, Internet & Social Networking Policy Version th December 2014

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014"

Transcription

1 , Internet & Social Networking Policy Lead executive Name / title of author: Chief Nurse Colin Owen, Information Governance and Data Security Lead Date reviewed: October 2014 Date ratified: 5 th December 2014 Ratifying Committee: Information Governance Committee Target audience: Policy Summary: All users of Trust and internet services To set out the Trust s standards for the use of , internet and social media to help support management with the delivery of Trust services and for communicating with partner organisations and stakeholders. Both Internet and services are to be used primarily for Trust business, but are available for appropriate general use providing the use is deemed reasonable with the Trust s standards set out in this policy. Equality Impact Statement: Training impact and plan summary: University Hospital of South Manchester NHS Foundation Trust ( UHSM ) strives to ensure equality of opportunity for all service users, local people and the workforce. As an employer and a provider of health care, UHSM aims to ensure that none are placed at a disadvantage as a result of its policies and procedures. This document has therefore had an initial assessment, in accordance with the equality impact proforma incorporated in the Checklist for Review and Ratification of UHSM-wide Documents, to ensure fairness and consistency for all those covered by it regardless of their individuality. This initial impact assessment indicated that the potential discriminatory impact is very low, and therefore no further assessment was necessary. The Policy is part of the IG Mandatory Training Programme. Outline plan for dissemination: Dissemination lead: name / title / ext n o Available by the Intranet Colin Owen Information Governance and Data Security Lead. This version n o V3.0 Date published: 04/03/2015 This version (v3.0) December 2014 Page 1 of 16 Next review December 2016

2 Version number Version Control Schedule Issue Date Revisions from previous issue Date of ratification by Committee 24/02/2010 V1.0 20/10/2009 NA V2.0 V2.1 19/11/2013 Modifications to the rules for personal internet use to reasonable use. V3.0 07/11/2014 Change of title, minor changes and clarifications for private use of personal mobiles. HCGC March /11/ /12/2014 Summary of consultation process Control arrangements [Review usually every 3 years, but more frequently if required ] Document Control Reviewed by all Information Governance Committee members, reviewed by Communications Manager and put out to consultation by all staff. Information Governance Committee is tasked with monitoring this policy and all related material that might prompt revision. It is the role of the IG Lead/HR Manager to update as appropriate. Audit of Compliance will be made in the form of a report to IGG twice per year by the IG lead/hr Manager. The policy will be revised every two years in line with Trust Policy, or sooner should a change in guidance dictate. There is an associated IG action plan reviewed annually in line with IG toolkit results, and monitored and developed by the Information Governance Committee. Associated documents IT security Policy, Confidentiality Code of Conduct Policy. References Document Compliance Monitoring Arrangements Process for monitoring Responsible individual / group/ committee Information Governance Committee This version (v3.0) December 2014 Page 2 of 16 Next review December 2016

3 Frequency of monitoring Role responsible for preparation / approval of report and action plan Committee responsible for review of results / approval of action plan Individual / group / committee that is responsible for monitoring of action plan Two yearly Information Governance and Data Security Lead Information Governance Committee Information Governance Committee This version (v3.0) December 2014 Page 3 of 16 Next review December 2016

4 Contents SECTION PAGE 1 Introduction Policy Statement Legal Issues Use of Services Monitoring of User Activity Process for monitoring the effectiveness of the Policy Dissemination, Implementation and Access to this Document Review, Updating and Archiving of this Document References and Bibliography Associated Documentation Duties APPENDICES 12 APPENDIX A - PLAN FOR DISSEMINATION This version (v3.0) December 2014 Page 4 of 16 Next review December 2016

