2.2 Access to ICT resources at the Belfast Metropolitan College is a privilege, not a right, and all users must act honestly and responsibly.

Size: px
Start display at page:

Download "2.2 Access to ICT resources at the Belfast Metropolitan College is a privilege, not a right, and all users must act honestly and responsibly."

Transcription

1 1 Purpose The purpose of this document is to set out the College's policy and provide guidance relating to the responsible use of the College's ICT resources and systems. 2 General 2.1 Belfast Metropolitan College strives to provide computer access for its staff, students and administrators to local, national and international sources of information and encourages an atmosphere that supports the sharing of knowledge, the sharing of resources, and assists the creative process of learning. 2.2 Access to ICT resources at the Belfast Metropolitan College is a privilege, not a right, and all users must act honestly and responsibly. 2.3 All users are responsible for the integrity of these ICT resources. They must respect the rights of other computer users, respect the integrity of physical facilities and controls, and respect all licence and contractual agreements related to College ICT systems. All users must act in accordance with these responsibilities, and the relevant local, national and international laws. 2.4 The College will deploy software to block access to offensive and pornographic material on the Internet from all sites that it knows about. These sites constantly change and it cannot guarantee to block access to all such sites at any one time. 2.5 The College takes no responsibility for the accuracy of information obtained from the Internet. Any person accessing information through the use of College ICT resources must determine for themselves whether the accessed information is appropriate for use. 2.6 The College will restrict or prohibit the use of its resources in response to violations of College policies or laws. When it has been determined that there has been a violation, the College will remove or limit access to ICT resources and material posted on College-owned computers or networks. 2.7 Users who do not comply with College policies will be denied access to College ICT resources. If warranted other disciplinary action will also be taken. 2.8 All staff accepting a user account shall be issued with a copy of the Belfast Metropolitan College and Internet Policy and Procedure Appendix 3). They will be required to accept the policy electronically on first logon. 2.9 All students accepting a user account shall be issued with a copy of the Belfast Metropolitan College ICT security policy and procedures - Summary for Students (Appendix 4) Accepting a user account and / or using the College's computer resources shall constitute an agreement on behalf of the user to abide and be bound by the provisions of this policy Comments or questions regarding this document, or reports of security violations should be sent by to the IT and Network services manager: 3 Definitions 3.1 For the purposes of this policy the following definitions shall apply:

2 "ICT" shall mean Information Communications Technology" Users shall mean the following groups: a. Academic, administration and support staff b. Currently enrolled students "Electronic communications" shall mean and include the use of information systems for communicating or posting of information or material by way of electronic mail, bulletin boards, World Wide Web (Internet), or other such electronic tools. "ICT resources" shall mean and include computers, networks, servers and other similar devices that are administered by the College and for which the College is responsible. "Networks" shall mean and include video, voice and data networks, routers, switches and storage devices. "Obscene material" shall mean that a. An average person applying reasonable standards would find the material offensive b. The material taken as a whole lacks serious literary, artistic, political, or scientific value. "Workstation" shall mean any device attached to the College network for the purpose of accessing, transmitting or storing data. 4 Permitted Use and Prohibited Use 4.1 Belfast Metropolitan College ICT systems are only to be used for College related purposes. Limited personal use outside working hours is acceptable. 4.2 Personal use of College ICT systems resources or equipment by any user for personal financial gain in conjunction with outside business or employment is prohibited except as described in 4.3 below. 4.3 Employee personal use in conjunction with outside professional, business or employment activities is only permitted when such use has been expressly authorised and approved by the Director. 4.4 Use of any College ICT system to access, download, print, store, forward, transmit or distribute obscene or pornographic material is prohibited. 5 Access 5.1 All currently enrolled students can have access to ICT resources but may be asked at any time to produce a valid student card. Failure to do so will result in the individual being denied access to resources. 5.2 All employees of Belfast Metropolitan College are entitled to access the College computer network. The procedure for establishing user accounts and passwords is described in the Computer and Network Security Procedures (Appendix 1). All staff accepting a user account shall be issued with a copy of the Belfast Metropolitan College and Internet Policy and Procedure Appendix 3). Staff will be required to accept the terms of the Acceptable User Policy incorporating the above Policy on first logon. Accepting a user account and / or using the

3 College's ICT resources shall constitute an agreement on behalf of the user to abide and be bound by the provisions of this policy 5.3 While the use of information and communication technologies is a required aspect of the College's academic programmes, access to the College ICT systems remains a privilege and not a right. It is given to students and staff who act in a considerate and responsible manner, and shall be withdrawn from those failing to maintain acceptable standards of use. 5.4 When any user terminates his or her relationship with the College, their ID and password shall be removed so as to deny further access to College ICT resources. 5.5 User accounts which have been inactive for a period of 6 months shall be removed from the system at the discretion of the IT and Network services manager. 6 Procedures for Use 6.1 Where user names and/or passwords are in place to provide authorised access, the sharing of these user names and/or passwords with any other individual is prohibited. 6.2 Prior to leaving their workstation unattended, users must ensure they are logged out from the network. 6.3 Users are to only access accounts to which they have been authorised. 6.4 Each user will be responsible for maintenance of files on their account. It is necessary for the user to review various documents that exist and remove those that are no longer required to make best use of storage space. 6.5 No person shall jeopardise the integrity of the ICT resources, its operating programs or other stored information. Lack of system protection to the resources does not constitute permission to use it. 6.6 Students may not install software on to the hard drives or any of the ICT networks. 6.7 Users must immediately report suspected unauthorised use of accounts to their lecturer or to the IT Services Staff. 6.8 Academic staff may request access to a student s directories and files for the purpose of assessing progress of and/or marking their student assignments. 6.9 All users must exercise appropriate measures to maintain the confidentially and integrity of any information of a confidential nature acquired through ICT access. 7 Copyright 7.1 All software, in any medium, is protected under National and International Copyright Law. College agreements with the Copyright Licensing Authority (CLA) currently do not apply to material in electronic or digital format. The College has a responsibility to protect against the improper use or illegal copying of software. For guidance on the use of electronic material refer to Appendix Only members of the College IT Services staff are permitted to install software on College machines. Procedures to request software installation are outlined in Appendix I.

4 7.3 The College has a standard set of software for each machine. This must not be changed in any way (including screen savers). 7.4 All copies of software owned by the College must contain a label indicating that the software is the property of the Belfast Metropolitan College. 7.5 IT Services Staff will not install any software onto any College workstation unless a valid licence for the software is provided or the staff member is aware that the software license is legal for this machine. 7.6 The copyright of software, learning materials and other computer programmes produced by College staff on College equipment during working hours, belongs to the College and should be marked accordingly. 7.7 Once IT Services Staff have reason to believe that the copyright laws are being violated, they must request verification of a valid software licence for the software on the workstation. If it cannot be produced, then the software will be removed until the situation can be resolved. In order to protect the College the software may be removed first, without warning. 8 Acceptable Use. 8.1 The College believes that computing resources should be available on as wide a basis as possible, and should be used for the purpose of College business and related activities. 8.2 All users must respect the rights of other computer users, respect the integrity of physical facilities and controls, and respect all licence and contractual agreements related to College ICT systems. 8.3 Examples of acceptable use include: Communication between colleagues, between students and lecturers, between students and students, and between the College and other colleges, businesses and government agencies. Production of papers, portfolios and assignments; Research and investigation of topics; Storage and retrieval of information Development of competence in ICT and general research skills. Investigation of career and progression opportunities for College students. Use of the and internet as set out in the and Internet policy (Appendix 3) 9 Unacceptable use. 9.1 It is important to note that in an educational facility users are learning as they work and errors occur which may cause system disruption. Ordinary errors of this type are beyond the scope of inappropriate use. For example a poorly written computer programme is not necessarily a violation. It may be an accident. The intent of the user is the critical point. 9.2 Misuse of College ICT systems is prohibited. Specific examples of misuse include, but are not limited to the following:

5 Using ICT systems for any unauthorised purpose. Copying licensed software from workstations is considered theft. Intentionally wasting resources (such as on line time and consumables) Circumventing, or attempting to circumvent logon, filtering and other security measures Erasing or changing another user's files or ICT environment without the users permission. 'Mail bombing' someone with a deluge of unsolicited messages. The content of the messages is irrelevant; it is the intent to inhibit productivity or damage a user's environment that is of issue here. Adding unauthorised software to a College resource is not permitted. The intent of this statement is largely to maintain a stable environment for users. Adding a game, for example is unacceptable. Adding a statistical package is also unacceptable because it also can disrupt the operation of the workstation for others. Intentionally modifying workstation interfaces (the look of the screen) so that the machine becomes difficult or impossible to use. For example, removing programs or scrambling the icons on a Windows, Macintosh (etc.) machine. Unauthorised use of College facilities, including buildings, grounds and equipment. Computing facilities are only for the use of Belfast Metropolitan College student, and staff as well as visitors who have applied for access. Use of the facility by an unauthorised individuals. For example, you may not permit other students to use your ID card or your password to use College facilities. User accounts and IDs are not to be shared. Trespassing in another user's folders, work or files. Accessing, downloading or ing obscene or damaging material using the College computer network. 9.3 Grave misuse of computing facilities will lead to implementation of disciplinary action as outlined in section 13 below. Examples of grave misuse include, but are not limited to: Intentionally crashing a server, network or printer or intentionally making them difficult to access or use. Using Belfast Metropolitan College ICT systems for any illegal purpose. Copying licensed software from workstations. Circumventing logon, filtering and other security measures with the intention of accessing or altering private information or disabling or disrupting the Network. Deliberately launching a rogue computer programme, computer virus or other destructive software element. The use of Belfast Metropolitan College ICT facilities to harass or threaten other individuals or organisations.

6 Broadcasting, transporting or posting illegal, obscene or damaging material to a College or computer or network or to other systems anywhere in the world. The use of Belfast Metropolitan College ICT facilities to attack other systems at Belfast Metropolitan College or anywhere in the world (the Internet or any associated network or personal computer) Intentionally acquiring privileges or rights in a system which are normally beyond the scope of the user; for whatever purpose. acquiring files for the purpose of using them or reading them when it is clear that the file(s) were intended to be erased. Some systems cannot absolutely guarantee that files are destroyed once deleted and the intentional recovery of someone else's deleted files is construed to be unauthorised access and a violation of rights of privacy. Academic dishonesty. 10 User Privacy A user can expect the files and data he or she generates to be private information, unless the creator of the file or data takes action to reveal it to others. However, no information system is completely secure and persons both within and outside the College may find ways to access files. Accordingly the College cannot and does not guarantee user privacy and users should be continuously aware of this fact Duly authorised College IT Services Staff have the authority to access individual user files or data in the process of repair or maintenance of ICT equipment If a user is suspected of using ICT resources to contravene elements of this policy then data files and electronic communications may be monitored, upon the authorisation of the Head of Business Services The College will comply with any lawful administrative or judicial order requiring the production of electronic files or data stored in the College's Information systems, and will provide information on electronic files or data stored in response to legitimate requests for discovery of evidence in litigation in which the College is involved. 11 Data Security and Backup 11.1 Daily and weekly backups will be made of critical and non-critical servers according to the backup policy contained in Appendix 5. The College will endeavour to maintain the operational integrity of the computing network at all times. However, no system is foolproof and the College cannot guarantee the integrity of files and data stored on College equipment It is the responsibility of the user to maintain adequate backup of all stored files and programmes they require. The Network and IT Services manager will be pleased to advise users on the backup procedures they should adopt Use of usb pen drives, CDs/DVDs and laptops to carry sensitive data is prohibited (see Appendix1). The College has no infrastructure for transferring sensitive data outside of the College network.

7 11.4 Regular system audits will be undertaken, identifying accounts with excess privileges, excessive intruder lockouts, and inactive accounts Disciplinary action for non-compliance with this policy may be taken as a result of system audits Inactive accounts will be reviewed on a six monthly basis and account holders written to, encouraging them to use the account, before the account is removed. 12 Physical Security IT Services will maintain an up to date inventory of all College computer hardware and software. This will be updated on a termly basis. Procedures for ordering hardware, ordering or installing software, relocating hardware, the loan of computer equipment and network access requests are contained in the ''Network and Computer Security Procedure Documents" - refer to Appendix I. These procedures must be followed at all times so that the inventory can be kept up to date Reasonable measures will be taken to ensure adequate physical security of College hardware, including the use of desktop padlocks, security wire, and CCTV where appropriate Any action or attempt to subvert or overcome physical security measures is prohibited Unauthorised removal of hardware from College premises is theft Users wishing to borrow equipment must follow the Loan of Computer Equipment procedure (refer to Appendix 1) Only IT Services staff may move or relocate computer hardware as outlined in the procedures in Appendix I Only IT Services staff may install software on College equipment (refer to Appendix I). 13 Data Protection Act All persons responsible for the College's Information Systems will meet the requirements of the Data Protection Act by adhering to the following principles: 13.1 Data will be processed fairly and lawfully Personal data will only be obtained for specified and lawful purposes, and will not be processed in an incompatible manner Personal data will be adequate relevant and not excessive in relation to the purpose for which they are processed Personal data will be accurate and where necessary kept up to date Personal data processed for any purpose will not be kept for longer than necessary for such purpose Personal data will be processed in accordance with the rights of the subject Appropriate technical and organisational measures shall be taken against unlawful or unauthorised processing of personal data, and against accidental loss or destruction or damage to personal data.

8 13.8 Personal data will not be transferred to other countries that do not have "adequate protection" as outlined in the Data Protection Act. 14 Non Compliance The first case of non-compliance by an individual will be considered by the Deputy Head of Business Services and the IT and Network services manager, in consultation with the relevant Programme Area Manager. In serious cases the procedure in 14.2 will be followed Further cases of non-compliance will be considered by the Head of Business Services or their Deputy, the IT and Network Services manager, and the relevant Programme Area Manager or their representative If confirmed the first incidence of non-compliance to this policy will result in a written warning unless the offence is thought to be so serious as to warrant further immediate action as detailed below If confirmed the second incidence of non-compliance will result in a loss or suspension of all ICT privileges. It is understood that the second incidence may not necessarily be of the same type as the first The consequences for non-compliance will usually be the suspension or loss of access but may include probation, suspension from Belfast Metropolitan College or in the case of a salaried employee, even termination is possible. The exact consequence will vary depending upon the specific violation Gravely destructive computing could be considered destruction of College property and the accused may be subject to civil action. Using the network to distribute obscene material is a criminal offence and will result in legal action Nothing in these procedures precludes the implementation of disciplinary action under normal College Disciplinary Procedures.

9 Appendix 1 Mobile Data Security In June 2008 alone there were reported several high profile instances of data loss involving mobile devices. Virgin Media admit it left a CD with bank details of 3000 customers on a train; The Scottish Ambulance Service lost the names and medical records of 900,000 emergency-call patients on a hard drive being transported by a courier; Six laptops containing details of 20,000 patients including 3000 children stolen from St. George s Hospital Tooting; The retailer Cotton Traders admit that thousands of payment details were stolen from its system in January. Prior to this the personal details of 25 million people in receipt of child benefit were lost while 2 dvds were being moved between offices. The following is an extract from guidance produced by the JISC relating to data protection :- 8.8 Processing of Personal Data Off-site, on Home Computers, or at Remote Sites Off-site processing of personal data for which an institution is Data Controller in manual or computerised form by employees or students presents a potentially greater risk of loss, theft or damage to personal data. Staff and students should thus be aware of both the institutional and the personal liability that may accrue from their off-site use of personal data. Employees and students should take particular care when laptop computers or personal machines are used to process institutional personal data at home or in other locations (e.g. in public places, or on public transport) outside the institution. Laptops containing personal data should have properly implemented security measures that are proportionate to the anticipated risks and appropriate to the type of personal data to be transferred. These may include passwording, biometric security mechanisms and encryption. The increasing capacity and declining size of storage media, such as CDs, mini hard disk drives, and USB flash memory datasticks means that it is possible for employees and students to carry considerable amounts of personal data on media that are easily lost or forgotten. Institutions should consider the provision of advice to employees and students about the appropriate use of such media and the need for adequate security measures to reduce data breaches in the event of loss or theft.

