KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

IT Security Policy Framework
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Internet Safety and Standard Operating Procedures School Board Meeting-February 14, 2012.
BUSINESS B2 Ethics.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
SIU School of Medicine Identity Protection Act and Associated SIU Policy.
Strengthening Password Policy via Outlook Features Password Policy and How-To Guide Richard Steiner December 16, 2003
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
Merit Quick Start Guide Overview As a manager, you may award a regular merits and one-time merits to your employees. Awarding a merit requires several.
Uintah School District Acceptable Use for Computer and Network Access.
Information Security Policies and Standards
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Payment Card Industry (PCI) Data Security Standard
Examine Quality Assurance/Quality Control Documentation
Week 7 ASR plus a little CHANGE & INNOVATION
Network security policy: best practices
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
CPS Acceptable Use Policy Day 2 – Technology Session.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
HIPAA PRIVACY AND SECURITY AWARENESS.
Creating an Effective Policy Central Missouri Chapter Jesse Wilkins April 16, 2009.
Principle of Protection By C’Les Jensema About ARMA International and the Generally Accepted Recordkeeping Principles® ARMA International (
COBIT - IT Governance.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
M a k i n g w o r k e r s ’ c o m p w o r k ® Content Management & Records Retention “A RIM Perspective” Nancy M. Maglothin, Records and Information Manager.
Instructional & Information Technology Services Fall, Activities and Updates Teresa Macklin Information Security Officer Information Security.
Module 9 Configuring Messaging Policy and Compliance.
1 User Policy (slides from Michael Ee and Julia Gideon)
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Practice Management Quality Control
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
The University of Georgia. /1002 Ensure that the University is appropriately managing risk to information assets and information services.
Our Acceptable Use Policy An Overview What is an Acceptable Use Policy (AUP)?
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
CORPORATE RECORDS RETENTION POLICY TRAINING By: Diana C. Toman, Corporate Counsel & Assistant Secretary.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Chapter 2 Securing Network Server and User Workstations.
EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.
TECHNICAL WRITING November 2 nd, Today Instruction style Procedures for Policy.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Employer Login Setup & Password Reset. The following information is available by either going to FFGA Marketing Sharepoint site at
Policies and Security for Internet Access
August 31, The Etowah County School District’s electronic network is available to all students and employees. The goal is to foster learning environments.
Records Management in Government Prepared by the Information Management Unit Saskatchewan Archives Board.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
CACHE Level 3 Early Years Educator CACHE LEVEL 3 CHILDCARE & EDUCATION Unit 7 Observation, assessment and planning Lesson 3 © Hodder & Stoughton Limited.
Online Training Course
Legal and Ethical Responsibilities
How to Install Norton Antivirus on Android Phone? We are providing easy steps to install Norton antivirus on android phone. If you facing any technical issue related to installing then you should contact via support. Get more details to visit our website
CAH Healthcare Worker Immunizations
Good Spirit School Division
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & ProceduresAgenda What are the NEW KELLY IT Security Policies and Procedures Why Implement These Now? How Will This Affect Me?

KELLY Policy & Procedures The NEW IT Policies and Procedures Acceptable Use Building Security Document Destruction Retention Use Encryption Info Classification Passwords VPN

KELLY Policy & Procedures Acceptable Use Defines what is acceptable use of KELLY equipment ( , workstation)Defines what is acceptable use of KELLY equipment ( , workstation) Details the types of systems and equipment that are expected to only be used for business related purposesDetails the types of systems and equipment that are expected to only be used for business related purposes

KELLY Policy & Procedures Building Security Policy ensures the physical security of KELLY properties and the data housed withinPolicy ensures the physical security of KELLY properties and the data housed within Details the type of access, monitoring and reporting and to whom it appliesDetails the type of access, monitoring and reporting and to whom it applies

KELLY Policy & Procedures Document Destruction Describes the proper practices regarding the removal and destruction of sensitive paper dataDescribes the proper practices regarding the removal and destruction of sensitive paper data Explains the type of data to be managed, the timeliness and proper methods to insures its appropriate destructionExplains the type of data to be managed, the timeliness and proper methods to insures its appropriate destruction

KELLY Policy & Procedures Retention Defines guidelines for employees to use to determine what should be kept and for how longDefines guidelines for employees to use to determine what should be kept and for how long This policy is directed not only to but voice messages as well.This policy is directed not only to but voice messages as well.

KELLY Policy & Procedures Use Defines the appropriate use of and details who this policy effectsDefines the appropriate use of and details who this policy effects Explains why it is paramount that external and internal s must adhere to these standardsExplains why it is paramount that external and internal s must adhere to these standards

KELLY Policy & ProceduresEncryption Describes what encryption is and why it should be usedDescribes what encryption is and why it should be used The resulting procedure provides instruction on how to encrypt sThe resulting procedure provides instruction on how to encrypt s

KELLY Policy & Procedures Information Classification Defines process for identifying and classifying data and why it is essentialDefines process for identifying and classifying data and why it is essential Explains the levels of security to be used when classifying data and who should have access to what levelsExplains the levels of security to be used when classifying data and who should have access to what levels

KELLY Policy & ProceduresPasswords Explains why strong passwords are necessary and the effects of poorly chosen onesExplains why strong passwords are necessary and the effects of poorly chosen ones Outlines the rules and how they will effect your passwordsOutlines the rules and how they will effect your passwords

KELLY Policy & Procedures Virtual Private Network (VPN) Defines acceptable usage of the VPN, by whom and for how longDefines acceptable usage of the VPN, by whom and for how long The resulting procedures provide users instructions on how request a VPN and how to install it once grantedThe resulting procedures provide users instructions on how request a VPN and how to install it once granted

KELLY Policy & Procedures Why Implement Policies & Procedures? To provide better controls for the physical environment (i.e. your safety)To provide better controls for the physical environment (i.e. your safety) Safeguard all client data sent electronically or housed internallySafeguard all client data sent electronically or housed internally

KELLY Policy & Procedures Why Implement Policies & Procedures? Establish security practices to better support long term growth that will require more structureEstablish security practices to better support long term growth that will require more structure –Integrated Payroll Services –Future Lines added (example, Workers Comp)

KELLY Policy & Procedures How will these Affect Me? You will be responsible to read and understand these policy and procedures and modify your behavior accordinglyYou will be responsible to read and understand these policy and procedures and modify your behavior accordingly We ask you to use professional judgment where necessaryWe ask you to use professional judgment where necessary Please work with your managers to ensure they are followedPlease work with your managers to ensure they are followed

KELLY Policy & Procedures Where to find these documents? For more information, please reference them online on the Inner Circle Home page.For more information, please reference them online on the Inner Circle Home page.