5 1 Introduction 1.1 University Hospital of South Manchester NHS Foundation Trust (UHSM) recognises that Internet and services have the potential for enormous benefit to employees. 1.2 The facilities bring tremendous potential to support the management and delivery of Trust services, and for communicating with partner organisations and stakeholders. It is Department of Health policy, adopted by the Trust that all NHS staff have the facility of internet and access available in their workplace. Both Internet and services are to be used primarily for Trust business, but are available for appropriate general use providing the use complies is deemed reasonable with the Trust s standards set out in this policy. 1.3 Social networking sites such as Twitter and Facebook are popular and used by many staff and some approved departments with the organisation, but misuse of these can lead to breaches of confidentiality or bring the reputation of the Trust. 1.4 Again, however, UHSM also recognises that these services can be misused, and thus the associated risks and pressures, including litigation and security concerns, confidentiality breaches, legal and regulatory compliance and productivity of staff must be addressed. 2 Policy Statement 2.1 The objectives of this policy are to: Clarify Trust policy regarding acceptable and unacceptable use of internet and services and social networking Reduce or avoid security threats by increasing awareness and disseminating good practice. Encourage effective use of Trust resources. Protect the Trust against potential liability. Ensure confidentiality of staff/patients is maintained at all times. 2.2 This policy applies to all individuals (employed or otherwise) having the facility to use the Trust s and internet services, on Trust equipment or other devices (where the Trust has approved) or plus anyone granted access to the Trust network whilst engaged in work for the Trust at any Trust occupied location, and/or on any Trust owned or Trust approved computer, including those with remote or smart phone access. In terms of social networking, as a Trust employee, representative or anyone working on behalf of the Trust has a reasonable expectation that staff will not bring the Trust into disrepute, and therefore this policy is extended to the staff members social media use. Staff must not use their phones for personal reasons whilst undertaking clinical practice or where near patients and keep personal use to a minimum and emergency situations. 2.3 The policy also covers Trust web gateways, direct , web mail, instant messaging, and NHS Mail accessed from Trust equipment (or other approved devices) This includes staff conduct both on and off site, whilst using such services and therefore this policy is extended to the staff members personal use. 2.4 The principles of this policy also apply to staff that have been granted access to internet and services remotely from home or via a device for Trust business The policy also provides guidelines for staff in creating s and managing their mailboxes. This version (v3.0) December 2014 Page 5 of 16 Next review December 2016

6 2.5 The Trust will at all times seek to act in a fair manner and respect staff rights for privacy of their personal data under the Human Rights Act 1998 and the Data Protection Act Legal Issues 3.1 The Trust owns the network over which and internet services are provided. This means that the communications over the network can not be classed as private and the Trust reserves the right to monitor activity if this is prompted. This may lead to a formal investigation under Trust disciplinary procedures. 3.2 However the Trust is not compelled to initiate an investigation. 3.3 All staff using internet and resources should clearly understand the legal issues involved from both their own perspective and from that of the Trust. The laws of defamation, obscenity, discrimination and harassment, copyright and confidentiality all apply to staff use of and internet services 4 Use of Services 4.1 General All network services including and internet access are provided primarily for Trust business, but are available for general use providing the use complies with Trust policies Staff must not: Use the network or services for personal financial gain, or for Personal or private advertising. Use another staff member or party s username or password to access the network, or allow another user to use his/hers. Attempt to introduce and transmit material (including but not restricted to computer viruses, Trojan horses and worms) designed to be destructive to computer systems, or to try to get round precautions designed to prevent such material. Access or display any pornography or other sexually explicit images or documents, or any other images that are discriminatory, including screen savers. Delete other users files or interfere in any way with the contents of their directories, particularly if given temporary or shared access. Remove computer software such as desktop icons, wallpaper or screensavers from its location or tamper with it in any way. 4.2 Internet The Trust Internet use is monitored. The Trust allows a reasonable amount of personal browsing time in non work time Access to non business sites will be monitored staff should refrain from using the internet for personal use, even on their own mobile devices, for example smartphone or tablet, when they This version (v3.0) December 2014 Page 6 of 16 Next review December 2016

