency (DLA) achieves unmatched agility through telework and BYOD strategy Redefining
More informationThe future of patient care. 6 ways workflow automation will transform the healthcare experience
The future of patient care 6 ways workflow automation will transform the healthcare experience Workflow automation: The foundation for improved patient care The patient lifecycle goes through many phases.
More informationLooking Ahead The Future of Health Information and Informatics
10 chapter ten Looking Ahead The Future of Health Information and Informatics Learning Outcomes At the end of this chapter, the student should be able to: 10.1 Compare information management to health
More informationReport No. DODIG March 26, Improvements Needed With Tracking and Configuring Army Commercial Mobile Devices
Report No. DODIG-2013-060 March 26, 2013 Improvements Needed With Tracking and Configuring Army Commercial Mobile Devices Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
More informationINFORMATION TECHNOLOGY, MOBILES DIGITAL MEDIA POLICY AND PROCEDURES
INFORMATION TECHNOLOGY, MOBILES AND DIGITAL MEDIA POLICY AND PROCEDURES Updates Who Updated Comments Aug annually Lewis External version TABLE OF CONTENTS AIMS AND LEGISLATION... 3 MOBILE PHONES PARENTS/CARERS
More informationDepartment of Homeland Security Management Directives System MD Number: Issue Date: 06/29/2004 PORTABLE ELECTRONIC DEVICES IN SCI FACILITIES
Department of Homeland Security Management Directives System MD Number: 11021 Issue Date: 06/29/2004 PORTABLE ELECTRONIC DEVICES IN SCI FACILITIES I. Purpose This Directive establishes policy and procedures
More informationVMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM
VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM AirWatch v9.2 Have documentation feedback? Submit a Documentation
More informationMedCheck Frequently Asked Questions (FAQ) (Physician, AHP) GETTING STARTED
GETTING STARTED What is MedCheck? MedCheck is an application used to electronically enter and approve home medication orders. MedCheck will act as the place for maintaining the home med lists for your
More informationCASE STUDIES TACTICAL ADVICE RESOURCES Infrastructure Optimization Security Storage Networking Mobile & Wireless Hardware & Software Management CURRENT ISSUE Subscribe SIGN UP FOR FedTECH E NEWSLETTERS
More informationMobile Device Use: Increasing Privacy and Security Awareness for Nurse Practitioners
La Salle University La Salle University Digital Commons Economic Crime Forensics Capstones Economic Crime Forensics Program Spring 5-18-2015 Mobile Device Use: Increasing Privacy and Security Awareness
More informationRialto Police Department Policy Manual
Rialto Police Department Policy Manual Policy 451 BODY WORN VIDEO SYSTEMS 451.1 PURPOSE AND SCOPE (a) To provide policy and procedures for use of the portable video recording system (BWV) including both
More informationONESOURCE FRINGE BENEFITS TAX ONESOURCE FBT INSTALLATION GUIDE 2017 STAND-ALONE INSTALLATION AND UPGRADE GUIDE. Thomson Reuters ONESOURCE Support
ONESOURCE FRINGE BENEFITS TAX ONESOURCE FBT INSTALLATION GUIDE 2017 STAND-ALONE INSTALLATION AND UPGRADE GUIDE Thomson Reuters ONESOURCE Support Date of issue: 03 Feb 2017 Getting started: Decision tree
More informationwork without walls Best Business Practices to Enable Remote Working By Rieva Lesonsky
Microsoft work without walls Best Business Practices to Enable Remote Working By Rieva Lesonsky About Microsoft Founded in 1975, Microsoft (Nasdaq MSFT ) is the worldwide leader in software, services,
More informationGLOBALMEET RELEASE 4.0
GLOBALMEET RELEASE 4.0 This release includes a major enhancement to webcam sharing, usability improvements, and fixes to issues reported by our customers. SUMMARY OF CHANGES NEW FEATURES AND ENHANCEMENTS
More informationDOCUMENT CONTROL Title: Use of Mobile Phones and Tablets (by services users & visitors in clinical areas) Policy. Version: Reference Number: CL062
DOCUMENT CONTROL Title: Version: Reference Number: Use of Mobile Phones and Tablets (by services users & visitors in clinical areas) Policy 5 CL062 Scope: This Policy applies all employees of the Trust,
More informationHIPAA Training
2011-2012 HIPAA Training New Hire Orientation and General Training 1 This training is to ensure all Health Management workforce members (associates, contracted individuals, volunteers and students) understand
More informationPrecedence Privacy Policy
Precedence Privacy Policy This Policy describes how Precedence Health Care Pty Ltd (Precedence), and any company which it owns or controls, manages personal information for which it is responsible, specifically
More informationethesis Submission Guide: PGR Students
ethesis Submission Guide: PGR Students Table of Contents ethesis submission overview... 2 Notice of Submission... 3 Submitting via My Manchester... 3 Logging in... 3 Unable to see My ETD portlet... 3 ethesis
More informationStudent Orientation: HIPAA Health Insurance Portability & Accountability Act
_ Student Orientation: HIPAA Health Insurance Portability & Accountability Act HIPAA: National Privacy Law History of HIPAA What was once an ethical responsibility to protect a patient s privacy is now
More informationEdith Cowan University Research Management System. Reviewing Research Proposals in ECURMS: A guide for Associate Deans (Research)
Research Management System Reviewing Research Proposals in ECURMS: A guide for Associate Deans (Research) V5 - November 2016 Contents Introduction... 2 Processes... 2 Expression of Interest... 2 Pre-submission...
