TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Laptop Responsibilities Memorial Middle School Laredo ISD.
Northside I.S.D. Acceptable Use Policy
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Nakhon Sawan Rajabhat University. Office 365 for Education.
{ Making Microsoft Office work for you Organizing Your Life at work and home in the Cloud Presented by: Matthew Baker (321)
Woodland Hills School District Computer Network Acceptable Use Policy.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Acceptable Use By: Keith R. Watson CoC Information Security Manager.
Developing a Records & Information Retention & Disposition Program:
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Understanding and Building Basic Networks Chapter 3 The Other Internet.
HIPAA Data Security PCF Data Security Update May 1 st, 2015.
Sarah Showalter Summer Utilizing the school computers, network, and storage space is a privilege! Each year all users are expected to review.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
VISD Acceptable Use Policy
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Advanced Last Updated: May Class Outline Part 1 - Review –Review of basics –Review of files and folders Part 2 - Attachments –Sending.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Opening SharePoint to External Users.  Centralize all files  Eliminate the need for Matching Subs RFI’s to our RFI’s (Dan Campbell, ETC)  Create a.
CAB Symposium Message Management Archiving Presented by: Customer Staff Development Services.
Information Governance Jym Bates Head of Information Assurance.
Security Awareness Norfolk State University Policies.
CPS Acceptable Use Policy Day 2 – Technology Session.
IT Roundtable Archiving Presented by: RKL eSolutions 1/18/2012.
Using SWHS: The AUP [Acceptable Use Policy]
ESCCO Data Security Training David Dixon September 2014.
Corporate Information Systems Delivery of Infrastructure IT Services.
Green Computing Sharing files to reduce printing.
AP ENGLISH/AP HISTORY DIGITAL CONVERSION PARENT INFORMATION MEETING.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Module 9 Configuring Messaging Policy and Compliance.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
Information Security Training for People who Supervise Computer Users.
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
Technology Updates RCAS vs. State System Vault Overload Security Policies In/Out Board H1N1 IT and Financial Office Preparedness Lesa Quinn,
Module 7 Planning and Deploying Messaging Compliance.
Teleworking Effectively Or, how to work from home without SNA or a token. Don’t be this guy:
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
PCI-DSS: Guidelines & Procedures When Working With Sensitive Data.
Society & Computers PowerPoint
Woodland Hills School District Computer Network Acceptable Use Policy.
ITS Lunch & Learn November 13, What is Office 365? Office 365 is Microsoft’s software as a service offering. It includes hosted and calendaring.
JOHN MARSHALL COMMUNITY SCHOOL Media Center Mrs. Shepard Updated 2/8/14.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Sample security policy Dr Alexei Vernitski.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Acceptable Use Policy.
Gareth Johns IT Skills Development Advisor
LAUSD Responsible Use Policy (RUP)
Store, Share, Sync and Collaborate
Introduction to Soonr by ….
COM Orientation The template can be used to create presentations for community, civic, advocacy and government relations groups. It is also appropriate.
Gareth Johns IT Skills Development Advisor
Administrator’s Manual
COMPLETE BUSINESS TEXTING SOLUTION
Woodland Hills School District
Presentation transcript:

TRUENORTH TECHNOLOGY POLICIES OVERVIEW

This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile device syncing applications (iTunes) THIRD PARTY SOFTWARE ONLY SOFTWARE APPROVED AND INSTALL BY TECHNOLOGY IS ALLOWED ON TRUENORTH MANAGED EQUIPMENT.

A 3GB mailbox will be provided to all TrueNorth staff and producers. An archive with an unlimited amount of space will also be provided for retention purposes. All s will be kept for 5 years after which time they will be purged from our system. – Exceptions to this rule may be made based on recommendations from the legal department. ELECTRONIC COMMUNICATIONS MAILBOX SIZE ATTACHMENTS / AMS / ENCRYPTION All communications should be stored in the appropriate agency management platform. Document sharing with internal contacts should not be performed through , but through the shared drive or SharePoint. All outbound s will be scanned for credit card numbers and social security numbers. If such information is found, the will be flagged for secure message delivery. This system may also be manual active by placing the work “secure” in the subject line of the message.

TrueNorth utilizes Skype for Business as its companywide instant message platform. All other instant message systems are prohibited. Use of personal accounts at work is also prohibited. This includes checking of personal on any TrueNorth managed equipment. PERSONAL AND INSTANT MESSAGING ONLY TECHNOLOGY APPROVED COMMUNICATION SYSTEMS SHOULD BE USED.

The shared drive is for sharing of documents with others inside our organization. This space is separated by department and by role, with permissions delegated accordingly. No personal information should be stored on this drive. Anything found to be personal may be removed after notification. DATA SHARING AND STORAGE SHARED DRIVE

Customer information should only be stored on encrypted TrueNorth managed devices. This includes both Laptops and tablets. All mobile devices must have a password or PIN lock for added security. It is the users responsibility to ensure all mobile devices and information are stored and handled securely when outside the TrueNorth building. MOBILE DEVICES

No files should be saved directly to your local computer. All documents and files should be saved in either : – Department specific document management platform (EPIC, GEN4, OverDrive, Paperwise) – Your Personal My Documents or Desktop Folder. Both of these locations are backed up for data retention and recovery. TrueNorth data and customer information should never be stored on a personal cloud storage service. Only TrueNorth approved solutions are allowed. DATA SHARING AND STORAGE FILE STORAGE

Internet should be used for business-related reasons during normal working hours. Games, streaming music and video as well as non-business related downloads are prohibited. TrueNorth blocks categories of sites deemed non-work appropriate including: – Adult/Sexually Explicit, Chat, Gambling, Personals & Dating, Glamour & Intimate Apparel, Sex Education, Hacking, Hate Speech, and Violence. TrueNorth companies does monitors the usage of Internet activity. INTERNET USAGE

It is required that you change your network password once every 60 days. This does not include any alternate passwords such as ADP, Gen4, Overdrive, etc. Passwords should never be shared with anyone internally or externally. Your TrueNorth password should be unique and not used for any other services. PASSWORDS PASSWORD GUIDELINES AND USAGE

All information and materials on TrueNorth systems and equipment is TrueNorth property and should not of any expectation of privacy in such information or materials. DATA OWNERSHIP

Additional information and full Technology polices are available on the polices section of the Technology Helpdesk. ADDITIONAL INFORMATION