Guidelines on developing a policy for managing
|
|
|
- Jeremy Simmons
- 1 years ago
- Views:
Transcription
1 Guidelines on developing a policy for managing Crown copyright 2004 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence or Where we have identified any third-party copyright information, you will need to obtain permission from the copyright holders concerned. This publication is available for download at nationalarchives.gov.uk.
2 Contents Summary... 3 Introduction... 3 Audience... 5 Benefits... 6 The Purpose of an Policy... 7 Using (or Sending Messages)... 9 When to Use Writing Business Messages Dealing with Sensitive Subjects Misuse and Personal Use Managing Messages Reasons for Organising your Mailbox Making your Mailbox Manageable Management of Public and Shared Mailboxes Overview of Managing Public and Shared Mailboxes Public Mailbox Folders Shared Mailboxes Levels of Responsibility Identifying and managing records Essential Principles Identification and Responsibilities Managing Records with Attachments When and Where to Manage Records Encryption and Managing Records Titling Records in an Electronic Records Management System Appendix 1 - Guidelines for Writing Business messages Last updated March 2004 Page 2 of 44
3 Appendix 2 - Naming Conventions References Summary This guidance provides advice on aspects and areas that should be considered when developing an organisational policy for managing . The guidance addresses how can be used as a business tool for internal and external communication and how these types of communications should be managed as records. Although there is some advice about where records should be managed the guidance does not provide detailed technical advice on the management of records. The guidance argues the case for why organisations need an policy in terms of legal and business requirements. Advice is given to people developing policies in a way that should help them recognise the various options available when deciding how their organisation should manage and use s. The guidance provides text that could be used in an policy, although it is advised that organisations do not use this text without first considering the impact of the policy or consulting with members of staff throughout the organisation. This guidance covers two major aspects that need to be addressed in an policy, how an organisation should define appropriate use of and how should be managed within the organisation. These two areas are examined in detail through breaking them down into subsections to enable a policy to be produced that covers the main aspects of sending and managing messages. Introduction This guidance has been developed to fill a gap in authoritative guidance on management for organisations to use when producing their own advice on the use and management of . It advocates that organisations giving their staff access should develop an policy to reduce the likelihood of essential business records being lost and help prevent the inappropriate use of that could result in legal action. Last updated March 2004 Page 3 of 44
4 The purpose of introducing an policy is to present the organisation s perception about what constitutes appropriate use and management of in relation to the business being conducted. The way in which messages are used and managed can either help staff organise their work effectively or cause problems in terms of missing deadlines. In addition to the immediate benefits and disadvantages staff encounter with using there are more serious consequences if is not used appropriately including litigation and undesirable media attention. In developing the policy it will be necessary to consider a variety of different areas that relate to use and management including, legislative requirements, business requirements and the rights of an individual; the resulting policy should take into account all these areas while facilitating effective communication. The policy should be presented through clearly defined statements detailing what is expected of employees with a brief explanation to ensure that advice on procedures is given while allowing the sender to choose the most appropriate style. In areas of the policy where non-compliance may result in disciplinary action this must be clearly indicated. In order for an policy to be effective it is essential that the policy is developed with the agreement and support of senior management and in collaboration with representatives from various groups throughout the department. In particular it would be necessary to have representatives from the following organisational groups, Records Management, Human Resources, Information Technology and Trade Union, as well as other members of staff representing their sections. Developing the policy in collaboration with various organisational groups should help to increase awareness and acceptance of the policy. It should be noted that an policy should not be developed by only focusing on current use of as is this is usually an emotive experience and will not indicate whether current use is appropriate. Simply developing an policy and disseminating it among employees may not be enough to ensure that is used appropriately. To ensure that the policy is followed, it may be necessary to consider how to promote the policy and the type of training that might need to be developed. This guidance does not give any details of the procedures that would need to be developed for the adoption and implementation of an policy, although it is suggested that these need to be considered carefully to ensure that the policy is followed. Last updated March 2004 Page 4 of 44
5 This guidance provides details of the areas that should be covered when developing a policy for managing and using . The guidance provides two types of assistance with drafting an policy: the first is an explanation of the areas that should be covered in an policy and the second is some sample text for including in an policy. The explanatory text is written in black and the sample text follows in a box. For example: It is important to consider why a policy should be introduced and who should be involved in its development. For a policy to be successfully implemented, people throughout the organisation need to approve of its content. Sample text: This policy applies to everyone in [ORGANISATION]. It was developed in consultation with [GIVE EACH UNIT S NAME] and was approved by them at [DATE]. This policy will be reviewed in [x] years. The sample text can be copied and used within an organisation s policy, however it is advised that the sample text is amended to suit the organisation s own needs according to the advice provided in the guidance for each section of the policy. Audience This guidance has been produced to address information and records management needs of Central Government, Local Government and other Public Authorities when developing an policy. Other organisations may also find the guidance useful when developing their own management policies, although it should be noted that these organisations might have different needs that are not covered within this guidance. The guidance is aimed at people who would be producing an organisational policy, a general assumption has been made that this will be likely to be records managers, information managers or IT personnel. It is recognised that there might be other people who have Last updated March 2004 Page 5 of 44
6 responsibility for developing an organisational policy and this guidance would be applicable for this purpose, however it is advised that if you are in this position you consult with your records/information management department and your ICT department during the drafting process. This guidance does not assume that an organisation has an electronic records management system (ERMS) and can be used to indicate best practice when developing guidance on managing records outside of an ERMS. Although this document does cover managing s without an ERMS it does not provide detailed specifications for how this could be done in either shared drives or public mailbox folders. Using public mailbox folders to manage records in the absence of an ERMS will be the subject of later guidance. Benefits The main purpose of an policy should be to facilitate effective communication and ensure that appropriate records of those communications are maintained. Producing an policy will clarify an organisation s position on how should be treated within the organisation. This type of clarification is necessary to help ensure that is used in a way that an organisation abides by its legislative requirements, maintains records relating to business and encourages staff members to write messages that do not confuse the recipient. Organisations have a number of legislative requirements that must be adhered to in relation to the management and use of . They have responsibilities to ensure that people are not being abusive or writing messages where the content is untrue or could be construed as being untrue. Organisations need to ensure that they can abide by information legislation that applies to including the Data Protection Act, Freedom of Information Act and Regulation of Investigatory Privacy Act. In ensuring that they comply with legislation that affects use, organisations must also ensure that their staff are treated with respect and that their rights are not violated. Developing an policy that explains an organisation s requirements about how people are expected to treat and details the organisation s procedures for complying with information legislation will help to prevent potential litigation. However, it should be noted that simply providing an policy might not be enough to prevent litigation if the organisation has not Last updated March 2004 Page 6 of 44
7 attempted to ensure that staff members are aware of the policy and understand the implications of its contents. In addition to complying with legislative requirements relating to , organisations also need to ensure that appropriate business records are maintained for audit and accountability purposes. It is important that organisations recognise that can be treated as a record of a business activity and that failure to capture and maintain these records could be problematic when providing evidence about how a business activity was conducted and why it was done in a particular way. To ensure that appropriate records are maintained organisations need to provide guidance on which messages should be maintained and where they should be maintained. Having an policy is beneficial for members of staff as it clarifies where their responsibilities begin. An policy can have tangible benefits to individuals if they and other members of staff follow the policy. These benefits can be that it is easier for people to identify and locate information that is required for business, meaning that enquiries can be responded to quickly. Following the policy can also help individual staff members use more effectively so that messages are clearly expressed and the recipients will be able to quickly identify the appropriate actions for each message. The Purpose of an Policy When the policy is being developed and if you are a part of that development process it is usually fairly clear what decisions were made at particular stages, making it easy to know why certain things are more important than others and how the policy should be used. If you are not part of the development process it is not always clear why a policy was developed or how it should be made, making it harder to know why there is a need to refer to a policy and how it should be used. The introduction to the policy should make it clear why the organisation has developed an policy and what the benefits will be to the organisation and individuals through adopting the policy. The benefits detailed should cover both business and legislative areas. To help staff to Last updated March 2004 Page 7 of 44
8 understand the importance of the policy content an overview should be given of what the policy will include and how the policy should be used. In addition to giving an explanation about what the policy includes and how it should be used, there needs to be a clear statement about who needs to read and abide by the policy. This is important otherwise staff members who should be abiding by the policy might think that it is only applicable to other people and not themselves. Having a clear statement about who is covered by the policy will ensure that there is no doubt concerning to whom the policy applies. In summary, this section of the policy should indicate the reason and need for having a policy, providing an overview about how should be used within the organisation. There should be a clear indication of the main problems encountered when using and managing and the potential liabilities for both individuals and the organisation that could be incurred if the policy is not adhered to. Sample Text: is increasingly becoming the primary business tool for both internal and external communication and as a result should be treated with the same level of attention given to drafting and managing formal letters and memos. messages should not be treated as an extension of the spoken word because their written nature means they are treated with greater authority. As well as taking care over how messages are written it is necessary to manage messages appropriately after they have been sent or received. There is a common misconception that messages constitute an ephemeral form of communication. This misconception about how messages can be used could result in legal action being taken against [ORGANISATION] or individuals. All messages are subject to Data Protection and Freedom of Information Legislation and can also form part of the corporate record. Staff should also be aware that messages could be used as evidence in legal proceedings. This policy sets out the obligations that all members of staff have when dealing with messages. The policy was developed in Last updated March 2004 Page 8 of 44
9 consultation with [GROUP]. There are two main sections within the policy: the first concentrates on sending messages and the second concentrates on managing messages that have been sent or received. Staff should ensure that they are familiar with the content of the policy and use it as a point of reference when dealing with messages. To ensure staff members are familiar with the content of the policy [ORGANISATION] will provide training on the policy and keep staff aware of any changes that are made. Using (or Sending Messages) When to Use messages tend to be used to communicate various types of information both internally and externally. Information communicated via ranges from a formal record of proceedings to arranging refreshments for a meeting. Although it is possible for to be used in a variety of ways it does not follow that is always the best way of communicating. There are both advantages and disadvantages to communicating via and it is often the case that the advantages of sending an are disadvantages for the person receiving s. For example, allows people to send information to many people at the same but it is a frequent complaint that too many messages are received. To maximise the advantages and minimise the disadvantages of sending messages via the organisation needs to decide if there are any circumstances when an alternative means of communication should be used in preference to . For example to reduce messages being sent to everyone in the organisation it might be necessary to review the way in which the intranet is used and introduce a procedure relating to sending messages to everyone in the organisation. The way in which should be used for business communication will depend on the nature of the business of the organisation and partly on the culture of the organisation. For example some organisations might consider that discussions relating to the awarding of a contract should not take place via and that messages should only be sent as a way of ratifying a Last updated March 2004 Page 9 of 44
10 decision. When deciding what advice should be given on how should be used within an organisation there needs to be a clear understanding of the type of business that is being conducted, the way in which business is conducted and who are the various stakeholders involved. When drafting this section it should be recognised that it is likely to be the case that different areas of the organisation will use in different and possibly opposing ways. This section of the policy is intended to encourage staff to think about whether is the most appropriate and timely way to communicate information. It is essential that this section is not too prescriptive as the decision to send or not send an will be dependent on a number of factors. In the sample text for this section it is suggested that there are five major factors that affect the decision to send an , these factors could be used as a basis for considering when it is appropriate to send, or not send, an message. If there are specific instances when should not be used to communicate information these should be referenced in this section, with a detailed explanation in the section on Misuse. Due to the personal nature of messages members of staff should be made aware that it is their decision to write an message and that they are responsible for what they have written in an message. Sample Text: is not always the best way to communicate information as messages can often be misunderstood and the volume of messages people receive can be prohibitive to receiving a meaningful reply as a result of overload. It is the responsibility of the person sending an message to decide whether is the most appropriate method to communicate the information. The decision to send an should be based on a number of factors including: The subject of the message The recipient s availability The speed of transmission The speed of response The number of recipients Last updated March 2004 Page 10 of 44
11 The Subject messages can be used for different types of communication and can constitute a formal record of proceedings. The types of communication which can be used for include general business discussions, disseminating information, agreement to proceed and confirmation of decisions made. Although can be used for these types of communication, it may be necessary to consider whether the sensitivity of the information would be more appropriately communicated in a different way. Dealing with sensitive subjects in s is addressed in more detail in section [#]. It should also be noted that there are certain subjects that should be avoided in messages as they could be construed as discriminatory; this is covered in more detail in the section on misuse, section [#]. Recipient s availability messages are often sent unnecessarily due to the ease and convenience of writing an message. There are times when might not be the most appropriate way of communicating with people, for example if a message needs to be passed onto a person in the same office speaking to them face to face might be more productive, particularly if they receive large volumes of . If the person to whom the message is being delivered is not located in the office it might be better to phone them, depending on the subject or nature of the communication. When a message needs to be communicated to someone who is difficult to locate, for example they work in more than more office, then an message should be sent in preference to speaking to them either face to face or via the phone. Speed of transmission messages can be sent and delivered to the recipient quickly, which makes sending an message a good way of transmitting information if the information is needed quickly and the recipient is expecting the information. Where information needs to be communicated as a matter of urgency it is better to use the telephone. Last updated March 2004 Page 11 of 44
12 Speed of Response Although message can be sent and delivered quickly there is no guarantee that the message will be read or acted upon immediately. One of the perceived advantages of using is that it can be responded to at the recipient s convenience. If a message needs to be acted upon immediately or requires a quick decision is probably not the best way of communicating the information. Where an immediate action or response is required it is probably better to speak to the person directly and send confirmation if it is deemed to be necessary. Number of Recipients Although is often considered to be a good way of disseminating information to large groups it should be noted that there are some restrictions. The ability to send an to everyone in [ORGANISATION] is restricted to [NAME] and senior management. It is advised that if a message needs to be conveyed to everyone at [ORGANISATION] the message should normally be placed on the Intranet. If the message is particularly important an should be sent to [NAME] requesting that they send an to everyone detailing the nature of the information and providing a link to the appropriate point on the Intranet. It should be noted that only messages that are considered to be of immediate interest to the majority of staff at [ORGANISATION] would be sent to everyone. It should be noted that there are similar arrangements if an needs to be sent to everyone in a particular division or department. If you need to send an to everyone in a particular division or department please send a message to the mailbox for the division or department where a decision can be made about whether the message can be located on their part of the intranet or a oral message can be given at a departmental meeting. Last updated March 2004 Page 12 of 44
13 Writing Business Messages messages are often treated as a form of ephemeral communication even when they are used to communicate business decisions. One of the reasons for messages being treated as ephemeral is because it can be difficult to distinguish between ephemeral and business communication, particularly in the case of internal messages. It is important that the same care and attention is taken to compose an message as a formal business letter or an internal memo otherwise there is a danger that the intended message will not be understood or acted upon in the appropriate way. Although many members of staff will take care when sending external messages the same level of attention is not always given to internal messages, even though the message might provide the only evidence of an important business decision, for example agreement to proceed with a contract. It is important that staff are aware that in the electronic environment of writing messages the rules for conducting formal communication are similar to the paper environment of sending formal business letters particular in respect to rules for grammar and spelling. There are some special conventions for communication that staff should be made aware of in relation to both internal and external communications, for example not writing in capitals as it can be construed as shouting. This section should provide pointers and guidance on how to construct messages as opposed to presenting definitive rules. The guidance should enable staff to use their own style of writing while informing them of ways to ensure that the recipient will react in the intended manner, for example using an urgent flag in the appropriate way can ensure that the message is acted upon quickly. It is suggested that the aim of this section should be to encourage staff to think about the message they are writing before it is sent. Guidelines detailing areas to consider when drafting an message could be appended to the main policy so that they could act as a quick reference tool. Sample Text: When writing business messages it is important that consideration is given to the way in which the message is being conveyed. This includes thinking about the title, the text and the Last updated March 2004 Page 13 of 44
14 addressees. As a way of helping staff to draft s in an appropriate fashion for business use guidelines to drafting messages have been developed. These guidelines are intended to be a reference tool. It is up to the sender to decide to what degree to follow the guidelines, depending on their knowledge and level of familiarity with the recipient. The guidelines are appended to the main policy. Dealing with Sensitive Subjects Information relating to some subjects is too sensitive to be sent via . The precise nature of this information will vary according to the organisation concerned. There are three broad areas of sensitive information that could potentially be communicated via , information with National Security implications, information considered as commercial in confidence and personal information. It is important that these types of information are communicated with care as if these types of information are communicated to the wrong people it could result in the organisation and or members of staff concerned being involved in legal action or undesirable media attention. When formulating the area of the policy associated with handling sensitive subjects it is necessary to ensure that the policy is relevant to all the main types of sensitive information an organisation holds. It should be noted that the three types of sensitive information mentioned in the guidance are illustrative, some organisations may not hold all three types of sensitive information and some organisations may hold other types of sensitive information. Once it has been established what are the different types of sensitive information held by the organisation it will be necessary to decide the permissible ways of communicating each type of information. When considering how particular types of information should be communicated it will be necessary to consider if is to be used whether any additional protection is required, for example connecting to the Government Secure Intranet, encryption methods and disclaimers. The decision about which type of protection is required should be made according to the nature and type of business that is conducted. Last updated March 2004 Page 14 of 44
15 Technical methods used to protect sensitive information sent from an organisation should be considered carefully before they are implemented. For example, if it is decided that a method of encryption will be used it will be necessary to decide who will have access, the circumstances when encryption should be used and to ensure that the intended recipients have compatible systems. Using a disclaimer is a frequent method used to protect organisations from legal action if inappropriate information is sent from an address originating from an organisation s server. Although it may be prudent to use disclaimers as they may provide the organisation with some protection against potential legal action there is no guarantee that this will be the case. A more effective preventative measure against legal action would be to ensure that members of staff are made sufficiently aware about the types of information that should not be transmitted via through an policy and training. This section should provide a clear indication about how sensitive information should, or should not, be communicated via . It should not be necessary to list every specific type of sensitive information, although enough information should be given about the different types of sensitive information the organisation holds so that members of staff can identify sensitive information and understand how it should probably be treated. It is important that members of staff are aware that it is their responsibility treat and communicate sensitive information appropriately, ie decide whether or not it can be sent via . It is particularly important that this section contains a clear message that members of staff need to be extra cautious when writing and sending message that include personal details or where comments are made about the performance of a specific staff member or a group of staff. If there are any specific restrictions on the types of information that the organisation allows to be sent via these should be given in detail, for example all disciplinary matters must be either dealt with either in person or on paper, should not be used for this purpose. Sample Text: The privacy and confidentiality of the messages sent via cannot be guaranteed. It is the responsibility of all members of staff to exercise their judgement about the appropriateness of using when dealing with sensitive subjects. Staff are advised that all Last updated March 2004 Page 15 of 44
16 external s have a disclaimer at the footer of the to protect [ORGANISATION] from information being disclosed to unauthorised personnel, however there is no guarantee that this will protect individual personnel from potential legal action if s sent include unsupported allegations, sensitive or inappropriate information. Staff must ensure that all information of a sensitive nature that is sent via is treated with care in terms of drafting and addressing. Sensitive information sent via that is incorrect might provide a case for initiating legal proceedings against the person sending the information and/or the [ORGANISATION]. Sensitive information can include commercial information, information about specific individuals or groups and information covered by national security classification. When sending messages that contain sensitive information the following aspects MUST be considered: Information that has a National Security Classification higher than [CLASSIFICATION LEVEL] must not be sent via . If it is known that the computer system of an external message cannot contain information of a National Security Classification higher than [CLASSIFICATION LEVEL] the information must not be sent via . If in doubt do not send the information via . messages containing information that is not intended for general distribution should be clearly marked either in the title or at the beginning of the message, for example an message containing comments about the performance of a specific staff member or a group of staff. This should decrease the likelihood of the message being forwarded to unintended recipients. messages containing personal information are covered by the Data Protection Act and must be treated in line with the principles outlined in the Act. Under the Data Protection Act personal information includes opinions about an individual or the personal opinions of an individual. messages containing this type of information should only be used for the purpose for which the information was provided, be accurate and up to date, and must not be disclosed to third parties without the express permission of the individual concerned. messages that contain information that is not supported by fact should indicate that it is the sender s opinion that is being expressed. Last updated March 2004 Page 16 of 44
17 The encryption of messages is advocated in the following circumstances [LIST CIRCUMSTANCES]. The type of encryption recommended by [ORGANISATION] is [NAME], for further information on using encryption see [APPENDIX #]. Where a method of encryption has been used this must be communicated separately to the recipient. Misuse and Personal Use The informal way in which can be used can result in things being written which people would consider to be inappropriate writing in a letter or distributing to wide and unknown audience. As is often used in an informal way to communicate information and opinions there is a misconception that it can be treated on a par with speech. However unlike speech it can be difficult to convey the precise meaning and the written nature of means that if an opinion is expressed that might cause offence evidence can be produced to substantiate any disciplinary or legal action. The broadcasting capabilities of and the penalties of sending abusive s are much higher than if they were spoken. This is particularly true if defamatory comments (untrue comments made about an individual or organisation that lowers its standing in society) are made as the broadcasting nature of means that it is likely to be treated as libel and therefore there is no requirement to prove damage 1. misuse can be a problem within organisations and can also be difficult to detect. There are a variety of different types of misuse ranging from excessive personal use of to making discriminatory remarks. Organisations have a responsibility to ensure that all members of staff are aware about what types of comments are unacceptable in messages. If members of staff are unaware about what constitutes misuse an organisation could be held accountable for messages sent by individual members of staff. It should also be noted that unless members of staff are made aware about what constitutes misuse it might not be straightforward to issue disciplinary procedures. 1 Lloyd, Ian J (2000) Information Technology Law, Butterworths Last updated March 2004 Page 17 of 44
18 It is important that organisations decide what types of communication constitutes misuse within their organisation and communicates this to all members of staff. It is recommended that when an organisation develops the area of their policy on misuse it reflects the contents of any existing policies on equal opportunities, discrimination and disciplinary matters. It is also recommended that these policies indicate they also apply in an environment. It is advised that this section of the policy in particular is clearly visible and accessible to everyone working within the organisation. Organisations should consider the degree to which work accounts can be used for personal use. There are no specific guidelines on the degree to which should be permitted for personal use, although preventing members of staff from using work accounts for personal use may be considered to be too strict. It is important that a sense of proportionality is maintained when restricting the level of personal use. It might be worth incorporating the limitations of personal use in the terms and conditions of employment as a way of clarifying and enforcing what the organisation s expectations are in relation to employees using . If staff are allowed to use work accounts for personal use organisations must be aware of their obligations under article 8 of the Human Rights Act that states, Everyone has the right to respect for his private and family life, his home and his correspondence. Giving advice on what constitutes misuse is relatively easy however, policing the misuse of can be difficult. In order to detect instances of misuse it might be necessary to rely on complaints. Monitoring messages may be one method of gathering evidence of misuse. The implications of monitoring should be fully and carefully considered before it is agreed because of the sensitivities involved. The Information Commissioner has issued detailed guidance on what needs to be considered when monitoring employees activities in the workplace. 2 In essence the guidance states that if employees activities are monitored (including ) there is a need to clearly explain to all members of staff when monitoring would take place and the procedures that will be followed. It is also necessary to ensure that when monitoring takes place the individuals, whose activities are being monitored, are aware they are being monitored and which activities are being monitored, 2 Information Commissioner (2003), The Employment Practices Data Protection Code: Part 3: Monitoring at Work: Supplementary Guidance, accessed 12/9/2003 Last updated March 2004 Page 18 of 44
19 for example use. In order to comply with Data Protection legislation it is also necessary to explain how the data collected from monitoring will be treated. This section should give an unambiguous overview of the types of unacceptable use. The way in which this section is referred to will depend on its links to other policies. The sample text provided gives an indication of the main types of misuse however, there may be additional types of misuse that organisations need to mention which relate specifically to the nature of the business being conducted. Sample Text: There are types of use that are expressly prohibited and could result in formal disciplinary proceedings. In addition all members of staff are advised that messages can constitute a formal record and can be used as evidence in legal proceedings. For further information on managing messages as records refer to section [#]. When writing messages the following conditions must be met: Any behaviour or comments that are not permitted in the spoken or paper environment are also not permitted in messages. Care should be taken when composing messages to ensure they are inoffensive and cannot be construed as harassment. Downloading and forwarding material of a pornographic, sexist, racist or derogatory nature are all prohibited, refer to the [NAME OF POLICY] for further information about what exactly constitutes this type of behaviour. The impersonal nature of messages can mean that it is easier to cause offence than when speaking. If you are annoyed or angry about something take time to ensure the message does not inflame the situation. messages containing inaccurate information in the form of opinion or fact about an individual or organisation, may result in legal action being taken against the person sending the message and anyone forwarding the message on to others. The forwarding of chain mail is not permitted. Last updated March 2004 Page 19 of 44
20 The terms and conditions of the policy on [NAME OF POLICY relating to computer use] must be abided by. It is not permitted to conduct any business other than that of [ORGANISATION] via . Only authorised personnel should access accounts. A restricted level of personal use of the work account is permitted provided the following conditions are met: The sending of messages does not interfere with work commitments. The messages do not constitute misuse of , as detailed above. To protect the network messages are routinely scanned to ensure they do not contain viruses. messages that are suspected of containing viruses will be retained by [NAME]. An will be sent to the intended recipient asking them if they are expecting an attachment. The message and the attachment will only be forwarded if an affirmative reply is received. The message and the attachment will be retained by [NAME] for [# WEEKS] before being deleted. Members of staff are advised that the content of messages will be monitored if they are suspected of misusing or excessive personal use. However, the content of messages is not routinely monitored. Any member of staff who has the content of their messages monitored will be informed before the monitoring takes place. If no further action is to be taken as a result of monitoring the content of messages then all the data collected as a result of the monitoring will be destroyed immediately. If further action is taken as a result of monitoring the content of messages the data will be stored for [X] years. Last updated March 2004 Page 20 of 44
Information Governance Performance Manager. Important Note: The Intranet version of this document is the only version that is maintained.
Document Summary DOCUMENT NUMBER DATE RATIFIED POL/002/004 14 October DATE IMPLEMENTED October 2013 NEXT REVIEW DATE October 2015 ACCOUNTABLE DIRECTOR POLICY AUTHOR Director of Business Development Information
AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Executive Director (AK) [J50]
AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Committee: Policy and Resources Date: 23 rd June 2009 Author: Executive Director (AK) [J50] 1.0 ISSUE 1.1
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
Evidence additional element appendix 47. Records Management Guidance for the management of emails
Records Management Guidance for the management of emails 2010 1 Document Control Sheet Name of Document: Guidelines for the Management of Emails as Records 2010 Author: Consultees Description of Content:
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
and Internet Policy
Email and Internet Policy Responsible Officer Authors Date effective from July 2008 Ben Bennett, Business Planning & Resources Director Policy Development Group Date last amended December 2012 Review date
Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY
TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY Council Resolution No 313/03 adopted at the Ordinary Meeting of Council on 19 August 2003. PURPOSE
Advice leaflet Internet and e-mail policies
Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
Email Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:
E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:
Internet, E-mail and SMS Texting Usage Policy Group Policy
Internet, E-mail and SMS Texting Usage Policy Group Policy Scope: This Orbit Housing Group Limited ( Group ) policy provides a set of guidelines for all users within the Group on the proper usage of the
E-SAFETY POLICY 2014/15 Including:
E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
Email Policy For Staff and Students
Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management
Email Usage Policy Document Profile Box
Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee
PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Email Management and Data Storage Policy. Version 1.4
PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN Email Management and Data Storage Policy Version 1.4 Document Control Title: Reference: Original Author(s): Owner: Distribution: Reviewed by: Quality Assured
Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:
Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury
Email Services Policy
Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages
Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
Information Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
Unless this copy has been taken directly from the Trust intranet site (Pandora) there is no assurance that this is the most up to date version
Policy No: OP17 Version: 6.0 Name of Policy: Internet, Intranet and Email Acceptable Use Policy Effective From: 04/08/2015 Date Ratified 04/03/2015 Ratified Health Informatics Assurance Committee Review
HUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
Minor, for the purposes of this policy, is an individual who has not attained the age of 17.
POLICY TITLE: Computer and Network Services: Acceptable Internet Use Policy POLICY NO: 698 PAGE 1 of 9 GENERAL Internet access is a service provided for students and staff members by this school district.
Code of Practice for E-mail Users
Code of Practice for E-mail Users Page 1 of 7 May11/ver02 1. Be concise and to the point Do not make an e-mail longer than it needs to be. Remember that reading an e-mail is harder than reading printed
THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction
THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction In accordance with its broader strategic objectives, The University of the West Indies (the UWI) promotes the
43: DATA SECURITY POLICY
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
Electronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE
GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving
Acceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
[Example] Social Media Acceptable Use Policy
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:
POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
With the increasing popularity of social media you need a Social Media Policy to protect your company.
Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
Acceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Bergen Community College reserves the right to monitor its information technology resources and telecommunications network to protect the integrity of its
How to Monitor Employee Web Browsing and Email Legally
WHITEPAPER: HOW TO MONITOR EMPLOYEE WEB BROWSING AND EMAIL LEGALLY How to Monitor Employee Web Browsing and Email Legally ABSTRACT The Internet and email are indispensable resources in today s business
Email policy and practice
Email policy and practice This policy applies to all staff (including agency workers, casual and temporary staff), visitors, contractors, students, alumni and researchers of Anglia Ruskin University, and
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation
Assistant Director of Facilities
Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
3. Electronic Mail (E-mail)
- Title of Agency - Internet Acceptable Use Policy The Following Internet Acceptable Use Policy Applies to the (AGENCY NAME) Staff 1. Introduction The (AGENCY NAME) provides its staff and (other entity(s)
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)
ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved
Medina County Policy Manual
Medina County Policy Manual Policy: Computer & Network Usage Section: Work Rules Number: 7.015 Issued: 09/17/07 Reviewed/Revised: Page #: 1 of 5 A. It is the intent of Medina County to provide local, network,
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
Internet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards
EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data
INTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
Training sessions on the various communication methods will be made available at least once yearly. E-mail Guidelines
Approved by: Academic Coordinating Committee Authorizer: Manager, Corporate Communications Effective Date: September 1, 2010 E-mail, Voice Mail and Corporate Calendar Guidelines Note: It is recommended
Email Etiquette (Netiquette) Guidance
Email Etiquette (Netiquette) Guidance January 2007 Email Etiquette (Netiquette) Guidance January 2007-1/13 Version Control Version Author(s) Replacement Date 1.0 Timothy d Estrubé Information Governance
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
and Internet Policy
Email and Internet Policy April 2016 www.peopleknowhow.org Version: 04 Date Approved: April 2016 Scheduled Review Date: May 2017 Contents 1. Statement of Policy 3 2. Scope of Policy 3 3. Responsibilities
www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail
www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail Contents PREFACE...3 DID YOU KNOW?...4 Make better use of time... 4 Manage the mass of information... 5 Avoid
IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy. Notification of Policy Release: Distribution by Communication Managers
IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&TPP No. 2 Email Policy Version 3.04
Using Public Computer Services in Somerset Libraries
Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which
TECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
Information Management Policy
Title Information Management Policy Document ID Director Mark Reynolds Status FINAL Owner Neil McCrirrick Version 1.0 Author Deborah Raven Version Date 26 January 2011 Information Management Policy Crown
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
Managing Email Policy. January 2013
Managing Email Policy January 2013 Document Control Title Managing Email Policy Prepared By Records Manager, December 2012 Approved By Head of Corporate Services Division Date of Approval 24 January 2013
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
THE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES
THE PERSONAL USE OF INTERNET, E-MAIL AND TELEPHONES In summary the telephone, fax, E-mail and Internet should NOT be used: For personal gain or profit. To represent yourself as someone else. To send, post,
LOTUS NOTES USER PROTOCOLS
LOTUS NOTES USER PROTOCOLS Introduction From monitoring how South Yorkshire Police staff make use of the software, it became apparent that there was a need for a set of regulatory instructions to supplement
Cloud (educational apps) software services and the Data Protection Act
Cloud (educational apps) software services and the Data Protection Act Departmental advice for local authorities, school leaders, school staff and governing bodies October 2014 Contents 1. Summary 3 About
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
Email standards, protocol and guidance
Email standards, protocol and guidance July 2010 1 Email standards, protocol and guidance A good guide to communications for staff Introduction The following guidance introduces good practice for writing
About Your Email Policy Kit
Email Policy Kit About Your Email Policy Kit About Your Email Policy Kit... 2 Email Policy 101... 3 Designing an Email Policy: Key Sections... 4 Sample Records Retention Policy for Electronic Mail... 11
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.
Privacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08
Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable
Complying with the Records Management Code: Evaluation Workbook and Methodology. Module 8: Performance measurement
Complying with the Records Management Code: Evaluation Workbook and Methodology Module 8: Performance measurement Module 8: Performance measurement General 10.1 Many of the questions in the earlier modules
Guide 4 Keeping records to meet corporate requirements
Guide 4 Keeping records to meet corporate requirements This guidance has been produced in support of the good practice recommendations in the Code of Practice on Records Management issued by the Lord Chancellor
COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT
COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT 1. Introduction The Company is committed to maintaining ethical standards in the conduct of its business activities. The Company's reputation as an ethical
COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1
COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1 1. INTRODUCTION The purpose of this policy is to: I. Regulate access to Manukau Institute of Technology ( MIT ) Computer Systems ensuring they
THE LONG EATON SCHOOL
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
Online Research and Investigation
Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law
Electronic Communications and. Guidance note and template policy
Electronic Communications and Internet policy Guidance note and template policy When employing staff it is useful to create a policy which sets out your standards and requirements of your staff when they