More informationWorking with Information Governance INFORMATION GOVERNANCE REFRESHER TRAINING WORK BOOK
Working with Information Governance INFORMATION GOVERNANCE REFRESHER TRAINING WORK BOOK Name: Date:.. Training Material & Assessment. Accreditation for Completed Assessments Included 1 IG Refresher Training
More informationHIPAA Privacy and Security Training for Researchers
HIPAA Privacy and Security Training for Researchers Version April 2017 Mountain States Health Alliance Bringing Loving Care to Health Care 1 Course Objectives This learning course covers HIPAA, HITECH,
More informationSecurity Risk Analysis and 365 Days of Meaningful Use. Rodney Gauna & Val Tuerk, Object Health
Security Risk Analysis and 365 Days of Meaningful Use Rodney Gauna & Val Tuerk, Object Health 2 3 Agenda Guidelines for Conducting a Security Risk Analysis Scope of Analysis Risk of a Breach Security Risks
More informationDATA PROTECTION POLICY
DATA PROTECTION POLICY Document Number 2010/35/V1 Document Title Data Protection Policy Author Nic McCullagh Author s Job Title Information Governance Manager Department IM&T Ratifying Committee Capacity
More informationInstructions to apply for fellowships
Instructions to apply for fellowships 2017-2018 Important Note: It is the responsibility of the applicant to be aware of the fellowships deadlines New applicants who are in the process of being admitted
More informationHealthcare Privacy Officer on Evaluating Breach Incidents A look at tools and processes for monitoring compliance and preserving your reputation
Healthcare Privacy Officer on Evaluating Breach Incidents A look at tools and processes for monitoring compliance and preserving your reputation June 20, 2012 ID Experts Webinar www.idexpertscorp.com Mahmood
More informationDiabetes Eye Screener / Photographer Job Description
Diabetes Eye Screener / Photographer Job Description Post Title: Band: Directorate: Base: Managerially accountable to: Professional Accountable to: Diabetes Eye Screener / Photographer 4 (Subject to AFC)
More informationPerformance Centre Hirer s Handbook (Schools) 2018
1 Performance Centre Hirer s Handbook (Schools) 2018 Introduction Thank you for choosing Doncaster Secondary College Performance Centre for your next event/s. Please read College Hire Conditions carefully.-
More informationDownloading Application Viewer
Downloading Application Viewer In order to access, complete and submit applications, you will need to download and install the PureEdge Viewer, a small, free program. PureEdge Viewer: Minimum System Requirements
More informationACCME Data Request Form 792_ Page 1 of 8
The Accreditation Council for Continuing Medical Education (ACCME ) is committed to promoting a dynamic CME enterprise that is well-positioned to adapt to the changing educational needs and expectations
More information!"#$%&'"()!&*+,'#-).!/)*0() 1."+2. Kevin Glinski Lead Developer Evangelist
!"#$%&'"()!&*+,'#-).!/)*0() 1."+2 Kevin Glinski Lead Developer Evangelist PureCloud Platform API REST Based API OAuth2 Authentication API First Design Anatomy of an API URI https://api.mypurecloud.com/v2/users/f8ca529b-4fcb-4196-a34e-
More informationFacility scheduler hca medcity login