10 Employees and students should be required to ensure that when processing personal data for which the institution is Data Controller at home or in other locations: They take reasonable precautions to ensure that the data is not accessed, disclosed or destroyed as a result of act or omission on their part They ensure personal data held in manual form is stored as securely as possible, and ideally is locked away when not in use They have an up-to-date firewall and a virus-scanning program installed on laptop computers or personal machines and scan all disks, s, and other potential virus vectors for viruses They back up system hard drives to avoid loss of data They report all computer security incidents including virus infections to the institution Employees and students should be required to ensure that when using laptops to process personal data for which the institution is Data Controller they: Keep the laptop constantly in view when travelling, especially in busy places/terminals such as airports Do not check the laptop as baggage unless it is placed inside luggage that has been locked Record the model number and serial number of each hardware component associated with the laptop and keep this information in a separate location Notify the institution immediately in the event of loss or theft of personal data on any laptop, PDA, or other digital storage mechanism or media 8.9 Disposal of Data The proper disposal of personal data should be the final element in an institutional framework designed to ensure the security of personal data. The method of disposal should be proportionate to the anticipated risks and appropriate for the type of personal data to be destroyed. The minimum standard for the destruction of paper and microfilm documentation should be shredding; paper and microfilm documentation containing sensitive personal data should be horizontally and vertically shredded or incinerated. The minimum standard for the destruction of data stored in electronic form should be reformatting or overwriting, and electronic storage media containing sensitive personal data should either be overwritten to a suitable standard or destroyed. FE and HE institutions should ensure that: All paper or microfilm documentation containing personal data is permanently destroyed by shredding or incinerating, depending on the sensitivity of the personal data. All computer equipment or media to be sold or scrapped have had all personal data completely destroyed, by re-formatting, over-writing or degaussing. Employees and, where appropriate, students are provided with guidance as to the correct mechanisms for disposal of different types of personal data and regular audits should be carried out to ensure that this guidance is adhered to. In particular, employees and students should be made aware that erasing electronic files does not equate to destroying them. Where disposal of equipment or media is contracted to a third party, institutions should ensure that the contract contains a term requiring the third party to ensure that all personal data is completely destroyed, The college and takes permitting the issue the institution of mobile to audit data the third security party's performance very seriously of that and term at in regular light intervals. of the above has made the following stipulation. The College cannot condone the removal of data from College systems for any purpose other than transfer to an appropriate body such as the DEL. In the case of DEL measures have been put in place by DEL for the safe transfer of the data. There are no accepted circumstances where personal data as defined in the Data Protection Act or Confidential Business Data needs to be taken off the premises (or transferred between parts of the Business) using any medium such as USB, DVD or even on the hard drive of a laptop etc.

11 Brief guide for staff Belfast Metropolitan College provides computer access for its students and staff to local, national, and international sources of information, and encourages an atmosphere that supports the sharing of knowledge, the sharing of resources, and assists the creative process of learning. Access to ICT resources is a privilege, not a right, and all users must act honestly and responsibly and not infringe on the rights of others. Belfast Metropolitan College ICT systems are only to be used for College related purposes. Limited personal use outside working hours is acceptable. Staff user accounts can only be established using a Network Access Request form, obtained through the Intramet and ed to Personnel. All staff will be required to accept the Acceptable Usage Policy in the first instance and approximately once per term thereafter. User names and passwords must not be shared. The responsibility for activity on your personal account is yours alone. Obscene, inappropriate or offensive material must not be accessed or distributed. No user should attempt to trespass in another user's folders, work or files. Users can expect files or data generated to be private information, unless they take action to reveal them to others. However the College cannot and does not guarantee user privacy. Daily and weekly backups will be made of all servers according to a predetermined programme. However, the College cannot guarantee the integrity of files and data stored on College equipment. Confidential Data should not be taken from the College premises without authorisation. Even where authorisation has been given the College has no infrastructure for encrypting data and so it is seen as a risky activity. Each user is responsible for maintaining an adequate backup of all stored files they require. The IT and Network Services Manager can advise. On leaving a workstation, you must log out from the network. For copyright reasons, only members of the College IT Services staff are permitted to install software. Copyright law applies to all material held in electronic format. All users are expected to have read and understood the Belfast Metropolitan College Security Policy and Procedures. A copy is available from the IT Support and Network Services manager. Using the College's ICT systems shall constitute an agreement on behalf of the user to abide and be bound by the provisions of this policy. Regular system audits will be undertaken. Misuse of ICT systems will be subject to disciplinary action as identified in our Security Policy If there is anything you do not understand please contact the IT Support and Network Services manager on ext 5083,

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

Executive Memorandum No. 16

Executive Memorandum No. 16 OFFICE OF THE PRESIDENT Policy for Responsible Use of University Computers and Information Systems 1. Purpose It is the purpose of this Executive Memorandum to set forth the University's administrative

More information

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3 Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage. Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures

More information

Summary Electronic Information Security Policy

Summary Electronic Information Security Policy University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

Please note this policy is mandatory and staff are required to adhere to the content

Please note this policy is mandatory and staff are required to adhere to the content Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

E-SAFETY POLICY 2014/15 Including:

E-SAFETY POLICY 2014/15 Including: E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

Grand Rapids Public Schools

Grand Rapids Public Schools 4510-R Computer Network (Cf. 4520) 4510-R Planning and funding for computer networking in the District shall be handled in accord with the District's policy and rules on technology. Supervised Use Teachers

More information

LSE PCI-DSS Cardholder Data Environments Information Security Policy

LSE PCI-DSS Cardholder Data Environments Information Security Policy LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

Marion County School District Computer Acceptable Use Policy

Marion County School District Computer Acceptable Use Policy Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through

More information

Box Hill Senior Secondary College/MYSC

Box Hill Senior Secondary College/MYSC Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

ABERDARE COMMUNITY SCHOOL

ABERDARE COMMUNITY SCHOOL ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been

More information

Terms and Conditions of Use - Connectivity to MAGNET

Terms and Conditions of Use - Connectivity to MAGNET I, as the Client, declare to have read and accepted the terms and conditions set out below for the use of the network connectivity to the Malta Government Network (MAGNET) provided by the Malta Information

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

Information Security Policy

Information Security Policy Information Security Policy The purpose of this Policy is to describe the procedures and processes in place to ensure the secure and safe use of the federation s network and its resources and to protect

More information

AP 417 Information and Communication Services

AP 417 Information and Communication Services AP 417 Information and Communication Services Background Access and use of information and communication services (ICS) are an integral component of the learning and working environment. The ability for

More information

Information Technology Acceptable Usage Policy

Information Technology Acceptable Usage Policy Information Technology Acceptable Usage Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly

More information

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)

More information

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers

More information

Acceptable Use of Information Systems Policy

Acceptable Use of Information Systems Policy Information Governance & Management Framework Acceptable Use of Information Systems Policy Version 1.3 Produced by: Customer Services & Business Transformation Inverclyde Council Municipal Buildings GREENOCK

More information

Caldwell Community College and Technical Institute

Caldwell Community College and Technical Institute Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative

More information

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology

More information

Huddersfield New College Further Education Corporation

Huddersfield New College Further Education Corporation Huddersfield New College Further Education Corporation Card Payments Policy (including information security and refunds) 1.0 Policy Statement Huddersfield New College Finance Office handles sensitive cardholder

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Use of ESF Computing and Network Resources

Use of ESF Computing and Network Resources Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among

More information

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic

More information

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

All Users of DCRI Computing Equipment and Network Resources

All Users of DCRI Computing Equipment and Network Resources July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform

More information

THE LONG EATON SCHOOL

THE LONG EATON SCHOOL THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy

Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE TITLE: COMPUTER USE POLICY PAGE 1 OF 5 EFFECTIVE DATE: 07/2001 REVIEW DATES: 02/2003, 09/2006 REVISION DATES: 03/2005, 03/2008 DISTRIBUTION: All Departments PURPOSE APPROVED BY: Signatures on File Chief

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

All individuals with access to Twin Falls School District technology and computer networks will:

All individuals with access to Twin Falls School District technology and computer networks will: Twin Falls School District #411 Computer and Network Use Policy 201 Main Avenue West Twin Falls, Idaho 83301 Telephone: 208-733-6900 Fax: 208-733-6987 Technology users responsibilities go beyond general

More information

District Regulation 2361 - ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES

District Regulation 2361 - ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES District Regulation 2361 - ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES Section: Program Date Created: March, 2007 Date Edited: October, 2014 The school district provides computer equipment,

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

University for the Creative Arts. Mobile Working and Remote Access Policy

University for the Creative Arts. Mobile Working and Remote Access Policy Mobile Working and Remote Access Policy Version 1.0 Date: 20 July 2009 Document History Version History 1.0 20 July 2009 Approved for publication by the IS Board after E&FC approval in June 2009 Title:

More information

UTC Cambridge ICT Policy

UTC Cambridge ICT Policy UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology

More information

PURPOSE To establish standards for the use of College networks and computer accounts.

PURPOSE To establish standards for the use of College networks and computer accounts. IT 01 Classification: Responsible Authority: Executive Sponsor: Approval Authority: Date First Approved: 1998.03.02 Date Last Reviewed: 2011.11.23 Mandatory Review Date: 2016.11.23 Acceptable Use of Computer

More information

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

HAZELDENE LOWER SCHOOL

HAZELDENE LOWER SCHOOL HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information