Access Control and Account Management Policy Version May 2015

Size: px
Start display at page:

Download "Access Control and Account Management Policy Version 1.8 9 May 2015"

Transcription

1 Information Security Management Access Control and Account Management Policy Version May 2015 University of Leeds 2015 The intellectual property contained within this publication is the property of the University of Leeds. This publication (including its text and illustrations) is protected by copyright. Any unauthorised projection, editing, copying, reselling, rental or distribution of the whole or part of this publication in whatever form (including electronic and magnetic forms) is prohibited. [Any breach of this prohibition m ay render you liable to both civil proceedings and criminal penalties].

2 Owner: Source Location: Kevin Darley, IT Security Co-ordinator, Information Systems Services, University of Leeds C:\Users\Kevin\Desktop\Access Control and Account Management Policy - Copy.doc Document Reference: Other Documents Referenced: Related Documents: Information Security Policy, Use of Computer Systems Policy, Password Usage and Management Policy, Archiving Policy, Systems Security and Network Access and Management Policy, and Security Incident and Computer Misuse Policy Acknowledgements: Document Control This document is subject to change control and any amendments will be recorded below. Change History Version Date Circulation Changes /07/05 First Formal Issue /07/05 Change to Appendix to reflect segregation of forms /08/05 Addition of text to /10/05 Removal of common information in Section 1 and Section 2.7 largely replaced by Password Usage and Management Policy /03/06 Section 5 and Removal of Appendices /06/06 Replacement of Section 5 to 5.3 inclusive /08/07 Replacement 3.2; new 5.1 and 5.2; most of 5.4 deleted; Appendix deleted; general review /08/09 New 5.6 governing 3 rd party access to data and s of those leaving under PRT/MIS /05/15 IT Security Website Update to Sections 3.2 and 5.8 Information Security Management 1.8 (09/05/15) Page 2 of 13

3 Version Awareness The audience of this document should be aware that a physical copy may not be the latest available version. The latest version, which supersedes all previous versions, is available here. Those to whom this Policy applies are responsible for familiarising themselves periodically with the latest version and for complying with Policy requirements at all times. Information Security Management 1.8 (09/05/15) Page 3 of 13

4 Contents 1. Introduction Background Applicability Cre ating, Controlling and Managing User Accounts Policy Scope Account Creation Conditions of Acceptance Traceability Identification and Authentication Passw ord Change at Initial Log-on Suspension of User Accounts and Passw ord Resets Account Privileges Account Management Use of User Accounts Passw ords Use of Accounts Access Parameters Controlling Shared and Other Accounts Shared Access and Project Accounts Temporary Accounts Conference and Visitors Accounts Lecture Theatre Computers Library Catalogue PCs Third Party Access to Em ail and Filestores Allow ing Others to Access Your Sharing Your Data Management of Unassigned Third Party Access to and Data Third Party Cover Arrangements for Know n Absence of Staff Third Party Access during Unexpected Staff Absence Third Party Access to Data and s of Staff leaving under PRT/MIS Approval and Authority - Third Party Access during Unexpected Staff Absence Access to Accounts of Former Employees - DS and Admin Domains Access to Staff Accounts and Archives on Systems outside the DS Domain Third Party Restrictions Control and Accountability of Student Accounts De aling with Misuse, Abuse and Illegal Activity Allegations Requests for Account Access by the Police and Law Enforcement Agencies Information Security Management 1.8 (09/05/15) Page 4 of 13

