...POLICY Acceptable Use for ICT Facilities (for Students) Purpose Student users of Özyeğin University computing and network systems, facilities and services are bound by the rules and definitions outlined in this policy. All the facilities provided to students by the University are designed and implemented for the ease of use, ease of access, faster communication and higher productivity. Compliance with this policy and proper use of system resources are vital for success. Therefore, the University has the full authority and right to audit, while providing wide and secure IT facilities. Scope All applications and usage relating to IT facilities provided for students. Validity This document is effective as of the date it is uploaded to the system. It is revised and updated in the first two months of every year and when necessary. Only the latest version on the system is valid. This is why printing the document is not recommended. In the case that a printed copy is used, it is the user’s responsibility to check the document’s validity through the system. Definitions Computing and Network Systems: Includes LANs, wireless and modem connections, on-campus telephone system, faxes, printers, plotters, scanners on the network as well as all types of communication, printing and publishing devices that work off-line. Facilities All IT facilities and services either provided on-campus in laboratories, libraries and/or any other on-campus locations or provided off-campus through remote access...
Words: 1089 - Pages: 5
...Security Proposal Information security policies and procedures are the cornerstone of any information security program - and they are among the items that typically receive the greatest scrutiny from examiners and regulators. But beyond satisfying examiners, clear and practical policies and procedures define an organization's expectations for security and how to meet those expectations. With a good set of policies and procedures, employees, customers, partners and vendors all know where you stand and where they fit in the information security scheme. The key to creating effective policies and procedures is to start with a solid risk assessment, and then follow a measured program that includes implementation, monitoring, testing, and reporting. Planning, implementing and monitoring security policies and procedures may vary from one network to the other, including different levels of security in LANs and WANs. There are logical and physical means to secure networks, and now we must pay special attention to securing the Internet, for instance web browsing and email. I have included a network access, procedure and policy proposal below: ABC Company Policy Section of Corporate Security Policies | Target audience ABC Company | Confidential | Page 1-5 | ABC Company Policy: Network Access and Authentication Policy Created: 8/15/2014 Section of: Corporate Security Policies Target Audience: CONFIDENTIAL Page: 1 of 5 ABC Company is now referred to as “the company.” 1.0 Overview ...
Words: 2042 - Pages: 9
...September 2005, is a new International Standard designed toensure safe food supply chains worldwide and the first of a family on food safety management systems. Food safety management systems – Requirements for any organization in the food chain, provides a framework of internationally harmonized requirements for the global approach that is needed. The standard has been developed within ISO by experts from the food industry, along with representatives of specialized international organizations and in close cooperation with the Codex Alimentarius Commission, the body jointly established by the United Nations’ Food and Agriculture Organization (FAO) and World Health Organization (WHO) to develop food standards. Many organizations that use ISO 22000 systems are now choosing to also implement ISO 14001 and OHSAS 18001 compliant systems due to factors such as demands of government regulations, customers, risk management, market requirements and corporate commitment. Although these ISO and OHSAS standards were developed to serve different purposes, they share many similarities. Below are the cross references between ISO 22000 : 2005, ISO 14001 and OHSAS 18001. Cross references between ISO 22000:2005, ISO 14001:2004 and OHSAS 18001 : 2007. ISO 22000:2005 | ISO 14001:2004 | OHSAS 18001:2007 | Introduction | Introduction | Introduction |...
Words: 5111 - Pages: 21
...HR 512 Training Training on Sexual Harassment Carolyn P Garrity November 21th, 2012 Sanjoy Barman Md. Kamrul Ahsan Emon Rafsan Kabir Confederation College Contents Introduction 3 Training Need Analysis 4 Tool Design: 4 Effective use of tools: 4 Survey on Sexual Harassment 5 Report of findings: 7 TRAINING PROPOSAL 12 1. Title of Training Proposal: Avoid Sexual Harassment at Your Workplace. 12 2. Sector: 12 3. Brief Description of Training 12 3.1 Training Objective: 13 Participants will learn: 13 TRAINING DESIGN 14 4. Details of Training Design: 14 4.1Proposed Date and Duration of Training 14 4.2 Course Outline: 15 I. Understand and reinforce the need for sexual harassment training 15 II. Identify and legally define discrimination and harassment 15 III. Prevent harassment and discrimination 15 IV. Understand different gender and cultural communication methods 16 V. Active and respectful communication skills 16 VI. Case study application, course review and examination 16 4.3 Training Output: 17 4.3 Methodology: 17 Return on Investment 18 Target Group 18 Training Costs 19 Training Plan 20 Name and Designation of Officer to be contacted for details: 23 Bibliography 24 Appendix 25 Introduction Training helps the organization to identify the effectiveness of training. It indicates the performance required for the employees to perform the job. Training plays an important role to develop the skills and performance of the...
