Minuteman International Inc. (Minuteman, PowerBoss, Multi-Clean) Internet Access / Policy (Effective May 01,2012) 1.
|
|
- Preston Matthews
- 7 years ago
- Views:
Transcription
1 Minuteman International Inc. (Minuteman, PowerBoss, Multi-Clean) Internet Access / Policy (Effective May 01,2012) 1.0 Purpose The Internet is a powerful information tool that provides access to an impressive variety of resources. Minuteman International, Inc. (MINUTEMAN) provides access to the Internet for the sole purpose of facilitating business activities. Use of the MINUTEMAN Internet connection is encouraged to improve the quality of your work. Use of the Internet for nonbusiness purposes is not permitted and is considered a misuse of company assets. This policy establishes employee responsibilities regarding but not limited to , World- Wide-Web access transfer of files and information retrieval via the Internet when using equipment, software or networks owned by MINUTEMAN. 2.0 Objectives Identify proper use of the Internet. Ensure employees are aware of proper conduct on the Internet. 3.0 Policy Like other company supplied tools, the Internet and is to be used for business purposes only. The use of Internet is a privilege, not a right. Inappropriate use, including any violation of this policy may result in the cancellation of this privilege or other disciplinary action, including but not limited to the termination of your employment or even criminal prosecution, as MINUTEMAN, in its sole discretion deems appropriate. Additionally the use of the company printers to print nonbusiness information from the internet is also prohibited. No employee should have any expectation of privacy as to his or her internet usage. Transmission of material in violation of any country, state or local regulation is prohibited. This includes, but is not limited to, copyrighted, threatening or obscene material. Information obtained via the Internet may not be accurate, and the user must check the accuracy, adequacy, or completeness of any such information. Furthermore, it is the user s responsibility, concerning information obtained from the Internet, to be aware of copyright limitation and to use such material in accordance with the permissions granted by the publisher. MINUTEMAN reserves the right, in its sole discretion, to restrict access to materials on the Internet where deemed appropriate. Page 1 of 6
2 MINUTEMAN reserves the right, consistent with Federal and State laws and regulations, to monitor all Internet access, including but not limited to and World-Wide-Web (www). Due to the non-secure nature of Internet mail, users must consider Internet to be public information. No trade secret or confidential information of any type should be transmitted over the Internet. No government-classified information of any type should be transmitted over the Internet. MINUTEMAN and its employees are responsible for the full compliance with U.S. export control regulations. Use of the Internet does not eliminate the need for compliance with these regulations The most serious threat posed by the use of the Internet is from viruses, security breaches or other forms of reckless mischief. Users of the Internet must be aware that information and programs downloaded from the Internet may contain hidden code, capable of making the entire network unusable or destroying data. It is the user s responsibility to help secure the network from such attacks. As such, any data or programs acquired from the Internet may only be downloaded with written authorization from a Company Officer. INTRODUCTION The Minuteman corporate online systems, including Internet access, are powerful information acquisition and dissemination tools that provide access to an impressive variety of resources. MINUTEMAN provides access to these systems for the sole purpose of facilitating business activities. Use of the network, online systems and Internet connection is encouraged to improve the quality of your work. Use of these systems for non-business purposes is not permitted and is considered a misuse of company assets. This policy establishes employee responsibilities regarding but not limited to , World- Wide-Web access, transfer of files, and information retrieval via Corporate online systems or the Internet, when using equipment, software or networks owned by MINUTEMAN. CORPORATE ONLINE SYSTEMS USER AGREEMENT PLEASE READ THIS AGREEMENT CAREFULLY, THIS AGREEMENT DESCRIBES THE BASIC RESPONSIBILITIES THAT YOU ARE REQUIRED TO OBSERVE AS AN EMPLOYEE IN USING CORPORATE ONLINE SYSTEMS. MINUTEMAN BELIEVES THAT THIS AGREEMENT STRIKES A FAIR BALANCE BETWEEN ITS INTERESTS AND YOUR NEEDS AND EXPECTATIONS. THIS AGREEMENT HAS BEEN MADE TO PROTECT BOTH YOU AND EMPLOYER BY BEING AS CLEAR AND PRECISE AS POSSIBLE. THIS AGREEMENT SPECIFICALLY REQUIRES THAT THE EMPLOYEE AUTHORIZE MINUTEMAN TO RECORD AND STORE FOR MANAGEMENT USE, OF ANY KIND THE ELECTRONIC MESSAGES SENT AND RECEIVED, THE INTERNET ADDRESS OF ANY SITE VISITED AND ANY NETWORK ACTIVITY IN WHICH THE EMPLOYEE TRANSMITS OR RECEIVES ANY KIND OF FILE. Page 2 of 6
3 Section 1 USE OF CORPORATE ONLINE SYSTEMS Corporate online systems (including but not limited to online services, and Internet access) increase company production and employee effectiveness. MINUTEMAN has total discretion over employee s access privileges and the nature of public discussions on the online system. Corporation online systems are company property that is provided to be used for general business purposes to increase production and employee effectiveness only. To ensure the use of company online systems in a productive manner, a list of guidelines has been incorporated. All employees are required to abide by the guidelines: any improper use of corporate online systems is not acceptable and will not be permitted. Section 2 ONLINE SYSTEMS POLICES 2.1 Monitoring Tools. Employer routinely monitors usage patterns for its online communicators. The reasons for monitoring are to leverage online productivity as well as for better planning and management of network resources and to protect trade secrets and confidential information from improper disclosure. 2.2 Blocking of Internet Access. Different access and service levels for different types of personnel may be given to employees depending on the nature of the work. MINUTEMAN reserves the absolute right to block access to certain Internet sites if it becomes necessary. MINUTEMAN blocking of certain Internet sites does not mean MINUTEMAN permits or condones accessing all other sites. Like other company supplied tools the Internet is to be used for business purposes only. The use of Internet is a privilege, not a right. Inappropriate use, including any violation of this policy may result in the cancellation of this privilege or other disciplinary action, including but not limited to the termination of your employment or even criminal prosecution, as MINUTEMAN, in its sole discretion deems appropriate. Additionally the use of the company printers to print non-business information from the internet is also prohibited. No employee should have any expectation of privacy as to his or her internet usage. 2.3 Reasons for Policies. a. To reduce company liability b. To track and control the flow of traffic c. To improve capacity planning d. To decrease network slowdown and keep productivity up e. To maintain good availability of network bandwidth f. To reduce costs g. To protect trade secrets and all confidential information from improper disclosure Page 3 of 6
4 Section 3 OWNERSHIP OF ELECTRONIC COMMUNICATIONS 3.1 All Communications Over Corporate Online Systems Are Property of MINUTEMAN. All messages created, sent or retrieved over the corporate online systems are the property of MINUTEMAN and employees should not assume electronic communications are totally private. The employer reserves the absolute right to access and monitor all messages and files on the corporate online systems. Information obtained via the Internet may not be accurate and the employees must check the accuracy, adequacy, or completeness of any such information. 3.2 Government Export Regulations. MINUTEMAN and its employees are responsible for the full compliance with any government export control regulations. Use of the Internet does not eliminate the need for compliance with these regulations. Section 4 MAINTAINING A HOSPITABLE ENVIRONMENT 4.1 Maintaining a Hospitable Environment. To ensure corporate online systems are a productive and stable environment the transmittal, retrieval or storage of information that is discriminatory or harassing, obscene, pornographic or X-rated is not permitted. Further, the use of corporate online systems for personal gain or any other purpose, which is illegal, or against company policy or contrary to the company s best interest is not permitted. Section 5 NON-DISCRIMINATION 5.1 Non-Discrimination. The transmittal of messages with derogatory or inflammatory remarks about a person s race, creed, color, national origin, sex, age, disability, marital status, sexual orientation or citizenship status is not permitted. Section 6 DISCLOSURE CONFIDENTIAL INFORMATION 6.1 Communication of Messages Disclosing Trade Secrets is Prohibited. You should recognize that your position with MINUTEMAN requires considerable responsibilities and trust. MINUTEMAN expects to entrust you with highly sensitive, confidential, restricted, and proprietary information involving Proprietary Information and Trade Secrets (as defined in Section 6.2) You are legally and ethically responsible for protecting and preserving employer s proprietary rights. No messages disclosing sensitive, confidential, restricted, non-public or proprietary information involving trade secrets can be transmitted over the corporate online systems. Discussions of any Internal Company affairs on any online system other than the in-house systems are prohibited without prior written approval from a company officer. Page 4 of 6
5 6.2 Trade Secrets Defined. For purposes of this Agreement, Confidential and/or Proprietary Information and Trade Secrets is any information, including, but not limited to: (1) The operation of Employer s business, consisting, for example, and not intending to be inclusive, of its lists or other identifications of clients or prospective clients of Employer (and key individuals employed or engaged by such clients or prospective clients), the nature and type of services rendered to such clients (or proposed to be rendered to prospective clients), fee charges or to be charged proposals, inventions, methodologies, algorithms, formulae, processes, compilations of information, form and content of databases, designs, drawings, models, equipment results of research proposals, technical or nontechnical data, patterns, programs, devices, techniques, product plans, job notes, reports, records, specifications, software, firmware and procedures used in, or related to, Employer s products or any other documents or notice deemed confidential or proprietary by MINUTEMAN: (2) Employer s relations with its employees including without limitation, salaries, job classifications and skill levels: (3) Financial, sales and marketing data compiled by Employer as well as Employer s financial, sales and marketing plans and strategies, lists of actual or potential customers or suppliers and non-public pricing that derive economic value, actual or potential from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from their disclosure or use: (4) All ideas, concepts, information and written material about a client disclosed to EMPLOYEE by Employer, or acquired from a client of Employer and all financial, accounting statistical, personnel and business data and plans of clients, are and shall remain the sole and exclusive property and proprietary information of the Employer, or said client; (5) Any subjects of efforts that are reasonable under the circumstances to maintain their confidentiality secrecy and/or proprietary. (6) Any and all other items as included in the MINUTEMAN Non-Compete/Confidentiality Agreement you previously signed. Section 7 MAINTAINING SYSTEM SECURITY 7.1 Keeping the Online System Secure From Computer Viruses. No unauthorized downloading/uploading of software or files is allowed in order to prevent viruses from entering the corporate online systems. All software downloaded must be authorized by and registered to the company. Any employee who attempts to disable, defeat or circumvent any company security facility will be subject to immediate dismissal. Page 5 of 6
6 7.2 Infringement Risk. Employee stocking of unauthorized software is illegal and therefore is strictly prohibited. Section 8 CORPORATE PUBLIC IMAGE 8.1 Employee s Conduct in Public. Corporate online systems are a public place for business communications and all communications over corporate online systems reflect corporate image. All employees are, therefore, responsible to maintain and enhance the corporation s public image and no abusive, discriminatory, defamatory, harassing, inflammatory, profane, pornographic or offensive language or other materials are to be transmitted through the corporate online systems. 8.2 Employees Identity. No message can be transmitted without the employee s identity. Transmittal of messages with an anonymous or fictitious name is prohibited. Section 9 COPYRIGHT 9.1 Copyright Infringement. No copying, downloading, or distributing of any of the copyrighted materials including but not limited to messages, , text files, program files, image files, database files, sound files and music files through the corporate online systems is allowed. Section 10 VIOLATIONS 10.1 Failure to Comply. Failure to comply with this policy may result in the cancellation of this privilege or other disciplinary action, including but not limited to the termination of your employment or even criminal prosecution, as Minuteman, in its sole discretion deems appropriate. Page 6 of 6
7 Minuteman International Inc. (Minuteman, PowerBoss, Multi-Clean) Internet Access / Policy AUTHORIZATION AND ACKNOWLEDGEMENT: As an employee of Minuteman International Inc., I acknowledge that I have received a written copy of the Internet Usage Policy for Minuteman International Inc. [Minuteman, PowerBoss, Multi-Clean] (MINUTEMAN). I understand the terms of this policy and agree to abide by them. I realize and specifically authorize the Company to record and store for management use, any kind of electronic messages I send and receive, the Internet address of any site that I visit, and any network activity in which I transmit or receive any kind of file. I understand that any violation of this policy may result in the cancellation of this privilege or other disciplinary action, including but not limited to the termination of my employment or even criminal prosecution, as MINUTEMAN, in its sole discretion deems appropriate. Employee Signature Date Employee Print Name Minuteman International Inc.
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationVentura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
More informationInternet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
More informationPasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students
Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,
More informationCOMPUTER, INTERNET, & EMAIL USE POLICY
COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter
More informationAcceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
More informationCity of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
More informationDCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
More informationB. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
More informationBoard Adopted Policy
Board Adopted Policy Policy Title Information Technology Systems Usage Effective Date:03/14/2012 Board Approval Date: 6/19/2014 Review Cycle: three (3) years I. Application: Authority wide. II. Intent:
More informationPROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationREGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
More informationAdministrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
More informationEMPLOYEE COMPUTER USE POLICY
EMPLOYEE COMPUTER USE POLICY SECTION ONE PURPOSE A. To better serve our students and provide our teachers and other employees with the best tools to do their jobs, Navigator Pointe Academy makes available
More informationHyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
More informationBates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
More informationNew Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
More informationR3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
More informationLOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN
LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN TITLE: NUMBER: BUL - 999.8 ISSUER: Acceptable Use Policy (AUP) For District Computer and Network Systems Ronald S. Chandler, Chief Information Officer
More informationMEDWAY PUBLIC SCHOOLS Medway, MA. Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12
MEDWAY PUBLIC SCHOOLS Medway, MA Policy #21-A Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12 The District s goal in providing computer network technology and Internet access
More informationHuman Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
More informationAPPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
More informationWestmoreland Intermediate Unit Internet Acceptable Use Policy
Westmoreland Intermediate Unit Internet Acceptable Use Policy Overview: The Westmoreland Intermediate Unit provides Internet access to administrators, teachers, and students in the school districts of
More informationFRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY
FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY Effective August 24, 2004 Overview: The Fresno County Employees Retirement Association (FCERA) provides access to the Internet
More information3. Electronic Mail (E-mail)
- Title of Agency - Internet Acceptable Use Policy The Following Internet Acceptable Use Policy Applies to the (AGENCY NAME) Staff 1. Introduction The (AGENCY NAME) provides its staff and (other entity(s)
More information1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
More informationUSE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
More informationLINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
More informationACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
More informationR 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
More informationLINCOLN COLLEGE INTERNET, E-MAIL, AND COMPUTER ACCEPTABLE USE POLICY
LINCOLN COLLEGE INTERNET, E-MAIL, AND COMPUTER ACCEPTABLE USE POLICY POLICY IT/PO/1 SPONSOR IT Manager Last formal review date: March 2012 Next formal review date: March 2013 Impact Assessed 17 April 2012
More informationInternet usage Policy
Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
More informationLOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
More information------------------- COMPUTER NETWORK AGREEMENT FORM
COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.
More informationWestwood Baptist Church Computer use Policy
Westwood Baptist Church Computer use Policy I. Policy Statement The use of Westwood Baptist Church automation systems, including computers, fax machines, and all forms of Internet/Intranet access, is for
More information6141.9. Internet and Computers. Acceptable Use and Internet Safety
6141.9 Acceptable Use and Internet Safety The Board of Education provides computers, a computer network, including Internet access and an email system, as well as electronic devices such as cellular telephones
More informationCOMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY
FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal
More informationBusiness Conduct, Compliance and Ethics Program. important
Business Conduct, Compliance and Ethics Program important Table of Contents Letter from Troy Kirchenbauer As healthcare s first online direct contracting market, aptitude is committed to upholding the
More informationNorth Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
More informationAcceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
More informationRiverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
More informationSchool Web Design Ltd Acceptable Use Policy. 1. Definitions. 2. Resource Usage. 3. Prohibited Uses
School Web Design Ltd Acceptable Use Policy The Policy below outlines the terms under which you the You, the Client may use the File Hosting Service provided by School Web Design. By using our File Hosting
More informationCORPORATE. Tab Authority Subject Related Policies POLICY STATEMENT PURPOSE
POLICY AND PAGE 1 of 7 OCTOBER 25, 2007 Tab Authority Subject Related Policies Corporate Services Information Technology Services Responsible Computing Corporate IT Guiding Principles Policy, Harassment
More informationTerms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
More informationTAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
More informationregion16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
More informationMISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
More informationAuthorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
More informationCOLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
More informationRocklin Unified School District Employee Authorized Network, Internet Usage, and E-Mail Privacy Agreement
Rocklin Unified School District Employee Authorized Network, Internet Usage, and E-Mail Privacy Agreement Please read this document carefully before signing: A. Upon employment all individuals permitted
More informationAPPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
More informationDauphin County Technical School
Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,
More informationEMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
More informationPolicy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
More informationMARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
More informationHope In-Home Care CODE OF CONDUCT AND ETHICS
Hope In-Home Care CODE OF CONDUCT AND ETHICS September 2014 Table of Contents A MESSAGE FROM OUR DIRECTOR... 3 INTRODUCTION TO THE CODE OF CONDUCT AND ETHICS... 4 ELEMENT 1: QUALITY OF CARE... 5 ELEMENT
More informationStudent use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
More informationELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
More informationRevelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
More informationDescriptor Code: EFE-P
ADMINISTRATIVE PROCEDURE Descriptor Term: ACCEPTABLE USE OF ELECTRONIC TRANSMISSION CAPABILITIES Descriptor Code: EFE-P Date Issued: October 30, 2003 Date Changed June 26, 2008 September 30, 2009 1. Network
More informationCity of Cleveland Social Media Policy
City of Cleveland Social Media Policy Mayor s Office of Communications October 2012 City of Cleveland Social Media Policy and Guidelines for Public Use The City of Cleveland is participating in social
More informationBUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
More informationDundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationCOMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) The Middletown City School District provides an electronic communications network that allows District-authorized individuals internal access
More informationCode of Business Conduct and Ethics. Strike Energy Limited ACN 078 012 745
Code of Business Conduct and Ethics Strike Energy Limited ACN 078 012 745 Approved: 2 December 2014 Contents 1. General... 1 2. Responsibilities to shareholders and the financial community generally...
More informationAcceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
More informationCOMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
More informationPolicy No: 2-B8. Originally Released: 2001. Date for Review: 2016
Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for
More informationAPPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES
APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,
More informationSystem Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February 2014. Purpose.
System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February 2014 1 2 3 4 5 6 7 8 9 Purpose The purpose of this policy is to define expectations
More information2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
More informationBROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
More informationU.S. Chemical Safety and Hazard Investigation Board
BOARD ORDER 035 U.S. Chemical Safety and Hazard Investigation Board SUBJECT: Use of Government Office Equipment CONTENTS 1. Purpose...1 2. Effective Date...1 3. Scope...1 4. References...1 5. Definition...1
More informationRESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET
Administrative Procedure 140 Background RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET This Administrative Procedure is to guide users in the proper use of technology within the Division. The goal of the
More informationHTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications
Page 1 of 5 HTC Communications ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE This Acceptable Use Policy ( AUP ) governs high speed Internet service provided to you by HTC Communications (together
More informationInternet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
More informationGUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network
More information13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
More informationINTERNET AND EMAIL POLICY
Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy
More informationSUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
More informationElite Estate Agents general terms and conditions
Elite Estate Agents general terms and conditions Last updated 15 July 2015 In these terms and conditions, "us", "we" or "our" means Elite Estate Agent Pty Ltd (ABN 29 604 882 813). It is important to us
More informationThe office responsible for technology use compliance for the Sonoma County Junior College District is the Information Technology Department.
6.9P COMPUTER AND COMMUNICATIONS TECHNOLOGY USE REVIEWED: DECEMBER 12, 2000 REVIEWED: MARCH 11, 2008 REVIEWED: MAY 8, 2012 Sonoma County Junior College District is committed to complying with all applicable
More informationFaculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy
Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized
More informationInstruction. Neoga Community Unit School District #3 Page 1 of 5
Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each
More informationEMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
More information13.19 ETHICS REPORTING POLICY AND PROCEDURE
13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More informationf. Engaged in for any purpose that is illegal or contrary to Gateway Preparatory Academy policy or business interests.
A. Employee Computer use COMPUTER USE POLICY AND AGREEMENT SECTION ONE PURPOSE 1. To better serve our students and provide our teachers and other employees with the best tools to do their jobs, makes available
More informationSPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081
SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081 POLICY: COMPUTER/INTERNET ACCEPTABLE USE POLICY AGREEMENT Overview Access to information is fundamental to citizenship and the foundation for further
More informationUNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
More informationElectronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
More informationINTERNET, EMAIL AND PHONE SYSTEMS
Upper Great Southern Family Support Association Inc Policy On INTERNET, EMAIL AND PHONE SYSTEMS Date Adopted: November 2010 Date Revised: March 2013 Review Date: March 2014 Upper Great Southern Family
More informationInformation Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
More informationTransforming business through technology. Acceptable Use Policy & Data Centre Policies
Acceptable Use Policy & Data Centre Policies September 2015 Princess Gemici Contents PART A: ACCEPTABLE USE POLICY ("AUP")...2 1. POLICIES REGARDING ACCEPTABLE USE...2 2. GENERAL...2 3. RIGHTS OF CORE...2
More informationPOLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.
More informationPOLICIES AND REGULATIONS Policy #78
Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use
More informationSOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
More informationTele-Media Cable Internet Acceptable Use Policy
Tele-Media Cable Internet Acceptable Use Policy Important Note: Tele-Media may revise this Acceptable Use Policy (the "Policy") from time to time without notice by posting a new version of this document
More information