STATE OF WYOMING Electronic Mail Policy
|
|
|
- Baldwin Smith
- 10 years ago
- Views:
Transcription
1 Introduction: STATE OF WYOMING Electronic Mail Policy Pursuant to Executive Order dated the 23rd of December, 1999 Electronic mail ( ) enables the user to send and receive messages, make appointments, or coordinate work schedules rapidly and efficiently. The advantages of e- mail have caused a rapid growth in the use of this technology. With the rapid expansion of throughout Wyoming State agencies, more data are being transmitted between employees without the use of traditional paper documents. This trend increases the possibility of State records being lost before completing their retention cycle, and the messages being subpoenaed for use in litigation. Records contained within the system need to be identified and controlled in the same manner as any other record. This policy shall apply to all State of Wyoming employees whether full-time, part-time, or contract as well as all individuals contracted to perform work for the State. Each agency may develop its own policy provided that, at a minimum, all provisions set forth in this policy are contained in its policy. In such a case, the agency s policy shall take precedence over this policy. Users are cautioned that the use of and attachments thereto may create the need to preserve other forms of data, such as graphics files, digital photographs, sound or wave files and video clips. When using these data forms in conjunction with the system, please consult your agency s policies or computer specialist for advice on the use and preservation of such data. Public records, including those created in , are the property of the State of Wyoming. W.S defines public records for the purposes of those records available for public inspection. W.S defines public records for purposes of management of public records by the Department of State Parks and Cultural Resources. General Notice: A. Electronic mail is an electronic file which is transmitted to other computer users. When transmitted to a recipient, electronic mail may create the sender's electronic file in the recipient's computer system. Deleting electronic mail does not ensure erasure of all copies of the file. Copies of deleted files may be stored remotely for long periods of time, and can be accessed and disclosed. Therefore, employees should not expect their electronic communications to be private, and should not use electronic mail for communications not intended for disclosure to third parties. Although the contents of business-related electronic mail are subject to the same rules of legal privilege as other forms of communication and recordkeeping, employees should treat the electronic mail system as a shared file
2 system, with the expectation that messages sent, received or stored in the system (including individual hard disks) may be subject to access, monitoring and disclosure. Employees should be aware that documents created and sent by electronic mail for official business or as evidence of official acts may constitute official records of the State. B. Nothing in this policy should be construed to waive any claim of privilege or confidentiality for the contents of electronic mail available to the State or to require public disclosure of electronic communications. Definitions: Record: Public records under Wyo. Stat (a)(v) includes... the original and all copies of any paper, correspondence, form, book, photograph, photostat, film, microfilm, sound recording, map, drawing or other document, regardless of physical form or characteristics, that have been made by the State of Wyoming... and by any agencies of the State... or received by them in connection with the transaction of public business, except those privileged or confidential by law. Wyo. Stat also defines public records for purposes of management of public records by the Department of State Parks and Cultural Resources. The definitions are essentially similar, except that W.S does not exclude information privileged or confidential by law. Thus, the Department of State Parks and Cultural Resources may store confidential or privileged information. The Department, however, does not make these confidential documents available to the public. See W.S System: A program designed to create, send, receive, and store messages and other data transmitted electronically between individual users and/or groups of users. File transfer programs are not included in this definition is the electronic transmission of messages and documents. A message may be transmitted within an agency, between agencies of the State or to a destination outside the state system. An message could be a short note or announcement or longer, more formal writing and may include various attachments. An attachment is added electronic data, such as a word processing file, not contained in the main body of the document. General Considerations for Use of 1. Messaging system not a storage system. The State s system is designed for communication by written message. It is not and should not be used as a document storage or management system. 2. Official Business. The State s systems are for official business. All messages sent or received on the system are the property of the State of Wyoming. 3. Expectation of Privacy. Employees should not expect messages in their basic form to be private. is not immune from unauthorized interception, therefore agencies should consider encryption of sensitive information or consider alternative means of communication. Because materials and communications
