TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & POLICY AND CODE

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE"

Transcription

1 GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and , offering opportunities for improving information, communications and customer service. It will establish, maintain and develop a high quality, up to date web site which will include information on the district, the Council's services and activities 24 hours a day, seven days a week. 1.2 The Council will encourage the use of electronic communication via the Internet and and, wherever possible, and in accordance with its Code of Practice, enable its transactions to be undertaken electronically. 1.3 This policy and code applies when using Council owned equipment and software licensed to the Council. 1.4 No person may load software to the Council s equipment without it first being approved by the IT Manager OBJECTIVES 2.1 To help ensure that relevant, up to date information is communicated effectively and to help make it easier for businesses and individuals to deal with the Council. 2.2 To help market the district and the Council's services and activities to customers, residents, visitors and investors. 2.3 To help the Council enable employees and Members to access, research and manage relevant information. 2.4 To avoid costly duplication of the written word in hard copy. 2.5 To assist in the delivery of modern local government and best value as a part of the Council's strategy on Information and Communication Technology. 2.6 To make it easier for the Council and its partners to work together 1

2 ORGANISATIONAL RESPONSIBILITIES 3.1 THE COUNCIL The Council is ultimately responsible for ensuring the implementation of its Internet & Policy and for the use of the Internet & in accordance with the law. The IT Manager and Chief Solicitor will advise on legal implications arising from the use of the Internet & THE CHIEF EXECUTIVE AND MANAGEMENT TEAM The Chief Executive and Management Team will: make suitable arrangements to ensure the implementation and administration of this policy and code ensure that matters relating to the Internet can be discussed when necessary by Management Team via the ICT & E-Government Steering Group 3.3 IT MANAGER The IT Manager will: provide professional advice, guidance, information and be responsible for the overall implementation of the policy and code review and report on the implementation of the policy and code; and in relation to Members will consult the Chairman and Vice Chairman of the ICT & E-Government Advisory Board 3.4 LINE MANAGERS Line Managers have operational responsibility for the implementation of this policy. Specifically they will: decide which of their staff will have access to the Internet, and ensure that they receive adequate training in its use use any management information available to regularly monitor and check to ensure that this policy and code are being adhered to within their areas of responsibility provide relevant up to date information to the Information & Publicity Officer in order to develop the Council's Web Site 2

3 ensure that wherever possible appropriate communication is undertaken electronically via the Internet in transactions with businesses, other public sector bodies, associations and individuals ensure that use of the internet is not being abused 4. POLICY REVIEW 4.1 The policy will be reviewed periodically. 3

4 General USE OF THE INTERNET AND CODE OF PRACTICE 1.1 This Code of Practice applies to all users of the Council s Internet and systems, hardware and software. Any breaches of this Code of Practice by employees may be dealt with under the Council s disciplinary procedures. Any breach of this Code of Practice by Members may be reported to the Council s Standards Committee. 1.2 All users should conduct themselves honestly and appropriately on the Internet and and respect the copyrights, software licensing, rules, property rights, privacy and prerogatives of others, as in any other business dealings. 1.3 All existing Council policies apply to conduct on the Internet, especially (but not exclusively) those concerning, privacy, fraud, misuse of Council resources, sexual harassment, equal opportunities, information and data security, misappropriation or theft. 1.4 The deliberate display of any kind of indecent image, graphic file or document on any Council system is a violation of its policy. In addition, indecent material may not be archived, stored, distributed, edited, printed, recorded or deliberately viewed using the Council's network or computing resources. 1.5 The Council's Internet facilities and computing resources must not be used to break the law. Use of any Council resources for illegal activity is grounds for summary dismissal and the Council will co-operate with any legitimate law enforcement activity. No user may use the Council's Internet facilities knowingly to download or distribute pirated or illegally obtained software or data. 2. Security 2.1 Security is vitally important and it is essential to protect confidentiality and to ensure integrity of information and systems. 2.2 All users should be suitably trained or competent to use Internet and Whilst the Council's Internet connection offers potential benefits it also opens the door to significant risks to our data and systems if the appropriate security precautions are not adhered to. 4