7 should be working, members of staff abusing this privilege may be disciplined in accordance with the Trust Disciplinary Procedure The Trust blocks a number of websites that have been classified as inappropriate use. If it is thought a site needs to be reclassified, staff should contact the IT department for approval Users must not: exceed a reasonable amount of internet browsing time for Non Trust business access on Trust or own equipment.in non working time. express opinions over the internet that purport to represent the views of the organisation or reflect negativity on the organisation, not use the internet in such a way that interferes with the productivity of their department. access inappropriate, offensive or sexually explicit sites. (Should staff inadvertently navigate on to such a site, they must exit immediately, making a note of the URL, and report it to the IT service desk on requesting a log number from IT). use the internet in such a way that interferes with Trust business use i.e. media streaming which takes up a lot of space on the network, and slows the internet down for legitimate business use. Use non-work related chat-rooms or similar services. Play computer games across the Trust network and/or the internet on a Trust PC or laptop This list is not exhaustive, but indicates the types of activity that may be regarded as misconduct. Staff should always bear in mind that they may be called upon to justify the use of internet and to their manager, both in terms of time and content Unacceptable use of internet and services includes any action which could bring the Trust into disrepute, interfere with the Trust s business, its reputation or jeopardise the security of data, networks, equipment or software or cause harm to recipient s patients or staff. Inappropriate web sites are subject to restriction by the Trust s web content management process The service provided by the Trust is primarily for business use and is owned by the Trust, as a result the Trust has a responsibility to ensure that this service is used appropriately and not for illegitimate or illegal activity The Trust reserves the right to routinely or intermittently monitor activity and usage, and to investigate further if prompted to do so. 4.4 At all times the Trust will seek to act in a fair manner and respect staff rights for privacy of their personal data under the Data Protection Act This version (v3.0) December 2014 Page 7 of 16 Next review December 2016

8 4.5 However staff should be aware that no communication sent over Trust owned networks can be truly private, and should seek other methods of transfer should they wish to communicate in a private setting. 4.6 The Trust will employ Information Commissioners Office guidance in the event of an investigation into a member of staffs account, and this will be done in conjunction with Human Resources Where appropriate the staff member will be informed that this type of investigation will be taking place, unless this would jeopardise a criminal investigation Acceptable Use Staff should: Ensure that the identity of the receiving recipient s address is correct, and that messages or data sent by Trust or NHS mail do not cause distress or offence to the receiving recipient, including chain mail messages, and jokes. Guard against accidental breaches of confidentiality by entering a wrong address or forwarding a message to inappropriate recipients. Note that the senders name in the From box within an is not always reliable and could be used maliciously by other internet/ users. Initiate the Out of Office assistant on the Trust service giving details of alternative contacts or arrangements for planned periods of absence. Set up shared accounts and calendars, for managers/consultants and their secretaries through the Local Service Desk, rather than sharing usernames and/or passwords. If this is not done then a line manager may authorise the IT department to make this available in times of need by giving authorisation to access the employees account. The user should be informed by the line manager on return as to the reason for access and the user will require a new password via the IT department. Use the sensitivity categories on carefully (normal, personal, private, confidential) where appropriate. Clearly state to the recipient when material is private and confidential. Include private within the title of the in private s (i.e. non-trust business). These s will not be opened, unless they contravene other rules of the monitoring software or providing they do not contain profanity or for other good reasons such as being involved within a specific investigation. Staff should note marking an as private will not negate the need to investigate that in the event of a complaint or if an investigation is initiated (see above) Inform their line manager if unsolicited offensive or sexually explicit s are received, who will be responsible for deciding whether further investigation or disciplinary action is appropriate Unacceptable Use Staff must not: This version (v3.0) December 2014 Page 8 of 16 Next review December 2016

9 Use to engage in activities or to transmit content that is harassing, discriminatory, menacing, threatening, obscene, defamatory, or in any way objectionable or offensive. This includes disparagement or defamation concerning race, religion, colour, sex, sexual orientation, national origin, age, or disability, and incorporates sending, receiving, soliciting, printing, copying or replying to such messages. Assume that copying in individuals means that the receiver has read or agreed with the content of the . Express personal views in such a way that they are likely to be interpreted as being the official policy/view held by the Trust. Use personal software/webmail (for example, hotmail) for Trust business. Send patient identifiable information or sensitive information externally via an message on the Trust system. NHS.net should be used instead. For further information see the Information Security Policy. Send or forward on unwanted (junk or unsolicited marketing material commonly, known as SPAM), chain letters and offers, hoax virus warning, amusing animations and graphics, unsolicited mail or communication lists via the Trust s system, as these can impact systems and disrupt services. Commit the Trust to purchasing or acquiring goods or services without correct authorisation in line with the Trust s Standard Financial Instructions. Use their own disclaimer on messages sent to recipients outside of the Trust without approval by the IG and Data Security Lead. The Trust has a legal disclaimer which is automatically attached to all external messages as they leave the Trust network. Deliberately release confidential information. This is a disciplinary offence, as set out in this policy and the Trust Confidentiality Code of conduct. Use services to forge signatures. Initiate a SPAM attack from within the Trust, using Trust or own equipment For messages internal to the Trust, minimal patient details should be contained in the body of the and preferably an attachment, which is password protected or via a link to a secure intranet page. For messages containing clinical information going outside the Trust, NHS Mail must be used, as this provides adequate security by encryption. Alternatively use to securely exchange files with other NHS and non-nhs organisations over the internet. Inappropriate messages going out of or coming into the Trust will be subject to quarantine and removal by the Trust s message content management process. 4.7 Social Networking, Discussion Forums and News groups A social network service focuses on the building and verifying of online social networks for communities of people who share interests and activities, or who are interested in exploring the interests and activities of others. This version (v3.0) December 2014 Page 9 of 16 Next review December 2016

