task
stringlengths
12
101
input
stringlengths
0
88.4k
output
stringlengths
1
139k
options
sequence
pageTitle
stringlengths
0
1.11k
outputColName
stringlengths
1
1.13k
url
stringlengths
14
440
wdcFile
stringlengths
66
76
5b14a17c_for_Agile_Software_Development__2
[0] Project overview [1] Developers, Managers, Maintenance Developers, Operations Staff [3] I typically create and maintain this document during development. Keep it short and to the point, I don't ever remember one getting beyond ten printed pages and most are less than five. This document serves as a starting point for anyone new to the team, including maintenance developers, because it answers fundamental questions that they are likely to have. Whenever you first share this document with anyone ask them to keep track of major issues that they were not able to easily resolve using this document, or any misinformation they discover, to provide insight into potential updates for the document. I often call this a "Good Things to Know" document. [4] Yes [2]
A summary of critical information such as the vision for the system, primary user contacts, technologies and tools used to build the system, and the critical operating processes (some applicable to development, such as how to build the system and some applicable to production, such as how to back up data storage). Also provides references to critical project artifacts such as the source code (the project name in the source code control system is often sufficient), where the permanent models pertaining to the system (if any) are, and where other documents (if any) are.
[]
Agile/Lean Documentation: Strategies for Agile Software Development
2
http://www.agilemodeling.com/essays/agileDocumentation.htm
39/1438042989126.22_20150728002309-00152-ip-10-236-191-2_277604955_9.json
5b14a17c_for_Agile_Software_Development__2
[0] Requirements document [1] Developers, Maintenance Developers,Users, User Managers [3] Writing a requirements specification early in the life cycle should be seen as a very large risk. XP projects typically favor inclusive requirements techniques such as user stories and CRC cards. RUP projects tend towards more formal requirements artifacts and documentation. Disciplined agile teams capture the majority of their requirements as executable specifications. As a result these teams only need brief overviews of the scope which would be part of the system documentation. [4] In scaling situations, particularly when regulatory compliance, large teams, or geographically distributed teams are an issue [2]
This document defines what the system does, summarizing or composed of requirements artifacts such as business rule definitions, use cases, user stories, or essential user interface prototypes (to name a few).
[]
Agile/Lean Documentation: Strategies for Agile Software Development
2
http://www.agilemodeling.com/essays/agileDocumentation.htm
39/1438042989126.22_20150728002309-00152-ip-10-236-191-2_277604955_9.json
5b14a17c_for_Agile_Software_Development__2
[0] Support documentation [1] Support Staff [3] You will find that your support department often has a standard escalation procedure in place, therefore you will not need to write one, and like the operations department may have standard templates or examples that you can work from. [4] Yes [2]
This documentation includes training materials specific to support staff; all user documentation to use as reference when solving problems; a trouble-shooting guide; escalation procedures for handling difficult problems; and a list of contact points within the maintenance team.
[]
Agile/Lean Documentation: Strategies for Agile Software Development
2
http://www.agilemodeling.com/essays/agileDocumentation.htm
39/1438042989126.22_20150728002309-00152-ip-10-236-191-2_277604955_9.json
5b14a17c_for_Agile_Software_Development__2
[0] System documentation [1] Maintenance Developers, Developers [3] System documentation helps to reduce perceived risk on the project by providing "truck insurance", the assurance that if the development team leaves, or gets hit by a truck[1], that critical information about the project is left behind. Unfortunately this is typically false insurance-if you lose someone(s) then no matter how good the documentation is you have a serious problem on your hands because new people still need to be identified, assigned to your system, and need to learn the system. You're much better off increasing your project's "truck number", the minimum number of people that if you lost them would put your project at risk, by supporting knowledge sharing practices such as Active Stakeholder Participation, Collective Ownership, and Model With Others. [4] Yes [2]
The purpose of this document is to provide an overview of the system and to help people understand the system.Common information in this document includes an overview of the technical architecture, the business architecture, and the high-level requirements for the system. Detailed architecture and design models, or references to them, may also be included where appropriate.
[]
Agile/Lean Documentation: Strategies for Agile Software Development
2
http://www.agilemodeling.com/essays/agileDocumentation.htm
39/1438042989126.22_20150728002309-00152-ip-10-236-191-2_277604955_9.json
5b14a17c_for_Agile_Software_Development__2
[0] User documentation [1] Users, User Managers [3] .I typically base my usage guide and training materials on the use cases for the system -the use cases describe how the actors work with the system, therefore they should be a very good foundation on which to base both of these documents. .User documentation should be considered part of the user interface for your system and therefore should undergo usability testing. [4] Yes [2]
Your users may require a reference manual, a usage guide, a support guide, and even training materials. It's important that you distinguish between these different types of documents because the way that each one is used varies: one is for quick lookups, one is for discovering about how to work with the system, one is for how to obtain additional help, and one is for training.
[]
Agile/Lean Documentation: Strategies for Agile Software Development
2
http://www.agilemodeling.com/essays/agileDocumentation.htm
39/1438042989126.22_20150728002309-00152-ip-10-236-191-2_277604955_9.json
83eea318_sy_Football_League_Help_Center_ategory__Other_Scoring_Options_Question
[#] 1. [Question]
How do I set up home field advantage for fantasy teams? Answer: Go to the For Commissioner > Setup > General Scoring Setup and enter the number of home field advantage points. How helpful was this answer? Not At All: :Very
[]
Fantasy Football: Free Nate Newton Fantasy Football League Help Center
Question
http://football10.myfantasyleague.com/2008/support?L=25903&CATEGORY=Scoring%20%26%20Stats&SUBCATEGORY=Other%20Scoring%20Options
39/1438042989126.22_20150728002309-00017-ip-10-236-191-2_96305023_3.json
83eea318_sy_Football_League_Help_Center_ategory__Other_Scoring_Options_Question
[#] 2. [Question]
How do I set it up so that when my players that are playing in their "natural" position have 0 yards I want to penalize them -5 points. Answer: Since the NFL does not record stats that are non-stats (or zero) considering it a lack of stats you will need to manually enter these in the Player Score Adjuster. How helpful was this answer? Not At All: :Very
[]
Fantasy Football: Free Nate Newton Fantasy Football League Help Center
Question
http://football10.myfantasyleague.com/2008/support?L=25903&CATEGORY=Scoring%20%26%20Stats&SUBCATEGORY=Other%20Scoring%20Options
39/1438042989126.22_20150728002309-00017-ip-10-236-191-2_96305023_3.json
83eea318_sy_Football_League_Help_Center_ategory__Other_Scoring_Options_Question
[#] 3. [Question]
How can I ensure that no player finishes a week with a negative score for any given week? Answer: Go to General Scoring Setup and enter "0" for the minimum weekly player score. There is also a separate setting for minimum weekly franchise score. How helpful was this answer? Not At All: :Very
[]
Fantasy Football: Free Nate Newton Fantasy Football League Help Center
Question
http://football10.myfantasyleague.com/2008/support?L=25903&CATEGORY=Scoring%20%26%20Stats&SUBCATEGORY=Other%20Scoring%20Options
39/1438042989126.22_20150728002309-00017-ip-10-236-191-2_96305023_3.json
83eea318_sy_Football_League_Help_Center_ategory__Other_Scoring_Options_Question
[#] 4. [Question]
How do I set up roto-style scoring for my league? Answer: Unfortunately, MyFantasyLeague.com does not support Rotisserie style scoring at all. We only support traditional fantasy style scoring with either a head to head, total points or all-play type of league. How helpful was this answer? Not At All: :Very
[]
Fantasy Football: Free Nate Newton Fantasy Football League Help Center
Question
http://football10.myfantasyleague.com/2008/support?L=25903&CATEGORY=Scoring%20%26%20Stats&SUBCATEGORY=Other%20Scoring%20Options
39/1438042989126.22_20150728002309-00017-ip-10-236-191-2_96305023_3.json
83eea318_sy_Football_League_Help_Center_ategory__Other_Scoring_Options_Question
[#] 5. [Question]
How do I set up Tiebreakers for my League? Answer: The system default is to score ties as ties (numerically, 1/2 win and 1/2 loss). To change this, go to the For Commissioner > Setup > General Scoring Setup and specify that are to be broken by one or more selected player(s), all benched players or that ties are broken by the league commissioner. If the commissioner will manually break ties, then when a tie occurs the commissioner will be required to go to the For Commissioner > Break Ties to select a winner. How helpful was this answer? Not At All: :Very
[]
Fantasy Football: Free Nate Newton Fantasy Football League Help Center
Question
http://football10.myfantasyleague.com/2008/support?L=25903&CATEGORY=Scoring%20%26%20Stats&SUBCATEGORY=Other%20Scoring%20Options
39/1438042989126.22_20150728002309-00017-ip-10-236-191-2_96305023_3.json
83eea318_sy_Football_League_Help_Center_ategory__Other_Scoring_Options_Question
[#] 6. [Question]
How do I Adjust a player/franchise score? Answer: To manually adjust players or franchises scores go to the For Commissioner > Setup > Player Score Adjuster or Franchise Score Adjuster. Enter the proper score adjustment, the week in which the score is applied and enter an explanation explaining the adjustment. Create New Score Adjustments. While MyFantasyLeague.com supports virtually all common fantasy scoring rules, your league may have a highly customized rule that needs to be addressed. Use the table to define any new adjustments to the score for any fantasy team or player as follows: Select the row that corresponds to the fantasy team/player in which the adjustment needs to be made. Enter a numerical point value of the adjustment (enter a "-" sign if a negative point value adjustment is desired). Select the week of the season in which the adjustment it to be applied. Enter a textual description in the Explanation column to aid in understanding the reason for the adjustment. Repeat this process for each team as necessary. Click on the "Adjust Scores" button. Delete Score Adjustments. Use this table if you've previously defined a score adjustment that you now need to remove. This table will appear empty until you have defined a score adjustment. You can also use this table to view the current score adjustments for your league. To remove a score adjustment: Check the box (es) corresponding the adjustment you want to remove. Click on the "Delete Score Adjustments Records" button. If you remove an adjustment accidentally, you will have to use the Create New Score Adjustments table to redefine the original adjustment. NOTE: You should NEVER use this screen to correct what you believe are incorrect raw statistics. Please see our Statistics Lifecycle document for more information. How helpful was this answer? Not At All: :Very
[]
Fantasy Football: Free Nate Newton Fantasy Football League Help Center
Question
http://football10.myfantasyleague.com/2008/support?L=25903&CATEGORY=Scoring%20%26%20Stats&SUBCATEGORY=Other%20Scoring%20Options
39/1438042989126.22_20150728002309-00017-ip-10-236-191-2_96305023_3.json
83eea318_sy_Football_League_Help_Center_ategory__Other_Scoring_Options_Question
[#] 7. [Question]
We play doubleheaders each week and award Home Field Advantage Points, but it's not calculating correctly - why? Answer: The system only allows one point total per franchise each week. If you play doubleheaders then the home field advantage points will be applied to the total score for both matchups. You can go to the Setup > Weekly Schedule Setup to adjust matchups in doubleheader weeks. Here you will select the week that you wish to edit. Then at the bottom of the screen you will need to choose to increase the number of matchups displayed if not all appear, by increasing the number and pressing the "Now" button. Now you can use the drop down boxes so the same teams have both "home" or "away" games in a given week of the fantasy season. How helpful was this answer? Not At All: :Very
[]
Fantasy Football: Free Nate Newton Fantasy Football League Help Center
Question
http://football10.myfantasyleague.com/2008/support?L=25903&CATEGORY=Scoring%20%26%20Stats&SUBCATEGORY=Other%20Scoring%20Options
39/1438042989126.22_20150728002309-00017-ip-10-236-191-2_96305023_3.json
83eea318_sy_Football_League_Help_Center_ategory__Other_Scoring_Options_Question
[#] 8. [Question]
How do I use the General Scoring Setup page? Answer: Calculate Fantasy Results From Week xx through Week yy - Define the NFL weeks in which your fantasy season starts and ends (including the playoffs where week 18 is the NFL Wild Card Playoffs and week 21 is the NFL Super Bowl). Weekly results for your league will only be computed through the week number define here. Number of Decimal Places For League Scoring - If your league uses decimal scoring for your league rules, you still must define the number of decimal placed (0-3) in which to calculate your fantasy point scores. Use 1 place for tenths of a point, 2 places for hundredths of a point, and 3 places for thousandths of a point. Minimum Weekly Player Score - Define this only if used by your league by entering in the lowest possible score a player may have each week. Any player that does not perform well enough to score at least this minimum will have their score raised to this defined value. Minimum Weekly Franchise Score - Define this only if used by your league by entering in the lowest possible score a franchise may have each week. Any franchise that does not perform well enough to score at least this minimum will have their score raised to this defined value. Home Field Advantage - Specify a nonzero point award to define a bonus for each home team. This bonus is only applied to regular season matchups, and not fantasy playoff matchups. NOTE: The system allows one and only one point total per franchise per week. If your league wants to use home field advantage and has two or more fantasy games per week of the season, the system will award these home field advantage points to each team that has a home game in a given week of the season, not per matchup the franchise has. Non-Starter Point Addition - Specify a percentage value (1-100, without the "%" sign) to use as a multiplier with which to use against each franchises' non-starter points to be added to the franchise score. Multi-Game Weekly "Points For" - Enable this setting if your league uses multi-game (doubleheader, etc.) weeks and you want each game to include each team's "Points For" in the Standings report's display. League Average Calculation - Enable this option to exclude a team's score from the average calculation when that team is playing the league average. NOTE: The system allows one and only one point total per franchise per week. If your league wants to use offense minus defense scoring and has two or more fantasy games per week of the season, the system will calculate a single value for each franchise for both games. Bye Week Carryover Points - These are points that are awarded to a player the week he is on bye. If 'Yes' is selected, that player is awarded the same number of points he had in the previous NFL week. Ties Are - Some leagues that have head-to-head matchups choose to resolve ties different ways. Choose one of the following options: Counted as ties. Use this option if your league chooses to leave regular season ties as ties for the standings. Decided by "x" selected non-starter/starter at any position/specified position. Select this choice if your league requires that a franchise owner must submit one or more additional tiebreaker players with their lineup. The winner of the tied matchup is determined by the franchise with the greatest sum total of all tiebreaker players. In other words, the point total of all tiebreaker players is added and compared as opposed to comparing the first tiebreaker player for two franchises, then the second, etc. Commissioner will manually break ties. Choose this option if your league has other rules regarding how ties are broken. When finished, you MUST click on the Save Scoring Setup button in order to apply your changes. How helpful was this answer? Not At All: :Very
[]
Fantasy Football: Free Nate Newton Fantasy Football League Help Center
Question
http://football10.myfantasyleague.com/2008/support?L=25903&CATEGORY=Scoring%20%26%20Stats&SUBCATEGORY=Other%20Scoring%20Options
39/1438042989126.22_20150728002309-00017-ip-10-236-191-2_96305023_3.json
83eea318_sy_Football_League_Help_Center_ategory__Other_Scoring_Options_Question
[#] 9. [Question]
How do I use the Player Score Adjuster page? Answer: Create New Player Score Adjustments. While MyFantasyLeague.com supports virtually all common fantasy scoring rules, your league may have a highly customized rule that needs to be addressed. Use the table to define any new adjustments to the score for any individual NFL player as follows: Select the NFL player for whom the adjustment needs to be made. Enter a numerical point value of the adjustment (enter a "- " sign if a negative point value adjustment is desired). Select the week of the season in which the adjustment it to be applied. Enter a textual description in the Explanation column to aid in understanding the reason for the adjustment. Click on the 'Adjust Player Score' button. Repeat this process for each player adjustment as necessary. Delete Score Adjustments. Use this table if you've previously defined a score adjustment that you now need to remove. This table will appear empty until you have defined a score adjustment. You can also use this table to view the current score adjustments for your league. To remove a player's score adjustment: Check the box (es) corresponding the adjustment you want to remove. Click on the 'Delete Player Score Adjustments Records' button. If you remove an adjustment accidentally, you will have to use the Create New Player Score Adjustments form to redefine the original adjustment. NOTE: You should NEVER use this screen to correct what you believe are incorrect raw statistics. Please see our Statistics Lifecycledocument for more information. How helpful was this answer? Not At All: :Very
[]
Fantasy Football: Free Nate Newton Fantasy Football League Help Center
Question
http://football10.myfantasyleague.com/2008/support?L=25903&CATEGORY=Scoring%20%26%20Stats&SUBCATEGORY=Other%20Scoring%20Options
39/1438042989126.22_20150728002309-00017-ip-10-236-191-2_96305023_3.json
83eea318_sy_Football_League_Help_Center_ategory__Other_Scoring_Options_Question
[#] 10. [Question]
How do I use the Additional League Rules Setup page? Answer: Enter Additional League Rules - Use this free-form text field to add any non-scoring rules for your league or scoring rules that you want to notate, but plan on manually scoring yourself. Note that this information will appear on the League Bylaws report for your league. NOTE: By default, the site enables the use of the 'Advanced Editor' for all free-form text fields such as this one. Go to the Reports & Other Settings screen if you prefer to disable this editor. Once disabled, you will need to manually include any tags as needed for your custom text formatting. Also, if you choose to manually include HTML codes, be careful to avoid entering any HTML on or before the tag as well as on or after the tag. When finished, you MUST click on the Save Additional League Rules button in order to apply your changes. How helpful was this answer? Not At All: :Very
[]
Fantasy Football: Free Nate Newton Fantasy Football League Help Center
Question
http://football10.myfantasyleague.com/2008/support?L=25903&CATEGORY=Scoring%20%26%20Stats&SUBCATEGORY=Other%20Scoring%20Options
39/1438042989126.22_20150728002309-00017-ip-10-236-191-2_96305023_3.json
83eea318_sy_Football_League_Help_Center_ategory__Other_Scoring_Options_Question
[#] 11. [Question]
How do I use the Franchise Score Adjuster page? Answer: Create New Score Adjustments. While MyFantasyLeague.com supports virtually all common fantasy scoring rules, your league may have a highly customized rule that needs to be addressed. Use the table to define any new adjustments to the score for any fantasy team as follows: Select the row that corresponds to the fantasy team in which the adjustment needs to be made. Enter a numerical point value of the adjustment (enter a "-" sign if a negative point value adjustment is desired). Select the week of the season in which the adjustment it to be applied. Enter a textual description in the Explanation column to aid in understanding the reason for the adjustment. Repeat this process for each team as necessary. Click on the "Adjust Scores" button. Delete Score Adjustments. Use this table if you've previously defined a score adjustment that you now need to remove. This table will appear empty until you have defined a score adjustment. You can also use this table to view the current score adjustments for your league. To remove a score adjustment: Check the box (es) corresponding the adjustment you want to remove. Click on the "Delete Score Adjustments Records" button. If you remove an adjustment accidentally, you will have to use the Create New Score Adjustments table to redefine the original adjustment. NOTE: You should NEVER use this screen to correct what you believe are incorrect raw statistics. Please see our Statistics Lifecycle document for more information. How helpful was this answer? Not At All: :Very
[]
Fantasy Football: Free Nate Newton Fantasy Football League Help Center
Question
http://football10.myfantasyleague.com/2008/support?L=25903&CATEGORY=Scoring%20%26%20Stats&SUBCATEGORY=Other%20Scoring%20Options
39/1438042989126.22_20150728002309-00017-ip-10-236-191-2_96305023_3.json
7ab0b667_Integrated_Architectures_Panel__uild_to_Capture_Characteristic
[Characteristic Needed] High- level activities Get disparate group reading off "same sheet of music"
Generic activity model
[]
ANNEX C The Broadcast/ Receive Example Architecture Study - C4ISR Integrated Architectures Panel
Product to Build to Capture Characteristic
http://fas.org/irp/doddir/dod/c4isr/annex_c.htm
39/1438042989126.22_20150728002309-00146-ip-10-236-191-2_84101637_0.json
7ab0b667_Integrated_Architectures_Panel__uild_to_Capture_Characteristic
[Characteristic Needed] Activities supported by one or more of the services. 1- page comparison of functional scope
Color- coded hierarchy chart
[]
ANNEX C The Broadcast/ Receive Example Architecture Study - C4ISR Integrated Architectures Panel
Product to Build to Capture Characteristic
http://fas.org/irp/doddir/dod/c4isr/annex_c.htm
39/1438042989126.22_20150728002309-00146-ip-10-236-191-2_84101637_0.json
7ab0b667_Integrated_Architectures_Panel__uild_to_Capture_Characteristic
[Characteristic Needed] Information exchanges Comparison of services information exchanges, functional complexity
Activity models of each service
[]
ANNEX C The Broadcast/ Receive Example Architecture Study - C4ISR Integrated Architectures Panel
Product to Build to Capture Characteristic
http://fas.org/irp/doddir/dod/c4isr/annex_c.htm
39/1438042989126.22_20150728002309-00146-ip-10-236-191-2_84101637_0.json
7ab0b667_Integrated_Architectures_Panel__uild_to_Capture_Characteristic
[Characteristic Needed] Definitions of terms used Get disparate group reading off same sheet of music
Integrated dictionary
[]
ANNEX C The Broadcast/ Receive Example Architecture Study - C4ISR Integrated Architectures Panel
Product to Build to Capture Characteristic
http://fas.org/irp/doddir/dod/c4isr/annex_c.htm
39/1438042989126.22_20150728002309-00146-ip-10-236-191-2_84101637_0.json
7ab0b667_Integrated_Architectures_Panel__uild_to_Capture_Characteristic
[Characteristic Needed] Key nodes (XMIT/ RCV) that support the services Facilitate comparison of nodes' functional redundancy
Basic node connectivity model of each service
[]
ANNEX C The Broadcast/ Receive Example Architecture Study - C4ISR Integrated Architectures Panel
Product to Build to Capture Characteristic
http://fas.org/irp/doddir/dod/c4isr/annex_c.htm
39/1438042989126.22_20150728002309-00146-ip-10-236-191-2_84101637_0.json
7ab0b667_Integrated_Architectures_Panel__uild_to_Capture_Characteristic
[Characteristic Needed] Activities keyed to nodes Facilitate comparison of nodes' functional redundancy
Basic node connectivity model of each service
[]
ANNEX C The Broadcast/ Receive Example Architecture Study - C4ISR Integrated Architectures Panel
Product to Build to Capture Characteristic
http://fas.org/irp/doddir/dod/c4isr/annex_c.htm
39/1438042989126.22_20150728002309-00146-ip-10-236-191-2_84101637_0.json
7ab0b667_Integrated_Architectures_Panel__uild_to_Capture_Characteristic
[Characteristic Needed] Systems used by nodes Examine system redundancies
Systems overlays to node connectivity models
[]
ANNEX C The Broadcast/ Receive Example Architecture Study - C4ISR Integrated Architectures Panel
Product to Build to Capture Characteristic
http://fas.org/irp/doddir/dod/c4isr/annex_c.htm
39/1438042989126.22_20150728002309-00146-ip-10-236-191-2_84101637_0.json
7ab0b667_Integrated_Architectures_Panel__uild_to_Capture_Characteristic
[Characteristic Needed] Possible issues related to activities Frame issues for selection (format issue selected)
Overlays to activity model (possible issue areas highlighted)
[]
ANNEX C The Broadcast/ Receive Example Architecture Study - C4ISR Integrated Architectures Panel
Product to Build to Capture Characteristic
http://fas.org/irp/doddir/dod/c4isr/annex_c.htm
39/1438042989126.22_20150728002309-00146-ip-10-236-191-2_84101637_0.json
7ab0b667_Integrated_Architectures_Panel__uild_to_Capture_Characteristic
[Characteristic Needed] In- depth view of additional formatting requirements and attributes Issue selected may require more depth
Overlays to activity model (annotations on arrows)
[]
ANNEX C The Broadcast/ Receive Example Architecture Study - C4ISR Integrated Architectures Panel
Product to Build to Capture Characteristic
http://fas.org/irp/doddir/dod/c4isr/annex_c.htm
39/1438042989126.22_20150728002309-00146-ip-10-236-191-2_84101637_0.json
7ab0b667_Integrated_Architectures_Panel__uild_to_Capture_Characteristic
[Characteristic Needed] Detail of services' formatting processes Issue selected does require more depth
Overlays to activity models (decomposition)
[]
ANNEX C The Broadcast/ Receive Example Architecture Study - C4ISR Integrated Architectures Panel
Product to Build to Capture Characteristic
http://fas.org/irp/doddir/dod/c4isr/annex_c.htm
39/1438042989126.22_20150728002309-00146-ip-10-236-191-2_84101637_0.json
7ab0b667_Integrated_Architectures_Panel__uild_to_Capture_Characteristic
[Characteristic Needed] Further detail on information exchanges as appropriate for issue Need to illustrate issue for group discussion
Overlays to activity models (further decomposition)
[]
ANNEX C The Broadcast/ Receive Example Architecture Study - C4ISR Integrated Architectures Panel
Product to Build to Capture Characteristic
http://fas.org/irp/doddir/dod/c4isr/annex_c.htm
39/1438042989126.22_20150728002309-00146-ip-10-236-191-2_84101637_0.json
ff4f5051_issoula__MT___Official_Website__Description
[Map] Downtown Parking [Download PDF] 11 x 8.5 [Description]
Locations of metered, permit, and lease parking downtown.
[]
Available Maps | Missoula, MT - Official Website
Description
http://www.ci.missoula.mt.us/468/Available-Maps
39/1438043062723.96_20150728002422-00034-ip-10-236-191-2_362758840_4.json
ff4f5051_issoula__MT___Official_Website__Description
[Map] Fire Stations and Fire Lanes Map [Download PDF] 42 x 42 [Description]
Fire station locations and primary fire lane routes.
[]
Available Maps | Missoula, MT - Official Website
Description
http://www.ci.missoula.mt.us/468/Available-Maps
39/1438043062723.96_20150728002422-00034-ip-10-236-191-2_362758840_4.json
ff4f5051_issoula__MT___Official_Website__Description
[Map] Mountain Line Transit [Download PDF] Mountain Line Website [Description]
Local bus routes and schedules.
[]
Available Maps | Missoula, MT - Official Website
Description
http://www.ci.missoula.mt.us/468/Available-Maps
39/1438043062723.96_20150728002422-00034-ip-10-236-191-2_362758840_4.json
ff4f5051_issoula__MT___Official_Website__Description
[Map] Parks, Trails, and Open Space Map [Download PDF] Front Back [Description]
Detailed trail and parks map. Paper maps available for purchase at Currents Aquatics Center.
[]
Available Maps | Missoula, MT - Official Website
Description
http://www.ci.missoula.mt.us/468/Available-Maps
39/1438043062723.96_20150728002422-00034-ip-10-236-191-2_362758840_4.json
ff4f5051_issoula__MT___Official_Website__Description
[Map] Snow Removal Map [Download PDF] 42 x 42 [Description]
Priority snow and ice control plan.
[]
Available Maps | Missoula, MT - Official Website
Description
http://www.ci.missoula.mt.us/468/Available-Maps
39/1438043062723.96_20150728002422-00034-ip-10-236-191-2_362758840_4.json
ff4f5051_issoula__MT___Official_Website__Description
[Map] Truck Route Map [Download PDF] 8.5 x 11 [Description]
Allowed truck routes through the City per Municipal Code.
[]
Available Maps | Missoula, MT - Official Website
Description
http://www.ci.missoula.mt.us/468/Available-Maps
39/1438043062723.96_20150728002422-00034-ip-10-236-191-2_362758840_4.json
0496b17e_ree_Census_Project___Caithness__37A
[Number] Parish [34] Bower [35] Canisbay [36] Dunnet [37] Halkirk [38] Latheron [39] Olrig [40] Reay [41] Thurso [42] Watten [43] Wick [37A]
Keiss
[ [ "K", "e", "i", "s", "s" ], [ "Y", "e", "s" ], [ "N", "o" ] ]
Scotland Free Census Project > Caithness
37A
http://freepages.genealogy.rootsweb.ancestry.com/~caithness/
39/1438042989126.22_20150728002309-00063-ip-10-236-191-2_98008749_1.json
0496b17e_ree_Census_Project___Caithness__37A
[Number] Assigned [34] Yes [35] Yes [36] Yes [37] Yes [38] Yes [39] Yes [40] Yes [41] Yes [42] Yes [43] Yes [37A]
Yes
[ [ "K", "e", "i", "s", "s" ], [ "Y", "e", "s" ], [ "N", "o" ] ]
Scotland Free Census Project > Caithness
37A
http://freepages.genealogy.rootsweb.ancestry.com/~caithness/
39/1438042989126.22_20150728002309-00063-ip-10-236-191-2_98008749_1.json
0496b17e_ree_Census_Project___Caithness__37A
[Number] Transcribed [34] Yes [35] Yes [36] Yes [37] Yes [38] No [39] Yes [40] Yes [41] Yes [42] Yes [43] Yes [37A]
Yes
[ [ "K", "e", "i", "s", "s" ], [ "Y", "e", "s" ], [ "N", "o" ] ]
Scotland Free Census Project > Caithness
37A
http://freepages.genealogy.rootsweb.ancestry.com/~caithness/
39/1438042989126.22_20150728002309-00063-ip-10-236-191-2_98008749_1.json
0496b17e_ree_Census_Project___Caithness__37A
[Number] Checked [34] No [35] Yes [36] No [37] No [38] No [39] Yes [40] Yes [41] No [42] Yes [43] No [37A]
Yes
[ [ "K", "e", "i", "s", "s" ], [ "Y", "e", "s" ], [ "N", "o" ] ]
Scotland Free Census Project > Caithness
37A
http://freepages.genealogy.rootsweb.ancestry.com/~caithness/
39/1438042989126.22_20150728002309-00063-ip-10-236-191-2_98008749_1.json
0496b17e_ree_Census_Project___Caithness__37A
[Number] Validated [34] No [35] No [36] No [37] No [38] No [39] No [40] Yes [41] No [42] No [43] No [37A]
No
[ [ "K", "e", "i", "s", "s" ], [ "Y", "e", "s" ], [ "N", "o" ] ]
Scotland Free Census Project > Caithness
37A
http://freepages.genealogy.rootsweb.ancestry.com/~caithness/
39/1438042989126.22_20150728002309-00063-ip-10-236-191-2_98008749_1.json
0496b17e_ree_Census_Project___Caithness__37A
[Number] Uploaded [34] No [35] No [36] No [37] No [38] No [39] No [40] Yes [41] No [42] No [43] No [37A]
No
[ [ "K", "e", "i", "s", "s" ], [ "Y", "e", "s" ], [ "N", "o" ] ]
Scotland Free Census Project > Caithness
37A
http://freepages.genealogy.rootsweb.ancestry.com/~caithness/
39/1438042989126.22_20150728002309-00063-ip-10-236-191-2_98008749_1.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Limits on alcohol outlet density
Limits on food outlet density
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Portion control for servings of alcoholic beverages
Portion control for food servings
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Taxes on alcohol
Taxes on foods high in solid oils and added sugars and salt
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Prohibitions on drink specials, including all-you-can-drink promotions
Prohibitions on all-you-can-eat food promotions
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Alcohol sold only in licensed establishments
Food sold only in licensed establishments, licenses restricted to outlets where food sales comprise >50% business
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Alcohol sold in gas stations cannot be displayed near cash register
Prohibition of displaying high-sugar/high-fat foods as impulse buys, near cash registers, and on ends of aisles
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Counter-advertising
Campaigns against low-nutrient foods
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Warning labels on alcohol
Warning labels on processed food high in solid oils and added sugar and salt
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Prohibitions of drinking on the job
Limits on food availability at the workplace; other incentives/services for weight control; regulations on food accessibility
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Quality control of alcohol (percentage alcohol per drink)
Quality control or naming of food by percentage of fat and sugar content
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Limiting hours of service
Reducing hours of outlets predominantly promoting items with low nutrient value
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Prohibiting drive-through alcohol sales
Drive-through service limited
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Prohibitions on driving and drinking
Prohibitions on driving and eating
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Server training requirements
Food servers trained in portion control and promoting healthier alternatives
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
b8259bf3_ce_of_Alcohol_Control_Policies__ntial_Obesity_Control_Policies
Prohibitions on sales to youth younger than age 21 y
Prohibition of sales of foods restricted in schools (selected items high in fats and sugars) to youth younger than age 18 y
[]
CDC - Blogs - Preventing Chronic Disease Dialogue – Addressing the Proximal Causes of Obesity: The Relevance of Alcohol Control Policies
Potential Obesity Control Policies
http://blogs.cdc.gov/pcd/2012/07/09/addressing-the-proximal-causes-of-obesity-the-relevance-of-alcohol-control-policies/
39/1438042989126.22_20150728002309-00199-ip-10-236-191-2_32052076_0.json
65192132_ted_to_Handling_Sensitive_Data__Examples
[Law/Regulation/ Standard] Electronic Protected health Information (ePHI) or HIPAA ePHI is regulated by the Health Insurance Portability and Accountability Act (HIPAA) [Definition] The Privacy and Security Rules apply only to covered entities in their role as a Health Care Provider, Health Plan, or Health Care Clearinghouse. Protected health information excludes individually identifiable health information in: Education records covered by the Family Educational Rights and Privacy Act (FERPA), as amended, 20 U.S.C. 1232g(a)(4)(B)(iv) Employment records held by a covered entity in its role as an employer [Data Steward/ Manager] Health System Compliance Officer [email protected] [Resources] U.S. Dept of Health HIPAA website Health and Human Services Information for Covered Entities UMHS Compliance ITS HIPAA-Aligned Services: What U-M Units Need to Know [Examples]
The following individually identifiable data elements, when combined with health information about that individual, make such information protected health information (PHI): Names All geographic subdivisions smaller than a State All elements of dates (except year) for dates directly related to an individual including birth date, admission date, discharge date, date of death Telephone numbers Fax numbers Email addresses Social security numbers Medical record numbers Health plan beneficiary numbers Account numbers Certificate/License numbers Vehicle identifiers and serial numbers, including license plate numbers Device identifiers and serial numbers URLs IP addresses Biometric identifiers Full face photographic images and any comparable images and any other unique identifying number, characteristic, code, or combination that allows identification of an individual. See the Sensitive Data Guide: Protected Health Information (HIPAA) for more examples.
