Internet Liability. Social Networking. Cyber Liability & Social Media Risks Paula Burns, CIC, CRM 7/10/2014. Cyber Risks / Top 3 Exposures
|
|
- Martin Cobb
- 7 years ago
- Views:
Transcription
1 Cyber Liability & Social Media Risks Paula Burns, CIC, CRM Cyber Risks / Top 3 Exposures Internet Liability Network Security Social Networking Cyber Liability Challenges Cyber Risk is ever evolving and hard for people to grasp. Not tangible like risk to property or people Insurance policies are expensive 1
2 Can you see the tangible risk here? How about here? We can definitely see the risk here 2
3 Scope of this class: Discuss the top 3 Cyber Liability Exposures Identify risk and define it Discuss loss control techniques SIMPLIFY: practically apply this to the nonprofit s operations Discuss Internet Liability and the exposures related to it. We will learn how to reduce this risk for the non-profit organizations we work with Definition of Internet Liability: The display, transmission, dissemination or other use of Matter in a cyberspace environment. Matter is defined as printed, verbal, numerical, audio or visual expression. Church / School Internet Liability Risks Computer Virus Intellectual Property Invasion of Privacy Security Breaches s Torts in Cyberspace Wrongful Conduct of Employees / Students Posting of Photos 3
4 Computer Virus Internet Liability Risks / Computer Virus Computer Virus Accidental introduction of virus or malicious code Can cause damage to organization s computer network and systems ( First party loss) Discuss possibility of third party loss Reducing the Risk of Computer Virus Anti virus software installed Employee Training / Awareness of Risk Internet-Use Policy Do not open suspicious s or chain letters Do not download from other than approved sites. ( Screensavers, etc ) 4
5 The Gatekeeper Reducing the Risk of Computer Virus Gatekeeper They approve downloads Monitor computers / virus alerts Virus software and downloads up to date Are aware of the risks associated with computer viruses and operations. The Gatekeeper Who is the gatekeeper for your organization? 5
6 Intellectual Property Intellectual Property 2 Categories of Intellectual Property 1.Industrial Property 2.Copyright Intellectual Property Industrial Property: Trademark Infringement falls under the category of industrial property Defined as a word, phrase, logo, design, or anything that is used to identify that product. 6
7 Intellectual Property / Trademark Infringement / Industrial Prop. It distinguishes it from other competitors products. Some Examples are: Like a Good Neighbor. Just Do It. Who s add campaign is this? Good to the last. Maxwell House Good hands people. Who s slogan is this? The umbrella. What insurance company is this? Reducing the Risk of Trademark Infringement Training the Gatekeeper Limit access to your webpage Do not put slogans or other distinguishing product identifiers on your website unless you have written permission! (Example of our website & Travelers) Intellectual Property / Copyright Infringement Copyright Infringement Copyright Defined: form of protection for authors of original works of authorship. Website b Linking ( You Tube) Clip Art or Images Posting of Songs on Internet Site Be Cautious of Using Copyrighted Text 7
8 Intellectual Property / Copyright Infringement Sermons are Intellectual Property Original i Works of Authorship hi Subject to Copyright Laws Reducing the Risk of Copyright Infringement Training the Gatekeeper Limit access to your webpage Do not post any copyrighted material on your website without getting written permission! Invasion of Privacy 8
9 Invasion of Privacy Invasion of Privacy- May consist of any one or more of the following. Disclosing to the public private facts about a person Using another person s name or likeness Placing someone in a "false light" in the public eye Intruding upon another's seclusion (illegal search of home, eavesdropping, etc.) Invasion of Privacy / Posting Photos Online / Or Videos Express Consent written consent. Always get this form of consent when dealing with posting photos of a minor online. Texas as well as most states have passed the Uniform Electronic Transactions Act. Allows web based consents to be enforceable, just like written consent. Church must verify their online procedure complies with the act. Invasion of Privacy / Posting Photos Online / Or Videos Online Consent / Be sure NOT to use this method of express consent when getting a medical release signed. Hospitals and emergency centers have their own guidelines and may not take a copy of this electronic acknowledgement, many require the parents signature. 9
10 Invasion of Privacy / COPA COPA was established to protect children and applies to commercial websites. While churches are not in this category, voluntary compliance reflects due diligence and care to protect children that the church should always exhibit. Invasion of Privacy / COPA Children s Online Protection Act Recommend that the church comply with this act as a best practice. Can not post identifying information next to the photo of a child. Their name, address, phone number Where they go to school Where they live Any other identifying factors Invasion of Privacy / Posting Photos Online / Or Videos Express consent is almost impossible to gain for the videoing of services: Implied Consent consent gained by posting regular announcements in the church bulletin that state the church will be video taping and photographing services. These may be used in publications, released online, in video or photo format. If anyone should object, please see the church office. 10
11 Prayer Requests Invasion of Privacy / Prayer Requests Prayer Lists / Requests If posting these online, get express consent! Train leadership in this area. Ex: of issue with Sunday school class (facebook). Gatekeeper keeps a list of those NOT wanting requests posted. Discussion Boards / Blogging 11
12 Discussion Boards / Blogging Can lead to claims of : defamation of character, libel, slander, infliction of emotional distress, disparagement to the character of a person or organization. Huge Risk to the Ministry! Don t post comments on site that would encourage disparaging remarks Mandatory registration required for posting on website Must have Gatekeeper! Blogging Hazards / Employees Private affairs of a member Slander or libel another individual Reveal a trade secret of the church. ( unlisted phone number, private address, member s address) Could spend work hours blogging and not working Could post copyrighted material Implement a Blogging Policy Points to consider: Employee must notify church if they are going to maintain a personal blog. Put a disclaimer on site Prohibit employee from posting church s policies and procedures or trade secrets. Prohibit use of racial slurs, personal insults, obscenity Avoid using names of members Limit employees time blogging 12
13 Electronic Policy Electronic Policy Be sure your church has an Electronic Mail Policy in Place: Points to consider: Do not open s from unknown senders. Limit s to business use only. The church prohibits inappropriate s, including cyber bullying. Electronic Policy Do not forge an . To create an policy specific for your church contact an attorney to assist and review your guidelines. Do not send or open junk or send chain letters. 13
14 Wrongful Conduct of Employees Theft of Employee Privacy Information or Members Private Information: We will discuss this in detail in the Network Security Section. Wanted to point it out here as it is an overlapping risk. Most of the time theft of private information comes from within the organization. Wrongful Conduct of Employees Harassment of a Third Party by This is an emerging risk that we need to pay attention to. Discussion on safeguards. This is a form of cyber bullying. Ask your insurance advisor to include third party liability in your employment practices liability quote to cover this exposure. Wrongful Conduct of Employees Introduction of Computer Virus: Disgruntled employees can release computer viruses into computer systems for retaliation. 14
15 Wrongful Conduct of Employees Personal Web Surfing: Daily Hours? Define Network Security; discuss related exposures and how to reduce this risk. Network Security: the process of protecting your computer network from any security breach. Network Security Security Breach Defined: 1.Unauthorized Access of Your Computer 2.Failure of Computer Security System. ( Hacking) 3.Infection of Church Computer by Virus/ Malicious Code. 4.Infecting Third Party Computer. 15
16 Network Security Risk from unauthorized access / Security Breach Identity Theft Theft of Employee private information: Social Security Number, Name, DOB, Address, Etc. All of this private information is normally stored on the server. Network Security Third Party Data Breach Stolen credit card information or account numbers from church members or student s parents who may have reoccurring payments scheduled. These would be losses that occur, not handled by a TPA. Network Security Resulting Damages Possible Could result in fraud / damages paid out. Expenses to comply with Privacy Regulations. Counseling/ Pro-active monitoring services. Public Relations expenses. How can this apply? Discuss this. 16
17 Network Security Forensic Analysis Costs Costs to determine any deficiencies in your systems, procedures or physical security that may have contributed to data breach. Network Security Online Giving Normally contracted with a TPA (third party administrator). Transfer of risk via contract. What does the contract say? Are they insured? Get a certificate of insurance. Be sure they have crime / employee dishonesty coverage. Remember most theft of data comes from an internal source. Financial Stability of TPA. Discuss the phenomenon of Social Networking and the related risks for organizations. What are some benefits of social networking for the church today? Discussion: 17
18 Social Networking What are some risks associated with social networking? Discussion Time: Facebook / Texting Social Networking / Mitigation Sample disclaimer for Facebook page: The opinions expressed on this site are the opinions of the participating user. church acts only as a passive conduit for the online distribution and publication of user-submitted material, content and/or links and expressly DOES NOT endorse any use-submitted material, content and/or links or assume liability for any actions of the participating user. Social Networking / Mitigation Methods to control risk: Site Security Settings Checks & Balances System (Gatekeeper) Get written consent to post photos! Procedures in place for adults communicating with minors through social networking. (Buddy system) Employee handbook amendment with a Social Networking policy. 18
19 Social Networking / Mitigation Employee Handbook Amendment Recommended Points to Include: Staff will conduct themselves in a respectful manner when posting to any social networking site. Do not list comments that could defame another person or provoke inappropriate statements. No confidential, sensitive or privation information disclosed! Ever! We re Done! / Questions Contact Information Paula Burns, CIC, CRM Insurance One Agency 9303 New Trails Drive, Ste. 475 The Woodlands, TX Office#: (281)
section 15 Computers, Email, Internet, and Communications
section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property
More informationComputer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
More informationMTNL MUMBAI FREE EMAIL SERVICES Terms and Conditions
MTNL MUMBAI FREE EMAIL SERVICES Terms and Conditions Welcome to MTNL Mumbai Email services. MTNL Mumbai provides e-mail services pursuant to the terms and conditions set forth below. By using MTNL Mumbai
More informationInternet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in
More informationFMGateway by FMWebschool
FMGateway by FMWebschool Hosting Service Agreement 1. OVERVIEW This Hosting Service Agreement (this Agreement ) is entered into by and between FMWebschool, LLC, a/an Delaware limited liability company
More informationNorth Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
More informationHuman Resources Policies and Procedures
SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media
More informationBOBCAT COMPUTING POLICY
BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,
More informationAPIP - Cyber Liability Insurance Coverages, Limits, and FAQ
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP
More informationJHSPH Acceptable Use Policy
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose
More informationThis agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).
Social Media Terms of Use Social media is an integral part of Historica Canada s communications efforts, offering an additional model to engage with participants, colleagues, other stakeholders and the
More informationCommunications 01: Social Media
Communications 01: Social Media Policy: To communicate the Network s mission publicly, to inform and engage the community regarding the Network s activities, and to establish appropriate and professional
More informationYU General Guidelines for Use of Social Media
INTRODUCTION AND SCOPE General Guidelines for Use of Social Media Social media can be a valuable and powerful means of communication. Yeshiva University and its constituent schools (collectively, the University
More informationVirginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
More informationStudents are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
More informationACCEPTABLE/ RESPONSIBLE USE POLICY IIBE
ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.
More informationSchool District and Campus Web Sites: More than Meets the Eye
School District and Campus Web Sites: More than Meets the Eye A surprising number of legal and policy issues are raised in the creation and maintenance of school district Web sites. Whether your school
More informationPERSONAL AND ADVERTISING INJURY COVERAGE FOR PROFESSIONAL ATHLETES, SPORTS LEAGUES AND ASSOCIATIONS
PERSONAL AND ADVERTISING INJURY COVERAGE FOR PROFESSIONAL ATHLETES, SPORTS LEAGUES AND ASSOCIATIONS By Michelle Worrall Tilton UIA - 55 th Congress, Miami, FL November 2, 2011 Liability Insurance Terms
More informationGENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE
GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE IF YOU HAVE A MEDICAL EMERGENCY, YOU ARE INSTRUCTED IMMEDIATELY TO CALL EMERGENCY PERSONNEL (911). DO NOT RELY ON THIS WEBSITE OR THE INFORMATION PROVIDED
More informationCovered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
More informationGENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of
More informationRules of the Road for Users of Smithsonian Computers and Networks
Rules of the Road for Users of Smithsonian Computers and Networks Introduction Smithsonian systems, networks and other computer resources are shared among Smithsonian employees, interns, visiting scholars,
More informationSocial Media In the Workplace
Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee
More informationAs with most things, insurance should be
Insurance Buyers News Property & Liability 300 Montgomery Street Suite 450 San Francisco, CA 94104 415-820-2200 www.pennbrookinsurance.com Insurance Buyers News March/April 2012 Volume 23 Number 2 Data
More informationWEBSITE & SOCIAL MEDIA PRIVACY POLICY
WEBSITE & SOCIAL MEDIA PRIVACY POLICY This website is the property of Girls on the Run of Northern Virginia ( Girls on the Run ), an Independent Council of Girls on the Run International, Inc. of Charlotte,
More informationMedford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
More informationAuthorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
More informationInformation Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
More informationCity of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
More informationLE.201 Employee Privacy Rights in the Electronic/Social Media Age
LE.201 Employee Privacy Rights in the Electronic/Social Media Age INSTRUCTORS Tony Puckett Dara Wanzer Welcome to the Electronic Age The Internet age has resulted in a host of new types of communications,
More informationACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
More informationTerms and Conditions
Below are the first 5 pages of our 11-page attorney-drafted WEBSITE AND BLOG TERMS AND CONDITIONS AGREEMENT (TERMS OF USE) Most terms of use agreements being offered on the Internet are only 3-5 pages
More informationFAX-TO-EMAIL END-USER LICENSE AGREEMENT
FAX-TO-EMAIL END-USER LICENSE AGREEMENT This Agreement, which governs the terms and conditions of your use of the Fax-to-Email Services, is between you ("you" or "End-User") and ( we, us, our or Company
More informationHUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
More informationTITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06. REFERENCE: Board Rule 2.16 PAGE 1 OF 6
LAKE-SUMTER COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06 REFERENCE: Board Rule 2.16 PAGE 1 OF 6 1. General Information a. LSCC Information Systems (IS)
More informationThe Web site is owned by the State of Minnesota, Department of Employment and Economic Development, hereinafter MinnesotaWorks.net.
Disclaimer The Minnesota Department of Employment and Economic Development is providing this information (the Website ) as a public service and the information contained within it is continually under
More informationAPPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
More informationChristian Academy of Knoxville Technology Responsible Use Agreement 2015-2016
Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 PURPOSE Christian Academy of Knoxville provides technology resources for the school community with a belief that the educational
More informationBOARD OF EDUCATION POLICY
BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate
More informationREVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy
Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This
More informationINTERNET AND EMAIL POLICY
Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy
More informationSuperintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS
Page 1 of 7 ELECTRONIC COMMUNICATIONS 1.0 The District supports the use of the Internet and electronic communications by all employees to improve teaching and learning through interpersonal communication,
More informationTerms of Service. This online privacy policy applies only to information collected through our website and not to information collected offline.
Terms of Service Privacy Policy Mahavitaran (mahadiscom) respects and protects the privacy of the individuals that access the information and use the services brought through them. Individually identifiable
More informationTERMS OF USE AGREEMENT
TERMS OF USE AGREEMENT Last Updated: October 20, 2010 PLEASE READ THIS TERMS CAREFULLY BEFORE ACCESSING THE WEBSITE I GENERAL 1) The Web Portal MEGA BRAZIL TV is a part of the MEGA LOPES, LLC family of
More informationAcceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
More informationAcceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
More informationNewark City Schools Computer Network and Internet Acceptable Use Policy and Agreement
Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to interconnected computer systems within the district
More informationTerms of Use Gateway Clipper Website
Terms of Use Gateway Clipper Website General Information Regarding These Terms of Use Master terms: Unless otherwise noted on a particular site or service, these master terms of use ( Master Terms ) apply
More informationBank Independent Bank to Bank Transfer Addendum (Consumers Only)
Bank Independent Bank to Bank Transfer Addendum (Consumers Only) This Bank to Bank Transfer Addendum (this Addendum ) is an addendum to your Online Banking Agreement and Electronic Funds Transfer Act Notice,
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationAcceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
More informationIRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT
IRON MOUNTAIN PUBLIC SCHOOL DISTRICT STAFF AND STUDENT TECHNOLOGY ACCEPTABLE USE AGREEMENT Revised 2011 IRON MOUNTAIN PUBLIC SCHOOLS ACCEPTABLE USE POLICY FOR ELECTRONIC RESOURCES All Iron Mountain Public
More informationTerms of Submission In order to participate, you must be at least eighteen (18) years old.
Terms of Submission NBCUniversal Media, LLC company ( NBCU ) located at 30 Rockefeller Plaza, New York, NY 10112, invites you to join in on the fun with The Tonight Show Starring Jimmy Fallon (the Show
More informationFLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION
FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION DATE: June 10, 2015 REGULATION CHAPTER NO.: Chapter 5 REGULATION CHAPTER TITLE: Miscellaneous REGULATION TITLE AND NUMBER:
More informationELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
More informationregion16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
More informationGUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network
More informationJOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT
JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.
More informationWestwood Baptist Church Computer use Policy
Westwood Baptist Church Computer use Policy I. Policy Statement The use of Westwood Baptist Church automation systems, including computers, fax machines, and all forms of Internet/Intranet access, is for
More informationSubject: Computers & Electronic Records. Responsible Party: Part C Coordinator
POLICIES AND PROCEDURES NEW JERSEY EARLY INTERVENTION SYSTEM No: NJEIS-17 Subject: Computers & Electronic Records Effective Date: May 1, 2011 Responsible Party: Part C Coordinator I. Purpose To protect
More informationBroward County Website Terms of Use
Broward County Website Terms of Use Table of Contents 1. Terms of Use... 1 1.1 User Acceptance of Terms of Use... 1 1.2 Public Participation Forums... 1 1.3 Privacy Policy... 2 1.4 What We Collect and
More informationDISS TOWN COUNCIL SOCIAL MEDIA POLICY
DISS TOWN COUNCIL SOCIAL MEDIA POLICY Adopted at the Policy & Finance Committee Meeting on 19 th June 2013 DISS TOWN COUNCIL SOCIAL MEDIA POLICY CONTENTS Page 3 Introduction Definition of Social Media
More informationTerms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website
Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating
More informationYWCA Metro St. Louis Social Media Policy
YWCA Metro St. Louis Social Media Policy I. Purpose Social media encompasses a growing collection of online technologies and tools that allow and encourage users to interact and build relationships by
More informationAcceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
More informationCOMMUNITY COLLEGE SYSTEM OF NEW HAMPSHIRE
COMMUNITY COLLEGE SYSTEM OF NEW HAMPSHIRE Section: 300 Human Resources Subject: 320 Employment Policy: Information Technology Date Approved: June 16, 2009 Acceptable Use Policy #: 321.01 Date of Last Amendment:
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationINTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
More informationMentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE
Policy Manual page 1 STUDENT E-MAIL, INTERNET AND COMPUTER USE Access to the Internet is being offered by Mentor Public Schools through the IT Department. The District is also pleased to provide its students
More informationIowa County Government Social Media Use Policy
Iowa County Government Social Media Use Policy This policy outlines appropriate use of social media, as it relates to Iowa County, by employees and departments for official and personal use. This policy
More informationTERMS OF USE & SERVICE
TERMS OF USE & SERVICE We request that you read these Terms of Use carefully. IMPORTANT! THESE TERMS OF SERVICE (TOS) GOVERN YOUR USE OF THIS SITE, WHICH IS PROVIDED BY OUR COMPANY. BY ACCESSING THIS SITE,
More informationHow To Use Social Media At St James Anglican School
P o l i c i e s n P r o c e d u r e s n I n f o r m a t i o n T o t a l n u m b e r o f p a g e s 2 P o l i c y C r e a t i o n D a t e : 2 4 S e p t e m b e r 2 0 1 4 P o l i c y R e v i e w D a t e :
More informationExecutive Memorandum No. 16
OFFICE OF THE PRESIDENT Policy for Responsible Use of University Computers and Information Systems 1. Purpose It is the purpose of this Executive Memorandum to set forth the University's administrative
More informationNewark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement
Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to the Internet, and a Bring
More information------------------- COMPUTER NETWORK AGREEMENT FORM
COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.
More informationAcceptable Use Policy of UNWIRED Ltd.
Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network
More informationAcceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
More informationMEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
More informationAppendix I. The City University of New York Policy on Acceptable Use of Computer Resources
Appendix I The City University of New York Policy on Acceptable Use of Computer Resources Introduction CUNY s computer resources are dedicated to the support of the university s mission of education, research
More informationTERMS AND CONDITIONS
TERMS AND CONDITIONS 1. Your Acceptance Welcome to the website operated by Joint Aid Management ( JAM ) International. By using or visiting this website, you signify your agreement to the terms and conditions
More informationBank Independent Online Financial Management Addendum
Bank Independent Online Financial Management Addendum This Online Financial Management Addendum (this OFM Addendum ) is an addendum to your Online Banking Agreement and Electronic Funds Transfer Act Notice
More informationCoventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy
Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy The Coventry Public Schools encourages the use of digital technology for teaching and learning, for professional responsibilities,
More informationCOLCHESTER HIGH SCHOOL SOCIAL MEDIA POLICY
Date of this version: January 2015, to be reviewed January 2016. Page 1 At a glance: This policy sets out expectations for professional and personal social media use. It sets out what all staff should
More informationCOMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
More informationPROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationUNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
More informationAcceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
More information'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
More informationBRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
More informationPolicy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationUNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
More informationPacific Northwest University of Health Sciences
Effective: 7/01/06 Exec. Lead: Chief Business Officer Revised: 1/11 Approved By: Board of Trustees Expired: n/a Applies To: University-wide Pacific Northwest University of Health Sciences Policy: Computer,
More informationLOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
More informationPrivacy Policy and Terms of Use
Privacy Policy and Terms of Use Pencils of Promise, Inc. ( PoP, we, us or our ) shares your concern about the protection of your personal information online. This Privacy Policy and Terms of Use ( Policy
More information(Internet) for students, staff and, if requested, members of the Board of Education. All computer
4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international
More informationInstruction. Neoga Community Unit School District #3 Page 1 of 5
Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each
More information8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you.
1. Acceptance of Terms Welcome to s Social Trading (the Social Trading Features ). Social Trading Features provide an integrated solution of equity trading and exploration of interactions among investors
More informationPublic charities are all 501(c)(3) but have various missions. Each mission carries significant risks and innocuous risks. Amount of risk depends upon:
Public charities are all 501(c)(3) but have various missions. Each mission carries significant risks and innocuous risks. Amount of risk depends upon: Scale of operation: revenue, assets, staff. Town,
More informationState of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services Bureau
More informationIPInfoDB Web Service Agreement
IPInfoDB Web Service Agreement PLEASE READ THIS WEB SERVICE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING IPINFODB SERVICES. BY CHECKING THE I HAVE READ, UNDERSTAND AND AGREE WITH THE SERVICE
More information