5 1. Introduction 1.1. Background The ever increasing use of digitised and networked information at the University intensifies the risk of data being copied or stolen, or modified, hidden, encrypted or destroyed. Unless access to our systems is appropriately managed, there is an increased risk that unauthorised persons will obtain use of our resources and gain access to University data. Furthermore, the governance of complex information related legislation, which quite often appears to be contradictory, increases the possibility that those responsible for managing systems could inadvertently fall foul of the law when undertaking their day to day systems management activities. Although technical controls provide an essential element of overall protection, they only deliver a percentage of the required solution, the most effective defence being achieved through awareness and good working practices. This document forms the University s Access Control and Account Management Policy in support of the Information Security Policy. Compliance with this Policy will enable consistent controls to be applied throughout the University minimising exposure to security breach, whilst allowing systems administration and technical support staff to conduct their activities within the framework of the law. The University s Information Security Policy and a full list of Supporting Policies within the Information Security Management System (ISMS) framework can be found here Applicability This particular Policy is primarily aimed at users of University computer systems and systems administrators and computer support staff (including IT staff) who are responsible for the development and maintenance of IT/IS facilities. Applicability naturally extends to anyone else who is subjected to the Policy framework who undertakes activities governed by this Policy. It is the personal responsibility of each person to whom this Policy applies to adhere fully with its requirements. However, Deans and Heads of Schools/Services 1 are responsible for implementing this Policy within their respective faculty, school or department and for overseeing compliance by staff under their direction or supervision. 2. Creating, Controlling and Managing User Accounts 2.1. Policy Scope This policy concerns user accounts comprising usernames (and passwords) that are issued to users, and which are registered on servers which authenticate login requests from clients Account Creation Faculties, schools, departments and IT are to implement formal procedures for granting user access to both University IT/IS facilities, and external services via University systems. 1 Also generically infers Heads of Centres and Institutes throughout. Information Security Management 1.8 (09/05/15) Page 5 of 13

6 User-accounts are only to be created on the correct authority. It is the responsibility of the system administrator who is creating user-accounts to confirm that the correct level of authority has been granted where there is any doubt Conditions of Acceptance All users are required to agree to comply with the Use of Computer Systems Policy and other relevant policies, prior to using their computer account. This agreement will be retained throughout the lifetime of the account and for a period of twelve months after the account has been terminated. IT accounts will not be made available prior to agreement by the user to adhere to the terms and conditions set by University Policy Traceability Accounts are to be created so that the identity of all users can be established at all times during their computer usage Identification and Authentication All users of University systems must be identified and authenticated by systems that they access using at least two sources of information. Prior to using University systems, users must: Present their identity to the security mechanisms of the system by entering a user-id or user-name that has been allocated to their computer account, or by presenting some other form of system recognised identity; and, authenticate themselves by providing information, such as a password or PIN, that the system corroborates as a binding between the person and the identifier, and validates them as being an authorised user. Mechanisms such as tokens, biometric readers or digital certificates may be used for the identification and authentication of users Password Change at Initial Log-on Where possible, systems are to be configured to force users to change their password at their first logon Suspension of User Accounts and Password Resets The suspension of a student s user account can only be requested by an appropriate representative in the respective faculty or School, a senior member of the Secretariat 2, the Director IT, or the University s IT Security Co-ordinator. The user account of a member of staff can only be suspended on the authority of the person suspending that individual from duty. 2 T he Secretary to the University, Deputy Secretary, Director or Deputy Director HR, and the University Legal Advisor. Information Security Management 1.8 (09/05/15) Page 6 of 13

7 All password resets are to be performed in accordance with the Password Usage and Management Policy Account Privileges Faculties, schools, departments and IT are to restrict and control the allocation and use of system privileges on each computer platform. In particular access to operating systems and applications is to be generally restricted to designated administrators and support staff associated with the management and maintenance of the respective platforms. Users are to be given specific account profiles and privileges as defined and authorised by their respective faculty, school, department or IT, in accordance with their particular function or role. When creating user-accounts, system administrators must take care to ensure that users are only granted access to systems and resources 3 that have been approved and which are necessary for operational or research purposes. User privileges are to be reviewed on a regular and frequent basis and withdrawn where the circumstances of those who have been granted privileges no longer warrant such access Account Management User-accounts are only to remain active for the period required for individual users to fulfil the operational, learning, or research needs for which they were granted. Faculty, School and departmental staff who administer their own local systems are to arrange a process with Human Resources so that they are notified when members of their staff either leave University employment, or transfer to a job outside their domain. Administrators are to implement a process for disabling staff user-accounts when the account holder has left University employment or moved to a different faculty, or school or department outside of their domain. Staff user-accounts that are administered by IT Username Administration that have lapsed for a period of three months are to be disabled. Where users have multiple accounts care must be taken to ensure that the above process is undertaken for all of their accounts. 3. Use of User Accounts 3.1. Passwords All user accounts must be assigned passwords which meet the requirements of the Password Usage and Management Policy. In accordance with the Password Usage and Management Policy all users are required to change their initial log-on password the first time that they log onto a system where the system itself does not automatically enforce this requirement. 3 It may be necessary for System Administrators to consult their respective User-Representative to ascertain if there are any licence implications or restriction associated with software resources. Information Security Management 1.8 (09/05/15) Page 7 of 13