10 4.7.2 Most social network services are primarily web based and provide a collection of various ways for users to interact, such as chat, messaging, , video, voice chat, file sharing, blogging, discussion groups Standards for individuals (employed or otherwise) who are engaged by the Trust will not maintain any site that contains personal identifiable information of Trust patients, or relatives, whilst they are a patient at the Trust. This does not preclude staff from having pictures of relatives on their site, as long as they are not in situ as a patient of the Trust. will not maintain a site that contains photographs of Trust patients and/or their relatives. will not maintain a site that contains person identifiable information of another Trust employee in relation to their employment including judgements of their performance and character. will not maintain a site that contains photographs of another Trust employee taken in the work situation or in their working uniform. will not maintain a site that contains defamatory statements about University Hospital of South Manchester, its services or contractors. must not express opinions in the above forums that purport to represent their own views on the organisation, whether from the Trust network or home. must never post a comment on the organisation that purports to represent the views of the Trust, without first consulting the Communications team As a Trust employee the Trust has a reasonable and lawful expectation that staff will not bring the Trust into disrepute, this is extended to the home environment as well. Any grievance with the organisation should be channelled through procedures and policies already in place and dealt with within the work environment 4.8 Instant Messaging Staff must not: Use Instant messaging, e.g. via MSN (Microsoft network) for internal business use, or private use at work or over the Trust network. Instant messaging is a way of communicating from one user to another and differs from in that the conversations happen in realtime. 4.9 Streaming Media Staff must not: Use streaming media on the Trust site for personal or private use. Media that is distributed over a data network can be streamed such as radio or television or non-streamed such as video or audio. The user does not have to wait to download a large file before seeing the video/tv programme or hearing the sound, because it is sent in a continuous stream that is played as it arrives. This uses a great deal of bandwidth, potentially affecting other Trust business use of the internet. This version (v3.0) December 2014 Page 10 of 16 Next review December 2016

11 4.10 Private Use Staff should use internet facilities primarily for Trust business but private use is allowed within a reasonable personal browsing time, Employees must never allow use of the facilities to interfere with their job performance or work responsibilities. Staffs who abuse this privilege will be subject to disciplinary action Similarly, staff may use occasionally and not excessively for personal use e.g. to communicate with family members, but this personal use should be limited to lunch or other breaks, or after normal working hours and be absolutely necessary protecting identifiable data in line with the requirements of the Trust Information Security Policy Personal use should not include operating a business, campaigning for political causes or candidates, or promoting or soliciting funds for a religious or other personal cause, and must comply with the provisions of this policy It is not permissible to use the Trust s address for private correspondence, or for delivery of goods purchased over the internet. (other than those staff who have resident accommodation on site) Out of hours usage does not lessen the Trust s legal responsibility regarding inappropriate material and/or harassment, misrepresentation and other issues, and thus the principles of this policy apply to private use as well as business use Where an is identified as private in its header, the message content will not be accessed, unless that message is suspected to contravene good employment practice or unlawful activity. Where an employee is suspected of abusing the privilege of private use of , the volume of misuse will be the major focus of investigation. However, if the Trust suspects an employee of engaging in criminal activity in the workplace and reasonably believes that this may involve the sending or receipt of s, the Trust will have a right to access the contents of messages marked as private. 5 Monitoring of User Activity 5.1 Routine Monitoring of Internet usage A series of random dates will be selected by the SIRO / Caldicott Guardian when user reports will be made available by the IT department for routine retrospective internet monitoring. A small working group will be established with a HR Lead, IG Lead and an IT Manager to analyse audit logs and forward any concerns to the relevant manager of the individual. 5.2 Ad Hoc Monitoring (Internet and s) A senior manager who suspects there has been a breach of policy by an individual(s) for which they are responsible should make an approach to the HR Lead and the IG Lead for copies of audit /usage reports The Information Governance and Data Security Lead will request an activity report detailing internet or use. This will be made available if an HR manager or a Director has authorised it It is the responsibility of the IT Services Department and the Information Governance and Data Security Lead to undertake more in depth investigation where appropriate. This can involve the This version (v3.0) December 2014 Page 11 of 16 Next review December 2016

