and Internet Policy

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "and Internet Policy"

Transcription

1 and Internet Policy Responsible Officer Authors Date effective from July 2008 Ben Bennett, Business Planning & Resources Director Policy Development Group Date last amended December 2012 Review date December 2015 DATE: December 2012 FINAL 1

2 Introduction 1. This policy sets out best practice when using NICE and internet services. It sets out the need for confidentiality, integrity and availability of the internet and systems and establishes both NICE and user responsibilities. 2. This policy is designed to promote reasonable, responsible and lawful use of internet and services and to make staff aware of what NICE deems as acceptable and unacceptable use of these systems. If any staff member disregards the rules set out in this policy, they may be subject to disciplinary action by NICE, which may include dismissal. 3. All accounts maintained on the NICE systems are the property of NICE. Scope 4. This policy applies to those working at or for NICE (collectively referred to in this policy as users ) who have access to and internet via the NICE IT network: all employees (including NICE staff on secondment to other organisations) agency workers and contractors secondees (those who are seconded to NICE from other organisations) with authorised access to the IT network. It is the responsibility of those engaging the contractors to ensure they comply with this policy. Other users with ad hoc access to the network Objective 5. The objectives of this policy are to ensure the protection, confidentiality and availability of NICE s and internet systems. To achieve this objective NICE will: ensure that the internet and systems are available for users (with the exception of pre-determined down-time ); preserve integrity and protect the internet and systems from unauthorized or accidental modification; preserve confidentiality and protect NICE s information assets against unauthorised disclosure; raise awareness amongst users to ensure they are aware of policies, protocols, procedures and legal obligations relating to the use of the Internet and ; protect the reputation of NICE from the misuse of and internet systems through the effective implementation and monitoring of this policy. DATE: December 2012 FINAL 2

3 Advise users of the circumstances in which monitoring of and internet use may take place that might otherwise infringe on their privacy. General 6. Desktop and internet access will be made available to all users via NICE s IT network. At all times users should abide by relevant sections of the Information Technology Policy and Procedure dealing with password controls and viruses and ensure that all passwords are kept secure. 7. Sensitive personal data as defined in the Data Protection Policy must never be included in an message that is sent over the internet unless it is password protected. 8. Although may appear to be an informal communication tool, this is not the case and the same laws apply as for other written communications, for example in relation to contracts or copyright (see appendix 1 for definitions). Users should be aware that it is possible to enter into legally binding contracts via . Users should ensure they are aware of the legal risks and take advice from the procurement team when in doubt. 9. External s include the following disclaimer: The information contained in this message and any attachments is intended for the addressee(s) only. If you are not the addressee, you may not disclose, reproduce or distribute this message. If you have received this message in error, please advise the sender and delete it from your system. Any personal data sent in reply to this message will be used in accordance with provisions of the Data Protection Act 1998 and for the purposes of NICE work. All messages sent by NICE are checked for viruses, but we recommend that you carry out your own checks on any attachment to this message. We cannot accept liability for any loss or damage caused by software viruses. 10. All s are potentially disclosable under the Freedom of Information Act and internet usage 11. When using the NICE system and internet, users must not: Create, download or transmit any obscene or indecent images, DATE: December 2012 FINAL 3

4 data or other material, or any data capable of being resolved into obscene or indecent images or material collectively defined as pornography. Staff and/or the Institute can be prosecuted or held liable for transmitting or downloading pornographic material, in the UK.. Create, download or transmit any defamatory, sexist, racist, offensive or otherwise unlawful images, data or other material. Create, download or transmit material that is designed to harass, bully, inconvenience or cause needless anxiety to other people. Create or transmit junk-mail or spam. This means unsolicited commercial webmail, chain letters, advertisements, jokes and executables 1 (i.e. files designed to load software). All such material should be deleted. Use the internet or systems to conduct private or freelance business for the purpose of commercial gain. Create, download or transmit data or material that is created for the purpose of corrupting or destroying NICE or external data systems or hardware. Download videos, video clips or audio for entertainment purposes. Impersonate any other person or organisation when using amend messages inappropriately. Unlawfully send confidential information, for which the sender and NICE could be held liable. Deliberately send an attachment that contains a virus, for which the sender and NICE could be held liable. Engage or sign up to bulletin boards or chat rooms that are not associated directly with their work. Where access is granted for work purposes only, such access should not be used to engage in messaging or blogging not directly associated with NICE work or create or transmit any obscene or indecent images, defamatory, sexist, racist or offensive material or material that is designed to harass, bully or inconvenience or cause needless anxiety to other 1 An executable file is a file that performs a set of actions on a computer, such as a word processor or calculator, the files usually end in.exe.com.cmd.bat.shs.vbs.js.msi DATE: December 2012 FINAL 4

5 people. Use the or internet to engage in gambling. 12. Definitions of the categories where problems with the use of and the Internet may occur are given in appendix The NICE internet system is available to staff to enable them to do their job. Staff may use the internet for personal use during non-core hours to access appropriate websites not otherwise restricted. 14. NICE uses software to prevent staff visiting sites that are deemed to be inappropriate (including social networking sites). If there is a good business reason why a staff member needs permanent or temporary access to a specific blocked site or category of sites, this can be granted once approval from their director is obtained. Monitoring 15. traffic to and from NICE addresses are logged automatically by the IT department. The content of s is routinely monitored to identify potential pornographic content, but not for other purposes. NICE reserves the right to view message content where there are reasonable grounds to do so and to retain message content as required to meet legal and statutory obligations. This also applies to Office Communicator messages where they have been saved in Outlook by the user. 16. All internet traffic is logged automatically. Each internet site a user visits is included in the log, with the time visited and duration of the visit. Pages viewed by the user may also be logged. These logs are audited periodically including details of time spent and websites visited by individuals. Inappropriate patterns of web access (for example browsing holiday websites during core working hours) may be identified by the IT Department. If this raises concerns these may be discussed with the individual and/or their line manager to ensure internet usage complies with this policy. 17. Access to web sites hosting systems is logged but the content is not viewed or monitored by NICE. 18. Monitoring may take place at any time and without prior notice and is carried out in accordance with the Data Protection Act 1998, the Human Rights Act 1998 and the Regulation of Investigatory Powers Act DATE: December 2012 FINAL 5

6 19. Any suspected breaches of this policy will be investigated and may result in disciplinary action in accordance with the NICE Disciplinary Policy and Procedure. Breaches may also result in referral to the Local Counter Fraud Specialist for their investigation and action. Privacy 20. NICE respects the privacy of users in the use of and internet systems in accordance with NICE policies and relevant legislation. The Data Protection Act 1998 gives a code of practice for employers on monitoring of s and Human Rights Act 1998 provides details about privacy rights including the right to respect for private and family life, home and correspondence Reasonable use of NICE and internet access for personal use during non-core working time is permitted where this does not interfere with the performance of staff duties. 21. Notwithstanding this, users of NICE and internet systems should be aware that these systems are operated by NICE and any NICE box can be accessed by NICE without the user s consent where there are reasonable grounds for doing so, for example to prevent or detect fraud or misuse of NICE systems. 22. All staff leaving NICE employment should review the information they hold in their U drives or personal mailboxes. In particular, any private or personal information should be deleted from the IT network. 23. Any information remaining in U drives or personal folders after the user has left NICE, including personal data, may be viewed by other members of NICE staff prior to its review or deletion in accordance with NICE policies. Appendix The following section outlines the definitions of the categories where problems with the use of and the Internet may occur. 25. Defamation - A published (spoken or written) statement or series or statements that affects the reputation of a person (a person can be a human being or an organisation) and exposes them to hatred, ridicule or contempt, being shunned or avoided, discredited in their trade, business, office or profession, or pecuniary loss. If the statement is not true, then it is considered slanderous or libelous and the person towards whom it is made has redress in law. messages, both internal and external, constitute publication in libel cases and particular care should be DATE: December 2012 FINAL 6

7 taken not to include any libellous or defamatory content in s. 26. Harassment - unwanted conduct which is intended to, or which creates the effect of violating a person's dignity or creates an intimidating, hostile, degrading, humiliating or offensive environment for that person. 27. Pornography - for the purposes of this policy, pornography is regarded as obscene or indecent images, data or other material, or any data capable of being resolved into obscene or indecent images or material. This includes the description or depiction of sexual acts, naked people or any other act or image which is designed to be sexually exciting. NICE will not tolerate its facilities being used for this type of material and considers such behaviour to constitute a serious disciplinary offence. 28. Copyright is a term used to describe the rights under law that people have to protect original work they have created. The original work can be a computer program, document, graphic, film or sound recording, for example. Copyright protects the work to ensure no-one else can copy, alter or use the work without the express permission of the owner. Copyright is sometimes indicated in a piece of work by this symbol However, it does not have to be displayed under British law. So a lack of symbol does not indicate a lack of copyright. 29. All material generated as part of your work at NICE under your contract of employment is deemed to be NICE copyright material unless there is an explicit agreement to the contrary. 30. NICE is covered by the Copyright Licensing Agency s photocopy licence which authorises ad hoc and systematic photocopying from published material to be carried out by NHS personnel for their own use and for use by colleagues and peers. Guidance is provided to all staff on the limitations of this licence Contracts A contract is a legally enforceable agreement in which two or more people or organisations commit to certain obligations in return for certain rights. Contracts do not necessarily need to be signed to be enforced and they can be inadvertently entered into via . 2 A summary of the photocopying licensing terms for the NHS, published by the Copyright Licensing Agency, is posted above each of the Institute s photocopiers. DATE: December 2012 FINAL 7

8 Related policies Data Protection Policy Freedom of Information Policy Disciplinary Policy and Procedure Equality and Diversity Policy Bullying, Harassment and Victimisation Policy and Procedure Information Technology Policy Review This policy will be reviewed every three years. This policy has been developed in conjunction with NICE s Policy Development Group DATE: December 2012 FINAL 8

9 Appendix A - Version Control Sheet Version Date Author Replaces Comment 2 29 Sept 2011 Julian Lewis and Internet Policy 2005 Barney Wilkinson DATE: December 2012 FINAL 9

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

Sample Employee Network and Internet Usage and Monitoring Policy

Sample Employee Network and Internet Usage and Monitoring Policy CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members

More information

ICT Acceptable Use Policy. August 2015

ICT Acceptable Use Policy. August 2015 ICT Acceptable Use Policy August 2015 Document title ICT Acceptable Use Policy August 2015 Document author and department Responsible person and department Robbie Walker, Information Security Architect,

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Internet and Social Media Policy

Internet and Social Media Policy Internet and Social Media Policy Page 1 of 19 Review and Amendment Log / Control Sheet Responsible Officer: Chief Officer Clinical Lead: Author: Date Approved: Committee: Version: Review Date: Medical

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

Internet, Social Media and Email Policy

Internet, Social Media and Email Policy West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Internet, , Computer, and Telecommunications Policy

Internet,  , Computer, and Telecommunications Policy Internet, Email, Computer, and Telecommunications Policy 1. Purpose This policy sets out appropriate use of Monitor internet, email, general computer, and telecommunication services and equipment. This

More information

Seychelles Revenue Commission Practice Statement PS CM 2009/02

Seychelles Revenue Commission Practice Statement PS CM 2009/02 Seychelles Revenue Commission Practice Statement This Corporate Management Practice Statement is issued under the authority of the Revenue Commissioner (Commissioner) of the Seychelles Revenue Commission

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Internet, Social Networking and Telephone Policy

Internet, Social Networking and Telephone Policy Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Internet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014

Internet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014 Internet Acceptable Use Policy A council-wide information management policy Version 1.5 June 2014 Copyright Notification Copyright London Borough of Islington 20134This document is distributed under the

More information

SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS

SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS These terms of use govern your use of our site. Please read the whole of these terms in full before you use this Website. If you do not accept these terms, please do not use this Website. Your continued

More information

CARRAMAR PUBLIC SCHOOL

CARRAMAR PUBLIC SCHOOL CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

COMPUTER, INTERNET USE AND SOCIAL MEDIA POLICY

COMPUTER, INTERNET USE AND SOCIAL MEDIA POLICY COMPUTER, INTERNET USE AND SOCIAL MEDIA POLICY Rationale Employees have access to e-mail and internet accounts in order to meet the First Nation Land Management Resource Centre s ( Resource Centre ) business

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

EAST BRUNSWICK PUBLIC SCHOOLS Program ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES (M) Page 1 of 8

EAST BRUNSWICK PUBLIC SCHOOLS Program ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES (M) Page 1 of 8 Page 1 of 8 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

ELECTRONIC COMMUNICATIONS & INTERNET ACCEPTABLE USE POLICY Document Reference

ELECTRONIC COMMUNICATIONS & INTERNET ACCEPTABLE USE POLICY Document Reference ELECTRONIC COMMUNICATIONS & INTERNET ACCEPTABLE USE POLICY Document Reference Electronic Communications and Internet Acceptable Use Policy P010 Version Number V4.13 Author/Lead Job Title Director s Name

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

York Catholic District School Board ELECTRONIC COMMUNICATIONS & SOCIAL MEDIA

York Catholic District School Board ELECTRONIC COMMUNICATIONS & SOCIAL MEDIA York Catholic District School Board BOARD POLICY Policy Section Policy Number Program/Curriculum 317 Former Policy # Page 507 1 of 8 Original Approved Date: Last Approval Date: Jan 29 th, 2013 November

More information

Leicestershire Children and Young People s Service E-Safety Policy

Leicestershire Children and Young People s Service E-Safety Policy Leicestershire Children and Young People s Service E-Safety Policy 1. Introduction 2. Scope 3. Policies and Practices 3.1 Use of Internet facilities, mobile and digital technologies 3.2 Reporting abuse

More information

Using Public Computer Services in Somerset Libraries

Using Public Computer Services in Somerset Libraries Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which

More information

LARKS HILL JUNIOR & INFANT SCHOOL

LARKS HILL JUNIOR & INFANT SCHOOL LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

Internet and Email Acceptable Use Policy

Internet and Email Acceptable Use Policy Internet and Email Acceptable Use Policy Ratified Governance and Risk Committee (12/08/15) Status Final Issued August 2015 Approved By Governance and Risk Committee Consultation Governance and Risk Committee

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

BLOG PROTOCOL TERMS OF USAGE 1. DISCLAIMER

BLOG PROTOCOL TERMS OF USAGE 1. DISCLAIMER BLOG PROTOCOL DRI maintains this site (the "Site") for your personal entertainment, information, education, and communication. Please feel free to browse the Site. You may not download material displayed

More information

POLICY ON USE OF INTERNET AND EMAIL

POLICY ON USE OF INTERNET AND EMAIL POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

Acceptable Use of Information and Communication Systems Policy

Acceptable Use of Information and Communication Systems Policy Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help

More information

Extratime. Staff, Children and Young People s e safety Policy

Extratime. Staff, Children and Young People s e safety Policy Extratime Staff, Children and Young People s e safety Policy Introduction Extratime recognises the Internet and other digital technologies provide a vast opportunity for children and young people to learn,

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

Information Management and Security Policy

Information Management and Security Policy Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail

More information

Email Policy For Staff and Students

Email Policy For Staff and Students Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management

More information

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most

More information

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

CCG CO021 Internet and Email Acceptable Use Policy

CCG CO021 Internet and Email Acceptable Use Policy Corporate CCG CO021 Internet and Email Acceptable Use Policy Version Number Date Issued Review Date 19/02/2015 6 March 2015 20/02/2018 Prepared By: Senior Governance Officer, NECS Consultation Head of

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

NHS HIGHLAND EMAIL AND INTERNET POLICY

NHS HIGHLAND EMAIL AND INTERNET POLICY NHS HIGHLAND EMAIL AND INTERNET POLICY ehealth Department Policy Reference: Date of Issue: August 2007 Prepared by: A Fraser Date of Review: August 2009 Lead Reviewer: Version: 2 Area Information Security

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

LINDSAY UNIFIED SCHOOL DISTRICT ACCEPTABLE USE POLICY (AUP) FOR DISTRICT COMPUTER SYSTEMS

LINDSAY UNIFIED SCHOOL DISTRICT ACCEPTABLE USE POLICY (AUP) FOR DISTRICT COMPUTER SYSTEMS Lindsay USD: Exhibit Employee Use of Technology E 4040 Employees will confirm their assent to the AUP electronically when they activate their district account and/or change passwords. The Lindsay Unified

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

Social Media Policy April 2013 DRAFT Social Media Policy

Social Media Policy April 2013 DRAFT Social Media Policy Social Media Policy April 2013 DRAFT Social Media Policy Page 1 of P a g e Policy Title Policy Reference Number Social Media Policy Corp13/002 Implementation Date April 2013 Review Date April 2015 Responsible

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

Guidelines for Computer, Internet, and Phone Use

Guidelines for Computer, Internet,  and Phone Use [insert organisation logo/name] Guidelines for Computer, Internet, Email and Phone Use 1. Overview of the Guidelines The guidelines relate to personal use of [insert organisation name] computers and phones

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

BLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY

BLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY Acceptable Use Policy Educational Purpose The computer system in Blackrock College has been established for a limited educational purpose. The term "educational purpose" includes classroom activities,

More information

Acceptable Use of Information Technology

Acceptable Use of Information Technology Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:

More information

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose

More information

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy

More information

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body) ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved

More information

Conditions of Use of IT Facilities at the LSE

Conditions of Use of IT Facilities at the LSE Conditions of Use of IT Facilities at the LSE By accessing and/or using the IT Facilities, you agree to be bound by these Conditions of Use including all documents referred to in them, and you agree to

More information

2.1 You may use the Hosting Services only for lawful purposes. You may not use the Hosting Services:

2.1 You may use the Hosting Services only for lawful purposes. You may not use the Hosting Services: Sheraton House Castle Park, Cambridge, CB3 0AX [Page Lasted Updated 19 th June 2014] Acceptable Use Policy This acceptable use policy sets out the terms between you and us under which you may use the hosting

More information

TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Status: Final. Version Date Author Reason

TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Status: Final. Version Date Author Reason TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Reference Number HR 2012 046 Version: 1 Status: Final Author: Jane Thomas Job Title HR Manager Amendment

More information

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet

More information

TERMS OF SERVICE TELEPORT REQUEST RECEIVERS

TERMS OF SERVICE TELEPORT REQUEST RECEIVERS TERMS OF SERVICE These terms of service and the documents referred to in them ( Terms ) govern your access to and use of our services, including our website teleportapp.co ( our site ), applications, buttons,

More information

Digital Device LOAN CHARTER

Digital Device LOAN CHARTER Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to

More information

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) 719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and

More information

Acceptable Usage Policy

Acceptable Usage Policy UNIVERSITY COLLEGE CORK Acceptable Usage Policy Version 1 2/1/2013 This document is designed to help the UCC community to understand their responsibilities when utilising, accessing or creating content

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

If you have any questions about any of our policies, please contact the Customer Services Team.

If you have any questions about any of our policies, please contact the Customer Services Team. Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting

More information

North Clackamas School District 12

North Clackamas School District 12 North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students. POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive

More information

Bring Your Own Device Program: User Charter

Bring Your Own Device Program: User Charter Bring Your Own Device Program: User Charter Turramurra High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. The wireless network and

More information

Acceptable Use of Information. and Communication Systems Policy

Acceptable Use of Information. and Communication Systems Policy Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

Sydney Technical High School

Sydney Technical High School Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

Terms of Use YOUR USE OF THIS WEBSITE IS EXPRESSLY CONDITIONED UPON YOUR ACCEPTING AND AGREEING TO THESE TERMS OF USE.

Terms of Use YOUR USE OF THIS WEBSITE IS EXPRESSLY CONDITIONED UPON YOUR ACCEPTING AND AGREEING TO THESE TERMS OF USE. Terms of Use Please Read Carefully Before Using This Website: FF Finally Financed Inc. maintains this site for information and communication purposes. This webpage contains the Terms of Use governing your

More information

E-mail and Internet Acceptable Use Policy

E-mail and Internet Acceptable Use Policy E-mail and Internet Acceptable Use Policy Ratified 19/11/15 Status Final Issued November 2015 Approved By Executive Committee (19/11/15) Consultation South Tyneside CCG Equality Impact Assessment Completed

More information

Box Hill Senior Secondary College/MYSC

Box Hill Senior Secondary College/MYSC Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication

More information

Riverside Unified School District Acceptable Use Policy for Employee Use of Technology Resources (Based on Rules and Regulations #4040)

Riverside Unified School District Acceptable Use Policy for Employee Use of Technology Resources (Based on Rules and Regulations #4040) Riverside Unified School District Acceptable Use Policy for Employee Use of Technology Resources (Based on Rules and Regulations #4040) It is the policy of the Riverside Unified School District (RUSD or

More information

RULES FOR THE USE OF INFORMATION TECHNOLOGY SERVICES (ITS)

RULES FOR THE USE OF INFORMATION TECHNOLOGY SERVICES (ITS) RULES FOR THE USE OF INFORMATION TECHNOLOGY SERVICES (ITS) Policy Owner: ITS Manager Drafted/Amended: March 2013 Approved by: Academic Resources Committee Ratified by: Academic Board Next Review Date:

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

and Internet Policy

and Internet Policy Email and Internet Policy April 2016 www.peopleknowhow.org Version: 04 Date Approved: April 2016 Scheduled Review Date: May 2017 Contents 1. Statement of Policy 3 2. Scope of Policy 3 3. Responsibilities

More information

Virginia Commonwealth University Police Department

Virginia Commonwealth University Police Department Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media

More information