Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
|
|
- Jocelyn Pitts
- 8 years ago
- Views:
Transcription
1 Report to: Cabinet Date: 14 th October Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the next few years it will be used by increasingly larger numbers of employees for the management and delivery of services and for communicating with the public. This Policy recognises the requirement to gain the maximum benefits from new technology whilst maintaining security, legality, avoiding abuse and protecting the good name of the Authority. The purpose of the Policy is to highlight the procedures to be adopted when using the Internet. It applies to all employees and elected members carrying out work on behalf of the Council and/or using Council owned equipment and facilities. Consultation on the revised Policy has taken place with the trade unions, Corporate Directors and Heads of Service. Specialist input was also received from the Legal, I.T and Audit Departments. It was also considered and received the support of CMT on 14 TH September Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Background Papers. Environmental Statement. Community Safety Implications Personnel Implications. Financial Implications. Human Rights Act. 1) I.T. Strategy Document 2) Disciplinary Policy. 3) Data Protection Act ) Data Protection Code on Monitoring at Work (Part 3) 5) The Regulation of Investigatory Powers Act 2000 (R.I.P.A.). 6) Personnel Today One Stop Guide: Employee Monitoring. 7) Internet Policy. This Report does not contravene the Council s Agenda 21 policies. None. As described in the Policy. None. This report and the attached Policy have been audited for potential breaches of Articles in the European Convention on Human Rights. Any breach or breaches are included in the report itself or in the Policy. conwy/pmd/internet/cab Page 1 07/10/2004
2 abcde INTERNET POLICY Corporate Personnel Services 3rd Draft July 2004
3 USE OF INTERNET POLICY INDEX 1. Policy Statement 2. The purpose of the Policy 3. Applicability 4. Connection and access to the Internet 5. Publication on the Internet 6. Use of the Internet 7. Misuse of the Internet 8. Monitoring 9. Virus Protection and Downloading 10. Security 11. The Human Rights Act 12. Good Practice Guide 13. Review 2
4 1. POLICY STATEMENT 1.1 The use of the Internet is growing rapidly. Over the next few years it will be used by increasingly large numbers of employees for the management and delivery of services and for communicating with the public and third parties. As such, the Authority is keeping pace with these developments so that employees and the Authority can fully exploit these facilities. 1.2 This policy applies to the use of the Internet only. 2. THE PURPOSE OF THE POLICY 2.1 This policy recognises the requirement to gain the maximum benefits from new technology whilst maintaining security, legality, avoiding abuse and protecting the good name of the Authority. 2.2 The purpose of this policy is to highlight the procedures to be adopted when using the Internet. 3. APPLICABILITY 3.1 This policy applies to all employees (for the purpose of this policy employees includes agency workers) and elected members carrying out work on behalf of the Council and/or using Council owned equipment and facilities. Whether working from the office, home or any other remote site from which the Council conducts its business and operation. 4. PUBLICATION ON THE INTERNET 4.1 The Council s Web-sites Policy includes the following statements; Conwy County Borough Council is committed to the core strategic role of the websites as channels of communication both externally and internally. In order to achieve this, the websites should be fully owned by the whole Council at all levels and across all services. The Authority seeks to establish and maintain the websites as a reliable repository for information, to be exploited both as a communications channel and a means of delivering services 5. CONNECTION AND ACCESS TO THE INTERNET 5.1 The ability to connect to the Internet must be authorised by the appropriate Director, Head of Service, or nominated person, who will provide details of employees within their department who can use the facility. He /she must also sign the enrolment form for submission to the IT section. 3
5 5.2 A standard level of access will be granted. If a differing level is required the Director or Head of Service must liaise with the IT and Audit sections. 5.3 Each employee or member granted access to the Internet must be issued with a copy of this policy and provide acknowledgement that it has been received by signing the enrolment form. 5.4 The Internet connection will normally be via the Authority s corporate network, with its firewall facility to ensure that maximum control and protection are achieved. Access to the internet via independent ISPs is prohibited unless approved by the Departmental Head of Service and the IT Department, for example, a presentation or meeting in the course of work outside Council premises at which an ISP will be used with permission. 5.5 All users will be provided with their own user identification with a system of password control used to access the system. 5.6 When given access to the Internet the individual is responsible for the security of their own workstation and Internet facility. Personal passwords should be kept confidential and not be shared. Users should not use any remember password type features. 6. USE OF THE INTERNET 6.1 Use of the Internet is for business purposes, however personal use is permitted but must be outside of core working hours as follows : Between the hours of am Between the hours of pm Between the hours of pm No personal use of the Internet should therefore take place during core working hours. Accessing the Internet for non-work related purposes must be done in the employee s own time. For example, if an individual arrives at work at am and accesses the Internet for non-work related purposes for thirty minutes, the time recorded as commencing work should be am. The only exception is for designated public access points in libraries and certain offices. 6.2 Allowing personal use represents a change in the policy previously adopted by the Authority. This will be on a trial basis for six months from the launch date of this policy. 6.3 Departmental Managers are to supervise the use of the Internet, regularly reviewing the need for users to have access and / or which other officers require access. Access should be revoked when people leave the Authority via the completion of a system access withdrawal form. 4
