Employee Monitoring Prepared for SurfControl by Hammonds
|
|
- Rosa Walters
- 8 years ago
- Views:
Transcription
1 The Legal Guide to Employee Monitoring Prepared for SurfControl by Hammonds UK Edition
2 T H E L E G A L G U I D E T O E M P L O Y E E M O N I T O R I N G Prepared for SurfControl by 1 Notice: This document serves as a guide for general information only; it should not be considered as legal advice. We make no warranty and accept no liability as to the accuracy or suitability of the guidelines contained herein. We advise organisations to seek individual legal advice prior to any implementation.
3 Sue Nickson, partner and national head of employment law at Hammonds looks at the importance of having an Internet policy. The subject of monitoring in the workplace always catches the interest of the press. It was back in 2000, but everybody still remembers the lewd sent to a Norton Rose lawyer from his girlfriend, which was forwarded to six colleagues and ended up being circulated worldwide. Mobile phone network operator Orange dismissed 40 members of staff for distribution of inappropriate material, stockbrokers Merrill Lynch dismissed 15 employees for sending offensive material on its system and in 2002 Hewlett Packard sacked two and suspended a further 150 for viewing and sharing inappropriate material. 2 The Human Rights Act 1998 came into force in October 2000 and implemented in the UK the European Convention on Human Rights (the Convention). The potential consequences for employers were clear from the decision of the European Court of Human Rights in the case of Halford v United Kingdom 1997 IRR471. Alison Halford, a senior police officer, alleged that her employer had tapped her private line work telephone. She successfully claimed that this was a breach of her right to privacy under Article 8 of the Convention. It was held that as her employer had not given her any prior warning that her telephone calls were liable to interception, she would have had a reasonable expectation of privacy for calls made on the private facility her office provided. The fact that the calls were made from the workplace did not mean that her right to privacy did not apply. It follows that the same principles will apply to communications and Internet use as to telephone calls. At the same time that the Human Rights Act came into force the Regulation of Investigatory Powers Act 2000 ("the RIP Act") updated the legislation governing the interception and monitoring of communications. It provided for both civil and criminal liability and made it unlawful to intentionally intercept communications over a public or private telecommunications system without lawful authority. A defence would only be available if it was reasonably believed that both parties to the communication consented to the
4 T H E L E G A L G U I D E T O E M P L O Y E E M O N I T O R I N G interception. Recognising that this would prevent monitoring of most workplace communications, further regulations were issued authorising the monitoring of communications where reasonably required for business purposes. The Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 ("the Regulations") provided that an employer retains the right to carry out monitoring despite the fact the employee has not given their express consent, if such monitoring is required to carry out the following: 3 recording evidence of business transactions preventing or detecting criminal activity ensuring compliance with regulatory or self-regulatory guidelines maintaining the effective operation of the employer's systems (e.g. preventing viruses) monitoring standards of training and service preventing the unauthorised use of the computer/telephone system - i.e. ensuring the employee does not breach the company's or telephone policies. Nonetheless, the Regulations provided that it would be necessary for an employer to take reasonable steps to inform employees that their communications might be intercepted. On 11 June 2003 Part 3 of the Data Protection Code on Employment Practices, entitled "Monitoring at Work" was published. This gives guidance on how employers should comply with the provisions of the Data Protection Act The interception of s is a form of data processing and therefore the employer has to comply with the Data Protection principles, including considering whether the monitoring intrudes unnecessarily on the employee's privacy. In particular, care should be exercised when monitoring communications that are clearly personal. Employers should avoid opening these s or confine monitoring to headings/addresses. Further, if access to an employee's or voic account is required while they are on holiday they should be informed in advance. The Code suggests that employers should: actively consider whether the risk that monitoring is designed to address justifies the intrusion into individuals' privacy by monitoring undertake spot checks rather than continuous monitoring limit monitoring to traffic data rather than the contents of communications as far as possible, automate the monitoring so as to reduce the extent to which extraneous information is made available to any person other than the parties to a communication target monitoring on areas of highest risk
5 The Code provides benchmarks that employers are expected to meet in order to comply with the Data Protection Act. It is clear that in any prosecution or other enforcement action account will be taken of the employer's regard for these particular benchmarks and the uncontested first benchmark for employers is to: Establish, document and communicate a policy on the use of electronic communications systems. 4 Is in writing There is a clear and absolute need for employers to have an Acceptable Use Policy (AUP) in place that is made known to all their employees. The risks that an employer will face if they do not put into place such a policy can be seen from the decision in the case of Dunn v IBM United Kingdom Ltd ET Case Number /97. Here the employee was summarily dismissed for accessing pornography on the Internet. The tribunal upheld the claim for unfair dismissal as it was not a case where there was a clear breach of company policy such as to automatically warrant summary dismissal. The uncertainty that an employer faces with such an unfair dismissal claim can be avoided with a policy that complies with the following minimum requirements: Is clearly communicated to all employees Sets out permissible uses of both and Internet Specifies the prohibited/inappropriate uses States what monitoring, if any, will take place Sets out acceptable on-line behaviour Stipulates unauthorised access areas Sets out privacy rules in relation to other users Sets out privacy rules in relation to employer's right to monitor and the nature and extent of such monitoring Stipulates possible disciplinary consequences for breach of rules
6 T H E L E G A L G U I D E T O E M P L O Y E E M O N I T O R I N G Ideally, the policy should also: 5 Set out any restrictions e.g. size/type of attachments that can be sent or received Set out the reasons for monitoring, the extent of monitoring and the means used giving examples of types of material Set out any restrictions on material that can be viewed or copied, Outline how the policy is enforced and penalties that exist for a breach of policy. It is an area that cannot be ignored as even leading companies have found to their cost. In the majority of the cases the offensive material being viewed or passed on is pornographic. The employer who doesn't deal with this issue may be at risk of facing constructive dismissal, discrimination claims or even criminal prosecution. In the case of Morse v Future Reality it was held that the downloading and viewing of sexually explicit images in the workplace by male workers did constitute sexual harassment if it makes the working environment uncomfortable for a female co-worker. It's worth remembering that compensation for discrimination is not capped. Conclusion In conclusion, employers who fail to put in place a relevant policy are at risk of a myriad of different claims, both civil and criminal. To minimise liability employers should consider putting in place, without delay, a carefully drafted Acceptable Use Policy (AUP) and Disciplinary Procedure and ensure that all employees are aware of the contents and implications of the policies. There is little point in having policies in place if employees are not aware of their contents. Failure to put employees on notice of the contents of these policies may affect an employer s right to take action against an employee for a breach of the policies if the employee is not aware either that usage is being monitored or that inappropriate usage could lead to disciplinary action up to and including dismissal. Therefore an AUP should link in closely with the Company s Disciplinary Procedure and Bullying and Harassment procedures.
7 However, no employer should only rely on a single solution when it comes to security. A simple three stage process offers the best protection for an organisation, its people and its assets. This process is: Policy As this guide outlines, a well written and communicated policy is key to providing legal support to an organisation s overall business strategy and allowing it to operate in a clearly defined way. 6 Education Organisations need to do more to use their own staff as a layer of protection by educating them better on how to use Internet and resources in a more efficient and secure way while protecting information, adhering to compliance issues and supporting the security infrastructure of the organisation. This helps workers become part of the solution rather than, as is often regarded, part of the problem. Technology Technology can be implemented to act as the safety net that enforces a company s own Acceptable Use Policy; but also to notify when a breach has been attempted. This will stop the majority of Internet use transgression in the workplace, provide information on general network traffic and enhance security systems already in place. For more information on how Internet filtering technologies can support your business go to:
8 All Internet content you read, send and receive carries a risk! SurfControl Web & Filter give you the tools you need to implement and enforce your own Acceptable Use Policy. Only SurfControl gives you THE TOTAL SOLUTION for comprehensive protection against harmful and inappropriate Internet content risks. REAL Security is a 3 stage integrated process of: 1 Policy - have an Acceptable Use Policy (AUP) in writing and communicate it to all employees 2 Education - give staff specific training on security issues 3 Technology - use filtering technology as your safety net FREE Guides & White Papers: How to write an AUP UK Legal Guide to Staff Monitoring Corporate Governance White Paper 7 Tips to Enforcing Corporate Governance Policy on your Network Download Now: FREE 30 Day Trial of our Software Products: SurfControl Web Filter SurfControl Filter SurfControl Instant Message Filter Download Now:
The Legal Guide to Employee Monitoring
Written on behalf of SurfControl >Notice This document serves as a guide for general information only; it should not be considered as legal advice. We make no warranty and accept no liability as to the
More informationworkplace efficiency and compliance with Impero
white paper: employee monitoring workplace efficiency and compliance with Impero task Keep employees on task whilst ensuring compliance with acceptable use policies solution Deploy a granular monitoring
More informationHow to Monitor Employee Web Browsing and Email Legally
WHITEPAPER: HOW TO MONITOR EMPLOYEE WEB BROWSING AND EMAIL LEGALLY How to Monitor Employee Web Browsing and Email Legally ABSTRACT The Internet and email are indispensable resources in today s business
More informationMonitoring Employee Communications: Data Protection and Privacy Issues
Monitoring Employee Communications: Data Protection and Privacy Issues By Anthony Sakrouge, Kate Minett, Daniel Preiskel and Jose Saras Reprinted from Computer and Telecommunications Law Review Issue 8,
More informationInformation Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
More informationINFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
More informationAdvice leaflet Internet and e-mail policies
Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.
More informationSTFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
More informationICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
More informationKnow. Your. Rights. Understanding. grievances. www.worksmart.org.uk. and disciplinaries
Understanding Know Your Rights www.worksmart.org.uk grievances and disciplinaries Introduction Whatever job you do, you can run into problems at work. Sometimes these can be sorted out quickly by informal
More informationINTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
More informationUNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
More informationUsing Public Computer Services in Somerset Libraries
Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which
More informationSOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS
These terms of use govern your use of our site. Please read the whole of these terms in full before you use this Website. If you do not accept these terms, please do not use this Website. Your continued
More informationUse of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013
Use of Social Networking Websites Policy START DATE: March, 2013 NEXT REVIEW: March 2015 COMMITTEE APPROVAL: Joint Management Trade Union Committee CHAIR S SIGNATURE: STAFF SIDE CHAIR S SIGNATURE: DATE:
More informationMonitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
More informationInternet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
More informationInternet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
More informationInformation Systems Acceptable Use Policy for Learners
Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs
More informationITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
More informationNEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE
1. Scope and Purpose NEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE 1.1 Newman University [hereafter referred to as the University] recognises disciplinary rules and procedures are necessary for the
More informationAcceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
More informationSURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
More informationWest Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011
West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer
More informationLegal Risks Associated With Email and Internet Use and Abuse by Employees
February 2004 Legal Risks Associated With Email and Internet Use and Abuse by Employees The potential for abuse of email and Internet facilities provided at the workplace is virtually limitless and could
More informationPolicy No: 2-B8. Originally Released: 2001. Date for Review: 2016
Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for
More informationEmployment Law Guide
Employment Law Guide Settlement Agreements (Formally known as Compromise Agreements) See the separate guide. Unfair Dismissal Length of employment Employees can only bring a claim for ordinary unfair dismissal
More informationOtley Town Council. Disciplinary Policy. Date Approved: 17 th February 2014 Revision Date:
Otley Town Council Disciplinary Policy Date Approved: 17 th February 2014 Revision Date: OTLEY TOWN COUNCIL DISCIPLINARY POLICY 1.0 Introduction 1.1 This policy is based on and complies with the 2009 ACAS
More informationTECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
More informationPractical guide... termination of employment
The decision to dismiss an employee is an area of the employment relationship that requires an understanding of a wide range of legislative and other obligations of an employer. The decision is also a
More informationAcceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
More informationDISCIPLINARY PROCEDURE
DISCIPLINARY PROCEDURE 1. Purpose and Scope 1.1 The Company s procedure is designed to help and encourage all workers to achieve and maintain standards of conduct, attendance and job performance. The Company
More informationTerms and conditions of use
Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree
More informationTerms and conditions of use
Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree
More informationDisciplinary and grievance procedures Draft Acas Code of Practice
Disciplinary and grievance procedures Draft Acas Code of Practice June 2004 This Code of Practice provides practical guidance to employers, workers and their representatives on: The statutory requirements
More informationCovered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
More informationDISCIPLINARY PROCEDURE
DISCIPLINARY PROCEDURE This procedure accompanies Woking Mind disciplinary policy Document History Version Date Drafted by Authorised by Reason for revision This policy was approved on 10/08/2011 and will
More informationGENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation
More informationJohn of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
More informationQuick guide to the employment practices code
Data protection Quick guide to the employment practices code Ideal for the small business Contents 3 Contents Section 1 About this guidance 4 Section 2 What is the Data Protection Act? 5 Section 3 Recruitment
More informationControlling Employee Electronic Communications. slaughter and may. August 2006
Controlling Employee Electronic Communications slaughter and may August 2006 contents 1. Introduction 2. The Regulation of Investigatory Powers Act 2000 1 2.1 What is interception? 2 2.2 What is lawful
More informationJIB NATIONAL WORKING RULES 19 AND 20
JIB NATIONAL WORKING RULES 19 AND 20 19. DISCIPLINARY AND DISMISSAL PROCEDURE 19.1 INTRODUCTION For the avoidance of doubt, the term operative includes apprentice for the purpose of this Rule The behaviours
More informationMODEL DISCIPLINARY PROCEDURE FOR SMALL ORGANISATIONS
MODEL DISCIPLINARY PROCEDURE FOR SMALL ORGANISATIONS Employers should comply with the Acas Code of Practice for disciplinary and grievance procedures which can be downloaded from www.acas.org.uk/dgcode2009.
