Caldwell Community College and Technical Institute

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Caldwell Community College and Technical Institute"

Transcription

1 Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative systems, computer resources and network systems at Caldwell Community College and Technical Institute. II. PROCEDURE: A. INTRODUCTION Caldwell Community College and Technical Institute will provide administrative computer systems to employees and students for the purpose of completing college-related assignments. These assignments include, but are not limited to the following: data entry and retrieval, report preparation, records maintenance, instruction, research, and planning. Because of this wide range of users and uses, it is necessary to establish policies and procedures that assure that the systems are used in the most efficient manner possible while providing for the protection of equipment, data, and software. While the Director of Computer Information Services is charged with responsibility for the proper operation of the computer systems, all college employees are responsible for seeing that the computers are properly used and that security is maintained. B. POLICY While every employee of the College has a responsibility for the computer systems, those who actually use the systems are specifically responsible for data, personal file backup, software, and equipment. Since all of these responsibilities can be considered under the broad category of security, each user must be aware of and employ proper operating procedures to guarantee proper security. Access to the systems will be on a need to know basis, considering the accomplishment of assigned duties. In this context, the system means both the equipment and the data. With approval from the appropriate dean or vice-president, employees may request access from the System Administrator. All employees have a responsibility to become familiar with the principles and capabilities of the College computer systems.

2 C. PROCEDURES 1. DATA RETRIEVAL Non-routine requests for data (one-time reports and/or special requests) should be made in writing to the Computer Information Services staff. The request will be approved or disapproved based on justification provided by the requester. The request must specify the data elements to be used, the report format, and the time when it is needed so that the Computer Information Services staff involved may schedule the work. If a request is denied, it will be done so in writing with full justification. 2. SECURITY Security refers to the protection of equipment from any kind of damage and the protection of data from (1) disclosure to any unauthorized person, (2) unauthorized modification, or (3) destruction. While disclosure or damage may occur accidentally or intentionally, the results are the same. The security system implemented in these procedures will, if used properly, prevent unnecessary problems. a. Basic access to the college computer system is controlled by User ID and password protection. Each user on the system has a personal ID that must not be used by anyone else. The IDs are established by the Computer Information Services Staff as when approved by the appropriate management levels. The College Executive Council may authorize the Computer Information Services Staff to override any user account if sufficient evidence of inappropriate use exists. b. The Caldwell Community College and Technical Institute Administrative Computer User Authorization Form will be submitted through the user s supervisor, the appropriate dean or vice-president, and the System Administrator. Passwords will be changed every 90 days or less and passwords will not be divulged to any other person. If a user is terminated for any reason the Computer Information Services staff must be notified immediately by the supervisor so that the terminated user can be removed from the system. In the case of a supervisor s termination, all of the supervisor s employees must change their login passwords immediately. c. Users will not be granted access to the administrative computer system until they have read and agreed to comply with the provisions of The Family Educational Rights and Privacy Act of 1974 and have signed the

3 Statement of Acknowledgment Concerning Unauthorized Use of Computers and Software by Caldwell Community College and Technical Institute Faculty and Staff. d. Users should not leave their terminal or microcomputer unattended. If a user must leave the immediate area of his/her workstation for an extended period of time, he/she should log off the system. Users should not write their passwords or usernames on paper that is plain view. e. Microcomputer systems and peripherals must have restricted physical access controlled by the individual user. Sensitive information should not be sent to printers that are located in areas open to the public. Offices where computers are located should be kept locked if unoccupied for long periods of time. f. Users are responsible for immediately reporting suspected security violations to the Computer Information Services staff. The Computer Information Services staff will investigate the violation and take appropriate actions where required. g. Central Computer locations are strictly controlled by the Computer Information Services Staff. Personnel will not be allowed to enter the computer room unless authorized by one of the Computer Information Services staff members. There will be no exceptions to this policy. 3. MICROCOMPUTER AND NETWORK SYSTEMS In addition to the administrative and student computing systems, the college owns a large number of other computer-related devices -- primarily microcomputers. While all of the aforementioned security concerns and procedures apply to these devices, the security problem with stored data is much smaller still. Issues concerning the use and protection of software are of major concern with microcomputers. The college does not purchase microcomputer software outright, but rather buys a software license which allows the college to use the software but severely restricts anything other than the use of the software on a single computer or network. With this in mind, the following must be adhered to: a. SOFTWARE: Unless specifically authorized in writing by the software developer or publisher, programs and their related documentation shall not be reproduced in any form. U. S. Copyright Law provides for civil damages of $50,000 or more and criminal penalties, including fines and imprisonment, in cases involving

4 the illegal reproduction of software. Unauthorized copies of software will not be used on any computers owned by the college. Students must be advised of this policy and told that illegal software will be confiscated and destroyed. Caldwell Community College and Technical Institute employees involved in the making or use of unauthorized copies of computer software will be subject to disciplinary action as appropriate under the circumstances. Software licensed to the college will not be removed from the campus without the specific written permission of the department dean involved. Users cannot install or download software that is not work-related onto their systems as this produces unnecessary conflicts with the microcomputer software and performance. Computer Information Services will conduct software audits on a regular schedule. The individual departments and employees will maintain possession of all software licensing agreements. Software placed on a computer that violates the U. S. Copyright Law will be removed from a college computer after the Director of Computer Information Services provides written justification to the individual Vice-President/Dean or employee. b. ELECTRONIC MEDIA: Computer Information Services will practice appropriate measures to provide security, operability and integrity of the Wide Area Network, hereafter referred to as WAN, including , Internet, and other related resources. The College will not guarantee that electronic media stored on microcomputers and transmitted on the WAN will remain confidential and secure. Additionally, computerrelated files and data created or stored on College microcomputer systems are considered open records and are subject to discovery and subpoena during disciplinary and legal actions. The College reserves the right to view, monitor, and disclose the contents of and data created, transmitted, received, and stored on College-owned microcomputers under the following circumstances: 1. Investigations that reveal evidence of misconduct and misuse of accounts. 2. Need to protect the general welfare of the college employees and students. 3. Need to prevent interferences with the mission of the college. 4. Illegal activity that violates federal, state, or local regulations. c. AUTHORIZED USAGE: Microcomputer users should not deliberately attempt to modify or degrade the performance of college-owned systems. The systems are provided as a service and should be used to complete college-related task and not for personal business or recreation. The computer systems must not be used to intercept data, monitor user accounts, gain unauthorized access to restricted data, or for any purpose that violates federal, state or local regulations.

5 d. MORALS AND ETHICS: Freedom of expression is a constitutional right afforded to individuals. However, Microcomputer Systems Users are held accountable for their actions and must respect the rights of individuals who may be offended by the services and images retrieved on the Internet. Individuals that feel they have been harassed should immediately report the incident to the Director of Computer Information Services or the Director of Human Resources. e. PURCHASING: Departments that wish to purchase computer-related equipment and supplies must generate a statement of need to Computer Information Services. Computer Information Services will provide consultation to the individual requesting the purchase, generate the requisition, and submit it to the Business Office for issuance of a purchase order. f. INVENTORY CONTROL: Individuals requesting computer and related equipment transfer and relocation must fill out an Inventory Transaction Form, located in the Business Services Department mailroom, and submit it to Computer Information Services. Computer Information Services will not take any action until the Inventory Transaction Form is completed. Computer Information Services will relocate the computer and related equipment and forward the Inventory Transaction Form to the Business Services Department. g. COMPUTER REPAIR: Individuals requesting repair services from the Computer Information Services Department will submit the white copy of the Computer Information Services Request Form to Computer Information Services. The department requesting service will maintain the pink copy and place the yellow copy on the device(s) requiring service. If the request involves the acquisition of a centralized supply item, the requisition section of the form must be completed and signed by the departmental budget manager. Computer Information Services will provide the action necessary to address the departmental request. Computer Information Services will provide the Business Office with a monthly spreadsheet listing the totals of each individual department s supply acquisition. h. BUDGET PLANNING: The Director of Computer Information Services will provide consultation to each department head concerning his/her annual technology budget request. The individual department heads will submit the technology request to the Director of Computer Information Services. The Director of Computer Information Services will provide the Chief Financial Officer with a compiled listing of each departmental technology request.

6 i. VIOLATIONS: Any employee who learns of a violation of these policies shall report it to their supervisor and to Computer Information Services as soon as possible. Violators of the computer usage policies and procedures previously stated will be subject to one or more of the following sanctions: admonition, temporary or permanent suspension of computer access privileges, or dismissal from the College as stated in the Employee Policy and Procedures Manual. Adopted by the Board of Trustees on June 15, 2000

Caldwell Community College and Technical Institute

Caldwell Community College and Technical Institute Caldwell Community College and Technical Institute Student Computer Usage Policies and Procedures I. Campus Computer Usage Overview: The purpose of this document is to define the policies and procedures

More information

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D

Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D 1. PURPOSE SWC owns and operates a variety of computing systems which are provided for the use of the Sisseton Wahpeton

More information

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4 Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

Information Systems Security Policy

Information Systems Security Policy Information Systems Security Policy Northeast Alabama Community College Center for Information Assurance Northeast Alabama Community College 138 AL Hwy 35, Rainsville, AL 35986 (256) 228-6001 1 5/22/2014

More information

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY - 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

CLOUD COUNTY COMMUNITY COLLEGE. Computer Usage - Procedures

CLOUD COUNTY COMMUNITY COLLEGE. Computer Usage - Procedures Purpose Cloud County Community College owns and operates a variety of computing systems which are provided for the use of CCCC students, faculty and staff in support of the programs of the College and

More information

Use of ESF Computing and Network Resources

Use of ESF Computing and Network Resources Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among

More information

Use of Information Technology Resources

Use of Information Technology Resources Title Policy Area Policy Number (to be assigned by Information Services) See also (related policies) Use of Information Technology Resources Operations College Systems and Resources E.5.1 Sexual Violence

More information

Information Security Handbook for Employees

Information Security Handbook for Employees Information Security Handbook for Employees Providing our patients with excellence in healthcare includes protecting their information This handbook was prepared by Tom Walsh Consulting, LLC for the Kansas

More information

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior

More information

STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION

STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION Access to modern information technology is essential to the state university mission

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

DIOCESE OF DALLAS. Computer Internet Policy

DIOCESE OF DALLAS. Computer Internet Policy DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used

More information

Southern University at New Orleans

Southern University at New Orleans PURPOSE The Higher Education Opportunity Act of 2008 (HEOA) added provisions to the Higher Education Act of 1965 (HEA), as amended, requiring all colleges and universities which accept federal student

More information

Ethical and Responsible Use of EagleNet 03/26/14 AMW

Ethical and Responsible Use of EagleNet 03/26/14 AMW Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of

More information

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3 Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use

More information

General responsibilities pertaining to this policy are set forth in this section. The following sections list additional specific responsibilities.

General responsibilities pertaining to this policy are set forth in this section. The following sections list additional specific responsibilities. Introduction Computer information systems and networks are an integral part of Rosemont College. The College has made a substantial investment in human and financial resources to create these systems.

More information

COMPUTER AND NETWORK USAGE POLICY

COMPUTER AND NETWORK USAGE POLICY COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

RESPONSIBLE COMPUTER USE POLICY (ADOPTED AUGUST 3, 2006)

RESPONSIBLE COMPUTER USE POLICY (ADOPTED AUGUST 3, 2006) RESPONSIBLE COMPUTER USE POLICY (ADOPTED AUGUST 3, 2006) on-line at www.ccc.edu I. INTRODUCTION All users shall abide by the following provisions contained herein, or otherwise may be subject to disciplinary

More information

2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of

2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of 2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of San Diego computing and network resources. This policy

More information

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose

More information

Lutheran Education Association of Houston Acceptable Use Policy (Students)

Lutheran Education Association of Houston Acceptable Use Policy (Students) Lutheran Education Association of Houston Acceptable Use Policy (Students) With the use of technology, including the Internet, Intranet, hardware and software, the Lutheran Education Association of Houston

More information

Information Security Handbook

Information Security Handbook Information Security Handbook Adopted 6/4/14 Page 0 Page 1 1. Introduction... 5 1.1. Executive Summary... 5 1.2. Governance... 5 1.3. Scope and Application... 5 1.4. Biennial Review... 5 2. Definitions...

More information

COMPUTER USE POLICY. 1.0 Purpose and Summary

COMPUTER USE POLICY. 1.0 Purpose and Summary COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive

More information

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

Computing and Network Use Policy

Computing and Network Use Policy Computing and Network Use Policy Category: University Area Date Established: Responsible Office: Office of the Chief Information Officer Date Last Revised: - 3/26/2007 Responsible Executive: CIO Date Posted

More information

Policy on Privileged Access

Policy on Privileged Access Policy on Privileged Access Reference: CNS-P-GEN-PRIV-ACCESS Revision: D Supersedes: Purpose: Source: System Administrator Best Practice Guideline The purpose of this policy is to prevent inappropriate

More information

Bossier Parish Community College

Bossier Parish Community College Bossier Parish Community College Department of Cyber Information Technology Welcome to the Program! Network Security & Networking Tracks Code of Conduct This marks the beginning of your journey through

More information

R345, Information Technology Resource Security 1

R345, Information Technology Resource Security 1 R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,

More information

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with

More information

Document III UL LAFAYETTE COMPUTER & NETWORK POLICY. Purpose & Scope

Document III UL LAFAYETTE COMPUTER & NETWORK POLICY. Purpose & Scope Document III UL LAFAYETTE COMPUTER & NETWORK POLICY Purpose & Scope This document sets forth the University's policy with regard to access to and use of computing and network resources by faculty, staff,

More information

Policy for the Acceptable Use of Information Technology Resources

Policy for the Acceptable Use of Information Technology Resources Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information

DEPARTMENTAL POLICY. Northwestern Memorial Hospital

DEPARTMENTAL POLICY. Northwestern Memorial Hospital Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines

More information

Please note this policy is mandatory and staff are required to adhere to the content

Please note this policy is mandatory and staff are required to adhere to the content Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Bates Technical College. Information Technology Acceptable Use Policy

Bates Technical College. Information Technology Acceptable Use Policy Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment

More information

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing

More information

Appropriate Use of Campus Computing and Network Resources

Appropriate Use of Campus Computing and Network Resources The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources Approved by the Council of The Claremont Colleges on 08/20/04 An overall guiding mission of The Claremont

More information

Claremont Graduate University and The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources

Claremont Graduate University and The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources Claremont Graduate University and The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources An overall guiding mission of The Claremont Colleges is education in

More information

Riverside Community College District Policy No. 3720 General Institution

Riverside Community College District Policy No. 3720 General Institution Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall

More information

6415 C Internet, E-mail and Network Rules for Staff Use

6415 C Internet, E-mail and Network Rules for Staff Use 6415 C Internet, E-mail and Network Rules for Staff Use Original Adoption: 05/26/2009 Effective Date: 08/13/2014 Revision Dates: 08/12/2014 Review Date: 4/17/2012 I. PURPOSE The purpose of this regulation

More information

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy 1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines

More information

University of Maryland Baltimore Information Technology Acceptable Use Policy

University of Maryland Baltimore Information Technology Acceptable Use Policy The UMB School of Nursing follows and adheres to the UMB Campus Information Technology Acceptable Use Policy. The UMSON further defines Authorized User to also include any person who receives a password

More information

OHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY

OHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY OHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY 03.13211 Referenced by OVEC Policy Manual and OVEC Employee Handbook Version 2.0.0 2/12/2014 Section headings: 1. Introductory paragraph

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy I. Introduction Each employee, student or non-student user of Greenville County Schools (GCS) information system is expected to be familiar with and follow the expectations and requirements

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

Information Systems Security Policy

Information Systems Security Policy Information Systems Security Policy University of South Alabama Computer Services Center University of South Alabama 5840 USA Drive South 251-460- 6161 5/19/2014 Outline 1 Introduction... 2 Data Retrieval

More information

PBGC Information Security Policy

PBGC Information Security Policy PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.

More information

Administrative Procedure 3720 Computer and Network Use

Administrative Procedure 3720 Computer and Network Use Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

AP 417 Information and Communication Services

AP 417 Information and Communication Services AP 417 Information and Communication Services Background Access and use of information and communication services (ICS) are an integral component of the learning and working environment. The ability for

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

Interim Acceptable Use Policy of Information Technology Resources California State University, Fresno

Interim Acceptable Use Policy of Information Technology Resources California State University, Fresno Interim Acceptable Use Policy of Information Technology Resources California State University, Fresno 1. Policy California State University, Fresno (University) is responsible for overseeing the appropriate

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Students KS2-3 Acceptable Use Policy

Students KS2-3 Acceptable Use Policy Students KS2-3 Acceptable Use Policy Page 1 of 5 LITTLEGREEN SCHOOL Student Acceptable Use Policy Pupil access to the school network and Moodle is a privilege, not a right. All pupils must follow the conditions

More information

The Design Society. Information Security Policy

The Design Society. Information Security Policy The Design Society Policies and Forms That Conform to PCI DSS SAQ A Version 2.0 June 2014 About this Document This document contains The Design Society information security policies. This document is

More information

11.1 Campus Computer and Network Usage Policy

11.1 Campus Computer and Network Usage Policy 11.1 Campus Computer and Network Usage Policy "Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers

More information

III. RESPONSIBILITIES

III. RESPONSIBILITIES Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 1 of 5 I. POLICY & SCOPE This is the SUNY College at Old Westbury policy on College-provided access to electronic information

More information

PURPOSE To establish standards for the use of College networks and computer accounts.

PURPOSE To establish standards for the use of College networks and computer accounts. IT 01 Classification: Responsible Authority: Executive Sponsor: Approval Authority: Date First Approved: 1998.03.02 Date Last Reviewed: 2011.11.23 Mandatory Review Date: 2016.11.23 Acceptable Use of Computer

More information

Coppin State University Title: CSU Faculty/Staff Computer Use and Internet Access Policy

Coppin State University Title: CSU Faculty/Staff Computer Use and Internet Access Policy 1.0 PURPOSE To establish a policy to ensure the proper use of Coppin State University s computer and network resources and services by its employees, students, independent contractors and other computer

More information

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY STATEMENT: Many of our employees have access to the internet as well as email capabilities. The County recognizes that these

More information

Wilmington University Code of Conduct for Computer Network Security (CNS) and Information Assurance (IA) Students

Wilmington University Code of Conduct for Computer Network Security (CNS) and Information Assurance (IA) Students Wilmington University Code of Conduct for Computer Network Security (CNS) and Information Assurance (IA) Students Undergraduate-level Computer and Network Security (CNS) and graduate-level Information

More information

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE TITLE: COMPUTER USE POLICY PAGE 1 OF 5 EFFECTIVE DATE: 07/2001 REVIEW DATES: 02/2003, 09/2006 REVISION DATES: 03/2005, 03/2008 DISTRIBUTION: All Departments PURPOSE APPROVED BY: Signatures on File Chief

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

3. Electronic Mail (E-mail)

3. Electronic Mail (E-mail) - Title of Agency - Internet Acceptable Use Policy The Following Internet Acceptable Use Policy Applies to the (AGENCY NAME) Staff 1. Introduction The (AGENCY NAME) provides its staff and (other entity(s)

More information

Board Adopted Policy

Board Adopted Policy Board Adopted Policy Policy Title Information Technology Systems Usage Effective Date:03/14/2012 Board Approval Date: 6/19/2014 Review Cycle: three (3) years I. Application: Authority wide. II. Intent:

More information

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 jmadeja@buchananassociates.com Each business is required by Massachusetts law

More information

Revelstoke Board of Education Policy Manual

Revelstoke Board of Education Policy Manual Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS

More information

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78 Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section

More information

Coffeyville Community College Computer and Network Usage Policy

Coffeyville Community College Computer and Network Usage Policy Coffeyville Community College Computer and Network Usage Policy Computer and Network Usage Policy Page 1 Introduction "Respect for intellectual labor and creativity is vital to academic discourse and enterprise.

