Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Technology Policies and Procedures

No description
by

Emily Bobrovsky

on 16 February 2017

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Technology Policies and Procedures

Acceptable
Use Policy

Purpose

Scope
Information Systems
Manipulate Computer
Messaging
Internet
Social Media
Technology Policies and Procedures
Privacy
Access
University of Washington "DawgBytes"
Having a "Hacking Mindset"
Technology vulnerabilities would not have existed if we didn’t have programming. However, learning how to identify such vulnerabilities and how to hack is an important way to prevent cybercrime
2 months..?
1 year...?
Communications
Audience
Inappropriate
and
Unacceptable Use
It is the Firm’s policy to adhere, to the fullest extent possible, to regulatory, ethical, and operational standards set forth in the American Bar Association (ABA) Model Rules of Professional Conduct, Health Insurance Portability and Accountability Act (HIPAA), Health Information Technology for Economic and Clinical Health (HITECH) Act, Gramm Leach Bliley (GLB) Act, Copyright Law, other applicable laws and regulations, and clients’ applicable security requirements.

Infrastructure
Communication systems
Messaging systems
Services and Hosted systems
Software
Information
Devices
Mobile devices
Users
Use of Information Systems to create,
view, store, transmit, or receive any material (visual, textual, or auditory) that violates the Firm's Harassment Policy

Criminal activity involving Information Systems, including (but not limited to): violation of applicable local, state, provincial, federal, national or international laws, treaties, court orders, ordinances, regulations or administrative rules

Activity which could compromise the confidentiality, integrity, or availability of Information or Information Systems

Interception or attempted interception of communications or Information by parties not explicitly intended to receive them without approval

Use of Information Systems to conduct a non-Firm commercial business

Devices and mobile devices
are required to have virus spyware software with scheduled updates

Device displays lock after 15 minutes of inactivity

Devices
Mobile devices lock after 5
minutes of inactivity and
to enter password to
unlock the screen
Mobile devices have additional security controls such as hard drive encryption, mobile device management, location tracking, and remote wipe

All Firm personnel are required to acknowledge they have received and read the Acceptable Use Policy
there is no expectation of privacy regarding any usage of the Firm's Information Systems
Network account passwords are required to be complex
Passwords must be updated every 120 days
Access to Information Systems is granted based on job role. Additional or elevated access must be requested and approved.
Firm wireless (WiFi) network access passwords must not be shared with anyone.

The Firm has adopted standards related to applications, electronic communications, formats, and procedures for the preparation, revision, and printing of Firm documents, client work product, and data entry.

Standards
and
Usage
Firm Material
Users should not place, transmit or release any Firm material (software, internal documents, client work product, internal or external correspondence, intellectual property, etc.) on any publicly accessible internet site, social network site, blog, or other news site, without permission from the client, original author, and the Firm.
Users should not place, transmit or release any Firm material (software, internal documents, client work product, internal or external correspondence, intellectual property, etc.) on any publicly accessible internet site, social network site, blog, or other news site, without permission from the client, original author, and the Firm
Usage
Internet usage should be limited to the Firm's practice, its business and Firm-related activities. Appropriate uses include research, email with clients, interactive discussion for research, and access to websites or other on-line material related to the Firm's practice and its business.
Firm personnel are expected to exercise good judgment in their Internet use. Internet use for activities that would reflect poorly on the Firm, the User, clients, or others at the Firm is prohibited. The use of the Firm's Information Systems and Internet services to visit pornography or other inappropriate sites that may violate the Firm's Harassment Policy or other policies is strictly prohibited.
Firm Material
Users should not place, transmit or release any Firm material (software, internal documents, client work product, internal or external correspondence, intellectual property, etc.) on any publicly accessible internet site, social network site, blog, or other news site, without permission from the client, original author, and the Firm.
Social Media
When Firm email addresses or Firm Information Systems are used to access and engage in social media sites, Users will be held fully responsible for their actions. Personnel using these websites are acting outside the course and scope of their employment and without authority when they engage in any inappropriate or unlawful activity or when their conduct is in violation of the Firm's Harassment Policy.

Communications and postings (text or multimedia) that may be threatening, harassing, defamatory, unlawful or harmful to the Firm's business or goodwill, even when the employee is off-duty, will be subject to review and consideration under all applicable Firm policies and existing laws.
Guidelines
Personnel entering social media websites – either on behalf of the Firm or a client, or for personal use -- must use extreme caution in their statements, as these could be traced to the individual and the Firm.

Firm employees are encouraged to share materials that have been created and pre-approved by the Firm’s Marketing Department on social media websites.

Firm business or administrative activity or intellectual property must not be discussed on these sites without OGC approval.

Users should not provide legal advice or any information that could be construed as legal advice.
Licensing
Copyright
and
It is illegal to download copyrighted material without written authorization. Downloading and copying of text, images, and music from the Internet may constitute copyright infringement for which the Firm and the individual may be liable. Firm policy prohibits such downloads.
Full transcript