RIPA (Regulations and Investigatory Powers Act)
|
|
- Morgan Perkins
- 8 years ago
- Views:
Transcription
1 Dartmoor National Park Authority INTERNET MONITORING POLICY & INVESTIGATION PROTOCOL Approved: February 2010 Review Date: September Introduction Private use of the computer facilities is covered by other policies, (Computer Security Policy and Internet Code of Practice). This policy is provided to assist management with its approach to determining what constitutes misuse and provides guidance with investigation procedures and protocols to ensure a consistent approach is taken in dealing with potential misuse. Internet Monitoring Policy & Investigation Protocol There are a number of pieces of legislation which determine what can and cannot be undertaken when monitoring Internet and activity. These include: Data Protection Act 1998 Freedom of Information Act 2000 Human Rights Act RIPA (Regulations and Investigatory Powers Act) Law Business Practices Regulations. Computer Misuse Act 1990 Monitoring logs will be retained for a period of 93 days and will be used for the purpose of sample testing user activity on the Internet. 2. Procedures Monitoring of Internet activity will be undertaken by the Head of ICT. It is also the responsibility of managers who suspect their staff of inappropriate use to request the ICT Team to undertake an analysis of the member of staff s activities. Where misuse of the internet is suspected, it should be confirmed and then classified as one of the five levels detailed in this document. Management should then take the following action according to the level of misuse. Steps will be taken in the monitoring process to determine whether activity is as a result of the employee s action of typing a URL address, searching or as a result of automatic updates to web pages where the page is left open in the background.
2 Evidence should be maintained of all issues raised with employees and management at what ever level to provide support in the case of challenge by any employee. As part of the monitoring process any potential misuse should be ratified by reference to the employees working hours and the time recording entries where possible. Where an employee has previously been warned about their use of the Internet additional monitoring will be undertaken on that employees activity. A monthly review of 3 days activity will be evaluated. 3. Definition of Misuse Level 5 1. Viewing or searching for inappropriate images of children and/or paedophile activity, including visiting sites, posting, downloading and saving images. 2. Intentionally visiting web sites containing illegal content, which results in the employee breaking the law 3. Knowingly posting viruses to web pages. 4. Hacking or attempting to hack web sites. 5. Attempting to defraud by use of the Internet or computer system. In all cases above (apart from item 1 which should be reported to the police without delay) police involvement should only be with the agreement of a Director and after consultation with the Head of Legal & Democratic Services / Assistant Solicitor. Level 4 1. Viewing or searching for inappropriate web sites, including visiting sites, downloading and saving images, whether in the employee's own time or business time [for the purposes of this clause "inappropriate" shall include but not be limited to pornography, racism, hate crime etc] 2. Consistently spending more than 3% of their working time each week on nonbusiness related Internet use (for full time employees this equates to 60 minutes). [for the purposes of this clause consistently shall mean for two or more consecutive weeks] 3. Contributing to a web site or social networking site comments which are potentially harmful to the organisation.
3 Level 3 Level 2 Level 1 Consistently spending more than a total of 10 minutes a day of working time on non-business related internet use. [for the purposes of this clause consistently shall mean on five or more working days in any 10 day period] Spending more than a total of 5 minutes in a day during working time on nonbusiness related internet use Spending up to a total of 5 minutes in a day during working time on non-business related internet use. NB for the purposes of this clause, spending a total period of 2 minutes or less on a day shall be disregarded For all of the above, the matter may be considered more serious and dealt with at a higher Level if there is repeated activity and action has previously been instigated and recorded on the employee s personnel file. 4. Procedures for dealing with suspected misuse Level 1 Misuse (least serious) The Head of ICT should ask the employee to confirm in writing that their use of specified web sites is for legitimate business reasons. If there is any doubt about the explanation provided, the Head of ICT will inform the employee s line manager. Level 2 Misuse The Head of ICT will inform the employee s line manager of the suspicions of misuse. They will also be provided with date and times and details of site names visited.
4 Level 3 Misuse The Head of ICT will inform the employee s line manager and appropriate Director of the suspicions of misuse. They will also be provided with date and times and details of site names visited. If the misuse has taken place after a previous warning under this policy, consideration should be given as to whether disciplinary action is necessary and this will need to be undertaken in accordance with HR policies. Where Internet access is not required as part of the employee's day to day job, the line manager, in consultation with the Head of ICT and Head of HR, should also consider whether Internet access should be withdrawn for a defined period of time. NB: in any of the above, the Head of ICT must be informed of the outcome of any investigation for future internet monitoring purposes. Level 4 Misuse The Head of ICT will inform the employee s line manager of the suspicions of misuse. They will also be provided with date and times and details of site names visited. The relevant Director must also be informed. Consideration should be given to the suspension of the member of staff from Internet access during which time an extended analysis of Internet usage may be undertaken using the three months of data available within the monitoring logs. If necessary computer forensic analysis can be obtained from Devon Audit Partnership to support the evidence identified in Internet log files. This facility ensures that the investigation does not change any data on the hard drive of the user s computer. The line manager or other senior officer designated by the relevant Director shall, in consultation with the Head of ICT, investigate the circumstances of the suspected misuse and establish whether it appears there has been misuse within the meaning of this policy. If misuse is admitted or established, consideration should be given as to whether formal disciplinary action is necessary and this will need to be undertaken in accordance with HR policies. Level 5 Misuse (most severe) If it appears that misuse has occurred which may amount to a criminal offence, a Director shall be informed as a matter of urgency. The Director, in consultation with the Head of Legal & Democratic Services / Assistant Solicitor and the Head of ICT shall make arrangements for the police to be informed without delay. If it is believed that the misuse is so serious that it may amount to gross misconduct, the Director in consultation with the Head of HR shall make arrangements for the suspension of the employee, pending a disciplinary investigation.
5 If a police investigation does not take place, the relevant Director shall appoint a senior office to investigate, in consultation with the Head of ICT, the circumstances of the suspected misuse and establish whether there appears to have been misuse within the meaning of this policy. If misuse is admitted or established, formal disciplinary action shall be undertaken in accordance with HR policies. NB: if any investigation reveals inappropriate images of children and/or possible paedophile activity the investigation must be halted immediately and the matter reported to the Police. If further investigation is undertaken after the discovery of inappropriate images of this nature the person investigating runs the risk of prosecution.
U 16 Internet Monitoring Policy & Investigation Protocol
Dartmoor National Park Authority U 16 Internet Monitoring Policy & Investigation Protocol February 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted
More informationSTFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
More informationMonitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
More informationPS 172 Protective Monitoring Policy
PS 172 Protective Monitoring Policy January 2014 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010;
More informationTONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE
GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationSEN15-P69b 24 June 2015. University Ordinances
SEN15-P69b 24 June 2015 University Ordinances Ordinance XXXV Staff Disciplinary Policy and Procedure (Version effective from 27 November 2014) This ordinance shall apply to all staff to whom paragraph
More informationNewcastle University disciplinary procedure
Newcastle University disciplinary procedure Contents 1. INTRODUCTION... 1 2. RIGHT OF REPRESENTATION... 3 3. TRADE UNION REPRESENTATIVES... 3 4. SCHEDULING OF FORMAL MEETINGS AND APPEALS... 3 5. INVESTIGATION...
More informationINTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
More informationThe South Yorkshire County Trading Administration Safety Project
1 Purpose 1.1 The purpose of this procedure is to outline how settings where children and young people have access to the internet and other forms of technology should respond when there are breaches of
More informationINFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
More informationE-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school.
E-Safety Policy Development / Monitoring / Review of the policy This policy applies to all members of the school (including staff, students / pupils, volunteers, parents / carers, visitors, community users)
More informationDevelopment / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
More informationInternet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
More informationSaint Martin s Catholic Academy
Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin
More informationThis procedure applies where formal disciplinary action is commenced on or after 11 December 2013
Appendix X Disciplinary Procedure This procedure applies where formal disciplinary action is commenced on or after 11 December 2013 1 Purpose 1.1 This procedure is designed to help and encourage all employees
More informationWotton-under-Edge Town Council
Wotton-under-Edge Town Council Disciplinary Procedure Adopted March 2015 1. PROCEDURE This procedure is designed to help and encourage all council employees to achieve and maintain high standards of conduct
More informationSouth Ayrshire Council. Report by Head of HR and Organisational Development to Leadership Panel of 19 April 2011
South Ayrshire Council Agenda Item No. 3 (2) (k) Report by Head of HR and Organisational Development to Leadership Panel of 19 April 2011 Subject: Disciplinary Procedures 1. Purpose 1.1 The purpose of
More informationInformation & ICT Security Policy Framework
Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January
More informationThe Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
More informationLOCAL DISCIPLINARY PROCEDURE
LOCAL DISCIPLINARY PROCEDURE 1 2 LOCAL DISCIPLINARY PROCEDURE 1. Introduction... 4 2. Aims and objectives... 4 3. The procedure... 4 4. Officers responsible for taking disciplinary action are as follows...
More informationPersonal use of computers
Personal use of computers Personal Use In addition to the internal mail system, ICO staff have direct access to the Internet and external email from their IT equipment. This statement of the Commissioner
More informationDisciplinary policy INTRODUCTION
Disciplinary policy This policy forms part of your contract of employment. The councils are entitled to introduce minor and non-fundamental changes to this policy by notifying you of these changes in writing
More informationWest Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011
West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer
More informationDisciplinary and Dismissals Policy
Policy Purpose/statement/reason for being Disciplinary and Dismissals Policy E.G - MIP is designed to strengthen the effectiveness of individual s contribution to the Council s success. Purpose The Disciplinary
More informationRESEARCH COUNCIL DISCIPLINARY POLICY
Management Guidance This document provides additional guidance for managers, employees and HR in the handling of disciplinary issues. It includes the Research Council s Disciplinary policy and procedure
More informationDISCIPLINARY POLICY AND PROCEDURE
DISCIPLINARY POLICY AND PROCEDURE Content Policy statement 1. Principles 2. Standards 3. Disciplinary procedure 4. Investigation
More informationCaedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
More information3. MISCONDUCT and GROSS MISCONDUCT The following list provides examples of misconduct which will normally give rise to formal disciplinary action:
WISBOROUGH GREEN PARISH COUNCIL DISCIPLINARY PROCEDURE 1. PURPOSE AND SCOPE This procedure is designed to help and encourage all council employees to achieve and maintain high standards of conduct whilst
More informationPROCEDURE Police Staff Discipline. Number: C 0901 Date Published: 9 May 2013
1.0 Summary of Changes Amendments to the 1 st bullet point of section 4.5 and the 3 rd, 4 th, 6 th and 7 th bullet point in section 4.8 have been made. Section 4.9 has been removed as the content is now
More informationcircumstances where this may interfere with the discharge of your employment duties or the good reputation of Audit Scotland.
Introduction Discipline Policy Owned & maintained by: Date checked/ Created: Next review date: Human Resources January 2014 July 2015 Introduction 1. The professionalism and integrity displayed by our
More informationVersion: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
More informationBARNTON PARISH COUNCIL (BPC)
Policy Title: Disciplinary & Grievance Policy Ref: BPC 008 Author: Philip Miskel Evoy & Lynn Gibbon Date: January 2013 Version 2 Review Date: January 2014 Introduction This policy is designed to ensure
More informationSCHOOLS FRAUD RESPONSE PLAN
SCHOOLS FRAUD RESPONSE PLAN Author Jean Gleave, Chief Internal Auditor Date Last Agreed May 2012 Review Date May 2014 1 WARRINGTON BOROUGH COUNCIL SCHOOLS FRAUD RESPONSE PLAN Introduction The purpose of
More informationOratory R.C. Primary and Nursery School. Shine as to be a light to others E-SAFETY POLICY
Oratory R.C. Primary and Nursery School Shine as to be a light to others E-SAFETY POLICY Reviewed by Safeguarding, Health and Safety and Premises Committee: 1.10.14 Approved by the Governing Body: 15.10.14
More informationStaff Investigation Protocol
Version: 3.0 Document author(s): Stuart Selkirk Approved by: Executive Partnership Forum Date approved: 17 July 2014 Review date: 30 September 2016 Document scope: Trust-wide Version History Log Use this
More informationWEST MIDLANDS POLICE Force Policy Document
WEST MIDLANDS POLICE Force Policy Document POLICY TITLE: POLICY REFERENCE NO: POLICE STAFF DISCIPLINARY PROCEDURE HR/06 Executive Summary The Force expects certain standards of conduct to be maintained
More informationInternet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014
Internet Acceptable Use Policy A council-wide information management policy Version 1.5 June 2014 Copyright Notification Copyright London Borough of Islington 20134This document is distributed under the
More informationICT Acceptable use Policy. Coláiste Mhuirlinne/ Merlin College Doughiska, Galway City.
ICT Acceptable use Policy. Coláiste Mhuirlinne/ Doughiska, Galway City. Ratified by the Board of Management on 27 th May, 2015 Table of Contents Introduction... 2 General... 2 Internet Use... 3 Email...
More informationAcceptable Use of Information. and Communication Systems Policy
Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,
More informationNEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE
1. Scope and Purpose NEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE 1.1 Newman University [hereafter referred to as the University] recognises disciplinary rules and procedures are necessary for the
More informationElectronic Communications Monitoring Policy
Electronic Communications Monitoring Policy Printed copies should not be considered the definitive version DOCUMENT CONTROL POLICY NO. 79 Policy Group Information Governance and Security Author Andrew
More informationPOLICY ON USE OF INTERNET AND EMAIL
POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic
More informationInformation Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
More informationInformation Governance Framework. June 2015
Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review
More informationINFORMATION SECURITY POLICY
Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies
More informationHuman Resources Author: Lou Hassen Version: 1 Review Date: Dec 2012 Page 1 of 7. Trinity Academy Disciplinary Policy
Page 1 of 7 Trinity Academy Disciplinary Policy Policy Statement The purpose of the Disciplinary Procedure is to give staff members every opportunity to improve standards of behaviour and conduct and to
More informationStudents KS2-3 Acceptable Use Policy
Students KS2-3 Acceptable Use Policy Page 1 of 5 LITTLEGREEN SCHOOL Student Acceptable Use Policy Pupil access to the school network and Moodle is a privilege, not a right. All pupils must follow the conditions
More informationTECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
More informationE-Safety Policy & Procedures
E-Safety Policy & Procedures Version Policy Originator: Equality Impact Assessed: Approved by: SMT Date Approved: April 2015 Review Interval: Annually Last Review Date: - Next Review Date: April 2016 Audience:
More informationHow To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
More informationPOLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent
More information1. INTRODUCTION... 1 2. SCOPE... 1 3. ROLES AND RESPONSIBILITIES... 2 4. REPRESENTATION... 3 5. INVESTIGATIONS... 3 6. SUSPENSION...
The Skinners School Staff Disciplinary (Misconduct) Policy CONTENTS PAGE NO 1. INTRODUCTION... 1 2. SCOPE... 1 3. ROLES AND RESPONSIBILITIES... 2 4. REPRESENTATION... 3 5. INVESTIGATIONS... 3 6. SUSPENSION...
More informationRecommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
More informationWELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY
WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within
More informationRoles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
More informationDisciplinary Policy and Procedure
Disciplinary Policy and Procedure Policy 1. Purpose of the policy and procedure Disciplinary rules are important for the running of the University so that everyone understands what is expected of them
More informationDene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
More informationE-Safety Policy. Please read this policy in conjunction with the policies listed below:
E-Safety Policy Policy Code: ICT2 Policy Start Date: July 2015 Policy Review Date: September 2015 Please read this policy in conjunction with the policies listed below: SW5 Safeguarding and Child Protection
More informationPolicy for Management of CCTV on Waste Operation Vehicles
Policy for Management of CCTV on Waste Operation Vehicles 1.0 POLICY 1.1 CCTV cameras are fitted to refuse vehicles for the purposes of Health and Safety of employees and members of the public, and for
More informationDISCIPLINARY PROCEDURE
DISCIPLINARY PROCEDURE This procedure accompanies Woking Mind disciplinary policy Document History Version Date Drafted by Authorised by Reason for revision This policy was approved on 10/08/2011 and will
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationDISCIPLINARY PROCEDURE TEACHING STAFF
policies updated/ Disc Proc Teach Staff 300512 1. INTRODUCTION DISCIPLINARY PROCEDURE TEACHING STAFF 1.1 Disciplinary rules and procedures are necessary for promoting orderly employment relations as well
More informationIndustrial Accidents - A Review of the Procurement Act, 2005
Protocol to ensure the provision of forensic pathology services in the event of regulatory action taken by the Human Tissue Authority in England and Wales Version: 2.4 Approved by: Last Amendment: 14th
More informationRoskear Primary & Nursery School. E-Safety Policy
E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed
More informationCROWTHORNE PARISH COUNCIL DISCIPLINARY PROCEDURE. Adopted by Council - 5 November 2013. Table of Contents
CROWTHORNE PARISH COUNCIL DISCIPLINARY PROCEDURE Adopted by Council - 5 November 2013 Table of Contents 1 PURPOSE AND SCOPE:... 2 2 PRINCIPLES:... 2 3 THE PROCEDURE FOR MISCONDUCT AND GROSS MISCONDUCT:...
More informationUsing Public Computer Services in Somerset Libraries
Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which
More informationRules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
More informationHow To Use The School Network Safely
Policy Document Information and Communication Technology and E-Safety Acceptable Use Policy Mission Statement The school is committed to the use of ICT across the curriculum and to providing all students
More information2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:
POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,
More informationHow to Monitor Employee Web Browsing and Email Legally
WHITEPAPER: HOW TO MONITOR EMPLOYEE WEB BROWSING AND EMAIL LEGALLY How to Monitor Employee Web Browsing and Email Legally ABSTRACT The Internet and email are indispensable resources in today s business
More informationAcceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
More informationMUSIC, VIDEO AND SOFTWARE PIRACY POLICY
Information Technology Services MUSIC, VIDEO AND SOFTWARE PIRACY POLICY Date approved: 17 March 2005 Date Policy will take effect: 17 March 2005 Date of Next Review: December 2010 Approved by: Custodian
More informationThis policy applies equally to all full time and part time employees on a permanent or fixed-term contract.
Discipline Policy 1. Introduction This policy set outs how Monitor will deal with employee conduct which falls below the expected standard. It is Monitor s aim to use the policy as a means of encouraging
More informationVideo surveillance policy (PUBLIC)
29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security
More informationDRUGS AND ALCOHOL POLICY
DRUGS AND ALCOHOL POLICY Date of last review: April 2015 Review period: 2 years Date of next review: April 2017 Owner: Head of HR Type of policy: Network LGB or Board approval: Board Policy Agreed by Ark
More informationCompliance Toolkit. Protecting Charities from Harm. Chapter 2: Due Diligence, Monitoring and Verification of End Use of Charitable Funds SUMMARY
Compliance Compliance Toolkit Protecting Charities from Harm Chapter 2: Due Diligence, Monitoring and Verification of End Use of Charitable Funds SUMMARY The Charity Commission The Charity Commission is
More informationUlster University Standard Cover Sheet
Ulster University Standard Cover Sheet Document Title IT Monitoring Policy 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information Services
More informationELECTRONIC MAIL (E-MAIL) September 2014. Version 3.1
ELECTRONIC MAIL (E-MAIL) September 2014 Version 3.1 Western Health and Social Care Trust Page 0 of 6 E-mail Policy V3.1 Policy Title ELECTRONIC MAIL (E-MAIL) POLICY Policy Reference Number CORP09/006 Original
More informationTerms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
More informationEmployee Internet Usage February 15, 2007
Employee Internet Usage February 15, 2007 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing Office
More informationHR Services. Employee Handbook. Staff Disciplinary Procedures. 1. Introduction
HR Services Employee Handbook Staff Disciplinary Procedures 1. Introduction 1.1 These disciplinary procedures will apply to all members of staff at UEL (except to staff designated as senior postholders,
More informationPolicy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
More informationTHE UK S ANTI-MONEY LAUNDERING LEGISLATION AND THE DATA PROTECTION ACT 1998 GUIDANCE NOTES FOR THE FINANCIAL SECTOR. April 2002
THE UK S ANTI-MONEY LAUNDERING LEGISLATION AND THE DATA PROTECTION ACT 1998 GUIDANCE NOTES FOR THE FINANCIAL SECTOR April 2002 Introduction 1. This guidance has been prepared by the Government departments
More informationSCOTTISH CHILDREN S REPORTER ADMINISTRATION
Part 1 - Policy for Fraud Prevention, Detection and Investigation 1. Introduction 1.1 SCRA like other public bodies, has a duty to conduct its affairs in a responsible and transparent way and to take into
More informationDEPARTMENT FOR BUSINESS INNOVATION AND SKILLS (BIS) ENGLAND ILLEGAL MONEY LENDING PROJECT
DEPARTMENT FOR BUSINESS INNOVATION AND SKILLS (BIS) ENGLAND ILLEGAL MONEY LENDING PROJECT PROTOCOL FOR ENGLAND ILLEGAL MONEY LENDING SECTION INVESTIGATIONS Interpretation For the purposes of this Protocol
More informationForbes Shire Council Internet Access Policy
Forbes Shire Council Forbes Shire Council Internet Access Policy Policy No IT/001 Date approved 17 August 2006 Authority Information Technology Services Contact Officer Brian Clarke Revision History Version
More informationCorporate Information Security Management Policy
Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification
More informationHousing Benefit & Council Tax Benefit. Fraud Prosecution Policy
Housing Benefit & Council Tax Benefit Fraud Prosecution Policy Policy Updated March 2009 Contents Page Introduction... 1 Policy statement... 1 Procedures and Guidelines... 3 1. Introduction... 3 2. Background...
More informationLocal Disciplinary Policy
DOCUMENT INFORMATION Origination/author: Judith Coslett, Head of Human Resources This document replaces: Local Disciplinary and Dismissal Procedure 05 Date/detail of consultation: Staff Forum and Unison
More informationConditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
More informationThe Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
More informationAPPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
More information33500 POLICY USE OF SOCIAL MEDIA
Version: 1.2 Last Updated: 15/06/15 Review Date: 25/06/18 ECHR Potential Equality Impact Assessment: Low 1. About This Policy 1.1. This policy describes how Hampshire Constabulary s use of social media
More informationOFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy
SECTION OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy 1 Purpose 1 2 Principles 1 3 Telephone Use 2 4 Postal Mail 2 5 Email Use 3 6 Internet Use 3 7 Social
More informationNATIONAL JOINT COUNCIL FOR STAFF IN SIXTH FORM COLLEGES
NATIONAL JOINT COUNCIL FOR STAFF IN SIXTH FORM COLLEGES Disciplinary Procedure 1 1.1 Introduction This procedure provides guidance on disciplinary issues. The procedure is endorsed by the National Joint
More informationDisciplinary and Dismissal Procedure
Disciplinary and Dismissal Procedure Governors Rules These rules are made under Articles 7 and 8 of the Articles of Government. 1. Terms of Reference 1.1. Under Article 8 the procedure for the dismissal
More informationData Breach Management Policy and Procedures for Education and Training Boards
Data Breach Management Policy and Procedures for Education and Training Boards POLICY on DATA BREACHES in SCHOOLS/COLLEGES and OTHER EDUCATION and ADMINISTRATIVE CENTRES UNDER the REMIT of TIPPERARY EDUCATION
More informationSenior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES
Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the
More informationGENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES Version 3.0 17/05/2012 CONTENTS 1. Introduction and Scope... 3 2. Data Protection Act 1998... 4 3. Licence Registration and Prevention of Piracy...
More information