SlideShare une entreprise Scribd logo
1  sur  1
Information Technology Services
Employee Confidentiality Agreement
To perform their job duties in support of the (Name of your Org), employees in (Org-Short Name)
Information Technology Services (ITS) support roles are frequently provided privileged access to
the information systems that they support and to the data and records managed by those
systems. Privileged access imposes upon the ITS employee the responsibility and obligation to
use that access in an ethical, professional, and legal manner that is strictly within their authorized
job functions.
In exchange for the elevated access privileges afforded to me as an ITS employee, I agree to
abide by the following performance standards:
1. To take every reasonable precaution to prevent unnecessary or unauthorized access to any
passwords, user identifications, or other information that may be used to access information
systems, whether those systems belong to the (ORG SHORT NAME) or to private parties.
2. To limit access to the information contained in or obtained from information systems to
authorized persons.
3. To treat all information encountered in the performance of my duties as confidential unless
and until advised otherwise by my supervisor and the relevant department data owners.
4. To seek guidance from my supervisor whenever I am unsure of the correct decision
regarding the appropriate use and confidentiality of information, and to do so BEFORE I take
any action that might compromise that use or confidentiality.
5. To avoid any sharing, recording, transmission, alteration, or deletion of information in the
information systems except as required in performance of my job duties.
6. To strictly comply with all (ORG SHORT NAME) policies related to the use and security of the
(ORG SHORT NAME)’s information resources.
7. To meet HIPAA requirements, I will not access or view any documents that I do not have
express permission to view or access.
8. To protect individuals and the conference I will not share any information about a potential or
actual security event even with other internal staff unless they have an express need to
know.
9. To report any incidents of non-compliance with the terms of this agreement to my supervisor.
I understand that this agreement applies to the (ORG SHORT NAME)’s corporate network, all
electronic systems owned or operated by the (ORG SHORT NAME), whether or not they are
connected to that network, and to all privately owned electronic systems that may be brought to
the (ORG SHORT NAME) Office or connected to the (ORG SHORT NAME) corporate network.
I further understand that the (Org Name) considers violation of these standards to be a serious
offense, and that if I violate this agreement, I may be subject to disciplinary action up to and
including termination of my employment with the (ORG SHORT NAME).
Employee Signature:
Printed Employee Name:
Employee Title:
Date:

Contenu connexe

Tendances

Patient confidentiality awareness training
Patient confidentiality awareness trainingPatient confidentiality awareness training
Patient confidentiality awareness training
Richard Chaney
 
Patient confidentiality awareness training
Patient confidentiality awareness trainingPatient confidentiality awareness training
Patient confidentiality awareness training
Richard Chaney
 
HIPAA-1-_FINAL_Draft
HIPAA-1-_FINAL_DraftHIPAA-1-_FINAL_Draft
HIPAA-1-_FINAL_Draft
Kevin Jenkins
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1
SNikki
 
Topic 2 Cutbirth and Love
Topic 2 Cutbirth and LoveTopic 2 Cutbirth and Love
Topic 2 Cutbirth and Love
Robert Cutbirth
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policy
phenious
 

Tendances (20)

Privacy Policy for Quake Nepal
Privacy Policy for Quake NepalPrivacy Policy for Quake Nepal
Privacy Policy for Quake Nepal
 
Patient confidentiality awareness training
Patient confidentiality awareness trainingPatient confidentiality awareness training
Patient confidentiality awareness training
 
Data protection policy alex clapson 20-11-17
Data protection policy   alex clapson 20-11-17Data protection policy   alex clapson 20-11-17
Data protection policy alex clapson 20-11-17
 
Patient confidentiality awareness training
Patient confidentiality awareness trainingPatient confidentiality awareness training
Patient confidentiality awareness training
 
HIPAA Compliance Email
HIPAA Compliance EmailHIPAA Compliance Email
HIPAA Compliance Email
 
HIPAA-1-_FINAL_Draft
HIPAA-1-_FINAL_DraftHIPAA-1-_FINAL_Draft
HIPAA-1-_FINAL_Draft
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality training
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1
 
Topic 2 Cutbirth and Love
Topic 2 Cutbirth and LoveTopic 2 Cutbirth and Love
Topic 2 Cutbirth and Love
 
Confidentiality thompson
Confidentiality thompsonConfidentiality thompson
Confidentiality thompson
 
UPMC Identity Data Breach
UPMC Identity Data BreachUPMC Identity Data Breach
UPMC Identity Data Breach
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policy
 
Understanding patient privacy 1
Understanding patient privacy 1Understanding patient privacy 1
Understanding patient privacy 1
 
Hippa presentation
Hippa presentationHippa presentation
Hippa presentation
 
Privacy statement
Privacy statementPrivacy statement
Privacy statement
 
Security threats in computing
Security threats in computingSecurity threats in computing
Security threats in computing
 