Facility scheduler hca medcity login System in cooperation with Hospital Corporation of America (HCA) offers the ADN programs. Care Manual (on campus only); Joanna Briggs Institute (login required). Nurses
More informationGLOBALMEET GLOBALMEET WEB & AUDIO USER GUIDE
GLOBALMEET GLOBALMEET WEB & AUDIO USER GUIDE FOR ipad, iphone, AND ipod TOUCH Release 2.9 July 2017 TABLE OF CONTENTS TABLE OF CONTENTS GlobalMeet Overview 4 Install GlobalMeet 5 Download the App 5 System
More informationJoint Base Lewis-McChord (JBLM), WA Network Enterprise Center (NEC) COMPUTER-USER AGREEMENT Change 1 (30 Jun 2008)
Joint Base Lewis-McChord (JBLM), WA Network Enterprise Center (NEC) COMPUTER-USER AGREEMENT Change 1 (30 Jun 2008) Your Information Management Officer (IMO), System Administrator (SA) or Information Assurance
More informationa health care puzzle 911 System
EMS and Data Management An Evolving Standard Raymond L. Fowler, MD, FACEP Professor of Emergency Medicine Chief of EMS Operations Co-Chief Chief in the Section on EMS, Disaster Medicine, and Homeland Security
More informationDepartment of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 Incorporating Change 1, October 27, 2017 SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure
More informationDeadline for bid submissions: 9:00 a.m. CST, Monday, September 10, INTRODUCTION
August 21, 2018 Deadline for bid submissions: 9:00 a.m. CST, Monday, September 10, 2018. INTRODUCTION Colby Community College will replace 75 HP Prodesk Mini G3 Desktops, 75 HP Probook 450 G5 Laptops,
More informationReport No. D September 25, Controls Over Information Contained in BlackBerry Devices Used Within DoD
Report No. D-2009-111 September 25, 2009 Controls Over Information Contained in BlackBerry Devices Used Within DoD Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for
More informationI. PURPOSE DEFINITIONS. Page 1 of 5
Policy Title: Computer, E-mail and Mobile Computing Device Use Accreditation Reference: Effective Date: October 15, 2014 Review Date: Supercedes: Policy Number: 4.31 Pages: 1.5.9 Attachments: October 15,
More informationPersonal Electronic Devices Acceptable Use Policy
Personal Electronic Devices Acceptable Use Policy Version 1.0 Purpose: For use by: This document is compliant with /supports compliance with: This document supersedes: Approved by: To advise Trust staff
More informationCONTINUOUS IMPROVEMENT INITIATIVE GUIDELINES OCTOBER 2017
CONTINUOUS IMPROVEMENT INITIATIVE GUIDELINES 2017 2018 OCTOBER 2017 What is the purpose of the Continuous Improvement Initiative? Continuous Improvement Initiative Guidelines Launched in February 2007,
More informationEast Carolina University 2010 Annual HIPAA Privacy Training
East Carolina University 2010 Annual HIPAA Privacy Training What are the HIPAA Privacy and Security Rules? Federal laws that govern the use and disclosure of health information of our patients and research
More informationMANITOBA GOVERNMENT INVENTORY OF PERSONAL INFORMATION SYSTEMS WORKSHEET. Here are a few important pointers to help you fill out the Worksheet:
MANITOBA GOVERNMENT INVENTORY OF PERSONAL INFORMATION SYSTEMS WORKSHEET Here are a few important pointers to help you fill out the Worksheet: Read the Inventory Instructions. Print copies of this Worksheet.
