Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
|
|
- Erick Butler
- 5 years ago
- Views:
Transcription
1 Dundalk Institute of Technology Acceptable Usage Policy Version
2 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision Summary of Changes Number/Revision Date Number V Version 1.0 release V /09/15 Annual Review of document noting new official titles Changes marked Consultation History Version Consultation Number/Revision Date Number Names of Parties in Consultation V1.0 09/01/14 James McCahill Peter McGrath Michael Denihan Linda Murphy Loretto Gaughran V /09/15 James McCahill Peter McGrath Michael Denihan Summary of Changes Create Policy Document for DkIT Annual Review - no Changes applied Approval This document requires the following approvals: Name Title Date Executive Board Executive Board EB 01/ /01/14 Governing Body Governing Body M /03/14 This policy shall be reviewed and updated on an annual basis. 2
3 Table of Contents 1. PURPOSE ROLES AND RESPONSIBILITIES SCOPE SUPPORTING STANDARDS & PROCEDURES ACCEPTABLE USAGE POLICY MONITORING VIOLATION OF POLICY APPENDICES... 8 Appendix I Acceptable Usage Rules for IT Resources and Internet Facilities... 8 Appendix II Specific Acceptable Usage rules for Appendices III Specific Acceptable Usage rules for Social Media... 9 Appendices IV Miscellaneous items
4 1. PURPOSE The purpose of this policy is to indicate the requirement for responsible and appropriate use of the Dundalk Institute of Technology information technology (IT) resources. Dundalk Institute of Technology provides resources to staff, students and external parties to assist them in performing their duties. It is envisaged that these resources will be used for educational, research and administrative purposes. This policy should be read in conjunction with Dundalk Institute of Technology Code of Conduct and Dundalk Institute of Technology Compliance policy. For details on Dundalk Institute of Technology policy on the management of its social media presence please refers to Dundalk Institute of Technology Social Media Management policy. 2. ROLES AND RESPONSIBILITIES The following roles and responsibilities apply in relation to this Policy: Governing Body: To review and approve the policy on a periodic basis. Vice President for Academic Affairs and Vice President for Financial and Corporate Affairs: To ensure the Policy is reviewed and approved by the Governing Body. To consult as appropriate with other members of the Executive and Management Teams. To liaise with Vice President for Academic Affairs Office or Human Resources (HR) on information received in relation to potential breaches of the policy. To ensure the appropriate standards and procedures are in place to support the policy. IT Manager: To define and implement standards and procedures which enforce the policy. To oversee, in conjunction with data owners, compliance with the policy and supporting standards and procedures. To inform the Vice President for Academic Affairs and Vice President for Financial and Corporate Affairs of suspected non-compliance and/or suspected breaches of the policy and supporting standards and procedures. HR Office and Vice President for Academic Affairs: To follow relevant and agreed disciplinary procedures when HR or Vice President for Academic Affairs Office is informed of a potential breach of the policy (Refer to Section 7). To manage the disciplinary process. Staff /Students /External Parties: To adhere to policy statements in this document. To report suspected breaches of policy to their Head of Department or the IT Manager. If you have any queries on the contents of this policy, please contact the Vice President for Financial and Corporate Affairs or the IT Manager. 4
5 3. SCOPE This Acceptable Usage policy covers acceptable usage of: Dundalk Institute of Technology data Dundalk Institute of Technology resources This policy applies but is not limited to the following, Dundalk Institute of Technology related groups as defined in Section 2.0 of the Overarching IT Documentation Framework: Dundalk Institute of Technology staff Dundalk Institute of Technology students Dundalk Institute of Technology external parties 4. SUPPORTING STANDARDS & PROCEDURES Dundalk Institute of Technology Information Security Policy Dundalk Institute of Technology Data Governance Policy Dundalk Institute of Technology Social Media Management Policy Dundalk Institute of Technology Password Standard. The above list is not exhaustive and other Dundalk Institute of Technology documents may also be relevant. 5. ACCEPTABLE USAGE POLICY Conventional norms of behaviour apply to computer based information technology just as they would apply to more traditional media. Within the setting of Dundalk Institute of Technology this should also be taken to mean that the traditions of academic freedom will always be respected. Dundalk Institute of Technology is committed to achieving an educational and working environment which provides equality of opportunity, and freedom from discrimination on the grounds of race, religion, sex, social class, sexual orientation, age, disability or special need. Dundalk Institute of Technology encourage all staff, students and external parties to apply a professional attitude towards their individual working environment, including the use of Dundalk Institute of Technology IT resources. Staff, students and external parties are responsible for their individual user account and password details (Refer to Dundalk Institute of Technology Password Standard). No staff, student or external party shall jeopardise the integrity, performance or reliability of Dundalk Institute of Technology resources. Reasonable care 1 must be taken to ensure that the use of resources does not reduce the level of integrity, performance or reliability of Dundalk Institute of Technology IT resources, or result in a denial of service to others. 1 Staff, Students, and External Parties should reference Dundalk Institute of Technology end user guidelines to ascertain what constitutes reasonable care. 5
6 No staff, student or external party shall improperly/maliciously interfere or attempt to interfere in any way with information belonging to or material prepared by another end user. Similarly no staff member, student or external party shall make unauthorised copies of information belonging to Dundalk Institute of Technology, another staff member, student or external party. The same conventions of privacy should apply to electronically held information as to that held on traditional media such as paper. Do not redistribute or transmit information intended for internal use to parties who do not require it for Institute business use. A limited amount of personal usage of Dundalk Institute of Technology resources is acceptable provided it: Does not consume more than a trivial amount of resources; Does not interfere with department or staff productivity; Is not for private commercial gain; Does not preclude others with genuine Dundalk Institute of Technology related needs from accessing the facilities; Does not involve inappropriate behaviour as outlined above, and; Does not involve any illegal or unethical activities. In order to protect the interest of staff, students and Dundalk Institute of Technology, system based controls have been implemented to prevent inappropriate usage 2. It is expressly forbidden under this policy to intentionally attempt to circumvent these controls. While the above policy statements and principles apply to all types of IT resource usage including , internet and social media, additional policy statements are provided in Appendices I, II and III to further clarify what constitutes appropriate usages of various Dundalk Institute of Technology IT resources. 6. MONITORING Dundalk Institute of Technology respects the right to privacy of staff, student and external parties. However, this right must be balanced against Dundalk Institute of Technology s legitimate right to protect its interests. Dundalk Institute of Technology is committed to ensuring robust information security and to protecting staff, students and external parties from illegal or damaging actions carried out by groups and/or individuals either knowingly or unknowingly. To achieve its aims in this regard, Dundalk Institute of Technology reserves the right to monitor all Dundalk Institute of Technology information resources and Dundalk Institute of Technology data. Any monitoring of Dundalk Institute of Technology data and/or Dundalk Institute of Technology information resources may be random or selective depending on circumstances at that time and will only be conducted following direction from an authorised individual. 2 Web Filtering solutions are one example of system based preventive controls. 6
7 All Dundalk Institute of Technology system activity including internet, and social media activity is monitored and logged for the following reasons: Monitoring system performance; Monitoring unauthorised access attempts; Monitoring the impact of system changes and checking for any unauthorised changes; Monitoring adherence to the acceptable usage rules outlined in this policy Legal compliance. When reviewing the results of any monitoring conducted in accordance with this section, Dundalk Institute of Technology will bear in mind that academic members of staff, students and external parties may be in possession of certain material for legitimate teaching, learning and/or research purposes. Academic members of staff, students and/or external parties will not be disadvantaged or subjected to less favourable treatment as a result of Dundalk Institute of Technology monitoring provided they exercise their academic freedom within the law and can demonstrate that their teachings, research or qualifications are relevant to material detected and results revealed by Dundalk Institute of Technology monitoring. 7. VIOLATION OF POLICY Contravention of any of the above policy will lead to the removal of Dundalk Institute of Technology resource privileges and can lead to disciplinary action in accordance with the Dundalk Institute of Technology disciplinary procedures. Internet postings which are deemed to constitute a breach of this procedure may be required to be removed; failure to comply with such a request may in itself result in disciplinary action. 7
8 8. APPENDICES Appendix I Acceptable Usage Rules for IT Resources and Internet Facilities IT resources and internet facilities should only be used for legitimate Dundalk Institute of Technology purposes. IT resources and internet facilities should never be used in a way that breaches any of Dundalk Institute of Technology s policies. In this context, the following policy statements apply: Do not bring Dundalk Institute of Technology into disrepute Do not breach any obligations relating to confidentiality Do not defame or disparage Dundalk Institute of Technology or other staff, students, and/or external parties Do not make inappropriate, hurtful or insensitive remarks about another individual or group Do not harass or bully another individual or group in any way Do not unlawfully discriminate against another individual or group. It is against the law to discriminate against another on grounds of gender, marital status, family status, sexual orientation, religion, age, disability, race or membership of an ethnic minority Do not represent yourself as another person Do not obtain, store and/or transmit confidential Dundalk Institute of Technology information without appropriate authorisation Do not breach data protection legislation (for example, never disclose personal information about another individual online unless this is done in compliance with the relevant legislation and Dundalk Institute of Technology authorisation) Do not breach any other laws or ethical standards Respect the legal protections to data and software provided by copyright and license agreements Do not load unauthorised and/or unlicensed software onto Dundalk Institute of Technology Resources Do not use Dundalk Institute of Technology IT resources to inappropriately obtain, store and/or distribute copyrighted material including music files and movies Do not use Dundalk Institute of Technology IT Resources to infringe intellectual property rights including trademark, patent, design and/or moral rights Do not obtain/download, store and/or distribute text or images which contain any materials prohibited by law, or material of an inappropriate or offensive nature including pornographic, racist or extreme political nature, or which incites violence, hatred or any illegal activity Do not use Dundalk Institute of Technology computers to make unauthorised entry into any other computer or network Do not participate in unauthorised activity which results in heavy network traffic and thereby interrupts the legitimate use by others of Dundalk Institute of Technology resources 8
9 Do not disrupt or interfere with other computers or network users, services, or equipment. Intentional disruption of the operation of computer systems and networks is a crime under the Computer Misuse legislation 3 Appendix II Specific Acceptable Usage rules for People should actively seek to use the most appropriate means of communication Do not forward inappropriate electronic mail messages to others Do not forward messages where permission has been withheld by the originator Do not (without prior notification to IT) forward electronic mail messages with attachments to large internal mail distribution lists Do not remove any copyright, trademark or other proprietary rights notices contained in or on the message Do not use to enter into legally binding contracts without proper authority being obtained beforehand Do not use BCC to address recipients inappropriately Do not use Dundalk Institute of Technology resources to participant in unsolicited advertising ( spamming ) Appendices III Specific Acceptable Usage rules for Social Media 4 The policy statements in this appendix deals with the use of all forms of social media, including Facebook, LinkedIn, Twitter, Wikipedia (all other social networking sites and services) and all other internet postings, including blogs, wiki s, and discussion boards. The policy statements in this appendix applies to the use of social media whether during office hours or otherwise and regardless of whether the social media is accessed using Dundalk Institute of Technology IT facilities and equipment or equipment belonging to members of staff or some other party. The policy statements below are set out under three headings: Protecting Dundalk Institute of Technology s interests and reputation Respecting colleagues, students and others Protecting Intellectual Property and Confidential Information 3 Most computer crime related offences can be found in section 5 of the Criminal Damage Act, 1991 and Section 9 of the Criminal Justice (Theft and Fraud) Offences Act, The Council of Europe Convention on Cybercrime, which entered into force in July 2004, also provides guidelines for governments wishing to develop legislation against cybercrime. 4 Staff, Students and/or external parties should refer to Dundalk Institute of Technology Policy for Social Media Management. 9
10 Protecting Dundalk Institute of Technology s interests and reputation: Dundalk Institute of Technology staff should only use official Institute social media sites for communicating with students and external parties which are managed and moderated as outlined in Social Media Management policy. This includes the use of any social media presence related to the distribution of class materials, study aids, provision of feedback to students or any other supports for teaching and learning activities. Staff and external parties must not post disparaging or defamatory statements about: The Institute; It s Staff; It s Students; or Others. Staff, Students and external parties should also avoid social media communications that might be misconstrued in a way that could damage Dundalk Institute of Technology s interests and reputation, even indirectly. Staff, Students and external parties are personally responsible for what they communicate in social media. If your affiliation as a staff member, student or external party of Dundalk Institute of Technology is disclosed, it must be clearly stated that the views presented do not represent those of Dundalk Institute of Technology. For example, you could state, "the views in this posting do not represent the views of Dundalk Institute of Technology". Avoid posting comments about sensitive work-related topics. Even if you make it clear that your views on such topics do not represent those of the Institute, your comments could still damage Dundalk Institute of Technology s reputation. Strive for accuracy in any material you post online. If you see content in social media that disparages or reflects poorly on Dundalk Institute of Technology or staff, students or external parties of Dundalk Institute of Technology, you should contact your line manager. Respecting colleagues, students and others: Do not post material that could be deemed to be threatening, harassing, illegal, obscene, defamatory, slanderous, or hostile towards any individual or entity. Do not post information including personal information related to Dundalk Institute of Technology staff, students and/or external parties without their express permission. Do not provide references for other individuals on social or professional networking sites, as such references, positive and negative, can be attributed to Dundalk Institute of Technology and create legal liability for both the author of the reference and Dundalk Institute of Technology. Respecting intellectual property and confidential information: Staff, Students and external parties should not jeopardise Dundalk Institute of Technology s business information, confidential information or intellectual property through the use of social media, internet file sharing or internet file storage sites. 10
11 Staff, Students and external parties should avoid misappropriating or infringing the intellectual property of companies and/or individuals, which can create liability for Dundalk Institute of Technology, as well as the individual author. Staff, Students and external parties should not use Dundalk Institute of Technology logos, brand names, slogans or trademarks unless approved. Staff, Students and external parties should not post any of Dundalk Institute of Technology s confidential or proprietary information without prior written permission. Staff, Students and external parties should not post copyrighted material without citing appropriate reference sources or acknowledging copyright accurately. Staff should not post information onto external file sharing sites where information may be accessible to external parties without prior permission to do so and having appropriate security measures. Appendices IV Miscellaneous items Purchase of hardware and Software All purchases should be approved by the IT Manager, preferably through the IT budget. Use of DkIT purchased hardware only is allowed on the wired network. Do NOT plug a personal laptop into a wall socket use the wireless network instead. See the separate Wireless Usage Policy document. Installing Software Get permission from IT Support before you install any software (including public domain software - see Note6) on equipment owned and/or operated by Dundalk Institute of Technology. Data transfer and storage on the network: Keep master copies of important data on Dundalk Institute of Technology's network and not solely on your PC's local C: drive or USB sticks. Otherwise it will not be backed up and is therefore at risk. Ask for advice from IT Support if you need to store, transmit or handle large quantities of data, particularly images or audio and video. These large files use up disc space very quickly and can bring your network to a standstill. Be considerate about storing personal (non- Dundalk Institute of Technology) files on Dundalk Institute of Technology's network central server environment. Don't copy files which are accessible centrally into your personal directory unless you have good reason (i.e. you intend to amend them or you need to reference them and the central copies are to be changed or deleted) since this uses up disc space unnecessarily. Care of equipment * Don't re-arrange how equipment is plugged in (computers, power supplies, network cabling, modems etc.) without first contacting IT Support. * Don't take food or drink into rooms which contain specialist equipment like servers. Access to such rooms is limited to authorised Computer Services staff. 11
ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy
Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016
Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
HUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
Internet, Social Media and Email Policy
West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...
OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy
SECTION OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy 1 Purpose 1 2 Principles 1 3 Telephone Use 2 4 Postal Mail 2 5 Email Use 3 6 Internet Use 3 7 Social
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and
ICT Acceptable Use Policy. August 2015
ICT Acceptable Use Policy August 2015 Document title ICT Acceptable Use Policy August 2015 Document author and department Responsible person and department Robbie Walker, Information Security Architect,
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Human Resources Policies and Procedures
SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media
Acceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
ICT Safe and Acceptable Use Policy for Students
ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...
BRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
------------------- COMPUTER NETWORK AGREEMENT FORM
COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
Internet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
Use of IT, Communications, Internet & Social Media Policy
Office of the Police and Crime Commissioner Use of IT, Communications, Internet & Social Media Policy 1. The Office of the Police and Crime Commissioner (OPCC) is committed to the principles of equality
CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils
CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils Contents 1. Scope 2 2. Use of IT Facilities 2 3. Monitoring of IT Facilities 5 4. Maintenance & Repairs 6 5. Copyright and Licence Agreements
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES
Administrative RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES For any individual or group utilizing WRDSB technology Responsibility: Legal References: Related References:
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
Acceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
[Example] Social Media Acceptable Use Policy
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY
SOCIAL MEDIA POLICY. Introduction
Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
Acceptable Use Policy of UNWIRED Ltd.
Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network
Using Public Computer Services in Somerset Libraries
Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which
This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).
Social Media Terms of Use Social media is an integral part of Historica Canada s communications efforts, offering an additional model to engage with participants, colleagues, other stakeholders and the
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website
Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
How To Use Social Media At St James Anglican School
P o l i c i e s n P r o c e d u r e s n I n f o r m a t i o n T o t a l n u m b e r o f p a g e s 2 P o l i c y C r e a t i o n D a t e : 2 4 S e p t e m b e r 2 0 1 4 P o l i c y R e v i e w D a t e :
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
Information Systems Acceptable Use Policy for Learners
Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
Electronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
Covered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
BLACKPOOL COUNCIL Topic Social Media Policy
1. Introduction 1.1 The widespread use of social media, particularly social networking sites, necessitates Blackpool has a policy in place to ensure that appropriate control mechanisms exist to minimise
Virginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08
Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable
6141.9. Internet and Computers. Acceptable Use and Internet Safety
6141.9 Acceptable Use and Internet Safety The Board of Education provides computers, a computer network, including Internet access and an email system, as well as electronic devices such as cellular telephones
City of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
Grand Rapids Public Schools
4510-R Computer Network (Cf. 4520) 4510-R Planning and funding for computer networking in the District shall be handled in accord with the District's policy and rules on technology. Supervised Use Teachers
Social Media Policy. Policies and Procedures. Social Media Policy
Policies and Procedures Social Media Policy 1 1. Introduction...3 2. Privacy settings and personal information.....3 3. Use of Social Media at Work.....4 4. Account Administrators and Login Details......4
BOBCAT COMPUTING POLICY
BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
INTERNET AND EMAIL POLICY
Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy
DIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Executive Memorandum No. 16
OFFICE OF THE PRESIDENT Policy for Responsible Use of University Computers and Information Systems 1. Purpose It is the purpose of this Executive Memorandum to set forth the University's administrative
SOCIAL MEDIA POLICY FOR VOLUNTEERS TEMPLATE
SOCIAL MEDIA POLICY FOR VOLUNTEERS TEMPLATE SOCIAL MEDIA POLICY FOR VOLUNTEERS TEMPLATE (Insert Your Organisation Name) uses social media in its work and recognises that those who are involved in its work
APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES
APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,
Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low
Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy
Appendix I. The City University of New York Policy on Acceptable Use of Computer Resources
Appendix I The City University of New York Policy on Acceptable Use of Computer Resources Introduction CUNY s computer resources are dedicated to the support of the university s mission of education, research
WCCM XII & APCOM VI Secretariat is in Seoul. Your use of http://wccm2016.org will always be
Terms & Conditions Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
E Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
HAZELDENE LOWER SCHOOL
HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
The British Academy of Management. Website and Social Media Policy
The British Academy of Management s Website and Social Media Policy The creation of management knowledge through research and its dissemination through teaching and application The British Academy of Management
Social Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy
Social Media Responsible officer: Director Community and Corporate Services Key Result Area: Governance and Decision Making Document type: Policy Reference: 10/01/0004 Approved by: Council Date approved:
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
Chicago State University Computer Usage Policy
Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services
'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
School Web Design Ltd Acceptable Use Policy. 1. Definitions. 2. Resource Usage. 3. Prohibited Uses
School Web Design Ltd Acceptable Use Policy The Policy below outlines the terms under which you the You, the Client may use the File Hosting Service provided by School Web Design. By using our File Hosting
Superintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS
Page 1 of 7 ELECTRONIC COMMUNICATIONS 1.0 The District supports the use of the Internet and electronic communications by all employees to improve teaching and learning through interpersonal communication,
MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks
MAINE COMMUNITY COLLEGE SYSTEM GENERAL ADMINISTRATION Section 203 SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks As with any college
Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES
Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy
Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
FMGateway by FMWebschool
FMGateway by FMWebschool Hosting Service Agreement 1. OVERVIEW This Hosting Service Agreement (this Agreement ) is entered into by and between FMWebschool, LLC, a/an Delaware limited liability company