3 privileged or confidential by law are not included within the definition of public records set out in the Public Records Act (W.S through ), each agency must have a plan for separating out confidential material sent by , or have a policy that confidential materials and communications will not be sent through this medium. Users should never place any data on the system that they would not want to appear on television or in newspapers. 4. Account. accounts, and the messages contained within these accounts, are important to the business functions of an individual State agency. As such, the messages and accounts are the property of the State of Wyoming and will be managed by individual agencies. In the event of any employee termination or interagency transfer, the employee s account shall remain with the originating agency. All messages may be reviewed and redirected to the employee s successor or otherwise purged of agency-specific content as appropriate. 5. Improper uses. The use of the system to transmit data which is disparaging or harassing to individuals or groups will not be tolerated. Types of data include: writings, drawings or any other form that is degrading or harassing to others based on, but not limited to, race, age, origin, sex, disability, religion or political beliefs, including jokes. may not be used for personal commercial ventures, religious or political causes, endorsement of candidates, or outside organizations. 6. Security. To ensure system integrity and security, each individual must protect his system password from disclosure to others. Passwords should be changed frequently. It is suggested that passwords be constructed of alphanumeric characters that are not recognizable words or patterns. 7. Copies and dissemination. can be copied and forwarded to numerous individuals. Copies of an may be retained by persons unknown to the author long after the intended function has been completed. Both recipients and transmitters need to protect data sent on the system from unauthorized alteration and deletion. 8. Copyright violations. The ability of various systems to include attachments enables the users to forward additional data to other users. The ease of transmitting attachments places the burden of protecting copyrighted material on the transmitter. Protection of copyrights requires the user to make, to the greatest degree possible, a determination of authorship of any data utilized. All copyright laws apply equally to systems. Crimes against intellectual property in Wyoming are defined by W.S Etiquette. Use of etiquette should be observed at all times. Employees represent the State of Wyoming and should act in a professional manner at all times. 10. Viruses and . Simply reading a text based can spread a virus to your computer. This is a relatively new development. Viruses can also be hidden in attachments to mail messages. There is risk from opening attached files to the e- mail message, especially executable files. In addition, other types of file attachments can pose a risk, such as MS-Word documents, Excel spreadsheets, and similar files used by applications that use macros, because these files can be infected with a macro virus. If you receive any unsolicited from unknown
4 sources or untrusted documents or executable programs via an attachment, the file should be saved to the local hard drive and scanned with an anti-virus scanning product (with the latest virus signatures or definitions installed) before the file is opened or run. The MIS person should be contacted for assistance. Be aware that this is not an absolute guarantee that the contents of the file are safe, but it will check for any viruses or malicious code that the scanning software can detect. If there is any doubt (especially if the was sent from an unknown source), deleting unsolicited messages with all attached files is the safest thing to do. Users are requested not to spread unconfirmed warnings about viruses. If you receive an unvalidated warning, do not pass it to others; pass it to your systems administrator to validate first. Access to State System: Employees only. Employees of the State are granted access to the system to carry out their assigned duties. System privileges to non-employees shall be granted only with approval of the agency director or his designee. Access to the e- mail system may be terminated at any time if it has been determined access is no longer needed or there has been abuse of the system. If an agency s policies include retention of electronic records, information contained in an system must remain accessible for reference, as required by the retention guidelines in those policies. To remain accessible, the electronic data must be migrated to new software and storage media as updates occur. Disclosure of All that resides on the message server, on any file server, or on any individual's workstation belongs to the State of Wyoming. The State reserves the right to inspect e- mail at any time. Inspection of is limited to the following entities: State/Agency: Immediate supervisor, division management, agency director, Attorney General, including the Department of Criminal Investigation, or as otherwise statutorily authorized. The Attorney General s access to records of the Public Defender s Office may be subject to common law or statutory privilege. Non-State: Anyone with proper judicial approval Anyone requesting to see certain public records pursuant to the Public Records Act
5 1. Litigation and discovery of public records. Any public record (under the definition of public record in W.S , which specifically excludes information privileged or confidential by law) is subject to discovery requests as part of a legal proceeding. Some confidential data might also be subject to discovery, usually with a court order. Discovery can include all data in , including all archived that may pertain to the particular court case. Therefore, it is incumbent upon system users to manage their data in accordance with an approved record retention schedule. Users should purge from the system as soon as its purpose has been served. It is also incumbent upon system users, if confidential communications or information is sent by , to have a system for separating confidential or privileged information from public information. 2. Inspection of public records. Any person may inspect public records at reasonable times subject to any regulation, rule, or exception contained in or allowed by W.S through and W.S If you have questions regarding the inspection of records, contact your Assistant Attorney General. 3. Requests for . Requests to inspect documents should be referred to the agency director. The agency director or his designee should determine, with consultation of the Attorney General s Office if appropriate, if inspection is appropriate and how best to fulfill the inspection request. 