- Who We Are
- Clinician Employment
- Publications
- Witness to Witness (W2W)
- Kugel & Zuroweste Health Justice Award
- Your Voice Matters: Photovoice Project
Incident Management
requirements for dealing with computer security incidents.
Files
-
- IncidentMgmntGuide ( 146 Kb )
Information Technology
uses information technologies to support employees and other authorized users to work efficiently in delivering services.
Files
-
- InfoAndTech ( 51 Kb )
Password Guidelines
Password Guideline is to establish the rules for the creation, distribution, safeguarding, termination, and reclamation of the user authentication mechanisms
Files
-
- PasswordGuide ( 208 Kb )
Social Networking Policies- a guide
“Social networking” or “Web 2.0” is the portion of internet activity that includes blogging, as well as the use of the following tools: Facebook, Twitter, LinkedIn, flickr and YouTube. This list is likely to expand, contract or otherwise change based on emerging trends.
Files
-
- social networking policy guide ( 24 Kb )
Virus Protection
The purpose of the Computer Virus Detection Guideline is to describe the requirements for dealing with computer virus, worm and Trojan Horse prevention, detection and cleanup.
Files
-
- VirusProtection ( 249 Kb )