1 SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This directive and attached policy provides direction to Judicial Branch personnel regarding the security, operation and permissible use of the judicial branch network, hardware and software. In addition, the policy extends to persons who are not branch employees, but use the judicial branch network, hardware or software with permission of the branch. The policy and procedures contained in the attached Electronic Communications Usage Policy are adopted as an order of the Colorado Supreme Court. This policy shall be entitled Electronic Communications Usage Policy: Technical, Security, and System Management Concerns, and shall be available to Judicial Branch personnel and to the public. Judicial Branch employees shall acknowledge reading the policy and agreeing to follow it. Done at Denver, Colorado this 8 th day of April, /s/ Nancy E. Rice, Chief Justice
2 Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, and System Management Concerns Effective: April 8, 2014 Replaces February 2007, Electronic Communications Usage Policy, and all Information Technology Services (ITS) security policies dated prior to December 31, 2013.
3 Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, and System Management Concerns 1. PURPOSE. The purpose of this policy is to provide an electronic communication usage policy for the Colorado Judicial Department (the Department) to protect its information systems from potential threats, vulnerabilities, and data loss, while also describing the responsibilities of the Department s employees (Department users), contractors, volunteers, or business partners. 2. SCOPE. This policy applies to all Department users and covers accessing and using the Department s electronic computing technologies, including but not limited to: a) The Department s network, which is any circuit used to exchange information within the Department or externally, and includes hardware and software necessary to use the network. b) Hardware including but not limited to: desktop computers, laptops, mobile computing devices, remote and centralized servers, network equipment, and telephony equipment. c) Software applications including software developed in-house and purchased commercially. 3. POLICY: The security and availability of the Department s information systems and data in any media or format is vital to the success of the Department s mission. Therefore, the Department shall establish and maintain a comprehensive Department-wide electronic communication policy detailing acceptable use and behavior necessary to protect the Department s Information Technology (IT) infrastructure. 4. INFORMATION SECURITY STANDARDS The Department will implement security controls to protect information systems and data from individual and environmental threats. Department users accessing the Department network, computing devices or external storage media must make every effort to protect Department information systems and devices within their control.
4 Department users are responsible for protecting the information equipment located within their work areas and any equipment used when working remotely. Department-owned equipment is for authorized use only. Department users are required to implement physical safeguards for all equipment that accesses Department sensitive information. Equipment must be properly safeguarded and protected to reduce risks from environmental threats and hazards, as well as opportunities for unauthorized access, use, or removal. Such safeguards include, but are not limited to, the following: a) Electronic communication technologies shall be used for legitimate workrelated purposes with limited personal use. Personal or non-work-related use of ICON/ECLIPSE, jpod, ICCES, Colorado State Courts Data Access System, CICJIS or any other electronic court and probation record keeping system is strictly prohibited. b) Limited personal use of the Department s electronic communication technologies, with the exception of ICON/ECLIPSE, jpod, ICCES, Colorado State Courts Data Access System, CICJIS or any other electronic court and probation record keeping systems, is permissible when it does not consume more than a minimal amount of resources, interfere with employee productivity, conflict with this policy s goals or any other Judicial Department policy, or preempt any work-related activity, in accordance with the Colorado Judicial Department Code of Conduct. c) Department users must utilize strong passwords and have a professional responsibility to protect system passwords by not sharing passwords with anyone. Department users must change passwords immediately if a password is discovered to be compromised. Passwords must be secured at all times from unauthorized access. Enabling the Save Password Option is strictly prohibited. d) Department users are required to lock their PC, laptop, or mobile computing device when the device is no longer within line of sight. At the end of the workday, Department users must log off their workstations. The Department will employ access time and system locking procedures to protect against unauthorized use of Department information systems. e) To the extent possible, computer monitors will be positioned to eliminate viewing by unauthorized personnel. When computer monitors cannot be positioned to eliminate viewing by unauthorized personnel, a privacy screen, which allows viewing only from straight-on, will be used.
5 f) Department users should be certain that any IT related work or maintenance performed on any computing device, system, or network is completed by an authorized ITS employee or contractor of ITS. Additionally, circuit boards, hard drives, or other computing components should not be removed without the express approval of ITS. Department users are expected to notify their immediate supervisor of anyone not complying with this procedure. g) Information technology systems or devices not specifically purchased or authorized by the Department s Chief Information Officer (CIO) are prohibited from being connected to the Department s local and wide area network or any other Department information system. This includes, but is not limited to, software applications, all removable media (i.e., zip drives, thumb drives, external hard drives, CD burners) that is not encrypted, and all hardware such as PCs, laptops, mobile computing devices, scanners, and printers. In situations where there is a business need to connect removable media to a computing device or information system that is not encrypted, Department users must take precautionary measures to ensure the computing device and information system(s) are properly secured. Precautionary measures shall include, at a minimum, scanning the removable media for viruses, Trojans, or malware. Business situations that may require connecting unencrypted removable media to a computing device or information system may include the following a. Large exhibits or evidence on removable media for court proceedings; b. Case review for probation supervision purposes; or c. Training materials that are required to be distributed using removable media. All Department users are expected to comply with Chief Justice Directive Centralized IT Purchasing. h) All Department users who have access to and store Department information must ensure that the information is protected from risk of inadvertent or deliberate misuse, fraudulent use, improper disclosure, or destruction. i) When no longer needed, Department sensitive information must be destroyed by a method rendering it unreadable, undecipherable, and irretrievable. j) Software Licensing: All software, shareware, and public domain or open source software installed on workstations shall be installed by and registered with ITS. Approval must be granted from ITS before an individual can use
6 personally-owned software on any Department information system. Use of pirated or illegally obtained software on any Department information system is strictly prohibited. To ensure compliance with software copyright and licensing agreements, ITS appointed staff shall conduct computer audits not less than annually. ITS has the authority to remove or disable any unapproved or pirated software found. k) All devices that connect to any Department information system, either on site or from a remote location, must be updated with the latest security patches and malware or anti-virus protection as they are distributed. Users will not disable, uninstall or override any security software, settings, or configurations on Department owned equipment. l) Remote access to the Department s network is permitted only through approved software/services authorized by the Department s CIO. m) Peer-to-Peer (P2P) software/service connections (where a computer or server acts as a sharing device for users outside the Department s network) are strictly prohibited. These connections allow for unauthorized access to Department systems and information. n) Any network, wireless, or server equipment purchased by a District using local funds must be approved and installed by ITS. o) Wireless network installations or configurations needed to access the judicial network must be authorized and performed by ITS. Under no circumstance should any unapproved wireless device be plugged into the network. p) Portable and/or mobile computing devices are not allowed access to any Department network without first meeting Department security policies, procedures, and configuration standards. These include (when technically possible) scanning the devices for malicious code, updating virus protection software, scanning for critical software updates and patches, encryption and passcodes, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware (e.g., Bluetooth) when not needed. q) Department users are strictly prohibited from downloading and using any hacking type tools, network scanning software, or password crackers unless specifically approved and authorized by the CIO in writing.
7 5. SECURITY INCIDENTS A security incident is a computer, network, or paper based activity that results (or may result) in misuse, damage, denial of service, compromise of integrity, or loss of confidentiality of a network, computer, application, or data. Security incidents may also include threats, misrepresentations of identity, or harassment of or by individuals using these resources. All incidents related to information security shall be reported immediately to the user s supervisor and the Information Security Officer (ISO). Colorado Revised Statute requires notification to an individual should a breach of Personal Identifying Information occur. a) Personal Identifying Information, (PII) means a Colorado resident's first name or first initial and last name in combination with any one or more of the following data elements that relate to the resident, when the data elements are not encrypted, redacted, or secured by any other method rendering the name or the element unreadable or unusable: 1) Social security number; 2) Driver's license number or identification card number; or 3) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to a resident's financial account. b) Personal Identifying Information' does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records or widely distributed media. Department users must immediately report any incident of theft, loss, or compromise of Department sensitive information or information systems to the user s immediate supervisor and the ISO. a) If a compromise of PII has occurred, appointed investigative team members will examine the details surrounding the incident ensuring information and systems are not compromised. If the incident is believed to involve criminal activity, the CIO or ISO will contact local law enforcement. b) The ISO will track and document information system security incidents on an ongoing basis. c) Personnel will be provided training by ITS in their incident response roles.
8 6. UNAUTHORIZED ACCESS Unauthorized access is defined as any access to PII or any other Department data that violates applicable federal or state privacy or confidentiality statues. Unauthorized access to PII or any other Department information may include access a) by an unauthorized user, that is, someone who does not have Department permission to access the information, or b) by someone who has met all requirements to access the data, but accesses PII for an unauthorized purpose. All Department users should be alert to their surroundings and report immediately any suspicious activity or suspected incidents to their immediate supervisor and the ISO. 7. ELECTRONIC MAIL ( ) shall be used for authorized Department purposes and shall contain only nonsensitive information unless the information is appropriately encrypted. users must exercise common sense, good judgment, and propriety in using the Department s electronic communication technologies. Department users should not expect privacy or confidentiality when using a Department issued account and/or Department system(s). For technical issues or investigative purposes, Department accounts or system(s) may be subject to review. Such technical issues or investigations include but are not limited to or account restoration, troubleshooting client issues (i.e., Outlook), Human Resource investigations, or law enforcement investigations. Such reviews will be handled in accordance with appropriate policies and laws. Electronic mail messaging shall be used in accordance with the following guidelines: a) Auto-forwarding of messages to addresses outside the Department network is strictly prohibited. b) Misrepresenting, obscuring, or suppressing a user s identity in the From: line of an message or information system is prohibited. The user name, address, organizational affiliation, and related information included with an message or posting must reflect the actual originator of the message or posting. This does not include deleting information within the body of an when replying or forwarding information. c) To ensure the integrity of the Department s communication system, employees shall not intercept or assist in intercepting communication
9 unless authorized to do so by the Director of Human Resources or his/her designee in writing. d) Message Content All messages shall be conducted in a professional manner and the messaging shall not: 1) contain profanity, obscenities or derogatory remarks; 2) contain obscene, pornographic or sexually suggestive materials; 3) be used to discriminate against any person or group on the basis of race, national origin, gender, age, sexual orientation, religion, socioeconomic status, or disability; 4) be used to promote religious or political beliefs; 5) be used to harass and/or threaten others; 6) be used to intimidate others or to interfere with a person s ability to perform his or her job duties; 7) involve the creation and exchange of advertisements, solicitations, chain letters or other unsolicited ; 8) involve the creation and exchange of information in violation of any copyright laws. e) Care should be taken in opening any message if the Department user is not familiar with the message sender. If the message looks suspicious, the Department user should permanently delete the message by pressing Shift+Delete. If the Department user continues to receive suspicious from the sender, the local ITS Technician should be contacted to provide necessary information to the Department s ISO. f) It is necessary for ITS staff to use software to monitor the activity of users IDs. It may also be necessary for technical support personnel to review the content of an individual employee s communications during the course of problem resolution or to ensure the ongoing availability and reliability of the system(s). Under no circumstances, however, may technical support personnel review the content of an individual employee s communications except to enforce provisions of this policy and approved by the Director of Human Resources or his/her designee. 8. ACCEPTABLE USAGE POLICY All Department users who require or need to establish access to Department information systems must read, understand and agree by signature to adhere to the Department s Acceptable Usage Policy (Attachment A).
10 The Department has established a set of rules that describe the responsibilities and expected behavior with regard to information system usage. These rules clearly delineate security responsibilities and expected behavior of all system owners and Department users. The rules include the consequences of inconsistent behavior or non-compliance when using Department information systems. All Department users will have access and/or a copy of the Acceptable Usage Policy for review. A signed acknowledgement of this policy is a condition of access to any Department information system. 9. IMPLEMENTING THIS DIRECTIVE ITS will implement the provisions of this directive using various malware programs, intrusion detection software, internet blocking programs, encryption practices, firewalls, and methodologies for centrally distributing critical security updates from approved Department software or hardware providers.
11 Attachment A Colorado Judicial Department Acceptable Usage Policy I understand, accept, and agree to the following terms and conditions that apply to my access to, and use of, Department information, including sensitive information such as PII or information systems of the Colorado Judicial Department. GENERAL ACCEPTABLE USAGE POLICIES AND PROCEDURES a. I understand that when I use any Department information system, I have NO expectation of privacy in any Department records that I create or in my activities while accessing or using the Department s information systems. b. I understand that the Administrative Authority, with the approval of the Directory of Human Resources or his/her designee, may review my conduct or actions concerning Department information and information systems, and take appropriate action if warranted. c. I understand under no circumstances may I use ICON/ECLIPSE, jpod, ICCES, Colorado State Courts Data Access System, CICJIS or any other electronic court and probation record keeping system for personal or non-work related purposes. d. I understand that I am allowed limited personal use of the Department s electronic information systems as long as it does not consume more than a minimal amount of resources, does not interfere with employee productivity, does not conflict with the goals of CDJ 07-01, or preempt any work related activity, in accordance with the Colorado Judicial Department Code of Conduct. e. I understand that the following actions are prohibited: unauthorized access, unauthorized uploading, unauthorized downloading, unauthorized changing, unauthorized circumventing, unauthorized deleting of information on Department systems, or unauthorized denying or granting access to Department systems; modifying Department systems; using Department resources for unauthorized use on Department systems, or otherwise misusing Department systems or resources. I also understand that attempting to engage in any of these unauthorized actions is also prohibited. f. I understand that I have a responsibility to report suspected or identified information security incidents to the Information Security Officer (ISO) or my supervisor as appropriate. g. I understand that if I refuse to sign this Acceptable Usage Policy as required by Department policy, I will be denied access to Department information and information systems. Any refusal to sign the Department s Acceptable Usage Policy may have an adverse impact on my employment with the Department.