6 7. MISUSE OF THE INTERNET 7.1 Misuse of the Internet and any associated Information Technology includes - Creating, sending, encouraging the receipt of, printing or downloading material which can be construed to be derogatory, defamatory, obscene or pornographic, offensive, or anything that may be construed as harassment or disparagement based on race, colour, national origin, sex, sexual orientation, age, disability, or religious or political beliefs. Unauthorised access of the Authority s IT facilities. Expressing personal views which could be misinterpreted as those of the Authority. Committing the Authority to purchasing or acquiring goods of services without proper authorisation. Disclosing confidential information via Internet mechanisms such as and news groups. Sending or participating in chain letters, pyramid schemes or illegal schemes, or to solicit others for commercial purposes, causes, outside organisations, chain messages, or other non job-related purposes. Encrypting files or taking any steps that block access to files, other than the use of Authority passwords or approved programmes; without the permission of the IT Department. Installing software on a computer in an attempt to erase records of Internet activity. Downloading software applications without prior approval of the IT department. 7.2 This is not an exhaustive list but is an indication of the types of conduct that could result in the Internet facility being withdrawn and the implementation of the Disciplinary procedure where necessary. If illegal material is involved, or the law is broken, this could also lead to criminal or civil action. 7.3 The Disciplinary Policy makes explicit reference as follows : Misconduct Section 2.5 ( C ) Improper use of working hours, Council equipment or facilities Gross Misconduct Section 3.23 ( 1 ) Accessing inappropriate material from the Internet for personal use (includes transmission of material to others and encouraging/failing to discourage the transmission of material to the employee from others) 7.4 It is possible to access offensive or inappropriate material on the Internet accidentally. Anyone doing so should inform his/her Line Manager immediately. 5
7 Accidental access will obviously not invoke the disciplinary procedure; but failure to report it may do so. 7.5 In order to improve reporting procedures, an e mail address itsecurityincidents@conwy.gov.uk has been set-up for staff to record details of a suspected or actual IT security incident and send it directly to internal audit and IT management for information/investigation. 8. MONITORING 8.1 Use of the Internet will be monitored by the Authority in any way it sees fit including real time or other regular monitoring of activity to include web-pages accessed or attempted to access, words searched for, files downloaded, graphic images viewed. No individual should expect privacy when using the Internet. In addition the Authority may restrict access to certain sites that it deems are not necessary for business purposes, by means of filtering software. 8.2 If users are regularly getting challenged when seeking to access a web-site for business related purposes then they should contact the IT Department to address the issue. 9. VIRUS PROTECTION AND DOWNLOADING 9.1 Software must not be downloaded from the Internet unless a prior agreement has been reached with the IT department. This could introduce a computer virus on to the Authority s network or be incompatible with the current PC set up and impact on other IT applications. Downloading software could also be introducing incompliance with software licensing rules. 9.2 The unauthorised downloading of software will lead to the implementation of the Disciplinary procedure where necessary. Explicit reference is made in the policy as follows : Misconduct, Section 2.6 Introducing software into the computer system which is not required for the purpose of the Authority s business. Gross Misconduct, Section 3.23 (3) Section 3.23 (4) Using unauthorised, pirated software Wilfully and knowingly introducing a virus into the system, or failure to conduct a virus check on software originating outside the Authority before introducing to the Authority s system. 6
8 9.3 Computer viruses can be transferred by files and attachments, thus threatening the security of the Council s networks. Consequently, files must not be downloaded or accepted from sources or sites which are not well-established and known to the Authority i.e a trusted source. 9.4 All software purchased must be made via the IT department. Anyone wishing to acquire software must be aware of the differences between : copyright software, which requires payment for a licence to use it; freeware, which is licensed and requires no payment; shareware, which is copyrighted but often free for a trial period; and public domain software, which is free. 9.5 The downloading and disseminating of copyright material that is available on the Internet is an infringement of copyright law. Likewise, the posting of copyright material from any Internet source to the Authority s network is an infringement of copyright law. Permission to copy the material must be obtained from the owner, publisher, or any other person entitled by the owner to give such permission. This applies to publications in digital and electronic form in the same way as it does to books and other forms of publication. 9.6 The downloading of files and documents is permissible, for example,.pdf or MS Office format files, provided the content of such files and documents is appropriate. 10. SECURITY 10.1 When given access to the Internet the individual is responsible for the security of their own workstation and Internet facility. Personal passwords should not be shared, but should be kept confidential and changed regularly. When leaving the workstation unattended or on leaving the office, individuals should ensure that they log off the system to prevent unauthorised use in their absence. There are mechanisms in place to temporarily secure the PC for this purpose Employees and members will be accountable for all activities undertaken under their password. Unauthorised use of a password will be dealt with within the framework of the Authority s Disciplinary Procedure Anyone receiving offensive or suspicious material which may be a threat to the security of the Council s network and / or data must report the matter to their Line Manager immediately. The purpose is not to apportion blame but for the Line Manager, with the assistance of the IT department, to investigate and take appropriate action so as to reduce risk. 11 THE HUMAN RIGHTS ACT This policy does not contravene the Human Rights Act. 7
9 12. GOOD PRACTICE GUIDE 12.1 The following bullet points indicate several areas of good practice which should be adopted across the Authority as a general guide : Use the Internet for non-work related purposes in own time. Use only GOOGLE search engine on the Internet to prevent unnecessary advertising being accessed ( Never connect to the Internet directly by using independent Internet service providers such as Freeserve, Demon, AOL etc. Do not unnecessarily give details of your account on the Internet.. Do not express personal views on the Internet that could be misinterpreted as those of the Authority. When a personal opinion is being voiced a disclaimer should be used. Do check that the information you access is accurate and current. Report any offensive or suspicious material that may be a threat to the Council s security to your Line Manager immediately Individuals who feel that they may benefit from further training on using the Internet should first contact their Line Manager and then the Corporate Training and Development Officer in Corporate Personnel Services at Bodlondeb. 13. REVIEW 13.1 This policy will be reviewed jointly with the Trade Unions three years after its implementation, or earlier if monitoring indicates that amendments are required and / or there are changes in legislation which impact upon its contents. 8
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
More informationTONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE
GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving
More informationHuman Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
More informationInformation Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationInformation Systems Acceptable Use Policy for Learners
Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs
More informationInternet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
More information2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:
POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,
More informationICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
More informationSt. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
More informationPasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
More informationInternet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
More informationEMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
More informationCOMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
More informationTITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY
TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY Council Resolution No 313/03 adopted at the Ordinary Meeting of Council on 19 August 2003. PURPOSE
More informationTechnology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
More informationDene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
More informationMedford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
More informationComputer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
More informationICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
More information------------------- COMPUTER NETWORK AGREEMENT FORM
COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.
More informationELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
More informationUse of the Internet and E-Mail Policy
Use of the Internet and E-Mail Policy This procedural documentsupersedes : Use of the Internet and E-Mail Policy CORP/EMP 16 v.4 Name and title of author/reviewer Samantha Francis HR Advisor Date revised
More informationSheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
More informationTameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
More informationPOLICY ON USE OF INTERNET AND EMAIL
POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic
More informationACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
More informationINTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
More informationBerwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationAcceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
More informationINTERNET AND EMAIL POLICY
Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy
More informationAcceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
More informationPolicy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationData Protection Division Guidance Note Number 10/08
Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008
More informationEMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards
EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data
More informationSOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
More informationSTRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
More informationEmail & Internet Policy
Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible
More informationEmail Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
More informationAcceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
More informationAPPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES
APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,
More informationOther Review Dates: 15 July 2010, 20 October 2011
POLICY:- Policy Title: Mobile Telephone Policy File reference: F10/618-04 Date Policy was adopted by Council initially: 18 December 2008 Resolution Number: 404/08 Other Review Dates: 15 July 2010, 20 October
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More information13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
More informationElectronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
More informationUSE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
More informationHUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
More informationInformation Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
More informationBring Your Own Device Program: User Charter
Bring Your Own Device Program: User Charter Turramurra High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. The wireless network and
More informationInformation & Communications Technology Usage Policy Olive AP Academy - Thurrock
Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures
More informationInstruction. Neoga Community Unit School District #3 Page 1 of 5
Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each
More informationDevelopment / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
More informationStrathfield Girls High School Bring your Own Device User Charter
Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.
More informationVentura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
More informationEmail, Internet & Telephone. Policy and Procedure
A Email, Internet & Telephone Policy and Procedure MAYLIM LTD Civil Engineering & Hard Landscaping Contractors 50 52 Wharf Road, G 04 The Wenlock, Islington, London N1 7EU Tel: +44(0)207 785 6996 Fax:
More informationSydney Technical High School
Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of
More informationSummary Electronic Information Security Policy
University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture
More informationAcceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
More informationForbes Shire Council Internet Access Policy
Forbes Shire Council Forbes Shire Council Internet Access Policy Policy No IT/001 Date approved 17 August 2006 Authority Information Technology Services Contact Officer Brian Clarke Revision History Version
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More informationDigital Device LOAN CHARTER
Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to
More informationHow To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
More informationEmbedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
More informationStudent Laptop User Charter
Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both
More informationSample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
More informationBring Your Own Device Program: 2015 User Agreement
Bring Your Own Device Program: 2015 User Agreement Asquith Girls High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. Asquith Girls High
More informationConditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
More informationAcceptable Use of Information. and Communication Systems Policy
Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,
More informationElectronic Communications and. Guidance note and template policy
Electronic Communications and Internet policy Guidance note and template policy When employing staff it is useful to create a policy which sets out your standards and requirements of your staff when they
More informationEmail Services Policy
Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages
More informationWORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
More informationINTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
More informationAPPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
More informationSOCIAL MEDIA POLICY. Introduction
Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes
More informationAssistant Director of Facilities
Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment
More informationAPPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE
TITLE: COMPUTER USE POLICY PAGE 1 OF 5 EFFECTIVE DATE: 07/2001 REVIEW DATES: 02/2003, 09/2006 REVISION DATES: 03/2005, 03/2008 DISTRIBUTION: All Departments PURPOSE APPROVED BY: Signatures on File Chief
More informationChatham County Schools Network Acceptable Use Policy Agreement Policy and Forms 3225/7320
ACCEPTABLE USE OF VOICE, VIDEO AND DATA NETWORK Policy Code: 3225/7320 Chatham County Schools offers electronic network access for students, teachers, and staff within the school system. A component of
More informationTHE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES
THE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES In summary the telephone, fax, E-mail and Internet should NOT be used: For personal gain or profit. To represent yourself as someone else. To send, post,
More informationLOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
More informationPierce County Policy on Computer Use and Information Systems
Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail
More informationSenior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES
Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the
More informationRevelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
More informationTelephone Acceptable Use Policy (ISP05)
Telephone Acceptable Use Policy (ISP05) Issue Date: December 2014 Version 3 Document Control 3 1. Policy Statement 4 2. Introduction 4 3. Responsibilities 4 4. Breach of Policy 5 5. Service Standards:
More informationACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +
More informationPOLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.
More informationWest Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011
West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer
More informationCellular/Smart Phone Use Procedure
Number 1. Purpose This procedure is performed as a means of ensuring the safe and efficient use of cell/smart phones throughout West Coast District Health Board (WCDHB) facilities. 2. Application This
More information2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
More informationUNESCO-IHE Code of Conduct regarding Information Technology (IT)
UNESCO-IHE Code of Conduct regarding Information Technology (IT) Introduction The use of computers within all the domains of UNESCO-IHE (education, research, administration, projects and marketing & communications)
More informationMARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
More informationDIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
More informationAdvice leaflet Internet and e-mail policies
Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.
More informationUsing Public Computer Services in Somerset Libraries
Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which
More informationPOLICY. Responsible Use of Social Media
POLICY Responsible Use of Social Media Contact Officer Director of Personnel Director of Communications & Participation Senior Project Manager: Corporate Policies (Policy author) Purpose The primary aims
More informationLa Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy
LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology
More informationStudents are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
More informationDauphin County Technical School
Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,
More information