More information1:1 Computer RFP School Year Harrison School District Two
1:1 Computer RFP School Year 2018-2019 Harrison School District Two 1060 Harrison Road Colorado Springs, CO 80905 Email: rfp@hsd2.org Supervisor of Technology: Mike Peterson Bids DUE DATE: February 25
More informationAIM Alberta Online Measurement Tool Manual. Instructions for Use Part 1: Set Up and Data Collection
AIM Alberta Online Measurement Tool Manual Instructions for Use Part 1: Set Up and Data Collection Spring 2015 Table of Contents Introduction... 2 Getting Started... 3 Set up your Clinic Profile... 4 Enter
More informationGrants emanagement System (GeMS)
Grants emanagement System (GeMS) Affiliate Applicant User Guide Version 2.0 1 Table of Contents Grant emanagement System Guide Overview... 3 Create a Grants emanagement System (GeMS) Account... 5 Creating
More informationeprint MOBILE DRIVER User Guide
eprint MOBILE DRIVER User Guide eprint Mobile Driver User Guide Copyright and License 2011 Copyright Hewlett-Packard Development Company, L.P. Reproduction, adaptation, or translation without prior written
More informationSM-PGN 01- Security Management Practice Guidance Note Closed Circuit Television (CCTV)-V03
Security Management Practice Guidance Note Closed Circuit Television (CCTV)-V03 Date Issued Issue 7 Sep 17 Issue 8 Dec 17 Issue 9 Mar 18 Planned Review September- 2018 SM-PGN 01- Part of NTW(O)21 Security
More informationFind & Apply. User Guide
Find & Apply User Guide Version 2.0 Prepared April 9, 2008 Grants.gov Find and Apply User Guide Table of Contents Introduction....3 Find Grant Opportunities...4 Search Grant Opportunities...5 Email Subscription...8
More informationDEFCON Authenticator. with Dual USB Port Hub
DEFCON Authenticator with Dual USB Port Hub DEFCON TM Authenticator 2 Introduction Thank you for purchasing the Targus DEFCON Authenticator fingerprint scanner with Dual USB Port Hub. The DEFCON Authenticator
More informationSample Privacy Impact Assessment Report Project: Outsourcing clinical audit to an external company in St. Anywhere s hospital
Sample Privacy Impact Assessment Report Project: Outsourcing clinical audit to an external company in St. Anywhere s hospital October 2010 2 Please Note: The purpose of this document is to demonstrate
More informationWhat is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA
This Application is for Non-employed Clinical Assistants (RN, dental assistant, orthotist, etc) who wish to assist a supervising physician at one or more of our facilities. Advanced Practice Nurses (CRNA,
More informationA protocol for using electronic notes in psychological therapies (talking treatments)
Sheffield Health and Social Care NHS Foundation Trust Psychological Therapies Governance Committee A protocol for using electronic notes in psychological therapies (talking treatments) Review version June
More informationPerformance Centre Hirer s Handbook 2018
Performance Centre Hirer s Handbook 2018 1 Introduction Thank you for choosing Doncaster Secondary College Performance Centre for your next event/s. Please read College Hire Conditions carefully. 1. To
More informationAllworx Reach and Reach Link
Allworx Reach and Reach Link A Complete Business Communication System That Fits in Your Pocket Always stay connected with Allworx Reach. The Reach mobile app extends the rich functionality of your Allworx
More informationGenesis Touch Video Conferencing Customer Training. Honeywell HomMed
Genesis Touch Video Conferencing Customer Training Honeywell HomMed Genesis Touch - Video Option High Level Overview Allows real time video conferencing between Telehealth Clinicians, Case Managers, Patients,
More informationGDPR Records Management Policy
GDPR Records Management Policy Last updated: April 2018 0 Contents: Statement of intent 1. Legal framework 2. Responsibilities 3. Benefits of a retention policy 4. Retention of pupil records and other
More informationOne Size Doesn t Fit All
Brazil The workplace is changing but in Brazil, some traditional practices still hold fast. Working in the office is an expectation, and face time with management is still important. However, mobile technologies
More informationNetrust SSL Web Server Certificate Renewal Application Enrolment Guide
Netrust SSL Web Server Certificate Renewal Application Enrolment Guide Updated: September 2010 Version: 2.0 Table of Contents 1 Introduction 3 2 Requirements 3 3 Launching Netrust SSL Web Server Certificate
More informationSoarian Clinicals View Only
Soarian Clinicals View Only Participant Guide Table of Contents 1. Welcome!... 5 Course Description... 5 Learning Objectives... 5 What to Expect... 5 Evaluation... 5 Agenda... 5 2. Getting Started... 6