5 2.4 The overriding, principle is that security is the concern of all users - 'An Internet user can be held accountable for any breaches of security or confidentiality. 2.5 The Council has systems in place that can monitor and record all Internet usage. The log of sites visited is regularly reviewed and reported upon. 2.6 Deliberate introduction of any damaging virus is a crime under the Computer Misuse Act No employee may use the Council's Internet facilities to deliberately propagate any virus or malicious program. 2.8 Software and data may be used to enable identification of inappropriate Internet sites. Access may be blocked to any such sites. Any user accidentally connected to a site containing illegal or offensive materials must disconnect from that site immediately, regardless of whether that site had previously been deemed acceptable by any screening or rating program. 2.9 If material is inadvertently accessed which is believed to contain a computer virus, a user should immediately break the connection, stop using the computer and contact the IT Manager for assistance No user may use the Council's Internet facilities knowingly to disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of another user User IDs and passwords help maintain individual accountability for Internet resource usage. Any user who obtains a password or ID for an Internet resource must keep that password confidential A firewall is installed which will assure the safety and security of the Council's networks. Additional devices may also be installed in the future to further protect these networks. Any employee who attempts to disable, defeat or circumvent any Council security facility will be regarded as having committed gross misconduct and render the perpetrator liable to summary dismissal. Any Member who attempts to disable, defeat or circumvent any Council security facility will be reported to the Council s Standards Committee Users should be wary that any files that are transferred in any way across the Internet are not encrypted. Due consideration should be given to this if intending to send documents containing sensitive Council data. 5

6 2.14 Computers that use their own modems to create independent data connections side-step the Council's network security mechanisms, thus providing 'an attacker' with access to the Council's network. Connections to the Internet using modems from network connected computers are specifically prohibited. Users should ensure that they do not leave modems connected after they have been used The quality of information on the Internet is variable and should not be relied upon uncritically. It is the responsibility of the user to judge whether the information is good enough for the purpose for which it will be used and to verify it independently if necessary. 3. Chat, Newsgroups and Mailing Lists 3.1 The chat, newsgroups, mailing lists and facilities give users an immense and unprecedented ability to disseminate corporate Council messages. Special care should, therefore, be taken to maintain clarity, consistency and integrity of the Council's corporate image and posture. 3.2 Each employee using the Internet shall identify himself or herself honestly, accurately and completely (including one's Council affiliation and function where requested) when participating in chat, mailing lists or newsgroups, or when setting up accounts on outside computer systems. 3.3 Only those employees who are duly authorised to speak to the media or in public gatherings on behalf of the Council may speak/write in the name of the Council to any newsgroup or chat room. Other employees may only participate in newsgroups, chat or mailing lists in the course of business when relevant to their duties. However, they do so as individuals speaking only for themselves and should use the following disclaimer: "The views and opinions expressed in this message reflect my own personal views and should not be construed as the official view of the Borough Council. " 3.4 The Council retains the copyright to any original material posted to any forum, newsgroup mailing list, chat or World Wide Web page by any employee in the course of his or her duties. 3.5 Chat and newsgroups are public forums and it is, therefore, inappropriate to reveal confidential Council information, customer data, trade secrets or any other material covered by existing Council policies and procedures. Any employee releasing protected information via a chat or newsgroup - either purposely or inadvertently - will be subject to all penalties under existing data security policies and procedures. 6

7 3.6 Individuals using the Internet and facilities are personally liable for ensuring that they comply with the requirements of the Data Protection Act When participating in discussions in newsgroups and mailing lists, information and advice may be offered to others if appropriate to the job, or if it represents reasonable return (in terms of the effort involved) for the value received from the discussion. 3.8 Help should not be offered in other areas that are the responsibility of someone else within the Council. These enquiries should be redirected to the appropriate person. 3.9 Users may not take part in discussions on matters that are politically controversial. Users must not give advice or information known to be contrary to the Council's policies or interests. 4. Software 4.1 Any software or files downloaded via the Internet on to the Council's network become the property of the Council. Any such files or software may be used only in ways that are consistent with their licences or copyright. Software must only be downloaded by IT staff or with their authority. 4.2 Only software for direct business use may be downloaded. Such software must be properly licensed and registered where required, be used only under the terms of its license, be installed by IT (Council policy expressly prohibits users from loading software onto their own machines) and be added to the appropriate inventory records. 4.3 Employees may not download entertainment software or games or play games against opponents over the Internet. 4.4 Images or videos may not be downloaded unless there is an explicit business related use for that material. However, video and audio streaming and downloading technologies should be avoided where possible as it represents significant data traffic, which can cause local network congestion. 4.5 Software and data owned or licensed by the Council may not be uploaded without explicit authorisation from the manager responsible for the software or data. 4.6 Some organisations accept orders for goods and services (particularly software) via the Internet. The fact that Internet access has been granted does not authorise a user to place orders in the name of the 7

8 Council. 4.7 Where possible, employees should schedule communicationintensive operations, such as large file transfers, video downloads, mass ing etc., to off-peak times. 4.8 The Council does not prohibit the use of the Internet by employees for personal purposes. However due to the adverse effect on business traffic that can be caused by personal use, this use should be strictly limited during office hours. Excessive use of the Internet for personal use within office hours will be treated as a disciplinary offence under the Council s Disciplinary Procedures. Personal use must be strictly in accordance with all appropriate clauses of this code of practice. 5. Copyright Infringement 5.1 The main risk of copyright infringement is attached to downloading files from the Internet. Copyright infringement can also occur where text is copied into or attached to an message. Equally, users must not transmit copyright software from their computer to the Internet, or permit anyone else to access it on their computer via the Internet. 5.2 Users should not copy information originated by others and re-post it without permission from, or at least acknowledgement of, the original source, even if the content is modified to some extent. 5.3 Copyright and other rights in all messages posted to the Internet from a Council account, like other material produced at work, belongs to the Council and not to users personally. 5.4 Users should not assume that information posted on the Internet actually originates from the person or organisation that appears to have produced it, without some form of authentication. If a user intends to rely on a digital signature for authentication, he/she must not assume that it actually belongs to the person or organisation it appears to, without checking this by a means outside the Internet (e.g. telephone, post or meeting). 5.5 Any software piracy is a potential breach of the Copyright, Designs and Patents Act No insurance is available and any infringement could have severe cost implications for the Council. 8

9 6. Web Site 6.1 The Information & Publicity Officer is responsible for the management of the Council's Web Site. He/she will Receive draft pages from Line Managers and enter pages onto the World Wide Web Regularly monitor the Council's pages to ensure that they are relevant and up to date Liase with managers on a regular basis giving advice and information Review the pages on the site on a regular basis Monitor usage of the site and provide regular reports to Management Team as required Obtain written permission of staff for personal details to appear on the Council s website 6.2 The IT Manager will be responsible for Ensuring all links to other sites are approved Providing the technical support needed 7. Guidelines 7.1 The Council s internal is for use by Council Members and employees only, and is registered under the Data Protection Act 1998 solely for that purpose. 7.2 The hardware and software for transmission and receipt belongs to the Council and the Council retains the right to withdraw access if the system is abused. 7.3 Use of the system will be monitored in terms of usage and volume by the IT Manager to avoid delays and hold-ups. 7.4 If the contents of s are found to be libellous or in some other way defamatory to the Council or another person or organisation, the matter may be treated as gross misconduct. 9

10 7.5 If the use, content or disclosure are found to be in breach of the requirements of the Data Protection Act 1998, the matter may be treated as gross misconduct. 8. Care must be exercised in this area - basic awareness 8.1 communications, either internally or on the Internet, are not guaranteed to be private or to arrive at their destination either within a particular time, or at all and other Internet services are not formal media and should not be used for formal communications where a permanent record needs to be kept. Advice given on has the same legal bearing as any other written advice. 8.3 Users must not send unsolicited, irrelevant or inappropriate to multiple newsgroups or mailing, lists on the Internet, or make other excessive use of unsolicited Users must not abuse others (known as "flaming"), even in response to abuse directed at them. 8.5 Users must not participate in chain or pyramid letters or similar schemes. 8.6 The inappropriate use of upper case in is generally interpreted as SHOUTING and should be avoided. 8.7 Users should not forward material ed to them personally to others, particularly to Internet newsgroups or mailing lists, without the permission of the originator. 8.8 Users must not use anonymous mailing services to conceal their identity when mailing, through the Internet or , falsify s to make them appear to originate from someone else, or provide false information to any Internet or service which requests name, e- mail address or other details. 8.9 Users tend to regard like telephone calls and to be less discreet than they would in a letter. This means there is a significant risk of vicarious liability for defamatory statements in employee e- mails. Therefore sending s expressing personal views from any system should be discouraged. 10

11 8.10 Viruses can also be transmitted via messages to many users at one time. If you have any suspicions about the contents of an then you should contact IT Services for advice without opening the suspicious Users should avoid sending excessively large s or attachments. This is not an economical or sensible way to handle large documents and can effectively halt the system. If it won't fit on a 1.44 Mb disk, it's too large to send via . This would relate to a document over 50 pages of text or containing pictures. If in doubt, consult the IT Section for advice. 9. Failure to comply with the policy and code 9.1 The Council reserves the right to: Withdraw user s access to any computer system and communication service, including the Internet service Prohibit access to certain specific newsgroups, web pages and other Internet or resources Remove or substitute the hardware or software used to access the Internet at any time and for any reason 9.2 The Council may respond to violations of the above Internet and Policy and Code by any combination of: Denial of Internet and access for a period or permanently Disciplinary action through the disciplinary procedure Referring circumstances of any breaches by Members to the Council s Standards Committee Provision of information to the police for possible criminal proceedings Should further help regarding this Code be required please contact the IT Manager 11

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY Effective August 24, 2004 Overview: The Fresno County Employees Retirement Association (FCERA) provides access to the Internet

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Acceptable Use Policy

Acceptable Use Policy Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)

More information

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance. 1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

If you have any questions about any of our policies, please contact the Customer Services Team.

If you have any questions about any of our policies, please contact the Customer Services Team. Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting

More information

Policies Concerning the use of Computers

Policies Concerning the use of Computers Policies Concerning the use of Computers Shrewsbury School s Policies Concerning the use of Computers The Director of IT is responsible for the formulation and review of policies affecting the use of computers

More information

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

Extratime. Staff, Children and Young People s e safety Policy

Extratime. Staff, Children and Young People s e safety Policy Extratime Staff, Children and Young People s e safety Policy Introduction Extratime recognises the Internet and other digital technologies provide a vast opportunity for children and young people to learn,

More information

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

EHLANZENI DISTRICT MUNICIPALITY INTERNET AND EMAIL USAGE POLICY FOR 2012

EHLANZENI DISTRICT MUNICIPALITY INTERNET AND EMAIL USAGE POLICY FOR 2012 EHLANZENI DISTRICT MUNICIPALITY INTERNET AND EMAIL USAGE POLICY FOR 2012 OBJECT OF THE POLICY The internet and email have emerged as valuable and cost-effective tools for Ehlanzeni District Municipality

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

Internet, Social Networking and Telephone Policy

Internet, Social Networking and Telephone Policy Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

DIOCESE OF DALLAS. Computer Internet Policy

DIOCESE OF DALLAS. Computer Internet Policy DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy .......... Information Technology Acceptable Use Policy (IT Resources, Email and Internet) Version 1.2 October, 2002 Contents OVERVIEW 4 IT RESOURCES USAGE POLICY 4 1. Trust Property 4 2. Inappropriate

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND

More information

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

Virgin Media Business Acceptable Use Policy (Internet)

Virgin Media Business Acceptable Use Policy (Internet) Virgin Media Business Acceptable Use Policy (Internet) 1 Introduction 1.1 This Acceptable Use Policy ( AUP ) specifies actions prohibited by Virgin Media Business to users of the Internet Services (in

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

Internet, , Computer, and Telecommunications Policy

Internet,  , Computer, and Telecommunications Policy Internet, Email, Computer, and Telecommunications Policy 1. Purpose This policy sets out appropriate use of Monitor internet, email, general computer, and telecommunication services and equipment. This

More information

(Acceptable Use Policy or "AUP")

(Acceptable Use Policy or AUP) (Acceptable Use Policy or "AUP") By using our web hosting services and/or email listserv programs, you agree to comply with our acceptable usage policy. We expect you to possess a basic knowledge of the

More information

North Clackamas School District 12

North Clackamas School District 12 North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

2.1 It is an offence under UK law to transmit, receive or store certain types of files.

2.1 It is an offence under UK law to transmit, receive or store certain types of files. Website Hosting Acceptable Use Policy 1. Introduction 1.1 Jarrett & Lam Consulting s Acceptable Use Policy for hosting customers to protect our resources, the resources of our customers and to ensure that

More information

Acceptable Use Policy - NBN Services

Acceptable Use Policy - NBN Services OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING. Idaho statute states in part the Idaho Technology Authority shall:

P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING. Idaho statute states in part the Idaho Technology Authority shall: Idaho Technology Authority (ITA) ENTERPRISE POLICY P1000 GENERAL POLICIES Category: P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING CONTENTS: I. Authority II. Abstract III. Definitions IV. Policy

More information

Leicestershire Children and Young People s Service E-Safety Policy

Leicestershire Children and Young People s Service E-Safety Policy Leicestershire Children and Young People s Service E-Safety Policy 1. Introduction 2. Scope 3. Policies and Practices 3.1 Use of Internet facilities, mobile and digital technologies 3.2 Reporting abuse

More information

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 (Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Revelstoke Board of Education Policy Manual

Revelstoke Board of Education Policy Manual Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS

More information

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460. Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security

More information

Southwest Texas Telephone Company (SWTTC) Acceptable Use Policy for Asynchronous Digital Subscriber Line (ADSL)/Internet Customers

Southwest Texas Telephone Company (SWTTC) Acceptable Use Policy for Asynchronous Digital Subscriber Line (ADSL)/Internet Customers Southwest Texas Telephone Company (SWTTC) Acceptable Use Policy for Asynchronous Digital Subscriber Line (ADSL)/Internet Customers Introduction When you open your SWTTC ADSL/Internet account, you become

More information

JHSPH Acceptable Use Policy

JHSPH Acceptable Use Policy 1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose

More information

COMPUTER USE IN INSTRUCTION

COMPUTER USE IN INSTRUCTION COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be

More information

and Internet Policy

and Internet Policy Email and Internet Policy Responsible Officer Authors Date effective from July 2008 Ben Bennett, Business Planning & Resources Director Policy Development Group Date last amended December 2012 Review date

More information

City of Grand Rapids ADMINISTRATIVE POLICY

City of Grand Rapids ADMINISTRATIVE POLICY City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

Cablelynx Acceptable Use Policy

Cablelynx Acceptable Use Policy Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing

More information

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +

More information

Acceptable Usage Policy

Acceptable Usage Policy Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

INTERNET ACCEPTABLE USE POLICY

INTERNET ACCEPTABLE USE POLICY INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods

More information

REGION 19 HEAD START. Acceptable Use Policy

REGION 19 HEAD START. Acceptable Use Policy REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

ACCEPTABLE USAGE PLOICY

ACCEPTABLE USAGE PLOICY ACCEPTABLE USAGE PLOICY Business Terms - February 2012 ACCEPTABLE USAGE POLICY Business Terms Version February 2012 Acceptable Usage Policy Feb12.Docx 1 Contents 1. INTRODUCTION... 3 2. PURPOSE... 3 3.

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

Acceptable Use of Information. and Communication Systems Policy

Acceptable Use of Information. and Communication Systems Policy Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,

More information

Electronic Communications System

Electronic Communications System Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as

More information

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data

More information

Dauphin County Technical School

Dauphin County Technical School Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,

More information

Cellular/Smart Phone Use Procedure

Cellular/Smart Phone Use Procedure Number 1. Purpose This procedure is performed as a means of ensuring the safe and efficient use of cell/smart phones throughout West Coast District Health Board (WCDHB) facilities. 2. Application This

More information

COMPUTER NETWORK FOR EDUCATION REGULATION

COMPUTER NETWORK FOR EDUCATION REGULATION COMPUTER NETWORK FOR EDUCATION REGULATION 4526-R The following rules and regulations govern the use of the district's computer network system and access to the Internet. I. Administration The Superintendent

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

ContentPros LLC Web Site and Email Hosting Service Agreement

ContentPros LLC Web Site and Email Hosting Service Agreement ContentPros LLC Web Site and Email Hosting Service Agreement This Web Site and Email Hosting Service Agreement ("Agreement") is by and between ContentPros, LLC ("ContentPros "), a/an Colorado Corporation,

More information

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Odessa College Use of Computer Resources Policy Policy Date: November 2010 Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational

More information

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either: POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

POLICY 4526. Adopted by Board of Education: 4/20/05

POLICY 4526. Adopted by Board of Education: 4/20/05 POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,

More information

Network and Internet Access Agreement for Students

Network and Internet Access Agreement for Students Dublin City School District Network and Internet Access Agreement for Students Property Page 1 of 7 Any student age 18 and older is to read this form (). Page 5 of this form should then be completed and

More information

STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION

STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION STATE UNIVERSITY OF NEW YORK AT BROOKLYN DOWNSTATE MEDICAL CENTER COMPUTER and NETWORK USAGE POLICY I. INTRODUCTION Access to modern information technology is essential to the state university mission

More information

COMPUTER NETWORK FOR EDUCATION

COMPUTER NETWORK FOR EDUCATION 4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE

GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE IF YOU HAVE A MEDICAL EMERGENCY, YOU ARE INSTRUCTED IMMEDIATELY TO CALL EMERGENCY PERSONNEL (911). DO NOT RELY ON THIS WEBSITE OR THE INFORMATION PROVIDED

More information

BLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY

BLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY Acceptable Use Policy Educational Purpose The computer system in Blackrock College has been established for a limited educational purpose. The term "educational purpose" includes classroom activities,

More information

Acceptable Use Policy Revision date: 26/08/2013

Acceptable Use Policy Revision date: 26/08/2013 Acceptable Use Policy Revision date: 26/08/2013 Acceptable usage Policy for all Services As a provider of web site hosting and other Internet-related services, Corgi Tech Limited offers its customer (also

More information

DEPARTMENT OF COMMUNITY AND GOVERNMENT SERVICES (CGS) ACCEPTABLE EMAIL & INTERNET USAGE POLICY POLICY STATEMENT

DEPARTMENT OF COMMUNITY AND GOVERNMENT SERVICES (CGS) ACCEPTABLE EMAIL & INTERNET USAGE POLICY POLICY STATEMENT POLICY STATEMENT The purpose of this Policy is to establish the rules of acceptable use of Government of Nunavut networks and Internet services including E-mail, web-browsing, remote access, file transfer,

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

LINDSAY UNIFIED SCHOOL DISTRICT ACCEPTABLE USE POLICY (AUP) FOR DISTRICT COMPUTER SYSTEMS

LINDSAY UNIFIED SCHOOL DISTRICT ACCEPTABLE USE POLICY (AUP) FOR DISTRICT COMPUTER SYSTEMS Lindsay USD: Exhibit Employee Use of Technology E 4040 Employees will confirm their assent to the AUP electronically when they activate their district account and/or change passwords. The Lindsay Unified

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs

More information

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications Page 1 of 5 HTC Communications ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE This Acceptable Use Policy ( AUP ) governs high speed Internet service provided to you by HTC Communications (together

More information

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic

More information

CT Communications Internet Handbook

CT Communications Internet Handbook CT Communications Internet Handbook CT Communications Network Acceptable Use Policy Introduction: Protection of our Customers and our resources, the ability to provide quality service to our Customers,

More information

With the increasing popularity of social media you need a Social Media Policy to protect your company.

With the increasing popularity of social media you need a Social Media Policy to protect your company. Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not

More information