Policy and Code of Conduct

Size: px
Start display at page:

Download "Email Policy and Code of Conduct"

Transcription

1 Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June P age

2 AMENDMENT HISTORY VERSION DATE AMENDMENT HISTORY V1 June 2013 Version approved by Audit Committee 19 June 2013 AC/IG/011/V1.1 December 2013 Addition of branding and formatting changes in line with Policy for Development of Policies AC/IG/011/V1.2 February 2014 Addition of unique reference number prior to publication REVIEWERS NAME DATE TITLE/RESPONSIBILITY VERSION Donna Dallaway June 2013 CSU Information Governance Manager V1 Matthew Hartland June 2013 Chie Finance Officer V1 Julia Dixon June 2013 Staff Side Representative V1 APPROVALS This document has been approved by: NAME DATE TITLE/RESPONSIBILITY VERSION CCG Audit 19 June 2013 Delegated authority from Board V1 Committee NB: The version of this policy used on the intranet must be a PDF copy of the approved version. DOCUMENT STATUS This is a controlled document. Whilst this document may be printed, the electronic version posted on the intranet is the controlled copy. Any printed copies of the document are not controlled. RELATED DOCUMENTS These documents will provide additional information: REFERENCE NUMBER AC/IG/013 AC/IG/023 AC/IG/020 DOCUMENT TITLE Information Governance Policy Internet Usage Policy Password Management Policy Safe Haven Policy Systems Access Request Change Form VERSION APPLICABLE LEGISLATION Data Protection Act 1998 Common Law Duty of Confidentiality Privacy and Electronic Communications Regulations Regulation of Investigatory Powers Act Human Rights Act The Law Business Practice Regulations Computer Misuse Act 1990 GLOSSARY OF TERMS TERM ACRONYM DEFINITION Personal Confidential Data PCD Describes personal information about identified or identifiable individuals (both 2 P age

3 alive and deceased), which should be kept private. Senior Information Risk Officer SIRO Takes ownership of information risk and is a key factor in successfully raising the profile of information risks and to embedding information risk management into Dudley CCG s culture. 3 P age

4 CONTENTS PAGE NO POLICY OVERVIEW Introduction Purpose Who this Policy applies to Legal Considerations 6 THE POLICY Personal Use Sending of Patient or Personal Confidential Data How an with Personal Confidential Data should be 7 Structured 8.0 Improper Content of s Unacceptable Use Preventing the Spread of Malicious Software (Viruses) Monitoring Arrangements Infringements and Complaints Unauthorised Access by IT Staff Legal Consequences of Misuse of Facilities Good Practice Consideration for Other Users Consideration for the System Staff Absence Closing Accounts ing Patients/Service Users Helpdesk Contact Numbers Monitoring Compliance 13 Appendix 1 ing Patient s Organisational Request Form 4 P age

5 POLICY OVERVIEW The purpose of this policy is to provide NHS Dudley CCG (Dudley CCG) staff with a framework with regard to the use of s. The policy has been developed and reviewed in line with developments within the information governance agenda. 1.0 Introduction 1.1 The Policy provides guidance about acceptable use of any IT facilities for the purpose of sending or receiving messages and attachments, including hardware, software and networks, provided by Dudley CCG. The Policy also describes the standards that users are expected to observe when using these facilities for , and ensures that users are aware of the legal consequences attached to inappropriate use of the facilities. 1.2 The Policy establishes a framework within which users of these facilities can apply self-regulation to their use of the facilities. 1.3 The Policy is designed to advise users that their use of facilities will be monitored and recorded. The Policy is also linked to the local disciplinary policies for staff, and usage of facilities in breach of the Policy may lead to appropriate disciplinary action being taken. 1.4 The Policy also specifies the actions that Dudley CCG will take in the investigation of complaints received from both internal and external sources, about any unacceptable use of that involves Dudley CCG IT facilities. 2.0 Purpose 2.1 All s held on Dudley CCG s servers or servers held on behalf of Dudley CCG are the property of Dudley CCG. Employees should note all s held on organisational servers can be accessed at all times by IT staff subject to the Head of Information Governance, Chief Finance Officer and IT Security Manager s approval (Human Resources advice may be required in some occasions); no authorisation, warning or permission from the user of the mailbox is required. An individual s content will only be opened and read by approved staff if there is a legitimate cause for concern that an abuse of the system or other Dudley CCG policies has occurred. 2.2 Dudley CCG s system is intended to support Dudley CCG s business requirements. All use of within Dudley CCG and from Dudley CCG addresses is subject to Dudley CCG s regulations. 2.3 The objective of this Policy is to supplement Dudley CCG regulations by: Highlighting legal issues relating to the use of Explaining the application of Dudley CCG s regulations to Outlining Dudley CCG s Policy on the monitoring of Providing guidance on good working practice 3.0 Who this Policy applies to 3.1 The policy applies to any person directly employed by, contracted or volunteering with Dudley CCG. 5 P age

6 4.0 Legal Considerations 4.1 This Policy complies with the requirements of the Regulation of Investigatory Powers Act, The Data Protection Act, Human Rights Act and the Lawful Business Practice Regulations. Dudley CCG is legally entitled to monitor employee without consent to meet its business objectives and where such monitoring is consistent with impact assessment. 4.2 Employees should expect no level of privacy to s sent or received via Dudley CCG IM&T services. Any sensitive such as human resources issues, trade union actions and any personal mail should be clearly marked in the subject heading as such. The content of these s will only ever be investigated should a serious concern be raised and following human resources, IM&T, the Chief Finance Officer and the Head of Information Governance consultation. 4.3 To meet legislative requirements staff will be annually reminded of the nature and existence of monitoring by Dudley CCG via Governance newsletters, training events and global s. Any queries about the monitoring should be directed to the Information Governance Team. THE POLICY 5.0 Personal Use 5.1 The main purpose for the provision by Dudley CCG for is for use in connection with business communication, research and approved business activities of Dudley CCG. Dudley CCG permits the use of its by employees and other authorised users for personal use, subject to the following limitations:- A level of use that is reasonable and not detrimental to the main purpose for which the facilities are provided Priority must be given to the use of resources for the main purpose for which they are provided Personal use must not be of a commercial or profit-making nature, or for any other form of personal financial gain Personal use must not be of a nature that competes with Dudley CCG in business Personal use must not be connected with any use or application that conflicts with an employee's obligations to Dudley CCG as their employer Personal use must not be connected to any purpose or application that conflicts with Dudley CCG s rules, regulations, policies and procedures Personal use must comply with Dudley CCG policies and regulations, in particular the Policy Employees can expect no level of privacy to personal s sent using Dudley CCG s systems 6.0 Sending of Patient or Personal Confidential Data 6.1 is an effective mechanism for transferring data; however, is not secure by design. There are further steps which must be taken in order to protect the contents of an before it is acceptable to transmit over a public medium such as the internet. 6.2 Data which should be encrypted before transit should include but are not limited to:- Data containing personal information of one or more patients or staff Data containing medical information of one or more patients Any data which can be explicitly linked to a patient or member of staff i.e. NHS number or payroll number. 6 P age

7 Data which may cause detriment to Dudley CCG if it were to be exposed. 6.3 There are a number of considerations to take into account when sending any type of data of a sensitive nature via . Personal confidential data (PCD) should not be written into the body or subject of any regardless of its destination either inside or outside of Dudley CCG unless the has been fully encrypted. 7.0 How an with Personal Confidential Data should be structured 7.1 TO: should always be validated before any form of PCD is sent SUBJECT: BODY: ATTACHMENTS: should not contain any form of PCD should contain the minimum amount of PCD should contain the minimum amount of PCD data. 7.2 Dudley CCG s can now be fully encrypted via any encryption software or solution locally available. If there is a need to send PCD via either in the body of the or within an attachment the user must encrypt the by setting the message settings sensitivity to confidential. Please note that no PCD should be entered into the subject line of the as only the attachments and the body of the is encrypted. 7.3 The responsibility of encrypting s falls on the user. Determining whether the nature of the information being sent should be encrypted the following test may be performed: Should the contents of an fall into malicious hands; could the identity of one or more patients and/or staff be identified were encryption not applied? Identity can be either from any one field which is unique to an individual, payroll number or NHS number being two examples of identity fields. 7.4 Should there be any question as to whether should be encrypted, advice can be sought from the IT Helpdesk/Information Governance Team. 7.5 Failure to encrypt or to follow the correct procedure with password handling will result in disciplinary action being taken. All members of staff are responsible for ensuring that patient and staff details are secure regardless of their position. 7.6 If sending an containing PCD or confidential information to an external NHS Dudley CCG NHSmail (NHS.Net) should be used. It is important to note that NHSmail is only secure if the is sent from an NHS.Net account to an NHS.Net account. Please contact your local IT Helpdesk for advice on setting up an NHS.Net account. 8.0 Improper content of s 8.1 Any message which lays the sender and/or Dudley CCG open to civil or criminal proceedings may also result in disciplinary action by Dudley CCG (Dudley CCG may be jointly liable, as employer, for any infringements by staff). An message is, for legal purposes, treated as a publication, and is therefore subject to all the normal legal restrictions on publication. In addition, there are some types of content that contravene Dudley CCG regulations and policies. 8.2 It is a disciplinary offence to send an message that is: Defamatory Obscene Racist 7 P age

8 8.3 Or which:- Sexist Threatening Constitutes racial or sexual harassment, or Might cause unnecessary distress to the recipient 8.4 Since is regarded as a form of publication, it is unacceptable to copyright material in an message without the permission of the copyright holder. 9.0 Unacceptable Use 9.1 The term "unacceptable use" is used here, as with other institutions and organisations providing facilities, to refer to any use, which could lead to disciplinary action. 9.2 The following constitute unauthorised forms of access to the facilities and are subject to disciplinary action:- Permitting anyone else to send using the username or address you have been given Sending using another user s username or address Attempting to disguise the address from which your message is sent or the identity of the sender Sending malicious s or viruses, worms, executable files (.exe) designed to disrupt the work of the CCG or recipients of such Private commercial use of Dudley CCG s facilities Sending unsolicited mail to multiple recipients, except where it relates to the administrative activities of Dudley CCG The creation or transmission (other than for properly supervised and lawful research purposes) of any offensive, obscene or indecent images, data, or other material, or any data capable of being resolved into obscene or indecent images or material The creation or transmission of material which is designed or likely to cause annoyance, inconvenience or needless anxiety The creation or transmission of material that is abusive or threatening to others, or serves to harass or bully others The creation or transmission of material that either discriminates or encourages discrimination on racial or ethnic grounds, or on grounds of gender, sexual orientation, marital status, disability, political or religious beliefs. Dudley CCG is committed to fostering a working environment free of discrimination where everyone is treated with dignity and respect The creation or transmission of defamatory material The creation or transmission of material that includes false claims of a deceptive nature The forwarding to others the text of messages written on a confidential one-to-one basis, without the prior express consent of the author The creation or transmission of material which brings Dudley CCG into disrepute 9.3 The first two of these also render the user liable to prosecution under the Computer Misuse Act If you are unsure whether a particular use is permissible or not, you should contact our immediate line manager, Chief Finance Officer, your local IT Helpdesk or the IT Security Manager. 8 P age

9 9.5 Any disciplinary action regarding the unacceptable use of s will be undertaken in conjunction with local disciplinary policies Preventing the spread of Malicious Software (Viruses) 10.1 Users of Dudley CCG IT facilities must take all reasonable steps to prevent the receipt and transmission by of malicious software e.g. computer viruses In particular, users must not transmit by any file attachments which they know to be infected with a virus must ensure that an effective anti-virus system is operating on any computer which they use to access Dudley CCG IT facilities, this facility must not be changed or altered from its standard settings without prior IT authorisation must not open file attachments received from unsolicited or untrustworthy sources 11.0 Monitoring Arrangements 11.1 Dudley CCG will maintain appropriate monitoring arrangements in relation to all and related services and facilities that it provides, and Dudley CCG will apply these monitoring arrangements to all users These arrangements may include checking the contents of, and in some instances recording, messages for the purpose of:- Establishing the existence of facts relevant to the business Ascertaining or demonstrating standards which ought to be achieved by those using the facilities Preventing or detecting crime Investigating or detecting unauthorised use of facilities Ensuring effective operation of facilities Determining if communications are relevant to the business - for example where an employee is off sick or on holiday Dudley CCG will, at its discretion, apply automatic message monitoring, filtering and rejection systems as appropriate, and deny transmission of messages with content that is unacceptable in the terms of this Policy These monitoring arrangements will operate on a continual and continuing basis, with the express aim of monitoring compliance within the provisions of the Policy and IT regulations and for the purposes outlined above as permitted by The Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations Any deleted can still be recovered by IT following authorisation from the Chief Finance Officer, IT Manager and the Head of Information Governance Infringements and Complaints 12.1 Any use of , which appears to be unacceptable in the terms of this Policy or which in any other way appears to contravene Dudley CCG regulations may give rise to disciplinary action Misuse should be reported immediately to the Line Manager who in turn will inform the Chief Finance Officer. Subject to approval from the Head of Information Governance and 9 P age

10 IT Security Manager (following human resources advice), IT reserves the right to stop and or monitor all s and accounts without requesting permission from the user of the account if they are suspected or have been reported to the IT Security Manager as causing any breaches of Dudley CCG procedures or regulations Dudley CCG does not read the content of messages of all users as a matter of course. If, however, possible misuse is reported, or if there is reason to suspect any use of which contravenes this Policy or any other Dudley CCG regulation, or which seems to represent a threat to the security of the facilities, Dudley CCG reserves the right to examine messages without authorisation from sender or recipient. This will only be done following approval from the Chief Finance Officer, Head of Information Governance and IT Security Manager (having sought human resources advice) An individual s content will only be opened and read by security staff if there is a legitimate cause for concern that an abuse of the system or other Dudley CCG policies has occurred Where appropriate, the IT Security Manager will refer the matter to the appropriate Head of Department to consider disciplinary action under the relevant Dudley CCG procedures If you receive from outside the Dudley CCG, which you regard as offensive or potentially illegal, you should also report the matter to your section Head or the Chief Finance Officer. The IT Department will take up the issue with the management of the site from which the was sent Unauthorised Access by IT Staff 13.1 IT staff are not allowed to access other staff s accounts or information without prior written permission of the Chief Finance Officer, Head of Information Governance and IT Security Manager. If a member of IT is found to be accessing without the correct authorisation they will be subject to disciplinary action. All IT staff are subject to this policy and its requirements Legal Consequences of Misuse of Facilities 14.1 In a growing number of cases involving the civil or criminal law, messages (deleted or otherwise) are produced as evidence in a permanent written form There are a number of areas of law, which apply, to use of and which could involve liability of users or the Dudley CCG. These include the following:- Intellectual property. Anyone who uses to send or receive any materials that infringe the intellectual property rights of a third party may be liable to that third party if such use is not authorised by them Obscenity. A criminal offence is committed if a person publishes any material which is pornographic, excessively violent or which comes under the provisions of the Obscene Publications Act Similarly the Protection of Children Act 1978 makes it an offence to publish or distribute obscene material of a child Defamation. As a form of publication, the internet is within the scope of legislation relating to libel where a statement or opinion is published which adversely affects the reputation of a person, group of people or an organisation. Legal responsibility for the transmission of any defamatory, obscene or rude remarks which discredit an identifiable individual or Dudley CCG will rest mainly with the sender of the and may lead to substantial financial penalties being imposed 10 P age

11 Data Protection. Processing information (including photographs) which contains personal data about individuals requires the express written consent of those individuals. Any use of personal data beyond that registered with the Information Commissioner will be illegal Discrimination. Any material disseminated which is discriminatory or encourages discrimination may be unlawful under the Sex Discrimination Act 1975, the Race Relations Act 1976 or the Disability Discrimination Act 1995 where it involves discrimination on the grounds of sex, race or disability Good Practice 15.1 The recommendations in this section do not constitute formal regulations, but are rather recommendations of good working practice. However, staff in particular are encouraged to follow these recommendations Consideration for other Users 16.1 You are not expected to cause offence to others by your use of Dudley CCG s system. Some forms of offence are serious enough to be subject to legal sanctions or covered by Dudley CCG regulations or policies. The following guidelines offer advice on avoiding some of the most common ways of inadvertently causing offence: You should take care that the tone of your messages is clear - irony and humour, for example, may not be clear to your recipient unless it is someone who knows you well You should ensure the tone of your message is respectful to recipients regardless of their role and status You should take particular care with remarks that are or might appear to be critical of the recipient or another person - these can often come across as much stronger than you intended, and might, in some instances, be considered defamatory To avoid any misunderstanding about who has sent your message, put your name at the foot of the message (not all systems transmit the sender s real name) If you are forwarding a message, it is often sensible to check that the originator of a message does not mind it being circulated before you pass it on to a third party - it could cause serious offence or embarrassment if you pass a message on against the wishes of the originator (it is advisable to state it explicitly if you yourself do not wish a particular message of yours to be forwarded to others) Consideration for the System 17.1 Every message uses system resources, and all users are expected to ensure that these resources are not wasted. While the drain on the system of an individual unnecessary sending an message may be slight, the cumulative effect of such behaviour by many users can seriously degrade the system performance and inconvenience all users:- Do not send unnecessary copies of messages OR send attachments unless absolutely necessary When replying to a message that has been sent to a number of recipients, do not send your reply to all these people if your reply is relevant only to the sender When replying to a message, do not quote the whole of the original message unless there is a need to. This is particularly important when the original message itself includes previous correspondence Do not include a large signature in every message you send - 4 to 6 lines should be enough 11 P age

12 Delete any messages you have saved but which are no longer needed In particular, you should regularly delete any messages with attachments. If you need to keep attachments you can save them as normal files in your directories and then delete the mail message (or delete the attachment from the message and replace it with a reference to the saved file name). This should significantly reduce the space required for your files if you receive and need to retain a large number of messages with attachments. Remove unwanted messages from your sent-mail or out folder on a regular basis; If you subscribe to any mailing lists, ensure than you know how to suspend the receipt of messages from them, and remember to do this if you are not going be reading your for more than about two weeks Do not forward virus warnings to others unless you receive them from IT services - any virus warning you receive from outside Dudley CCG is almost certain to be a hoax. If you forward hoax or pyramid you could be subject to disciplinary procedures. If in doubt call the IT Helpdesk for advice The printing of messages is largely unnecessary You should not, of course, destroy any messages that there may be a need to refer to in future, that is, anything that, if you had received it on paper, you would have filed. In this case, you can either print the message out or delete it, or you can store/ archive it on the server. In the case of archiving, this should be undertaken on a regular basis, at least once per month If you have s which need to be kept in line with the records retention period these can be saved within a folder on your departments shared area and deleted from your inbox. You then must delete the saved s in line with Dudley CCG s records retention periods and destruction schedules Staff Absence 18.1 Staff are expected to make arrangements for their to be read while they are away from work, in the same way as they would make arrangements for their mail on paper It is possible for any user to arrange automatic forwarding of all their mail to another address. It is also possible for staff to allow others to access their inbox by adapting the settings to the mailbox; the IT Helpdesk will be able to help with this process In cases where unexpected absence makes it impossible for the individual staff member to make suitable arrangements for forwarding, the IT Helpdesk should be contacted to set up forwarding or other arrangements, as appropriate Closing Accounts 19.1 It is important to ensure the account for a member of staff is closed once they leave employment. The Line Manager is responsible for ensuring an account is closed. This can be done by contacting the relevant IT Helpdesk Under no circumstances must departments ask individual staff to reveal their passwords to facilitate the reading of sent to a personal address. In case of difficulty, contact the IT Helpdesk or the IT Security Manager. If you require access to a person s while they are away the Head of your Department needs to authorise this by sending an to the IT Security Manager requesting this to be done. 12 P age

13 20.0 ing Patients/Service Users 20.1 It is recognised that can be an efficient communication method between staff and a patient/service user. The form in Appendix 1 should be used when ing patients. The risks associated with ing patients include but are not limited to:- to public internet address (e.g. Julie@googelmail.com) is not secure at any point A virus could spread this personal and sensitive to other individuals If an attachment is used then a cached copy of this file will reside on the computer that the is opened on (the patient/service user) and can be accessed by others who have access to their computer Helpdesk Contact Number Dudley CCG IT Monitoring Compliance 22.1 Staff are expected to comply with the requirements set out within the Policy and Code of Conduct and related policies. Compliance will be monitored via Manager and Information Governance Team reports of spot checks, completion of staff questionnaires, incidents reported, electronic audit trails and submission of the Information Governance Toolkit Non adherence to the Policy and Code of Conduct and related policies will result in local disciplinary policies being implemented. 13 P age

14 Appendix 1 ing Patients Dudley CCG Request for Dudley CCG to contact Patient via Personal Address Dudley CCG is committed to open working and efficiency in providing services. To ensure that services are as tailor made as possible to the requirements of its patients Dudley CCG recognises that with advancing technology, current and routine forms of communication may not be convenient or possible with some patients. To this end Dudley CCG will be willing to undertake correspondence with the patient under the following conditions. This agreement is entered into at the request of the patient. The patient understands that Dudley CCG has no responsibility for information that leaves authorised NHS networks at the request of the patient and as such cannot guarantee the security of such information. The patient understands that Dudley CCG has no responsibility for equipment used by the patient to send or receive . The patient has satisfied themselves that access to their own system is secure and is aware of shared accounts, shared computers etc. To minimise the risk of human error in writing addresses, the patient will send an to XXXXXXXXXXXXXXXX in the first instance. This will give Dudley CCG their preferred contact address and will be used to correspond with them. A test will be returned by Dudley CCG to indicate safe receipt and the sent address will be the one used to correspond with the patient. Dudley CCG reserves the right to terminate this agreement if there is any virus or other such technical threats to its internal systems as a result of external traffic. By signing below the patient indicates they have read an understood the conditions given above. The patient also understands they are able to review or cancel this arrangement at any time in writing. Name Address Signature Agreed on behalf of Dudley CCG Signature Print Name 14 P age

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body) ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

Information Governance Policy

Information Governance Policy Information Governance Policy UNIQUE REF NUMBER: AC/IG/013/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3

LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3 LINCOLNSHIRE COUNTY COUNCIL Information Security Policy Framework Document No. 8 Email Policy V1.3 Document Control Reference V1.3 Email Policy Date 17 July 2015 Author Approved by Version History David

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Email Policy For Staff and Students

Email Policy For Staff and Students Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Islington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014

Islington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014 A council-wide information technology policy Version 0.9 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document is distributed under the Creative Commons Attribution

More information

Using Public Computer Services in Somerset Libraries

Using Public Computer Services in Somerset Libraries Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable

More information

LINCOLN COLLEGE INTERNET, E-MAIL, AND COMPUTER ACCEPTABLE USE POLICY

LINCOLN COLLEGE INTERNET, E-MAIL, AND COMPUTER ACCEPTABLE USE POLICY LINCOLN COLLEGE INTERNET, E-MAIL, AND COMPUTER ACCEPTABLE USE POLICY POLICY IT/PO/1 SPONSOR IT Manager Last formal review date: March 2012 Next formal review date: March 2013 Impact Assessed 17 April 2012

More information

UTC Cambridge ICT Policy

UTC Cambridge ICT Policy UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions

More information

Information Governance Toolkit Policy

Information Governance Toolkit Policy Information Governance Toolkit Policy UNIQUE REF NUMBER: AC/IG/014/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT

More information

Email Usage Policy Document Profile Box

Email Usage Policy Document Profile Box Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee

More information

E-SAFETY POLICY 2014/15 Including:

E-SAFETY POLICY 2014/15 Including: E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable

More information

E-Mail and Internet Policy

E-Mail and Internet Policy E-Mail and Internet Policy Document reference Title: E-Mail and Internet Policy Product ID: Version Number: 8.0 Status: Live Distribution / Issue date: 12 November 2014 Author: K. Fairbrother Review Period:

More information

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs

More information

Advice leaflet Internet and e-mail policies

Advice leaflet Internet and e-mail policies Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Executive Director (AK) [J50]

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - EMAIL POLICY Executive Director (AK) [J50] AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Committee: Policy and Resources Date: 23 rd June 2009 Author: Executive Director (AK) [J50] 1.0 ISSUE 1.1

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy

More information

Use of the Internet and E-Mail Policy

Use of the Internet and E-Mail Policy Use of the Internet and E-Mail Policy This procedural documentsupersedes : Use of the Internet and E-Mail Policy CORP/EMP 16 v.4 Name and title of author/reviewer Samantha Francis HR Advisor Date revised

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by : GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience: E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:

More information

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including

More information

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,

More information

Dauphin County Technical School

Dauphin County Technical School Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils

CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils Contents 1. Scope 2 2. Use of IT Facilities 2 3. Monitoring of IT Facilities 5 4. Maintenance & Repairs 6 5. Copyright and Licence Agreements

More information

Mobile and Remote Working Policy

Mobile and Remote Working Policy Mobile and Remote Working Policy UNIQUE REF NUMBER: AC/IG/018/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most

More information

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either: POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,

More information

Liverpool Hope University. Equality and Diversity Policy. Date approved: 14.04.2011 Revised (statutory. 18.02.2012 changes)

Liverpool Hope University. Equality and Diversity Policy. Date approved: 14.04.2011 Revised (statutory. 18.02.2012 changes) Liverpool Hope University Equality and Diversity Policy Approved by: University Council Date approved: 14.04.2011 Revised (statutory 18.02.2012 changes) Consistent with its Mission, Liverpool Hope strives

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES

GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES Version 3.0 17/05/2012 CONTENTS 1. Introduction and Scope... 3 2. Data Protection Act 1998... 4 3. Licence Registration and Prevention of Piracy...

More information

Acceptable Use of Information. and Communication Systems Policy

Acceptable Use of Information. and Communication Systems Policy Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Internet, Social Networking and Telephone Policy

Internet, Social Networking and Telephone Policy Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES)

POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES) Policy Document POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES) For the definitions of terms used in this policy document refer to the Delegations of

More information

LCC xdsl Usage Policy

LCC xdsl Usage Policy LCC xdsl Usage Policy 1. Introduction For the Internet to operate in a manner that satisfies the majority of its users, all users need to observe some rules and etiquette governing their use of it. These

More information

Social Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy

Social Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy Social Media Responsible officer: Director Community and Corporate Services Key Result Area: Governance and Decision Making Document type: Policy Reference: 10/01/0004 Approved by: Council Date approved:

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Internet, Social Media and Email Policy

Internet, Social Media and Email Policy West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...

More information

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013 Use of Social Networking Websites Policy START DATE: March, 2013 NEXT REVIEW: March 2015 COMMITTEE APPROVAL: Joint Management Trade Union Committee CHAIR S SIGNATURE: STAFF SIDE CHAIR S SIGNATURE: DATE:

More information

E-mail & Internet Policy

E-mail & Internet Policy E-mail & Internet Policy Recommending Committee: Approving Committee: Clinical Standards & Focus Council Trust Governance Board Signature: Designation: Chief Executive Date: Version Number: 02 Date: August

More information

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network

More information

Internet and Social Media Policy

Internet and Social Media Policy Internet and Social Media Policy Page 1 of 19 Review and Amendment Log / Control Sheet Responsible Officer: Chief Officer Clinical Lead: Author: Date Approved: Committee: Version: Review Date: Medical

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011 West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer

More information

If you have any questions about any of our policies, please contact the Customer Services Team.

If you have any questions about any of our policies, please contact the Customer Services Team. Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting

More information

Internet, E-mail and SMS Texting Usage Policy Group Policy

Internet, E-mail and SMS Texting Usage Policy Group Policy Internet, E-mail and SMS Texting Usage Policy Group Policy Scope: This Orbit Housing Group Limited ( Group ) policy provides a set of guidelines for all users within the Group on the proper usage of the

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Electronic Mail Policy Version: 5 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

E-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy

E-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy E-Safety Policy Reviewed and Adopted: July 2014 Reviewed by: HT/ LTS Next Review: July 2015 Annual Policy 1 1. Introduction Internet is an essential element of life in 21st Century; it is also a part of

More information

OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy

OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy SECTION OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy 1 Purpose 1 2 Principles 1 3 Telephone Use 2 4 Postal Mail 2 5 Email Use 3 6 Internet Use 3 7 Social

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

School policies and Security Risks

School policies and Security Risks 1) Introduction a) The school expects its computer and telephone systems to be used in a professional manner at all times. The school provides these facilities at its expense for its own business purposes.

More information

2.1 It is an offence under UK law to transmit, receive or store certain types of files.

2.1 It is an offence under UK law to transmit, receive or store certain types of files. Website Hosting Acceptable Use Policy 1. Introduction 1.1 Jarrett & Lam Consulting s Acceptable Use Policy for hosting customers to protect our resources, the resources of our customers and to ensure that

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

John of Rolleston Primary School

John of Rolleston Primary School John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership

More information

Bring Your Own Device Program: User Charter

Bring Your Own Device Program: User Charter Bring Your Own Device Program: User Charter Turramurra High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. The wireless network and

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

Sample Employee Network and Internet Usage and Monitoring Policy

Sample Employee Network and Internet Usage and Monitoring Policy CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members

More information

Digital Device LOAN CHARTER

Digital Device LOAN CHARTER Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to

More information