More information

Indiana University of Pennsylvania Information Assurance Guidelines. Approved by the Technology Utilities Council 27-SEP-2002

Indiana University of Pennsylvania Information Assurance Guidelines. Approved by the Technology Utilities Council 27-SEP-2002 Indiana University of Pennsylvania Information Assurance Guidelines Approved by the Technology Utilities Council 27-SEP-2002 1 Purpose... 2 1.1 Introduction... 2 1.1.1 General Information...2 1.1.2 Objectives...

More information

Chicago State University Computer Usage Policy

Chicago State University Computer Usage Policy Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services

More information

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment

More information

Electronic Communications System

Electronic Communications System Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as

More information

3. Fee. You are entitled to use the Equipment without cost so long as you abide by the terms and conditions of this Agreement.

3. Fee. You are entitled to use the Equipment without cost so long as you abide by the terms and conditions of this Agreement. Last Name, First Name THE CITY UNIVERSITY OF NEW YORK Notebook Computer License Agreement This document describes the license agreement between The City University of New York ( CUNY ) and the individual

More information

Digital Citizenship and Bring Your Own Device AP

Digital Citizenship and Bring Your Own Device AP Digital Citizenship and Bring Your Own Device AP 600.34 Procedure for: Administrators and School Staff Adopted: July 14, 2015 Submitted by: M. Shypula, Superintendent of Education Revised: N/A Category:

More information

Access Control Policy

Access Control Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

APHIS INTERNET USE AND SECURITY POLICY

APHIS INTERNET USE AND SECURITY POLICY United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This

More information

Appendix A: Rules of Behavior for VA Employees

Appendix A: Rules of Behavior for VA Employees Appendix A: Rules of Behavior for VA Employees Department of Veterans Affairs (VA) National Rules of Behavior 1 Background a) Section 5723(b)(12) of title 38, United States Code, requires the Assistant

More information

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for

More information

Policy on the Security of Informational Assets

Policy on the Security of Informational Assets Policy on the Security of Informational Assets Policy on the Security of Informational Assets 1 1. Context Canam Group Inc. recognizes that it depends on a certain number of strategic information resources

More information

TABLE OF CONTENTS. University of Northern Colorado

TABLE OF CONTENTS. University of Northern Colorado TABLE OF CONTENTS University of Northern Colorado HIPAA Policies and Procedures Page # Development and Maintenance of HIPAA Policies and Procedures... 1 Procedures for Updating HIPAA Policies and Procedures...

More information

POLICY MANUAL. Purpose

POLICY MANUAL. Purpose POLICY MANUAL POLICY IT_101 Page 1 of 7 Last Revision Date: September 14, 2011 Effective Date: April 15, 2002 Section Subject Title Computer Network/Internet/Information Resources Usage Purpose Computing

More information

University of Hartford. Software Management and Compliance Guidelines

University of Hartford. Software Management and Compliance Guidelines University of Hartford Software Management and Compliance Guidelines This policy is issued in an effort to remind the University community of the importance of complying with that policy and to reiterate

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

[Acceptable Use Policy]

[Acceptable Use Policy] South College Computer Code of Ethics [Acceptable Use Policy] Introduction Freedom of expression and an open environment to pursue scholarly inquiry and for sharing of information are encouraged, supported,

More information

Identifier: IT-001 Revision Date: 10/1/2015 Effective Date: 10/18/2012 Approved by: BOR Approved on date: 10/18/2012

Identifier: IT-001 Revision Date: 10/1/2015 Effective Date: 10/18/2012 Approved by: BOR Approved on date: 10/18/2012 Information Technology Policy Acceptable Use Identifier: IT-001 Revision Date: 10/1/2015 Effective Date: 10/18/2012 Approved by: BOR Approved on date: 10/18/2012 Table of Contents 1. Introduction... 2

More information

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology

More information

North Clackamas School District 12

North Clackamas School District 12 North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology

More information

Town of Essex Comprehensive Public Records and Technology Policy

Town of Essex Comprehensive Public Records and Technology Policy Town of Essex Comprehensive Public Records and Technology Policy Introduction: Public records and the use of technology are inextricably linked in our modern age. As such, this policy covers both topics,

More information

Account Management Standards

Account Management Standards Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information

More information