More informationHIMSS Security Survey
NOVEMBER 3, HIMSS Security Survey sponsored by Intel Supported by Sponsored by HIMSS Security Survey Sponsored by Intel Final Report November 3, Now in its third year, the HIMSS Security Survey, sponsored
More informationReport Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Report Number: R
Report Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Report Number: R08-1935 Date issued: 24 December 2008 Loss of Patient s Personal Data by United Christian Hospital
More informationThe University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office
The University of Toledo Corporate Compliance and HIPAA Training Presented by: The Compliance and Privacy Office Topics Compliance HIPAA (Health Insurance Portability and Accountability Act) FERPA( Family
More informationRequest for Proposal OGL Information Technology Security Audit
Request for Proposal Issued August 11, 2017 Table of Contents Page Background I. MARC Organizational Structure and Activities 1 II. Operation Green Light Program Description 2 III. OGL Information Technology
More informationTenet ICD-10 Training Information AFFILIATED PHYSICIANS
Tenet ICD-10 Training Information AFFILIATED PHYSICIANS ICD-10: Coming October 1, 2015 Let us help you make a successful transition Dear BHS physician and allied health providers, Per congressional and
More informationTrillium Health Grant Management Requirements Document. Version: Draft Prepared by: Matthew Metcalf 10/6/2014
Trillium Health Grant Management Requirements Document Version: Draft Prepared by: Matthew Metcalf 10/6/2014 Requirements Document Sign Off Karen Elam AJ Blythe Russ Matthew Metcalf Brian To Akshay Karnawat
More informationInformation Privacy and Security
Information Privacy and Security 2015 Purpose of HIPAA HIPAA stands for the Health Insurance Portability and Accountability Act. Its purpose is to establish nationwide protection of patient confidentiality,
More informationASSESSMENT REGULATIONS
Level 2 Certificate in British/Irish Sign Language Unit BSL/ISL 202 - British Sign Language Productive Skills Unit BSL/ISL 203 - British Sign Language Conversational Skills ASSESSMENT REGULATIONS Please
More informationGROW AFRICA INVESTMENT FORUM
F O UNDED BY GROW AFRICA INVESTMENT FORUM 2-4 JUNE 2015, CAPE TOWN INTERNATIONAL CONFERENCE CENTRE (CTICC) CAPE TOWN, SOUTH AFRICA USEFUL INFORMATION This brochure is designed to help you prepare for and
More informationTechnical Considerations of Telecommuting
Technical Whitepaper Technical Considerations of Telecommuting Executive Summary: Corporate devices that are connected back to the corporate network via Virtual Private Networks (VPN) leave critical vulnerabilities
More informationREQUEST FOR PROPOSALS (RFP) Information Technology Services
Northwest Workforce Council PO Box 2009 (101 Prospect Street), Bellingham, WA 98227-360.676.3209 2005 E. College Way, Mount Vernon, WA 98273-360.416.3600 265 NE Kettle St., Ste. 102, Oak Harbor, WA 98277-360.675.5966
More informationCENTRAL TEXAS MEDICAL CENTER
CENTRAL TEXAS MEDICAL CENTER Date: To: Physician Office Staff Personnel or Billing Agents From: Jan Knott, CMSCICPCS Re: Security Registration In order to register you through the CTMC security system
More informationGEMSD Clinical and Anatomical Skills Guide
GEMSD0004.1 Clinical and Anatomical Skills Guide Graduate Entry Medical School Clinical and Anatomical Laboratory Guide CONTENTS 1.0 WELCOME 3 2.0 INTRODUCTION 4 3.0 CLINICAL SKILLS LABORATORIES 4 4.0
More informationHIPAA Privacy Training for Non-Clinical Workforce
Office of Compliance Programs HIPAA Privacy Training for Non-Clinical Workforce Revised: January 24, 2017 HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA)
More informationPrivacy and Security Training for Connecting Ontario. PACE Cardiology April, 2017
Privacy and Security Training for Connecting Ontario PACE Cardiology April, 2017 Session Goals By the end of this session you will: Review key elements of privacy protection Know your privacy obligations
More informationStrengthening Regulations Governing Use of Portable Media. Captain Stuart C. Smith Jr. Major Amy B. Irvin
Strengthening Regulations Governing Use of Portable Media Captain Stuart C. Smith Jr. Major Amy B. Irvin 20 February 2009 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
More informationThe Impact of New Technology in Health Care on Privacy
The Impact of New Technology in Health Care on Privacy Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Ontario College of Social Workers and Social Service Workers June 18, 2008 Presentation
More information