Search
Policy Areas
Filter and Sort

Showing 1 - 4 of 4 results

List of UNDP Systems and Tools for Electronic Records and Approvals

List of UNDP Systems and Tools for Electronic Records and Electronic Approvals Current solutions Tool / Solution E- Record Repository Electronic Approval Authenticity An electronic record or electronic approval is considered to be authentic if it can be proved that it was not modified, altered or otherwise compromised after it was placed. Integrity The integrity of an electronic approval refers …

Content Type: Document Document Type: Guide Policy Area: Information and Communications Technology Policy Chapter: ICT Security Policy: Electronic Signatures Policy

Content Type: Document Document Type: Guide Policy Area: Information and Communications Technology Policy Chapter: ICT Security Policy: Bring Your Own Device and Acceptable Usage of ICT Resources

Annex A - Principles for Allocation and Termination of Access Credentials to UNDP ICT Systems and Resources

ANNEX A – Principles for Allocation and Termination of Access Credentials to UNDP ICT Systems and Resources 1. All UNDP personnel, regardless of contract modality will be given basic access to corporate resources and communication tools through the provision of an individual UNDP email account. All new personnel will be provided with the necessary email accounts upon signature of their contract …

Content Type: Document Document Type: Guide Policy Area: Information and Communications Technology Policy Chapter: ICT Security Policy: Bring Your Own Device and Acceptable Usage of ICT Resources

Annex C - Uses of Mobile Devices within UNDP

ANNEX C: Uses of Mobile Devices[footnoteRef:1] within UNDP [1: A mobile device is a small, typically hand-held computing device, having a display screen with touch input and/or a miniature keyboard and a wireless networking capability. Laptops, tablets and smart phones would be considered mobile devices.] Bring Your Own Device 1. In principle, use of personal (staff-owned) mobile phone is …

Content Type: Document Document Type: Guide Policy Area: Information and Communications Technology Policy Chapter: ICT Security Policy: Bring Your Own Device and Acceptable Usage of ICT Resources