I. Background information
|
|
|
- Esther Cummings
- 10 years ago
- Views:
Transcription
1 A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries I. Background information 1. Please indicate your role for the purpose of this consultation: -multiple choices reply- 2. Please indicate your place of residence or establishment: Civil society association Germany 3. Please provide your contact information (name, address and address): -open reply- Digitale Gesellschaft e.v. Schönhauser Allee 6/ Berlin 0177 ( ) info ett digitalegesellschaft punkt de Transparency ID: Is your organisation registered in the Interest Representative Register? -single choice reply- 5. What is /are the category /ies of illegal content of greatest relevance to you in the context of N&A procedures? -multiple choices reply- Illegal offer of goods and services (e.g. illegal arms, fake medicines, unauthorised gambling services etc.). - Illegal promotion of goods and services. - Content facilitating phishing, pharming or hacking. - Infringements of copyright and related rights - Infringements of trademarks - Infringement of consumer protection rules. - Incitement to hatred or violence (on the basis of race, religion, gender, sexual orientation etc.) - Child abuse content - Terrorism related content (e.g. content inciting the commitment of terrorist offences and training material) - Defamation - Privacy infringements II Notice and Action procedures in Europe Action against illegal content is often ineffective Action against illegal content is often too slow Hosting service providers often take action against legal content -single choice reply- There is too much legal fragmentation and uncertainty for hosting service providers and notice providers I agree I disagree I completely agree I completely agree
2 The exact scope of 'hosting' is sufficiently clear The terms actual knowledge and awareness are sufficiently clear The term expeditiously is sufficiently clear The public consultation on e-commerce of 2010 has demonstrated that most stakeholders consider hosting of websites to be hosting, but that there is less unanimity on other services that could be hosting. The CJEU has stated that hosting may in principle be the services of online market places, referencing services and social networks. I disagree I disagree I disagree Social networks - Blogs and interactive dictionaries - Video-sharing sites - Cloud based services - E-commerce platforms - Cyberlockers 8. In your opinion, what activities should be considered as 'hosting'? -multiple choices reply- III. Notifying illegal content to hosting service providers It is easy to find pages or tools to notify illegal I disagree content It is easy to use pages or tools to notify illegal I disagree content 10. Should all hosting service providers have a procedure in place which allows them to be easily notified of illegal content that they may be hosting? Some hosting service providers have voluntarily No opinion put in place mechanisms to receive notifications of illegal content. Some of these providers have complained that their mechanisms are not always used and that concerns about content are not notified in a manner that would be easy to process (e.g. by fax, without sufficient information to assess the alleged illegal character of content etc.). Providers also claim that this creates delays in taking action against illegal content, because the hosting service provider would for instance have to contact the notice provider to ask for additional information.
3 11. If a hosting service provider has a procedure for notifying illegal content (such as a web form designed for that purpose) that is easy to find and easy to use, should illegal content exclusively be notified by means of that procedure? A notice should be submitted by electronic. means A notice should contain contact details of the. sender A notice should make it easy to identify the. alleged illegal content (for instance by providing a URL) A notice should contain a detailed description of. the alleged illegal nature of the content -single choice reply- A notice should contain evidence that the content provider could not be contacted before contacting the hosting service provider or that the content provider was contacted first but did not act Both civil rights organisations and hosting service providers have complained about a significant proportion of unjustified or even abusive notices. Some stakeholders have proposed more effective sanctions and remedies for this purpose Should there be rules to avoid unjustified notifications? Please explain -open reply-(optional) 14. How can unjustified notifications be best prevented? -multiple choices reply- It is essential that a legal certainty is established to distinguish between allegedly illegal activity under civil or criminal law and prohibitions under terms and conditions of providers. An online procedure for counter-notices should be made available by each provider. There should be sanctions for false notices and transparency reports by each provider including wrongful removals and the number of false claims. By requiring notice providers to give their contact details - By publishing (statistics on) notices - By providing for sanctions against abusive notices - Other Please specify: -open reply-(optional) By allowing for due process. By providing for sanctions & liability in case of false notices. By providing for damages in case of wrongful takedowns. By prohibiting automatic notices. By allowing for counter-notices before disabling or removing content. By the publication of transparency reports on the number of notices