Words: 3197 - Pages: 13
...Security Policy Rev 1.1.15.12.4 Dec 2015 Editors: Rhombus, Inc. Policy Team 1 Rhombus, Inc. 14 1.1 About This Document 14 1.2 Company History 14 1.3 Company Structure and IT Assets 14 1.4 Industry Standards 15 1.5 Common Industry Threats 15 1.6 Policy Enforcement 16 2 Credit Card Security Policy 17 2.1 Introduction 17 2.2 Scope of Compliance 17 2.3 Requirement 1: Build and Maintain a Secure Network 17 2.4 Requirement 2: Do not use Vendor-Supplied Defaults for System Passwords and Other Security Parameters 18 2.5 Requirement 3: Protect Stored Cardholder Data 19 2.6 Requirement 4: Encrypt Transmission of Cardholder Data across Open and/or Public Networks 20 2.7 Requirement 5: use and Regularly Update Anti-Virus Software or Programs 20 2.8 Requirement 6: Develop and Maintain Secure Systems and Applications 21 2.9 Requirement 7: Restrict Access to Cardholder Data by Business Need to Know 21 2.10 Requirement 8: Assign a Unique ID to Each Person with Computer Access 22 2.11 Requirement 9: Restrict Physical Access to Cardholder Data 22 2.12 Requirement 10: Regularly Monitor and Test Networks 23 2.13 Requirement 11: Regularly Test Security Systems and Processes 25 2.14 Requirement 12: Maintain a Policy that Addresses Information Security for Employees and Contractors 26 2.15 Revision History 29 3 Acceptable Use Policy 30 3.1 Overview 30 3.2 Purpose 30 3.3 Scope 30 3.4 Policy 31 3.5...
Words: 26545 - Pages: 107
...Table of Content 1. Introduction 2 2. Project Management 3 2.1 Definition of Project Management 3 2.2 Advantages and Disadvantages in Project Management 5 2.3 Success Factors in Projects 6 2.4 Control Project Progress 7 3. Project Risk Management 8 3.1 The Risk Management Process 8 3.2 Definition of Risk 10 3.3 Managing Risk 10 3.4 Identify Risks 11 3.5 Risk Quantification 14 3.6 Plan Risk Response / Methods 14 3.7 Risk Monitoring 18 4. The Organization of an International Conference in Paris, France 19 4.1 Project Identification 19 4.2 Classified the Project 20 4.3 Identification of Risks and measures to minimize the risk 21 5. Conclusion 23 6. List of Illustrations 24 1. Introduction The planned International Conference – “Launching Strategy of a new product”, reported to our management and sales persons is a new Project and has to be well organized and effectively realized. To ensure that the project leads to a suitable performance and to improve project success, a Risk Management Plan needs to be developed very early in the planning stage. For the project success, it is essential that potential risks are identified, categorized and evaluated. This seminar paper focuses on the relationship between the project organization and the application of risk management and the importance of implementing a Risk Management system to achieve the project objectives. This paper is subdivided into three...
Words: 3771 - Pages: 16
...Acceptable IT Usage Policy Acceptable IT Usage Policy Capgemini India The information contained within this document is the property of CAPGEMINI INDIA and is issued in confidence and must not be reproduced in whole or in part. Acceptable IT Usage Policy Document Control Revision History Date Version 8th June 2004 ISMS-Annex04/1.0 1.1 Author C. Rai – ISMS Manager C. Rai – ISMS Manager Description FIRST RELEASE Second Release – Revision of earlier release to adapt QMS guidelines on document controls and classification standard Control 3.9 – “network” was replaced with “network server” Addition of control 3.19 “Network access to temporary staff and visitors” under section 3 Addition of SECTION 8 “Mobile computing and Teleworking Policy” SECOND RELEASE Changes in software copyright compliance, Internet policy, maintaining information security, password policy. THIRD RELEASE Addition of acceptable use policy on Data Card / GPRS / Blackberry 15th Jan 05 28th Jan 05 1.2 C. Rai – ISMS Manager 12th Feb 05 1.3 CRAI – ISMS Manager 3rd March 05 2.0 CRAI – ISMS Manager Chandrashekhar Moharir – ISMS Team 27th September 2.1 05 4th Oct 06 18th 08 3.0 Cmoharir- ISMS team Dmalli- ISMS Team September 3.1 19th September 3.1 09 22nd April 2010 3.2 Company Confidential Kamal Seepana- ISMS No changes Team Daksha Malli Policy Revision Page 2 of 20 Printed copies are current on distribution date. Always refer to the electronic...