4. One week backup only. Each agency may establish its own backup policy, but it is recommended that backup of systems should be for disaster recovery and should be retained no longer than one week. Any requests to inspect backup records should go through the agency director or his designee for processing. Retention of Public Records Created as 5. Types of . , like word processing, is a medium, not a record type. The records are the various documents that are created, sent, and received through the e- mail system. Records in the system should remain in that application for only a short time. documents can be non-records, time limited records, permanent/archival records, or confidential records. 6. Non-record . Non-record messages are created primarily for the communication of information which does not set policy, establish guidelines or procedures, certify a transaction, or become a receipt, and that have no enduring value. Since this type of message is informal, it could be compared to, but not limited to, personal messages, duplicate documents, telephone call notices, scheduled meetings reminders, or other temporary information. This type of message is short lived and should be deleted as soon as its purpose has been completed. 7. Time limited records created as . Time limited records are those which have a legal or administrative value, but are not permanent. records of this classification must be maintained in a usable format in accordance with the agency s retention policy. The forms in which these records are maintained may be hard copy printout, microfilm or may be electronically generated. Internal procedures and system design should protect against document alteration, identify other records related to the same subject, and provide for regular, scheduled disposition. Should a file be identified as a time limited record but not listed in the retention schedule, agencies should contact the
6 State Archives, Records Management Unit, phone for assistance in obtaining disposition authority. 8. Permanent records created as . Permanent/Archival records are those records having legal, administrative or historical value which must be retained indefinitely. These records must be preserved in a medium that can be used by future generations. Since there are no national standards for permanency of the electronic medium on which is maintained and since that medium is not considered permanent, these electronic records are not considered acceptable for permanent record storage. It is recognized that there are constant changes in technology. If or when standards for permanence of become a reality, and the medium is judged permanent, this policy will be re-evaluated and appropriate changes will be made. records appraised as permanent must be converted to paper, microfilm, or another acceptable medium for permanent record retention. 9. Preservation of sender, recipient and date information. that is identified as a record must at a minimum contain the senders, recipients, and time/date of transmission or receipt. 10. Electronic calendar records. Although not directly an e- mail function, many e- mail software packages provide calendaring capabilities. Offices using the calendaring feature to document affected agency public hearings or regulatory meetings must retain calendar records for the period of time identified in the State of Wyoming General Schedules Executive Branch or as specified by a separate retention schedule. 11. Retention schedules. If a retention schedule needs to be developed, contact the State Archives, Records Management Unit, phone for assistance. 12. Retention of digital data. Public records may include digital data such as graphics files, digital photographs, sound or wave files and video clips. If appropriate, such digital data may need to be preserved or converted to hard copy for retention purposes.
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
EFFECTIVE DATE: JULY 1, 2010
Town of Florence POLICY TITLE: EMAIL RETENTION POLICY RESPONSIBLE DEPARTMENT: Town Clerk Office APPROVAL: EFFECTIVE DATE: JULY 1, 2010 AP / RESOLUTION NO.: 2010-02 REFERENCES: TOWN MANAGER SIGNATURE: TOWN
Village of Hastings-on-Hudson Electronic Policy. Internal and External Email Policies and Procedures
Village of Hastings-on-Hudson Electronic Policy Internal and External Email Policies and Procedures Effective February 2012 1 1. Table of Contents 1. General Policies... 3 1.1 Establishment and upkeep
2.82.010 Government records findings--recognition of public policy.
Chapter 2.82 RECORDS MANAGEMENT 2.82.010 Government records findings--recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake County
Chapter 2.82 - RECORDS MANAGEMENT Sections:
Chapter 82 - RECORDS MANAGEMENT Sections: 8010 - Government records findings Recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS
POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS 1. Purpose Establish and clarify a records management policy for municipal officers with respect
COLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
Guidelines. Managing E-mail Records. Office of the Secretary of State. Approved and Recommended by the State Records Commission February 22, 2001
Guidelines Managing E-mail Records Approved and Recommended by the State Records Commission February 22, 2001 Office of the Secretary of State Introduction Most everyone would agree that e-mail has changed
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
State of Montana E-Mail Guidelines
State of Montana E-Mail Guidelines A Management Guide for the Retention of E-Mail Records for Montana State Government Published by the: Montana State Records Committee Helena, Montana September 2006 Based,
Electronic Records Management Guidelines
Electronic Records Management Guidelines I. Objectives The employees of the Fort Bend Independent School District (the District ) routinely create, use, and manage information electronically in their daily
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
How To Preserve Email Records In Mississippi
EMAIL MANAGEMENT GUIDELINES FOR COUNTIES AND MUNICIPALITIES 1. Purpose The purpose of these guidelines is to ensure that the electronic mail records of county and municipal government officials and employees
La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy
LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology
Preservation and Production of Electronic Records
Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces
Table of Contents. Chapter No. 1. Introduction 1. 2. Objective 1. 3. E-mail Use Compliance 1. 4. Definitions 2. 5. Roles and Responsibilities 2