12 Attachment A SPECIFIC ACCEPTABLE USAGE POLICIES AND PROCEDURES a. I will follow established procedures for requesting access to any Department computer system and for notification to appropriate Department personnel when access is no longer needed. Such notification will include your immediate supervisor and/or Administrative Authority and ITS. b. I will follow established Department information security policies and procedures. c. I will use only devices, systems, software, and data which I am authorized to use, including complying with any software licensing or copyright restrictions. This includes downloads of software offered as free trials, shareware public domain, or open source. d. I will not attempt to override, circumvent or disable operational, technical, or security controls put in place unless expressly directed to do so in writing by the Department s CIO. e. I will protect my passwords from unauthorized use and disclosure and ensure I utilize only passwords that meet the Department s minimum password requirements. f. I will ensure that I log off or lock any computer, console, or mobile computing device before walking away and will not allow another user to access any computer, console, or mobile computing device while I am logged on to it other than for troubleshooting purposes performed by ITS. g. I will not misrepresent, obscure, suppress, or replace a user s identity on the Internet or any Department electronic communication system. h. I will not attempt to probe computer systems to exploit system controls or access Department sensitive data for any reason other than in the performance of official job duties. i. I will protect Department property from theft, loss, destruction, or misuse. I will follow Department policies and procedures for handling IT equipment and will sign for items provided to me for my exclusive use and return them when no longer required for Department activities. j. I will never swap or surrender Department hard drives or other storage devices to anyone other than an authorized ITS employee at the time of system problems. k. I will not disable or uninstall software programs used by the Department that autoinstalls security software updates to Department computer equipment. l. I agree to allow authorized ITS or Human Resource personnel to examine for trouble shooting or disciplinary purposes any Department or personal IT device that I have been granted permission to use, whether remotely or in any setting to access Department information for purposes of creating, storing or using Department information. m. I agree to have all equipment scanned by authorized ITS staff prior to connecting to the Department network if the equipment has not been connected to the Department network for a period of more than three weeks.
13 Attachment A n. I will complete mandatory periodic security awareness training within designated timeframes, and complete any additional required training for the particular systems to which I require access. o. I agree that I will not allow Department sensitive information to reside on non- Department systems or devices unless specifically designated and approved in advance by the Department s CIO. I agree that I will not access, transmit or store remotely any Department sensitive information that is not properly encrypted. p. I will protect sensitive information from unauthorized disclosure, use, modification, or destruction. q. I will use Department-provided encryption to encrypt any , including attachments to the , which contains Department sensitive information before sending the . I will not send any that contains Department sensitive information in an unencrypted form. Department sensitive information includes Personally Identifiable Information (PII) and protected health information. r. I will immediately inform my supervisor if I lose control over any portable device that contains sensitive information, encrypted or unencrypted. Immediately means as soon as the loss is noticed; not more than one hour after the loss is noticed. Notice should be made by and a telephone call. 3. Acknowledgement and Acceptance a. I acknowledge that I have received a copy of the Department s Acceptable Usage Policy. b. I understand, accept and agree to comply with all terms and conditions of this Acceptable Usage Policy. [Print or type your full name] Signature Date Office Phone
`DEPARTMENT OF VETERANS AFFAIRS VA SOUTHEAST NETWORK Automated Information System User Access Notice I understand, accept, and agree to the following terms and conditions that apply to my access to, and
Appendix A: Rules of Behavior for VA Employees Department of Veterans Affairs (VA) National Rules of Behavior 1 Background a) Section 5723(b)(12) of title 38, United States Code, requires the Assistant
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Approved by: Information Technology Acceptable Use and Safeguards President and Chief Executive Officer Corporate Policy & Procedures Manual Number: X-50 Date Approved May 12, 2014 Next Review (3 years
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
2 of 10 2.5 Failure to comply with this policy, in whole or in part, if grounds for disciplinary actions, up to and including discharge. ADMINISTRATIVE CONTROL 3.1 The CIO Bureau s Information Technology
Information Security Handbook for Employees Providing our patients with excellence in healthcare includes protecting their information This handbook was prepared by Tom Walsh Consulting, LLC for the Kansas
Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
Office of Information Technology Roger Williams University Appropriate Use Policy Purpose: This is intended to regulate the use of Roger Williams University s electronic communications systems. Users of
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
Board Adopted Policy Policy Title Information Technology Systems Usage Effective Date:03/14/2012 Board Approval Date: 6/19/2014 Review Cycle: three (3) years I. Application: Authority wide. II. Intent:
Appendix H: End User Rules of Behavior 1. Introduction The Office of Management and Budget (OMB) has established the requirement for formally documented Rules of Behavior as set forth in OMB Circular A-130.