8 3.2. Use of Accounts You may only use computer accounts that you have been officially authorised to use. Using a computer for which you have not been given permission to use can constitute a criminal offence under the Computer Misuse Act Account holders must not divulge their password to anyone else, regardless of whether the other person is a member of the University, and must not allow any other person to use their computer account at any time. The only exception to this requirement is when an official University investigation is taking place in accordance with the University s Security Incident & Computer Misuse Policy. Any misuse of a computer account may be attributed to the account holder Access Parameters In accordance with the Use of Computer Systems Policy under no circumstances are users to attempt to access systems, applications or data which their user account does not naturally provide access to and for which they have not been granted specific permission. 4. Controlling Shared and Other Accounts 4.1. Shared Access and Project Accounts When there is a requirement for several users to access common data and mailboxes, for example when working collaboratively, shared areas are to be created and these are to be accessed through the use of each user s own user account. However, in some cases, a project account may be permitted whereby members of a group access the account through the use of a common (shared) user-name and password. In such cases access must be tightly controlled by the account holder as the degree of accountability associated with personal accounts is diminished when using project accounts. On all such occasions the account holder is responsible for maintaining a list of all users who have been granted access to the account at any given time, and for ensuring that the password is changed whenever a user leaves the project team Temporary Accounts Faculties, schools and departments that have a high turn over of temporary or agency staff may utilise temporary accounts, but there must be a named custodian (and deputy) for all such accounts who are responsible for managing them. Each temporary account is to be set with a master password which is only known by the custodian and his/her deputy and this must be changed to a previously unused user-password each time an account is issued. Temporary accounts are not to be issued until each new user signs a form to confirm that they will abide by the Use of Computer Systems Policy and other applicable policies. Once signed, forms are to be retained locally for a period of 12 months after the user has left, and presented to auditors on request. Information Security Management 1.8 (09/05/15) Page 8 of 13

9 The custodians of temporary accounts are responsible for changing temporary account passwords back to the master password, in accordance with the Password Usage and Management Policy, as soon as a temporary user no longer requires access to the respective system Conference and Visitors Accounts Faculties, schools and departments that use IT operated accounts may be allocated a bulk block of user-accounts (user-names and passwords) by IT User Administration if they have large or frequent conferences, or a high turn over of visitors. In such cases, a custodian is to be designated as owner of the user-accounts and made responsible for their security, allocation and lapsing. User-accounts are only to be issued when the intended recipients have signed a copy of a form to confirm that they will abide by the Use of Computer Systems Policy and their equipment has been checked in accordance with the Systems Security and Network Access and Management Policy to ensure that it does not pose a security risk. Once signed, forms are to be retained locally for a period of 12 months after the user has left, and presented to auditors or IT staff on request. User-account custodians are responsible for notifying IT Username Administration of the lapse date requirements as they issue these accounts, or for ing a lapse request to Sysadmin@leeds.ac.uk when the users no longer require access to University systems Lecture Theatre Computers Lecture theatre computers are to be configured so that members of staff have to log-on using their own user-account. Visitors to lecture theatres are to be issued with temporary accounts as described at 4.2 above. These will be managed by Conference Office staff Library Catalogue PCs Library catalogue PCS have to be made available to a large number of University members who do not have user-accounts. As a deterrent against potential abuse and in a bid to obtain a level of accountability over users, users are required to log-in using their name and library card barcode number, the details of which are authenticated via the Library Management System. As an added precaution, library catalogue PCs are to be under the supervision of video recorded CCTV facilities wherever possible. 5. Third Party Access to and Filestores 5.1. Allowing Others to Access Your Members of staff using Outlook are to assign delegated rights to their mailbox if they have a need for someone else to access their , for example, secretaries on a permanent basis, or staff covering a particular role during periods of temporary absence Sharing Your Data Staff requiring shared access to data are to use public folders on the N: Drive with permissions restricted, as appropriate, to the individuals who need to share it. Information Security Management 1.8 (09/05/15) Page 9 of 13

