Chapter 1 , Internet and blogging policies

Size: px
Start display at page:

Download "Chapter 1 Email, Internet and blogging policies"

Transcription

1 A Thorogood Special Briefing Chapter 1 , Internet and blogging policies The use of and the Internet at work The cost of the Internet at work Introducing an policy Further information

2 LEGAL ISSUES Chapter 1 , Internet and blogging policies One of the greatest changes in office life in the last ten years has been the move to . In 2001, The Guardian reported that about 360,000 messages are sent every second in the UK and in 2008 it will be many more, illustrating how widespread Internet and use has become. In many cases it is the principal means of business communication. Many office workers now spend most of their day in front of a personal computer and many have access to and the Internet. Many have their own capability on their peronsally owned equipment from mobiles, blackberries, PDAs and lap tops with wireless capability. In many businesses has replaced faxes and letters and (to some extent) the telephone as the primary means of communication. This Report examines the legal issues relating to , particularly with regards to employees, supervision of employees and potential liabilities. The use of and the Internet at work In most cases the change to is desirable. is cheaper than long distance telephone calls and some businesses use free services such as Skype for international calls. Indeed, in some areas computer staff chatting for business purposes on instant messaging services such as MSN is common. can be quicker and there is a permanent record of what was said. However, it can carry the dangers of employees wasting time online, committing to statements which may carry liability (such as defamatory words or material which breaches copyright or obscenity laws) and employees acting too quickly without the thought they might give to a formal letter. In general, however, the advantages outweigh the disadvantages. 4 A THOROGOOD SPECIAL BRIEFING

3 1 , INTERNET AND BLOGGING POLICIES The cost of the Internet at work Few managers will need to be reminded about the cost of time wasted on the Internet at work by many employees. For this reason most larger firms now have Internet and policies, which make it clear what is permitted and what is not. An example can be found in the Appendix. Websense, a company which monitors Internet traffic, suggested that it could cost industry 9.6 billion a year to have workers wasting time in this way. Apparently 44% spend an average of three hours a week surfing the Internet for non-work related reasons. This does not include the cost of bandwidth, storage and human resources costs, but represents a proportion of employee salaries. There are 13.6 million workers in the UK with Internet access and the average salary is per hour. Websense supplies Internet monitoring tools, including a Websense Reporter, as does Netsiren. The law does not cause too many problems. The Regulation of Investigatory Powers Act 2000, and regulations made under it on lawful business practice allow most employers to supervise employees by intercepting their s and telephone calls lawfully without employee consent, as long as the employees know this is going on. This legislation is considered in Chapter 2 Checking up. However, most employers should consider having a standard notice on s and an and Internet policy for employees so they know where they stand. If they do this, then there are unlikely to be many legal problems. The first issue for employers is often whether or not to allow employees to use the Internet at work. A standard question the author asks at legal IT conferences at which she speaks, is who has an employee Internet policy and who allows all employees access to the Internet at work? The answers vary widely. The larger UK plcs with tens of thousands of employees will often have clear policies and may restrict access or ban it altogether. Smaller businesses typically trust employees more or do not have the need for a detailed policy and allow more access. However, having a strict policy and then letting everyone breach it is the worst of all worlds. In such instances, trying to discipline an employee who breaches the policy becomes much harder as they can point to the examples of others who got away with it. A THOROGOOD SPECIAL BRIEFING 5

4 LEGAL ISSUES Key advice: Tell employees their s and internet use may be checked by the employer Have a workable written policy on and internet use Enforce it Modify it if circumstances change Treat everyone identically under the policy if they breach the rules Some companies positively encourage employees to get to know how to use and the Internet and are pleased that staff will book a holiday online at work, rather than queuing in a travel agent s for an hour and arriving back late from lunch. In other companies it is a sackable offence. Neither attitude is right or wrong, but in law the important issue is making sure that all employees know where they stand. One private company, Phone4You, made the headlines when it banned all s at work, even business s between members of staff (who were encouraged instead to visit each other s offices). Some UK companies have a no s on Friday policy so that staff concentrate on other work or speak to each other. The Trade Union Congress recommends that employers of unionised workforces enter into agreements with the union about what type of surveillance is to be instigated (see their report at Employers in general should consider consulting with employees, as this is as much a psychological issue as a legal one. Staff who feel they are not trusted and their every move is being watched are unlikely to work as well as those who feel their personal autonomy is unchallenged. However, some of the legal risks employees can foist on their employer through unsupervised use of the Internet and mean that surveillance in many cases is advisable. 6 A THOROGOOD SPECIAL BRIEFING

5 1 , INTERNET AND BLOGGING POLICIES Introducing an policy Employers who have allowed extensive free use of and the Internet for private purposes and then want to change the rules, will be varying the employment contract. This should only occur with employee consent. However, the employment contract itself may well say that internal rules can be introduced from time to time, which may have the effect that such change can be brought in whether employees agree with it or not. As always, it is best to take legal advice. The law makes it clear that secret monitoring is unlikely to be lawful. It could be a breach of the Regulation of Investigatory Powers Act Employees should therefore be told what monitoring will occur and they should ideally be given a written policy. Case study The Huge Company PLC is known for its inflexible policies. It does not therefore surprise the workers very much when it introduces, rather belatedly, a new policy which is rather stringent. Hugh and James are complaining about it in the office canteen over lunch. Look, no one could comply with all this. How can I stop my latest girlfriend sending me explicit material? It wouldn t be my fault would it and you saw some of the s the last one sent me didn t you? They had a mutual snigger at the memory and continued to flick through the document. Also, it s such a liberty, isn t it? James says, They don t trust us. That s what it comes down to. They ll be having us clocking in and out next and asking permission to visit the loo. Why can t I look up holiday details on the Internet at lunchtime? They obviously would prefer me to be stuck in a travel agent queue and be back late from lunch. Hugh knew how long James often spent on the Internet at present and it wasn t all sites as innocuous as holidays. Do you think it s not lawful then? Hugh asks. Some of your Internet use must step over the line surely. What line? It s a free country. Anyway watch what you say. It wouldn t surprise me if this lot have CCTV cameras trained on us even now and hidden microphones in the flowers. Let s call the union and see what they say. A THOROGOOD SPECIAL BRIEFING 7

6 LEGAL ISSUES After lunch they call their union and are told that the TUC is currently working on guidelines which are likely to allow reasonable use of the Internet for personal purposes at work. They are told: 1. Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 (SI 2000/2699) came into force on 24 October 2000 and allow employers to read employees s for all sorts of purposes connected to the business. (See Chapter 2.) 2. However, employers must also follow the Data Protection Act A Code of Practice for Employers (which includes a section on Employee Surveillance under the Act) was issued in June The Guidance provides some standards for the monitoring of communications, covering matters such as letting employees know what will and will not be read, of their s at work. There is also a section on telephone monitoring. The Code also states that the main reasons given by employers for monitoring Internet access by employees is to prevent time wasting and to prevent the downloading of pornography. 3. The Human Rights Act 1998 came into force on 2 October 2000, providing a right of privacy of communications. However, it is arguable that an employer (who has prohibited the employee from using the employer s property for personal purposes), who then reads an which should of course be work related but is not, is unlikely to breach the Act. It is the employee who is in the wrong. James and Hugh reading the data protection information from their union are encouraged. I don t think this new strict code would stand up under this data protection legislation, Hugh says. I think they ve gone too far. They also ask the union if the employer is really allowed to change the rules. We ve had free and unrestricted Internet access up until now. We are allowed to make personal telephone calls which are short and local such as to fix up doctors appointments. Can they really change the rules now? It means we are losing a perk. The union advises that this is unlikely to be regarded as such a major change to their employment contract that they could walk out and claim constructive dismissal. They are also told that their current employment contract allows the employer to introduce new employee policies from time to time and this change was instituted under this policy. Apparently in addition, although James and 8 A THOROGOOD SPECIAL BRIEFING

7 1 , INTERNET AND BLOGGING POLICIES Hugh did not know this, some employees had been consulted about the new code. They decided there was little they could do. The policy An and Internet use policy is designed to show the employee what they may and may not do with the Internet at work. A sample policy is given in the Appendix of this Report but every company s requirements are different. Some will want to ban all personal use of the Internet and at work, others will allow employees to do what they like, trusting their good sense and others will want a position between those two extremes. Whichever standpoint is taken, employees need to know what is acceptable otherwise if one is penalised where another has not been, then unfair dismissal proceedings may follow. Examples of sackings of employees for breach of an policy are given in Chapter 4. Blogging Policis Employers may wish to give guidance to employees about internet blogs websites/pages the employee might set up which could, but may not always do so, refer to the employee s work and have implications for the employer. It is useful to have policy details so that employees know what the rules are. An example is given as an appendix to this book. This policy helps ensure employees know what the employer s rules are in this area and provides some legal guidance. An alternative would be to include this policy as part of a staff handbook (in paper or electronic form and/or have it on the company s intranet). Some employers will not want to be so interventionist as to interfere in employees private lives and freedom of expression in this way but it is always wise to advise employees of their duties under the law in relation to public criticism of the employer. There are no statutes or cases under English law specifically on blogging, although the general employment legislation and laws of libel would preclude an employee from making defamatory statements about the employer or bringing their employer into disrepute. Blog is an abbreviation for web log a personalised online digest where a user can share internet links, news stories, opinions and diary entries with a potential audience of millions. In the US there are at least 8 million blogs and 52 million readers of them. A THOROGOOD SPECIAL BRIEFING 9

8 LEGAL ISSUES In one case in the US, Judge James Kleinberg ruled that bloggers do not have the same confidentiality protections as journalists rejecting a protective order motion made in the lawsuit, Apple Computer v Does No 1-04-CV (Santa Clara Co, Calif, Super Ct). In that lawsuit, Apple Computer Inc had subpoenaed three bloggers to reveal the identities of anonymous sources that allegedly gave the bloggers confidential information. The foundation appealed the decision to the California Court of Appeal in O Grady v Apple Computer, No H Many employee bloggers in the US believe they are protected by the First Amendment, but most US States (unlike the UK) have at will employment laws where employees can be fired at any time, for any reason, even an arbitrary reason. In the US in 2005, Traffic-Power.com sued the owner of a website focused on search engine optimization strategies for postings that appeared on the site s blog. A posting providing details of the suit can be seen at The interesting legal point is that the alleged liability relates to postings by third parties on the blogger s blog rather than postings by the original blogger. In October 2005, Singapore jailed two bloggers for making racist comments on the internet, in the first use by the government against individuals of a 57-yearold sedition act. Lee Hsien Loong, the Prime Minister, said that use of the sedition law was necessary to preserve Singapore s racial and religious harmony when ethnic tensions in South-East Asia could increase in reaction to Islamic terrorism. Laws around the world differ widely with regards to freedom of expression. For example, the US has more entrenched constitutional rights of expression than exist under English law. However, English law does in practice give employees freedom of speech, provided they do not breach other laws in doing so. Employees Employees, in blogs, are at risk of the following: (a) (b) (c) libelling their employer, its products or customer service levels, colleagues, suppliers, customers or third parties in their blogs; disclosing other people s personal data which is protected by the Data Protection Act 1998 in a blog for example, describing things relating to their spouse or children without permission could be a breach of these provisions particularly if the blogger s identify has become known or could be easily ascertained by personal information in the blog; breaching copyright or disclosing confidential information of the employer by including material protected by such rights; 10 A THOROGOOD SPECIAL BRIEFING

9 1 , INTERNET AND BLOGGING POLICIES (d) (e) (f) where writing them at work, wasting employer time in breach of the employment contract; breaching a contractual provision in the employment contract which restrains the blogging activity concerned; breaching some other law which may or may not be sufficiently serious to justify termination of the employment contract there are many cases in the UK which provide examples of when an employee s nonwork activities justify dismissal. A speeding fine would not, but a couple of strangers who met on a plane on a business trip who engaged in a sexual act, which caused many a headline and which mentioned their employers could be. Royal Mail workers arrested abroad for football hooliganism brought their employer into disrepute (see Post Office v Liddiard [2001] EWCA Civ 940). EXAMPLE LE BLOG DE MAX One example of a business blog is Le Blog de Max. Max is a manager in an international company which he hates and in his blog he ridicules his employer and his colleagues. If I say who I am and who I work for, I ll be sacked on the spot, he said. I m paid a lot so I d have to do really well as a writer to be able to maintain my lifestyle. He mocked le boss for attempting to promote a company ethos, and his colleagues for believing it. He was rude about the overweight secretary and the ambitious young man. He sang the praises of a workmate who whiled away his time studying photographs of naked women on the internet. EXAMPLE PETITE ANGLAISE In March 2007, a French court ordered that Dixon Wilson, an Anglo-French accountancy firm must pay 44,000 ( 30,000) in damages to Catherine Sanderson, 34, a secretary who was sacked because of what she wrote in her blog and they were ordered to refund unemployment benefit paid to her since she lost her job at their Paris office in April Her blog, Petite Anglaise, about life in Paris as a working single mother was very popular and she won a sixfigure book contract with Penguin. The firm, her employer, was not named in the blog but the firm said her unflattering accounts of office life identified the business and were damaging to it. It said that she should not have spent working time on her online journal. A THOROGOOD SPECIAL BRIEFING 11

10 LEGAL ISSUES Using Blogs and Flogs Some businesses use rivals employees blogs to glean useful business information. For example, a team of programmers working on a new software programme for software company X may find valuable information about the progress of a particular project described in a blog of an employee of that rival company. Other companies ask members of staff to contribute positive things about their company s products to interactive blogs of third parties. An employer that finds itself libelled or portrayed in a bad light may wish to find out the identity of the alleged employee of theirs so that they can take appropriate action. Most bloggers go under a user name. It may be possible, particularly if solicitors are used in the UK, to require the identity to be disclosed by court order or simply after dispatch of a solicitor s letter. In the US, where there have been more cases in this area the Delaware Supreme Court ruled in 2005 that if an elected official claims he has been defamed by an anonymous blogger, he cannot use a lawsuit to unmask the writer unless he has substantial evidence to prove his claim. At issue was a defamation lawsuit filed last year by Patrick Cahill, a councilman in the USA town of Smyrna, Delaware. Mr Cahill said he needed the identity of a blogger who in a September 2004 posting praised the mayor but said Mr Cahill was divisive and had an obvious mental deterioration. See Some of the most public blogging scandals have related to staff working in politics, including in Washington. In 2005, the Sorensen Institute for Political Leadership hosted a conference at the University of Virginia to debate political blogging. Attendees debated whether they should adhere to a code of ethical conduct and if there was a need for a common moral compass for this new form of political communication. See < Flogs Some people deliberately write anonymously on line in public forums praising their company s products or criticising others products. Sometimes this is known as a flog rather than a blog as they are flogging their wares. Indeed, some advertising businesses will pay private individuals to sell (in the editorial rather than advertorial sense) products without their friends and other contacts knowing they are being paid, for the discreet advertising that involves. From 26th May 2008 by the Consumer Protection from Unfair Trading Regulations 2008 (SS1 2008/127) this is now illegal in the UK and similar restrictions apply throughout the EU. Many companies plant positive comment from web sites as diverse as sites devoted to how wonderful or awful a hotel was to electronic products. Often 12 A THOROGOOD SPECIAL BRIEFING

11 1 , INTERNET AND BLOGGING POLICIES very clever IT consumers will be able to trace back the source of that person praising the newly launched software product to employees of the company itself. These are fascinating new legal issues. WHOLE FOODS EXAMPLE John Mackey, co-founder and chief executive of Whole Foods, posted anonymously about his company and a company they planned to buy Wild Oats Markets on the Yahoo stock market boards beginning in 1999 until He used the pseudonym Rahodeb an anagram of his wife s name, Deborah he criticized Wild Oats, posting nuggets such as OATS has no value and no future, The Wall Street Journal said. That particular post was made in February In 2007, Whole Foods agreed to purchase Wild Oats for $670 million in February The information about Mackey s posts came to light in 2007 due to the Federal Trade Commission, which is seeking to block Whole Foods buyout of Wild Oats, under US anti-trust law, saying the deal would damage competition. Ultimately, due to the way it was revealed, it wasn t very good PR for those involved. WAL-MART FLOG EXAMPLE The Wal-Mart flog was designed to persuade readers into thinking it was just an average consumer s blog. It was called Wal-Marting Across America, and was supposedly written by two Americans during their travels across the US lodging in Wal-Mart parking lots. Written in 2006, it was then profiled in Business Week, which exposed the site as a promotional tactic engineered by Working Families for Wal-Mart (WFWM), an organization launched by Wal-Mart s public relations firm Edelman. It was found that the two men were journalists who had probably breached their employment terms. This is so foolish on so many levels, it makes me scratch my head, says corporate blogging consultant Debbie Weil, author of The Corporate Blogging Book. Everyone involved violated the basic rule: be transparent. If you re found out, it comes back as a slap in the face. Wal-Mart had tried to launch a MySpace competitor called The Hub which was closed after 10 weeks. Users had said the site was too promotional and had too many fake user profiles. WARNING: Some industries may require more detailed policies. For example, research workers, those in high profile companies, those working on detailed computer software work, could reveal trade secrets and confidential information on a blog and may need more detailed guidance. A THOROGOOD SPECIAL BRIEFING 13

12 LEGAL ISSUES Facebook, MySpace and Other Networking Sites Some employers routinely check the personal pages individuals have on web sites such as Facebook and MySpace to see what information the individuals have posted about themselves, either before recruiting the employee or after. Individuals are therefore wise to ensure nothing untoward has been put in the public domain. These sites identify the individual and often contain photographs and are even less anonymous than a Blog under an assumed name. MSN/IM Some industries such as IT find that suppliers and customers like to communicate with the business on Microsoft/Yahoo messenger or other forms of instant messaging rather than telephone or . Companies are wise to ensure they determine if they will allow those communications for business purposes or not. Further information A legal guide for bloggers can be found on the internet at bloggers/lg/ (this relates to US law). On the same site the following are also of interest: The Overview of Legal Liability Issues FAQ (see the eff website mentioned above) briefly addresses some common legal issues that affect an individual as a publisher, especially situations where that individual may face legal claims or threats based on the information published on the blog. The Bloggers FAQ on Intellectual Property (also on the eff website) addresses issues that arise when an individual publishes material created by others on their blog. The Bloggers FAQ on Online Defamation Law (also on the eff website) provides an overview of defamation (libel) law, including a discussion of the constitutional and statutory privileges that may protect you. The Bloggers FAQ on Section 230 Protections (see the eff website) discusses a powerful US federal law that gives people, as a web host, protection against legal claims arising from hosting information written by third parties. The Bloggers FAQ on Privacy (see the eff website) addresses the legal issues surrounding the privacy rights of people blogged about. Some English law guidance on avoiding defamation actions can be found at Internet law firms can provide legal advice in this area. A handbook that offers advice to bloggers who want to protect themselves from recrimination and censors has been released by Reporters Without Borders. 14 A THOROGOOD SPECIAL BRIEFING

13 1 , INTERNET AND BLOGGING POLICIES The media watchdog said it gives people who want to set up a blog tips on how to do so, how to publicise it, as well as how to establish credibility. It also offers advice about writing blogs from countries with tough media restrictions, such as Iran and China. See Handbook for Bloggers and Cyber-Dissidents information at An appendix to this book gives an example of a blogging policy. Further information on policies can be obtained from employment and IT lawyers listed in the Chambers Directory at Some companies have trade unions represented in the workplace that can be informed and even consulted over proposed changes in policies. A THOROGOOD SPECIAL BRIEFING 15

Guide on how to choose an Employment Lawyer to represent you* Do you need an Employment Lawyer to help you with a problem you may have?

Guide on how to choose an Employment Lawyer to represent you* Do you need an Employment Lawyer to help you with a problem you may have? Guide on how to choose an Employment Lawyer to represent you* Do you need an Employment Lawyer to help you with a problem you may have? Are you unsure as to how to do this? If so, hopefully this article

More information

Acceptable Use of Information Technology

Acceptable Use of Information Technology Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:

More information

So, he smirks I guess that means you don t want to know who has choice words to describe you, either. The CEO shakes her head.

So, he smirks I guess that means you don t want to know who has choice words to describe you, either. The CEO shakes her head. Ethics Online: What A Good Internet Policy Looks Like [Published in Compliance Week 06/12/2007] You are meeting with the CEO in her office when the IT director comes in with a big grin on his face. This

More information

INTERNET, EMAIL AND PHONE SYSTEMS

INTERNET, EMAIL AND PHONE SYSTEMS Upper Great Southern Family Support Association Inc Policy On INTERNET, EMAIL AND PHONE SYSTEMS Date Adopted: November 2010 Date Revised: March 2013 Review Date: March 2014 Upper Great Southern Family

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

post@hildehaugsgjerd.no The Norwegian Press Complaints Commission - an important institution for free and independent media.

post@hildehaugsgjerd.no The Norwegian Press Complaints Commission - an important institution for free and independent media. post@hildehaugsgjerd.no The Norwegian Press Complaints Commission - an important institution for free and independent media. Backgroud: The Norwegian society A small country 5 million inhabitans Small

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

Parents recording social workers - A guidance note for parents and professionals

Parents recording social workers - A guidance note for parents and professionals Parents recording social workers - A guidance note for parents and professionals The Transparency Project December 2015 www.transparencyproject.org.uk info@transparencyproject.org.uk (Charity Registration

More information

8 Tips for creating a savvy Social Media Policy

8 Tips for creating a savvy Social Media Policy 8 Tips for creating a savvy Social Media Policy Introduction In today s modern world, the number of people using social media continues to rise on a daily basis. Whether or not you re using social channels

More information

Code of Conduct Code of Conduct for Business Ethics and Compliance

Code of Conduct Code of Conduct for Business Ethics and Compliance Allianz Group Code of Conduct Code of Conduct for Business Ethics and Compliance Group Compliance Preamble Allianz Group is based upon the trust which our clients, shareholders, employees and public opinion

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

Social Media In the Workplace

Social Media In the Workplace Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee

More information

LE.201 Employee Privacy Rights in the Electronic/Social Media Age

LE.201 Employee Privacy Rights in the Electronic/Social Media Age LE.201 Employee Privacy Rights in the Electronic/Social Media Age INSTRUCTORS Tony Puckett Dara Wanzer Welcome to the Electronic Age The Internet age has resulted in a host of new types of communications,

More information

work Privacy Your Your right to Rights Know

work Privacy Your Your right to Rights Know Your right to Privacy Know Your Rights www.worksmart.org.uk at work Everyone has the right to a private life even when they re at work. But new technology is making it easier than ever for employers to

More information

The Top Five. FMLA Compliance Mistakes That Could Land You in Court

The Top Five. FMLA Compliance Mistakes That Could Land You in Court The Top Five FMLA Compliance Mistakes That Could Land You in Court A slip of the tongue, a misplaced remark, the wrong job assignment: managers make mistakes every day. When the mistake involves FMLA,

More information

Advice leaflet Internet and e-mail policies

Advice leaflet Internet and e-mail policies Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

How To Protect Free Speech At A College

How To Protect Free Speech At A College Student Press Law Center Model Guidelines for College Student Media Copyright 2009 Student Press Law Center, Inc. I. STATEMENT OF POLICY [Name of institution] recognizes the educational and societal value

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Status: Final. Version Date Author Reason

TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Status: Final. Version Date Author Reason TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Reference Number HR 2012 046 Version: 1 Status: Final Author: Jane Thomas Job Title HR Manager Amendment

More information

RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS

RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS 1. WHY CAN T THE GOVERNMENT BAN USE OF THE INTERNET TO SPREAD HATEFUL AND RACIST IDEOLOGY IN THE UNITED STATES? The Internet is probably

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

E-SAFETY POLICY 2014/15 Including:

E-SAFETY POLICY 2014/15 Including: E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable

More information

Do Bloggers have special rights to disclose Trade Secrets? - The Trade Secret Owner s Perspective

Do Bloggers have special rights to disclose Trade Secrets? - The Trade Secret Owner s Perspective Trade Secret Protection vs. Free Speech Do Bloggers have special rights to disclose Trade Secrets? - The Trade Secret Owner s Perspective Marc Martin, Partner K&LNG Any opinions, interpretations or viewpoints

More information

Virginia Commonwealth University Police Department

Virginia Commonwealth University Police Department Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media

More information

7 Secrets To Websites That Sell. By Alex Nelson

7 Secrets To Websites That Sell. By Alex Nelson 7 Secrets To Websites That Sell By Alex Nelson Website Secret #1 Create a Direct Response Website Did you know there are two different types of websites? It s true. There are branding websites and there

More information

ICT Acceptable Use Policy. August 2015

ICT Acceptable Use Policy. August 2015 ICT Acceptable Use Policy August 2015 Document title ICT Acceptable Use Policy August 2015 Document author and department Responsible person and department Robbie Walker, Information Security Architect,

More information

EMPLOYERS UPDATE: DEVELOPMENTS IN EMPLOYMENT LAW JANUARY 2016

EMPLOYERS UPDATE: DEVELOPMENTS IN EMPLOYMENT LAW JANUARY 2016 20 th January 2016 EMPLOYERS UPDATE: DEVELOPMENTS IN EMPLOYMENT LAW JANUARY 2016 Apologies for the late (yet again) publication of this quarter s Newsletter. A combination of varying work commitments,

More information

NETREPS: MANAGING YOUR ONLINE REPUTATION

NETREPS: MANAGING YOUR ONLINE REPUTATION NETREPS: MANAGING YOUR ONLINE REPUTATION netreps: managing your online reputation Are you Facebooked? Are you in a Google+ circle? What about LinkedIn? Do you tweet? Have you posted a comment on a company

More information

prepared in making referrals through Choose and Book, which doesn t create any additional work for me.

prepared in making referrals through Choose and Book, which doesn t create any additional work for me. Health Management Limited has been appointed as the supplier to deliver Fit for Work (previously Health and Work Service) in England and Wales. The following is a personal account of a service user s journey.

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

Libel Reform Campaign Initial summary assessment of the Defamation Bill

Libel Reform Campaign Initial summary assessment of the Defamation Bill Libel Reform Campaign Initial summary assessment of the Defamation Bill The Defamation Bill has been agreed by Parliament and is awaiting Royal Assent to become the Defamation Act 2013. We have campaigned

More information

Social Networking Policy

Social Networking Policy Insert Academy Logo Here Social Networking Policy March 2014 Consultation Period: 7 th October 2013 16 th December 2013 Date Approved by NET: 18 th December 2013 Next Review Date: January 2015 1 Social

More information

Pacific Northwest University of Health Sciences

Pacific Northwest University of Health Sciences Effective: 7/01/06 Exec. Lead: Chief Business Officer Revised: 1/11 Approved By: Board of Trustees Expired: n/a Applies To: University-wide Pacific Northwest University of Health Sciences Policy: Computer,

More information

INTERNET ACCEPTABLE USE POLICY

INTERNET ACCEPTABLE USE POLICY INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods

More information

U.S. Chemical Safety and Hazard Investigation Board

U.S. Chemical Safety and Hazard Investigation Board BOARD ORDER 035 U.S. Chemical Safety and Hazard Investigation Board SUBJECT: Use of Government Office Equipment CONTENTS 1. Purpose...1 2. Effective Date...1 3. Scope...1 4. References...1 5. Definition...1

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

6.9 Social Media Policy

6.9 Social Media Policy Policy Statement It is the policy of the to encourage clear and effective communication with all Nova Scotians using a variety of accepted tools, including social media. Social media is helping government

More information

SOCIAL NETWORKING: EMPLOYER S FRIEND OR FOE?

SOCIAL NETWORKING: EMPLOYER S FRIEND OR FOE? SOCIAL NETWORKING: EMPLOYER S FRIEND OR FOE? MERCER 2012: ASIA PACIFIC HR ROUND TABLE 24 OCTOBER 2012 Lucy Twomey, Senior Associate, Herbert Smith Freehills LLP Christopher Cheung, Legal Associate (New

More information

The importance of an Acceptable Use Policy

The importance of an Acceptable Use Policy GFI White Paper The importance of an Acceptable Use Policy In an ideal world, employees would use the computers and Internet access provided their employer solely for business use. It is however, sadly,

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you.

8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you. 1. Acceptance of Terms Welcome to s Social Trading (the Social Trading Features ). Social Trading Features provide an integrated solution of equity trading and exploration of interactions among investors

More information

"Transmission of any material in violation of any Country, Federal, State or Local regulation is prohibited."

Transmission of any material in violation of any Country, Federal, State or Local regulation is prohibited. Bahnhof - a Free Speech ISP Bahnhof is proud to be known as a Free Speech ISP. We do not enforce tighter restrictions on "speech" than the law demands. If the site and content is legal in Sweden, you may

More information

EMPLOYEE COMPUTER USE POLICY

EMPLOYEE COMPUTER USE POLICY EMPLOYEE COMPUTER USE POLICY SECTION ONE PURPOSE A. To better serve our students and provide our teachers and other employees with the best tools to do their jobs, Navigator Pointe Academy makes available

More information

Computer Facilities and External Networks Acceptable Use by Students

Computer Facilities and External Networks Acceptable Use by Students Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic

More information

section 15 Computers, Email, Internet, and Communications

section 15 Computers, Email, Internet, and Communications section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property

More information

The Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law

The Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law The Resource Newsletter for Home and Hospice Care March 2010 & Home Care The Law LEGAL HOT TOPIC: Employee Monitoring: Know the Risks or Risk Major Liability by Robert W. Markette, Jr., CHC. This issue

More information

Internet Safety Guide for Parents

Internet Safety Guide for Parents Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both

More information

Monitoring Employee Communications: Data Protection and Privacy Issues

Monitoring Employee Communications: Data Protection and Privacy Issues Monitoring Employee Communications: Data Protection and Privacy Issues By Anthony Sakrouge, Kate Minett, Daniel Preiskel and Jose Saras Reprinted from Computer and Telecommunications Law Review Issue 8,

More information

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013 Use of Social Networking Websites Policy START DATE: March, 2013 NEXT REVIEW: March 2015 COMMITTEE APPROVAL: Joint Management Trade Union Committee CHAIR S SIGNATURE: STAFF SIDE CHAIR S SIGNATURE: DATE:

More information

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour

More information

A. OBSTACLES TO ACCESS (0-25 POINTS)

A. OBSTACLES TO ACCESS (0-25 POINTS) 1 Each country is ranked on a scale of 0 to 100, with 0 being the best and 100 being the worst. A combined score of 0-30=Free, 31-60=Partly Free, 61-100=Not Free. Under each question, a lower number of

More information

YWCA Metro St. Louis Social Media Policy

YWCA Metro St. Louis Social Media Policy YWCA Metro St. Louis Social Media Policy I. Purpose Social media encompasses a growing collection of online technologies and tools that allow and encourage users to interact and build relationships by

More information

Chapter 4 Legal Ethics

Chapter 4 Legal Ethics Chapter 4 Legal Ethics Yes. You read that right legal ethics. Har de har. Go ahead. Get it out of your system. How about this one? Why do scientists prefer using lawyers over lab rats? There are some things

More information

How To Use The Blog Safely And Responsibly

How To Use The Blog Safely And Responsibly BLOG PROTOCOL DRI maintains this site (the "Site") for your personal entertainment, information, education, and communication. Please feel free to browse the Site. You may not download material displayed

More information

COMPUTER, INTERNET, & EMAIL USE POLICY

COMPUTER, INTERNET, & EMAIL USE POLICY COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter

More information

With the increasing popularity of social media you need a Social Media Policy to protect your company.

With the increasing popularity of social media you need a Social Media Policy to protect your company. Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not

More information

How to Monitor Employee Web Browsing and Email Legally

How to Monitor Employee Web Browsing and Email Legally WHITEPAPER: HOW TO MONITOR EMPLOYEE WEB BROWSING AND EMAIL LEGALLY How to Monitor Employee Web Browsing and Email Legally ABSTRACT The Internet and email are indispensable resources in today s business

More information

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4 Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User

More information

Milgram Activities. Everyone was paid $4.50 and told that they would receive this even if they quit during the study.

Milgram Activities. Everyone was paid $4.50 and told that they would receive this even if they quit during the study. Milgram Activities Activity 1 Procedures Aim: To consolidate students knowledge of the procedures of Milgram s study and to encourage co-operative working amongst students. Cut up the following table of

More information

The Basics of Sexual Harassment

The Basics of Sexual Harassment The Basics of Sexual Harassment Sexual Harassment is a violation both of Federal Law and the laws of most states. For employers, it is fairly easy to take steps to prevent sexual harassment and to defeat

More information

Smart Policies for Workplace Technologies Email, Blogs, Cell Phones & More

Smart Policies for Workplace Technologies Email, Blogs, Cell Phones & More Smart Policies for Workplace Technologies Email, Blogs, Cell Phones & More By Lisa Guerin, J.D. Nolo, 2011, ISBN:1-4133-1326-0 Price $26.95, pp. 225 pages Reviewed by Nina T. Dow Journal of High Technology

More information

Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009

Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009 Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009 Access to Electronic Media and other Technologies Terms and Conditions REASONS FOR PROVIDING ELECTRONIC

More information

Council accounts: a guide to your rights. Update July 2013

Council accounts: a guide to your rights. Update July 2013 Council accounts: a guide to your rights Update July 2013 As a local resident you have legal rights, which let you inspect your council s accounts and related documents. Contents Introduction...5 What

More information

Social Media Legal Issues: To Friend or Not to Friend

Social Media Legal Issues: To Friend or Not to Friend Social Networking Social Media Legal Issues: To Friend or Not to Friend New town square. The law as developed is being applied to a totally new medium. Mark Hagemeier, Associate General Counsel University

More information

Social and Digital Media Policy

Social and Digital Media Policy Social and Digital Media Policy October 2012 Version 1.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

Sutter Health and Affiliates Administrative Policies and Procedures SOCIAL MEDIA POLICY

Sutter Health and Affiliates Administrative Policies and Procedures SOCIAL MEDIA POLICY Sutter Health and Affiliates Administrative Policies and Procedures SOCIAL MEDIA POLICY Communications & Marketing Policy 12-745 Approved by: System Management Team Origination Date: 08/2009 Revised Date:

More information

Internet, Social Media and Email Policy

Internet, Social Media and Email Policy West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...

More information

Employment law solicitors

Employment law solicitors Employment law solicitors At Millbank solicitors we are dedicated to providing prompt and practical employment advice to both employers and employees. Our expert lawyers appreciate and understand the ever

More information

Social Media in the Workplace

Social Media in the Workplace Social Media in the Workplace A Guide for CWU Members CWU Youth Committee 2013 CONTENTS Introduction... 3 Social Networking in Ireland... 4 Guidelines for using Social Media Responsibly... 5 2 INTRODUCTION

More information

DIOCESE OF DALLAS. Computer Internet Policy

DIOCESE OF DALLAS. Computer Internet Policy DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Regional Affiliates Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the

More information

Social media and employment law do s and don ts

Social media and employment law do s and don ts Social media and employment law do s and don ts August 2014 @heenanrachael @capsticksllp Social Media Today s Session Social Media HR Hotspots Recruitment and social media What the Tribunals think Managing

More information

The Legal Side of Blogging: How Not to get Sued, Fired, Arrested or Killed

The Legal Side of Blogging: How Not to get Sued, Fired, Arrested or Killed The Legal Side of Blogging: How Not to get Sued, Fired, Arrested or Killed By: Ruth Carter ISBN: 978-1-938574-02-3 Copyright: Ruth Carter 2013 89 pages Kindle Price: $3.99, pp: 89. Reviewed by Bridget

More information

The Legal Guide to Employee Monitoring

The Legal Guide to Employee Monitoring Written on behalf of SurfControl >Notice This document serves as a guide for general information only; it should not be considered as legal advice. We make no warranty and accept no liability as to the

More information

How To Use Social Media At St James Anglican School

How To Use Social Media At St James Anglican School P o l i c i e s n P r o c e d u r e s n I n f o r m a t i o n T o t a l n u m b e r o f p a g e s 2 P o l i c y C r e a t i o n D a t e : 2 4 S e p t e m b e r 2 0 1 4 P o l i c y R e v i e w D a t e :

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Member Town Hall Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

E-SAFETY SOCIAL MEDIA GUIDANCE

E-SAFETY SOCIAL MEDIA GUIDANCE E-SAFETY SOCIAL MEDIA GUIDANCE for those who work with Children, Young People and Adults who may be at risk 1 Contents What do we mean by Social Media... 3 Introduction... 3 Background... 3 Legal Consequences...

More information

Copyright 2010 You have giveaway rights to this report. Feel free to share.

Copyright 2010 You have giveaway rights to this report. Feel free to share. Article Marketing Magic Copyright 2010 You have giveaway rights to this report. Feel free to share. Table of Contents What Is Article Marketing?...3 The History of Article Marketing...7 Article Marketing

More information

MUTUAL INSURANCE EMPLOYEE HANDBOOK

MUTUAL INSURANCE EMPLOYEE HANDBOOK MUTUAL INSURANCE EMPLOYEE HANDBOOK A. Introduction to Handbook We would like to welcome you as an employee to Mutual Insurance Company. The purpose of this Handbook is to explain the current policies and

More information

Blogging and Other Social Media

Blogging and Other Social Media Blogging and Other Social Media Exploiting the Technology and Protecting the Enterprise Alex Newson with Deryck Houghton and Justin Patten The Law of Social Media Chapter 18 This chapter provides an overview

More information

How ethical are you? Do you know everything employee

How ethical are you? Do you know everything employee INTRODUCTION How ethical are you? Do you know everything employee ethics involves? It s more crucial than ever to have an ethical workplace, and you should know how to handle common ethical dilemmas you

More information

Assistant Director of Facilities

Assistant Director of Facilities Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment

More information

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy

More information

Social Media, Business & the Law

Social Media, Business & the Law Social Media, Business & the Law Protecting your company in the social media realm A Publication of Robert Meaton & Co. Solicitors Introduction The rise of social media has been something of a double edged

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78 Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

Websites & Social Media. in the Professional Environment. A practical guide to navigating the world of social media

Websites & Social Media. in the Professional Environment. A practical guide to navigating the world of social media Websites & Social Media in the Professional Environment @ A practical guide to navigating the world of social media istockphoto.com/andrearoad Introduction Your Online Presence An online presence is essential

More information

The impact of corporate reputation on business performance

The impact of corporate reputation on business performance The impact of corporate reputation on business performance Graham McWilliam, Group Director of Corporate Affairs PR Week Reputation Management Strategy Conference 27 November 2012 Thanks James. I m going

More information

City of Grand Rapids ADMINISTRATIVE POLICY

City of Grand Rapids ADMINISTRATIVE POLICY City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC

More information

Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT

Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT I. Purpose This directive provides Department of Homeland

More information

Procedures for obtaining informed consent for recordings and images of people to support Data Protection Policy

Procedures for obtaining informed consent for recordings and images of people to support Data Protection Policy Procedures for obtaining informed consent for recordings and images of people to support Data Protection Policy Heriot-Watt Procedures for responding to requests for personal data; to support Data Protection

More information

BBN MEDIA Television and Radio Transcription Service Email: info@bbn.ie Tel: 01 4911935

BBN MEDIA Television and Radio Transcription Service Email: info@bbn.ie Tel: 01 4911935 BBN MEDIA Television and Radio Transcription Service Email: info@bbn.ie Tel: 01 4911935 TRANSCRIPT Station: RTE Radio One Programme: Drivetime Date: 09.02.12 Time: 15 minutes Ref: The Law Society Presenter

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information