Table of Contents Chapter Subject Page No. 1. Introduction 1 2. Objective 1 3. E-mail Use Compliance 1 4. Definitions 2 5. Roles and Responsibilities 2 6. Creation and Use of E-mails 3 7. Managing E-mails
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network
Arizona State Library, Archives and Public Records
Arizona State Library, Archives and Public Records RECORDS MANAGEMENT DIVISION 1919 West Jefferson Phoenix, Arizona 85009 (602) 542-3741 Managing Public Records Sent and Received Via Electronic Mail These
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
Department of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE
Department of Homeland Security Management Directives System MD Number: 4500.1 Issue Date: 03/01/2003 DHS E-MAIL USAGE I. Purpose This directive establishes Department of Homeland Security (DHS) policy
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
All Users of DCRI Computing Equipment and Network Resources
July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform
Commonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
Electronic Records Management Guidelines
Electronic Records Management Guidelines Contents Section 1: Authority... 1 Section 2: Purpose and Scope... 1 Section 3: Records Custodian Responsibilities... 2 Section 4: Information Systems that produce,
COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9
ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY
DOC. T99-061 Passed by the BoT 8/4/99 UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY The President of the University shall adopt guidelines to require that each campus
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention
State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
Administrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
Union County. Electronic Records and Document Imaging Policy
Union County Electronic Records and Document Imaging Policy Adopted by the Union County Board of Commissioners December 2, 2013 1 Table of Contents 1. Purpose... 3 2. Responsible Parties... 3 3. Availability
------------------- COMPUTER NETWORK AGREEMENT FORM
COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
39C-1 Records Management Program 39C-3
39C-1 Records Management Program 39C-3 Sec. 39C-1. Sec. 39C-2. Sec. 39C-3. Sec. 39C-4. Sec. 39C-5. Sec. 39C-6. Sec. 39C-7. Sec. 39C-8. Sec. 39C-9. Sec. 39C-10. Sec. 39C-11. Sec. 39C-12. Sec. 39C-13. Sec.
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) The Middletown City School District provides an electronic communications network that allows District-authorized individuals internal access
Policy Description: Use of Internet, Email, and Other IT Resources Policy Policy No: ODT IT 001. Pages: 9 Pages
Policy Description: Use of Internet, Email, and Other IT Resources Policy Policy No: ODT IT 001 Authorities: Ohio IT Policy ITP E.8 ODT HR - 011 ODT HR 015 IRS Publication 1075 Divisions With Primary Responsibility:
Sample Policies for Internet Use, Email and Computer Screensavers
Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies
1. Each employee is responsible for managing college records in a responsible and professional manner.
Policy O-6.2 Approved By: College Executive Team Approval Date: February 26, 2003 Amendment Date: November 25, 2009 Policy Holder: VP Administration & CFO Purpose / Rationale RECORD MANAGEMENT The purpose
Valdosta State University. Information Resources Acceptable Use Policy
Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE
E-MAIL RETENTION BEST PRACTICE. Issue Date: April 20, 2011. Intent and Purpose:
E-MAIL RETENTION BEST PRACTICE Issue Date: April 20, 2011 Intent and Purpose: The intent of this best practice is for county officials to have an educational mechanism to explain requirements for maintaining
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Network Usage Guidelines Contents
Network Usage Guidelines Contents Network Usage...2 Peer to Peer and File Sharing...2 Servers or Server Technologies...2 Routers...2 Wireless...2 Network Storage...2 Security and Privacy...3 Security...3
Practice Resource. Sample internet and email use policy. Foreword. Policy scope. By David J. Bilinsky 1
Practice Resource Sample internet and email use policy By David J. Bilinsky 1 Foreword Use of email and the Internet can result in a huge productivity increase for a law practice. Through email, lawyers
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009
State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN January 2010 December 2012 DECEMBER 31, 2009 Florida Department of State State Library and Archives of Florida 850.245.6750 http://dlis.dos.state.fl.us/recordsmanagers
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Email Policy For Staff and Students
Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management
ACCESS, PRODUCTION AND RETENTION OF CITY RECORDS
1.05-3 1 of 6 I. PURPOSE This directive prescribes the rules regarding access, production, and retention of City records. II. POLICY A. All records and other matters in City offices are presumed to be
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
Applicability: All Employees Effective Date: December 6, 2005; revised January 27, 2009 Source(s):
Title: Category: Administration Information Management Policy No.: B5010 Replaces: B5010 Applicability: All Employees Effective Date: December 6, 2005; revised January 27, 2009 Source(s): Approval: (President
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources
Southern Law Center Law Center Policy #IT0014 Title: Privacy Expectations for SULC Computing Resources Authority: Department Original Adoption: 5/7/2007 Effective Date: 5/7/2007 Last Revision: 9/17/2012
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of
Data Compliance. And. Your Obligations
Information Booklet Data Compliance And Your Obligations What is Data Protection? It is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection
FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY
FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY Effective August 24, 2004 Overview: The Fresno County Employees Retirement Association (FCERA) provides access to the Internet
CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006)
CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006) WHAT IS THE PURPOSE OF RECORDS MANAGEMENT? 1. To implement a cost-effective Department-wide program that provides for adequate and proper documentation
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