10 5.3. Management of Unassigned Third Party Access to and Data The Use of Computer Systems Policy governs the personal use of the University s computing facilities, and warns that for operational purposes, it may be necessary for the University to occasionally access the account and filestore of a member of staff in their absence. All third party access to other users data in their absence must be justified for operational purposes and fully accountable. As such, all applications must be considered on a case by case basis. Sections 5.4 to 5.8, below, apply to the user accounts of staff and former employees who are either in the DS or Admin Domains. Section 5.9 applies to staff and former employees whose s and data resides outside the DS and Admin Domains Third Party Cover Arrangements for Known Absence of Staff When a school or department knows that a member of staff is going to be absent from work, and that for operation reasons access will be required to either their account or filestore during their absence, they are to make arrangements in advance of the absence in accordance with 5.1 and/or 5.2 above as appropriate Third Party Access during Unexpected Staff Absence Where a member of staff is unexpectedly absent from work and it was not practical for advanced access arrangements to be made before their absence (see 5.4) IT will, on the correct authority, facilitate third party access to the required DS or Admin account or file store (see 5.7). Subject to the requirements of each application, the absentees mailbox, filestore or both mailbox and filestore, will be attached to the third party s user account. Once this has been done, an will be sent by IT to the account holder and the third party (copied to the University IT Security Co-ordinator) confirming the action Third Party Access to Data and s of Staff leaving under PRT/MIS Third party access will be granted to designated Faculty/Service personnel to the /data of former employees who have left under PRT/MIS, on production of an from the account holder granting permission. When access is required to data/ s and the account holder has not granted permission, the procedure for providing third party access during unexpected absence will be followed (see 5.5 above) Approval and Authority - Third Party Access during Unexpected Staff Absence Approval for third party access to another member of staff s , filestore or both mailbox and filestore, must be provided by the head of school or head of service for applications from within their respective domain. However, if a head of school requires personal third party access to the data of one of their staff, the application form must be authorised by the dean of faculty 4. In the event of a head of service or dean of faculty requiring third party access to the account of one of 4 If the dean of faculty is absent, applications can be approved by the Secretary to the University, or in his absence, the Deputy Secretary. Information Security Management 1.8 (09/05/15) Page 10 of 13

11 their staff, the application must be approved by the Secretary of the University, or in his absence, the Deputy Secretary. Following approval of the application the Director IT, or in his absence a member for the IT Senior Management Team, must provide written authority before IT staff provide the required access. Third party access to IT staff accounts can only be facilitated by IT staff when the application form has been signed by the Finance and Commercial Director, or in her absence, the Secretary to the University or the Deputy Secretary. Completed application forms will be retained by IT Username Administration for a period of two years and will be made available to auditors or the University s authorities on demand. The application form for requesting third party access to the account or filestore of an unexpectedly absent member of staff can be found here under Third Party Access Request Form Filestores and Accounts of DS and Admin Domain Users Access to Accounts of Former Employees - DS and Admin Domains When a school or department has a need to access the data of a former employee the respective head of school or head of service is to a request to the University IT Security Co-ordinator at it-security@lists.leeds.ac.uk which outlines the: Name of the account holder; type of account, for example mailbox or file store; period in question (date(s) or approximate date(s) of the s or files); subject of the data required; and reason why it is required. On receipt of a request the IT Security Co-ordinator will verify that the person making the request has the correct authority to do so (head of school/service) and confirm with Human Resources that the account holder has ceased University employment and that there are no known circumstances why the handing over of the account holder s data to the requester would be in conflict of interest. For example, that there is no legal action or tribunal pending between the account holder and the University. Providing that the request meets the required criteria, the IT Security Co-ordinator will task a member of the appropriate IT team to recover the required data and make it available is suitable format to the requestor. The member of IT staff tasked to recover the data will only recover data associated with the subject specified, by using a search facility, and will not include any data that appears to be of personal, private or confidential to the account holder. In circumstances where the full details of the required data are not known, the applicant or their representative will be provided with supervised access to the respective account within IT (by Information Security Management 1.8 (09/05/15) Page 11 of 13

12 appointment) and IT staff will transfer a copy of the data to the required account once verified that it is work-related Access to Staff Accounts and Archives on Systems outside the DS Domain Faculties, school and departments that manage their own systems outside the DS domain are to ensure that controls are applied to limit third party access to their users accounts in accordance with this Policy. The same control and accountability also applies to non-microsoft systems hosted by IT, and the same authorisation and approval mechanisms at Section 5.7 apply. A third party computer access request form is to be completed when: There are operational requirements for a member of staff to be granted access to another member of staff s folders and filestore during their unexpected absence; operational access is required to a former member of staff s data after they have ceased University employment and arrangements for another member of staff to access the data have not been made prior to the person leaving; or, a member of staff other than the account holder subsequently requires operational access to archived data and the original account holder is unavailable to grant permission. In the interests of ensuring consistent and transparent practice across the University, a copy of the form must be filed with IT Username Administration before access proceeds. Any third party access that is facilitated without fulfilling this requirement may be subject to formal investigation. If a head of school or department requires personal third party access to the data of one of their staff, the application form must be authorised by the dean of faculty or the Secretary to the University or the Deputy Secretary. Any such application by a dean also requires approval by the Secretary to the University or the Deputy Secretary. On signing a third party computer access request form, both the person who is to be provided with the access to another user s account, and those providing the authority are certifying that they have read and understood the conditions. A Third Party Access Request Form Filestore and Accounts of Non-DS Domain Users can be found here Third Party Restrictions Anyone who is granted operational access to another users' data may only view material that it is considered necessary to see for the operational reason for which access was granted. They are required to treat all material as confidential and not to act upon it or disclose it to any other person except those directly associated with the operational requirement for which the access was granted. In addition, they must preserve the confidentiality of any private or personal data that they may view inadvertently whilst undertaking operational matters. A failure to do so could constitute an offence under the terms of the Human Rights Act 2000 and result in legal action being taken against that individual. Information Security Management 1.8 (09/05/15) Page 12 of 13

13 On signing the Third Party Computer Account Access Form the person who is to be provided with the access to another users account is certifying that they have read and understood the requirements Control and Accountability of Student Accounts It is the responsibility of computer support staff in faculties and schools to ensure that their students are aware that their accounts may be accessed for both teaching and computer account management purposes. Ideally this notification should be given in writing at the start of each academic year. Access to students files must be restricted to bone-fide reasons, such as, investigating plagiarism or malpractice, providing access to a specific file for cover staff when a normal member of staff is unexpectedly absent, or to verify that existing work space is not being used for the storage of non-work related material where more disk space is requested. If there is any doubt as to whether access to a student s files is bone-fide, the head of the school is to be requested to provide the required authority. Any person viewing a student s accounts must do so in the presence of a second person e.g. a lecturer with a member of IT staff, or two IT staff. A written summary as to why this was done and what the outcomes were must be produced and a copy of this is to be given to the student as well as being kept on their file. 6. Dealing with Misuse, Abuse and Illegal Activity 6.1. Allegations All allegations of misuse, abuse or illegal activity are to be investigated in accordance with the Security Incident and Computer Misuse Policy Requests for Account Access by the Police and Law Enforcement Agencies All requests from the police and other law enforcement agencies for access to computer information or user accounts must be directed to the Secretary to the University or in his absence, the Deputy Secretary or University Legal Advisor in accordance with the Security Incident and Computer Misuse Policy. Information Security Management 1.8 (09/05/15) Page 13 of 13

Access Control Policy

Access Control Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

NEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE

NEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE 1. Scope and Purpose NEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE 1.1 Newman University [hereafter referred to as the University] recognises disciplinary rules and procedures are necessary for the

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

IT ACCESS CONTROL POLICY

IT ACCESS CONTROL POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Terms and Conditions of Use - Connectivity to MAGNET

Terms and Conditions of Use - Connectivity to MAGNET I, as the Client, declare to have read and accepted the terms and conditions set out below for the use of the network connectivity to the Malta Government Network (MAGNET) provided by the Malta Information

More information

SURE E-Mail Services Terms and Conditions SURE MAIL

SURE E-Mail Services Terms and Conditions SURE MAIL SURE E-Mail Services Terms and Conditions SURE MAIL Sure offers an E-mail service that allows access to a mailbox provided by a 3 rd party partner ( Service ). The Service is accessed via the internet.

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Sure Unlimited and Pro Broadband Service

Sure Unlimited and Pro Broadband Service Sure Unlimited and Pro Broadband Service SURE UNLIMITED AND PRO BROADBAND PRODUCT DESCRIPTION The Sure Unlimited and Pro Broadband services from Sure Jersey Limited are always-on Internet connections.

More information

Please read these Terms and Conditions of Use carefully. They govern the provision and use of the MyPAYE Online Payroll service and website.