Words: 5081 - Pages: 21
...AS/NZS ISO 31000:2009 Accessed by UNIVERSITY OF TECHNOLOGY SYDNEY on 27 Feb 2012 Risk management— Principles and guidelines AS/NZS ISO 31000:2009 This Joint Australian/New Zealand Standard was prepared by Joint Technical Committee OB-007, Risk Management. It was approved on behalf of the Council of Standards Australia on 6 November 2009 and on behalf of the Council of Standards New Zealand on 16 October 2009. This Standard was published on 20 November 2009. The following are represented on Committee OB-007: Australian Computer Society Commerce Commission New Zealand Committee IT-012 Department of Education and Early Childhood Development Victoria Emergency Management Australia Engineers Australia Environmental Risk Management Authority New Zealand Financial Services Institute of Australia The Institute of Internal Auditors – Australia Institution of Professional Engineers New Zealand International Association of Emergency Managers La Trobe University Law Society of New South Wales Massey University Minerals Council of Australia Ministry of Economic Development (New Zealand) New Zealand Society for Risk Management Risk Management Institution of Australasia The University of New South Wales University of Canterbury New Zealand Accessed by UNIVERSITY OF TECHNOLOGY SYDNEY on 27 Feb 2012 Keeping Standards up-to-date Standards are living documents which reflect progress in science, technology and systems. To maintain their currency, all...
Words: 10615 - Pages: 43
...Columbia College Geography 100 Hodson | Winter 2016 GEOG 100: Introduction to Human Geography Mondays and Thursdays 2:00-3:55 (Section 14) in Room 320, 4:00-5:55 (Section 16) in Room 450 Instructor: Victoria Hodson Email: vhodson@columbiacollege.bc.ca (see Emails, under Course Policies) th Office: Social Sciences Faculty Office, 5 Floor, Room 530 Office Hours: Monday 1-2pm, Tuesday 11am-12pm, Thursday 1-2pm, Friday 11am-12pm Course Description This course explores the basic concepts in human geography that are essential to understanding changes in the relationship between human societies, economic spaces and the environment. This course will look at issues located at the core of human geography: employment and spaces of production, cultural transformation, economic and ethnic disparities, migration, urban and rural landscapes, and environmental degradation among others. Course Objectives Upon successful completion of this course, students will be able to: • • • Identify seminal theories and concepts within the field of human geography o Describe their relevance to understandings of space and society in a reflection paper Demonstrate the importance of geography and geographical concepts in everyday life o Discuss course material on a weekly basis with other students in class through facilitated discussion and group activities Required Readings and Class Material Text: Knox, P., Marston, S., and Imort, M. (2015). Human Geography: Places...
Words: 2327 - Pages: 10
...STAFF COMPETENCY FRAMEWORK July 2006 The Charles Darwin University Staff Competency Framework This booklet contains the Staff Competency Framework for Charles Darwin University. The Competency Framework outlines the range of knowledge, skills and attributes required of employees of the University for proficient workplace performance. Application of the framework occurs in the context of an individual’s role, and the recognition that different competencies, and different levels of competency, are necessary to perform a given set of activities. DEFINITION Competency is defined as the ability to perform tasks and duties to the standard expected in employment. A competency standard is an industry-determined specification of performance which sets out the skills, knowledge and attitudes required to operate effectively in employment. Standards are made up of units of competency, which are themselves made up of elements of competency, together with performance criteria, a range of variables, and an evidence guide1. A competency framework describes a set of competency standards for employees and makes the expected knowledge and capabilities of employees explicit for those within and outside of the University. This set of standards has been determined by the University through a process of consultation and benchmarking. Competency frameworks are used by organisations to: • • • • • • Focus workplace performance on the organisation’s vision and values Align workplace behaviours...
Words: 3601 - Pages: 15
...and justify the methodology you would use to map processes to the organization’s goals and objectives 1.3. Evaluate the output of the process and the quality gateways Task 2 2.1. Design plans which promote goals and objectives for own area of responsibility 2.2. Write objectives, which are specific, measureable, achievable, realistic and time based to align people and other resources in an effective and efficient way 2.3. Implement appropriate systems to achieve objectives in the most efficient way, on time, to budget and meeting organizational standards of quality 2.4. Carry out work activities meeting the operational plan through effective monitoring and control Task 3 3.1. Design systems to manage and monitor quality standards specified by the organization 3.2. Demonstrate quality culture to ensure continuous monitoring, evaluation and development of the process 3.3. Recommend improvements which align with the organization’s objectives and goals and which result in improvements 3.4. Report on the wider implications of proposed changes within the organization Task 4 4.1. Carry out risk assessments as required by legislation, regulation and organizational requirements ensuring appropriate action is taken 4.2. Demonstrate that health and safety regulations and legislation applicable in specific work situations are correctly and effectively applied 4.3. Carry out a systematic review of organizational health and safety policies and procedures in the workplace Chapter...
