Employee Monitoring Prepared for SurfControl by Hammonds

Size: px
Start display at page:

Download "Employee Monitoring Prepared for SurfControl by Hammonds"

Transcription

1 The Legal Guide to Employee Monitoring Prepared for SurfControl by Hammonds UK Edition

2 T H E L E G A L G U I D E T O E M P L O Y E E M O N I T O R I N G Prepared for SurfControl by 1 Notice: This document serves as a guide for general information only; it should not be considered as legal advice. We make no warranty and accept no liability as to the accuracy or suitability of the guidelines contained herein. We advise organisations to seek individual legal advice prior to any implementation.

3 Sue Nickson, partner and national head of employment law at Hammonds looks at the importance of having an Internet policy. The subject of monitoring in the workplace always catches the interest of the press. It was back in 2000, but everybody still remembers the lewd sent to a Norton Rose lawyer from his girlfriend, which was forwarded to six colleagues and ended up being circulated worldwide. Mobile phone network operator Orange dismissed 40 members of staff for distribution of inappropriate material, stockbrokers Merrill Lynch dismissed 15 employees for sending offensive material on its system and in 2002 Hewlett Packard sacked two and suspended a further 150 for viewing and sharing inappropriate material. 2 The Human Rights Act 1998 came into force in October 2000 and implemented in the UK the European Convention on Human Rights (the Convention). The potential consequences for employers were clear from the decision of the European Court of Human Rights in the case of Halford v United Kingdom 1997 IRR471. Alison Halford, a senior police officer, alleged that her employer had tapped her private line work telephone. She successfully claimed that this was a breach of her right to privacy under Article 8 of the Convention. It was held that as her employer had not given her any prior warning that her telephone calls were liable to interception, she would have had a reasonable expectation of privacy for calls made on the private facility her office provided. The fact that the calls were made from the workplace did not mean that her right to privacy did not apply. It follows that the same principles will apply to communications and Internet use as to telephone calls. At the same time that the Human Rights Act came into force the Regulation of Investigatory Powers Act 2000 ("the RIP Act") updated the legislation governing the interception and monitoring of communications. It provided for both civil and criminal liability and made it unlawful to intentionally intercept communications over a public or private telecommunications system without lawful authority. A defence would only be available if it was reasonably believed that both parties to the communication consented to the

4 T H E L E G A L G U I D E T O E M P L O Y E E M O N I T O R I N G interception. Recognising that this would prevent monitoring of most workplace communications, further regulations were issued authorising the monitoring of communications where reasonably required for business purposes. The Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 ("the Regulations") provided that an employer retains the right to carry out monitoring despite the fact the employee has not given their express consent, if such monitoring is required to carry out the following: 3 recording evidence of business transactions preventing or detecting criminal activity ensuring compliance with regulatory or self-regulatory guidelines maintaining the effective operation of the employer's systems (e.g. preventing viruses) monitoring standards of training and service preventing the unauthorised use of the computer/telephone system - i.e. ensuring the employee does not breach the company's or telephone policies. Nonetheless, the Regulations provided that it would be necessary for an employer to take reasonable steps to inform employees that their communications might be intercepted. On 11 June 2003 Part 3 of the Data Protection Code on Employment Practices, entitled "Monitoring at Work" was published. This gives guidance on how employers should comply with the provisions of the Data Protection Act The interception of s is a form of data processing and therefore the employer has to comply with the Data Protection principles, including considering whether the monitoring intrudes unnecessarily on the employee's privacy. In particular, care should be exercised when monitoring communications that are clearly personal. Employers should avoid opening these s or confine monitoring to headings/addresses. Further, if access to an employee's or voic account is required while they are on holiday they should be informed in advance. The Code suggests that employers should: actively consider whether the risk that monitoring is designed to address justifies the intrusion into individuals' privacy by monitoring undertake spot checks rather than continuous monitoring limit monitoring to traffic data rather than the contents of communications as far as possible, automate the monitoring so as to reduce the extent to which extraneous information is made available to any person other than the parties to a communication target monitoring on areas of highest risk

