Internet Liability. Social Networking. Cyber Liability & Social Media Risks Paula Burns, CIC, CRM 7/10/2014. Cyber Risks / Top 3 Exposures

Size: px
Start display at page:

Download "Internet Liability. Social Networking. Cyber Liability & Social Media Risks Paula Burns, CIC, CRM 7/10/2014. Cyber Risks / Top 3 Exposures"

Transcription

1 Cyber Liability & Social Media Risks Paula Burns, CIC, CRM Cyber Risks / Top 3 Exposures Internet Liability Network Security Social Networking Cyber Liability Challenges Cyber Risk is ever evolving and hard for people to grasp. Not tangible like risk to property or people Insurance policies are expensive 1

2 Can you see the tangible risk here? How about here? We can definitely see the risk here 2

3 Scope of this class: Discuss the top 3 Cyber Liability Exposures Identify risk and define it Discuss loss control techniques SIMPLIFY: practically apply this to the nonprofit s operations Discuss Internet Liability and the exposures related to it. We will learn how to reduce this risk for the non-profit organizations we work with Definition of Internet Liability: The display, transmission, dissemination or other use of Matter in a cyberspace environment. Matter is defined as printed, verbal, numerical, audio or visual expression. Church / School Internet Liability Risks Computer Virus Intellectual Property Invasion of Privacy Security Breaches s Torts in Cyberspace Wrongful Conduct of Employees / Students Posting of Photos 3

4 Computer Virus Internet Liability Risks / Computer Virus Computer Virus Accidental introduction of virus or malicious code Can cause damage to organization s computer network and systems ( First party loss) Discuss possibility of third party loss Reducing the Risk of Computer Virus Anti virus software installed Employee Training / Awareness of Risk Internet-Use Policy Do not open suspicious s or chain letters Do not download from other than approved sites. ( Screensavers, etc ) 4

5 The Gatekeeper Reducing the Risk of Computer Virus Gatekeeper They approve downloads Monitor computers / virus alerts Virus software and downloads up to date Are aware of the risks associated with computer viruses and operations. The Gatekeeper Who is the gatekeeper for your organization? 5

6 Intellectual Property Intellectual Property 2 Categories of Intellectual Property 1.Industrial Property 2.Copyright Intellectual Property Industrial Property: Trademark Infringement falls under the category of industrial property Defined as a word, phrase, logo, design, or anything that is used to identify that product. 6

7 Intellectual Property / Trademark Infringement / Industrial Prop. It distinguishes it from other competitors products. Some Examples are: Like a Good Neighbor. Just Do It. Who s add campaign is this? Good to the last. Maxwell House Good hands people. Who s slogan is this? The umbrella. What insurance company is this? Reducing the Risk of Trademark Infringement Training the Gatekeeper Limit access to your webpage Do not put slogans or other distinguishing product identifiers on your website unless you have written permission! (Example of our website & Travelers) Intellectual Property / Copyright Infringement Copyright Infringement Copyright Defined: form of protection for authors of original works of authorship. Website b Linking ( You Tube) Clip Art or Images Posting of Songs on Internet Site Be Cautious of Using Copyrighted Text 7

8 Intellectual Property / Copyright Infringement Sermons are Intellectual Property Original i Works of Authorship hi Subject to Copyright Laws Reducing the Risk of Copyright Infringement Training the Gatekeeper Limit access to your webpage Do not post any copyrighted material on your website without getting written permission! Invasion of Privacy 8

9 Invasion of Privacy Invasion of Privacy- May consist of any one or more of the following. Disclosing to the public private facts about a person Using another person s name or likeness Placing someone in a "false light" in the public eye Intruding upon another's seclusion (illegal search of home, eavesdropping, etc.) Invasion of Privacy / Posting Photos Online / Or Videos Express Consent written consent. Always get this form of consent when dealing with posting photos of a minor online. Texas as well as most states have passed the Uniform Electronic Transactions Act. Allows web based consents to be enforceable, just like written consent. Church must verify their online procedure complies with the act. Invasion of Privacy / Posting Photos Online / Or Videos Online Consent / Be sure NOT to use this method of express consent when getting a medical release signed. Hospitals and emergency centers have their own guidelines and may not take a copy of this electronic acknowledgement, many require the parents signature. 9

10 Invasion of Privacy / COPA COPA was established to protect children and applies to commercial websites. While churches are not in this category, voluntary compliance reflects due diligence and care to protect children that the church should always exhibit. Invasion of Privacy / COPA Children s Online Protection Act Recommend that the church comply with this act as a best practice. Can not post identifying information next to the photo of a child. Their name, address, phone number Where they go to school Where they live Any other identifying factors Invasion of Privacy / Posting Photos Online / Or Videos Express consent is almost impossible to gain for the videoing of services: Implied Consent consent gained by posting regular announcements in the church bulletin that state the church will be video taping and photographing services. These may be used in publications, released online, in video or photo format. If anyone should object, please see the church office. 10

11 Prayer Requests Invasion of Privacy / Prayer Requests Prayer Lists / Requests If posting these online, get express consent! Train leadership in this area. Ex: of issue with Sunday school class (facebook). Gatekeeper keeps a list of those NOT wanting requests posted. Discussion Boards / Blogging 11

12 Discussion Boards / Blogging Can lead to claims of : defamation of character, libel, slander, infliction of emotional distress, disparagement to the character of a person or organization. Huge Risk to the Ministry! Don t post comments on site that would encourage disparaging remarks Mandatory registration required for posting on website Must have Gatekeeper! Blogging Hazards / Employees Private affairs of a member Slander or libel another individual Reveal a trade secret of the church. ( unlisted phone number, private address, member s address) Could spend work hours blogging and not working Could post copyrighted material Implement a Blogging Policy Points to consider: Employee must notify church if they are going to maintain a personal blog. Put a disclaimer on site Prohibit employee from posting church s policies and procedures or trade secrets. Prohibit use of racial slurs, personal insults, obscenity Avoid using names of members Limit employees time blogging 12

13 Electronic Policy Electronic Policy Be sure your church has an Electronic Mail Policy in Place: Points to consider: Do not open s from unknown senders. Limit s to business use only. The church prohibits inappropriate s, including cyber bullying. Electronic Policy Do not forge an . To create an policy specific for your church contact an attorney to assist and review your guidelines. Do not send or open junk or send chain letters. 13

14 Wrongful Conduct of Employees Theft of Employee Privacy Information or Members Private Information: We will discuss this in detail in the Network Security Section. Wanted to point it out here as it is an overlapping risk. Most of the time theft of private information comes from within the organization. Wrongful Conduct of Employees Harassment of a Third Party by This is an emerging risk that we need to pay attention to. Discussion on safeguards. This is a form of cyber bullying. Ask your insurance advisor to include third party liability in your employment practices liability quote to cover this exposure. Wrongful Conduct of Employees Introduction of Computer Virus: Disgruntled employees can release computer viruses into computer systems for retaliation. 14

15 Wrongful Conduct of Employees Personal Web Surfing: Daily Hours? Define Network Security; discuss related exposures and how to reduce this risk. Network Security: the process of protecting your computer network from any security breach. Network Security Security Breach Defined: 1.Unauthorized Access of Your Computer 2.Failure of Computer Security System. ( Hacking) 3.Infection of Church Computer by Virus/ Malicious Code. 4.Infecting Third Party Computer. 15

16 Network Security Risk from unauthorized access / Security Breach Identity Theft Theft of Employee private information: Social Security Number, Name, DOB, Address, Etc. All of this private information is normally stored on the server. Network Security Third Party Data Breach Stolen credit card information or account numbers from church members or student s parents who may have reoccurring payments scheduled. These would be losses that occur, not handled by a TPA. Network Security Resulting Damages Possible Could result in fraud / damages paid out. Expenses to comply with Privacy Regulations. Counseling/ Pro-active monitoring services. Public Relations expenses. How can this apply? Discuss this. 16

17 Network Security Forensic Analysis Costs Costs to determine any deficiencies in your systems, procedures or physical security that may have contributed to data breach. Network Security Online Giving Normally contracted with a TPA (third party administrator). Transfer of risk via contract. What does the contract say? Are they insured? Get a certificate of insurance. Be sure they have crime / employee dishonesty coverage. Remember most theft of data comes from an internal source. Financial Stability of TPA. Discuss the phenomenon of Social Networking and the related risks for organizations. What are some benefits of social networking for the church today? Discussion: 17

18 Social Networking What are some risks associated with social networking? Discussion Time: Facebook / Texting Social Networking / Mitigation Sample disclaimer for Facebook page: The opinions expressed on this site are the opinions of the participating user. church acts only as a passive conduit for the online distribution and publication of user-submitted material, content and/or links and expressly DOES NOT endorse any use-submitted material, content and/or links or assume liability for any actions of the participating user. Social Networking / Mitigation Methods to control risk: Site Security Settings Checks & Balances System (Gatekeeper) Get written consent to post photos! Procedures in place for adults communicating with minors through social networking. (Buddy system) Employee handbook amendment with a Social Networking policy. 18

19 Social Networking / Mitigation Employee Handbook Amendment Recommended Points to Include: Staff will conduct themselves in a respectful manner when posting to any social networking site. Do not list comments that could defame another person or provoke inappropriate statements. No confidential, sensitive or privation information disclosed! Ever! We re Done! / Questions Contact Information Paula Burns, CIC, CRM Insurance One Agency 9303 New Trails Drive, Ste. 475 The Woodlands, TX Office#: (281)

section 15 Computers, Email, Internet, and Communications

section 15 Computers, Email, Internet, and Communications section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property

More information

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,

More information

MTNL MUMBAI FREE EMAIL SERVICES Terms and Conditions

MTNL MUMBAI FREE EMAIL SERVICES Terms and Conditions MTNL MUMBAI FREE EMAIL SERVICES Terms and Conditions Welcome to MTNL Mumbai Email services. MTNL Mumbai provides e-mail services pursuant to the terms and conditions set forth below. By using MTNL Mumbai

More information

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in

More information

FMGateway by FMWebschool

FMGateway by FMWebschool FMGateway by FMWebschool Hosting Service Agreement 1. OVERVIEW This Hosting Service Agreement (this Agreement ) is entered into by and between FMWebschool, LLC, a/an Delaware limited liability company

More information

North Clackamas School District 12

North Clackamas School District 12 North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

BOBCAT COMPUTING POLICY

BOBCAT COMPUTING POLICY BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,

More information

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP

More information

JHSPH Acceptable Use Policy

JHSPH Acceptable Use Policy 1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose

More information

This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).

This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ). Social Media Terms of Use Social media is an integral part of Historica Canada s communications efforts, offering an additional model to engage with participants, colleagues, other stakeholders and the

More information

Communications 01: Social Media

Communications 01: Social Media Communications 01: Social Media Policy: To communicate the Network s mission publicly, to inform and engage the community regarding the Network s activities, and to establish appropriate and professional

More information

YU General Guidelines for Use of Social Media

YU General Guidelines for Use of Social Media INTRODUCTION AND SCOPE General Guidelines for Use of Social Media Social media can be a valuable and powerful means of communication. Yeshiva University and its constituent schools (collectively, the University

More information

Virginia Commonwealth University Police Department

Virginia Commonwealth University Police Department Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media

More information

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage. Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or

More information

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.

More information

School District and Campus Web Sites: More than Meets the Eye

School District and Campus Web Sites: More than Meets the Eye School District and Campus Web Sites: More than Meets the Eye A surprising number of legal and policy issues are raised in the creation and maintenance of school district Web sites. Whether your school

More information

PERSONAL AND ADVERTISING INJURY COVERAGE FOR PROFESSIONAL ATHLETES, SPORTS LEAGUES AND ASSOCIATIONS

PERSONAL AND ADVERTISING INJURY COVERAGE FOR PROFESSIONAL ATHLETES, SPORTS LEAGUES AND ASSOCIATIONS PERSONAL AND ADVERTISING INJURY COVERAGE FOR PROFESSIONAL ATHLETES, SPORTS LEAGUES AND ASSOCIATIONS By Michelle Worrall Tilton UIA - 55 th Congress, Miami, FL November 2, 2011 Liability Insurance Terms

More information

GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE

GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE IF YOU HAVE A MEDICAL EMERGENCY, YOU ARE INSTRUCTED IMMEDIATELY TO CALL EMERGENCY PERSONNEL (911). DO NOT RELY ON THIS WEBSITE OR THE INFORMATION PROVIDED

More information

Covered California. Terms and Conditions of Use

Covered California. Terms and Conditions of Use Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products

More information

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of

More information

Rules of the Road for Users of Smithsonian Computers and Networks

Rules of the Road for Users of Smithsonian Computers and Networks Rules of the Road for Users of Smithsonian Computers and Networks Introduction Smithsonian systems, networks and other computer resources are shared among Smithsonian employees, interns, visiting scholars,

More information

Social Media In the Workplace

Social Media In the Workplace Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee

More information

As with most things, insurance should be

As with most things, insurance should be Insurance Buyers News Property & Liability 300 Montgomery Street Suite 450 San Francisco, CA 94104 415-820-2200 www.pennbrookinsurance.com Insurance Buyers News March/April 2012 Volume 23 Number 2 Data

More information

WEBSITE & SOCIAL MEDIA PRIVACY POLICY

WEBSITE & SOCIAL MEDIA PRIVACY POLICY WEBSITE & SOCIAL MEDIA PRIVACY POLICY This website is the property of Girls on the Run of Northern Virginia ( Girls on the Run ), an Independent Council of Girls on the Run International, Inc. of Charlotte,

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

City of Grand Rapids ADMINISTRATIVE POLICY

City of Grand Rapids ADMINISTRATIVE POLICY City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC

More information

LE.201 Employee Privacy Rights in the Electronic/Social Media Age

LE.201 Employee Privacy Rights in the Electronic/Social Media Age LE.201 Employee Privacy Rights in the Electronic/Social Media Age INSTRUCTORS Tony Puckett Dara Wanzer Welcome to the Electronic Age The Internet age has resulted in a host of new types of communications,

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

Terms and Conditions

Terms and Conditions Below are the first 5 pages of our 11-page attorney-drafted WEBSITE AND BLOG TERMS AND CONDITIONS AGREEMENT (TERMS OF USE) Most terms of use agreements being offered on the Internet are only 3-5 pages

More information

FAX-TO-EMAIL END-USER LICENSE AGREEMENT

FAX-TO-EMAIL END-USER LICENSE AGREEMENT FAX-TO-EMAIL END-USER LICENSE AGREEMENT This Agreement, which governs the terms and conditions of your use of the Fax-to-Email Services, is between you ("you" or "End-User") and ( we, us, our or Company

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06. REFERENCE: Board Rule 2.16 PAGE 1 OF 6

TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06. REFERENCE: Board Rule 2.16 PAGE 1 OF 6 LAKE-SUMTER COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06 REFERENCE: Board Rule 2.16 PAGE 1 OF 6 1. General Information a. LSCC Information Systems (IS)

More information

The Web site is owned by the State of Minnesota, Department of Employment and Economic Development, hereinafter MinnesotaWorks.net.

The Web site is owned by the State of Minnesota, Department of Employment and Economic Development, hereinafter MinnesotaWorks.net. Disclaimer The Minnesota Department of Employment and Economic Development is providing this information (the Website ) as a public service and the information contained within it is continually under

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016

Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 PURPOSE Christian Academy of Knoxville provides technology resources for the school community with a belief that the educational

More information

BOARD OF EDUCATION POLICY

BOARD OF EDUCATION POLICY BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate

More information

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

Superintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS

Superintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS Page 1 of 7 ELECTRONIC COMMUNICATIONS 1.0 The District supports the use of the Internet and electronic communications by all employees to improve teaching and learning through interpersonal communication,

More information

Terms of Service. This online privacy policy applies only to information collected through our website and not to information collected offline.

Terms of Service. This online privacy policy applies only to information collected through our website and not to information collected offline. Terms of Service Privacy Policy Mahavitaran (mahadiscom) respects and protects the privacy of the individuals that access the information and use the services brought through them. Individually identifiable

More information

TERMS OF USE AGREEMENT

TERMS OF USE AGREEMENT TERMS OF USE AGREEMENT Last Updated: October 20, 2010 PLEASE READ THIS TERMS CAREFULLY BEFORE ACCESSING THE WEBSITE I GENERAL 1) The Web Portal MEGA BRAZIL TV is a part of the MEGA LOPES, LLC family of

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND

More information

Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement

Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to interconnected computer systems within the district

More information

Terms of Use Gateway Clipper Website

Terms of Use Gateway Clipper Website Terms of Use Gateway Clipper Website General Information Regarding These Terms of Use Master terms: Unless otherwise noted on a particular site or service, these master terms of use ( Master Terms ) apply

More information

Bank Independent Bank to Bank Transfer Addendum (Consumers Only)

Bank Independent Bank to Bank Transfer Addendum (Consumers Only) Bank Independent Bank to Bank Transfer Addendum (Consumers Only) This Bank to Bank Transfer Addendum (this Addendum ) is an addendum to your Online Banking Agreement and Electronic Funds Transfer Act Notice,

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

IRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT

IRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT IRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT Revised 2011 IRON MOUNTAIN PUBLIC SCHOOLS ACCEPTABLE USE POLICY FOR ELECTRONIC RESOURCES All Iron Mountain Public

More information

Terms of Submission In order to participate, you must be at least eighteen (18) years old.

Terms of Submission In order to participate, you must be at least eighteen (18) years old. Terms of Submission NBCUniversal Media, LLC company ( NBCU ) located at 30 Rockefeller Plaza, New York, NY 10112, invites you to join in on the fun with The Tonight Show Starring Jimmy Fallon (the Show

More information

FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION

FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION DATE: June 10, 2015 REGULATION CHAPTER NO.: Chapter 5 REGULATION CHAPTER TITLE: Miscellaneous REGULATION TITLE AND NUMBER:

More information

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network

More information

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.

More information

Westwood Baptist Church Computer use Policy

Westwood Baptist Church Computer use Policy Westwood Baptist Church Computer use Policy I. Policy Statement The use of Westwood Baptist Church automation systems, including computers, fax machines, and all forms of Internet/Intranet access, is for

More information

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator POLICIES AND PROCEDURES NEW JERSEY EARLY INTERVENTION SYSTEM No: NJEIS-17 Subject: Computers & Electronic Records Effective Date: May 1, 2011 Responsible Party: Part C Coordinator I. Purpose To protect

More information

Broward County Website Terms of Use

Broward County Website Terms of Use Broward County Website Terms of Use Table of Contents 1. Terms of Use... 1 1.1 User Acceptance of Terms of Use... 1 1.2 Public Participation Forums... 1 1.3 Privacy Policy... 2 1.4 What We Collect and

More information

DISS TOWN COUNCIL SOCIAL MEDIA POLICY

DISS TOWN COUNCIL SOCIAL MEDIA POLICY DISS TOWN COUNCIL SOCIAL MEDIA POLICY Adopted at the Policy & Finance Committee Meeting on 19 th June 2013 DISS TOWN COUNCIL SOCIAL MEDIA POLICY CONTENTS Page 3 Introduction Definition of Social Media

More information

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating

More information

YWCA Metro St. Louis Social Media Policy

YWCA Metro St. Louis Social Media Policy YWCA Metro St. Louis Social Media Policy I. Purpose Social media encompasses a growing collection of online technologies and tools that allow and encourage users to interact and build relationships by

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

COMMUNITY COLLEGE SYSTEM OF NEW HAMPSHIRE

COMMUNITY COLLEGE SYSTEM OF NEW HAMPSHIRE COMMUNITY COLLEGE SYSTEM OF NEW HAMPSHIRE Section: 300 Human Resources Subject: 320 Employment Policy: Information Technology Date Approved: June 16, 2009 Acceptable Use Policy #: 321.01 Date of Last Amendment:

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE Policy Manual page 1 STUDENT E-MAIL, INTERNET AND COMPUTER USE Access to the Internet is being offered by Mentor Public Schools through the IT Department. The District is also pleased to provide its students

More information

Iowa County Government Social Media Use Policy

Iowa County Government Social Media Use Policy Iowa County Government Social Media Use Policy This policy outlines appropriate use of social media, as it relates to Iowa County, by employees and departments for official and personal use. This policy

More information

TERMS OF USE & SERVICE

TERMS OF USE & SERVICE TERMS OF USE & SERVICE We request that you read these Terms of Use carefully. IMPORTANT! THESE TERMS OF SERVICE (TOS) GOVERN YOUR USE OF THIS SITE, WHICH IS PROVIDED BY OUR COMPANY. BY ACCESSING THIS SITE,

More information

How To Use Social Media At St James Anglican School

How To Use Social Media At St James Anglican School P o l i c i e s n P r o c e d u r e s n I n f o r m a t i o n T o t a l n u m b e r o f p a g e s 2 P o l i c y C r e a t i o n D a t e : 2 4 S e p t e m b e r 2 0 1 4 P o l i c y R e v i e w D a t e :

More information

Executive Memorandum No. 16

Executive Memorandum No. 16 OFFICE OF THE PRESIDENT Policy for Responsible Use of University Computers and Information Systems 1. Purpose It is the purpose of this Executive Memorandum to set forth the University's administrative

More information

Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement

Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to the Internet, and a Bring

More information

------------------- COMPUTER NETWORK AGREEMENT FORM

------------------- COMPUTER NETWORK AGREEMENT FORM COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.

More information

Acceptable Use Policy of UNWIRED Ltd.

Acceptable Use Policy of UNWIRED Ltd. Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources

Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources Appendix I The City University of New York Policy on Acceptable Use of Computer Resources Introduction CUNY s computer resources are dedicated to the support of the university s mission of education, research

More information

TERMS AND CONDITIONS

TERMS AND CONDITIONS TERMS AND CONDITIONS 1. Your Acceptance Welcome to the website operated by Joint Aid Management ( JAM ) International. By using or visiting this website, you signify your agreement to the terms and conditions

More information

Bank Independent Online Financial Management Addendum

Bank Independent Online Financial Management Addendum Bank Independent Online Financial Management Addendum This Online Financial Management Addendum (this OFM Addendum ) is an addendum to your Online Banking Agreement and Electronic Funds Transfer Act Notice

More information

Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy

Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy The Coventry Public Schools encourages the use of digital technology for teaching and learning, for professional responsibilities,

More information

COLCHESTER HIGH SCHOOL SOCIAL MEDIA POLICY

COLCHESTER HIGH SCHOOL SOCIAL MEDIA POLICY Date of this version: January 2015, to be reviewed January 2016. Page 1 At a glance: This policy sets out expectations for professional and personal social media use. It sets out what all staff should

More information

COMPUTER, NETWORK AND INTERNET USE POLICY

COMPUTER, NETWORK AND INTERNET USE POLICY 4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate

More information

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

Acceptable Use of Computing and Information Technology Resources

Acceptable Use of Computing and Information Technology Resources Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,

More information

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common

More information

BRIGHAM AND WOMEN S HOSPITAL

BRIGHAM AND WOMEN S HOSPITAL BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and

More information

Pacific Northwest University of Health Sciences

Pacific Northwest University of Health Sciences Effective: 7/01/06 Exec. Lead: Chief Business Officer Revised: 1/11 Approved By: Board of Trustees Expired: n/a Applies To: University-wide Pacific Northwest University of Health Sciences Policy: Computer,

More information

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is

More information

Privacy Policy and Terms of Use

Privacy Policy and Terms of Use Privacy Policy and Terms of Use Pencils of Promise, Inc. ( PoP, we, us or our ) shares your concern about the protection of your personal information online. This Privacy Policy and Terms of Use ( Policy

More information

(Internet) for students, staff and, if requested, members of the Board of Education. All computer

(Internet) for students, staff and, if requested, members of the Board of Education. All computer 4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international

More information

Instruction. Neoga Community Unit School District #3 Page 1 of 5

Instruction. Neoga Community Unit School District #3 Page 1 of 5 Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each

More information

8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you.

8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you. 1. Acceptance of Terms Welcome to s Social Trading (the Social Trading Features ). Social Trading Features provide an integrated solution of equity trading and exploration of interactions among investors

More information

Public charities are all 501(c)(3) but have various missions. Each mission carries significant risks and innocuous risks. Amount of risk depends upon:

Public charities are all 501(c)(3) but have various missions. Each mission carries significant risks and innocuous risks. Amount of risk depends upon: Public charities are all 501(c)(3) but have various missions. Each mission carries significant risks and innocuous risks. Amount of risk depends upon: Scale of operation: revenue, assets, staff. Town,

More information

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services Bureau

More information

IPInfoDB Web Service Agreement

IPInfoDB Web Service Agreement IPInfoDB Web Service Agreement PLEASE READ THIS WEB SERVICE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING IPINFODB SERVICES. BY CHECKING THE I HAVE READ, UNDERSTAND AND AGREE WITH THE SERVICE

More information