Acceptable Use of Information Technology Policy
|
|
|
- Byron Warner
- 10 years ago
- Views:
Transcription
1 Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable objects. IT facilities provide access to a variety of services, which are either hosted by VAW or by external agencies, including the Internet. VAW recognises that IT is an important aspect of the work of its employees, and that appropriate use of IT facilities provides benefits for the organisation. The aim of this policy is to ensure that VAW staff, in using IT facilities, comply with and promote appropriate code of conduct and usage, existing VAW policies and regulations, and operate within the provisions set down in civil and criminal law. Scope of the Policy The policy applies to all staff of VAW, at all levels of seniority, and to all contractors and visitors who use VAW IT facilities. It applies to all IT facilities which are owned, leased or hired by VAW; all IT facilities used by staff either at the VAW premises or connected to the VAW networks; and all IT enabled communications entered into on behalf of VAW. Associated Regulations, Policies and Procedures Use of VAW IT facilities is subject to the following regulations: Data Protection Act 1998 The Copyright, Designs and Patents Act 198 The Copyright and Rights in Databases Regulations 1997 The Computer Misuse Act 1990 Regulation of Investigatory Powers Act 2000 Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 (LBP Regulations) The Human Rights Act 1998, Article 8 The Obscene Publications Act 1959 The Protection of Children Act 1978 Disciplinary Procedure of VAW Diversity Policy of VAW
2 Security Use of certain facilities requires prior registration and the granting of a user code and/or an individual password. A personal user code and password are the property and responsibility of the individual to whom they are issued. Staff must not divulge such information to any other person, unless given specific authority by the relevant Line Manager, or where the role includes network/system supervisory responsibility. If the workstation of a member of staff is located in an area where members of the public or visitors to VAW can see the information on screen, the PC should not be left unattended whilst still logged into the network. A member of staff should log off as a user and log back on when returning to the workstation. This does not involve shutting down the PC. Selecting Good Passwords Rationale The object when choosing a password is to make it as difficult as possible for a hacker to make educated guesses about what you've chosen. This leaves them no alternative but a brute-force search, trying every possible combination of letters, numbers, and punctuation. A search of this sort, even conducted on a machine that could try one million passwords per second (most machines can try less than one hundred per second), would require, on the average, over one hundred years to complete. What Not to Use Don't use a password shorter than six characters. Don't use your login name in any form (as-is, reversed, capitalised, doubled, etc.). Don't use your first or last name in any form. Don't use your spouse or child's name. Don't use other information easily obtained about you. This includes registration plate numbers, telephone numbers, social security numbers, the brand of your car, the name of the street you live on, etc. Don't use a password of all digits, or all the same letter. This significantly decreases the search time for a hacker. Don't use a word contained in (English or foreign language) dictionaries, spelling lists, or other lists of words.
3 What to Use Do use a password with mixed-case alphabetic characters. Do use a password with non-alphabetic characters, e.g. digits or punctuation. Do use a password that is easy to remember, so you don't have to write it down. Do use a password that you can type quickly, without having to look at the keyboard. This makes it harder for someone to steal your password by watching over your shoulder. Method to choose secure and easy to remember passwords Choose a line or two from a song or poem, and use the first letter of each word. For example, Alas poor Yorick I knew him well Horatio, becomes ApYIkhwH. Alternate between one consonant and one or two vowels, up to eight characters. This provides nonsense words that are usually pronounceable, and thus easily remembered. Examples include routboo, quadpop, and so on. Choose two short words and concatenate them together with a punctuation character between them. For example: dog;rain, book+mug, kid?goat. Access You must not attempt to access VAW systems, networks or databases unless legitimate authorisation has been granted. The granting of a user code and password will constitute authorisation for the use of relevant facilities. However, under no circumstances should you access network areas that you do not have authority to by virtue of your role or responsibilities, nor access password protected folders or files without permission from the authorised user. Occasionally, network security can break down and you can access areas unrelated to your work. You should report any apparent security issues to the Office Manager. You must not attempt to access the systems and networks of other establishments either within the United Kingdom or elsewhere, unless: The service required is a public or open access facility; or Authorisation has been obtained from the system/network service provider.
4 Usage The following usage is strictly prohibited: Using VAW computing facilities to deliberately produce, obtain, store, view, download or distribute images, text or sound files of an obscene, pornographic, offensive or abusive nature. Using VAW computing facilities to abuse, racially or sexually, or harass or bully anyone, whether or not employed by VAW. Using VAW computing facilities to access, view, print or distribute defamatory or knowingly untruthful information or material of an illegal nature. An unacceptable website may be inadvertently entered by clicking on a link, or by a "pop up". Should this happen to any employee, it must be reported immediately to the Chief Executive's office. Deliberately introducing any virus, worm, trojan horse or any other harmful or "nuisance" programme or file onto any system, or take deliberate action to circumvent any precautions taken by VAW to safeguard the security of its computer systems. Connecting any device into the network of VAW without prior agreement from the appropriate designated authority. Changing default settings on software, or downloading and installing new software to VAW computers without prior permission. Using VAW computing facilities for commercial gain, for work on behalf of others, or for private business use (unconnected with the legitimate activities of the member of staff), unless prior agreement has been made with the Line Manager for the facilities, and an appropriate charge for that use has been determined. Using VAW computing facilities to participate in gambling activities, chat rooms or on-line games. Using VAW computing facilities for personal instant messaging, except during the lunch break. Using your own floppy discs, CDs, etc. with VAW computing facilities. Personal use of IT facilities must not interfere with the normal course of day-to-day activities. Personal use is therefore recommended before and after work, and during the lunch hour. Carrying out personal financial transactions (e.g. using a credit or debit card), is at the employee s own risk. Receiving and forwarding humour is ill advised, as some humour may be oppressive in nature, or offensive to recipients (see 8.5).
5 The use of electronic mail ( ) The advantages of usage can be a fast, consistent and cost-effective means of delivering messages and documents across long or short distances. Information can be shared quickly and it can reduce the need to print and distribute information by conventional means. Disadvantages of usage: If used inappropriately, a member of staff, or the colleagues may suffer from information overload syndrome, i.e. vital information is lost among many irrelevant messages. Inappropriate use of can also stifle faceto-face communication, or abdicate responsibilities of communicating messages that should be done face-to-face. Because s are quick to compile and despatch, they can be sent without appropriate thought being given to their content, resulting in a permanent record or communication, which the sender may later regret. Using at VAW systems are primarily for business use, but VAW acknowledges that staff may occasionally use the system for personal correspondence. In doing so, all staff are expected to adhere to the conduct outlined in this policy. Personal use must not interfere with the normal course of day-today work activities. s should not be used as an alternative to face-to-face communication, or for urgent matters requiring a response, particularly as some members of staff may not check their inbox many times per day. You should be aware that s might be accessible even when apparently deleted. s are as permanent as memoranda or letters, carrying the same legal and contractual implications. s may be used in a court of law as admissible evidence and, therefore, they must be treated in the same way, with the same care, as any other written material. The confidentiality of cannot be assured. You should exercise extreme caution in using to communicate confidential or sensitive matters. Should it be necessary to use to communicate confidential information, particularly outside of the VAW, you must obtain express permission to do so. For example, from the individual referred to, the originator, or an appropriate Line Manager. Use of the system to abuse, racially or sexually, or harass or bully anyone, whether or not they are members of VAW, is strictly prohibited.
6 Any incidents of this nature will be dealt with under the VAW Disciplinary Procedure, and may result in dismissal. The employee has a responsibility to draft all s carefully, taking into account issues of discrimination, harassment, defamation, copyright infringement, and VAW representation. An employee must take care in ensuring that an is addressed correctly. Unnecessary copying to a range of recipients should be avoided. Sending large attachments (over 500kb) with s should be avoided. Infringement Failure to observe any aspects of this policy may result in a recommendation that the infringement is pursued via the VAW Disciplinary Procedure, which may result in dismissal. Infringement by staff of certain regulations may result in penalties under civil or criminal law and such law may be invoked by the VAW. Where a member of staff is aware of an infringement of this policy, they should, in the first instance bring it to the attention of their Line Manager or the designated person within the Department. Monitoring VAW reserves the right to access, read and print out s and to monitor usage of IT facilities in order to ensure their efficient and proper use. Such monitoring will give due consideration to personal privacy. Monitoring refers to such issues as ensuring proper compliance with regulatory procedures, providing evidence to establish facts during an investigation, preventing a crime, and enabling the effective operation of the VAW business process. Monitoring traffic This level of monitoring is carried out by software that can record the number of s sent to various recipients over any period of time. The content or body of the is not seen. Monitoring content Where VAW has reasonable grounds to believe that this policy is being breached, it may read the content of s. When carrying out this level of monitoring, any personal information seen that does not breach this code
7 will be treated confidentially, and not disclosed to anyone by the person monitoring the content. Accessing inbox As much of VAW business is conducted by , there may be occasions (e.g. where a member of staff is off sick, on leave, etc.) where a message is needed in order to continue business activities. In the absence of an alternative, a person s password may be changed to enable access to specific messages.
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
Information & Communications Technology Usage Policy Olive AP Academy - Thurrock
Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
INTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
How To Monitor The Internet In Idaho
Idaho Technology Authority (ITA) ENTERPRISE POLICY P1000 GENERAL POLICIES Category: P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING CONTENTS: I. Authority II. Abstract III. Definitions IV. Policy
WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
Angard Acceptable Use Policy
Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Acceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
Email Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
Internet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Information Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )
TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Email Services Policy
Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages
DIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
Berwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
Dauphin County Technical School
Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Acceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.
Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security
BOARD OF EDUCATION POLICY
BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
Policies Concerning the use of Computers
Policies Concerning the use of Computers Shrewsbury School s Policies Concerning the use of Computers The Director of IT is responsible for the formulation and review of policies affecting the use of computers