5 The Code provides benchmarks that employers are expected to meet in order to comply with the Data Protection Act. It is clear that in any prosecution or other enforcement action account will be taken of the employer's regard for these particular benchmarks and the uncontested first benchmark for employers is to: Establish, document and communicate a policy on the use of electronic communications systems. 4 Is in writing There is a clear and absolute need for employers to have an Acceptable Use Policy (AUP) in place that is made known to all their employees. The risks that an employer will face if they do not put into place such a policy can be seen from the decision in the case of Dunn v IBM United Kingdom Ltd ET Case Number /97. Here the employee was summarily dismissed for accessing pornography on the Internet. The tribunal upheld the claim for unfair dismissal as it was not a case where there was a clear breach of company policy such as to automatically warrant summary dismissal. The uncertainty that an employer faces with such an unfair dismissal claim can be avoided with a policy that complies with the following minimum requirements: Is clearly communicated to all employees Sets out permissible uses of both and Internet Specifies the prohibited/inappropriate uses States what monitoring, if any, will take place Sets out acceptable on-line behaviour Stipulates unauthorised access areas Sets out privacy rules in relation to other users Sets out privacy rules in relation to employer's right to monitor and the nature and extent of such monitoring Stipulates possible disciplinary consequences for breach of rules

6 T H E L E G A L G U I D E T O E M P L O Y E E M O N I T O R I N G Ideally, the policy should also: 5 Set out any restrictions e.g. size/type of attachments that can be sent or received Set out the reasons for monitoring, the extent of monitoring and the means used giving examples of types of material Set out any restrictions on material that can be viewed or copied, Outline how the policy is enforced and penalties that exist for a breach of policy. It is an area that cannot be ignored as even leading companies have found to their cost. In the majority of the cases the offensive material being viewed or passed on is pornographic. The employer who doesn't deal with this issue may be at risk of facing constructive dismissal, discrimination claims or even criminal prosecution. In the case of Morse v Future Reality it was held that the downloading and viewing of sexually explicit images in the workplace by male workers did constitute sexual harassment if it makes the working environment uncomfortable for a female co-worker. It's worth remembering that compensation for discrimination is not capped. Conclusion In conclusion, employers who fail to put in place a relevant policy are at risk of a myriad of different claims, both civil and criminal. To minimise liability employers should consider putting in place, without delay, a carefully drafted Acceptable Use Policy (AUP) and Disciplinary Procedure and ensure that all employees are aware of the contents and implications of the policies. There is little point in having policies in place if employees are not aware of their contents. Failure to put employees on notice of the contents of these policies may affect an employer s right to take action against an employee for a breach of the policies if the employee is not aware either that usage is being monitored or that inappropriate usage could lead to disciplinary action up to and including dismissal. Therefore an AUP should link in closely with the Company s Disciplinary Procedure and Bullying and Harassment procedures.

7 However, no employer should only rely on a single solution when it comes to security. A simple three stage process offers the best protection for an organisation, its people and its assets. This process is: Policy As this guide outlines, a well written and communicated policy is key to providing legal support to an organisation s overall business strategy and allowing it to operate in a clearly defined way. 6 Education Organisations need to do more to use their own staff as a layer of protection by educating them better on how to use Internet and resources in a more efficient and secure way while protecting information, adhering to compliance issues and supporting the security infrastructure of the organisation. This helps workers become part of the solution rather than, as is often regarded, part of the problem. Technology Technology can be implemented to act as the safety net that enforces a company s own Acceptable Use Policy; but also to notify when a breach has been attempted. This will stop the majority of Internet use transgression in the workplace, provide information on general network traffic and enhance security systems already in place. For more information on how Internet filtering technologies can support your business go to:

8 All Internet content you read, send and receive carries a risk! SurfControl Web & Filter give you the tools you need to implement and enforce your own Acceptable Use Policy. Only SurfControl gives you THE TOTAL SOLUTION for comprehensive protection against harmful and inappropriate Internet content risks. REAL Security is a 3 stage integrated process of: 1 Policy - have an Acceptable Use Policy (AUP) in writing and communicate it to all employees 2 Education - give staff specific training on security issues 3 Technology - use filtering technology as your safety net FREE Guides & White Papers: How to write an AUP UK Legal Guide to Staff Monitoring Corporate Governance White Paper 7 Tips to Enforcing Corporate Governance Policy on your Network Download Now: FREE 30 Day Trial of our Software Products: SurfControl Web Filter SurfControl Filter SurfControl Instant Message Filter Download Now:

The Legal Guide to Employee Monitoring

The Legal Guide to Employee Monitoring Written on behalf of SurfControl >Notice This document serves as a guide for general information only; it should not be considered as legal advice. We make no warranty and accept no liability as to the

More information

workplace efficiency and compliance with Impero

workplace efficiency and compliance with Impero white paper: employee monitoring workplace efficiency and compliance with Impero task Keep employees on task whilst ensuring compliance with acceptable use policies solution Deploy a granular monitoring

More information

How to Monitor Employee Web Browsing and Email Legally

How to Monitor Employee Web Browsing and Email Legally WHITEPAPER: HOW TO MONITOR EMPLOYEE WEB BROWSING AND EMAIL LEGALLY How to Monitor Employee Web Browsing and Email Legally ABSTRACT The Internet and email are indispensable resources in today s business

More information

Monitoring Employee Communications: Data Protection and Privacy Issues

Monitoring Employee Communications: Data Protection and Privacy Issues Monitoring Employee Communications: Data Protection and Privacy Issues By Anthony Sakrouge, Kate Minett, Daniel Preiskel and Jose Saras Reprinted from Computer and Telecommunications Law Review Issue 8,

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most

More information

Advice leaflet Internet and e-mail policies

Advice leaflet Internet and e-mail policies Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

Know. Your. Rights. Understanding. grievances. www.worksmart.org.uk. and disciplinaries

Know. Your. Rights. Understanding. grievances. www.worksmart.org.uk. and disciplinaries Understanding Know Your Rights www.worksmart.org.uk grievances and disciplinaries Introduction Whatever job you do, you can run into problems at work. Sometimes these can be sorted out quickly by informal

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

Using Public Computer Services in Somerset Libraries

Using Public Computer Services in Somerset Libraries Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which

More information

SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS

SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS These terms of use govern your use of our site. Please read the whole of these terms in full before you use this Website. If you do not accept these terms, please do not use this Website. Your continued

More information

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013 Use of Social Networking Websites Policy START DATE: March, 2013 NEXT REVIEW: March 2015 COMMITTEE APPROVAL: Joint Management Trade Union Committee CHAIR S SIGNATURE: STAFF SIDE CHAIR S SIGNATURE: DATE:

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

Internet, Social Networking and Telephone Policy

Internet, Social Networking and Telephone Policy Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

NEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE

NEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE 1. Scope and Purpose NEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE 1.1 Newman University [hereafter referred to as the University] recognises disciplinary rules and procedures are necessary for the

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

SURVEILLANCE AND PRIVACY

SURVEILLANCE AND PRIVACY info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act

More information

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011 West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer

More information

Legal Risks Associated With Email and Internet Use and Abuse by Employees

Legal Risks Associated With Email and Internet Use and Abuse by Employees February 2004 Legal Risks Associated With Email and Internet Use and Abuse by Employees The potential for abuse of email and Internet facilities provided at the workplace is virtually limitless and could

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

Employment Law Guide

Employment Law Guide Employment Law Guide Settlement Agreements (Formally known as Compromise Agreements) See the separate guide. Unfair Dismissal Length of employment Employees can only bring a claim for ordinary unfair dismissal

More information

Otley Town Council. Disciplinary Policy. Date Approved: 17 th February 2014 Revision Date:

Otley Town Council. Disciplinary Policy. Date Approved: 17 th February 2014 Revision Date: Otley Town Council Disciplinary Policy Date Approved: 17 th February 2014 Revision Date: OTLEY TOWN COUNCIL DISCIPLINARY POLICY 1.0 Introduction 1.1 This policy is based on and complies with the 2009 ACAS

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

Practical guide... termination of employment

Practical guide... termination of employment The decision to dismiss an employee is an area of the employment relationship that requires an understanding of a wide range of legislative and other obligations of an employer. The decision is also a