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions
Welcome to Valley Express (VE) Valley Express is Valley Health Plan s (VHP) Authorization and Referral data system. By signing this document, the individual signifies that the County s User Responsibility
Riverside Unified School District Acceptable Use Policy for Employee Use of Technology Resources (Based on Rules and Regulations #4040) It is the policy of the Riverside Unified School District (RUSD or
Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
4118.5(a) Acceptable Computer Network Use The intent of these administrative regulations rules is to provide employees with general requirements for utilizing the school unit s computers, networks, and
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
POLICY AND PAGE 1 of 7 OCTOBER 25, 2007 Tab Authority Subject Related Policies Corporate Services Information Technology Services Responsible Computing Corporate IT Guiding Principles Policy, Harassment
ACCEPTABLE USE POLICY (AUP) POLICY NUMBER: 8.71 PURPOSE/SCOPE: This establishes the School Board Policy for Acceptable Use of Information Resources and applies to all users of DCPS information resources.
Diocese of Springfield in Illinois Section I General Statement 1. Information Technology Systems (ITS), when properly used, provide timely communication and technological support to help fulfill the mission
Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
Pur pose The purpose of this policy is to establish direction, procedures, requirements, and responsibilities to ensure the appropriate protection of the Lisbon Public Schools computer and telecommunication
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to the Internet, and a Bring
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 email@example.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology
Rules of the Road for Users of Smithsonian Computers and Networks Introduction Smithsonian systems, networks and other computer resources are shared among Smithsonian employees, interns, visiting scholars,
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
Diocese of Orlando Network Acceptable Use Policy for All Parishes, Schools and Entities of the Diocese of Orlando Parent Addendum (Please note these are excerpts from the full document) 5.3 Unacceptable
Dublin City School District Network and Internet Access Agreement for Students Property Page 1 of 7 Any student age 18 and older is to read this form (). Page 5 of this form should then be completed and
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
4118.5(a) Personnel - Certified-Non-Certified Acceptable Computer Network Use The intent of these administrative regulations is to provide employees with general requirements for utilizing the school district
HIPAA SECURITY POLICIES: ADMINISTRATIVE SAFEGUARDS Topic: SECURITY BREACH NOTIFICATION & MITIGATION OF IMPROPER DISCLOSURES Date Adopted: 12 / 24 / 2013 I. POLICY HSX strives to comply with federal and
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
Town of Brunswick Computer Use Policy Town of Brunswick Computer Use Policy Table of Contents 1. General 1 2. Access 1 3. Acceptable Use 1 4. E-Mail 1 5. E-Mail Attachments 2 6. Internet & Websites 2 7.
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
Page 1 of 7 ELECTRONIC COMMUNICATIONS 1.0 The District supports the use of the Internet and electronic communications by all employees to improve teaching and learning through interpersonal communication,
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services Bureau
NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-5250.0 FOR POLICY NUMBER: BP 5250 ACCEPTABLE USE PROCEDURES ELECTRONIC RESOURCES 1. PROCEDURE SUMMARY STATEMENT To establish procedures relating
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
ELECTRONIC COMMUNICATIONS AND INTERNET ACCESS POLICY 1. PURPOSE: The purpose of the electronic mail system and Internet access is to assist Clinton County s day-to-day conduct of business activities. This
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture
Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE