, Calendar and Messaging Services Good Practice Guideline

Size: px
Start display at page:

Download "E-Mail, Calendar and Messaging Services Good Practice Guideline"

Transcription

1 , Calendar and Messaging Services Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG Prog. Director Mark Ferrar Status 1.0 Owner Tim Davis Version Approved Author Phil Benn Version Date 13/10/2006 , Calendar and Messaging Services Good Practice Guideline Crown Copyright 2006

2 Amendment History: Version Date Amendment History /10/2005 First draft for comment /10/2006 Approved Forecast Changes: Anticipated Change When Reviewers: This document must be reviewed by the following: Name Signature Title / Responsibility Date Version Malcolm McKeating IG Security Team Manager 0.1 Approvals: This document must be approved by the following: Name Signature Title / Responsibility Date Version Malcolm McKeating Tim Davis Distribution: IG Security Team Manager 1.0 Head of Information Governance NHS CFH Information Governance Team and FileCm NHS CFH Cluster Technical Architects NHS CFH Website NHS CFH External FileCm Document Status: This is a controlled document. Whilst this document may be printed, the electronic version maintained in FileCM is the controlled copy. Any printed copies of the document are not controlled. Related Documents: These documents will provide additional information. Ref no Doc Reference Number Title Version 1 NPFIT-SHR-QMS-PRP-0015 Glossary of Terms Consolidated.doc Crown Copyright 2006 Page 2 of 10

3 Glossary of Terms: Term Acronym Definition SMTP SMTP Simple Mail Transfer Protocol MTA MTA Message Transfer Agent Crown Copyright 2006 Page 3 of 10

4 Contents 1 Introduction Purpose Scope Assumptions Objectives Background Target Disclaimer Services Users of NHS systems should: Users of NHS systems should not: Calendar Services Directory Services Fax Services SMS Services Use of the Services for sensitive information...10 Crown Copyright 2006 Page 4 of 10

5 1 Introduction 1.1 Purpose The purpose of this document is to provide guidance on: The minimum best practice standards which should be applied to the use of , Calendar and Messaging Services. The procedures and mechanisms for the controlled use of , Calendar and Messaging Services in an NHS or other Healthcare environment. 1.2 Scope This document describes best practice guidelines for the use of , WebMail, Calendar and Messaging Services within an NHS or other Healthcare environment. It does not cover public access messaging systems, or external messaging infrastructures. 1.3 Assumptions This text assumes the reader has a broad familiarity with SMTP, MTA s and applications in general use. 1.4 Objectives This document provides guidance as to good practice for organisations and their users who wish to use , Calendar and Messaging Services, in an NHS or other Healthcare environment. Following reading this document, readers will be able to relate the practice detailed herein to their local organisation s operating practice and procedures. 1.5 Background This document offers guidance on the best practices to be considered when using E- mail, Calendar and Messaging services. It must be noted that whilst being private, N3 is not a secure network and therefore network level encryption is generally not available. This document offers guidance on the correct use of , Calendar and Messaging Services in such environments. 1.6 Target This document is intended for use by the following: NHS Connecting for Health National Network Service Providers NHS Healthcare Providers Non-NHS Healthcare Providers Crown Copyright 2006 Page 5 of 10

6 1.7 Disclaimer Reference to any specific commercial product, process or service by trade name, trademark manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by NHS Connecting for Health. The views and opinions of authors expressed within this document shall not be used for advertising or product endorsement purposes. NHS Connecting for Health shall also accept no responsibility for any errors or omissions contained within this document. In particular, NHS Connecting for Health shall not be liable for any loss or damage whatsoever, arising from the usage of information contained in this document. Crown Copyright 2006 Page 6 of 10

7 2 Services 2.1 Users of NHS systems should: Identify themselves honestly, accurately and completely when setting up accounts on any NHS service, and keep such details accurate and up to date. Choose an appropriate address which reflects that the service is to be used for business purposes. Operate under organisational policies (where these are provided) when using the services. 2.2 Users of NHS systems should not: Attempt to use any aspect of the service for private gain or advertising. Route external communications in a manner that deliberately attempts to bypass any system logging or audit functionality. Attempt to disguise themselves or their sending address when they use the service in order to misrepresent any aspect of a communication. Use the services to disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of another user. Attempt to introduce computer viruses via messages or attachments. Forward chain mail or other frivolous material. Use the service to violate the laws and regulations of the United Kingdom. Attempt to send persistent communications to an individual or mailing list when, as a result of any complaint, a warning has been issued that further communication are not wanted. Send defamatory material by , or send communications which knowingly cause distress or offence to another user, or transmit any files of an obscene or pornographic nature. If, in exceptional circumstances, there is a business necessity to transmit sexually explicit images or documents for a valid clinical reason, then the user should justify and obtain the permission of the local Caldicott Guardian and inform the National Programme for IT that they intend to use the national system for this purpose before they start doing so. Crown Copyright 2006 Page 7 of 10

8 Additionally, users of NHS services have a responsibility to: Ensure that the identity of the recipient to whom they are sending an is correct. Reasonably understand copyright, trade-mark, libel, slander and public speech control laws, so that their use of the service does not inadvertently violate any laws which might be enforceable against the National Programme for IT, local Trust or organisation. Ensure that should it be necessary for Patient Identifiable Data to be transferred through the Service, the obligations detailed in the section of the document titled Use of the Services for sensitive information are adhered to. The primary use of the services by the authorised user should be related to the business of Health and Social Care, and for the purpose which the user is employed by their employing organisation. As such the user should not have an expectation of personal privacy in the use of the services. Clinicians should use the services in relation to the treatment of private patients in accordance with their professional codes of conduct; however, such use would be at the risk of the user. Crown Copyright 2006 Page 8 of 10

9 3 Calendar Services It is the responsibility of the user to: Ensure that Patient Identifiable Information is not held within the details of any appointment when that appointment is visible to another user who may not be directly involved in the care of that patient. Ensure that should Patient Identifiable Information be visible to another user, such information is commensurate with that user s access privileges to NCRS. 4 Directory Services It is the responsibility of the user to ensure that their details accessible through the directory services are correct and, should they require updating, are done so without undue delay. The user should not use the directory services to identify individuals or groups of individuals to send unsolicited material which is unrelated to their job role or responsibility. The user should not use the directory services to identify individuals or groups of individuals to send advertising material, or unnecessary or other frivolous material, either on their own account or on behalf of a third party. 5 Fax Services It is the responsibility of the user to assure the destination of any message sent through Fax Services such that it can be ensured that Patient Identifiable Data is not obtained by an unauthorised individual. 6 SMS Services It is the responsibility of the user to assure the destination of any message sent through the SMS Service such that it can be ensured that Patient Identifiable Data is not obtained by an unauthorised individual. Crown Copyright 2006 Page 9 of 10

10 7 Use of the Services for sensitive information Some services such as Contact provide encryption of interpersonal messages during transmission. This encryption ensures that the message cannot be intercepted and read or tampered with during transmission. Users should ensure that local policies and procedures are in place to protect privacy and confidentiality of all personal and sensitive information. Such sensitive information includes all Patient Identifiable Data. Note that the Contact system was created to be acceptable for this purpose. Patient Identifiable Information should not be transmitted where encryption is not available either within the services or the client application being used. Users should check with local IT support for further information. It is the responsibility of the user to ensure that should it be necessary to send Patient Identifiable Data through Electronic Mail Services, such information shall be no more than the individual receiving the needs to know to perform the function which the Sender intends the individual to perform with the Data, and that such necessity is endorsed by the Caldicott Guardian for the Sender. The user should not send clinical information as an attachment between recipients unless it is part of a process between Health Care Professionals who have agreed to such an exchange, such agreement to take place in advance of any communication. It is best practice for the user to seek acknowledged receipt of such information. The user should ensure that they are satisfied as to the identity of any other party with whom they correspond on clinical and confidential matters, and/or send sensitive information to. The user should ensure that any clinical information sent conforms to the Caldicott principles in a manner endorsed by the local Caldicott Guardian. Crown Copyright 2006 Page 10 of 10

Proxy Services: Good Practice Guidelines

Proxy Services: Good Practice Guidelines Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance Prog. Director Mark Ferrar Owner Tim Davis Version 1.0 Author James Wood Version Date 26/01/2006 Status APPROVED Proxy Services:

More information

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Secure Use of the New NHS Network (N3): Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0003.01 Prog. Director Mark Ferrar Status Approved Owner Tim Davis Version 1.0 Author Phil Benn Version

More information

Use of tablet devices in NHS environments: Good Practice Guideline

Use of tablet devices in NHS environments: Good Practice Guideline Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood

More information

Site to Site Virtual Private Networks (VPNs):

Site to Site Virtual Private Networks (VPNs): Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0

More information

NHS Commissioning Board: Information governance policy

NHS Commissioning Board: Information governance policy NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Electronic Mail Policy Version: 5 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating

More information

and Internet Policy

and Internet Policy Email and Internet Policy Responsible Officer Authors Date effective from July 2008 Ben Bennett, Business Planning & Resources Director Policy Development Group Date last amended December 2012 Review date

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Hulme Hall Medical Group

Hulme Hall Medical Group Beacon Practice for Patient Online Hulme Hall Medical Group Fax and Emailing Handling Policy Written By: Joanne Revell Signed: Authorised by: Anna Webster Signed: Job Title: Practice Manager CQC Lead Effective

More information

N3 Protecting the Network through Information Governance and Assurance

N3 Protecting the Network through Information Governance and Assurance N3 Protecting the Network through Information Governance and Assurance NHS CFH Operational Security Team cfh.ost@nhs.net Introductions The NHS CFH Operational Security Team: Tony Hodgson Operational Security

More information

TERMS & CONDITIONS Updated July 2013

TERMS & CONDITIONS Updated July 2013 TERMS & CONDITIONS Updated July 2013 1. These Terms and Conditions together with the order form constitute the entire agreement between Red Cloud Hosting ( the Company ) and the Customer. Definitions 1.

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

WCCM XII & APCOM VI Secretariat is in Seoul. Your use of http://wccm2016.org will always be

WCCM XII & APCOM VI Secretariat is in Seoul. Your use of http://wccm2016.org will always be Terms & Conditions Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

Pulaski Technical College

Pulaski Technical College Pulaski Technical College Internet and E-Mail Acceptable Use Policy 1. Introduction Pulaski Technical College provides faculty and staff with technology resources and a local area network with access to

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

Network Address Translation (NAT) Good Practice Guideline

Network Address Translation (NAT) Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0011.06 Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mike Farrell

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

Best practice guidance for information security within Choose and Book May 2009

Best practice guidance for information security within Choose and Book May 2009 Best practice guidance for information security within Choose and Book May 2009 Best practice guidance for information security within Choose and Book This guidance has been prepared to help organisations

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Policy Document Control Page. Updated to include new NHS mail encryption feature

Policy Document Control Page. Updated to include new NHS mail encryption feature Policy Document Control Page Title Title: Electronic Mail Policy Version: 6 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body) ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

SMS Service Agreement

SMS Service Agreement SMS Service Agreement Best Practice Software provide this document as its agreement with its Customer(s) on the provision of SMS Services. These SMS Service Terms & Conditions ( Terms ) are between Best

More information

SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS

SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS These terms of use govern your use of our site. Please read the whole of these terms in full before you use this Website. If you do not accept these terms, please do not use this Website. Your continued

More information

A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes

A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes Contents 1 Introduction 3 2 NHSmail Acceptable Use Policy 3 3 Objectives 4 4 General

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

2.2 The Policy establishes a framework within which users of these facilities can apply selfregulation to their use of the facilities.

2.2 The Policy establishes a framework within which users of these  facilities can apply selfregulation to their use of the facilities. Email Policy 1 Introduction 1.1 This Email Policy has been developed in response to the acknowledged need for guidelines describing the acceptable use of the University s email and related services and

More information

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet

More information

TERMS OF USE 1. Definitions

TERMS OF USE 1. Definitions TERMS OF USE 1. Definitions This website (website) is owned and operated by BATS Trading Limited a company applying to be authorised and regulated by the Financial Services Authority, whose registered

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY Effective August 24, 2004 Overview: The Fresno County Employees Retirement Association (FCERA) provides access to the Internet

More information

Electronic Palliative Care Co-Ordination Systems: Information Governance Guidance

Electronic Palliative Care Co-Ordination Systems: Information Governance Guidance QIPP Digital Technology Electronic Palliative Care Co-Ordination Systems: Information Governance Guidance Author: Adam Hatherly Date: 26 th March 2013 Version: 1.1 Crown Copyright 2013 Page 1 of 19 Amendment

More information

Chicago State University Computer Usage Policy

Chicago State University Computer Usage Policy Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

USE OF PERSONAL MOBILE DEVICES POLICY

USE OF PERSONAL MOBILE DEVICES POLICY Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014

More information

Information Governance Toolkit. Information Security Assurance. Detailed Guidance on Secure Transfers

Information Governance Toolkit. Information Security Assurance. Detailed Guidance on Secure Transfers Information Governance Toolkit Information Security Assurance Detailed Guidance on Secure Transfers Information Transfers/Flows - Security Measures 1. The outcomes of information mapping and identified

More information

TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )

TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide

More information

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network

More information

University of Maryland Baltimore Information Technology Acceptable Use Policy

University of Maryland Baltimore Information Technology Acceptable Use Policy The UMB School of Nursing follows and adheres to the UMB Campus Information Technology Acceptable Use Policy. The UMSON further defines Authorized User to also include any person who receives a password

More information

Acceptable Use of Information. and Communication Systems Policy

Acceptable Use of Information. and Communication Systems Policy Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,

More information

Information Governance Policy

Information Governance Policy Information Governance Policy UNIQUE REF NUMBER: AC/IG/013/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

TERMS OF SERVICE OVERVIEW

TERMS OF SERVICE OVERVIEW TERMS OF SERVICE - - - - OVERVIEW This Wurx website and mobile application jointly referred to as site is operated by B&M Outsourcing, LLC. Throughout the site, the terms we, us and our refer to B&M Outsourcing,

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Information Governance Policy Issue Date: June 2014 Document Number: POL_1008 Prepared by: Information Governance Senior Manager Insert heading depending on Insert line heading

More information

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

NHS Information Governance:

NHS Information Governance: NHS Information Governance: Information Risk Management Guidance: Short Message Service (SMS) & Texting Department of Health Informatics Directorate April 2010 1 Amendment History Version Date Amendment

More information

Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014

Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014 Email, Internet & Social Networking Policy Lead executive Name / title of author: Chief Nurse Colin Owen, Information Governance and Data Security Lead Date reviewed: October 2014 Date ratified: 5 th December

More information

MOC-FLOYD VALLEY COMMUNITY SCHOOL DISTRICT

MOC-FLOYD VALLEY COMMUNITY SCHOOL DISTRICT POLICY TITLE: Student Guidance and Counseling CODE NO. 604.1 The board shall provide guidance and counseling program, for the students enrolled, by a guidance counselor certified with the State Department

More information

IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.

IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. Terms & conditions for the use of this Website IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. By using this website you are deemed to have full

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

3. Electronic Mail (E-mail)

3. Electronic Mail (E-mail) - Title of Agency - Internet Acceptable Use Policy The Following Internet Acceptable Use Policy Applies to the (AGENCY NAME) Staff 1. Introduction The (AGENCY NAME) provides its staff and (other entity(s)

More information

RULES FOR THE USE OF INFORMATION TECHNOLOGY SERVICES (ITS)

RULES FOR THE USE OF INFORMATION TECHNOLOGY SERVICES (ITS) RULES FOR THE USE OF INFORMATION TECHNOLOGY SERVICES (ITS) Policy Owner: ITS Manager Drafted/Amended: March 2013 Approved by: Academic Resources Committee Ratified by: Academic Board Next Review Date:

More information

You must not transmit any worms or viruses or any code of a destructive nature.

You must not transmit any worms or viruses or any code of a destructive nature. TERMS OF SERVICE ---- OVERVIEW This website is operated by Mill Creek Town Center Business Association. Throughout the site, the terms we, us and our refer to Mill Creek Town Center Business Association.

More information

Westwood Baptist Church Computer use Policy

Westwood Baptist Church Computer use Policy Westwood Baptist Church Computer use Policy I. Policy Statement The use of Westwood Baptist Church automation systems, including computers, fax machines, and all forms of Internet/Intranet access, is for

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

Acceptable Use of Information and Communication Systems Policy

Acceptable Use of Information and Communication Systems Policy Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help

More information

Town of Brunswick. Computer Use Policy

Town of Brunswick. Computer Use Policy Town of Brunswick Computer Use Policy Town of Brunswick Computer Use Policy Table of Contents 1. General 1 2. Access 1 3. Acceptable Use 1 4. E-Mail 1 5. E-Mail Attachments 2 6. Internet & Websites 2 7.

More information

Broward County Website Terms of Use

Broward County Website Terms of Use Broward County Website Terms of Use Table of Contents 1. Terms of Use... 1 1.1 User Acceptance of Terms of Use... 1 1.2 Public Participation Forums... 1 1.3 Privacy Policy... 2 1.4 What We Collect and

More information

Information Governance Support Pack

Information Governance Support Pack PCTI Solutions Document Version: 0,1 19 February 2013 Pioneer Court, Pioneer Way, Whitwood, Castleford, West Yorkshire, WF10 5QU T: 01977 66 44 96 F: 01977 66 44 99 E: info@pcti.co.uk W: www.pcti.co.uk

More information

GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE

GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE IF YOU HAVE A MEDICAL EMERGENCY, YOU ARE INSTRUCTED IMMEDIATELY TO CALL EMERGENCY PERSONNEL (911). DO NOT RELY ON THIS WEBSITE OR THE INFORMATION PROVIDED

More information

GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY

GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY 1. Introduction This acceptable use policy ("Policy") sets out the principles, terms and conditions that govern the

More information

TERMS OF SERVICE OVERVIEW

TERMS OF SERVICE OVERVIEW TERMS OF SERVICE - - - - - OVERVIEW This website is operated by 3D Mail Results, a division of American Retail Supply. Throughout the site, the terms we, us and our refer to 3D Mail. 3D Mail offers this

More information

Pretty Clever Consulting, Web Hosting Terms & Conditions

Pretty Clever Consulting, Web Hosting Terms & Conditions Pretty Clever Consulting, Web Hosting Terms & Conditions Pretty Clever Consulting agrees to provide, and Client agrees to receive, access to the Web Hosting and related Services according to the following

More information

Transport Layer Security (TLS) About TLS

Transport Layer Security (TLS) About TLS Transport Layer Security (TLS) About TLS Contents Secure email at HSBC 2 About Transport Layer Security. 2 Setting up a Forced TLS connection with HSBC 4 Glossary... 5 Support..... 5 Secure email at HSBC

More information

Courier Policy. 1 P age

Courier Policy. 1 P age Courier Policy UNIQUE REF NUMBER: AC/IG/009/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY VERSION DATE AMENDMENT

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

This website is operated by PATH-WAY Providing Access To Happiness. Throughout the site, the terms we, us and our refer to PATH-WAY

This website is operated by PATH-WAY Providing Access To Happiness. Throughout the site, the terms we, us and our refer to PATH-WAY TERMS OF SERVICE This website is operated by PATH-WAY Providing Access To Happiness. Throughout the site, the terms we, us and our refer to PATH-WAY Providing Access To Happiness. PATH-WAY Providing Access

More information

Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012

Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012 Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use

More information

RAMPART HOSTING, LLC ACCEPTABLE USE POLICY ("AUP")

RAMPART HOSTING, LLC ACCEPTABLE USE POLICY (AUP) RAMPART HOSTING, LLC ACCEPTABLE USE POLICY ("AUP") 1. General Information. As a provider of Internet/World Wide Web access, web site hosting, and other Internet-related Services, Rampart Hosting, LLC.

More information

Hamilton.net User Agreement Revised August 31, 2004. Acceptance of Terms Through Use

Hamilton.net User Agreement Revised August 31, 2004. Acceptance of Terms Through Use Hamilton.net User Agreement Revised August 31, 2004 Acceptance of Terms Through Use By using the Hamilton.net Internet Service (the Service ), you signify your agreement to all of the terms, conditions,

More information

E-mail & Internet Policy

E-mail & Internet Policy E-mail & Internet Policy Recommending Committee: Approving Committee: Clinical Standards & Focus Council Trust Governance Board Signature: Designation: Chief Executive Date: Version Number: 02 Date: August

More information

Covered California. Terms and Conditions of Use

Covered California. Terms and Conditions of Use Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

Web Server & Systems Usage Policy. The WGG Associates Limited Usage Policy has been developed with the following objectives:

Web Server & Systems Usage Policy. The WGG Associates Limited Usage Policy has been developed with the following objectives: Web Server & Systems Usage Policy The WGG Associates Limited Usage Policy has been developed with the following objectives: Ensure security, reliability and privacy of WGG Associates Limited' systems and

More information

You must not transmit any worms or viruses or any code of a destructive nature.

You must not transmit any worms or viruses or any code of a destructive nature. TERMS OF SERVICE OVERVIEW This website is operated by Dustoff Association. Throughout the site, the terms we, us and our refer to Dustoff Association. Dustoff Association offers this website, including

More information

Email Usage Policy Document Profile Box

Email Usage Policy Document Profile Box Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

Zeanz Ltd shall not be responsible for any malfunctions, errors, crashes or other adverse events that may occur from your use of the Site.

Zeanz Ltd shall not be responsible for any malfunctions, errors, crashes or other adverse events that may occur from your use of the Site. Terms and Conditions The following terms and conditions of use (the "Terms and Conditions") govern your use of the V8, Autoclout, CMS and Communigator CRM Web technology software applications which shall

More information

TERMS OF SERVICE OVERVIEW

TERMS OF SERVICE OVERVIEW TERMS OF SERVICE ----- OVERVIEW This website is operated by Nebraska State Reading Association, hereafter referred to as NEREADS.org. Throughout the site, the terms we, us and our refer to NEREADS.org.

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

5. To provide guidelines and make reasonable efforts to train staff and students in acceptable use and policies governing online communications.

5. To provide guidelines and make reasonable efforts to train staff and students in acceptable use and policies governing online communications. Acalanes Union High School District AR 4040 Employee Use of Technology Electronic Resources The Acalanes Union High School District recognizes the value of computer and other electronic resources to improve

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

JANET ACCEPTABLE USE POLICY

JANET ACCEPTABLE USE POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assesment Ref: Assessed: 12/03/10 30/01/11 25/02/15 JANET ACCEPTABLE USE POLICY 1 BACKGROUND AND DEFINITIONS 1 JANET is the

More information

BLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY

BLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY Acceptable Use Policy Educational Purpose The computer system in Blackrock College has been established for a limited educational purpose. The term "educational purpose" includes classroom activities,

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information