Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Size: px
Start display at page:

Download "Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy"

Transcription

1 Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs the use of computer and telephone systems at Sheridan. It applies to all staff, students and any other users of the telephone or computer systems at Sheridan. All Sheridan staff, students and any other users are responsible for reading and understanding this Policy. Please note that any violation of this Policy by Sheridan staff may result in serious sanctions up to and including dismissal. Any violation by students may result in serious sanctions up to and including expulsion. If there are any questions concerning the Policy, please direct those inquiries to one of the following: -Human Resources -Student Affairs -a faculty member (for students) -Information Technology (I.T.) HelpDesk at extension 2150 or Property of Sheridan All telephone and computer systems at Sheridan (including hardware, software for which Sheridan is the licensee or owner, and storage space) are the property of Sheridan and have been acquired by Sheridan to enable and facilitate Sheridan s operations. Sheridan does permit limited use by employees and students of its systems, subject to the clear understanding that: i) any personal usage must be in compliance with Sheridan s rules and regulations, ii) no student or employee shall have any right of privacy or property rights* in connection with his/her usage of Sheridan s systems, and iii) at all times Sheridan has the right to monitor the usage of its systems, including checking any information or files stored, copied or recorded in any of Sheridan s systems. * Sheridan's property rights in its systems are distinct from any copyright rights which anindividual may have under Sheridan's Copyright Policy. Personal Accounts Generally, information stored in personal voice mail, or computer directories ("Personal Accounts"), is accessible only to the authorized owner of the account. However, users of these Personal Accounts should be advised that Sheridan reserves the right to monitor and/or access this data in order to conduct its business in a secure and reasonable manner and to ensure that its rules regarding usage of its systems are being followed. 1

2 Without limiting Sheridan's right to access Personal Accounts, please be advised that, in the following circumstances, Sheridan may access your Personal Accounts: 1. If the Personal Account holder is unavailable or absent and there is a pressing or urgent need to access information contained in the Personal Account. 2. If the Personal Account holder is suspected of any breach of this policy or other wrong doing involving Personal Accounts. 3. If compelled to do so by any law, including a request for information under the Freedom of Information & Protection of Privacy Act. 4. For the purpose of monitoring the usage by staff and students of Sheridan s systems in order to ensure compliance with the system, authorized Sheridan personnel may access Personal Accounts at any time. Access to Personal Accounts will only occur after signed authorization is received from a third level manager or more senior staff member. Passwords All Personal Accounts are protected by a password. The initial password is released to the person who requested the access to the Personal Account and should be changed by the Personal Account holder: i) the first time the account is accessed; ii) when there is any concern on the part of the Personal Account holder about the security of that password; or iii) when requested to do so by recognized Sheridan management, including Information Technology. The Personal Account holder is responsible for the proper use of the account, including password confidentiality, and has a resulting shared responsibility for the security of the entire system. The individual must take all reasonable precautions to prevent unauthorized access to the Account and the information stored therein. Further the account holder is fully accountable and responsible for any information stored in his/her accounts. Choosing a Password The following are recommended guidelines for creating an appropriate password: 1. Passwords must be at least 6 characters long. 2. Passwords should be composed of a combination of upper and lower case letters, numbers and special characters (e.g.!@#, etc.). 3. It is recommended that you change your password at least once a semester. 4. Never share your password with anyone (including I.T. staff). 5. Never write your password down, choose one that you can remember. 6. Do not use your userid or Sheridan ID number as your password. 7. Do not use a word found in a dictionary (even one for a foreign language). 8. Do not use a proper name or any variation of one (real or fictional). 9. Do not use a simple keyboard pattern (e.g. qwerty). 10. Do not reuse old passwords. 2

3 Account Management Individual managers have the responsibility of requesting either account deletion or partial removal of privileges when their staff leave or change jobs. The changes will be activated the day following the date of termination/reassignment. For Accounts that are deleted from the system, data that is contained in personal directories, whether work related or personal, will be deleted from the system 30 days after the account access is suspended. Information Technology also inactivates accounts based on employee termination/leave dates and student withdrawal/graduation dates. Data in voice mailboxes will be cleared on the date of termination/reassignment. Accounts that belong to staff who are leaving Sheridan for more than 60 days, either permanently or temporarily, and who will not require access while they are absent from Sheridan, should be disabled immediately to discourage unauthorized access. I.T. should be contacted to discuss archiving or transferring data if required. Temporary access to someone else's account or voice mailbox cannot be granted. Generally, temporary access to someone else's Personal Account will not be granted by Information Technology. Use of Accounts Each Personal Account holder or other user of Sheridan telephone or computer systems must comply with the following: 1. The Personal Account and password should be kept secure. The owner must log out of the Account when the workstation is left unattended. 2. The access granted to Sheridan's telephone and computer services is to be used for Sheridan business only and is not to be used to the detriment of Sheridan or any of its students or employees. 3. Access is for use of the account owner only and is not to be extended to others. 4. Access is not to be used for any illegal purpose. 5. Sheridan operates in compliance with existing Freedom of Information legislation. The user of any system who is privy to Sheridan data is expected to comply and to maintain confidentiality. 6. Access must not be used to harass, threaten or annoy others or to store or send messages which are pornographic, obscene, abusive, threatening, libellous, defamatory or harassing contrary to the Human Rights Code. This would include sending unwanted s to another after being requested not to do so. The Account owner is responsible for ensuring the use of the Account conforms to Sheridan policy and guidelines relating to harassment, discrimination or interaction with others. 7. The owner will not attempt to hide or misrepresent the originator of any communication he or she might initiate or forward. 8. The Account owner will not attempt to circumvent any security or control measures 3

4 implemented on Sheridan systems. 9. Access will not be used to monitor, interfere with or destroy work being done by others. 10. Access will not be used to knowingly degrade system performance or to knowingly or carelessly provide, run or install any program intended to damage any system. This includes, but is not limited to, programs known as computer viruses, Trojan horses or worms. 11. The individual owner of each Account is responsible for managing the information kept on the system to make efficient use of storage. 12. Installation or storage of illegal or pirated software on Sheridan systems is not tolerated. Unauthorized copying of Sheridan software is also illegal. 13. Where provided, users of any workstation are required to run anti-virus software before installing or using any floppy disk, including newly purchased software. 14. Each Account owner must be aware of and respect all copyrights, trademarks and other intellectual property rights for materials on Sheridan systems or the Internet, including the use of the Sheridan logo. 15. Account owners will not initiate or propagate chain letters. 16. The Account owner will not represent themselves as acting on behalf of Sheridan unless properly authorized to do so. 17. Access will not be used to access pornography, or any material that can be considered to be obscene, abusive, threatening, or harassing as described by the Human Rights Code, nor shall any such materials be stored, transmitted or printed using any Sheridan system. 18. Access will not be used by an employee or student for the purpose of carrying out any commercial undertaking or activity excepting only a commercial undertaking or activity authorized by Sheridan. 19. Access will not be used by any person for the purpose of gaining illegitimate or unauthorized access to personal accounts, resources, files, systems, databases, or information within any of Sheridan s systems or for the purpose of breaking into any other system outside Sheridan. No person shall change, enter, add or alter in any way any information within Sheridan s systems, files and databases without proper authorization. 20. Use of external access to contravene any of the above will be considered violation of the above (e.g., use of the Sheridan logo on a web page on an external ISP). All guidelines and policies apply to all resources whether access is initiated on-site or through a remote location. 4

5 Consequences of a Failure to Comply with this Policy Failure to comply with the above policy may result in disciplinary action. The nature and severity of Sheridan s action in this regard will be at Sheridan's discretion and will depend on influencing factors such as, the severity of the offence, its impact on others and Sheridan, and whether it is a repeat offence. These actions can include, without limitation, any of the following: 1. Account privileges being restricted or revoked; 2. Disciplinary action up to and including dismissal or expulsion from a course, program, or Sheridan; 3. Sheridan electing to seek appropriate penalties under existing legislation or other Sheridan policies. (Note: Some violations of the Policy are also covered under existing legislation such as Criminal Code of Canada and the Copyright Act or under other Sheridan policies such as the Harassment and Discrimination policy). External resources, including law enforcement, may be involved. Important Note: It is a criminal offence to obtain or use any computer service or system to wilfully destroy or alter data, to render data meaningless or useless, to obstruct or interfere with the lawful use of data or to deny access to data to anyone who is entitled to have access to such data. Information Technology - Handling Problems Generally, Information Technology will not deal unilaterally or directly with concerns brought to its attention relating to obscene, threatening or harassing behaviour. I.T. staff will advise that any situation involving students be referred to the Director, Student Affairs; problems not involving students will be referred as appropriate. I.T. will assist as requested in gathering information relating to problems and will act as requested by Sheridan in resolving them. I.T. reserves the right to act immediately and unilaterally when it determines there is an immediate security risk. Such action will be immediately reported to the appropriate Sheridan authorities or other related agencies for guidance and further follow-up. Sheridan Resources to Call in the Event of a Breach of this Policy Security Sheridan Security at the appropriate campus should be contacted immediately when there is a concern about safety or violation of any laws. Security works closely with other Sheridan resources in resolving any difficulties. Student Affairs Student Affairs is the prime contact in dealing with problems relating to students including interpersonal conflict, misuse of rights and responsibilities, and misuse of network accounts. Student Affairs will also initiate any formal disciplinary actions involving students. Problems or questions in this regard should be referred to Rob Till, Director, Student Affairs, at extension

6 Human Resources Human Resources is the prime contact in dealing with problems relating to any Sheridan employee and the misuse of his/her rights and responsibilities and misuse of network accounts as described in this Policy. Human Resources will assist Sheridan managers initiate any formal disciplinary actions involving Sheridan employees. Managers of Process Sheridan's Managers of Process will accept any call relating to staff, students or anyone who does business with Sheridan who may be involved in harassing or discriminating behaviour. Please refer to Sheridan's Harassment and Discrimination Policy for more information. 6

Acceptable Use of Computing and Information Technology Resources

Acceptable Use of Computing and Information Technology Resources Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,

More information

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

Revelstoke Board of Education Policy Manual

Revelstoke Board of Education Policy Manual Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS

More information

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing

More information

2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of

2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of 2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of San Diego computing and network resources. This policy

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION

FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION DATE: June 10, 2015 REGULATION CHAPTER NO.: Chapter 5 REGULATION CHAPTER TITLE: Miscellaneous REGULATION TITLE AND NUMBER:

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

PURPOSE To establish standards for the use of College networks and computer accounts.

PURPOSE To establish standards for the use of College networks and computer accounts. IT 01 Classification: Responsible Authority: Executive Sponsor: Approval Authority: Date First Approved: 1998.03.02 Date Last Reviewed: 2011.11.23 Mandatory Review Date: 2016.11.23 Acceptable Use of Computer

More information

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY - 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,

More information

File: EDE COMPUTER/ONLINE SERVICES

File: EDE COMPUTER/ONLINE SERVICES Network Acceptable Use Policy COMPUTER/ONLINE SERVICES The Hilliard City School District ("District") recognizes that technologies open opportunities to information and modes of communication. The use

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

COMPUTER AND NETWORK USAGE POLICY

COMPUTER AND NETWORK USAGE POLICY COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.

More information

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources Appendix I The City University of New York Policy on Acceptable Use of Computer Resources Introduction CUNY s computer resources are dedicated to the support of the university s mission of education, research

More information

COMPUTER USE POLICY. 1.0 Purpose and Summary

COMPUTER USE POLICY. 1.0 Purpose and Summary COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive

More information

Niagara County Community College

Niagara County Community College Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

Use of ESF Computing and Network Resources

Use of ESF Computing and Network Resources Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among

More information

Riverside Community College District Policy No. 3720 General Institution

Riverside Community College District Policy No. 3720 General Institution Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall

More information

Acceptable Use of Information Technology

Acceptable Use of Information Technology Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

Acceptable Use Policy - NBN Services

Acceptable Use Policy - NBN Services OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:

More information

Caldwell Community College and Technical Institute

Caldwell Community College and Technical Institute Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative

More information

INFORMATION TECHNOLOGY APPROPRIATE USE

INFORMATION TECHNOLOGY APPROPRIATE USE INFORMATION TECHNOLOGY APPROPRIATE USE POLICY 1000.0100.12 Section 10, Information Systems Responsible College Officer: Executive Director of Information Systems/CIO Originally Issued: April 24, 2008 Original

More information

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration

More information

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance. 1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

Nondiscrimination. 1 of 10

Nondiscrimination. 1 of 10 Scope This procedure applies to all College District information technology resource users, including but not limited to administrators, faculty, students, staff, Board members, agents, volunteers, vendors,

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE TITLE: COMPUTER USE POLICY PAGE 1 OF 5 EFFECTIVE DATE: 07/2001 REVIEW DATES: 02/2003, 09/2006 REVISION DATES: 03/2005, 03/2008 DISTRIBUTION: All Departments PURPOSE APPROVED BY: Signatures on File Chief

More information

STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION

STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION Access to modern information technology is essential to the state university mission

More information

Westwood Baptist Church Computer use Policy

Westwood Baptist Church Computer use Policy Westwood Baptist Church Computer use Policy I. Policy Statement The use of Westwood Baptist Church automation systems, including computers, fax machines, and all forms of Internet/Intranet access, is for

More information

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and

More information

Email Policy For Staff and Students

Email Policy For Staff and Students Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management

More information

------------------- COMPUTER NETWORK AGREEMENT FORM

------------------- COMPUTER NETWORK AGREEMENT FORM COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.

More information

2.1 It is an offence under UK law to transmit, receive or store certain types of files.

2.1 It is an offence under UK law to transmit, receive or store certain types of files. Website Hosting Acceptable Use Policy 1. Introduction 1.1 Jarrett & Lam Consulting s Acceptable Use Policy for hosting customers to protect our resources, the resources of our customers and to ensure that

More information

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Chicago State University Computer Usage Policy

Chicago State University Computer Usage Policy Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

University of Maryland Baltimore Information Technology Acceptable Use Policy

University of Maryland Baltimore Information Technology Acceptable Use Policy The UMB School of Nursing follows and adheres to the UMB Campus Information Technology Acceptable Use Policy. The UMSON further defines Authorized User to also include any person who receives a password

More information

Internet Acceptable Use Policy

Internet Acceptable Use Policy 1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth

More information

Rocklin Unified School District Employee Authorized Network, Internet Usage, and E-Mail Privacy Agreement

Rocklin Unified School District Employee Authorized Network, Internet Usage, and E-Mail Privacy Agreement Rocklin Unified School District Employee Authorized Network, Internet Usage, and E-Mail Privacy Agreement Please read this document carefully before signing: A. Upon employment all individuals permitted

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

ACCEPTABLE USE OF TECHNOLOGY

ACCEPTABLE USE OF TECHNOLOGY IIBE Page 1 ACCEPTABLE USE OF TECHNOLOGY Internet and computer network and non-network access is available to authorized students, teachers, and other staff in the. Albemarle County Public Schools primary

More information

Executive Memorandum No. 16

Executive Memorandum No. 16 OFFICE OF THE PRESIDENT Policy for Responsible Use of University Computers and Information Systems 1. Purpose It is the purpose of this Executive Memorandum to set forth the University's administrative

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

If you have any questions about any of our policies, please contact the Customer Services Team.

If you have any questions about any of our policies, please contact the Customer Services Team. Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D

Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D 1. PURPOSE SWC owns and operates a variety of computing systems which are provided for the use of the Sisseton Wahpeton

More information

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY

NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY Student Email Use page 1 NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY SEC. VII E-MAIL 3.0 STUDENT EMAIL USE University Policy I. Scope The purpose of this policy is to ensure the proper use

More information

University of Lafayette - Policy & Procedure

University of Lafayette - Policy & Procedure Document III UL LAFAYETTE COMPUTER & NETWORK POLICY Purpose & Scope This document sets forth the University's policy with regard to access to and use of computing and network resources by faculty, staff,

More information

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Odessa College Use of Computer Resources Policy Policy Date: November 2010 Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational

More information

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5 PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

III. RESPONSIBILITIES

III. RESPONSIBILITIES Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 1 of 5 I. POLICY & SCOPE This is the SUNY College at Old Westbury policy on College-provided access to electronic information

More information

THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction

THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction In accordance with its broader strategic objectives, The University of the West Indies (the UWI) promotes the

More information

SOUTH DAKOTA BOARD OF REGENTS. Policy Manual

SOUTH DAKOTA BOARD OF REGENTS. Policy Manual SOUTH DAKOTA BOARD OF REGENTS Policy Manual SUBJECT: Acceptable Use of Information Technology Systems NUMBER: 7:1 1. Purpose The Board acquires, maintains and operates information technology systems to

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

COMPUTER, INTERNET, & EMAIL USE POLICY

COMPUTER, INTERNET, & EMAIL USE POLICY COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the

More information

Contra Costa Community College District Business Procedure 10.06 ACCEPTABLE TECHNOLOGY USE

Contra Costa Community College District Business Procedure 10.06 ACCEPTABLE TECHNOLOGY USE Contra Costa Community College District Business Procedure 10.06 ACCEPTABLE TECHNOLOGY USE SECTION 1. PREAMBLE With the advent of powerful hardware and software, the Internet and the World Wide Web, computers

More information

POLICY MANUAL. Purpose

POLICY MANUAL. Purpose POLICY MANUAL POLICY IT_101 Page 1 of 7 Last Revision Date: September 14, 2011 Effective Date: April 15, 2002 Section Subject Title Computer Network/Internet/Information Resources Usage Purpose Computing

More information

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES 1. PROCEDURE SUMMARY STATEMENT To establish procedures relating

More information

Purposeful Use Of A CCCC Computing System

Purposeful Use Of A CCCC Computing System Purpose Cloud County Community College owns and operates a variety of computing systems which are provided for the use of CCCC students, faculty and staff in support of the programs of the College and

More information

Introduction. General Use

Introduction. General Use Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use

More information

USE OF TECHNOLOGY RESOURCES IN INSTRUCTION

USE OF TECHNOLOGY RESOURCES IN INSTRUCTION I-6400 2012 Arizona School Boards Association IJNDB USE OF TECHNOLOGY RESOURCES IN INSTRUCTION Appropriate use of Electronic Information Services The District may provide electronic information services

More information

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is

More information

(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).

(For purposes of this Agreement, You,  users, and account holders are used interchangeably, and where applicable). Key 2 Communications Inc. Acceptable Use Policy Please read carefully before accessing and/or using the Key 2 Communications Inc. Web site and/or before opening an account with Key 2 Communications Inc..

More information

POLICIES AND REGULATIONS Policy #78

POLICIES AND REGULATIONS Policy #78 Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

DRAFT - NMHU POLICIES CONCERNING COMPUTER, NETWORK, AND E-MAIL

DRAFT - NMHU POLICIES CONCERNING COMPUTER, NETWORK, AND E-MAIL The goal of the New Mexico Highlands University (NMHU) Computer & Networking Services (CNS) Group is to support the University in the pursuit of its Mission Statement 1. These policies, guidelines, and

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

Bates Technical College. Information Technology Acceptable Use Policy

Bates Technical College. Information Technology Acceptable Use Policy Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students. POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive

More information

Minor, for the purposes of this policy, is an individual who has not attained the age of 17.

Minor, for the purposes of this policy, is an individual who has not attained the age of 17. POLICY TITLE: Computer and Network Services: Acceptable Internet Use Policy POLICY NO: 698 PAGE 1 of 9 GENERAL Internet access is a service provided for students and staff members by this school district.

More information

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic

More information

EMPLOYEE COMPUTER USE POLICY

EMPLOYEE COMPUTER USE POLICY EMPLOYEE COMPUTER USE POLICY SECTION ONE PURPOSE A. To better serve our students and provide our teachers and other employees with the best tools to do their jobs, Navigator Pointe Academy makes available

More information

Caldwell Community College and Technical Institute

Caldwell Community College and Technical Institute Caldwell Community College and Technical Institute Student Computer Usage Policies and Procedures I. Campus Computer Usage Overview: The purpose of this document is to define the policies and procedures

More information

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy 1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines

More information

BOBCAT COMPUTING POLICY

BOBCAT COMPUTING POLICY BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,

More information

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information