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

DISCIPLINARY PROCEDURE

DISCIPLINARY PROCEDURE DISCIPLINARY PROCEDURE 1. Purpose and Scope 1.1 The Company s procedure is designed to help and encourage all workers to achieve and maintain standards of conduct, attendance and job performance. The Company

More information

Terms and conditions of use

Terms and conditions of use Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree

More information

Terms and conditions of use

Terms and conditions of use Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree

More information

Disciplinary and grievance procedures Draft Acas Code of Practice

Disciplinary and grievance procedures Draft Acas Code of Practice Disciplinary and grievance procedures Draft Acas Code of Practice June 2004 This Code of Practice provides practical guidance to employers, workers and their representatives on: The statutory requirements

More information

Covered California. Terms and Conditions of Use

Covered California. Terms and Conditions of Use Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products

More information

DISCIPLINARY PROCEDURE

DISCIPLINARY PROCEDURE DISCIPLINARY PROCEDURE This procedure accompanies Woking Mind disciplinary policy Document History Version Date Drafted by Authorised by Reason for revision This policy was approved on 10/08/2011 and will

More information

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by : GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation

More information

John of Rolleston Primary School

John of Rolleston Primary School John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership

More information

Quick guide to the employment practices code

Quick guide to the employment practices code Data protection Quick guide to the employment practices code Ideal for the small business Contents 3 Contents Section 1 About this guidance 4 Section 2 What is the Data Protection Act? 5 Section 3 Recruitment

More information

Controlling Employee Electronic Communications. slaughter and may. August 2006

Controlling Employee Electronic Communications. slaughter and may. August 2006 Controlling Employee Electronic Communications slaughter and may August 2006 contents 1. Introduction 2. The Regulation of Investigatory Powers Act 2000 1 2.1 What is interception? 2 2.2 What is lawful

More information

JIB NATIONAL WORKING RULES 19 AND 20

JIB NATIONAL WORKING RULES 19 AND 20 JIB NATIONAL WORKING RULES 19 AND 20 19. DISCIPLINARY AND DISMISSAL PROCEDURE 19.1 INTRODUCTION For the avoidance of doubt, the term operative includes apprentice for the purpose of this Rule The behaviours

More information

MODEL DISCIPLINARY PROCEDURE FOR SMALL ORGANISATIONS

MODEL DISCIPLINARY PROCEDURE FOR SMALL ORGANISATIONS MODEL DISCIPLINARY PROCEDURE FOR SMALL ORGANISATIONS Employers should comply with the Acas Code of Practice for disciplinary and grievance procedures which can be downloaded from www.acas.org.uk/dgcode2009.

More information

DISCIPLINARY AND GRIEVANCE ARRANGEMENTS. the disciplinary process: how councils can deal with concerns about employee

DISCIPLINARY AND GRIEVANCE ARRANGEMENTS. the disciplinary process: how councils can deal with concerns about employee Legal Topic Note LTN 22 January 2013 DISCIPLINARY AND GRIEVANCE ARRANGEMENTS 1. This LTN provides guidance on: the disciplinary process: how councils can deal with concerns about employee misconduct or

More information

Little Stoke Primary School

Little Stoke Primary School Little Stoke Primary School A Model Disciplinary Procedure for Staff Employed in Locally Managed Schools This Policy complies with the ACAS Code of Practice and ACAS Guide to Discipline and Grievances

More information

DISCIPLINARY POLICY AND PROCEDURE

DISCIPLINARY POLICY AND PROCEDURE DISCIPLINARY POLICY AND PROCEDURE Content Policy statement 1. Principles 2. Standards 3. Disciplinary procedure 4. Investigation

More information

Legal Risks and Liabilities for IT Services in Higher and Further Education

Legal Risks and Liabilities for IT Services in Higher and Further Education Legal Risks and Liabilities for IT Services in Higher and Further Education Universities and colleges might incur legal liabilities through the provision and operation of their IT facilities and may be

More information

Employment law solicitors

Employment law solicitors Employment law solicitors At Millbank solicitors we are dedicated to providing prompt and practical employment advice to both employers and employees. Our expert lawyers appreciate and understand the ever

More information

Internet, Social Media and Email Policy

Internet, Social Media and Email Policy West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Social media and employment law do s and don ts