12 reading of business and personal contents and attachments to verify the validity of the content. A similar process is undertaken to assess and categorise web pages and web mail. However this will always be done in accordance with the law, and take in to account ICO guidance. 5.3 The following tools are implemented as described Anti-virus Is implemented on: Client and server machines. Dedicated server. gateways. This means that all staff s and outside connections will be scanned for viruses as a normal part of network security Mail Content Is implemented on: gateways This software scans incoming and outgoing s for inappropriate material such as language, images, and certain file types. It also places restrictions on file size and file type, and adds the authorised Trust disclaimer on outgoing messages Messages found to be in contravention of the rules set up within the software are quarantined, and assessed for release or deletion in line with the IT Services operational procedures. Ad-hoc processes are also carried out as requested via the IT Service Desk Web Filtering Prohibits access to sites with offensive material. Monitors access to all permitted sites. Can audit and report on all sites permitted and prohibited. Filtering and reporting can be implemented on specific machines, staffs, departments, websites, and categories Anti-spam Is implemented on: Dedicated server. gateways These services trap, quarantine/remove incoming mail that appears to be spam. This version (v3.0) December 2014 Page 12 of 16 Next review December 2016

13 5.4 Breach of Policy If a breach of this policy should occur individuals should contact their line manager in the first instance if it is appropriate to do so. It is possible such a matter may be resolved locally, although HR would act to support line managers if this was not the case and further action needed to be taken. If staff are found to have contravened this policy disciplinary sanctions, up to and including dismissal can occur. 6 Process for monitoring the effectiveness of the Policy 6.1 The policy will be monitored by staff as outlined in section 3 of the policy. The standards set out will be reviewed by the Information Governance Committee to ensure it is up to date with relevant guidelines and associated good practice. 6.2 Internal audit will review the processes attached to this policy in association with IT security monitoring. 7 Dissemination, Implementation and Access to this Document 7.1 This policy will be available via the Intranet, and the publication scheme on the internet. Staff will be notified of it s presence via global , and Trust induction. Staff will be informed of the necessity to read this policy during mandatory training and team brief. 8 Review, Updating and Archiving of this Document 8.1 This policy will be available via the Intranet, and the publication scheme on the internet. Staff will be notified of it s presence via global , and Trust induction. Staff will be informed of the necessity to read this policy during mandatory training and team brief. 9 References and Bibliography Computer Misuse Act 10 Associated Documentation Information Security Policy Code of Confidentiality for Staff 11 Duties 11.1 Duties within the Organisation The Chief Executive also known as the Accountable Officer is responsible for ensuring that the Trust has effective policies to assist staff and control risks Caldicott Guardian is responsible for ensuring that Information Governance policies are in place, and the Trust Board is aware of any related Information Governance issues arising from policy implementation Senior Information Risk Officer is responsible for ensuring the accountable Officer is made aware of any information risks associated with this policy, and acts as an advisor to the Board. This version (v3.0) December 2014 Page 13 of 16 Next review December 2016

