Northeast Health System (NHS) Information Privacy and Security
|
|
- Jeffrey Brooks
- 8 years ago
- Views:
Transcription
1 Northeast Health System (NHS) Information Privacy and Security Subject: Electronic Communication Non-employees Date Effective: Date Revised: Date Reviewed: Applies to: A. All non-employed workforce members (users) including medical staff, other licensed independent practitioners, students, contracted workers, and business associates B. Any/all users connected to Northeast Hospital Corporation (NHC) electronic communication systems This policy is to be used in conjunction with the NHS Compliance Plan and all other entity- and/or Departmentspecific information privacy & security policy and procedure. This policy also aligns with The Electronic Communication Policy for all employee users PURPOSE: To describe the acceptable use of electronic communication devices and systems at NHC. Inappropriate use exposes NHC to risks including virus attacks, compromise of network systems/services, unauthorized disclosure of protected health information (PHI) and/or personal identifiers (PI), reputational loss, and/or liability. GENERAL POLICY: Users are to use the electronic communication system only as authorized by the organization. All users who are granted access must review and understand the information privacy and security policies and procedures for computer and system use and will be held accountable/responsible for all activities associated with their username and password. Use of the organization's electronic systems implies an understanding of and agreement to this policy. The electronic communication system includes, but is not limited to, computers, , fax machines, Internet access, external access to all NHC-owned systems, pagers, telephones (land lines & cell phones), voice mail and personal communication devices (i.e. Blackberry, Nextel, iphone, ipad, etc.) USER RESPONSIBILITY: Users must adhere to this policy at all times - when inside/outside the buildings of NHC and/or whenever using NHC systems. Each user is responsible for the content of all text and images he/she places or sends over the organization's electronic communications system or when using the organization s communication devices or systems. Users must therefore use discretion when writing messages and/or other electronic communications since they are considered business records, are the property of the organization and may be used in legal processes. They may be used by the organization as evidence in disciplinary proceedings. is a permanent form of communication and users are to keep in mind at all times that the contents of may be scrutinized at a later date. No or other electronic communication is to be sent which hides the identity of the sender, represents the sender as someone else without prior authorization, or uses an alias. Users are responsible for securing their PCs, workstations, and/or laptops including personal devices connected to NHC systems by locking or logging off when not in active use or unattended.
2 COMPUTER ACCESS (including and Internet access) is to be used for NHC-related purposes only. Users must abide by all existing NHC policies and procedures when using the organization's electronic or wireless communication system. All existing NHC policies apply to conduct when using all means of electronic communication as defined by this policy. For example, the organization's policies against discrimination and harassment fully apply to any and all electronic communication. Users must respect the copyrights, software licensing rules, property rights, and privacy of others. Users must maintain HIPAA privacy and data security especially when using, storing, or transmitting PHI and/or PI. Certain sites that contain social or inappropriate material will be blocked for all users. Inappropriate usage is prohibited and could lead to sanctions up to and including termination of contract, termination of computer system use, and/or criminal prosecution. Inappropriate usage is defined as downloading/accessing sites of a sexual nature, use of profanity, threatening behaviors, unlawful usage, etc. Individuals who need access to blocked sites for business appropriate reasons must seek written approval from their Chief and respective Vice President. Occasionally, sites are mis-categorized or may be blocked in error; these sites should be reported to the Help Desk for review by Information Systems. Users may not connect any personal computers, laptops, or devices to the NHC private network without prior approval by the Information System Security Officer. PRIVACY: No user should have any expectation of privacy in any communication, message, file, image or data created, sent, stored or received by or on the organization's equipment and/or systems. The organization has the right to access and monitor any and all aspects of its electronic communication system. Users are not to assume that using password protection, whether assigned by the organization or not, guarantees a right or expectation of privacy. The organization's monitoring and accessing of its system users may occur at any time, without notice, and without the user's permission. The organization reserves the right to review all user browsing transactions and Internet activity from company resources. The organization's monitoring of its system may include, but will not be limited to, accessing, recording, disclosing, inspecting, reviewing, retrieving and printing communications, logins and other uses of the system, as well as keystroke capturing and/or other network sniffing technologies. The reasons for which the organization may obtain such access include, but are not limited to: maintaining the system, preventing or investigating allegations of abuse or misuse of the system, ensuring compliance with software copyright laws, monitoring and ensuring work flow and productivity, complying with legal and regulatory requests for information and ensuring that the organization's operations continue appropriately during a user s absence or unavailability. The organization may store data or communications for a period of time after the data communication is created. From time to time, copies of such data or communications may be deleted. To ensure the integrity, confidentiality and security of the organization's data and communications, users are prohibited from storing organizationrelated information on personal computers or personal storage devices (i.e., flash drives, portable hard drives, etc.). All PHI and/or PI stored on organization-owned storage devices must be encrypted in accordance with Information Systems Departments Acceptable Encryption Policy.
3 USE OF PERSONAL COMMUNICATION DEVICES (i.e. cell-phones, Blackberry, iphone, ipad) Personal telephone calls: NHC recognizes that there are times when a user has to receive or make personal phone calls during work hours. However, these calls should be kept to a minimum in order to maintain professionalism and safe practice. If making and receiving personal phone calls becomes excessive and/or disruptive to a user s responsibilities, the user s Chief or NHC management will address the issue by way of sanctions via medical staff bylaws and/or contractual agreement. In an effort to be customer focused and minimize unnecessary noise, users are to at all-time set personal cell phones to silent. When authorized by the user s Chief or NHC management, due to emergency situations, users may set personal cell phones to vibrate mode. Cell phones are not to be used within three feet of clinical equipment. Texting and other personal communication device activity: Texting, listening to music and other activities for which personal communication devices may be used are to occur only during break periods and away from patient care or work areas. Pagers and portable devices are currently unsecure and not acceptable methods of sending PHI/PI between users. All organization wide internal s must be approved and sent by the appropriate Senior Manager/Vice President, and/or Marketing and Business Development Department. On-line social networking: Online social networking refers to the interaction of individuals through web-based social networking sites (i.e. Facebook, Twitter, YouTube, etc.) as well as the participation in chat rooms, on-line forums and electronic bulletin boards. NHC electronic communication system is not to be used to engage in social networking at any time, unless it is organization sponsored and/or on our Intranet (NIC). In addition, users are to be mindful of online conversations during personal time. User conduct, even when not working at NHC, can reflect on and impact NHC. Users are to exercise personal responsibility whenever involved in social networking. If the subject of the discussion is NHC, or those affiliated with NHC, users must be mindful of the following guidelines: *Do not disclose any information that would be protected by HIPAA, and/or would deem the patient recognizable by description. HIPAA privacy rules still apply, even if you are not working at NHC. *Whether publishing a blog or participating in someone else's blog, users are to make it clear that they are expressing their own views and opinions, and that they do not speak on behalf of NHC. Only those officially designated by NHC have the authority to speak on behalf of NHC. *Be respectful of potential readers. Do not use discriminatory comments, libel or slander when commenting about NHS/NHC, NHS/NHC management, NHS/NHC employees, or NHS/NHC competitors; *If users have any questions about the content of blogs/social network materials, they may seek guidance from a member of NHC management and/or the Privacy Officer; The failure to follow these guidelines may result in sanctions up to and including termination of contract and/or termination of computer use. NHC reserves the right to monitor all blogs/social networking sites for the purpose of protecting its interests. Other Prohibited Uses of Electronic Equipment: The following is a non-exhaustive list of different types/uses of electronic equipment or software for data that may be transmitted, received, downloaded, accessed, stored, created, sent or distributed which is strictly prohibited:
4 * Sending or forwarding non-encrypted PHI and/or PI to any system outside our internal GroupWise, such as business partners, other healthcare facilities, physician practices, AOL, Yahoo, Comcast, Gmail, etc. Users should also not set-up automated rules or forward from internal GroupWise system to outside systems. *Any accessing, downloading, sending, or publishing of any PHI, PI, and/or confidential patient or financial information; *Distribution of organization documents, financial reports, lists, competitive information, logos and images to any unauthorized inside or outside sources or organizations; *Solicitation or distribution in violation of NHS Solicitation, Distribution, Access and Raffles policy (see Compliance Plan) *Any messages or communications that contain objectionable/illegal language or material. Objectionable material is defined as pornographic, obscene, sexually explicit, or sexually oriented language, as well as discriminatory, defamatory or threatening language. No one may use the organization's system in a manner that may be construed by others as harassing or discriminatory based on race, color, national origin, citizenship status, pregnancy, veteran status, genetic information or any other protected class; *Use for purposes related to any illegal activities including, but not limited to illegal drugs, gambling, prostitution or weapons; *Use of any chain letters or non-business related mass- s; *Downloading unauthorized and/or unlicensed software programs, data, or other copyrighted and/or trademarked materials; *Transmitting copyright materials that violate software copyright laws, including copying, retrieving, modifying or forwarding such materials; *Use of another user s password, with or without permission. *Significantly tampering with or changing any configuration of an electronic communication device without prior authorization, including copying, destroying, deleting, distorting, removing, concealing, modifying or encrypting messages or files or other data on the organization s system without prior authorization. *Using the organization's system for commercial uses not intended to benefit the organization, except for those that are sponsored and are posted on our Intranet (NIC). * Users must not share their username and/or passwords or disclose this information to employees, or to anyone else * Only individually-assigned encrypted portable devices (i.e., USB drives) are to be used on NHC systems. Personally-owned portable devices are not to be plugged into the corporate network. *Users must not open attachments unless they are expected and have come from a known party as they may contain viruses, worms, or Trojan horse code * Exporting software, technical information, and/or encryption software/technology out of the United States may
5 be in violation of export laws and may be illegal. The Legal Services Department is to be consulted prior to export of any material that may be in question. * Introduction of malicious programs into the network or onto computers (i.e., viruses, worms, Trojan horse code, logic bombs) is prohibited. *Introduction of wireless routers into the NHC network without consent of the Information Systems Department is prohibited. * Effecting security breaches or disruption of network communication is prohibited (i.e., network sniffing, pinged floods, packet spoofing, denial of service, and/or forged routing information for malicious purposes) * Port scanning or security scanning is prohibited unless undertaken as part of an approved Information Systems Department process. * Executing any form of network monitoring which will intercept data not intended for the user is prohibited unless part of an approved Information System Department activity. * Circumventing the authentication or security of any user, network, or account (i.e., cracking) is prohibited. REFERENCES: HITECH HIPAA Privacy and Security modifications (45 CFR Parts 160 and 164) Massachusetts Data Security (201 CMR 17.00)
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
More informationAcceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
More informationAPPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
More informationAcceptable Use Policy
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
More informationAcceptable Use Policy
Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
More informationINFORMATION SYSTEM GENERAL USAGE POLICY
PURPOSE The Information System General Usage Policy ("Policy") establishes appropriate uses of Devon s Information Systems. Devon provides secure Information Systems in accordance with the Information
More informationAcceptable Use Policy
Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture
More informationc. Require or Request Photos of Subscriber f. Allow Subscribers Access to Other Subscriber Information
Diocese of Orlando Network Acceptable Use Policy for All Parishes, Schools and Entities of the Diocese of Orlando Parent Addendum (Please note these are excerpts from the full document) 5.3 Unacceptable
More informationInformation Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
More informationUnited Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
More informationORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:
More informationREGION 19 HEAD START. Acceptable Use Policy
REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions
More informationPolicy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationINFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
More informationSenior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES
Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the
More information1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
More informationWestwood Baptist Church Computer use Policy
Westwood Baptist Church Computer use Policy I. Policy Statement The use of Westwood Baptist Church automation systems, including computers, fax machines, and all forms of Internet/Intranet access, is for
More informationB. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
More informationEMPLOYEE COMPUTER USE POLICY
EMPLOYEE COMPUTER USE POLICY SECTION ONE PURPOSE A. To better serve our students and provide our teachers and other employees with the best tools to do their jobs, Navigator Pointe Academy makes available
More informationLINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
More informationUNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
More informationInformation Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
More informationHow To Use A College Computer System Safely
1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.
More informationStudent use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
More informationAASTMT Acceptable Use Policy
AASTMT Acceptable Use Policy Classification Information Security Version 1.0 Status Not Active Prepared Department Computer Networks and Data Center Approved Authority AASTMT Presidency Release Date 19/4/2015
More informationTele-Media Cable Internet Acceptable Use Policy
Tele-Media Cable Internet Acceptable Use Policy Important Note: Tele-Media may revise this Acceptable Use Policy (the "Policy") from time to time without notice by posting a new version of this document
More informationDCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
More informationPolicy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
More informationHuman Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
More informationCOMPUTER, INTERNET, & EMAIL USE POLICY
COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter
More informationAcceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
More informationACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More informationDEPARTMENT OF COMMUNITY AND GOVERNMENT SERVICES (CGS) ACCEPTABLE EMAIL & INTERNET USAGE POLICY POLICY STATEMENT
POLICY STATEMENT The purpose of this Policy is to establish the rules of acceptable use of Government of Nunavut networks and Internet services including E-mail, web-browsing, remote access, file transfer,
More informationBRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
More informationValmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
More informationPierce County Policy on Computer Use and Information Systems
Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail
More informationAcceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
More informationHUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
More informationAPPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES
APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,
More informationValmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
More informationNORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES
NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES 1. PROCEDURE SUMMARY STATEMENT To establish procedures relating
More informationf. Engaged in for any purpose that is illegal or contrary to Gateway Preparatory Academy policy or business interests.
A. Employee Computer use COMPUTER USE POLICY AND AGREEMENT SECTION ONE PURPOSE 1. To better serve our students and provide our teachers and other employees with the best tools to do their jobs, makes available
More informationSTAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Star has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Star s Broadband Internet
More informationELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
More informationNew Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
More informationEMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
More information'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
More informationICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
More informationGlenmeadow, Inc. Terms and Conditions of Use Legal Notices/ Privacy Policy
Glenmeadow, Inc. Terms and Conditions of Use Legal Notices/ Privacy Policy Medical Disclaimer Glenmeadow is a senior living retirement community providing assisted and independent senior living options
More informationAcceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
More informationK-20 Network Acceptable Use Guidelines/Internet Safety Requirements
Page 1 of 5 K-20 Network Acceptable Use Guidelines/Internet Safety Requirements These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive
More informationGREENWICH PUBLIC SCHOOLS Greenwich, Connecticut
Policy E-040 Effective Learning Environment GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut Procedure E-040.4 - Acceptable Use and Internet Safety Agreement Acceptable Technology Use Regulations/Internet
More informationAcceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
More informationSample Policies for Internet Use, Email and Computer Screensavers
Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies
More informationSuperintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS
Page 1 of 7 ELECTRONIC COMMUNICATIONS 1.0 The District supports the use of the Internet and electronic communications by all employees to improve teaching and learning through interpersonal communication,
More informationAcceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
More informationRiverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
More informationHIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
More informationCity of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
More informationPlease review and make copies of the following documents for each designated staff in need of Valley Express access.
Welcome to Valley Express (VE) Valley Express is Valley Health Plan s (VHP) Authorization and Referral data system. By signing this document, the individual signifies that the County s User Responsibility
More informationThe City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
More informationTechnology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
More informationWestchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents
Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents Introduction... 2 Prohibited Use... 2 Electronic Communication & Computer Usage... 3 Identification
More informationAcceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
More informationINTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures Purpose The purpose of the ACH Network Acceptable Use Procedures is to provide the procedures, rules, guidelines,
More information5. Users of ITS are the persons described above under Policy Application of the diocese of Springfield in Illinois.
Diocese of Springfield in Illinois Section I General Statement 1. Information Technology Systems (ITS), when properly used, provide timely communication and technological support to help fulfill the mission
More informationMARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
More informationNondiscrimination. 1 of 10
Scope This procedure applies to all College District information technology resource users, including but not limited to administrators, faculty, students, staff, Board members, agents, volunteers, vendors,
More informationCity of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
More informationregion16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
More informationBroadband Acceptable Use Policy
Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2
More informationPRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY
More informationCablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
More informationStudent Network Acceptable Use Policy Lone Jack C-6 School District
Student Network Acceptable Use Policy The, hereinafter known as LJC6, provides students and staff with a service called the Network. The Network is a computer service, which includes, but is not limited
More informationPHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
More informationSheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
More informationNewark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to the Internet, and a Bring
More informationLOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
More informationStudent & Staff Access and Use of Networked Information Resources and Communications
Page 1 of 6 These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive and effective digital citizenship among students and staff. Digital
More informationOXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
More informationClear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
More informationNewark City Schools Computer Network and Internet Acceptable Use Policy and Agreement
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to interconnected computer systems within the district
More informationsection 15 Computers, Email, Internet, and Communications
section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property
More informationINTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
More informationTAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
More informationIntroduction. General Use
Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use
More informationPeace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
More informationVentura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
More informationBOARD OF EDUCATION POLICY
BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate
More informationSample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
More informationII-105 Acceptable Use of Information Resources
Children's Hospital Medical Center Online Policies II-105 Acceptable Use of Information Resources Original Date: 4/20/2005 Last Review Date: 5/12/2008 Purpose Users must not misuse corporate systems in
More informationCaldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Student Computer Usage Policies and Procedures I. Campus Computer Usage Overview: The purpose of this document is to define the policies and procedures
More informationOdessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
More informationELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
More informationNORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS
NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS Code No. 605.6E1(B) I am the parent or guardian of the student named
More informationR3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
More informationPOLICIES AND REGULATIONS Policy #78
Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use
More informationTITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06. REFERENCE: Board Rule 2.16 PAGE 1 OF 6
LAKE-SUMTER COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06 REFERENCE: Board Rule 2.16 PAGE 1 OF 6 1. General Information a. LSCC Information Systems (IS)
More information