Words: 3548 - Pages: 15
...SUBCHAPTER A—GENERAL PART 1—FEDERAL ACQUISITION REGULATIONS SYSTEM 1.1 Purpose, Authority, Issuance 1.2 Administration 1.3 Agency Acquisition Regulations 1.4 Deviations from the FAR 1.5 Agency and Public Participation 1.6 Career Development, Contracting Authority, and Responsibilities 1.7 Determinations and Findings PART 2—DEFINITIONS OF WORDS AND TERMS 2.1 Definitions 2.2 Definitions Clause PART 3—IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST 3.1 Safeguards 3.2 Contractor Gratuities to Government Personnel 3.3 Reports of Suspected Antitrust Violations 3.4 Contingent Fees 3.5 Other Improper Business Practices 3.6 Contracts with Government Employees or Organizations Owned or Controlled by Them 3.7 Voiding and Rescinding Contracts 3.8 Limitations on the Payment of Funds to Influence Federal Transactions 3.9 Whistleblower Protections for Contractor Employees 3.10 Contractor Code of Business Ethics and Conduct 3.11 Preventing Personal Conflicts of Interest for Contractor Employees Performing Acquisition Functions PART 4—ADMINISTRATIVE MATTERS 4.1 Contract Execution 4.2 Contract Distribution 4.3 Paper Documents 4.4 Safeguarding Classified Information Within Industry 4.5 Electronic Commerce in Contracting 4.6 Contract Reporting 4.7 Contractor Records Retention 4.8 Government Contract Files 4.9 Taxpayer Identification Number Information 4.10 Contract Line Items 4.11 Central Contractor Registration 4.12 Representations and...
Words: 2367 - Pages: 10
...CGA-CANADA ACCOUNTING THEORY & CONTEMPORARY ISSUES [AT1] EXAMINATION March 2009 Time: 3 Hours Note: All references to the Handbook refer to the CICA Handbook. Marks 28 Question 1 Select the best answer for each of the following unrelated items. Answer each of these items in your examination booklet by giving the number of your choice. For example, if the best answer for item (a) is (1), write (a)(1) in your examination booklet. If more than one answer is given for an item, that item will not be marked. Incorrect answers will be marked as zero. Marks will not be awarded for explanations. Note: 2 marks each a. Which of the following statements applies to the efficient contracting version of positive accounting theory? 1) Earnings management is not necessarily unethical. 2) Firms should design managerial compensation contracts with a high proportion of compensation based on net income. 3) Debt contracts typically contain covenants based on accounting variables. 4) Financial reporting should not be conservative. b. Which of the following statements best captures the meaning of the decision usefulness approach to financial reporting? 1) 2) 3) 4) c. The decision usefulness approach helps standard setters design successful accounting standards. The decision usefulness approach ensures that accountants and auditors behave ethically. The decision usefulness approach encourages the supply of useful information to investors. The decision usefulness approach supports...
Words: 7728 - Pages: 31
...rights reserved. Course Description This course examines project management roles and environments, the project life cycle, and various techniques of work planning, control, and evaluation for project success. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Kerzner, H. (2006). Project management: A systems approach to planning, scheduling, and controlling (9th ed.). Hoboken, NJ: Wiley. Meredith, J. R. & Mantel, S. J. (2006). Project management: A managerial approach (6th ed.). Hoboken, NJ: Wiley. All electronic materials are available on the student website. Microsoft® Project® 2007 (Virtual Desktop) Week One: Project Definition Details Due Points Objectives 1.1 Determine the importance of project management in the current business environment. 1.2 Determine the goals and purpose of a project in terms of the triple constraints. 1.3 Determine...
Words: 3035 - Pages: 13
...hours, they are advised to make appointment in advance. 2. COURSE INFORMATION 2.1 Teaching times and Locations Lecture: TBA Venue: TBA 2.2 Units of Credit This course is worth 3 credits. 2.3 Parallel teaching in the course There is no parallel teaching involved in this course. 2.4 Relationship of this course to others The International Trade course focuses on two main parts. The first part deals with international trade theories and policies among countries. And the second part mentions the problems international monetary. Both parts utilize many concepts and knowledge from the courses of Microeconomics and Macroeconomics. Theoretical analysis will be based on the demand and supply model, the concepts of consumer surplus and producer surplus, as well as the effect of taxation on the market of a good. All these concepts and results are various parts of Microeconomics. Besides, the foreign exchange rate and foreign exchange markets, the international currency, the use Balance of Payments and the concepts of National Savings, GDP, etc, can be found in the Macroeconomics course. 2.5 Approach to...
Words: 2250 - Pages: 9