Please read these Terms and Conditions of Use carefully. They govern the provision and use of the MyPAYE Online Payroll service and website. Terms and Conditions of Use Your online payroll is run via for MyPAYE Online Payroll Service Please read these Terms and Conditions of Use carefully. They govern the provision and use of the MyPAYE Online

More information

Commercial Online Banking

Commercial Online Banking These terms form the agreement between us, Metro Bank PLC and you, a business customer and apply to the Commercial Online Banking Service (Commercial Online Banking) provided by us. Commercial Online Banking

More information

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs

More information

Disciplinary Procedure

Disciplinary Procedure Disciplinary Procedure Human Resources 1 Introduction The University is committed to supporting its staff in carrying out their responsibilities within an environment which encourages productive, safe

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears.

Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears. Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES 1. Definitions In this regulation unless a contrary intention appears Authority means (i) in relation to the central facilities and computing and

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Terms & conditions for Starter and Professional Packs

Terms & conditions for Starter and Professional Packs Terms & conditions for Starter and Professional Packs This Service Schedule is in addition to the Conditions for BT Business Services and forms part of this Contract for BT Web Hosting Lite (available

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information

Information Technology Services

Information Technology Services Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

If you have any questions about any of our policies, please contact the Customer Services Team.

If you have any questions about any of our policies, please contact the Customer Services Team. Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting

More information

Account Management Standards

Account Management Standards Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information

More information

Email Policy For Staff and Students

Email Policy For Staff and Students Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management

More information

Human Resources People and Organisational Development. Disciplinary Procedure for Senior Staff

Human Resources People and Organisational Development. Disciplinary Procedure for Senior Staff Human Resources People and Organisational Development Disciplinary Procedure for Senior Staff AUGUST 2015 1. Introduction 1.1 This procedure applies to Senior Staff. Senior Staff includes: 1.1.1 the Vice-Chancellor

More information

Standard Operating Procedure. Authority to access and monitor University IT Account holder communications and data

Standard Operating Procedure. Authority to access and monitor University IT Account holder communications and data Standard Operating Procedure Title: Authority to access and monitor University IT Account holder communications and data Version: 2.0 Effective Date March 2016 Summary Describes the approval process and

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

Somerset County Council - Data Protection Policy - Final

Somerset County Council - Data Protection Policy - Final Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

Privacy and Cloud Computing for Australian Government Agencies

Privacy and Cloud Computing for Australian Government Agencies Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy

More information

Waterfront Auckland s Credit Card Policy

Waterfront Auckland s Credit Card Policy Waterfront Auckland s Credit Card Policy CONTENTS 1. Policy Statement 2. Background 3. Purpose and Scope 4. Principles and Strategic Alignment 5. Policy Definitions 6. Policy 6.1 Issue of Waterfront Auckland

More information

Remote Access Policy

Remote Access Policy BASINGSTOKE AND NORTH HAMPSHIRE NHS FOUNDATION TRUST Remote Access Policy Summary This is a new document which sets out the policy for remote access to the Trust s network and systems. Remote access is

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff

More information

LOCAL DISCIPLINARY PROCEDURE

LOCAL DISCIPLINARY PROCEDURE LOCAL DISCIPLINARY PROCEDURE 1 2 LOCAL DISCIPLINARY PROCEDURE 1. Introduction... 4 2. Aims and objectives... 4 3. The procedure... 4 4. Officers responsible for taking disciplinary action are as follows...

More information

College of Education Computer Network Security Policy

College of Education Computer Network Security Policy Introduction The College of Education Network Security Policy provides the operational detail required for the successful implementation of a safe and efficient computer network environment for the College

More information

Ticketmaster Installed Payment Plan

Ticketmaster Installed Payment Plan Account Manager Terms of Use Ticketmaster Installed Payment Plan Ticketmaster Australasia Pty Ltd ACN 089 258 837 ("Ticketmaster") as agent for the presenter is pleased to offer the Installed Payment Plan

More information

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution. Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

JOINT AGREEMENT ON GUIDANCE ON DISCIPLINARY PROCEDURES IN FURTHER EDUCATION COLLEGES

JOINT AGREEMENT ON GUIDANCE ON DISCIPLINARY PROCEDURES IN FURTHER EDUCATION COLLEGES JOINT AGREEMENT ON GUIDANCE ON DISCIPLINARY PROCEDURES IN FURTHER EDUCATION COLLEGES BETWEEN THE ASSOCIATION OF COLLEGES (AoC) AND ASSOCIATION FOR COLLEGE MANAGEMENT (ACM) ASSOCIATION OF TEACHERS & LECTURERS

