This is the purpose of this policy.
What is to outline the acceptable use of computer equipment and electronic communications.
This Policy outlines.
What are the specific timelines required to keep documents?
This is the intent for this policy/procedure
What is a tool to provide appropriate supervision and training, a way to identify performance challenges and an evaluation tool to award performance bonuses?
This person is ultimatly responsible for security issues at CWY-JCM
Who is Susan?
This is the purpose of the policy.
What is ensuring that necessary records and documents of CWY-JCM are stored, and discarded in line with the law?
This is the performance rating scale.
What is Level 1- Exceeds expectations, Level 2- Meets expectations and, Level 3- Does not meet expectations.
These are the three classifications of information
What is public, internal and confidential?
This is the general rule for record keeping.
These are the three steps to Performance Evaluation.
What is planning objectives and skills to master, monitoring and coaching and, annual performance evaluation.
These are three prohibited activities.
What is private business, altering hardware, sharing ID's and passwords, introducing malicious programs, sending confidential information to outside parties, disrupting network communications, sending unsolicited and deceitful emails, violating intellectual property and privacy laws and using computers in a manner that violates any law, regulation or CWY-JCM policy?
These must be held indefinitely.
What are Organizational/Legal documents?
These are the guiding principles of this document.
What is honesty, transparency and fairness for all?