Telephone Acceptable Use Policy (ISP05)
|
|
|
- Shanon Smith
- 10 years ago
- Views:
Transcription
1 Telephone Acceptable Use Policy (ISP05)
2 Issue Date: December 2014 Version 3 Document Control 3 1. Policy Statement 4 2. Introduction 4 3. Responsibilities 4 4. Breach of Policy 5 5. Service Standards: Making Calls 5 6. Confidential Data and Information Security 6 7. Personal Use 6 2
3 Document Control Policy Version:- 3.0 Policy Review Interval:- Author:- Authorised By: ISG Group Members:- Annually by Information Security Group from the date of authorisation Director of LISD Information Security Group Director of Estates (Chairperson) Head of IT Infrastructure Services Director of Library and Information Services Division LISD IT and Development Manager Authorisation Date:- December
4 1. Policy Statement The purpose of this Policy is to describe the service standards to be applied and the operational procedures to be followed by all employees of the College when using landline or mobile telephones for internal and external calls, and for personal use. Any queries arising from this Policy or its implementation can be taken up directly with the IT Infrastructure Services team at The College is the Owner of this document and has approved management responsibility for its development, review and evaluation. o This policy is intended to be read by all staff and students for general information and awareness. o The policy is relevant to the use of all mobile telephones and landline telephone systems throughout the College whether as part of a corporate telephone system or a stand-alone system within a College establishment. 2. Introduction 2.1 This policy provides guidance on when to use telephones, making and responding to calls in a way which reflects positively on both the individual employee and the College. 2.2 Any incoming (or outgoing) telephone call is potentially the first point of contact with members of the public or other customers of the College. The first impression given when making, and in particular when answering, a call goes a long way towards influencing the perception of the College s level of performance and quality of service. It is therefore important that all employees are aware of and follow these guidelines. 2.3 The College recognises that the use of mobile telephones is an essential part of many employees working lives and access to a mobile phone is necessary for certain roles. The advantage of mobile phones to lone workers and those working in remote areas is recognised. Landlines and, where there is a business need, mobile telephones are provided for business use, and this Telephone Usage Policy includes guidance on how they should be used and managed. 3. Responsibilities 3.1 In making use of College landline and mobile telephones all users are expected to act responsibly and keep costs to a minimum. Wherever possible College receptionist staff should be requested for directory enquiry numbers and premium directory enquiry services such as should be avoided. 3.2 Managers are responsible for ensuring that existing and new members of staff are made aware of the content of this policy and for monitoring compliance with it. 4
5 3.3 The College expects value for money (VfM) in its telephony provision and therefore employees will not be able to select specific mobile phone handsets or types and may not be given a choice Unless there is a specific business reason for a specific type of phone which must first be approved by the Head of Department. 3.4 When making or receiving any calls, internal or external, employees should aim to be pleasant, informative, helpful and brief. 3.5 Employees are responsible for all calls made on a College mobile phone, and for the safe-keeping of the phone. 3.6 Users are responsible for any fine or other penalty incurred for breach of legislation if using a mobile phone or hands free device whilst driving. It is illegal to make or receive a call using a mobile telephone whilst driving if the phone is held in the hand during any part of the operation. Users should also be aware that they can be prosecuted for using hands free devices if they fail to properly control their vehicle. 3.7 College mobile phones remain the property of the College and must be returned if the user leaves the College s employment. Failure to do so may result in the employee being charged an amount equivalent to the rental of the phone and any other charges made against the account. The College may also apply an administrative charge to cover costs incurred in recovering the phone and terminating the contract. 3.8 If a College mobile phone is lost it must be reported to a line manager as soon as possible. If a College mobile phone with (work s synchronised to the device such as iphone, Windows Mobile etc.) is lost then it must be reported to a line manager and IT Infrastructure Services Team [email protected]. 3.9 If the lost mobile phone is a smartphone staff may be required to purchase replacement handset themselves, if this loss is due negligence on the part of the user or if they would need a similar mobile phone College mobile phones are provided for college related use only. While the College recognises that occasional personal use may be necessary, this should be kept to a minimum. Apps should not be purchased for personal use at the College s expense and may not be replaced or refunded if bought from personal funds and downloaded to a College handset. 4. Breach of Policy 4.1 All employees are responsible for their compliance with the Policy, and for reporting any policy violation or other abuse of the telephone system. Any breach of this Policy will be dealt with in accordance with the College s disciplinary procedure. If abuse of a mobile phone is suspected, in addition to any other sanctions imposed the phone will be withdrawn. 5. Service Standards: Making Calls 5