Social media and employment law do s and don ts Social media and employment law do s and don ts August 2014 @heenanrachael @capsticksllp Social Media Today s Session Social Media HR Hotspots Recruitment and social media What the Tribunals think Managing

More information

TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )

TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

S E R V E R C E N T R E H O S T I N G

S E R V E R C E N T R E H O S T I N G S E R V E R C E N T R E H O S T I N G Managed Hosting Microsoft Lync - Service Level Agreement Server Centre Hosting Limited Master Version - 2.1 Server Centre Hosting Ltd, The Old Public House, 3 Watnall

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

Company Mobile Phone Policy

Company Mobile Phone Policy Company Mobile Phone Policy Policy Clifford House Fostering is committed to ensuring that adequate communication facilities are available to its staff in order for them to carry out their normal daily

More information

DISCIPLINE RUTLAND. limited by guarantee. Registered in England and Wales.

DISCIPLINE RUTLAND. limited by guarantee. Registered in England and Wales. DISCIPLINE POLICY FOR STAFF OCTOBER 2014 HARINGTON SCHOOL RUTLAND office@haringtonschool.com www. haringtonschool.com Harington School. Registered Company Number 9031174. Company limited by guarantee.

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Merthyr Tydfil County Borough Council. Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

E-Mail and Internet Policy

E-Mail and Internet Policy E-Mail and Internet Policy Document reference Title: E-Mail and Internet Policy Product ID: Version Number: 8.0 Status: Live Distribution / Issue date: 12 November 2014 Author: K. Fairbrother Review Period:

More information

Glasgow Kelvin College. Disciplinary Policy and Procedure

Glasgow Kelvin College. Disciplinary Policy and Procedure Appendix 1 Glasgow Kelvin College Disciplinary Policy and Procedure Document Control Information Status: Responsibility for Document and its implementation Responsibility for document review: Current version

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

Electronic Communications and. Guidance note and template policy

Electronic Communications and. Guidance note and template policy Electronic Communications and Internet policy Guidance note and template policy When employing staff it is useful to create a policy which sets out your standards and requirements of your staff when they

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications Page 1 of 5 HTC Communications ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE This Acceptable Use Policy ( AUP ) governs high speed Internet service provided to you by HTC Communications (together

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

INTERNET, EMAIL AND PHONE SYSTEMS

INTERNET, EMAIL AND PHONE SYSTEMS Upper Great Southern Family Support Association Inc Policy On INTERNET, EMAIL AND PHONE SYSTEMS Date Adopted: November 2010 Date Revised: March 2013 Review Date: March 2014 Upper Great Southern Family

More information

E- Safety and Digital Photography - College ICT

E- Safety and Digital Photography - College ICT Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,

More information

WHITEPAPER 5 Reasons HR Professionals Are Adopting SaaS Email Image Filtering

WHITEPAPER 5 Reasons HR Professionals Are Adopting SaaS Email Image Filtering WHITEPAPER 5 Reasons HR Professionals Are Adopting SaaS Email Image Filtering Litigation for sexual harassment resulting from inappropriate exposure to pornography can have a massive impact on brands,

More information

Trinity Online Application - Terms and Conditions of Use

Trinity Online Application - Terms and Conditions of Use IMPORTANT NOTICE PLEASE READ THE FOLLOWING TERMS AND CONDITIONS CAREFULLY. IF YOU DO NOT AGREE WITH THESE TERMS AND CONDITIONS, YOU MUST NOT USE THIS APPLICATION. BY USING THIS APPLICATION AND/OR ANY OF

More information

BOROUGHBRIDGE TOWN COUNCIL S DISCIPLINARY AND GRIEVANCE POLICY

BOROUGHBRIDGE TOWN COUNCIL S DISCIPLINARY AND GRIEVANCE POLICY BOROUGHBRIDGE TOWN COUNCIL S DISCIPLINARY AND GRIEVANCE POLICY 1 HALL SQUARE, BOROUGHBRIDGE, NORTH YORKSHIRE, YO51 9AN www.boroughbridge.org.uk info@boroughbridge.org.uk Tel: 01423 322956 BOROUGHBRIDGE

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

CARRAMAR PUBLIC SCHOOL

CARRAMAR PUBLIC SCHOOL CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school