More informationDISCIPLINARY AND GRIEVANCE ARRANGEMENTS. the disciplinary process: how councils can deal with concerns about employee
Legal Topic Note LTN 22 January 2013 DISCIPLINARY AND GRIEVANCE ARRANGEMENTS 1. This LTN provides guidance on: the disciplinary process: how councils can deal with concerns about employee misconduct or
More informationLittle Stoke Primary School
Little Stoke Primary School A Model Disciplinary Procedure for Staff Employed in Locally Managed Schools This Policy complies with the ACAS Code of Practice and ACAS Guide to Discipline and Grievances
More informationDISCIPLINARY POLICY AND PROCEDURE
DISCIPLINARY POLICY AND PROCEDURE Content Policy statement 1. Principles 2. Standards 3. Disciplinary procedure 4. Investigation
More informationLegal Risks and Liabilities for IT Services in Higher and Further Education
Legal Risks and Liabilities for IT Services in Higher and Further Education Universities and colleges might incur legal liabilities through the provision and operation of their IT facilities and may be
More informationEmployment law solicitors
Employment law solicitors At Millbank solicitors we are dedicated to providing prompt and practical employment advice to both employers and employees. Our expert lawyers appreciate and understand the ever
More informationInternet, Social Media and Email Policy
West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...
More informationSt. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationSocial media and employment law do s and don ts
Social media and employment law do s and don ts August 2014 @heenanrachael @capsticksllp Social Media Today s Session Social Media HR Hotspots Recruitment and social media What the Tribunals think Managing
More informationTERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )
TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide
More informationInformation Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
More informationBroadband Acceptable Use Policy
Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2
More informationS E R V E R C E N T R E H O S T I N G
S E R V E R C E N T R E H O S T I N G Managed Hosting Microsoft Lync - Service Level Agreement Server Centre Hosting Limited Master Version - 2.1 Server Centre Hosting Ltd, The Old Public House, 3 Watnall
More informationRevised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
More informationComputer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
More informationCompany Mobile Phone Policy
Company Mobile Phone Policy Policy Clifford House Fostering is committed to ensuring that adequate communication facilities are available to its staff in order for them to carry out their normal daily
More informationDISCIPLINE RUTLAND. limited by guarantee. Registered in England and Wales.
DISCIPLINE POLICY FOR STAFF OCTOBER 2014 HARINGTON SCHOOL RUTLAND office@haringtonschool.com www. haringtonschool.com Harington School. Registered Company Number 9031174. Company limited by guarantee.
More informationConditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
More informationMerthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
More informationEmail & Internet Policy
Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible
More informationEmail Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
More informationE-Mail and Internet Policy
E-Mail and Internet Policy Document reference Title: E-Mail and Internet Policy Product ID: Version Number: 8.0 Status: Live Distribution / Issue date: 12 November 2014 Author: K. Fairbrother Review Period:
More informationGlasgow Kelvin College. Disciplinary Policy and Procedure
Appendix 1 Glasgow Kelvin College Disciplinary Policy and Procedure Document Control Information Status: Responsibility for Document and its implementation Responsibility for document review: Current version
More informationTerms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
More informationElectronic Communications and. Guidance note and template policy
Electronic Communications and Internet policy Guidance note and template policy When employing staff it is useful to create a policy which sets out your standards and requirements of your staff when they
More informationINTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
More informationHTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications
Page 1 of 5 HTC Communications ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE This Acceptable Use Policy ( AUP ) governs high speed Internet service provided to you by HTC Communications (together
More informationInformation Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
More informationEmbedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
More informationINTERNET, EMAIL AND PHONE SYSTEMS
Upper Great Southern Family Support Association Inc Policy On INTERNET, EMAIL AND PHONE SYSTEMS Date Adopted: November 2010 Date Revised: March 2013 Review Date: March 2014 Upper Great Southern Family
More informationE- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
More informationWHITEPAPER 5 Reasons HR Professionals Are Adopting SaaS Email Image Filtering
WHITEPAPER 5 Reasons HR Professionals Are Adopting SaaS Email Image Filtering Litigation for sexual harassment resulting from inappropriate exposure to pornography can have a massive impact on brands,
More informationTrinity Online Application - Terms and Conditions of Use
IMPORTANT NOTICE PLEASE READ THE FOLLOWING TERMS AND CONDITIONS CAREFULLY. IF YOU DO NOT AGREE WITH THESE TERMS AND CONDITIONS, YOU MUST NOT USE THIS APPLICATION. BY USING THIS APPLICATION AND/OR ANY OF
More informationBOROUGHBRIDGE TOWN COUNCIL S DISCIPLINARY AND GRIEVANCE POLICY
BOROUGHBRIDGE TOWN COUNCIL S DISCIPLINARY AND GRIEVANCE POLICY 1 HALL SQUARE, BOROUGHBRIDGE, NORTH YORKSHIRE, YO51 9AN www.boroughbridge.org.uk info@boroughbridge.org.uk Tel: 01423 322956 BOROUGHBRIDGE
More informationDene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
More informationCARRAMAR PUBLIC SCHOOL
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
More informationPolicy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
More informationHallett Cove South Primary School Communications/Network Use Policy
Hallett Cove South Primary School Communications/Network Use Policy The Communications/Network Use Policy ( Policy ) sets out the rights and responsibilities for computer and communications network users
More informationNETHERAVON ALL SAINTS CE PRIMARY SCHOOL
NETHERAVON ALL SAINTS CE PRIMARY SCHOOL DISCIPLINARY PROCEDURE FOR ACADEMY TEACHING AND SUPPORT STAFF Adopted by Netheravon All Saints Academy Trust on 23/9/15 Signed (Chair of Governors): 1 Index Section
More informationDISCIPLINARY PROCEDURES
DISCIPLINARY PROCEDURES Employers should comply with the Acas Code of Practice for disciplinary and grievance procedures which can be downloaded from www.acas.org.uk/dgcode2009. Otherwise they could face
More informationEASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
More informationNEW STATUTORY DISMISSAL, DISCIPLINARY AND GRIEVANCE PROCEDURES
September 2004 NEW STATUTORY DISMISSAL, DISCIPLINARY AND GRIEVANCE PROCEDURES With effect from 1 October 2004, new statutory dismissal and disciplinary procedures ("DDP") and grievance procedures ("GP")
More informationDISCIPLINARY PROCEDURE
DISCIPLINARY PROCEDURE Author: Julie Newnham Revised : August 2013 Review Date: August 2014 Students First DISCIPLINARY PROCEDURES 1 Scope and purpose 1.1 This procedure applies to all employees other
More informationThe employee is responsible for adhering to the standards of performance and behaviour set by Nansen Highland.
Disciplinary and dismissal procedure Introduction The disciplinary policy complies with the ACAS statutory Code of Practice on discipline and grievance. The policy aims to ensure that all employees are
More informationSchool Web Design Ltd Acceptable Use Policy. 1. Definitions. 2. Resource Usage. 3. Prohibited Uses
School Web Design Ltd Acceptable Use Policy The Policy below outlines the terms under which you the You, the Client may use the File Hosting Service provided by School Web Design. By using our File Hosting
More informationAcceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
More informationDocument Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015
Category Human Resources Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015 Related Documents Name Support
More information[Example] Social Media Acceptable Use Policy
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
More informationIf you have any questions about any of our policies, please contact the Customer Services Team.
Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More information719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and
More informationNOT PROTECTIVELY MARKED
PEOPLE AND ORGANISATIONAL DEVELOPMENT HUMAN RESOURCES DISCIPLINARY POLICY AND PROCEDURE Author/Role Fiona Munro, Human Resources Date of Risk Assessment (if applicable) N/A Date of Equality Impact Assessment
More informationDiscipline. Managing People. VOIP 2000 - HR Direct Fife Council April 2015 1 DI02. P o l i c y a n d P r o c e d u r e. 1 Purpose and Scope
Discipline P o l i c y a n d P r o c e d u r e 1 Purpose and Scope This procedure is designed to help and encourage all employees to achieve and maintain standards of conduct. This procedure applies to
More informationRegulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen
More information