Acceptable Use Policy

Size: px
Start display at page:

Download "Email Acceptable Use Policy"

Transcription

1 Acceptable Use Policy Document Owner : SCC Chief Information Officer Version : 3.2 Date : May 2011 We will on request produce this policy/procedure, or particular parts of it, in other languages and formats, in order that everyone can use and comment upon its content. Copyright 2011 Customer Service Direct - a partnership between BT, Suffolk County Council and Mid Suffolk District Council. Registered in England No Registered Office: 81 Newgate Street, London, EC1A 7AJ

2 Table of Contents 1 INTRODUCTION PURPOSE OBJECTIVES SCOPE LINKED/OTHER USEFUL POLICIES/PROCEDURES RESPONSIBILITIES SUFFOLK COUNTY COUNCIL CSD POLICY & COMPLIANCE TEAM MANAGERS USERS ETIQUETTE LEGAL LIABILITY & COMPUTER MISUSE INFORMATION SECURITY, VIRUSES, SPAM & MONITORING PERSONAL USE OF RECORDS MANAGEMENT AUTOMATIC FORWARDING OUT-OF-OFFICE MESSAGES ACCESSING MAILBOXES OF USERS MANAGING PERSONNEL CHANGES MANAGING COUNCILLOR CHANGES TEAM MAILBOXES PUBLIC FOLDERS GOVERNMENT CONNECT SECURE EXTRANET (GCSX) MAILBOXES SIGNATURES FOR & DISCLAIMERS SUFFOLK COUNTY COUNCIL EMPLOYEES SUFFOLK COUNTY COUNCILLORS EMPLOYEES WORKING FOR CUSTOMER SERVICE DIRECT (CSD) EMPLOYEES OF SUFFOLK COUNTY COUNCIL WORKING FOR OR ON BEHALF OF OTHER ORGANISATIONS (E.G. JOINT EMERGENCY PLANNING UNIT) FURTHER ADVICE GOVERNANCE DOCUMENT CONTROL Printed on: 12/05/2011 Page 2 of 28

3 1 INTRODUCTION 1.1 Purpose The purpose of this policy it to describe the etiquette and standards that users are expected to observe when using facilities provided by Suffolk County Council (SCC) and ensure that users are aware of the consequences of inappropriate use. 1.2 Objectives The primary objectives of this policy are: To set the expectations for etiquette and establish management standards; To help comply with the legal requirements for management and protect SCC, Councillors, employees and our partner organisations against litigation; To support the delivery of more efficient and effective front-facing services by providing timely access to full and accurate records; To minimise information storage and administration costs by ensuring the timely and secure disposal of expired s; To support the SCC Acceptable Use of ICT Policy. 1.3 Scope This policy applies to the use of ICT facilities to send, receive and manage messages (and attachments) and is applicable to SCC Councillors, the employees of SCC, any partners, voluntary groups, third parties and agents who SCC employees have authorised to access ICT facilities and staff seconded to, or working for, Customer Service Direct (CSD), including contractors and vendors with access to ICT systems. For the purposes of this Policy all these individuals are referred to as user or users. 1.4 Linked/Other useful policies/procedures This policy should be read in conjunction with the: SCC Acceptable Use of ICT Policy; SCC Password Management Policy; SCC ICT Remote Working Policy; SCC Software Policy; SCC Removable Media Policy; SCC Information Security Incident Management Policy; SCC Information Security Policy; SCC Protective Marking Policy. Printed on: 12/05/2011 Page 3 of 28

4 2 RESPONSIBILITIES 2.1 Suffolk County Council Training - SCC will train users in the appropriate use and management of . Training for Councillors will be provided as part of the Councillors Learning and Development Programme. 2.2 CSD Policy & Compliance Team Implementation and Monitoring of Policy - The CSD Policy & Compliance Team has been tasked to implement this policy and monitor its effectiveness. 2.3 Managers Induction, Training and Support - Managers are responsible for ensuring that adequate induction and training is undertaken by staff and that support is provided to them so as to implement this policy. The Monitoring Officer is responsible for ensuring that adequate induction and training is undertaken by Councillors and that support is provided to them so as to implement this policy User Access - Managers are responsible for ensuring the users they have approved and authorised to access Council Networks, ICT facilities and equipment are aware of and comply with this policy. 2.4 Users For Councillors, approvals and authorisations will be provided by the Head of Scrutiny and Monitoring Training - All users should attend the relevant training course. Outlook training is also available via the corporate training programme. Training for Councillors will be provided as part of the Councillors Learning and Development Programme Breach of this Policy - Users found to be in breach of this policy may be disciplined in accordance with the SCC Conduct and Capability Policy and the SCC Harassment & Bullying Policy. In certain circumstances, breach of this policy may be considered gross misconduct resulting in dismissal. Printed on: 12/05/2011 Page 4 of 28

5 Councillors found to be in breach of this policy may be deemed to be a breach of the Members Code of Conduct leading to action by the Standards Committee Breach of Information Security - Users must report all suspected breaches of information security to the CSD Policy & Compliance Team via the CSD IT Helpdesk using the Information Security Incident report form on COLIN User Accounts Users will be allocated one business account only except where they work for more than one organisation (see 2.4.5). In addition there may be business cases where, due to data security issues, an additional account is required. Assistant Directors and/or Strategic Information Agents must formally approve each business case. For Councillors, approvals and authorisations will be provided by the Head of Scrutiny and Monitoring. The CSD Policy & Compliance Team must be made aware of any such approvals via ICT Self Service. The CSD Policy & Compliance Team will provide final approval where appropriate Users Working For More Than One Organisation Where a user works for more than one organisation (e.g. SCC and CSD) they may be provided with a separate mail account for each organisation. The CSD Policy & Compliance Team will provide final approval where appropriate Users Moving from One Organisation to Another Where a user moves from one organisation to another (e.g. SCC to CSD) they will be provided with a new mail account for the new organisation. (see 2.13 Managing Personnel Changes) Users Moving from One Directorate or Department to Another If a user moves from one directorate or department to another within the same organisation then they may be provided with a new mail account dependent on the information security risk of keeping the original mail account. The CSD Policy & Compliance Team will provide final approval where appropriate. (see 2.13 Managing Personnel Changes) 2.5 Etiquette Alternatives to - Do not use as the only method of communication. A face-to-face meeting or telephone conversation may be more suitable for sensitive or complex issues Numbers of s - People feel overwhelmed by the number of s they receive. Keep the use of to a minimum Plain English - Maintain a concise, professional standard of communication using plain English. Printed on: 12/05/2011 Page 5 of 28

6 2.5.4 Standard Font, Size and Colour - If using formats other than plain text, users must select as standard the font Arial, size 12, colour black, using capitals and lowercase as normal. (Note: the standard size can be increased from 12 where visual clarity is required). The CSD IT Helpdesk can assist users in changing their settings Spell Check - applications should be set up to automatically spell check before sending . The CSD IT Helpdesk can assist users in changing their settings Single Topic and Facts - Restrict to a single topic, and only record facts and evidence-based opinions. This facilitates better corporate record-keeping Personal and Business Content - Do not mix personal and business content within the same Distribution - Only distribute s to colleagues who need to receive the message. Where feasible, make it clear what you are expecting recipients to do, and to what timescale e.g. For Information or For Action by dd/mm/yyyy. Users do not always need to Cc colleagues or Reply to all Blind Copies (bcc) - In the interests of transparency and accountability, Blind copies (bcc) must not be used. The only exception is when sending mail to a large distribution list and it is appropriate to hide the individual addresses to protect privacy Title - Give s a meaningful title in the Subject field and include the appropriate Protective Marking Level (see SCC Protective Marking Policy). Re-title an before forwarding if appropriate s to All Staff - Do not attempt to send an message to all members of the organisation the Internal Communications team will do this if appropriate Response - Reply to s as soon as possible if the sender requires a response. Do not assume that a sent message has been read Read Receipts - Only request read receipts where it is absolutely necessary. Do not set request read receipts as a default. 1 Check with the Internal Communications team to see if is the best method of getting your message across. Consider the following points: What is the intended result of the communication exercise? What needs to be communicated? Have you used plain English? Who does it need to be communicated to? When does it need to be communicated? Who needs to communicate it? Have you included details of the sender, their role & contact information in the footer? Have you included the phrase Please do not hit Reply to respond to this , contact the individual named above? Printed on: 12/05/2011 Page 6 of 28

7 Large s - Do not send large s (e.g. mails with large attachments) because they fill up their recipients mailbox (see Records Management) Outlook Calendars - Users must keep their outlook calendar up to date and ensure that it is accessible on a read-only basis to other users in their organisation, amending the access permissions as appropriate. The CSD IT Helpdesk can assist users in changing their settings, and in hiding from general view any private appointments. In order to appropriately separate the diary activities of Councillors and staff, the default will be that the outlook calendars of Councillors and staff will not be open to each group. 2.6 Legal Liability & Computer Misuse Formal Business Wording - Give s the same level of attention as drafting a formal letter. s could commit SCC to an agreement with suppliers and other third parties or provide evidence of harassment, defamation, libel and discrimination if worded incorrectly Personal or Non-Work Accounts - Users must not use a personal or nonwork account to send or receive business s Users must not: use a false identity in s nor use for the creation or transmission of anonymous messages; create s, or alter a message and then forward it, with the intention of deceiving the recipient; create, transmit, or forward any illegal, offensive, obscene or indecent images, data, or other material, or any data capable of being resolved into obscene or indecent images; create, transmit, or forward material that is designed or likely to cause annoyance, inconvenience or needless anxiety; create, transmit, or forward material that is designed to or would conflict with the business, or undermine the business in any way; create, transmit, or forward s containing customers personal information, or information that is commercially sensitive, to a personal or non-work account or to a work account where the user does not require it for a legitimate business use Sensitive Personal Data - Do not include sensitive personal data within s. For more information on Data Protection please contact the Information Management Services Helpdesk, or see Managing Information on COLIN. Sensitive personal data is defined as: Racial or ethnic origin; Political Opinions; Printed on: 12/05/2011 Page 7 of 28

8 Religious Beliefs (or other beliefs of a similar nature); Membership of a trade union; Physical or mental health condition; Sexual life; Criminal convictions / alleged offences In addition to the sensitive personal data listed above, as specified by the Data Protection Act, staff should be mindful of all of the characteristics protected under the Equality Act 2010 (age, disability, gender, gender reassignment, marriage and civil partnerships, pregnancy and maternity, race, religion or belief and sexual orientation). Staff should only make reference to these characteristics in s where it is necessary and relevant to do so, and should mark such s PROTECT Payment Card Data - You must not include or request Credit or Debit card numbers within s. If you receive an containing a Credit or Debit card number you must delete it immediately. Credit or Debit card numbers include the long card/account number (PAN), the Card Security Code (CSC number printed on reverse of card) and the PIN number. If you process Credit or Debit card payments in the course of your work, you must do this in accordance with the Payment Card Industry Data Security Standard (PCI DSS) and any job-specific guidance on handling payment card data. Your line manager can provide you with job-specific guidance on handling payment card data. 2.7 Information Security, Viruses, Spam & Monitoring Temporarily Away From Desk - Users must log out from or lock their PC when temporarily away from their desk to prevent unauthorised use of accounts. This applies wherever the user is located at the time of use (e.g. home or office) PROTECT, RESTRICTED or CONFIDENTIAL Information - Do not send PROTECT, RESTRICTED or CONFIDENTIAL information by unencrypted , particularly to an external recipient if accidental disclosure could lead to significant harm or embarrassment. Where possible do not use data that makes it easy to identify individuals e.g. Use initials instead of names. Please refer to COLIN for details of how to send encrypted . For further advice on when encrypted should be used please contact Information Management Services. Please refer to the Acceptable Use of ICT Policy for Third Party Access to Data Encrypting - The transmission of sensitive, RESTRICTED, or CONFIDENTIAL information should be limited to exceptional circumstances. In these exceptional circumstances the encryption service must be used. The encryption service should not be used for the routine exchange of information. Please refer to COLIN for details of how to send encrypted . For further advice on when encrypted should be used please contact the Information Compliance Helpdesk. Printed on: 12/05/2011 Page 8 of 28

9 2.7.4 Protective Marking Categorisation of Messages When creating an , the information contained within it must be assessed and classified by the owner according to the content. All s should be protectively marked in accordance with the SCC Protective Marking Policy. The marking classification will determine how the , and the information contained within it, should be protected and who should be allowed to access it. How it is handled, published, moved and stored will also be dependant on this scheme. The owner should add the classification of the in CAPITALS to the start of the subject line of the e.g. PROTECT: Normal Title of , or RESTRICTED: Normal Title of . may be used but this is not an absolute requirement (see also SCC Protective Marking Policy) Suspicious Activity - Do not open any from an unrecognised source or s that have dubious or missing subject lines. Do not open unsolicited attachments unless sure of the source. Disable the preview pane within Outlook to minimise the risk of opening an infected . Report any suspicious activity to the CSD Policy & Compliance Team via the CSD IT Helpdesk immediately Unwanted s - Report all problems with unwanted s, including any received that are defined in paragraphs and 2.6.4, to the CSD Policy & Compliance Team via the CSD IT Helpdesk immediately. Do not forward these to any other person unless requested by the CSD IT Helpdesk or the CSD Policy & Compliance Team. Never send or forward chain messages or virus warnings. The vast majority are bogus and they waste user s time and network bandwidth Personal Messages - Do not forward s containing anyone s personal messages without their permission Copyright - Do not forward material via in breach of copyright Inspection of Records - Users must comply with a request from a manager to inspect records and/or to printout items relevant to a particular individual, case or subject. This will only be requested when required under the Data Protection Act, under a Freedom of Information request, as allowed for in the Sections Monitoring and Accessing Mailboxes of Users of this policy or for other legitimate business reasons. Deletion of relevant s following such a request may be a criminal offence. For Councillors, requests will be made by the Head of Scrutiny and Monitoring will be checked if: There is reasonable cause to believe the user has violated or is violating this policy, any guidelines or procedures established to implement this policy; An account appears to be engaged in unusual or unusually excessive activity; Printed on: 12/05/2011 Page 9 of 28

10 It is necessary to do so to protect the integrity, security, or functionality of ICT resources or to protect SCC or its partners from liability; Establishing the existence of facts relevant to the business; Ascertaining or demonstrating standards which ought to be achieved by those using the facilities; Preventing or detecting crime; Investigating or detecting unauthorised use of facilities; Ensuring effective operation of facilities; Determining if communications are relevant to the business (for example, in the last resort where an employee is off sick or on holiday and business continuity is threatened); It is otherwise permitted or required by law Monitoring - Any necessary monitoring will be carried out in accordance with the Information Commissioner s Office (ICO) Code of Best Practice on Monitoring Employees Violation of this Policy - Where an individual has reasonable cause to believe that another user has violated, or is violating this policy, or any guidelines, or procedures established to implement this policy then they shall in the first instance inform a Senior Manager who may refer the matter to the HR Professional Services Team (via the HR Helpdesk) for investigation under the SCC Conduct and Capability Policy see If the HR Professional Services Team advise the Senior Manager that use needs to be checked in accordance with then the Senior Manager should refer this to the CSD Policy & Compliance Team directly or via the CSD IT Helpdesk. In these circumstances the checks may necessitate the immediate suspension of the user s access to relevant Council Networks, ICT facilities and equipment, ICT systems and applications in order that any potential evidence is not compromised. Where an individual has reasonable cause to believe that a Councillor has violated, or is violating this policy, or any guidelines, or procedures established to implement this policy then they shall in the first instance inform a Senior Manager who should refer the matter on to the Head of Scrutiny and Monitoring for investigation. If the Head of Scrutiny and Monitoring advises that use needs to be checked in accordance with then they should refer this to the CSD Policy & Compliance Team. In these circumstances the checks may necessitate the immediate suspension of the Councillor s access to relevant Council Networks, ICT facilities and equipment, ICT systems and applications in order that any potential evidence is not compromised User Access Suspension - If the HR Professional Services Team advise the Senior Manager that the user s access to Council Networks, ICT facilities and equipment, ICT systems and applications needs to be suspended in order that use can be checked in accordance with then the Senior Manager should refer this to the CSD Policy & Compliance Team directly or via the CSD IT Helpdesk. Printed on: 12/05/2011 Page 10 of 28

11 Councillor User Access Suspension If the Head of Scrutiny and Monitoring advises that the Councillor s access to Council Networks, ICT facilities and equipment, ICT systems and applications needs to be suspended in order that use can be checked in accordance with then they should refer this to the CSD Policy & Compliance Team Automatic Monitoring - SCC will apply automatic message monitoring, filtering and rejection systems as appropriate and deny transmission or receipt of messages with content that represents a threat to the ICT network or is unacceptable in the terms of this and other corporate policies. An ICT administrator may examine messages placed in quarantine, and forward or delete them as appropriate. 2.8 Personal Use of Personal Use - Limited personal use by Councillor s, or in an employee s own time at work is permitted, but this must comply with the Acceptable Use of ICT Policy Multimedia Attachments - Do not use corporate systems to send or receive multimedia attachments that are not related to work e.g. containing images, video or sound clips Users must not use the corporate systems to send: personal adverts; personal sponsorship requests; personal appeals; or details of events that are not corporately supported Title Mail as Personal - Clearly title personal and folders as personal to reduce the risk of administrators inadvertently viewing private, non-work . Delete personal mail from SCC systems as soon as possible Personal and Business Content - Do not mix personal and business content within the same Registering with any Organisation or Web-Site - Do not use your work account as the registration mail address when registering with any organisation or web-site for personal use Management of Personal s - Personal s should be managed as if they are non-records (see 2.9.7). Printed on: 12/05/2011 Page 11 of 28

12 2.9 Records Management Size of Mailbox - Users are responsible for keeping control of the size of their mailbox by managing their s and all folders (including their inbox, sent and deleted items). Users must operate within a mailbox limit of 100 megabytes (MB). 2 There may be business cases where, for operational reasons, this limit needs to be exceeded. Assistant Directors and/or Strategic Information Agents must formally approve each business case and keep to a minimum any operational exceptions. For Councillors, approvals and authorisations will be provided by the Head of Scrutiny and Monitoring. The CSD Policy & Compliance Team must be made aware of any such approvals using the Request for a Mailbox Size Increase. The CSD Policy & Compliance Team will provide final approval where appropriate Records - records must be saved in accordance with the SCC Freedom of Information & Records Management Policy, either as a hardcopy printout or as electronic.msg file on a shared file-server alongside related business documents and spreadsheets. records should be saved for business needs only, not for defensive filing purposes. For more information on records, nonrecords and managing them see the Essential Guidance to Managing Electronic Records on COLIN, or contact the Information Compliance Helpdesk for further details Outlook Personal Folders (PST Files) - records must not be stored within Outlook personal folders (or PST files), as these are generally inaccessible to other people. Do not use the Outlook Auto-archiving function to manage records. Users who currently use personal folders (or PST files) for records must migrate the s contained within to a shared file system and delete all folders. In exceptional circumstances additional storage or archiving functionality can be purchased where there is a clear business need. If however, following determination that there is not a clear business need and that the personal folders are not migrated following a request to do so, then ICT will remove any folders that are not deleted. Assistant Directors and/or Strategic Information Agents must formally approve each business case for additional storage or archiving functionality and keep to a minimum any operational exceptions. The CSD Policy & Compliance Team must be made aware of any such approvals via ICT Self Service. The CSD Policy & Compliance Team will provide final approval where appropriate. 2 You can find out how big your mailbox is by right-hand clicking Outlook Today Mailbox Your name and selecting Properties for Mailbox Your Name. Select Folder Size and note the Total Size (Fld+SubFld). The number is in kilobytes. Divide by a 1000 to gain an approximation of the number of megabytes e.g K = 75 MB. Printed on: 12/05/2011 Page 12 of 28

13 2.9.4 Service Area Saving Conventions - Conventions should be established within each service area to determine who saves what and when to reduce duplication e.g. the author of an internal mail and the primary recipient of an external mail has the responsibility to file it Records Retention - records must be kept for an appropriate period according to their content. Information Agents or the Information Compliance Helpdesk can help in applying the Corporate Records Retention Guidelines Non-Records business non-records must not be stored within Outlook personal folders (or PST files) and should remain in your mailbox. Users who currently use personal folders (or PST files) for business non-records must migrate the s contained back to their mailbox and delete all personal folders. If however, the personal folders are not migrated following a request to do so, then ICT will remove any folders that are not deleted. It may be necessary to keep three months worth of business non-records in your mailbox in order to provide context for current tasks however these must be deleted promptly and within 3 months of receipt or sending Personal s - Personal s must not be stored within Outlook personal folders (or PST files) and should remain in your mailbox. Users who currently use personal folders (or PST files) for personal s must migrate the s contained back to their mailbox and delete all personal folders. If however, the personal folders are not migrated following a request to do so, then ICT will remove any folders that are not deleted. All personal s must be deleted promptly and within 1 month of receipt or sending Attachments - Try not to send attachments with internal s. Where there are no technical barriers, save the file to a shared file-server and send a short cut by , use the Electronic Document Management System (if available) or ask a web editor to place the file on the intranet and send a link Large Attachments - Do not send attachments on the corporate network larger than 10MB Automatic Forwarding Forwarding to an External Address - Do not set up an automatic forwarding rule to an external address. It is recommended that use is made of the Outlook Web Access service for those users who need to access s away from the office Forwarding to a CSD user - If you are a SCC user do not set up an automatic forwarding rule to a CSD user, or vice versa. Printed on: 12/05/2011 Page 13 of 28

14 Forwarding if Leaving Employment - Where a user is leaving the employment of SCC then they may set up an automatic forwarding rule to another team member, their line manager or a team mailbox prior to leaving however their mail account will be closed when they leave. (see Managing Personnel Changes) Forwarding if Absent - Where a user is absent and unable to set up an automatic forwarding rule (e.g. due to sickness) a request that one is set up to another team member, or a team mailbox can be made by contacting the CSD IT Helpdesk. Such requests should be from the line manager of the user who is absent. If the line manager is the user who is absent then the request needs to be from the next higher level manager. If in addition access is required to the user s account this can be requested by their line manager (see Accessing Mailboxes of Users). For Councillors, approvals and authorisations will be provided by the Head of Scrutiny and Monitoring. The CSD Policy & Compliance Team will provide final approval where appropriate GCSx Forwarding - If you are a GCSx user do not set up an automatic forwarding rule to a non GCSx user Out-of-Office Messages Use of Out-of-Office Messages - Users should set out-of-office messages prior to all periods of leave or absence and remove them immediately upon their return. An out-of-office message should not be set when a user is working from home and has access to as they are available to receive and respond to s in the usual way. Out-of-office messages should not be used for any other purpose Out-of-Office Message Content - Alternative contact details for urgent enquiries must be provided e.g. I am out of the office between 1 st and 3 rd July. Please contact John Smith on XXXXX XXXXXXX (john.smith@suffolk.gov.uk) for urgent matters relating to recycling or Jane Jones on XXXXX XXXXXX (jane.jones@suffolk.gov.uk) for enquiries regarding waste disposal Managers Out-of-Office Messages - Managers should detail a named alternative contact in their out-of-office message and not simply refer people to generic mail accounts, or helpdesks Personal Details - Personal details about holiday, leave or sickness must not be revealed within out-of-office messages Alternative Contacts - If you are a SCC user do not set an out-of-office message detailing a CSD user as an alternative contact, or vice versa. Printed on: 12/05/2011 Page 14 of 28

15 Internal & External Out-of Offices Messages - Out-of-office messages should be set for all internal and external contacts. Certain versions of Outlook require the setting up of 2 types of out-of office message, one internal and the other external. Other versions of Outlook require one type of out-of-office message which is then sent to all internal and external contacts Setting an Out-of-Office Message if Absent - Where a user is absent and unable to set an out-of-office message (e.g. due to sickness) a request that one is set up can be made by contacting ICT Self Service. Such requests should be from the line manager of the user who is absent. If the line manager is the user who is absent then the request needs to be from the next higher level manager. The out-of-office message should warn the sender of the user s absence, including timescales where possible and provide alternative contact details. If in addition access is required to the user s account this can be requested by their line manager (see Accessing Mailboxes of Users). Please note that a request for setting an out-ofoffice message where the user has just forgotten to do so will not in normal circumstances be actioned. For Councillors, approvals and authorisations will be provided by the Head of Scrutiny and Monitoring. The CSD Policy & Compliance Team will provide final approval where appropriate Professional Group Subscriptions - Users should unsubscribe from any professional groups while away or when they leave the employment of SCC to avoid sending out-of-office or undeliverable messages to forum members Accessing Mailboxes of Users Access Permission - Do not attempt to gain access to any other user s mailbox without their permission Access to a User Mailbox where the User is Absent and has Granted Permission - Where the user is absent (e.g. due to sickness), has granted permission to access their mailbox however is unable to set this up themselves, the set up can be requested via ICT Self Service). The request must be from the line manager of the person requiring access detailing the business need to do so. If the line manager is the user who is absent then the request needs to be from the next higher level manager. Managers should be aware that access would be time limited and strictly limited to business . For Councillors, approvals and authorisations will be provided by the Head of Scrutiny and Monitoring. The CSD Policy & Compliance Team will provide final approval where appropriate. Printed on: 12/05/2011 Page 15 of 28

16 Access to a User Mailbox where the User is Absent and Unable to Grant Permission - Where the user is absent and unable to provide permission to access their mailbox do not attempt to gain access without the express permission of the CSD Policy & Compliance Team (available via ICT Self Service). Such requests should be from the line manager of the person requiring access detailing the business need to do so. If the line manager is the user who is absent then the request needs to be from the next higher level manager. Managers should be aware that such permission would only be granted in the last resort in the interests of business continuity, that access would be time limited and strictly limited to business . For Councillors, approvals and authorisations will be provided by the Head of Scrutiny and Monitoring. The CSD Policy & Compliance Team will provide final approval where appropriate Access to a User Mailbox where the User is Absent for a Long Period so as to Manage their Mailbox Prior to Return - Where the user has been absent for a long period (over 1 month) access to their mailbox can be requested in order that unnecessary s can be deleted and the mailbox managed prior to the user s return to work. In these cases express permission needs to be granted by the CSD Policy & Compliance Team (available via ICT Self Service). Such requests should be from the line manager of the person requiring access detailing the business need to do so. If the line manager is the user who is absent then the request needs to be from the next higher level manager. Managers should be aware that access would be time limited and strictly limited to business . For Councillors, approvals and authorisations will be provided by the Head of Scrutiny and Monitoring. The CSD Policy & Compliance Team will provide final approval where appropriate Access to a User Mailbox where the User is Absent so as to Check for any Inappropriate or Sensitive s - Where the user has been absent access to their mailbox can be requested in order to check for any inappropriate or sensitive s that may require deletion prior to the user s return to work. In these cases express permission needs to be approved by the CSD Policy & Compliance Team (available via ICT Self Service). Such requests should be from the line manager of the person requiring access detailing the business need to do so. If the line manager is the user who is absent then the request needs to be from the next higher level manager. Managers should be aware that access would be time limited and strictly limited to business . For Councillors, approvals and authorisations will be provided by the Head of Scrutiny and Monitoring. The CSD Policy & Compliance Team will provide final approval where appropriate. Printed on: 12/05/2011 Page 16 of 28

17 Access to a User Mailbox where the User Changes Roles or is Leaving Employment - Where the user changes roles or leaves the employment of SCC and their account is closed down do not attempt to gain access to the closed account without the express permission of the CSD Policy & Compliance Team (available via ICT Self Service). Such requests should be from the line manager of the person requiring access detailing the business need to do so. If the line manager is the person who is changing roles or leaving then the request needs to be from the next higher level manager. Managers should be aware that such permission would only be granted in the last resort in the interests of business continuity, that access would be time limited and strictly limited to business . For Councillors, approvals and authorisations will be provided by the Head of Scrutiny and Monitoring. The CSD Policy & Compliance Team will provide final approval where appropriate Managing Personnel Changes Management of Records where the User Changes Roles or Moves from one Organisation to Another or is Leaving Employment - Users must ensure that all records are transferred to their manager if they change roles within the organisation, or if they move from one organisation to another and the records are no longer required for the new role, or if they leave the employment of SCC. All personal messages must be removed from their account Deletion of a User who Leaves Employment - If a user leaves SCC, it is the manager s responsibility to ensure that CSD ICT is informed immediately by logging a Delete User Account request via ICT Self Service so that they revoke access rights and shut down the personal account as soon as the user has left. For audit purposes, the contents of the mailbox will be kept for a 3 month period after the user has left before it is deleted Notification to Contacts of a User who is Leaving Employment - If notice is worked out the user should be asked to inform all business and personal contacts when they will be leaving and who should be contacted instead Notification to Contacts of a User Changing Roles or Leaving Employment where the User is Dealing with Issues where Responses are Awaited - Where the user changes roles or leaves the employment of SCC and is dealing with issues where responses are awaited which would be sent to their account, the user or their line manager should ensure that all relevant contacts are made aware that no future responses should be sent to that individual and provide an alternative address Informing ICT that a User is leaving the Employment of SCC quickly or is on Discretionary Leave If a user is leaving the employment of SCC quickly (e.g. due to redundancy), or is on discretionary leave, and the account is required Printed on: 12/05/2011 Page 17 of 28

18 to have the access rights revoked and the personal account shut down due to potential information security/integrity risks, it is the Assistant Director s responsibility to ensure that the CSD Policy & Compliance Team are contacted immediately User Leaving Employment - If the user leaves the employment of SCC then see 2.10 Automatic Forwarding and 2.12 Accessing Mailboxes of Users Managing Councillor Changes Management of Records where a Councillor s Role Changes Within the Council or their Term of Office Ends - Councillors must ensure that all records are transferred to the Head of Scrutiny and Monitoring if the Councillor s term of office ends, or if their role changes within the Council and the records are no longer required for the new role Informing ICT when a Councillor s Term of Office Ends - The Head of Scrutiny and Monitoring is responsible for ensuring that CSD ICT is informed immediately when a Councillor s term of office ends, by logging a Delete User Account request via ICT Self Service so that access rights can be revoked and the personal account shut down as soon as the Councillor has left. For audit purposes, the contents of the mailbox will be kept for a 3 month period after the Councillor has left before it is deleted Team Mailboxes Requests to Set Up a Team Mailbox - Where there is a business need a request to set up a team mailbox can be made via ICT Self Service. The line manager of the team needs to make the request. An owner for the Team Mailbox also needs to be stated. For Councillors, approvals and authorisations will be provided by the Head of Scrutiny and Monitoring. The CSD Policy & Compliance Team will provide final approval where appropriate Size of Mailbox The owner of the Team Mailbox is responsible for keeping control of the size of the mailbox by managing the s and all folders (including the inbox, sent and deleted items). The owner must operate within a mailbox limit of 100 megabytes (MB). 3 There may be business cases where, for operational reasons, this limit needs to be exceeded. Assistant Directors and/or 3 You can find out how big your mailbox is by highlighting the Team Mailbox under All Mail Folders, then right-hand clicking and selecting Properties for Mailbox the Team Mailbox. Select Folder Size and note the Total Size (Fld+SubFld). The number is in kilobytes. Divide by a 1000 to gain an approximation of the number of megabytes e.g K = 75 MB. Printed on: 12/05/2011 Page 18 of 28

19 Strategic Information Agents must formally approve each business case and keep to a minimum any operational exceptions. For Councillors, approvals and authorisations will be provided by the Head of Scrutiny and Monitoring. The CSD Policy & Compliance Team must be made aware of any such approvals using the Request for a Mailbox Size Increase. The CSD Policy & Compliance Team will provide final approval where appropriate Auto Forwarding by Team Members to and from a Team Mailbox - Auto forwarding of mail to and from the team mailbox by the team membership can be set up however this should be managed appropriately and kept to a minimum due to mailbox size and storage restrictions Public Folders Use of Public Folders SCC is phasing out the use of Public Folders and no new Public Folders will be created Public Folder Management - The owner of an existing Public Folder is responsible for keeping control of the Public Folder and ensuring that its use is phased out in order that it can be deleted by 1 st April Government Connect Secure extranet (GCSx) Mailboxes GCSx Mailbox Format All s sent via the Government Connect Secure extranet (GCSx) must be sent using address RESTRICTED Information s sent outside this Council network travel over the public communications network and are liable to interception or loss. There is a risk that copies of the are left within the public communications system. Therefore any s containing RESTRICTED information must not be sent outside of the Council network, unless encrypted, or sent from a GCSx account Addressing s Care should be taken when addressing all s, but particularly where they include PROTECT or RESTRICTED information, to prevent accidental transmission to unintended recipients External Messages via GCSx Connection Where GCSx is available to connect sender and receiver of the message, this must be used for all external use between those parties GCSx Forwarding - If you are a GCSx user you must not set up an automatic forwarding rule to a non GCSx user. Printed on: 12/05/2011 Page 19 of 28

20 Requests to Set Up a GCSx Mailbox - Where there is a business need a request to set up a GCSx mailbox for a user or team can be made via the ICT Service Catalogue. The line manager of the user or team needs to make the request. The Section 151 Officer is responsible for approving the request. The CSD Policy & Compliance Team will provide final approval where appropriate GCSx Mailbox Creation Where a user has been approved to be provided with a GCSx mailbox, in accordance with paragraph , then their normal mail account will be amended to a GCSx one; the user will not be provided with a separate GCSx mailbox. There may be business cases where, for operational reasons, a separate GCSx mailbox is required. Assistant Directors must formally approve each business case however the request to set up the mailbox must also be approved by the Section 151 Officer in accordance with paragraph The CSD Policy & Compliance Team will provide final approval where appropriate GCSx Mailboxes and the SCC Webmail and Blackberry Services Where a user has been approved to be provided with a GCSx mailbox, in accordance with paragraph , then, for reasons of information security, currently they will be barred from using the SCC Webmail (OWA) and Blackberry Services. In addition a user is not authorised to have send as or send on behalf of permissions to a GCSx mailbox unless that user also has a GCSx mailbox. 3 SIGNATURES FOR & DISCLAIMERS 3.1 Suffolk County Council Employees Footer Statement - All s that are sent to external addresses will automatically include the following statement in the footer: s sent to and from this organisation will be monitored in accordance with the law to ensure compliance with policies and to minimize any security risks. The information contained in this or any of its attachments may be privileged or confidential and is intended for the exclusive use of the addressee. Any unauthorised use may be unlawful. If you receive this by mistake, please advise the sender immediately by using the reply facility in your software. The following signature must be used by Suffolk County Council employees: Standard Signature - Users must not include logos, animation, scanned images, home addresses, personal addresses or personal telephone numbers in their standard signature Standard Background - The background of s must be white and with no patterns. Printed on: 12/05/2011 Page 20 of 28

