Technology Guidelines for Home Care Staff

 
Technology Guidelines
 
G
e
n
e
r
a
l
 
|
 
T
e
c
h
n
o
l
o
g
y
 
G
u
i
d
e
l
i
n
e
s
 
f
o
r
 
H
o
m
e
 
C
a
r
e
 
Do not leave any government device
unattended in a public space
 
Smartphones and computers are for
work purposes; refer to government's
acceptable use policy for more
information
 
All computers (tablets, laptops & desktops) are the
property of IT Shared Service and are the responsibility of
the individual user it is assigned to
 
All smartphones are the property of Health PEI, with
technical support from IT Shared Services, and are the
responsibility of the individual user it is assigned to
 
Staff who require access to a computer
when not at their desk should be
assigned a tablet or laptop; staff who
require access to a computer while at
their desk should have a desktop
 
Desktops / tablets that are designated to be shared (i.e.,
Home Support, Casual staff) are set up specifically for this
purpose; all others are optimally set up for one user
 
Do not share your device with others unless it has specifically
been set up for that purpose; the one exception to this rule
is when a co-worker is required to sign into a computer with
their own username and password for a short period of time
(i.e., working at a different site for the day and does not have their
own tablet with them)
 
One smartphone per person and one
computer (tablet, laptop, desktop) per
person
 
S
m
a
r
t
p
h
o
n
e
s
 
|
 
T
e
c
h
n
o
l
o
g
y
 
G
u
i
d
e
l
i
n
e
s
 
f
o
r
 
H
o
m
e
 
C
a
r
e
 
Smartphones can
be used
anywhere there
is a cellular
connection
At work, home
or on the road
 
Do not leave your
smartphone
unattended in a
client’s home
Do not connect to WIFI
in a client’s home or
over public wireless;
connection to WIFI at
home is acceptable
 
Check with your
manager before
downloading
personal apps
 
Each phone should
have the following
apps (among others):
Phone
Groupwise Email
Groupwise Calendar
Signal secure texting
Google Maps
Camera
Photos
Files
 
T
a
b
l
e
t
s
 
|
 
T
e
c
h
n
o
l
o
g
y
 
G
u
i
d
e
l
i
n
e
s
 
f
o
r
 
H
o
m
e
 
C
a
r
e
 
When not using the tablet, store it in a
safe place ‘out of sight’
(leave it in a secure place in the office, store it in the
trunk, or take it out of the car and keep it in a secure
place in your home overnight)
 
Do not leave a tablet signed in and
unattended in a client’s home
(it is acceptable to lock / sign out of the tablet and leave
unattended while performing other duties, so long as the
tablet leaves the home with you when you go)
 
VPN is required for accessing CIS when
not in the office
 
Connection to WIFI at home or in the
office is acceptable
 
Do not connect tablets to WIFI in a
client’s home or over public wireless
 
Tablets can be used at work, at home or
in a client’s home (cell-enabled)
 
Some tablets are not cell-enabled; these
tablets are only able to connect to the
internet via a wired connection or WIFI
 
Most tablets are cell-enabled and use
cellular technology to connect to the
internet anywhere service is available
 
A
c
c
e
p
t
a
b
l
e
 
U
s
e
 
A
g
r
e
e
m
e
n
t
 
|
 
I
n
t
e
r
n
a
l
 
U
s
e
r
s
 
Government‐provided computer technology is to be
used to support authorized programs and services.
 
Users must use only system information technology
they are authorized to use and use them only in the
manner and to the extent authorized. Ability to access
information technology resources does not, by itself,
imply authorization to do so.
 
Changing the Government –provided computer system
configuration is not permitted unless approved by End
User Support.
 
Personal use of Government‐provided computer
technology is to be of an appropriate nature that will
not incur additional cost or increased risk to the
Government. Such technology is not to be used for any
personal activity that may cause embarrassment to you
or the Government and must not be used to access or
promote inappropriate sites, including but not limited to
pornography, racism, hatred, gambling, obscenity or any
illegal activities.
 
You are responsible and accountable for the use
of your user ID, passwords and other access
control items in your possession for computer
technology. They are not to be shared.
 
The bandwidth available to Government is
limited. Therefore the use of streaming audio
and video (e.g. Online radio, YouTube, etc.)
should be limited to a work related need.
 
Removal of, or alterations to,
Government‐provided computer hardware or
components must be approved by End User
Support.
 
Prior to downloading or installing software on
Government‐provided hardware confirmation
of acceptability must be obtained from
Business Infrastructure Services (BIS).
 
A
c
c
e
p
t
a
b
l
e
 
U
s
e
 
A
g
r
e
e
m
e
n
t
 
|
 
I
n
t
e
r
n
a
l
 
U
s
e
r
s
 
You must not violate the privacy of other users
and their accounts, regardless of whether those
accounts are securely protected. Technical
ability to access other’s accounts does not, by
itself, imply authorization to do so.
 
You should not leave your computer unattended
while logged on to the network. A password
protected screen saver is required to reactivate
a session after 5 minutes of inactivity.
 
Work related electronic data must be stored on
the Government‐provided file server where
possible. If work related electronic data is not
stored on the file server it is your responsibility
to prepare and maintain backup copies in
accordance with Government Policies, the
Archives and Records Act and the Freedom of
Information and Protection of Privacy Act.
 
Willful or intentional violations of this
agreement will be considered to be misconduct
and violators of this agreement may be denied
access to the Government‐provided computer
technology and may be subject to other
penalties and disciplinary action in accordance
with the Civil Service Act and Regulations.
Violation of this Agreement may result in
discipline that may include but not be limited to
termination of employment and/or other legal
action.
 
I understand and agree that when my
employment with Government ceases, for
whatever reason, my authorization to use the
Government‐provided computer technology and
system also ceases.
Slide Note
Embed
Share

General technology guidelines for home care staff include rules for smartphone and computer use, ownership, responsibility, and security measures. Specific instructions are provided for smartphones, tablets, and shared devices, emphasizing the importance of maintaining security and proper usage protocols in both work and personal environments.

  • Technology Guidelines
  • Home Care
  • Staff
  • Security Measures
  • Mobile Devices

Uploaded on Oct 07, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Technology Guidelines

  2. General | Technology Guidelines for Home Care One smartphone per person and one computer (tablet, laptop, desktop) per person All smartphones are the property of Health PEI, with technical support from IT Shared Services, and are the responsibility of the individual user it is assigned to All computers (tablets, laptops & desktops) are the property of IT Shared Service and are the responsibility of the individual user it is assigned to Staff who require access to a computer when not at their desk should be assigned a tablet or laptop; staff who require access to a computer while at their desk should have a desktop Do not share your device with others unless it has specifically been set up for that purpose; the one exception to this rule is when a co-worker is required to sign into a computer with their own username and password for a short period of time (i.e., working at a different site for the day and does not have their own tablet with them) Smartphones and computers are for work purposes; refer to government's acceptable use policy for more information Desktops / tablets that are designated to be shared (i.e., Home Support, Casual staff) are set up specifically for this purpose; all others are optimally set up for one user Do not leave any government device unattended in a public space

  3. Smartphones | Technology Guidelines for Home Care Smartphones can be used anywhere there is a cellular connection At work, home or on the road Each phone should have the following apps (among others): Phone Groupwise Email Groupwise Calendar Signal secure texting Google Maps Camera Photos Files Check with your manager before downloading personal apps Do not leave your smartphone unattended in a client s home Do not connect to WIFI in a client s home or over public wireless; connection to WIFI at home is acceptable

  4. Tablets | Technology Guidelines for Home Care Most tablets are cell-enabled and use cellular technology to connect to the internet anywhere service is available Connection to WIFI at home or in the office is acceptable Some tablets are not cell-enabled; these tablets are only able to connect to the internet via a wired connection or WIFI Do not connect tablets to WIFI in a client s home or over public wireless Tablets can be used at work, at home or in a client s home (cell-enabled) VPN is required for accessing CIS when not in the office Do not leave a tablet signed in and unattended in a client s home (it is acceptable to lock / sign out of the tablet and leave unattended while performing other duties, so long as the tablet leaves the home with you when you go) When not using the tablet, store it in a safe place out of sight (leave it in a secure place in the office, store it in the trunk, or take it out of the car and keep it in a secure place in your home overnight)

  5. Acceptable Use Agreement | Internal Users Government provided computer technology is to be used to support authorized programs and services. You are responsible and accountable for the use of your user ID, passwords and other access control items in your possession for computer technology. They are not to be shared. Users must use only system information technology they are authorized to use and use them only in the manner and to the extent authorized. Ability to access information technology resources does not, by itself, imply authorization to do so. The bandwidth available to Government is limited. Therefore the use of streaming audio and video (e.g. Online radio, YouTube, etc.) should be limited to a work related need. Changing the Government provided computer system configuration is not permitted unless approved by End User Support. Removal of, or alterations to, Government provided computer hardware or components must be approved by End User Support. Personal use of Government provided computer technology is to be of an appropriate nature that will not incur additional cost or increased risk to the Government. Such technology is not to be used for any personal activity that may cause embarrassment to you or the Government and must not be used to access or promote inappropriate sites, including but not limited to pornography, racism, hatred, gambling, obscenity or any illegal activities. Prior to downloading or installing software on Government provided hardware confirmation of acceptability must be obtained from Business Infrastructure Services (BIS).

  6. Acceptable Use Agreement | Internal Users You must not violate the privacy of other users and their accounts, regardless of whether those accounts are securely protected. Technical ability to access other s accounts does not, by itself, imply authorization to do so. Willful or intentional violations of this agreement will be considered to be misconduct and violators of this agreement may be denied access to the Government provided computer technology and may be subject to other penalties and disciplinary action in accordance with the Civil Service Act and Regulations. Violation of this Agreement may result in discipline that may include but not be limited to termination of employment and/or other legal action. You should not leave your computer unattended while logged on to the network. A password protected screen saver is required to reactivate a session after 5 minutes of inactivity. Work related electronic data must be stored on the Government provided file server where possible. If work related electronic data is not stored on the file server it is your responsibility to prepare and maintain backup copies in accordance with Government Policies, the Archives and Records Act and the Freedom of Information and Protection of Privacy Act. I understand and agree that when my employment with Government ceases, for whatever reason, my authorization to use the Government provided computer technology and system also ceases.

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#