Confidentiality and you
Confidentiality and youConfidentiality and you
Confidentiality and you
 
HIPAA Training Basics
HIPAA Training BasicsHIPAA Training Basics
HIPAA Training Basics
 
Run bunprivacy
Run bunprivacyRun bunprivacy
Run bunprivacy
 
Privacy policy
Privacy policyPrivacy policy
Privacy policy
 

Similaire à IT Staff NDA Template Employee Confidentiality Agreement

Security Standards, Policies, and Procedures Manual TemplateInstru.docx
Security Standards, Policies, and Procedures Manual TemplateInstru.docxSecurity Standards, Policies, and Procedures Manual TemplateInstru.docx
Security Standards, Policies, and Procedures Manual TemplateInstru.docx
jeffreye3
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access Polic
AlleneMcclendon878
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
todd331
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
Kunal Sharma
 

Similaire à IT Staff NDA Template Employee Confidentiality Agreement (20)

POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
 
Security Standards, Policies, and Procedures Manual TemplateInstru.docx
Security Standards, Policies, and Procedures Manual TemplateInstru.docxSecurity Standards, Policies, and Procedures Manual TemplateInstru.docx
Security Standards, Policies, and Procedures Manual TemplateInstru.docx
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access Polic
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
 
Work from home policy
Work from home policyWork from home policy
Work from home policy
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
 
Ss
SsSs
Ss
 
Confidentiality, HIPAA and HITECH
Confidentiality, HIPAA and HITECHConfidentiality, HIPAA and HITECH
Confidentiality, HIPAA and HITECH
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Kyverna Privacy Policy.pdf
Kyverna Privacy Policy.pdfKyverna Privacy Policy.pdf
Kyverna Privacy Policy.pdf
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 

Plus de Ernest Staats

Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
Ernest Staats
 

Plus de Ernest Staats (20)

Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Cy safe 2.0_workbook
Cy safe 2.0_workbookCy safe 2.0_workbook
Cy safe 2.0_workbook
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Parenting and the media challenge
Parenting and the media challengeParenting and the media challenge
Parenting and the media challenge
 
How to use technology in ministry & parenting
How to use technology in ministry & parentingHow to use technology in ministry & parenting
How to use technology in ministry & parenting
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Idwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionIdwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only section
 
Data Detox Kit Optimized
Data Detox Kit Optimized Data Detox Kit Optimized
Data Detox Kit Optimized
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
 
Compter Forensics Intro for Students
Compter Forensics Intro for Students Compter Forensics Intro for Students
Compter Forensics Intro for Students
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Securely Erase your Device
Securely Erase your DeviceSecurely Erase your Device
Securely Erase your Device
 
Border crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tipsBorder crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tips
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 

IT Staff NDA Template Employee Confidentiality Agreement

  • 1. Information Technology Services Employee Confidentiality Agreement To perform their job duties in support of the (Name of your Org), employees in (Org-Short Name) Information Technology Services (ITS) support roles are frequently provided privileged access to the information systems that they support and to the data and records managed by those systems. Privileged access imposes upon the ITS employee the responsibility and obligation to use that access in an ethical, professional, and legal manner that is strictly within their authorized job functions. In exchange for the elevated access privileges afforded to me as an ITS employee, I agree to abide by the following performance standards: 1. To take every reasonable precaution to prevent unnecessary or unauthorized access to any passwords, user identifications, or other information that may be used to access information systems, whether those systems belong to the (ORG SHORT NAME) or to private parties. 2. To limit access to the information contained in or obtained from information systems to authorized persons. 3. To treat all information encountered in the performance of my duties as confidential unless and until advised otherwise by my supervisor and the relevant department data owners. 4. To seek guidance from my supervisor whenever I am unsure of the correct decision regarding the appropriate use and confidentiality of information, and to do so BEFORE I take any action that might compromise that use or confidentiality. 5. To avoid any sharing, recording, transmission, alteration, or deletion of information in the information systems except as required in performance of my job duties. 6. To strictly comply with all (ORG SHORT NAME) policies related to the use and security of the (ORG SHORT NAME)’s information resources. 7. To meet HIPAA requirements, I will not access or view any documents that I do not have express permission to view or access. 8. To protect individuals and the conference I will not share any information about a potential or actual security event even with other internal staff unless they have an express need to know. 9. To report any incidents of non-compliance with the terms of this agreement to my supervisor. I understand that this agreement applies to the (ORG SHORT NAME)’s corporate network, all electronic systems owned or operated by the (ORG SHORT NAME), whether or not they are connected to that network, and to all privately owned electronic systems that may be brought to the (ORG SHORT NAME) Office or connected to the (ORG SHORT NAME) corporate network. I further understand that the (Org Name) considers violation of these standards to be a serious offense, and that if I violate this agreement, I may be subject to disciplinary action up to and including termination of my employment with the (ORG SHORT NAME). Employee Signature: Printed Employee Name: Employee Title: Date: