Unless this copy has been taken directly from the Trust intranet site (Pandora) there is no assurance that this is the most up to date version

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Unless this copy has been taken directly from the Trust intranet site (Pandora) there is no assurance that this is the most up to date version"

Transcription

1 Policy No: OP17 Version: 6.0 Name of Policy: Internet, Intranet and Acceptable Use Policy Effective From: 04/08/2015 Date Ratified 04/03/2015 Ratified Health Informatics Assurance Committee Review Date 01/03/2017 Sponsor Director of Finance and Information Expiry Date 03/03/2018 Withdrawn Date Unless this copy has been taken directly from the Trust intranet site (Pandora) there is no assurance that this is the most up to date version This policy supersedes all previous issues Internet, Intranet and Acceptable Use Policy v6

2 Version Control Version Release Author/Reviewer Ratified by/authorised by Date 1.0 Mar 2001 P Dunnigan JCC 21/02/2001 Changes (Please identify page no.) 2.0 May 2004 J Tomlinson TPF Apr Feb 2009 D Prudhoe BSDC Feb Aug 2011 D Prudhoe IG Committee Aug /12/2012 D Prudhoe Health Informatics Assurance Committee /08/2015 D Prudhoe Health Informatics Assurance Committee 07/11/2012 Sections re-written and added throughout the policy in order to incorporate into this policy and minor update to encryption section ( ) 04/03/2015 Reviewed, no changes. Internet, Intranet and Acceptable Use Policy v6 2

3 CONTENTS 1.0 Introduction Rationale Principles Policy Scope Aim of Policy Duties (Roles and Responsibilities) Definitions Intranet, Internet and Acceptable Use Core Principles Intranet and Internet Authorisation Permissible access Non-permissible access Copyright Viruses Internet Service Providers Access Best Practice Legal Issues of Personal Identifiable Information Methods of sending Confidential Information Out of Office Monitoring Administration of Accounts Unused/Obsolete Accounts Confidentiality Disclaimer Training Equality and Diversity Monitoring compliance with the policy Consultation and review Implementation of policy (including raising awareness) Associated documentation Appendix A 12 A.1 Request for Access to the Gateshead Trust Computer Network A.2 & Internet Services - User Code Of Connection Appendix B - Legal Disclaimer Appendix C - List of approved Addresses Internet, Intranet and Acceptable Use Policy v6 3

4 Internet, Intranet and Acceptable Use Policy v6 1.0 INTRODUCTION 1.1 Rationale In common with other NHS organisations, the Trust operates an internal and external facility and access to the Internet through its connection to the N3 network. The N3 network is a virtual private network that operates throughout the NHS and is inaccessible to non-nhs organisations. It provides access to both NHS-specific websites (prefixed nww.) and the world-wide web ( The Trust also provides an intranet that is internal to the Trust and provides access to a wide range of Trust-specific information. This policy sets rules and provides guidance for the use of the Trust Intranet, Internet and facilities. 1.2 Principles The Internet is a fast and effective electronic means of gathering information that can enhance the efficiency and effectiveness of staff in the Trust. The Intranet is a website that is internal to the Trust that provides access to a wide range of Trust-specific information. The facilities exist primarily for the purpose of conducting Trust business but can also be used for limited permitted personal purposes. The Internet provides a wide-ranging source of information and knowledge but offers no guarantee of accuracy, reliability or authenticity. and the Internet are fast and effective electronic means of communicating and gathering information that can enhance the efficiency and effectiveness of staff in the Trust. The Trust will use these facilities to the full (but within available resources and technology) in communicating and cascading information throughout the organisation. Staff are encouraged to familiarise themselves with the facilities and to make use of the Trust s intranet site. carries the same legal status as other written documents and should be used with the same care. allows electronic records of communications over a period of time to be maintained and systematically managed and referenced. The internet and facilities employ complex technology which is not 100% reliable and staff should not rely wholly and solely on them for critical business processes. 2.0 POLICY SCOPE This policy applies to: all full-time and part-time employees of the Trust, and to non-executive directors, contracted third parties (including agency staff), locums, students and trainees, secondees and other staff on temporary placements with the Trust, and staff of partner organisations with approved access; other individuals and agencies who may gain access to data, such as volunteers, visiting professionals or researchers, and companies providing IT services to the Trust. 3.0 AIM OF POLICY This document defines the Intranet, Internet and Policy for Gateshead Health NHS Foundation Trust and Sets out the Trust s policy for the protection of the confidentiality, integrity and availability Internet, Intranet and Acceptable Use Policy v6 4

5 of the system. Establishes the Trust and user responsibilities for the system. Provides reference to documentation relevant to this policy. The purpose of this policy is to ensure the proper use of the Trust s Intranet, Internet and system and make users aware of what the Trust deems as acceptable and unacceptable use of its system. The objective of this policy is to ensure the security of the Trust s system. The Trust will: Ensure Availability Ensure that the Intranet, Internet and system is available for users. Preserve Integrity Protect the Intranet, Internet and system from unauthorised or accidental modification ensuring the accuracy and completeness of the Trust s assets. Preserve Confidentiality Protect assets against unauthorised disclosure. 4.0 DUTIES (ROLES AND RESPONSIBILITIES) The Trust will take all reasonable steps to ensure that users of the Intranet, Internet and service are aware of acceptable use policies and legal obligations relating to the use of . All staff and Non-Executive Directors are obliged to adhere to this policy. It is the responsibility of the individual to ensure that they understand this policy. Managers at all levels are responsible for ensuring that the staff for whom they are responsible are aware of and adhere to this Policy. They are also responsible for ensuring staff are updated in regard to any changes in this Policy. The IT Directory & Security Manager, on behalf of the Chief Executive, will take steps to ensure that all staff adhere to this Policy. A failure to adhere to this Policy may result in disciplinary action. 5.0 DEFINITIONS - A system for sending and receiving messages electronically over a computer network Internet - a vast computer network linking smaller computer networks worldwide. The Internet includes commercial, educational, governmental, and other networks, all of which use the same set of communications protocols. Intranet - a network operating like the internet but having access restricted to a limited group of authorised users usually within a single organisation. N3 Network - a virtual private network that operates within the NHS which provides access to both NHS-specific websites (prefixed nww) and the internet (www). 6.0 INTRANET, INTERNET AND ACCEPTABLE USE 6.1 Core Principles Staff will have access to the intranet and the Internet in accordance with national targets Recognised staff organisations, including Trade Unions, will have access to the Internet and Personal use of the facilities will be limited and within prescribed areas Safeguards will be established to protect the security, integrity and availability of the Trust s systems Internet, Intranet and Acceptable Use Policy v6 5

6 The requirements of relevant Acts of Parliament and mandatory national policies will be observed at all times Staff awareness of copyright and contractual issues will be raised. Guidance on etiquette will be observed Guidance on housekeeping to ensure efficiency in the operation of the network and personal folders will be observed Personal use of should not interfere with work Personal s must also adhere to the guidelines in this policy The forwarding of chain letters, junk mail, jokes and executable programs is not allowed 6.2 Intranet and Internet Authorisation The Head of Service/Head of Department must request an account for a new member of staff by completing a Request for Access to the Gateshead Trust Computer Network form. This form should ideally be submitted prior to the commencement date of the member of staff but should be completed for any member of staff who requires a user account and submitted to the IT department. The Head of Service/Head of Department must ensure that the member of staff has read this policy. In addition, all users are required to complete and sign an & Internet Services - User Code of Connection form. This needs to be submitted to the IT department within 1 week of their starting date. If the IT department has not received the form by this date the account will be disabled and will only be re-enabled on receipt of the Code of Connection form. A copy of both forms can be found at Appendix A Permissible access Access to the Internet is primarily for Healthcare related purposes. That is for NHS work or for professional development and training. Reasonable personal use is permitted provided this does not interfere with the performance of your duties. Personal access to the Internet can be limited or denied by your manager. Staff must act in accordance with their manager s local guidelines. The Trust has the final decision on deciding what constitutes excessive use. The use of the Internet for personal transactions only, such as booking reservations or tickets or the purchase of any goods or services for personal use, is permitted. Employees should regard this facility as a privilege that should not be abused and should normally be exercised in their own time and without detriment to the job. Inappropriate or excessive use may result in disciplinary action and/or removal of facilities. Staff should be aware that Internet access will be subject to monitoring Non-permissible access Access to websites that contain offensive or inappropriate material is strictly forbidden. Offensive or inappropriate material includes hostile text or images relating to gender, ethnicity, race, sex, sexual orientation, instruction on criminal or terrorist skills, promotion of cults, gambling, religious or political convictions, Internet, Intranet and Acceptable Use Policy v6 6

7 6.3 disability or any other material likely to bring the Trust into disrepute. This list is not exhaustive. Downloading of such material is considered a serious breach of Trust security and may result in dismissal or prosecution. Other than instances which demand criminal prosecution, the final arbiter on what is or is not offensive material, or what is or is not permissible access to the Internet will be decided by senior Trust management. However, the Trust notes that access to subjects and sites of a potentially contentious nature may be appropriate in some areas of normal operation and/or in specific circumstances, e.g. sex education, youth advice, counselling on gambling, approved research, etc. The Trust therefore places special responsibilities of care on staff operating in such areas to ensure that such access is necessary and that other users, staff and members of the community are not exposed to any such material without good cause. Staff should not use the Internet to conduct personal transactions in pursuit of their own commercial or business interests nor in such a way as to implicate the Trust in those transactions. If in doubt, staff should consult the IT Directory & Security Manager Copyright Files must not be downloaded from the Internet and used in such a way as to violate copyright laws. Even if downloading is permissible under copyright law, there may be restrictions with regard to copying, forwarding, or otherwise distributing files. Software license agreements should be read and adhered to. Staff must not transmit copyright software from their computer via the Internet Viruses Viruses can damage computer systems, destroy data, cause disruption and incur considerable expense for the Trust. Employees connected to the network must ensure that they have an appropriate virus scanner on their PC and that this is regularly updated (the IT Department will advise). All files downloaded from the Internet must be virus checked before use. Employees must not independently load software onto their PCs (this includes screen-savers). All software installations must be arranged with the IT Department Internet Service Providers Access Internet access must be via the Trust s network in all instances. The use of modems is strictly prohibited and individuals must not independently arrange Internet access direct with a commercial Internet Service Provider. Anyone wishing to open an account must complete the procedure set out in paragraph 6.2 of this policy. Internet, Intranet and Acceptable Use Policy v6 7

8 6.3.2 Best Practice The Trust considers as an important means of communication and recognises the importance of proper content and speedy replies in conveying a professional image and delivering a good service. Therefore the Trust wishes users to adhere to the following guidelines: Before sending an , consider whether there is a more appropriate way of communicating eg a telephone call or face to face contact. Do not print s unless you really need to for work purposes. s can be saved, if you need them. Only mark s as important if they really are important. Ensure you send your only to people who need to see it. Sending e- mails to all in your address book can unnecessarily block the system. s should be treated like any other correspondence and should be answered as quickly as possible. Delete any messages that you do not need to have a copy of. If you suspect you received a virus by , telephone the IT Service Desk immediately (ext 2397) Legal Issues The Freedom of Information Act 2000 enables people to have access to much more information held by public bodies than previously. Communications sent via may relate to decisions made that might have been sent in letters and memos a few years ago. Like their paper counterparts, these records must be saved, filed and managed in a manner that will allow easy access in future. is a business communication tool and users are obliged to use this tool in a responsible, effective and lawful manner. Consideration should also be given to the Data Protection Act The following rules are to be strictly adhered to: Do not send or forward s with any libellous, defamatory, offensive, harassing, racist or any discriminatory language homophobic, obscene or pornographic remarks or depictions. If you receive an of this nature, you must notify your manager Do not forward confidential information without acquiring permission from the sender first Do not knowingly send an that contains a virus Do not send unsolicited messages; Do not forge or attempt to forge messages; Do not send messages using another persons account Do not knowingly breach copyright or licensing laws when composing or forwarding s and attachments. By following the guidelines in this policy, the user can minimise the legal risks involved in the use of . If any user disregards the rules set out in this policy, they may be subject to action by the Trust in accordance with the Trust s Disciplinary Policy. Internet, Intranet and Acceptable Use Policy v6 8

9 of Personal Identifiable Information Methods of sending is not secure and it should not be treated as the standard method of communicating personal identifiable information. Where is agreed as the most appropriate method of transfer of personal identifiable information, the preferred method is by using NHSMail. However NHSMail is only secure when sent between two NHSMail accounts or between NHSMail and organisations which are certified as secure. s sent from NHSMail which contain personal identifiable information must not be sent to any other organisations addresses other than those listed in Appendix C. Outside of the approved recipient lists in Appendix C, all transfers of personal identifiable information MUST be encrypted to the approved standard or sent by secure file transfer unless an urgent clinical need prevents this. The IT Department can advise and assist with encryption of files and s. Any containing person identifiable information held in an account should be deleted as soon as no longer required Confidential Information Out of Office Where possible, personal identifiable information (including digital images) should not be forwarded by unless it has been anonymised, or the personal identifiers have been removed. These can be provided to the recipient by separate communication. The safe standards of confidentiality should also be applied to staff related personal details. An out of office message must be set up when absent from the Trust for one day or more. If away for a significant period of time (e.g. maternity leave or long-term sick leave) you should contact the IT Service Desk so that your account can be temporarily suspended. Where appropriate, with your manager s approval, access to your account can be granted to whoever is covering your role. The IT Service Desk can offer assistance with this facility Monitoring All s including personal s are monitored for viruses. All traffic (incoming and outgoing) is logged. These logs are audited periodically. The content of s is not routinely monitored. The Trust reserves the right to inspect, monitor and retain message content as required to meet legal, statutory and business obligations. Internet, Intranet and Acceptable Use Policy v6 9

10 7.0 TRAINING Administration of Accounts All accounts and content maintained on the Trust systems are the property of the Trust. The Trust reserves the right to enable 3rd party access to accounts in exceptional circumstances e.g. if someone is on long tern sick leave and no cover has been arranged. Any such access must be authorised by a relevant line manager Unused/Obsolete Accounts Information held in may be of vital importance to the organisation and its availability and integrity must be safeguarded. The possibility of important messages being directed to unused accounts and left unread may pose a risk to the organisation. All unused accounts will be removed from the system along with the contents of that users mail box within 1 month of being identified as unused or obsolete Confidentiality Disclaimer All s should contain a confidentiality disclaimer asking to be informed if the incorrect person receives the . This may be set up as an AutoSignature. A standard disclaimer is provided at Appendix B Training for using Internet Explorer and Microsoft Outlook is available through the Trust IT Training team. 8.0 EQUALITY AND DIVERSITY The Trust is committed to ensuring that, as far as is reasonably practicable, the way we provide services to the public and the way we treat our staff reflects their individual needs and does not discriminate against individuals or groups on any grounds. Reasonable adjustments can be made to ensure disabled staff and people with other health conditions can utilise the system. 9.0 MONITORING COMPLIANCE WITH THE POLICY Standard/process/issue Internet misuse misuse Monitoring and audit Method By Committee Frequency Check for Directory Weekly excessive or Services inappropriate Team browsing via standard reports Check reports of s containing inappropriate content Directory Services Team Real Time Internet, Intranet and Acceptable Use Policy v6 10

11 10.0 CONSULTATION AND REVIEW Confidentiality & Data Protection Group Health Infomatics Assurance Comittee 11.0 IMPLEMENTATION OF POLICY (INCLUDING RAISING AWARENESS) This Policy will be published as per normal policies and circulated as per standard. This Policy will be available at all the Trust s designated locations ASSOCIATED DOCUMENTATION OP6b IT Security Policy OP58 Anti Virus Policy Internet, Intranet and Acceptable Use Policy v6 11

12 APPENDIX A A.1 Request for Access to the Gateshead Trust Computer Network Request for Access to the Gateshead Trust Computer Network This form must be completed for all new staff by their Line Manager so that their user accounts and accounts can be set up. Please return the form to the IT Department, Queen Elizabeth Hospital. All new staff must sign the Gateshead Health User Code of Connection and Internet Services prior to any computer usage. Please complete the following details for the USER, please print clearly. Name: Department: Location: Start Date: (DD/MM/YYYY) / / Other access required e.g. Shared network areas, shared mailboxes etc. - ***If access to shares is required please give full details of share name either in the format \\server\share or as share on server (X:) where X is a drive letter. For help on identifying a share name please call the Service Desk.*** Authorised by Line Manager. Name: Job Title: Date: / / Signature..... All users must change their password when they first log onto the network. All Accounts will be set to enforce password changes every 60 days. Internet, Intranet and Acceptable Use Policy v6 12

13 A.2 & Internet Services - User Code Of Connection (To be signed by all users of Gateshead Health NHS Trust Internet and services) 1 Introduction With the expansion of Internet and services to cover all staff working for Gateshead Health NHS Foundation Trust and the informal culture of it is important to remember security applying to the systems and that legislation applying to paper documents also applies to . This legislation include the Data Protection Act, the Sex Discrimination Act, and the Race Relations Act as well as the laws of libel. 2 Code of Connection As more attached documents are carried with the potential for spreading of computer viruses is greatly increased. It is important to realise that viruses can be carried by documents and as soon as you open the infected attached document the virus will infect your system. A potentially greater risk is sending viruses out of the organisation and infecting other organisations, as such occurrences could result in legal action against the Trust. All members of staff using must have an up to date antivirus scanner capable of scanning attachments. As with all communication systems there is a potential security risk as to who has access to the information, as it is possible that people working for the Trust will know individuals to whom the messages refer and you should not allow others to read your unless you intentionally forward it to them. There is also the danger that received messages may be forwarded to other people not authorised to handle sensitive material. Highly sensitive messages should not be sent by . For sensitive messages the sender should check with the intended recipient that the information will go directly to him/her and will not be passed on to anyone else. All s should contain a confidentiality notice asking to be informed if the incorrect person receives the . This may be set up as an AutoSignature. Such as: This and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this in error please destroy it and notify the sender. is often perceived as an informal medium. However s occupy the same place legally as letters - it is just like writing on company headed notepaper - therefore care must be taken to prevent: inadvertently entering into contracts through committing libel using language or graphics, which may be construed as sexual harassment or an offence under the Race Relations Act. breach of copyright by publication of original material even by forwarding to another individual. It is important that users of these service are aware of certain security considerations, understand the implications of non-compliance and agree to abide by the terms of this Code of Connection and the Trust s Internet, Intranet and Acceptable Use Policy Internet and services are provided primarily for those purposes directly related to a user s work or areas of legitimate research and operational services. Limited personal use of the services is permitted. Always obtain management consent for such usage, and do not abuse the privilege. You must not divulge your access password to anyone. No illicit material will be sent/viewed/downloaded or obtained via the Internet or . Advice should be taken from the IT Security Officer where there is any doubt. An up to date anti virus scanner must be installed on the PC used for and any material downloaded must be virus checked immediately. Forwarded material may be subject to copyright and all copyright restrictions must be adhered to. Unlicensed or unauthorised software must not be installed on any PC. Care must be taken to ensure only the intended recipient(s) have access to messages. Internet, Intranet and Acceptable Use Policy v6 13

14 Modems must not be connected to PCs on the Trust network. Important s will be regularly saved to a network storage medium to prevent loss. Breaches of security, abuse of services or non-compliance with the Trust s Information Security Policy or the Code of Connection, may result in the withdrawal of and Internet services. The Trust s disciplinary procedure will be invoked should abuse of services or non-compliance with the Code of Connection occur. The Trust reserves the right to monitor Internet access and s sent or received by staff on Trust PCs, in order to ensure that the Code of Connection is not breached USER ACCEPTANCE I confirm that my Line Manager has completed and signed a Request for Access form. I have read and understand the and Internet Services Code of Connection and agree to abide by both it and the Trust s Internet, Intranet and Acceptable Use Policies *Please Print Clearly Forename: Surname: Telephone/Bleep No: Date: (DD/MM/YYYY) / / Department/Directorate: Have you previously worked at the Trust? If yes, which Department/Directorate: User Signature: Original to be sent to: IT Department Queen Elizabeth Hospital Gateshead NE9 6SX Copy to be retained by user Internet, Intranet and Acceptable Use Policy v6 14

15 APPENDIX B - LEGAL DISCLAIMER Unless expressly stated otherwise, the information contained in this and any files transmitted with it is confidential and is intended solely for the use of the individual or entity to whom it is addressed. If you are not the intended recipient you must not copy, distribute, or take any action or reliance upon it. If you have received this in error, please destroy it and notify the sender. Any unauthorised disclosure of the information contained in this is strictly prohibited. Internet, Intranet and Acceptable Use Policy v6 15

16 APPENDIX C - LIST OF APPROVED ADDRESSES When using NHSMail, the following addresses are secure and approved for sending personal identifiable information nhs.net x.gsi.gov.uk gsi.gov.uk gse.gov.uk gsx.gov.uk police.uk pnn.police.uk cjsm.net scn.gov.uk gcsx.gov.uk Internet, Intranet and Acceptable Use Policy v6 16

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

and Internet Policy

and Internet Policy Email and Internet Policy Responsible Officer Authors Date effective from July 2008 Ben Bennett, Business Planning & Resources Director Policy Development Group Date last amended December 2012 Review date

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Internet, E-mail and SMS Texting Usage Policy Group Policy

Internet, E-mail and SMS Texting Usage Policy Group Policy Internet, E-mail and SMS Texting Usage Policy Group Policy Scope: This Orbit Housing Group Limited ( Group ) policy provides a set of guidelines for all users within the Group on the proper usage of the

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable

More information

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

Use of the Internet and E-Mail Policy

Use of the Internet and E-Mail Policy Use of the Internet and E-Mail Policy This procedural documentsupersedes : Use of the Internet and E-Mail Policy CORP/EMP 16 v.4 Name and title of author/reviewer Samantha Francis HR Advisor Date revised

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

Notice: Page 1 of 11. Internet Acceptable Use Policy. v1.3

Notice: Page 1 of 11. Internet Acceptable Use Policy. v1.3 Notice: Plymouth Community Healthcare Community Interest Company adopted all Provider policies from NHS Plymouth when it became a new organisation on 1 October 2011. Please note that policies will be reviewed

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Executive Director (AK) [J50]

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - EMAIL POLICY Executive Director (AK) [J50] AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Committee: Policy and Resources Date: 23 rd June 2009 Author: Executive Director (AK) [J50] 1.0 ISSUE 1.1

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Email Usage Policy Document Profile Box

Email Usage Policy Document Profile Box Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience: E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Electronic Mail Policy Version: 5 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Recommending Committee: Approving Committee: Information Governance Steering Group Patient Safety & Experience Council Signature: Designation: Chief Executive Date: Version Number:

More information

Email Policy For Staff and Students

Email Policy For Staff and Students Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

Information Management and Security Policy

Information Management and Security Policy Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail

More information

Sample Policies for Internet Use, Email and Computer Screensavers

Sample Policies for Internet Use, Email and Computer Screensavers Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies

More information

Acceptable Use of Information. and Communication Systems Policy

Acceptable Use of Information. and Communication Systems Policy Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,

More information

Town of Brunswick. Computer Use Policy

Town of Brunswick. Computer Use Policy Town of Brunswick Computer Use Policy Town of Brunswick Computer Use Policy Table of Contents 1. General 1 2. Access 1 3. Acceptable Use 1 4. E-Mail 1 5. E-Mail Attachments 2 6. Internet & Websites 2 7.

More information

E-mail & Internet Policy

E-mail & Internet Policy E-mail & Internet Policy Recommending Committee: Approving Committee: Clinical Standards & Focus Council Trust Governance Board Signature: Designation: Chief Executive Date: Version Number: 02 Date: August

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

------------------- COMPUTER NETWORK AGREEMENT FORM

------------------- COMPUTER NETWORK AGREEMENT FORM COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.

More information

Assistant Director of Facilities

Assistant Director of Facilities Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

Electronic Communications Monitoring Policy

Electronic Communications Monitoring Policy Electronic Communications Monitoring Policy Printed copies should not be considered the definitive version DOCUMENT CONTROL POLICY NO. 79 Policy Group Information Governance and Security Author Andrew

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

SAS TRUSTEE CORPORATION ( STC )

SAS TRUSTEE CORPORATION ( STC ) SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...

More information

Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014

Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014 Email, Internet & Social Networking Policy Lead executive Name / title of author: Chief Nurse Colin Owen, Information Governance and Data Security Lead Date reviewed: October 2014 Date ratified: 5 th December

More information

E-Mail and Internet Policy

E-Mail and Internet Policy E-Mail and Internet Policy Document reference Title: E-Mail and Internet Policy Product ID: Version Number: 8.0 Status: Live Distribution / Issue date: 12 November 2014 Author: K. Fairbrother Review Period:

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

Policy Document Control Page. Updated to include new NHS mail encryption feature

Policy Document Control Page. Updated to include new NHS mail encryption feature Policy Document Control Page Title Title: Electronic Mail Policy Version: 6 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

HAZELDENE LOWER SCHOOL

HAZELDENE LOWER SCHOOL HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

THE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES

THE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES THE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES In summary the telephone, fax, E-mail and Internet should NOT be used: For personal gain or profit. To represent yourself as someone else. To send, post,

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,

More information

Terms and Conditions of Use - Connectivity to MAGNET

Terms and Conditions of Use - Connectivity to MAGNET I, as the Client, declare to have read and accepted the terms and conditions set out below for the use of the network connectivity to the Malta Government Network (MAGNET) provided by the Malta Information

More information

Internet, Email and Computer Use Policy

Internet, Email and Computer Use Policy Policy Reference Number Internet, Email and Computer Use Policy 16 CP Responsible Department Related Policies Corporate & Community Services Code of Conduct for Elected Members, Records Management, Risk

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

POLICY ON USE OF INTERNET AND EMAIL

POLICY ON USE OF INTERNET AND EMAIL POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3

LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3 LINCOLNSHIRE COUNTY COUNCIL Information Security Policy Framework Document No. 8 Email Policy V1.3 Document Control Reference V1.3 Email Policy Date 17 July 2015 Author Approved by Version History David

More information

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

DIGITAL TECHNOLOGY POLICY St Example s School

DIGITAL TECHNOLOGY POLICY St Example s School DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone

More information

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

Please note this policy is mandatory and staff are required to adhere to the content

Please note this policy is mandatory and staff are required to adhere to the content Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Acceptable Use of Information and Communication Systems Policy

Acceptable Use of Information and Communication Systems Policy Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help

More information

E-SAFETY POLICY 2014/15 Including:

E-SAFETY POLICY 2014/15 Including: E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable

More information

Grand Rapids Public Schools

Grand Rapids Public Schools 4510-R Computer Network (Cf. 4520) 4510-R Planning and funding for computer networking in the District shall be handled in accord with the District's policy and rules on technology. Supervised Use Teachers

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Email policy and practice

Email policy and practice Email policy and practice This policy applies to all staff (including agency workers, casual and temporary staff), visitors, contractors, students, alumni and researchers of Anglia Ruskin University, and

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

Guidelines on developing a policy for managing email

Guidelines on developing a policy for managing email Guidelines on developing a policy for managing email Crown copyright 2004 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government

More information

IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&TPP No. 2 Email Policy Version 3.04

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

Islington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014

Islington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014 A council-wide information technology policy Version 0.9 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document is distributed under the Creative Commons Attribution

More information

ELECTRONIC COMMUNICATIONS & INTERNET ACCEPTABLE USE POLICY Document Reference

ELECTRONIC COMMUNICATIONS & INTERNET ACCEPTABLE USE POLICY Document Reference ELECTRONIC COMMUNICATIONS & INTERNET ACCEPTABLE USE POLICY Document Reference Electronic Communications and Internet Acceptable Use Policy P010 Version Number V4.13 Author/Lead Job Title Director s Name

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY Version Author Date Approved by Board 2009-1 Gillian Kirkup 24 March 2010 Page 1 of 8 THE RICE MARKETING BOARD FOR

More information

USE OF PERSONAL MOBILE DEVICES POLICY

USE OF PERSONAL MOBILE DEVICES POLICY Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

Internet and Email Usage Policy

Internet and Email Usage Policy Internet and Email Usage Policy Document. EDRMS000489NC Version. 1.0 Approved by n-clinical PAG Date approved 19/02/2014 Ratified by Information Governance Steering Group Date ratified 07/03/2014 Date

More information

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures

More information

COLLINS CONSULTING, Inc.

COLLINS CONSULTING, Inc. COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,

More information

ACCEPTABLE USE OF TECHNOLOGY

ACCEPTABLE USE OF TECHNOLOGY IIBE Page 1 ACCEPTABLE USE OF TECHNOLOGY Internet and computer network and non-network access is available to authorized students, teachers, and other staff in the. Albemarle County Public Schools primary

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information