This is an HTML version of an attachment to the Official Information request 'Zoom Meeting Guide & Mediation or Alternative Dispute Resolution'.


GOV-027692 Appendix
Videoconferencing Guidelines
[Out of Scope]
Published 11/09/2023
There is only one video conferencing technology approved for use at ACC. That is
Microsoft Teams
, used on desktop computers and Surface Pros. 
Please visit https://accnz.sharepoint.com/sites/M365Hub/SitePages/Microsoft-
Teams.aspx for Microsoft Teams instructions.
Alternative videoconferencing software (e.g., Zoom, Blue Jeans, Google Hangouts etc.) 
The rules for videoconferencing software do not differ from any other software at ACC. Ask
yourself: is this software part of ACC’s enterprise portfolio of software or services? If the
answer is no, then don’t use it. If you do not know the answer, then don’t use it. Shadow IT
is not safe for use at ACC as it hasn’t gone through: 
Consultation with Architecture. 
A privacy and ethics assessment with Privacy. 
Certification and Accreditation (C&A) with Information Security. 
The procurement process with ICT Contracts and Commercial. 
For any software to be used enterprise-wide, there would need to be a business case
presented to executive (tier 2 management) establishing the business need for the software,
and to show why existing enterprise software is not fit-for-purpose. Then, provided the
business case is approved, a project team would need to be established and funded to
bring about the change. 
Nevertheless, there are external organisations (including government agencies) that have
adopted different videoconferencing software from ACC as part of their enterprise system.
They may not be able to use Microsoft Teams to host their meetings, and you may need to
accept invites to their meetings as part of your job. If this is the case, you may accept an
invite to the meeting, but just remember: 
Do not host any meetings. 
Use the web application version rather than the desktop application (as this requires
an install). 
Make sure you only accept meeting IDs with PINs, not open meeting links. 
Make sure you know who is in the meeting, so that you can adjust your dialogue
accordingly. 
Join without video initiated until you are comfortable the audience is as expected. 

GOV-027692 Appendix
 
Records
Decisions or actions made during videoconferences you participate in are likely to be
official records. ACC is legally obliged under the Official Information Act, Public Records Act
and other legislation to make and keep a record of all the decisions or actions made during
videoconferences that form part of ACC’s normal work practices. A transcript or video
recording of the meeting meets these obligations, as do formal meeting notes. If in doubt,
please email [email address].
Frequently Asked Questions
What if we really need to host videoconferences in Zoom/Blue Jeans/Google
Hangouts/other?
 
You can use Microsoft Teams and invite external participants. They can join from an internet
browser, or they may choose to install the desktop client and join anonymously with the
free version of Teams. If your business group leadership believes that an exception needs to
be made, and the use of alternative videoconferencing software be approved, they may
escalate the issue. More information about inviting external participants to Microsoft Teams
is here. 
What if I have already downloaded Zoom/Blue Jeans/Google Hangouts/other? 
You will need to uninstall the application and change any passwords used in these
applications. (Note: It is preferred that you DONT use your ACC email address as the user ID
for these systems). 
Can I turn my video on when invited to a Zoom/Blue Jeans/Google Hangouts/other
meeting? 
Use your discretion. If the meeting replaces what would normally be a phone call, there is
no need to turn your video on. If the meeting replaces what would normally be a face-to-
face meeting, then you may want to enable video. Just make sure you check what’s in your
background before enabling other meeting participants to see you. 
I prefer alternate technologies to host video conferences, like Zoom/Blue Jeans/Google
Hangouts/other. Why can’t I use those? 
These have not been endorsed for use across ACC. The enterprise solution is Microsoft
Teams. If your leadership team believe this is not fit for purpose to meet your capability
requirements, then they may want to escalate the issue. 