More information

Policy on Public and School Bus Closed Circuit Television Systems (CCTV)

Policy on Public and School Bus Closed Circuit Television Systems (CCTV) DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version

More information

Hallett Cove South Primary School Communications/Network Use Policy

Hallett Cove South Primary School Communications/Network Use Policy Hallett Cove South Primary School Communications/Network Use Policy The Communications/Network Use Policy ( Policy ) sets out the rights and responsibilities for computer and communications network users

More information

NETHERAVON ALL SAINTS CE PRIMARY SCHOOL

NETHERAVON ALL SAINTS CE PRIMARY SCHOOL NETHERAVON ALL SAINTS CE PRIMARY SCHOOL DISCIPLINARY PROCEDURE FOR ACADEMY TEACHING AND SUPPORT STAFF Adopted by Netheravon All Saints Academy Trust on 23/9/15 Signed (Chair of Governors): 1 Index Section

More information

DISCIPLINARY PROCEDURES

DISCIPLINARY PROCEDURES DISCIPLINARY PROCEDURES Employers should comply with the Acas Code of Practice for disciplinary and grievance procedures which can be downloaded from www.acas.org.uk/dgcode2009. Otherwise they could face

More information

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour

More information

NEW STATUTORY DISMISSAL, DISCIPLINARY AND GRIEVANCE PROCEDURES

NEW STATUTORY DISMISSAL, DISCIPLINARY AND GRIEVANCE PROCEDURES September 2004 NEW STATUTORY DISMISSAL, DISCIPLINARY AND GRIEVANCE PROCEDURES With effect from 1 October 2004, new statutory dismissal and disciplinary procedures ("DDP") and grievance procedures ("GP")

More information

DISCIPLINARY PROCEDURE

DISCIPLINARY PROCEDURE DISCIPLINARY PROCEDURE Author: Julie Newnham Revised : August 2013 Review Date: August 2014 Students First DISCIPLINARY PROCEDURES 1 Scope and purpose 1.1 This procedure applies to all employees other

More information

The employee is responsible for adhering to the standards of performance and behaviour set by Nansen Highland.

The employee is responsible for adhering to the standards of performance and behaviour set by Nansen Highland. Disciplinary and dismissal procedure Introduction The disciplinary policy complies with the ACAS statutory Code of Practice on discipline and grievance. The policy aims to ensure that all employees are

More information

School Web Design Ltd Acceptable Use Policy. 1. Definitions. 2. Resource Usage. 3. Prohibited Uses

School Web Design Ltd Acceptable Use Policy. 1. Definitions. 2. Resource Usage. 3. Prohibited Uses School Web Design Ltd Acceptable Use Policy The Policy below outlines the terms under which you the You, the Client may use the File Hosting Service provided by School Web Design. By using our File Hosting

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015

Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015 Category Human Resources Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015 Related Documents Name Support

More information

[Example] Social Media Acceptable Use Policy

[Example] Social Media Acceptable Use Policy [Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.

More information

If you have any questions about any of our policies, please contact the Customer Services Team.

If you have any questions about any of our policies, please contact the Customer Services Team. Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) 719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and

More information

NOT PROTECTIVELY MARKED

NOT PROTECTIVELY MARKED PEOPLE AND ORGANISATIONAL DEVELOPMENT HUMAN RESOURCES DISCIPLINARY POLICY AND PROCEDURE Author/Role Fiona Munro, Human Resources Date of Risk Assessment (if applicable) N/A Date of Equality Impact Assessment

More information

Discipline. Managing People. VOIP 2000 - HR Direct Fife Council April 2015 1 DI02. P o l i c y a n d P r o c e d u r e. 1 Purpose and Scope

Discipline. Managing People. VOIP 2000 - HR Direct Fife Council April 2015 1 DI02. P o l i c y a n d P r o c e d u r e. 1 Purpose and Scope Discipline P o l i c y a n d P r o c e d u r e 1 Purpose and Scope This procedure is designed to help and encourage all employees to achieve and maintain standards of conduct. This procedure applies to

More information

Regulation of Investigatory Powers Act 2000

Regulation of Investigatory Powers Act 2000 Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen

More information