14 They are responsible for ensuring any information assets associated with this policy are managed appropriately by an Information Asset Owner Head of IT Operations is responsible for The availability of IT Services. Managing the IT Services infrastructure and staff. Ensuring compliance to external standards and policies, e.g. Connecting for Health (CfH). Ensuring the availability of internet and services and their supporting infrastructure Managing the security and integrity of data, via anti-virus, mail content, and web filtering and content and anti-spam products. Managing the internet filtering and content by testing the integrity of web sites and categorisation of sites not yet categorised by the Barracuda Web Filter product Managing the mail store, and the establishment and maintenance of shared mailboxes and calendars Managing and monitoring the quarantine area and releasing appropriate messages. Undertaking programmed and ad hoc monitoring arising out of internet and security products. Maintaining the Microsoft Active Directory for the NHS Mail Directory Connector Service. Maintaining the currency of Trust employees in appropriate sources (starters and leavers). Producing documentation and reports on internet and usage and misuse. Reporting non-compliance to this policy and other security violations via the Trust risk management procedure. Managing the IT Services infrastructure and staff. Ensuring compliance to external standards and policies, e.g. Connecting for Health (CfH) Reporting non-compliance to this policy and other security violations via the Trust risk management procedure Information Governance and Information Security Lead is responsible for Assisting HR and Managers in providing guidance to support their investigations. Advising the IG Committee of any breaches occurring under this policy. Reporting non-compliance to this policy and other security violations via the HIRS Keeping the policy under review in light of incidents and legislation. Advising on the security of personal data under Data Protection legislation Raising initial awareness of the policy at the corporate Trust induction and mandatory IG Training via the IT Training department Line Managers are responsible for: Monitoring staff compliance of the policy (see monitoring section) Monitoring staff time spent on personal use of the internet and services.(see monitoring section) Instigating further investigations arising out of suspected misuse. Taking action regarding misuse in accordance with the Trust s Disciplinary Policy. Reporting non-compliance to this policy and other security violations via the HIRS All users of Trust and Internet services are responsible for Reading and complying with this policy and associated guidelines. Reporting non-compliance to this policy and other security violations via HIRS. Ensuring compliance with guidelines for the records management of boxes. E.g. regularly deleting items no longer needed. This version (v3.0) December 2014 Page 14 of 16 Next review December 2016

15 Adhering to the NHS Mail Acceptable Use Policy when using NHS Mail. Ensuring they do not engage in activity contrary to this and other related policies This version (v3.0) December 2014 Page 15 of 16 Next review December 2016

16 12 APPENDIX A - PLAN FOR DISSEMINATION Title of document: , Internet & Social Networking Policy Date finalised: Previous document already being used? Yes Dissemination lead: Print name and contact details Colin Owen If yes, in what format and where? Via the Intranet Proposed action to retrieve outof-date copies of the document: Not applicable. Describe the plans for dissemination of the document to specific people / groups in specified formats and if appropriate with relevant training IG Committee via Dissemination Record - to be used once document is ratified. Date put on register / library of policy or procedural documents 04/03/2015 Date due to be reviewed 31/03/2017 Notes This version (v3.0) December 2014 Page 16 of 16 Next review December 2016

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Use of the Internet and E-Mail Policy

Use of the Internet and E-Mail Policy Use of the Internet and E-Mail Policy This procedural documentsupersedes : Use of the Internet and E-Mail Policy CORP/EMP 16 v.4 Name and title of author/reviewer Samantha Francis HR Advisor Date revised

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

Email Usage Policy Document Profile Box

Email Usage Policy Document Profile Box Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Internet, Social Networking and Telephone Policy

Internet, Social Networking and Telephone Policy Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

HAZELDENE LOWER SCHOOL

HAZELDENE LOWER SCHOOL HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

Notice: Page 1 of 11. Internet Acceptable Use Policy. v1.3

Notice: Page 1 of 11. Internet Acceptable Use Policy. v1.3 Notice: Plymouth Community Healthcare Community Interest Company adopted all Provider policies from NHS Plymouth when it became a new organisation on 1 October 2011. Please note that policies will be reviewed

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

INTERNET ACCEPTABLE USE POLICY

INTERNET ACCEPTABLE USE POLICY INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

DIOCESE OF DALLAS. Computer Internet Policy

DIOCESE OF DALLAS. Computer Internet Policy DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

Virginia Commonwealth University Police Department

Virginia Commonwealth University Police Department Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

SOCIAL MEDIA POLICY. Introduction

SOCIAL MEDIA POLICY. Introduction Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

Acceptable Use Policy

Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,

More information

Acceptable Use of Information Technology

Acceptable Use of Information Technology Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:

More information

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance. 1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable

More information

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY STATEMENT: Many of our employees have access to the internet as well as email capabilities. The County recognizes that these

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011 West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Organizational Policy

Organizational Policy Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

Acceptable Usage Policy

Acceptable Usage Policy Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY

More information

and Internet Policy

and Internet Policy Email and Internet Policy Responsible Officer Authors Date effective from July 2008 Ben Bennett, Business Planning & Resources Director Policy Development Group Date last amended December 2012 Review date

More information

section 15 Computers, Email, Internet, and Communications

section 15 Computers, Email, Internet, and Communications section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property

More information

Acceptable Use of Information. and Communication Systems Policy

Acceptable Use of Information. and Communication Systems Policy Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

Riverside Unified School District Acceptable Use Policy for Employee Use of Technology Resources (Based on Rules and Regulations #4040)

Riverside Unified School District Acceptable Use Policy for Employee Use of Technology Resources (Based on Rules and Regulations #4040) Riverside Unified School District Acceptable Use Policy for Employee Use of Technology Resources (Based on Rules and Regulations #4040) It is the policy of the Riverside Unified School District (RUSD or

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Social Media Policy. Policies and Procedures. Social Media Policy

Social Media Policy. Policies and Procedures. Social Media Policy Policies and Procedures Social Media Policy 1 1. Introduction...3 2. Privacy settings and personal information.....3 3. Use of Social Media at Work.....4 4. Account Administrators and Login Details......4

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

Sample Employee Network and Internet Usage and Monitoring Policy

Sample Employee Network and Internet Usage and Monitoring Policy CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy

OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy SECTION OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy 1 Purpose 1 2 Principles 1 3 Telephone Use 2 4 Postal Mail 2 5 Email Use 3 6 Internet Use 3 7 Social

More information

TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Status: Final. Version Date Author Reason

TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Status: Final. Version Date Author Reason TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Reference Number HR 2012 046 Version: 1 Status: Final Author: Jane Thomas Job Title HR Manager Amendment

More information

POLICY ON USE OF INTERNET AND EMAIL

POLICY ON USE OF INTERNET AND EMAIL POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic

More information

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy 1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

REGION 19 HEAD START. Acceptable Use Policy

REGION 19 HEAD START. Acceptable Use Policy REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions

More information

Acceptable Use of Information and Communication Systems Policy

Acceptable Use of Information and Communication Systems Policy Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

1.0 Overview. 4.0 Policy 4.1 General Use and Ownership

1.0 Overview. 4.0 Policy 4.1 General Use and Ownership 1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.

More information

Insert GNIS Logo Here. Acceptable Use Policy & Guidelines Information Technology Policies & Procedures. Guangzhou Nanhu International School

Insert GNIS Logo Here. Acceptable Use Policy & Guidelines Information Technology Policies & Procedures. Guangzhou Nanhu International School Insert GNIS Logo Here Acceptable Use Policy & Guidelines Information Technology Policies & Procedures Guangzhou Nanhu International School May, 2013 Table of Contents 1 Overview...1 2 Purpose...1 3 Scope...1

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

Information Governance Policy

Information Governance Policy Author: Susan Hall, Information Governance Manager Owner: Fiona Jamieson, Assistant Director of Healthcare Governance Publisher: Compliance Unit Date of first issue: February 2005 Version: 5 Date of version

More information

ACCEPTABLE USAGE PLOICY

ACCEPTABLE USAGE PLOICY ACCEPTABLE USAGE PLOICY Business Terms - February 2012 ACCEPTABLE USAGE POLICY Business Terms Version February 2012 Acceptable Usage Policy Feb12.Docx 1 Contents 1. INTRODUCTION... 3 2. PURPOSE... 3 3.

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture

More information

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing

More information

Social Media Policy. Author (name and designation) Heather Edwards, Head of Communications

Social Media Policy. Author (name and designation) Heather Edwards, Head of Communications Document type: Version: Social Media Policy Policy Author (name and designation) Heather Edwards, Head of Communications Ratified by: Date ratified: Name of responsible committee/individual: Two Exec Board

More information

Commonwealth Office of Technology

Commonwealth Office of Technology Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline

More information

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Odessa College Use of Computer Resources Policy Policy Date: November 2010 Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information