More information

Use of the Internet and E-Mail Policy

Use of the Internet and E-Mail Policy Use of the Internet and E-Mail Policy This procedural documentsupersedes : Use of the Internet and E-Mail Policy CORP/EMP 16 v.4 Name and title of author/reviewer Samantha Francis HR Advisor Date revised

More information

Informatics Policy. Information Governance. Network Account and Password Management Policy

Informatics Policy. Information Governance. Network Account and Password Management Policy Informatics Policy Information Governance Policy Ref: 3589 Document Title Author/Contact Document Reference 3589 Document Control Network Account Management and Password Policy Pauline Nordoff-Tate, Information

More information

MANAGEMENT OF USER ACCOUNTS AND PASSWORD POLICY AUGUST 2011. Version 2.0

MANAGEMENT OF USER ACCOUNTS AND PASSWORD POLICY AUGUST 2011. Version 2.0 MANAGEMENT OF USER ACCOUNTS AND PASSWORD POLICY AUGUST 2011 Version 2.0 Western Health and Social Care Trust Page 0 of 6 Management of User Accounts Policy Policy Title MANAGEMENT OF USER ACCOUNTS AND

More information

Summary Electronic Information Security Policy

Summary Electronic Information Security Policy University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture

More information

Internet Services Terms and Conditions

Internet Services Terms and Conditions Internet Services Terms and Conditions 1. These terms and conditions These General Terms and Conditions apply to you if you are a business or residential telecommunications customer of Telnet Telecommunication

More information

E-mail Usage Policy of GCRI

E-mail Usage Policy of GCRI E-mail Usage Policy of GCRI AIM : Email Account Management and Best Practices for Effective E-mail Usage and to promote awareness of the benefits of a paperless communication system VER : Version 1.0 Date

More information

ECSA EuroCloud Star Audit Data Privacy Audit Guide

ECSA EuroCloud Star Audit Data Privacy Audit Guide ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:

More information

Software compliance policy

Software compliance policy Software compliance policy Name of policy, procedure or regulation Software compliance policy Purpose of policy, procedure or regulation To provide a coordinated approach to software asset management Who

More information

CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number 95.51 PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9.

CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number 95.51 PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9. 95.5 of 9. PURPOSE.. To establish a policy that outlines the requirements for compliance to the Payment Card Industry Data Security Standards (PCI-DSS). Compliance with this standard is a condition of

More information

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

NETHERAVON ALL SAINTS CE PRIMARY SCHOOL

NETHERAVON ALL SAINTS CE PRIMARY SCHOOL NETHERAVON ALL SAINTS CE PRIMARY SCHOOL DISCIPLINARY PROCEDURE FOR ACADEMY TEACHING AND SUPPORT STAFF Adopted by Netheravon All Saints Academy Trust on 23/9/15 Signed (Chair of Governors): 1 Index Section

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

Identity Cards Act 2006

Identity Cards Act 2006 Identity Cards Act 2006 CHAPTER 15 Explanatory Notes have been produced to assist in the understanding of this Act and are available separately 6 50 Identity Cards Act 2006 CHAPTER 15 CONTENTS Registration

More information

Document 12. Open Awards Malpractice and Maladministration Policy and Procedures

Document 12. Open Awards Malpractice and Maladministration Policy and Procedures Open Awards Malpractice and Maladministration Policy and Procedures Page 1 of 14 Open Awards Malpractice and Maladministration Policy and Procedures Policy Statement Open Awards is committed to ensuring

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

Cellular/Smart Phone Use Procedure

Cellular/Smart Phone Use Procedure Number 1. Purpose This procedure is performed as a means of ensuring the safe and efficient use of cell/smart phones throughout West Coast District Health Board (WCDHB) facilities. 2. Application This

More information

Human Resources Policy documents. Data Protection Policy

Human Resources Policy documents. Data Protection Policy Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and

More information

Information Circular

Information Circular Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

COUNCIL POLICY R180 RECORDS MANAGEMENT

COUNCIL POLICY R180 RECORDS MANAGEMENT 1. Scope The City of Mount Gambier Records Management Policy provides the policy framework for Council to effectively fulfil its obligations and statutory requirements under the State Records Act 1997.