4 received & by whom, the number of takedowns executed, the number of counter-notices received, the number of false takedown notices, information on policy of the provider. IV. Action against illegal content by hosting service providers 15. Should hosting service providers provide feedback to notice providers about the status of their notice? Multiple choice -multiple choices reply- The hosting service provider should send a confirmation of receipt. - The hosting service provider should inform the notice provider of any action that is taken. - Other 16. Should hosting service providers consult the providers of alleged illegal content? -single choice reply- Multiple choice -multiple choices reply-(optional) The content owner should be informed of the notice received and of any action that is planned and/or taken. The right to information and the right to a fair trial should apply. Upon reception of a notice, but before any action on the alleged illegal content is taken. This would avoid the disabling of legal content or it been taken down. - Other As a general principle, before taking any action, the content owner should be consulted and the ISP should have a system is place that allows for a counter-notice. In a quickly changing heterogeneous environment which is the Internet, it is difficult to create a one-size-fits all approach to deal with illegal content. A differentiated solution should be prefered taking into account different procedures under civil law and under criminal law. According to the E-commerce Directive, the Other hosting provider should act "to remove or to disable access to the information" - One may interpret "removing" as permanently taking down or deleting content. - "Disabling access" can be understood as any technique that ensures that a user does not have access to the content. Some hosting service providers for instance use geo-software to impede access exclusively to users with an IP address from a country where the content is question is considered illegal. Similarly, some hosting service providers firstly impede access to all users without permanently deleting it. This can for instance allow law enforcement authorities to further analyse the alleged illegal
5 content in the context of criminal investigations. If deleting would not any longer hinder the investigation, the hosting service provider may still remove the content. 17. Assuming that certain content is illegal, how should a hosting service provider act? -single choice reply- Several providers may host the same content on a particular website. For instance, a particular 'wall post' on the site of a social network may be hosted by the social network and by the hosting service provider that leases server capacity to the social network. It may be that this hosting service provider that leases server capacity is in a position to act against the alleged illegal content, but not without acting against other (legal) content. As a matter of principle, content should not be removed or disabled without a court order. In case a counter notice has not been received, only then the service provider should disable content in order to allow for subsequent investigation and prosecution. If law enforcement does not follow up, the content should be re-placed. Other 18. When the same item of illegal content is hosted by several providers, which hosting service provider should act against it? -single choice reply- Providers that have actual knowledge of the illegality of the content and are technically in a position to remove exclusively the notified illegal content. The Council of Europe has held that attempts to render "entire websites inaccessible should be judged against international standards": As soon as the illegal nature of certain content As fast as possible depending on the concrete circumstances of has been confirmed, the E-commerce Directive the case requires the hosting service provider to act "expeditiously" if the provider is to be exempted from liability. However, the Directive does not further specify the concept of "expeditiously". Some stakeholders consider that a pre-defined timeframe for action should be established, whereas others consider that the required speed of action depends on the circumstances of the specific case. In a specific case it may be difficult to assess the legality of content (for instance in a case of defamation) or it may be easy to do so (for instance in a manifest case of child abuse content). This may have an impact
6 on the speed of action. Similarly, what is expeditious for a specific category of content may not be sufficiently expeditious for another. For instance, the taking down of content within 6 hours will generally be considered very fast, but may not be sufficiently fast for the live-streaming of sports events (that are not any longer relevant once a match is finished). 19. Once a hosting service provider becomes aware of illegal content, how fast should it act? In individual cases, law enforcement authorities may ask hosting service providers not to act expeditiously on certain illegal content that are the subject of criminal investigations. Acting expeditiously could alert law infringers of the existence of a criminal investigation and would impede analysing the traffic on a particular site. No 20. Should hosting service providers act expeditiously on illegal content, even when there is a request from law enforcement authorities not to do so? -single choice reply- Please explain: -open reply-(optional) Civil rights organisations complain that hosting service providers sometimes take down or disable access to legal content. They claim that some hosting service providers automatically act on notices without assessing the validity of the notices. In this context, the CJEU has held that blocking of legal content could potentially undermine the freedom of expression and information. Civil rights organisations complain that hosting By requiring detailed notices - By consulting the content provider service providers sometimes take down or before any action is taken - By providing easy and accessible disable access to legal content. They claim that appeal procedures - By publishing (statistics on) notices - By some hosting service providers automatically providing for sanctions against abusive notices - Other act on notices without assessing the validity of the notices. In this context, the CJEU has held that blocking of legal content could potentially undermine the freedom of expression and information. 21. How can unjustified action against legal content be best addressed/prevented? -multiple choices reply- Some hosting service providers are hesitant to take pro-active measures to prevent illegal Content should never be disabled without a court order since private intermediaries cannot be expected to make judgements about whether content is in breach of criminal or civil law. No
7 content. They claim that taking such measures could be interpreted by courts as automatically leading to "actual knowledge" or "awareness" of all the content that they host. This would accordingly lead to a loss of the liability exemption they enjoy under the respective national implementation of the E-commerce Directive. In at least one national ruling, a court has interpreted actual knowledge in this sense. At the same time, the CJEU has held that awareness can result from own initiative investigations (Judgment of the Court of Justice of the European Union of 12 July 2011 in case C-324/09 (L'Oréal ebay), points ). 22. In your opinion, should hosting service providers be protected against liability that could result from taking pro-active measures? -single choice reply- Please explain -open reply-(optional) "Pro-active measures" could be interpreted to include measures such as a general monitoring obligation outside the rule of law carry a high risk of negative unintended consequences for the problem being addressed as well as for broader issues of free speech. The CJEU has ruled in two cases (Scarlet/ Sabam and Netlog/Sabam) that such measures are illegal. There is numerous evidence where preventive systems due to liability fears, such as Google's ContentID, have caused collateral damage. VI. The role of the EU in notice-and-action procedures 23. Should the EU play a role in contributing to the functioning of N&A procedures? -single choice reply- Please specify: -multiple choices reply- By providing non-binding guidelines - By providing some binding minimum rules - Other Self-regulation and cooperation between private businesses to enforce the law must be avoided. As a general principle, liability should always remain on the shoulders of the person responsible for the illegal content or behaviour. Non-binding guidelines or minimum rules could ensure rules on notice and takedown in line with the Charter of Fundamental Rights. Article 14 of the E-commerce Directive does not specify the illegal content to which it relates. Consequently, this article can be understood to apply horizontally to any kind of illegal content. In response to the public consultation on e-commerce of 2010, stakeholders indicated that they did not wish to make modifications in this regard.
8 24. Do you consider that different categories of illegal content require different policy approaches as regards notice-and-action procedures? Please clarify giving concrete examples relating to the question above -open reply-(optional) Different policy approaches are esential since the nature of illegal content varies enormously and a one-size fits all approach will inevitably lead one being handled in a disproportionate manner. Providers cannot be expected to judge if material is potentially in breach of civil law or criminal law, and differentiate between criminal law systems of all Member States. VII. Additional comments 25. Do you wish to upload a document with additional comments? -single choice reply-(optional)
A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries
A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries Questions marked with an asterisk * require an answer to be given.
EU regulatory framework for e-commerce
EU regulatory framework for e-commerce WTO Workshop Geneva, 18 th June 2013 Denis Sparas European Commission Directorate General for Internal Market and Services Outline E-commerce Directive E-commerce
Mega Transparency Report. March 2015. Requests for Removal of Content and for User Information
Mega Transparency Report March 205 Requests for Removal of Content and for User Information Introduction This is the first transparency report published by Mega since it commenced operations in January
Executive summary. The functions of Internet intermediaries. A source of economic growth and innovation
EXECUTIVE SUMMARY 11 Executive summary The functions of Internet intermediaries Internet intermediaries provide the Internet s basic infrastructure and platforms by enabling communication and transactions
Harmful digital communications, cyber bullying and digital harassment can take a variety of forms.
FAQs - Harmful Digital Communications Bill What are harmful digital communications? Harmful digital communications, cyber bullying and digital harassment can take a variety of forms. Examples include sending
ACCEPTABLE USE AND TAKEDOWN POLICY
ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
ISP liability in Denmark
ISP liability in Denmark Clement Salung Petersen Assistant Professor, PhD Centre for Information and Innovation Law www.ciir.dk Dias 1 A Danish perspective on ISP liability ISP liability Mere conduit,
Factsheet on the Right to be
101010 100101 1010 101 Factsheet on the Right to be 100 Forgotten ruling (C-131/12) 101 101 1) What is the case about and what did 100 the Court rule? 10 In 2010 a Spanish citizen lodged a complaint against
ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
ETNO Reflection Document on the future of electronic commerce in the internal market and the implementation of the e-commerce Directive
ETNO Reflection Document on the future of electronic commerce in the internal market and the implementation of the e-commerce Directive November 2010 Executive Summary ETNO welcomes the European Commission
Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.
This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name. This Acceptable Use Policy forms part of the Registry Policies that apply to and
Fraud and Abuse Policy
Fraud and Abuse Policy 2015 FRAUD AND ABUSE POLICY 2015 1 Contents 4. Introduction 6. Policy Goal 7. Combatting Customer Fraud and Abuse 8. Reporting Breaches 9. How Alleged Breaches Will Be Investigated
"Transmission of any material in violation of any Country, Federal, State or Local regulation is prohibited."
Bahnhof - a Free Speech ISP Bahnhof is proud to be known as a Free Speech ISP. We do not enforce tighter restrictions on "speech" than the law demands. If the site and content is legal in Sweden, you may
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation
Opinion Statement of the CFE. on the proposed Directive. on the fight against fraud to the EU s financial interests. by means of criminal law
Opinion Statement of the CFE on the proposed Directive on the fight against fraud to the EU s financial interests by means of criminal law COM(2012)363 Prepared by the CFE Fiscal Committee Submitted to
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION
GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION These Guidelines apply to all Licensees providing Internet access services or any other Internet Protocol
LLB (Hons) International Law Module Information
LLB (Hons) International Law Module Information Year 1 Law of Contract and Problem Solving This module develops students knowledge and understanding of the law of contract. You will study the underlying
AXIS12 DRUPAL IN A BOX ON THE CLOUD
SERVICE LEVEL AGREEMENT AXIS12 DRUPAL IN A BOX ON THE CLOUD version 1.0 Page 1 of 6 This Axis12 Drupal in a box on the cloud Service Level Agreement ( SLA ) is a policy governing the use of the Axis12
How To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
Policy for the Registration of.hamburg Domain Names
Policy for the Registration of.hamburg Domain Names Hamburg Top-Level-Domain GmbH (subsequently called the "registry") is the registration office for domain names under the generic top level domain (gtld).hamburg.
BCS, The Chartered Institute for IT Consultation Response to:
BCS, The Chartered Institute for IT Consultation Response to: A Comprehensive Approach to Personal Data Protection in the European Union Dated: 15 January 2011 BCS The Chartered Institute for IT First
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form HUNGARY Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support
Telefónica response to the consultation on the implementation of the Intellectual Property Rights Enforcement Directive
ID REGISTER: Telef05162 Telefónica response to the consultation on the implementation of the Intellectual Property Rights Enforcement Directive Telefónica welcomes the opportunity to comment on the findings
LCC xdsl Usage Policy
LCC xdsl Usage Policy 1. Introduction For the Internet to operate in a manner that satisfies the majority of its users, all users need to observe some rules and etiquette governing their use of it. These
MynxNet Broadband Terms and Conditions
MynxNet Broadband Terms and Conditions Updated 10/12/15 Introduction These terms form the basis of the services provided by MynxNet (referred to as Mynx, Mynxnet, we, us, or our ) to yourself and your
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
E-Gap Terms and Conditions of Use
E-Gap Terms and Conditions of Use User Terms and Conditions The following paragraphs specify the basis on which you may use the e-gap System and provides information on how we will handle your data. This
EDRi s. January 2015. European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70
EDRi s Red lines on TTIP January 2015 European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70 ABOUT EDRI European Digital Rights is a network of 34 privacy and
End User License Agreement Easygenerator
End User License Agreement Easygenerator Terms and conditions for Free, Starter, Plus and Academy plan 1. The Service: The Service includes: a) the Easygenerator website and web shop; b) the on demand
General conditions and terms of use. of the website «inchallah.com»
General conditions and terms of use of the website «inchallah.com» The company CAJIS France, limited liability company with a capital of 20.000, registered in Nanterre under the number B 530 423 763, whose
4-column document Net neutrality provisions (including recitals)
4-column document Net neutrality provisions (including recitals) [Text for technical discussions. It does not express any position of the Commission or its services] Proposal for a REGULATION OF THE EUROPEAN
ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX )
ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer
Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268
Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 This guidance is suitable for Public Disclosure Owner of Doc:
Charge / Complaint Processing At the EEOC and the DFEH
Charge / Complaint Processing At the EEOC and the DFEH Since you believe you have been discriminated or retaliated against on the basis of a protected characteristic, you should become aware of the following
City of Cleveland Social Media Policy
City of Cleveland Social Media Policy Mayor s Office of Communications October 2012 City of Cleveland Social Media Policy and Guidelines for Public Use The City of Cleveland is participating in social
4. Which sector do you belong to? Please check one box.
CONSULTATION QUESTIONNAIRE FOR ITU/UNICEF GUIDELINES FOR INDUSTRY ON CHILD ONLINE PROTECTION December 2013 The Institute for Human Rights and Business (IHRB) appreciates the opportunity to provide written
Department of Commerce DMCA Multistakeholder Forum. DMCA Notice-and-Takedown Processes: List of Good, Bad, and Situational Practices
Department of Commerce DMCA Multistakeholder Forum DMCA Notice-and-Takedown Processes: List of Good, Bad, and Situational Practices I. Good Practices A. Good General Practices For Service Providers 1.
Terms of Use Gateway Clipper Website
Terms of Use Gateway Clipper Website General Information Regarding These Terms of Use Master terms: Unless otherwise noted on a particular site or service, these master terms of use ( Master Terms ) apply
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
Acceptable Use (Anti-Abuse) Policy
Acceptable Use (Anti-Abuse) Policy This document describes the Acceptable Use Policy for the Rightside registry. Copyright 2014 Rightside Registry Copyright 2014 Rightside Domains Europe Ltd. Rightside
Acceptance of Terms. Terms of Service. Privacy Policy. Terms Applicable to All Products and Services. Last Updated: January 24, 2014
Acceptance of Terms Last Updated: January 24, 2014 Terms of Service Please read this Terms of Service Agreement carefully. MedicaidInsuranceBenefits.com ("MedicaidInsuranceBenefits.com," "our," "us") provides
COUNCIL OF EUROPE COMMITTEE OF MINISTERS
COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at
Introduction. This answering guide has been prepared in order to make the task of responding to the questionnaire easier for citizens.
Introduction The European Commission launched a public consultation on the Intellectual Property Rights Enforcement Directive (IPRED) on 30 November 2012. IPRED is in force since 2004 and requires all
The impact of Internet content regulation. Prepared by the Commission on E-Business, IT and Telecoms
International Chamber of Commerce The world business organization Policy Statement The impact of Internet content regulation Prepared by the Commission on E-Business, IT and Telecoms Introduction Internet
CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE
Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
Virginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
1st June 2005. Internet Access Service Provider (IASP) Sub-Code for the Communications and Multimedia Industry Malaysia
1st June 2005 for the Communications and Multimedia Industry Malaysia TABLE OF CONTENTS PART 1 - INTRODUCTION...2 PART 2- GENERAL RULES OF THE CODE FOR INTERNET ACCESS SERVICE PROVIDERS...6 PART 3- REVIEW
Human Resources Policies and Procedures
SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media
The Amendment of the Loan Agreement (for Business)/ Overdraft Facility Agreement (for Consumption)/ Money Mortgage Agreement*
The Amendment of the Loan Agreement (for Business)/ Overdraft Facility Agreement (for Consumption)/ Money Mortgage Agreement* No. Clause Reference Amendment Sanctions 1. Important notice Standard Chartered
GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE
GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE IF YOU HAVE A MEDICAL EMERGENCY, YOU ARE INSTRUCTED IMMEDIATELY TO CALL EMERGENCY PERSONNEL (911). DO NOT RELY ON THIS WEBSITE OR THE INFORMATION PROVIDED
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
Terms Of Service. "The Company" means CIT Broadband, P.O. Box 122568, Fort Worth, TX 76121.
Terms Of Service BY USING THE COMPANY'S SERVICES YOU AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS. 1. Definitions. "The Company" means CIT Broadband, P.O. Box 122568, Fort Worth, TX 76121. "The Subscriber"
Online Security, Traffic Data and IP Addresses. Review of the Regulatory Framework for Electronic Communications
Brussels, October 8 th 2008 Online Security, Traffic Data and IP Addresses Review of the Regulatory Framework for Electronic Communications Francisco Mingorance Senior Director Government Affairs [email protected]
Myanmar: News Media Law
2014 Executive summary This analysis examines the compliance of the 2014 News Media Law of Myanmar with international standards on freedom of expression and media freedom. The News Media Law introduces
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
Service Description for the Webhosting / HomepageTool Tool
Service Description for the Webhosting / HomepageTool Tool 1 Area of application The «Webhosting/Homepagetool Service Description» («Service Description») of Swisscom (Switzerland) AG («Swisscom») applies
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
Data Security and Extranet
Data Security and Extranet Derek Crabtree Schools ICT Support Manager [email protected] Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:
