Using University IT securely and responsibly: a guide to reporting issues, loss and inappropriate use

Size: px
Start display at page:

Download "Using University IT securely and responsibly: a guide to reporting issues, loss and inappropriate use"

Transcription

1 Using University IT securely and responsibly: a guide to reporting issues, loss and inappropriate use If you become aware of a security-related issue with a University computer or one connected to the University network in your School or Division the issue should be reported to the IT Service Desk i. The IT Service Desk should also be informed of receipt of threatening or abusive , and the presence of any material deemed inappropriate on a University IT collaborative space. On receiving notification of an incident, the IT Service Desk will work with the IT Security Team to investigate the issue. The IT Security Team will co-ordinate an incident response, including liaison with other internal and external organisations. On the following pages, you will find processes for: 1. Reporting a compromised system or computer account 2. Reporting lost or stolen data media, computing devices, or Smartphones 3. Reporting receipt of threatening or abusive 4. Reporting inappropriate material in University collaborative spaces INF-093-Q-7 / September 2011/ JK

2 1 Reporting an IT Security Incident - compromised system or account If you discover or believe your University computer system has been subject to unauthorised access, possibly resulting in system or data files being unlawfully read or modified, contact the IT Service Desk. Note: If contacting the IT Service Desk by , do not use the suspect system. You should provide the IT Service Desk with as much detail of the incident as possible. As a minimum include: Your contact details Your location: building, room number, computer outlet number The type of system, desktop, laptop or server Operating system and version Computer s network address Why the system is suspect Date and time first suspected Any error messages or events The IT Service Desk will keep you and your Local Computing Representative ii (LCR) updated at appropriate stages. If the incident was not reported by the LCR, then the person we have registered as responsible for the system will be contacted via . You may of course at any time during core hours request a progress report by contacting the IT Service Desk. Note: If you believe unauthorised access to personal data has occurred which might cause damage or distress to individuals (e.g. medical or health data, personal financial information, credit card or bank account numbers, social security numbers or any large data sets of personal information) notify the University s Governance and Compliance Division iii immediately. In cases of a serious breach the University may report the breach to the Information Commissioner's Office.

3 2 Reporting lost or stolen data media, computing devices, or Smartphones This procedure covers both University owned and personally owned devices used for business purposes. Step 1: Report the loss Notify local law enforcement in the jurisdiction where the laptop or Smartphone was stolen (South Wales Police for the Cardiff area). Be sure you obtain the crime number and primary police contact. Step 2: Contact the University Security and Portering Services Provide Security and Portering Services iv with the Police crime number and contact information. If your School or Directorate has insured your laptop under the University Laptop All Risks Cover, contact Ken Howells (University Finance Division), 9 th floor, Newport Road to register the loss. Step 3: Contact the IT Service Desk Step 4: Determine whether you have lost confidential or sensitive data or data belonging to another organisation In order to determine whether or what confidential/sensitive data may have been exposed, consider what kind of information was stored on your computer or device. If you have copies of the documents on University servers, e.g. H: or S: drives, or a back up CD or DVD, you can review the information stored by reviewing the back up. If you believe that your computer or device held personal data which might cause damage or distress to individuals if released inappropriately (e. g. medical or health data, personal financial information, credit card or bank account numbers, social security numbers or any large data sets of personal information) notify the Governance and Compliance Division immediately. In cases of a serious breach the University may report the breach to the Information Commissioner's Office. If you believe that data belonging to other organisations, corporations or agencies was stored on the device and that the data was confidential or legally protected or contractually restricted, notify the relevant organisation. Step 5: Change your passwords immediately Passwords used can be stored or saved in the memory on the computer or mobile/storage device. You can change your Cardiff Username password via the Password Management system on the Cardiff Portal login page [ Step 6: Notify credit cards and banks If you stored any confidential data, such as credit card or bank account numbers on the computer or mobile/storage device, you should notify the affected institutions.

4 Step 7: Register the computer's details Register the computer's details with the Immobilise UK National Property Register [ You'll need to provide the computer's serial number. Your computer vendor may also have a registry that allows you to report the computer as stolen. Step 8: Staff members should notify their line manager of the loss All computers registered for access to the Cardiff University network have a unique Ethernet address that is recorded by IT Services when your computer is registered. If the computer should be reconnected to the campus network using this address it is possible that the computer might be located. See either your Local Computing Representative (LCR) for information on your computer's Ethernet address or contact the IT Service Desk. Step 9: Remotely remove all data from a mobile device If the lost or stolen device is a University BlackBerry Smartphone, contact the IT Service Desk who will be able to arrange for all data on the device to be remotely wiped. Also see BlackBerry tips and FAQs [ In the case of other University smart phones (e g iphone) and personally owned Mobile Phones or PDAs, contact your service provider.

5 3 Reporting receipt of threatening or abusive Unsolicited - also referred to as Spam, UCE (Unsolicited Commercial ) or UBE (Unsolicited Bulk ) is an increasing problem on the Internet. The filtering software used at Cardiff automatically adds the word 'spam' to the beginning of the Subject line of suspected spam . You can use this feature to set up a suitable filter to send any such marked as 'spam' into a separate folder. For more information please see Communications Tools - [ If you have received threatening or abusive please take the following action Do not reply to any such message or click on any link within the message. Retain all copies of the message. Report the incident to the IT Service Desk, and provide: Your contact details A copy of the message showing the Full Headers v IT Services will attempt to determine the origin of the message and where appropriate liaise with the University's Security Services on your behalf. If the content of your message appears to offer illegal services such as child pornography, you must report this to the Internet Watch Foundation [ website. This organisation works in partnership with ISPs, Telcos, Mobile Operators, Software Providers, Police and Government, to minimise the availability of illegal Internet content, particularly child abuse images.

6 4 Procedure for reporting inappropriate material in University collaborative spaces The University is committed to protecting and promoting the rights of every member of the University community to freedom of thought, conscience and religion, freedom of expression and freedom of association. However, any expression has to be within the law and take account of the rights and reasonable sensitivities of others. If you have concerns that an entry made within Quickr TeamPlace or Connections is offensive and/or illegal and feel it necessary to bring this matter to the attention of the Collaborative Tools Service Owner, please follow these steps Step 1: Do not reply or respond to the posting in any way Step 2: Note the location of the material of concern - i.e. the Quickr TeamPlace name and folder or Connections component profile Blog, Wiki, discussion forum etc Step 3: Note the date and time of the post in question, along with the name of the person who has posted the entry Step 4: If appropriate to do so, screen grab and print the material of concern. IMPORTANT: Do not print any material that you consider to be illegal e.g. child pornography - you will be committing an offence if you do so. In instances where material is considered to be illegal, simply report the location of the offending material but do not attempt to print or distribute the material in any way Step 5: Contact the IT Service Desk who will escalate your concerns directly to the relevant Service Owner. The Service Owner will at appropriate stages keep you updated on progress, although you may of course at any time during core hours request a progress report by contacting the IT Service Desk. Report a blog or wiki If you feel that a blog post or comment contains unacceptable content, you can report the offending item via the Report a Blog feedback form [ Similarly, if you feel that a wiki space contains unacceptable content please use the Report a Wiki feedback form [

7 Appendix 1 i How to contact the IT Service Desk - insrvconnect You can contact the IT Service Desk by telephone, , or in person. To contact by telephone: +44 (0) To contact by insrvconnect@cardiff.ac.uk You can also fill in an online help request form at: From 17:00 to 22:00 there is a reduced telephone support service. Messages left outside of working hours will be answered as soon as possible on the next working day. s sent to the IT Service Desk will be responded to within one hour during core hours. s sent to the IT Service Desk outside of core hours may not be responded to until the next working day. The IT Service Desk may be visited in person from 8:30 to 17:00 during normal University working days. The IT Service Desk is located at: 40/41 Park Place Cathays Cardiff CF10 3BB ii Local Computing Representatives Each School has nominated a Local Computing Representative to act as a formal link between the School and the IT Services Directorate on IT matters. The role and responsibilities of the Local Computing Representative (LCR) include providing some technical help for the School's IT users, and liaising with IT Services on IT matters relating to their School. For further information see: iii Breaches of the Data Protection Policy All alleged breaches of the data protection policy shall be notified to the University s Data Protection Officer (based in the Governance and Compliance Division) in the first instance. University Data Protection Officer Mrs Ruth Robertson InfoRequest@cardiff.ac.uk Tel: (029) Security & Portering Services iv Reporting an Incident Crimes and incidents should be reported to the Police, on: (029) and if possible to the University's Security Services by telephoning: (029) or University internal extension: (24 hour service); by visiting the Security Control Centre; or by speaking to the University's Campus Patrol Officers. The Security Centre, which is point 35 on the Cardiff University locations and directions guide, is located in Park Place, directly opposite: Park Place. Tel: (029) Fax (029) For further information see:

8 v Viewing full headers consists of a header and the body of the message. The header provides information on who sent the (From: field); who the recipient was (To: field); what the subject was (Subject: field); and when it was delivered (Date: field). The header contains more information than is normally shown. In particular the routing information is very useful in problem solving. If you are asked to forward an with the full headers enabled please follow the instructions below. They tell you how to turn on full headers in the software supported by IT Services as well as Hotmail. Viewing full headers see: Appendix 2 Useful links What to do if your computer has a virus, Trojan or malware infection. What to do if you receive a Phishing . Appendix 3 Related policies and guidance Cardiff University Legal Compliance Unit [ Cardiff University IT Regulations [ Cardiff University Safeguarding Children and Vulnerable Adults Policy [ en%20&%20vas%20policy% doc] Cardiff University Guide: Working from home [ working from home.doc] Cardiff University Guide: Security of Laptop and Personal Digital Assistants (PDA) [ Cardiff University Guide: Protecting sensitive information on laptops [

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

Information Incident Management Policy

Information Incident Management Policy Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit

More information

LCC xdsl Usage Policy

LCC xdsl Usage Policy LCC xdsl Usage Policy 1. Introduction For the Internet to operate in a manner that satisfies the majority of its users, all users need to observe some rules and etiquette governing their use of it. These

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

Fraud and Abuse Policy

Fraud and Abuse Policy Fraud and Abuse Policy 2015 FRAUD AND ABUSE POLICY 2015 1 Contents 4. Introduction 6. Policy Goal 7. Combatting Customer Fraud and Abuse 8. Reporting Breaches 9. How Alleged Breaches Will Be Investigated

More information

NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY

NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY Student Email Use page 1 NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY SEC. VII E-MAIL 3.0 STUDENT EMAIL USE University Policy I. Scope The purpose of this policy is to ensure the proper use

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

ABERDARE COMMUNITY SCHOOL

ABERDARE COMMUNITY SCHOOL ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been

More information

DBC 999 Incident Reporting Procedure

DBC 999 Incident Reporting Procedure DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible

More information

Information Security Incident Management Policy September 2013

Information Security Incident Management Policy September 2013 Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

SAS TRUSTEE CORPORATION ( STC )

SAS TRUSTEE CORPORATION ( STC ) SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Mobile Devices Security Policy

Mobile Devices Security Policy Mobile Devices Security Policy 1.0 Policy Administration (for completion by Author) Document Title Mobile Devices Security Policy Document Category Policy ref. Status Policy Unique ref no. Issued by GSU

More information

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common

More information

Information Technology Services Information Security Incident Response Plan

Information Technology Services Information Security Incident Response Plan Information Technology Services Information Security Incident Response Plan Authors: Peter Hamilton Security Manager Craig Collis Head of Risk, Quality and Continuity Date:1/04/2014 Version:1.3 Status:Final

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

Acceptable Usage Policy

Acceptable Usage Policy Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

Savannah Telecom Wi-Fi Terms and Conditions

Savannah Telecom Wi-Fi Terms and Conditions Savannah Telecom Wi-Fi Terms and Conditions Preamble These are the Terms and Conditions on which the Savannah Telecom wireless internet access services ("WiFi Service") will be provided to you (the "Contract").By

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

ACCEPTABLE USAGE PLOICY

ACCEPTABLE USAGE PLOICY ACCEPTABLE USAGE PLOICY Business Terms - February 2012 ACCEPTABLE USAGE POLICY Business Terms Version February 2012 Acceptable Usage Policy Feb12.Docx 1 Contents 1. INTRODUCTION... 3 2. PURPOSE... 3 3.

More information

Merthyr Tydfil County Borough Council. Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

John of Rolleston Primary School

John of Rolleston Primary School John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership

More information

Acceptable Use Policy

Acceptable Use Policy Introduction This Acceptable Use Policy (AUP) sets forth the terms and conditions for the use by a Registrant of any domain name registered in the top-level domain (TLD). This Acceptable Use Policy (AUP)

More information

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources

More information

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5 WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

Communications - Use & Management of Misuse of NSW Health Communications Systems

Communications - Use & Management of Misuse of NSW Health Communications Systems Policy Directive Ministry of Health, NSW 73 Miller Street North Sydney NSW 2060 Locked Mail Bag 961 North Sydney NSW 2059 Telephone (02) 9391 9000 Fax (02) 9391 9101 http://www.health.nsw.gov.au/policies/

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Odessa College Use of Computer Resources Policy Policy Date: November 2010 Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational

More information

RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET

RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET Administrative Procedure 140 Background RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET This Administrative Procedure is to guide users in the proper use of technology within the Division. The goal of the

More information

Student Laptop User Charter

Student Laptop User Charter Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Data Protection Policy. Information Security Review Group. Version Date Author Notes on Revisions

Data Protection Policy. Information Security Review Group. Version Date Author Notes on Revisions Document Control Table Document Title: Author(s) (name, job title and Division): Version Number: Document Status: Date Approved: Approved By: Effective Date: Date of Next Review: Superseded Version: Data

More information

Acceptable Use Policy

Acceptable Use Policy Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)

More information

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

School Information Security Policy

School Information Security Policy School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TERMS & CONDITIONS www.tagadab.com INTRODUCTION Tagadab has created this (AUP) for our customers to protect our resources, our customer s resources, and to ensure that Tagadab Ltd

More information

USE OF PERSONAL MOBILE DEVICES POLICY

USE OF PERSONAL MOBILE DEVICES POLICY Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY

INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY Your access to, and use of, the Heathfield High School IT System must be - Only for school use with regard to your subject work. In accordance

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

TELEPHONY AND I.T ORDER FORM

TELEPHONY AND I.T ORDER FORM ORDER FORM Please fill in your requirements below and return to reception. If you require any assistance in completing this form please contact our IT Support team on 01484 483049. I the undersigned understand

More information

Service Protection Under The Provider's Acceptable Use Policy

Service Protection Under The Provider's Acceptable Use Policy Acceptable Use Policy As a provider of Internet access, Internet email, web site hosting, and other Internet related services, Pottawatomie Telephone Company and MBO.net herein after referred to as "the

More information

Internet, Social Media and Email Policy

Internet, Social Media and Email Policy West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...

More information

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY INFORMATION GOVERNANCE POLICY: NETWORK SECURITY Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 1.2 Approved by: Information Governance Group Approval Date:

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

UTC Cambridge ICT Policy

UTC Cambridge ICT Policy UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY STATEMENT: Many of our employees have access to the internet as well as email capabilities. The County recognizes that these

More information

Park Avenue motor cars

Park Avenue motor cars Park Avenue motor cars DEALERSHIP COMPUTING POLICIES Mercedes-Benz of West Chester and Fort Washington maintain a variety of policies governing the use of Dealership computing and communication resources.

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

E- Safety and Digital Photography - College ICT

E- Safety and Digital Photography - College ICT Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Is There Such a Thing as Internet Privacy?

Is There Such a Thing as Internet Privacy? Is There Such a Thing as Internet Privacy? April 13, 2015 Danielle Graff & Kristél Kriel Western Canada s Law Firm Click Agenda to edit Master title style What is Internet Privacy? Why does it matter?

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy Bring Your Own Device (BYOD) Policy Document History Document Reference: Document Purpose: Date Approved: Approving Committee: To set out the technical capabilities of the chosen security solution Airwatch

More information

Guidance Notes on the Regulations for the use of Information Technology

Guidance Notes on the Regulations for the use of Information Technology Guidance Notes on the Regulations for the use of Information Technology 1 Introduction This guidance expands on the principles set out in the core regulations. It gives many examples of specific situations

More information

The Armstrong Chamberlin Web Hosting Acceptable Use Policy ("AUP")

The Armstrong Chamberlin Web Hosting Acceptable Use Policy (AUP) The Armstrong Chamberlin Web Hosting Acceptable Use Policy ("AUP") Your services may be suspended or terminated for violation of this AUP in accordance with Armstrong Chamberlin s Web Hosting Terms of

More information

How To Understand The Bring Your Own Device To School Policy At A School

How To Understand The Bring Your Own Device To School Policy At A School The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

University of Guyana.GY cctld Acceptable Use Policy Effective Date: December 1, 2011

University of Guyana.GY cctld Acceptable Use Policy Effective Date: December 1, 2011 Note: Substantive modifications and updates to the previous.gy Registrant Agreement are highlighted in yellow. This Acceptable Use Policy ("AUP") sets out the actions prohibited to users of the ICT University

More information

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5 PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

ELECTRONIC MAIL (E-MAIL) September 2014. Version 3.1

ELECTRONIC MAIL (E-MAIL) September 2014. Version 3.1 ELECTRONIC MAIL (E-MAIL) September 2014 Version 3.1 Western Health and Social Care Trust Page 0 of 6 E-mail Policy V3.1 Policy Title ELECTRONIC MAIL (E-MAIL) POLICY Policy Reference Number CORP09/006 Original

More information

Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.

Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name. This Acceptable Use Policy forms part of the Registry Policies that apply to and

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

How To Use Your Cell Phone At Renaissance Academy Charter School

How To Use Your Cell Phone At Renaissance Academy Charter School Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance

More information

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé NHS HDL (2006)41 abcdefghijklm = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé Dear Colleague NHSSCOTLAND INFORMATION SECURITY POLICY Summary 1. NHSScotland IT Security Policy was

More information

DSHS CA Security For Providers

DSHS CA Security For Providers DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public

More information

Acceptable Use Policy - NBN Services

Acceptable Use Policy - NBN Services OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

UNESCO-IHE Code of Conduct regarding Information Technology (IT)

UNESCO-IHE Code of Conduct regarding Information Technology (IT) UNESCO-IHE Code of Conduct regarding Information Technology (IT) Introduction The use of computers within all the domains of UNESCO-IHE (education, research, administration, projects and marketing & communications)

More information

Dublin Institute of Technology IT Security Policy

Dublin Institute of Technology IT Security Policy Dublin Institute of Technology IT Security Policy BS7799/ISO27002 standard framework David Scott September 2007 Version Date Prepared By 1.0 13/10/06 David Scott 1.1 18/09/07 David Scott 1.2 26/09/07 David

More information

Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears.

Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears. Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES 1. Definitions In this regulation unless a contrary intention appears Authority means (i) in relation to the central facilities and computing and

More information

1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner

1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner Policy Details 1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner 4. Date created February 2015 5. Date of

More information

Managing e-mail at Winton Primary School

Managing e-mail at Winton Primary School Managing e-mail at Winton Primary School This school: Does not publish personal e-mail addresses of pupils or staff on the school website. We use anonymous or group e-mail addresses, for example info@schoolname.la.sch.uk

More information

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY Putting Barnsley People First BARNSLE CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLIC Version: 2.0 Approved By: Governing Body Date Approved: Feb 2014 (initial approval), March

More information

How To Make A Contract Between A Client And A Hoster

How To Make A Contract Between A Client And A Hoster Web Hosting Terms & Conditions Please read these web-hosting terms carefully, as they set out our and your rights and obligations in relation to our web hosting services. AGREEMENT: Whereas: (1) The Ruby

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014

Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014 Email, Internet & Social Networking Policy Lead executive Name / title of author: Chief Nurse Colin Owen, Information Governance and Data Security Lead Date reviewed: October 2014 Date ratified: 5 th December

More information

Information governance guidance for schools

Information governance guidance for schools Information governance guidance for schools Guidance Guidance document no: 186/2015 Date of issue: September 2015 Information governance guidance for schools Audience All staff, governors and learners

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

MYACCLAIM PRIVACY POLICY

MYACCLAIM PRIVACY POLICY MYACCLAIM PRIVACY POLICY 1. Introduction MyAcclaim is an online collaboration tool that allows users to annotate video. MyAcclaim s mission is to allow its users, with ease and simplicity, to unleash the

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information