More information

Date Amendments/Actions Next Compulsory Review Date

Date Amendments/Actions Next Compulsory Review Date CTC KINGSHURST ACADEMY STAFF DISCIPLINARY POLICY AND PROCEDURE POLICY REFERENCE: POL017S Policy History Policy Ref & Version Date Amendments/Actions Next Compulsory Review Date POL017S V1.0 1 st September

More information

Academic Institution Licence for Perpetual Access to the Global Health Archive Database

Academic Institution Licence for Perpetual Access to the Global Health Archive Database Academic Institution Licence for Perpetual Access to the Global Health Archive Database THIS LICENCE IS AGREED the day of 200_ BETWEEN CAB International with offices at Nosworthy Way, Wallingford, Oxon

More information

Disciplinary Policy and Procedure

Disciplinary Policy and Procedure Disciplinary Policy and Procedure Policy 1. Purpose of the policy and procedure Disciplinary rules are important for the running of the University so that everyone understands what is expected of them

More information

Use of Exchange Mail and Diary Service Code of Practice

Use of Exchange Mail and Diary Service Code of Practice Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014 Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology

More information

Unsolicited visits and surprise requests for information by the Financial Services Authority. April 2009

Unsolicited visits and surprise requests for information by the Financial Services Authority. April 2009 Unsolicited visits and surprise requests for information by the Financial Services Authority April 2009 Contents 1. Introduction 1 2. The FSA s investigatory powers 2 3. Confidentiality of information

More information

Service Schedule for Business Email Lite powered by Microsoft Office 365

Service Schedule for Business Email Lite powered by Microsoft Office 365 Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft

More information

USE OF PERSONAL MOBILE DEVICES POLICY

USE OF PERSONAL MOBILE DEVICES POLICY Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014

More information

G3 Group Limited. Financial Products Trading Policy and Guidelines. Date adopted: 1 April 2015 Version: 1. 1 P a g e

G3 Group Limited. Financial Products Trading Policy and Guidelines. Date adopted: 1 April 2015 Version: 1. 1 P a g e G3 Group Limited Financial Products Trading Policy and Guidelines Date adopted: 1 April 2015 Version: 1 1 P a g e G3 Group Limited Securities Trading Policy and Guidelines Scope of Policy This G3 Group

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

Data Protection Breach Management Policy

Data Protection Breach Management Policy Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

Chicago State University Computer Usage Policy

Chicago State University Computer Usage Policy Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

Central Bedfordshire Council. IT Acceptable Use Policy. Version 1.7 January 2016 Not Protected. Not Protected Page 1 of 11

Central Bedfordshire Council. IT Acceptable Use Policy. Version 1.7 January 2016 Not Protected. Not Protected Page 1 of 11 Central Bedfordshire Council IT Acceptable Use Policy Version 1.7 January 2016 Not Protected Not Protected Page 1 of 11 Policy Approval Central Bedfordshire Council acknowledges that information is a valuable

More information

1. Scope of application

1. Scope of application Terms and conditions for electronic communication 1. Scope of application These terms and conditions apply to electronic communication undertaken by the Customer or the User using ebanking or telephone

More information

USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY

USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY CONDITIONS OF USE FOR ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY Between: the Commonwealth of Australia, acting

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

EXECUTIVE DECISION NOTICE. ICT, Communications and Media. Councillor John Taylor. Deputy Executive Leader

EXECUTIVE DECISION NOTICE. ICT, Communications and Media. Councillor John Taylor. Deputy Executive Leader EXECUTIVE DECISION NOTICE SERVICE AREA: SUBJECT MATTER: DECISION: DECISION TAKER(S): DESIGNATION OF DECISION TAKER(S): GOVERNANCE ICT, Communications and Media PERSONAL DEVICE POLICY That the Personal

More information

By Directors, Officers and Employees of Hellaby Holdings Limited and its Subsidiaries ( The Company )

By Directors, Officers and Employees of Hellaby Holdings Limited and its Subsidiaries ( The Company ) Code of Conduct for Securities Trading ( Code ) By Directors, Officers and Employees of Hellaby Holdings Limited and its Subsidiaries ( The Company ) Approved by the Board: 10 May 2013 1. Introduction

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information