6 5.1 Employees should be aware that calls to mobile phones are expensive and therefore any calls should be clear, succinct and as brief as possible. 5.2 International Roaming is enabled by default on all College mobiles. If you travel abroad regularly on College business, it is advised to contact to enable special roaming package which will reduce the cost. 5.3 The use of chargeable mobile services such as premium rate text messages, directory enquiries etc, is not permitted on College mobile phones without prior and specific written permission from a line manager. 5.4 Text or picture messages (SMS or MMS) must not contain, or have attachments that contain: defamatory, offensive or harassing language, fraudulent material, sexually explicit images or language, material that infringes copyright or other intellectual property rights of third parties, or offensive cartoons or jokes or otherwise involve lawful or wrongful conduct. Nor should they contain any remarks that might be potentially embarrassing to the College, its employees or the general public 6. Confidential Data and Information Security 6.1 Information must never be given out over the phone unless it is absolutely clear who it is being given to and that they are entitled to the information and are ready and able to accept it. 6.2 Care must be taken to ensure that conversations involving confidential and/ or personal information cannot be overheard. 6.3 Voic messages containing personal information should only be left after due consideration has been given to any security and confidentiality risks involved. 6.4 Mobile phones must be kept secure at all times, and out-of-sight whenever possible. 6.5 All college and personal smartphones setup with college accounts and/or internet based access to College data must be protected with four digit passcode. This is to protect your information and college data. After enabling passcode on your device, each time you turn on or wake up the device, it will prompt for the passcode before you can access applications or information on the device. Please contact LISD helpdesk [email protected] or for assistance. 6.6 Mobile phones may not be used to store and/or transmit personal data for which the College is the Data Controller or any other sensitive data relating to the College and its activities. 7. Personal Use 7.1 The College s telephones are provided primarily for business use in order to assist staff in carrying out official College business. College landline and mobile phones must not be used for any secondary business purpose unless approved as part of a formal College scheme. 6
7 7.2 It is accepted that there are occasions when making personal calls at work cannot be avoided. However, it should be remembered that calls are logged and abuse of a telephone system or mobile telephone may result in disciplinary action. 7.3 Such monitoring of telephone use will comply with the Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 and the Data Protection Act It will be used to establish facts, confirm legitimate business use and compliance with this Policy, monitor standards of service and training, maintain effective operation of systems and identify unauthorised use. Call logs are kept for a period of 3 years so that they are available for inspection by Auditors 7.4 Examples of acceptable personal use may include: Emergency calls to deal with domestic situations. For example making alternative arrangements for childcare or checking on an unwell family member Advising others of late working Returning important calls from a family member Calls to, for example, a bank or building society, or to arrange doctors or dentists appointments where the call cannot be made outside of the employee s normal working hours. 7.5 Where possible personal calls should be made during recognised break times thus minimising disruption to others. Where this is not possible call duration must be kept to an absolute minimum. 7.6 National rate personal calls and personal calls to any mobile network should only be made in exceptional circumstances and the duration of the call must again be kept to a minimum. 7.7 Where there is evidence of a high level of personal usage which is not compliant with this Policy the individual responsible will be liable to pay any excess call charges and may be subject to disciplinary procedures. 7.8 Explicitly forbidden uses of College landline and mobile telephones include: Providing a College telephone number as a contact point in personal advertisements in the press, on the internet etc Premium rate phone numbers such as those associated with competition lines, racing lines, chat rooms etc Transmission of any offensive material in either voice, text or image format from College supplied mobile phones. 7
Mobile Device Usage Policy
Mobile Device Usage Policy Version 1.0 1. Introduction...2 2. Responsibilities...2 Line Manager Responsibilities...2 3. Administration and Support of Mobile Devices...3 4. Personal Usage Monitoring...4
HUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
Practice Resource. Sample internet and email use policy. Foreword. Policy scope. By David J. Bilinsky 1
Practice Resource Sample internet and email use policy By David J. Bilinsky 1 Foreword Use of email and the Internet can result in a huge productivity increase for a law practice. Through email, lawyers
Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
"Broadband Voice Telephone Adapter" a broadband voice telephone adapter or BT Voyager 220V which may be bought from BT.
Terms and Conditions 1. Definitions 2. Providing the Service 3. Managing the Service 4. Monitoring Calls 5. Customer Equipment 6. Misusing the Service 7. Security 8. Intellectual Property Rights 9. Intellectual
Other Review Dates: 15 July 2010, 20 October 2011
POLICY:- Policy Title: Mobile Telephone Policy File reference: F10/618-04 Date Policy was adopted by Council initially: 18 December 2008 Resolution Number: 404/08 Other Review Dates: 15 July 2010, 20 October
Email Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
Acceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
Internet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
any Service that involves gambling, betting, adult, sex or over 18 services or information;
emobile Bulk Text Services Terms and Conditions of Use These terms and conditions apply to the supply of the emobile Bulk Text service (the "Service") and are in addition to and form part of the emobile
INTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Email Services Policy
Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages
The purpose of this procedure is to provide guidance to staff on the use and maintenance of mobile and landline telephone communications systems.
Mobile and Landline Phones Purpose The purpose of this procedure is to provide guidance to staff on the use and maintenance of mobile and landline telephone communications systems. 1. Introduction The
Niagara County Community College
Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
VIRGIN MOBILE PRE-PAID MOBILE SERVICES DESCRIPTION 1. ABOUT THIS SERVICE DESCRIPTION... 3
1 VIRGIN MOBILE PRE-PAID MOBILE SERVICES DESCRIPTION Click on the section that you are interested in 1. ABOUT THIS SERVICE DESCRIPTION... 3 2. THE SERVICE... 3 2.1 What is the service?... 3 2.2 Who supplies
Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data
1. Introduction Special data protection rules apply to the protection of Personal Data by Data Controllers in the electronic communications sector. These are in addition to the general obligations that
BUSINESS BROADBAND SERVICE
BUSINESS BROADBAND SERVICE 1 DEFINITIONS AND INTERPRETATION 1.1 The following additional terms and conditions apply to the provision of the Business Broadband Service. TERM / EXPRESSION ADSL Annex A Annex
Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
How To Ensure Safety On A Health And Safety Website
NHS Ayrshire & Arran Organisation & Human Resource Development Policy LANDLINE AND MOBILE COMMUNICATION POLICY AND USE OF MOBILES WITHIN HEALTH PREMISES Version Number: 1.0 Prepared By: Policy Development
Simon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
SURE E-Mail Services Terms and Conditions SURE MAIL
SURE E-Mail Services Terms and Conditions SURE MAIL Sure offers an E-mail service that allows access to a mailbox provided by a 3 rd party partner ( Service ). The Service is accessed via the internet.
COMPUTER, INTERNET, & EMAIL USE POLICY
COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter
SAS TRUSTEE CORPORATION ( STC )
SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
Company Mobile Phone Policy
Company Mobile Phone Policy Policy Clifford House Fostering is committed to ensuring that adequate communication facilities are available to its staff in order for them to carry out their normal daily
Information Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
2.1 It is an offence under UK law to transmit, receive or store certain types of files.
Website Hosting Acceptable Use Policy 1. Introduction 1.1 Jarrett & Lam Consulting s Acceptable Use Policy for hosting customers to protect our resources, the resources of our customers and to ensure that
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.
Terms & conditions for the use of this Website IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. By using this website you are deemed to have full
If you have any questions about any of our policies, please contact the Customer Services Team.
Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
365 Phone, Online and Mobile Banking Terms and Conditions - Republic of Ireland Effective from 25 th November 2013
365 Phone, Online and Mobile Banking Terms and Conditions - Republic of Ireland Effective from 25 th November 2013 1.0 Definitions of Terms used in this Document 2.0 Accounts 3.0 Mandates 4.0 SEPA Transfers
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
District Technology Guidelines. for Students and Parents/Guardians, updated for 2015-16
District Technology Guidelines for Students and Parents/Guardians, updated for 2015-16 Table of Contents Topic Page Forward... 1 Technology Guidelines... 1 Overview... 1 Acceptable Use... 1 Prohibited
Information Management and Security Policy
Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
Our Customer Relationship Agreement NODEMOBILE VOICE SERVICE DESCRIPTION
Our Customer Relationship Agreement NODEMOBILE VOICE SERVICE DESCRIPTION Internode Pty Ltd ABN 82 052 008 581 Phone: 13 66 33 1/502 Hay Street, Subiaco WA 6008 2 December 2014 Rules of interpretation and
TTCU THE CREDIT UNION
TTCU THE CREDIT UNION ONLINE BANKING AGREEMENT & DISCLOSURES 1. Introduction. This Agreement is the contract which covers your and our rights and responsibilities concerning Online Banking ("Online Banking")
Consumer Code of Practice on Complaint Handling and Dispute Resolution
Consumer Code of Practice on Complaint Handling and Dispute Resolution Introduction to our company and services: Hive Telecom provides telecoms services to residential customers and businesses. As Hive
SPINTEL MOBILE SERVICE DESCRIPTION
SPINTEL MOBILE SERVICE DESCRIPTION 1. THIS MOBILE SERVICE DESCRIPTION a) This Mobile Service Description, together with: i. your Application; ii. the Customer Terms; iii. the Mobile Standard Pricing Table;