[]
University of Michigan | ITS | Safe Computing | Information Security Laws and Regulations Related to Handling Sensitive Data
Examples
http://safecomputing.umich.edu/protect-um-data/compliance-table.php
39/1438043062723.96_20150728002422-00125-ip-10-236-191-2_211979179_1.json
65192132_ted_to_Handling_Sensitive_Data__Examples
[Law/Regulation/ Standard] Export Control Research or ITAR, EAR International Traffic in Arms Regulation (ITAR); Export Administration Regulations (EAR) [Definition] Export controlled research includes information that is regulated for reasons of national security, foreign policy, anti-terrorism or non-proliferation. [Data Steward/ Manager] Export Controls Compliance Office of the Vice President for Research [email protected] [Resources] U-M ORSP Export Control Regulations and Restrictions Dept. of Commerce Export Controls [Examples]
Chemical and biological agents Scientific satellite information Certain software or technical data sent to foreign persons Military electronics.... Nuclear Physics Work on new formula for explosives - this kind of data cannot be stored on systems outside the United States nor can non-U.S. citizens work on this type of project. See the Sensitive Data Guide: Export Control Research (ITAR or EAR) for more examples.
[]
University of Michigan | ITS | Safe Computing | Information Security Laws and Regulations Related to Handling Sensitive Data
Examples
http://safecomputing.umich.edu/protect-um-data/compliance-table.php
39/1438043062723.96_20150728002422-00125-ip-10-236-191-2_211979179_1.json
65192132_ted_to_Handling_Sensitive_Data__Examples
[Law/Regulation/ Standard] FISMA Federal Information Security Management Act [Definition] FISMA requires federal agencies, and those providing services on their behalf to develop, document, and implement security programs for IT systems and store the data on U.S. soil. FISMA applies generally to federal "contracts" as opposed to grants. [Data Steward/ Manager] -- [Resources] NIST FISMA website [Examples]
If you work with data provided by the federal government under contract and exchange data with government systems, then you may be subject to FISMA compliance regulations to protect the data. See the Sensitive Data Guide: FISMA Data for more examples.
[]
University of Michigan | ITS | Safe Computing | Information Security Laws and Regulations Related to Handling Sensitive Data
Examples
http://safecomputing.umich.edu/protect-um-data/compliance-table.php
39/1438043062723.96_20150728002422-00125-ip-10-236-191-2_211979179_1.json
65192132_ted_to_Handling_Sensitive_Data__Examples
[Law/Regulation/ Standard] GLBA (Student Loan Information) Gramm-Leach-Bliley Act [Definition] GLBA includes provisions to protect consumers personal financial information held by financial institutions and higher education organizations. [Data Steward/ Manager] Executive Director and University Registrar [email protected] [Resources] U-M GLBA Compliance Federal Standards for Safeguarding Customer Information [Examples]
Loan information Student financial aid data Payment History You may need to be concerned about GLBA if your department runs its own student financial Aid program. See the Sensitive Data Guide: Student Loan Application Information (GBLA) for more examples.
[]
University of Michigan | ITS | Safe Computing | Information Security Laws and Regulations Related to Handling Sensitive Data
Examples
http://safecomputing.umich.edu/protect-um-data/compliance-table.php
39/1438043062723.96_20150728002422-00125-ip-10-236-191-2_211979179_1.json
65192132_ted_to_Handling_Sensitive_Data__Examples
[Law/Regulation/ Standard] Sensitive Identifiable Human Subject Research Federal Policy for the Protection of Human Subjects ('Common Rule') [Definition] A human subject is a living individual about whom an investigator (whether professional or student) conducting research obtains data through intervention or interaction with the individual or when identifiable private information is obtained. Sensitive Human Subject Research is as defined by 45 CFR 46.101(b)(2), which distinguishes regulated research from a category of exempt research using the following language: "Information obtain is recorded in such a manner that human subjects can be identified, directly or through identifiers linked to the subjects; and any disclosure of the human subjects' responses outside the research could reasonably place the subjects at risk of criminal or civil liability or be damaging to the subjects' financial standing, employability, or reputation" [Data Steward/ Manager] Human Research Protection Program (HRPP) [email protected] [Resources] HHS Human Subjects website Common Rule [Examples]
Individually-identifiable research data containing sensitive information about human subjects, such as information about: illegal behaviors drug or alcohol abuse sexual behavior mental health other sensitive health or genetic information Any data collected under an NIH Certificate of Confidentiality is considered to be sensitive. See the Sensitive Data Guide: Sensitive Identifiable Human Subject Research for more examples.
[]
University of Michigan | ITS | Safe Computing | Information Security Laws and Regulations Related to Handling Sensitive Data
Examples
http://safecomputing.umich.edu/protect-um-data/compliance-table.php
39/1438043062723.96_20150728002422-00125-ip-10-236-191-2_211979179_1.json
65192132_ted_to_Handling_Sensitive_Data__Examples
[Law/Regulation/ Standard] PCI or Credit Card Information Payment Card Industry Data Security Standards [Definition] Information related to credit card holder information as defined by the Payment Card Industry Data Security Standards. If you have to keep some record of the card used in transactions, use the last 4 digits of the number. [Data Steward/ Manager] University Treasurer [email protected] [Resources] U-M Merchant Services PCI-DSS [Examples]
Cardholder name Account number Expiration date Verification number Security code... University of Michigan Treasurer's Office specifically states: "... Departments are not allowed to store electronically cardholder data on any university system. This includes, but is not limited to, computers, servers, laptops, and flash drives." See the Sensitive Data Guide: Credit Card or Payment Card Industry (PCI) Information for more examples.
[]
University of Michigan | ITS | Safe Computing | Information Security Laws and Regulations Related to Handling Sensitive Data
Examples
http://safecomputing.umich.edu/protect-um-data/compliance-table.php
39/1438043062723.96_20150728002422-00125-ip-10-236-191-2_211979179_1.json
65192132_ted_to_Handling_Sensitive_Data__Examples
[Law/Regulation/ Standard] SSNs Social Security Numbers Michigan Identity Theft Protection Act, MCL 445.63 (applies to additional personal private information) [Definition] The SSN is a primary target for identity thieves, and falls into the category of sensitive private protected information (PPI). If you have to keep some record of the card used in transactions, use the last 4 digits of the number. [Data Steward/ Manager] -- [Resources] SPG 601.14 - Social Security Number Privacy Policy Social Security Number Privacy Act Michigan Identity Theft Protection Act, MCL 445.63 (applies to additional personal private information) [Examples]
123-45-6789
[]
University of Michigan | ITS | Safe Computing | Information Security Laws and Regulations Related to Handling Sensitive Data
Examples
http://safecomputing.umich.edu/protect-um-data/compliance-table.php
39/1438043062723.96_20150728002422-00125-ip-10-236-191-2_211979179_1.json
65192132_ted_to_Handling_Sensitive_Data__Examples
[Law/Regulation/ Standard] Student Educational Records or FERPA Family Educational Rights and Privacy Act [Definition] Records that contain information directly related to a student and which are maintained by an educational agency or institution. [Data Steward/ Manager] Executive Director and University Registrar [email protected] [Resources] University Registrar FERPA website U.S. Dept of Education [Examples]
Grades Student Transcripts Degree Information Class Schedule Advising and Disciplinary records.... See the Sensitive Data Guide: Student Education Records (FERPA) for more examples.
[]
University of Michigan | ITS | Safe Computing | Information Security Laws and Regulations Related to Handling Sensitive Data
Examples
http://safecomputing.umich.edu/protect-um-data/compliance-table.php
39/1438043062723.96_20150728002422-00125-ip-10-236-191-2_211979179_1.json
921e0ad7_Forms_and_Documents__Process
[Request] Add/Drop Form [Name of Form] Student Class Add/Drop Form [Process]
Student submits the form and obtains approval and signatures by the Department Chair and Dean. Then the student brings the form to the Registrar’s Office.
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] Address Change [Name of Form] To update your Permanent Legal Address, please contact the Payroll Office at 936-294-1909 [Process]
For assistance with processing address change requests, please contact the Payroll Office.
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] Application for Degree [Name of Form] Application for Degree Form [Process]
Student submits the form to the Registrar's Office
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] Audit Process Rules [Name of Form] Rules for Auditing a Course [Process]
Student visits Registrar's Office for official form.
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] Buckley Amendment [Name of Form] Buckley Amendment Form [Process]
Student submits the form to the Registrar's Office.
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] Declare / Change Major/Minor [Name of Form] Declare/Change Major: Undergraduate Health Sciences Business Criminal Justice Education Fine Arts and Mass Communication Humanities and Social Sciences Sciences General Studies Double Major Medical and Allied Health Programs [Process]
Please note the signature routing as required on the forms.
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] Duplicate Diploma [Name of Form] Request for Duplicate Diploma [Process]
Student submits the form to the Office of the Registrar.
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] IRS 1098 [Name of Form] IRS 1098 Form [Process]
Students may access their IRS 1098 Form through MySam.
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] Name Change [Name of Form] Students may request name, W2 address, and social security changes by accessing the Payroll Office's official change request form. If you are requesting a Change of Name after submitting an Application for Degree, then the form must be submitted to the Registrar's Office. [Process]
Social Security or Name Change request forms must be accompanied with an attached legal document in order to be processed.
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] Peace Officer and Firefighters Exemption [Name of Form] Peace Officer and Firefighters Exemption Form- [Process]
Student submits the form to the Office of the Registrar.
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] Resignation [Name of Form] Resignation Request Resignation Agreement for Finals [Process]
Student submits to Sam Center (undergraduate) or Registrar (graduate) to drop ALL of their courses.
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] Senior Citizen Waiver Form [Name of Form] Application for Senior Citizen Waiver Form [Process]
Student submits the form to the Registrar's Office.
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] Social Security Number Change [Name of Form] Students may request name, address, and social security changes by accessing the Payroll Office's official change request form. [Process]
Student submits the form to the Payroll Office
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] Transcript by Mail [Name of Form] Request for Copy of Official Transcript by Mail [Process]
Student submits the form to the Office of the Registrar.
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] Transcript by Proxy [Name of Form] Request By Proxy for Copy of Official Transcript [Process]
Student submits the form to the Office of the Registrar
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
921e0ad7_Forms_and_Documents__Process
[Request] Tuition Rebate Form [Name of Form] Tuition Rebate Form [Process]
Student submits the form to the Office of the Registrar
[]
Forms and Documents
Process
http://www.shsu.edu/dept/registrar/forms-and-documents/forms-and-documents.html
39/1438043062723.96_20150728002422-00269-ip-10-236-191-2_702113885_0.json
b22f107d_2000___FDJP__Topics
[Competences / description] International administrative assistance in tax matters, Tax evasion [Topics]
Taxes
[ [ "T", "a", "x", "e", "s" ], [ "T", "e", "r", "m", "i", "n", "a", "t", "i", "o", "n", " ", "o", "f", " ", "p", "r", "e", "g", "n", "a", "n", "c", "y" ], [ "T", "e", "r", "r", "o", "r", "i", "s", "m" ], [ "T", "o", "r", "t", "u", "r", "e" ], [ "T", "r", "a", "f", "f", "i", "c", "k", "i", "n", "g", " ", "a", "n", "d", " ", "s", "m", "u", "g", "g", "l", "i", "n", "g", " ", "o", "f", " ", "h", "u", "m", "a", "n", " ", "b", "e", "i", "n", "g", "s" ], [ "T", "r", "a", "n", "s", "p", "a", "r", "e", "n", "c", "y" ] ]
2000 - FDJP
Topics
http://www.ejpd.admin.ch/ejpd/en/home/aktuell/news/2000.html
39/1438042988305.14_20150728002308-00101-ip-10-236-191-2_416886870_45.json
b22f107d_2000___FDJP__Topics
[Competences / description] see Criminal law [Topics]
Termination of pregnancy
[ [ "T", "a", "x", "e", "s" ], [ "T", "e", "r", "m", "i", "n", "a", "t", "i", "o", "n", " ", "o", "f", " ", "p", "r", "e", "g", "n", "a", "n", "c", "y" ], [ "T", "e", "r", "r", "o", "r", "i", "s", "m" ], [ "T", "o", "r", "t", "u", "r", "e" ], [ "T", "r", "a", "f", "f", "i", "c", "k", "i", "n", "g", " ", "a", "n", "d", " ", "s", "m", "u", "g", "g", "l", "i", "n", "g", " ", "o", "f", " ", "h", "u", "m", "a", "n", " ", "b", "e", "i", "n", "g", "s" ], [ "T", "r", "a", "n", "s", "p", "a", "r", "e", "n", "c", "y" ] ]
2000 - FDJP
Topics
http://www.ejpd.admin.ch/ejpd/en/home/aktuell/news/2000.html
39/1438042988305.14_20150728002308-00101-ip-10-236-191-2_416886870_45.json
b22f107d_2000___FDJP__Topics
[Competences / description] Fight against terrorism, terror attacks [Topics]
Terrorism
[ [ "T", "a", "x", "e", "s" ], [ "T", "e", "r", "m", "i", "n", "a", "t", "i", "o", "n", " ", "o", "f", " ", "p", "r", "e", "g", "n", "a", "n", "c", "y" ], [ "T", "e", "r", "r", "o", "r", "i", "s", "m" ], [ "T", "o", "r", "t", "u", "r", "e" ], [ "T", "r", "a", "f", "f", "i", "c", "k", "i", "n", "g", " ", "a", "n", "d", " ", "s", "m", "u", "g", "g", "l", "i", "n", "g", " ", "o", "f", " ", "h", "u", "m", "a", "n", " ", "b", "e", "i", "n", "g", "s" ], [ "T", "r", "a", "n", "s", "p", "a", "r", "e", "n", "c", "y" ] ]
2000 - FDJP
Topics
http://www.ejpd.admin.ch/ejpd/en/home/aktuell/news/2000.html
39/1438042988305.14_20150728002308-00101-ip-10-236-191-2_416886870_45.json
b22f107d_2000___FDJP__Topics
[Competences / description] Prevention of torture, CPT, cxecution of sentences and measures [Topics]
Torture
[ [ "T", "a", "x", "e", "s" ], [ "T", "e", "r", "m", "i", "n", "a", "t", "i", "o", "n", " ", "o", "f", " ", "p", "r", "e", "g", "n", "a", "n", "c", "y" ], [ "T", "e", "r", "r", "o", "r", "i", "s", "m" ], [ "T", "o", "r", "t", "u", "r", "e" ], [ "T", "r", "a", "f", "f", "i", "c", "k", "i", "n", "g", " ", "a", "n", "d", " ", "s", "m", "u", "g", "g", "l", "i", "n", "g", " ", "o", "f", " ", "h", "u", "m", "a", "n", " ", "b", "e", "i", "n", "g", "s" ], [ "T", "r", "a", "n", "s", "p", "a", "r", "e", "n", "c", "y" ] ]
2000 - FDJP
Topics
http://www.ejpd.admin.ch/ejpd/en/home/aktuell/news/2000.html
39/1438042988305.14_20150728002308-00101-ip-10-236-191-2_416886870_45.json
b22f107d_2000___FDJP__Topics
[Competences / description] Recruitment, transportation, harbouring or receipt of persons for the purpose of exploitation, facilitating a person’s illegal entry into Switzerland or another Schengen member state [Topics]
Trafficking and smuggling of human beings
[ [ "T", "a", "x", "e", "s" ], [ "T", "e", "r", "m", "i", "n", "a", "t", "i", "o", "n", " ", "o", "f", " ", "p", "r", "e", "g", "n", "a", "n", "c", "y" ], [ "T", "e", "r", "r", "o", "r", "i", "s", "m" ], [ "T", "o", "r", "t", "u", "r", "e" ], [ "T", "r", "a", "f", "f", "i", "c", "k", "i", "n", "g", " ", "a", "n", "d", " ", "s", "m", "u", "g", "g", "l", "i", "n", "g", " ", "o", "f", " ", "h", "u", "m", "a", "n", " ", "b", "e", "i", "n", "g", "s" ], [ "T", "r", "a", "n", "s", "p", "a", "r", "e", "n", "c", "y" ] ]
2000 - FDJP
Topics
http://www.ejpd.admin.ch/ejpd/en/home/aktuell/news/2000.html
39/1438042988305.14_20150728002308-00101-ip-10-236-191-2_416886870_45.json
b22f107d_2000___FDJP__Topics
[Competences / description] Öffentlichkeitsprinzip der Verwaltung, Zugang zu amtlichen Dokumenten, Transparenz bei Vergütungen des Verwaltungsrates und der Geschäftsleitung [Topics]
Transparency
[ [ "T", "a", "x", "e", "s" ], [ "T", "e", "r", "m", "i", "n", "a", "t", "i", "o", "n", " ", "o", "f", " ", "p", "r", "e", "g", "n", "a", "n", "c", "y" ], [ "T", "e", "r", "r", "o", "r", "i", "s", "m" ], [ "T", "o", "r", "t", "u", "r", "e" ], [ "T", "r", "a", "f", "f", "i", "c", "k", "i", "n", "g", " ", "a", "n", "d", " ", "s", "m", "u", "g", "g", "l", "i", "n", "g", " ", "o", "f", " ", "h", "u", "m", "a", "n", " ", "b", "e", "i", "n", "g", "s" ], [ "T", "r", "a", "n", "s", "p", "a", "r", "e", "n", "c", "y" ] ]
2000 - FDJP
Topics
http://www.ejpd.admin.ch/ejpd/en/home/aktuell/news/2000.html
39/1438042988305.14_20150728002308-00101-ip-10-236-191-2_416886870_45.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] If the computer is in a room that is physically accessible to multiple people, is the machine properly secured so the attacker cannot gain access to the hard drives? [Name]
Physical Security
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] Upon installing the Linux operating system, have all the services that aren’t needed been disabled to prevent possible entry points for the attacker? We should also take a look at the enabled services and harden them one by one, where each of them has specific configuration variables we need to pay attention to. [Name]
Services
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] Are the partitions the user can write to, like /home, /tmp and /var/tmp on separate partitions and do they use disk quotas? The partitions the user can write to have to have user quotas to prevent them from filling up a whole disk. [Name]
Separate Partitons
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] Is access to the root user properly hardened? Only the predefined users should be in a wheel group, which allows users to su to root. The usage of sudo should also be properly restricted. [Name]
Root user
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] Certain USE flags that harden the security of a whole system need to be enabled. Those flags are pam, tcpd and ssl. [Name]
USE Flags
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] Does Grub have a password? That should prevent attackers to boot in single user mode. [Name]
Grub password
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] The /etc/ security file specifies the terminals the root is allowed to log into. We should only enable the tty1 terminal, so the user will be allowed to login only on one terminal. [Name]
Hardening /etc/securetty
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] We need to ensure that we enable a remote logging server, where the logs from our machine will be sent. This allows logs to be evaluated for possible malicious activity, but more importantly provides proof when a security breach occurs. [Name]
Logging
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] When mounting partitions from /etc/fstab, we need to set the following flags to the appropriate mount points: nosuid, noexec and nodev. The nosuid ignores the SUID bit of the executable, the noexec prevents any executable from being executed from chosen parition and the nodev ignores devices on that partition. [Name]
Mounting Partitions
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] We must ensure that files, which contain passwords or other critical information, should not be universaly readable, let alone writable. If this is the case, the attacker can simply read the file and get the password or even worse: change the whole file completely. [Name]
World readable and writable files
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] When some executables have the SUID/SGID bit set, it means that those files will execute with root privileges no matter which user executed them. This is why we must limit the number of those executables, so we reduce the vector of attack to attacker. Remember that you shouldn’t remove the SUID bit on su executable, otherwise you won’t be able to su to root anymore. [Name]
SUID/SGID files
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] PAM is used to take care of authentication details of users, which we can also use to set various password hardening options when choosing a password. For example, we might choose that the minimum length of the password should be at least eight characters. In Gentoo, this can be ensured by installing the cracklib package. [Name]
PAM
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] We should install and configure a Grsecurity/PaX enabled kernel, which will provide a hardened Linux security system that we simply must have to win the battle against blackhats. [Name]
Grsecurity/PaX
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] We should enable a firewall on our machine, so we prevent access to certain IP ranges and block certain IP addresses, because of some detected SYN flood or some other attack scenario. The IDS can also detect when various kinds of attacks are executed against our machine, while the IPS can also prevent them. [Name]
Firewall and IDS/IPS
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
d9443187_and_ClamAV___InfoSec_Institute__Name
[Description] We need to ensure that we don’t run out of date services on our machine, since they can contain vulnerabilities that an attacker can use to gain access to our machine. This is one of the most important things that we need to remember when trying to keep systems secure. Update your systems regularly. [Name]
Patching the system
[]
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV - InfoSec Institute
Name
http://resources.infosecinstitute.com/gentoo-hardening-part-4-pax-rbac-clamav/
39/1438042989126.22_20150728002309-00137-ip-10-236-191-2_216017620_0.json
7d6e971b_Magick__Magick_Vector_Graphics__Description
[Method] clear [Description]
Both the color and the alpha of the destination are cleared. Neither the source nor the destination are used as input.
[]
ImageMagick: Magick Vector Graphics
Description
http://www.imagemagick.org/www/magick-vector-graphics.html
39/1438042989126.22_20150728002309-00031-ip-10-236-191-2_510692786_1.json