GOV-027692 Appendix
 
Meeting technology
Online Meeting Technology
See our Videoconferencing Guidelines regarding use of other apps like Zoom/Google
Hangouts/Blue Jeans etc
Microsoft Teams
Our primary tool for online meetings is Microsoft Teams - it can be used on your
laptop or enrolled mobile phone to have an online meeting with a group of
people (including people who are external to ACC), or a one-one video call.  You
can record meetings and share the recording afterwards.
For information and user guides see Microsoft Teams Meetings.
Skype for Business



GOV-027692 Appendix
 
Microsoft are discontinuing this application - Please use Microsoft Teams for
online meetings.
WebEx
WebEx is a tool used at ACC by some groups for online training, job interviews or
meetings.  It is recommended that you consider using Microsoft Teams for
meetings where possible.
For information on setting up and using WebEx see this page.
Meeting Room Technology
Booking meeting rooms
You can book meeting rooms via Outlook using these instructions.
 
Which site's meeting room technology do you want to find out 
about?












GOV-027692 Appendix
 
Audio Conferences
We no longer use audio conferencing at ACC.  If you wish to have an audio
meeting with others, you can do this via a Microsoft Teams meeting.
To order polycom meeting room phones:
1. Open ICT Self Service
2. Click on 'Telephony' 
3. 'Other telephony items'
4. 'Meeting Room phones'
5. Request access and complete the form


 
GOV-027692 Appendix
Which M365 communications channel should I use?

 
GOV-027692 Appendix
CommunicationChannels
Title 
Outlook 
Teams 
Viva Engage 
SharePoint 
Te Pātaka 
Skype 
Stream 

External Messages
 
 







Formal Messages








Targeted messages








Updating other teams








Planning and discussing








Asking your team questions or polls








Prompt group problem solving








Chat








Online meetings








Large scale presentations (250+)








Sharing useful insights








Social posts








Asking questions or running polls outside your team








Sharing news or information to interested communities








Sharing news or information to All ACC








External phone calls








Storing & sharing videos











 
GOV-027692 Appendix
A deeper look at our channels
(Their uses and attributes)
Outlook
 Microsoft Teams
Use for:
Use for:
Formal messages
Planning, discussing, asking your team questions
Targeted messages to people outside of your team
Sharing files with your team
Messages to people outside of ACC
Accessing shared team resources
Messages which do not require an immediate
Prompt problem solving discussions
response
Private chats with individuals and groups
Online meetings*
Attributes/Features:


 
GOV-027692 Appendix
Formal
Large scale presentations to audiences over 250
Useful for targeted messages to people outside of
people (Live events)
your team
Sharing insights that are useful for others
Ability to message people outside of ACC
Social posts
Accessible to enrolled mobiles
Attributes/Features:
More information
Informal
Visit the Outlook page.
Transparent
Connected to a pre-set business unit or community
Private chat (chat history remains view-able in chat)
Video conferencing, with recording, for meetings of
less than 250 people
Video presentations (Live events), with recording, for
up to 10,000 participants
Provides a window to other Microsoft 365 apps and
is intrinsically linked to SharePoint
Accessible to enrolled mobiles
More information
SharePoint (Communications Site)
Visit the Microsoft Teams page.
Use for:
Sharing information with others at ACC via a site you
can manage yourself



 
GOV-027692 Appendix
Discussing/making suggestions while co-authoring
documents
Attributes/Features:
Blog styled stories for a predefined audience
Co-authoring communications through comments
More information
Skype for Business
Visit the Digital Workspace page.
Visit the SharePoint page.
Use for:
External phone calls
Attributes/Features:
External calling
Chat functionality (chat history accessible in Outlook)
Video conferencing, no recording (250 participant
limit)
More information
Visit the Skype for Business page.
Stream
Use for:


 
GOV-027692 Appendix
Storing and sharing work-related videos internally at
ACC
Attributes/Features
ACC's internal video platform
Auto transcription
Auto-timeline of who spoke in Meeting recordings
Video can be sorted by Group or Channel
Videos can be embedded into SharePoint sites
More information
Viva Engage
Visit the Stream page.
Use for:
Leveraging the expertise of people outside your
circle
Sharing your team's updates with a wider audience
Sharing insights that are useful for others
Recognising/celebrating exceptional performance
with a wider audience
Social posts
Attributes/Features:
A discussion forum accessible to all ACC staff
Wide membership base
Open and transparent

 
GOV-027692 Appendix
Ability to create interest groups
Yammer feeds embeddable into SharePoint sites
Customisable feeds
More information:
Visit the Viva Engage page
 For more information on all of the M365 apps and what they do, click here.


GOV-027692 Appendix
 
Using unsanctioned apps/sites/tools? Touch,
Pause, Engage

[Out of Scope]
Technology Enablement Manager 00514472
Are you using a free app or trial subscription for work purposes?  Are you
communicating online with your team using something other than Teams,
Outlook or Skype?
Using apps, websites and technology that haven't been through ACC's approval
process opens us up to all kinds of risks.  Online/mobile websites and tools can
store your data insecurely and share or sell it to others without your knowledge. 
When this involves communication with your ACC colleagues or any information
relating to your ACC work, it can also create privacy breaches and break our
obligations under the Records Management Act as we don't necessarily have
control over where that information is stored, how long it is retained for, or how it
can be accessed.
If you have a requirement please check out tools we already have available (see
below for a list of our main Microsoft/Atlassian apps) then, if you still feel like
they don't meet your needs, contact the Architecture Team and they'll look at
what other options might be available and will explain the process you'll need to
follow if you want to get approval to use something different.  It's really
important you don't just start using something just because it's free or because
you think it looks useful.
Here's a little rugby scrum term for you to put into play....
Touch base with your team to check what they're using and why
Pause any use of tools outside our sanctioned list 
Engage with the Architecture Team to discuss any special requirements
and what you need to do regarding information that may already be in
unsanctioned tools


GOV-027692 Appendix
 
WebEx
WebEx is a tool used at ACC for online training, job interviews or meetings.  It is
recommended that you consider using Microsoft Teams which incurs no cost. 
WebEx provides some features that Microsoft Teams doesn't such as 'break-out'
online meeting rooms which can be useful for large training sessions.  
Only hosts of a meeting need to set up a WebEx account. Attendees of meetings
or training sessions do not have to sign up.
Meeting attendees will get a meeting invitation by email; all they need to do is
follow the instructions given.
Set up a WebEx account
If you don’t have an account but need to set up a meeting:
1. Visit ICT Self Service
2. Click on the Applications icon
3. Click on WebEx towards the bottom of the page
4. Complete the drop-down lists
5. Click on Add
Your order will then be processed, and you’ll be given access. You will receive a
host account user name and initial password.
Save the ACC WebEx URL: https://accnz.webex.com as an Internet favourite for
future use.
Costs

GOV-027692 Appendix
 
Costs for using WebEx are always charged back to the Host’s cost centre, for all
participants.
Charges for WebEx are 35 cents (NZD) per minute/per person in attendance.
WebEx tips and etiquette
Some useful tips and etiquette to ensure your WebEx sessions are enjoyed by all
participants:
Let colleagues near you know you’re taking part in a WebEx meeting, by
putting up a sign or sending them an email.
Ensure your phone is off divert before joining a session, otherwise you may
have difficulty with the teleconference ‘call-back’.
If you are an attendee at a meeting, close all other applications on your
desktop, especially your email.
Use the ‘raise hand’ function in WebEx to ask the host/facilitator a
question, instead of interrupting.
Mute your phone (using the mute button in WebEx) when not talking. An X
appears next to your name, letting other attendees know you are on mute.


GOV-027692 Appendix
   
Telephony Policy 
 
POLICY 
5.11.0 (Level 3 policy) 
NUMBER 
TOPIC 
Telephony - Subordinate to Information Security policy 
[Out of Scope]
OWNER 
 
Manager, Digital Workspace and Engineering 
Technology and Platforms 
Enterprise Change Delivery Group 
DATE 
2 February 2021 
APPROVED 
[Out of Scope]
[Out of Scope]
APPROVER 
Head of Technology and Platforms in consultation with
Deputy Chief Executive – Enterprise Change Delivery (DCE-ECD) 
DATE OF 
2 February 2023 
REVIEW 
 
1  Objective 
We  use  telephony  services  to  communicate  internally  and  externally.      Telephony  devices  are 
increasingly used to collaborate and share information within ACC.   Telephony services must be 
appropriately  used  by  and  available  to  ACC  employees,  whilst  adhering  to  good  information 
management practice and relevant legislative requirements.   
 
2  Scope 
This Policy applies to all ACC employees, contractors and persons using ACC telephony devices, or 
personal Telephony devices (known as Bring Your Own Device or BYOD) used for ACC business.  
Specific telephony and meeting guidance available via the Technology Hub – IT Support Resources 
and M365 Hub will cover in detail the use of the following equipment and services:  
•  Mobile phones and other mobile devices, where not explicitly covered in Policy Principles listed 
below 
•  Bring Your Own Device (BYOD) including mobile phones and tablets 
•  Skype for Business  
•  Microsoft Teams  
•  Genesys (Contact Centre) 
•  Other telephony or Voice over Internet Protocol (VOIP) services:   

Audio and video conferencing  

Webex (Online meeting rooms) 
 
 
Accident Compensation Corporation 
Page 1 of 8 

GOV-027692 Appendix
2 February 2023 
 
2 February 2021 
Call  recording  where  used  will  be  captured  in  the  platform  specific  standards  for  each  device  or 
application.  All call recording using telephony solutions will be compliant with the ACC Privacy Policy 
and any applicable legislation. 
 
3  Policy statements 
3.1  We use ACC provided telephony services and devices primarily for business purposes. 
We may use ACC provided telephony services and devices for personal use, without reimbursing 
ACC, provided their use is in accordance with the following: 
•  Personal use is not excessive and is in accordance with the Mobile Device Reasonable Usage 
guidelines. 
•  All personal use must be compliant with the ACC Use of the Internet Policy and Information 
Security Policy and associated standards. 
•  Personal calls using ACC telephony devices should only be made within New Zealand unless 
prior management approval has been given. 
•  Personal use must always be in accordance with the ACC Code of Conduct. 
 
3.2  We secure and  manage  telephony  devices to  enable employees  to securely  communicate, 
collaborate and access information internally and externally.  
•  We will encrypt all ACC data on devices using Modern Device Management (MDM). 
•  Where appropriate, MDM may restrict, or control, device functions and/or applications to secure 
ACC data. 
•  The MDM solution will allow both corporate and personal applications on the same device. 
•  Single  Sign  On  (SSO)  with  Multi  Factor  Authentication  (MFA)  will  be  supported  for  all  ACC 
telephony applications. 
•  If a device is lost/stolen, we will use the MDM solution to access GPS location data and remotely 
wipe a device, and/or applications and data. 
 
 
3.3  We dispose of telephony devices according to government requirements.  
•  All telephony devices purchased by ACC remain the property of ACC and cannot be sold or 
gifted  to  any  other  party  without  the  approval  of  the  Deputy  Chief  Executive  –  Corporate  & 
Finance.  
•  Equipment that is no longer needed or is to be disposed of must be returned to the Enterprise 
Change Delivery group for removal of ACC data and subsequent disposal in accordance with 
the New Zealand Information Security Manual (NZISM) requirements. 
 
Accident Compensation Corporation 
Page 2 of 8 

GOV-027692 Appendix
2 February 2023 
 
2 February 2021 
 
3.4  We do not use unapproved telephony devices within ACC. 
•  Use of unapproved devices is a breach of ACC’s Code of Conduct and may result in disciplinary 
action. 
•  All mobile telephony devices, including BYOD, must be enrolled in, ACC’s MDM platform when 
being used for ACC business purposes. 
 
3.5  We ensure all call recordings made are in accordance with best practice and legislation. 
•  ACC does not allow call recording without the informed consent of all parties involved. 
•  Where a call recording forms part of the decision-making process, a copy, or verified transcript 
of the call must be saved in the appropriate system of record. 
•  Where covert recording is required for an investigation, approvals must be obtained and retained 
in line with the Integrity Information Gathering Policy. 
•  Where a call recording is to be published e.g., record of a meeting, informed consent must be 
sought from all persons involved. 
 
3.6  We ensure all telephony devices used in ACC are fit for purpose. 
•  All  telephony  devices  used  for  ACC  purposes  must  be  updated  to,  at  a  minimum,  the  most 
current version of the operating software for that device -1 iteration (n-1) 
•  All ACC provided mobile devices must be managed using the ACC MDM solution to ensure all 
relevant updates are delivered and installed correctly. 
•  Mobile telephony devices that are compromised or no longer fit for purpose may have all ACC 
data and applications remotely wiped from that device using the ACC MDM solution. 
 
3.7  We control the access to our data and systems that we allow telephony devices to have. 
•  ACC  applications  are  deployed,  controlled  and  encrypted  by  our  MDM  solution  on  mobile 
devices. 
•  Any mobile application that has access to ACC credentials or data must be managed by the 
MDM solution. 
•  All  ACC  applications deployed on mobile  devices will be monitored  and  any  suspect activity 
investigated accordingly. 
•  Where required ACC may enforce device encryption and/or strict device management where it 
is deemed necessary according to the ACC Modern Device Standards and Guidelines. 
 
 
 

 
Accident Compensation Corporation 
Page 3 of 8 

GOV-027692 Appendix
2 February 2023 
 
2 February 2021 
3.8  We protect ACC data on mobile devices. 
•  All mobile applications that hold ACC data or credentials, or access ACC’s  internal network, 
must comply with the certification and accreditation requirements set out in the Cloud Computing 
Policy. 
 
3.9  We  apply  ACC  Privacy  and  Information  Management  Policies  across  all  our  telephony 
platforms. 
•  Where  a  system  stores  personal  information,  using  telephony  devices,  it  must  be  done  in 
accordance  with  ACC  Privacy  and  Information  Management  Policies,  Standards  and 
Procedures. 
•  We must ensure that information gathered via telephony devices is transferred to the appropriate 
system of record (e.g., Eos) as appropriate. 
 
4  Accountabilities 
The Manager Digital Workspace and Engineering with assistance from the Chief Information Security 
Officer  (CISO)  is  responsible  for  this  policy  being  implemented  on  behalf  of  the  Deputy  Chief 
Executive – Enterprise Change Delivery (DCE-ECD).The DCE-ECD retains overall accountability for 
this policy. 
 
This level three Policy will be reviewed every two years, or when significant changes occur. 
 
 
5  Responsibilities 
We are collectively responsible for the safe and proper use of telephony devices at ACC. 
 
Roles: 
Responsibilities: 
Employees including 
•  Comply with this policy and any supporting standards 
contractors, consultants 
•  Complete, and comply with, all required training modules 
and temporary employees 
engaged by ACC 
•  Observe proper telephony etiquette 
•  Report  any  lost/stolen  ACC  owned  mobile  devices  to  the  IT 
Service Desk as soon as possible and inform their manager. 
 
Accident Compensation Corporation 
Page 4 of 8 

GOV-027692 Appendix
2 February 2023 
 
2 February 2021 
People managers  
•  Must demonstrate good telephony behaviours. 
•  Must address telephony issues with the appropriate employees. 
•  People Managers are responsible for ensuring their employees 
and  contractors  are  aware  of  the  ACC  Telephony  Policy.  This 
means:  
•  Identifying  employees,  including  contractors  and  fixed-term 
employees, that require training and taking appropriate action to 
address this. 
•  Modelling  good  practice  in  telephony  management  to  their 
employees 
Digital  Workspace  team  •  Assist  to  maintain  and  administer  this  policy  and  associated 
and  Information  Security 
standards 
team 
•  Monitors,  via  the  ACC  MDM  and  internet  security  tools, 
compliance with this policy 
•  Liaise  with  telephony  suppliers  to  detect  and  prevent  security 
risks and misuse of telephony devices 
•  Detect, Investigate, and troubleshoot telephony security issues 
and threats 
•  Report on and plan for security incidents and threats 
•  Work  with  the  ACC  telephony  provider  to  manage  day  to  day 
asset management of ACC owned/provided devices.  
•  Record breaches of the policy and escalate where  appropriate 
(DCE-ECD, People Managers or Talent). 
6  Monitoring and oversight  
The  Digital  Workspace  team  with  assistance  from  the  Information  Security  team  will  monitor 
compliance  with  this  policy.    Day  to  day  oversight  of  employee's  compliance  is  the  role  of  line 
managers. 
 
The personal use of telephony services is monitored and is at the discretion of ACC. Where unfair 
or  inappropriate  use  is  found,  disciplinary  action  may  be  taken.    This  may  include  cessation  of 
service, and/or that the employee reimburses ACC. 
 
The monitoring and oversight of Telephony follows the five lines of assurance model. 
 
 
 
Accident Compensation Corporation 
Page 5 of 8 

GOV-027692 Appendix
2 February 2023 
 
2 February 2021 
LOA 
Role 
Monitoring & Oversight 
1st Line  Employees 
•  All employees remain alert to potential breaches of the Policy and report 
and People 
potential and actual breaches to their manager.  
 
Managers 
•  All people managers ensure that (i) breaches brought to their attention 
are documented1, (ii) notification of the breach is provided to the owner 
of the Policy within five days of the breach occurring. 
•  From  time  to  time  we  deliberately  take  actions  contrary  to  a  policy’s 
provisions  (corporate  policy  exceptions).  When  people  managers  are 
responsible  for  a  corporate  policy  exception,  the  people  managers 
ensure  that  the exceptions  are agreed  either  using  the process  in  the 
Policy or by agreement in writing from the Policy owner. 
Group Risk 
•  Supports  employees  to  determine  whether  events  constitute  actual 
and 
breaches of the Policy.  
Compliance 
•  Escalates breaches to the Group’s Leadership Team and Deputy Chief 
Manager 
and/or 
Executive when appropriate 
Advisor (If 
•  Updates risk registers as required. 
applicable)  
Policy Owner 
•  The  Policy  Owner  ensures  that  the  Group  (and  other parts  of  ACC  if 
applicable)  respond  appropriately  to  Policy breaches  and  requests  for 
exceptions.  
2nd 
Enterprise 
•  Performs periodic oversight activities intended to assess and/or provide 
Line 
Risk Team  
insights  into  (among  other  things)  compliance  with  the  Policy  and  the 
adequacy  and  effectiveness  of  the  Group’s  practices  to  monitor 
 
compliance and deal with breaches.  

 
  Reports  to  the  Executive  and  the  Board  on  the  outcomes  of  such 
activities.  
 
Digital 
•  Performs  monitoring,  via  the  ACC  MDM  and  internet  security  tools, 
Workspace 
compliance with this policy 
team & 

Information 
  Report on and plan for security incidents and threats 
Security 
•  Record breaches of the policy and escalate where appropriate (DCE-
team 
ECD, People Manager or Talent) 
 
Talent 
•  Supports the management breaches in relation to Code of Conduct or 
Discipline Policy 
3rd 
Internal Audit  •  Performs  periodic  audit  activities  intended  to  assess  and/or  provide 
Line 
(and external 
insights  into  (among  other  things)  compliance  with  the  Policy  and  the 
providers) 
adequacy  and  effectiveness  of  the  Group’s  practices  to  monitor 
 
compliance and deal with breaches.  

 
  Reports  to  the  Executive  and  the  Board  on  the  outcomes  of  such 
activities.  
 
1 The “Policy Breach Template” can be used for this purpose but is not mandatory. 
 
Accident Compensation Corporation 
Page 6 of 8 

GOV-027692 Appendix
2 February 2023 
 
2 February 2021 
LOA 
Role 
Monitoring & Oversight 
4th 
Executive 
•  Ensures each Group has sufficient emphasis on risk management and 
Line 
meeting compliance obligations. 

 
  Ensures  effective  processes  and  monitoring  are  in  place  to  meet 
compliance obligations for the Policy.  
 
•  Acts in an appropriate and timely manner in response to reports received 
that  alert  the  Executive  to  opportunities  to  improve  Policy  compliance 
activities.   
5th 
Board 
•  Responsible for approving any material changes to the level 1 Policies, 
Line 
including text related to monitoring and oversight of compliance with the 
Policy. 
 
•  Acts in an appropriate and timely manner in response to reports received 
 
that  alert  the  Board  to  opportunities  to  improve  Policy  compliance 
activities.  
 
7  Breaches of Policy 
Compliance with all policies and procedures is required under ACC’s Code of Conduct. Behaviour 
or  actions  that  are  investigated  and  found  to  be  in  breach  of  the  Code  of  Conduct  may  result  in 
disciplinary action. Refer to Code of Conduct for further information. 
Deliberate  non-compliance  or  circumventing  of  the  requirements  of  this  policy  is  deemed  to  be 
serious misconduct. 
8  Contacts 
Report any lost/stolen ACC owned mobile devices to the IT Service Desk as soon as possible.  For 
general policy queries, contact Digital Workspace team or Information Security, [email address].  
 
9  Definitions 
Telephony 
Telephony is the field of technology involving the development, application, 
and deployment of telecommunication services for the purpose of electronic 
transmission of voice, fax, or data, between distant parties.  
“Telephony” has been used as a proxy for all voice communications. 
Bring Your Own Device  The use of personally owned telephony devices for ACC business purposes. 
or BYOD 
Modern Device 
Modern Device Management is a set of tools and processes that allow us to 
Management (MDM) 
work flexibly on various corporate and personal devices.  For the purposes 
of this policy MDM also includes Mobile Application Management (MAM) and 
associated technologies. 
Mobile device 
A  portable  telephony  device  that  can  be  used  for  voice  communications 
outside of  an  ACC  office  or  network.    For  the  purposes of  the  ACC  MDM 
solution – any telephonic device that has a SIM card and can independently 
connect to the internet or a mobile network is considered a mobile device. 
 
 
Accident Compensation Corporation 
Page 7 of 8 

GOV-027692 Appendix
2 February 2023 
 
2 February 2021 
10  References 
Information Management Policy 
Information Management Standards 
Information Security Policy 
Information Security Standards 
Code of Conduct 
Privacy Policy 
Cloud Computing Policy 
Copyright Policy 
Use of the Internet Policy 
BYOD Policy 
ACC Modern Device Standards 
Mobile Device Reasonable Usage Guidelines 
11  Version Control    
Version 
Date 
Change reason 
Who  
[Out of Scope]
0.1 
08/01/19 
Draft added to template 
0.2 
10/01/19 
2nd draft after feedback from focus group 
0.3 
 25/03/19  Update with feedback 
0.4 
26/06/20 
Reviewed  and  updated  document  –  resolved 
outstanding comments 
0.5 
27/08/20 
Updated template and standardised the 5 LOA 
1.0 
02/02/21 
Updated  group  name  to  Technology  & 
Innovation 
Final  
1.1 
26/10/22 
Updated roles to reflect organisational structure 
changes 
  
 
 
 
Accident Compensation Corporation 
Page 8 of 8