21 3.1.4 Standard Signature Font, Size and Colour If using formats other than plain text, users must select as standard the font Arial, size 12, colour black, using capitals and lowercase as normal. (Note: the standard size can be increased from 12 where visual clarity is required). The CSD IT Helpdesk can assist users in changing their settings Standard Signature - Users must use the following corporate text for their signature. All of the text below should be copied into an signature box so that it appears every time a work is signed. Forename Surname (in bold) Job Title Service Area Directorate Suffolk County Council Postal address (which can be presented horizontally, rather than vertically, to save space) Tel: XXXXXX Mob: 0XXXX XXXXXX (if required) Fax: XXXXXX (if required) forename.surname@ suffolk.gov.uk Postal Address - s sent to internal colleagues do not require the inclusion of the postal address in the signature Disclaimer - SCC users are not required to add a disclaimer to their . However, where users wish to include one to help protect against messages being misused, the following disclaimer can be added: The information contained in this is intended for the named addressee only, and may be confidential and privileged. If you have received it in error, I apologise and ask that you destroy it and notify me that you have done so Copyright - Where the user wishes to note that the contents are protected by copyright they should attach a copyright notice: Copyright (Year) Suffolk County Council or (Year) Suffolk County Council Personal Disclaimer - Users sending genuinely personal messages from their corporate account may use the following disclaimer, although the message will be identified as having come from SCC and great care must be taken to avoid any possibility of being left vulnerable to legal action or loss of reputation: The views contained in this message are those of the individual and do not necessarily represent the views of Suffolk County Council. Printed on: 12/05/2011 Page 21 of 28

22 3.2 Suffolk County Councillors Footer Statement - All s that are sent to external addresses will automatically include the following statement in the footer: s sent to and from this organisation will be monitored in accordance with the law to ensure compliance with policies and to minimize any security risks. The information contained in this or any of its attachments may be privileged or confidential and is intended for the exclusive use of the addressee. Any unauthorised use may be unlawful. If you receive this by mistake, please advise the sender immediately by using the reply facility in your software. The following is the suggested signature format for Councillors to use: Standard Signature - Councillors should not include logos, animation, or scanned images in their standard signature Standard Background - The background of s should be white and with no patterns Standard Signature Font, Size and Colour - If using formats other than plain text, Councillors should select as standard the font Arial, size 12, colour black, using capitals and lowercase as normal. (Note: the standard size can be increased from 12 where visual clarity is required). The CSD IT Helpdesk can assist Councillors in changing their settings Standard Signature - Users can use the following text for their signature. All of the text below can be copied into an signature box so that it appears every time an is signed. Councillor xxxxx (in bold) Name County Councillor for xxxxx Division Post (e.g. portfolio holder for xx, Chairman of xx) (if applicable) Postal Address (SCC or Home Address) Tel: xxxxx xxxxxx Mobile: xxxx xxxxx Fax: xxxx xxxxxx forename.surname@ suffolk.gov.uk Councillors own website (if applicable) Disclaimer - Councillors are not required to add a disclaimer to their . However, where they wish to include one to help protect against messages being misused, the following disclaimer can be added: Printed on: 12/05/2011 Page 22 of 28

LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3

LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3 LINCOLNSHIRE COUNTY COUNCIL Information Security Policy Framework Document No. 8 Email Policy V1.3 Document Control Reference V1.3 Email Policy Date 17 July 2015 Author Approved by Version History David

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

Islington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014

Islington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014 A council-wide information technology policy Version 0.9 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document is distributed under the Creative Commons Attribution

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

DEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE

DEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE 2 of 10 2.5 Failure to comply with this policy, in whole or in part, if grounds for disciplinary actions, up to and including discharge. ADMINISTRATIVE CONTROL 3.1 The CIO Bureau s Information Technology

More information

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body) ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

E-Mail Management Policy

E-Mail Management Policy Information Management Standards & Procedures E-Mail Management Policy Appendices: A. Decision Matrix For Email Records Management 1 st December 2009 Document Version: 1.0 Page 1 of 14 Contents 1.0 Document

More information

Email Policy For Staff and Students

Email Policy For Staff and Students Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Email Usage Policy Document Profile Box

Email Usage Policy Document Profile Box Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee

More information

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience: E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

Evidence additional element appendix 47. Records Management Guidance for the management of emails

Evidence additional element appendix 47. Records Management Guidance for the management of emails Records Management Guidance for the management of emails 2010 1 Document Control Sheet Name of Document: Guidelines for the Management of Emails as Records 2010 Author: Consultees Description of Content:

More information

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Executive Director (AK) [J50]

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - EMAIL POLICY Executive Director (AK) [J50] AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Committee: Policy and Resources Date: 23 rd June 2009 Author: Executive Director (AK) [J50] 1.0 ISSUE 1.1

More information

POLICY ON USE OF INTERNET AND EMAIL

POLICY ON USE OF INTERNET AND EMAIL POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

UTC Cambridge ICT Policy

UTC Cambridge ICT Policy UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Requests to create new Distribution lists must be approved by a Vice President, President, Vice Chancellor, or the Chancellor.

Requests to create new Distribution lists must be approved by a Vice President, President, Vice Chancellor, or the Chancellor. Key points for Distribution List Use Recommendations a. Polled CCC CIO s on whether their District or Institution has Institution wide DLs and whether special approval for use is required. Rec d 25 responses

More information

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

E-SAFETY POLICY 2014/15 Including:

E-SAFETY POLICY 2014/15 Including: E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable

More information

Merthyr Tydfil County Borough Council. Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

HAZELDENE LOWER SCHOOL

HAZELDENE LOWER SCHOOL HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016

More information

Assistant Director of Facilities

Assistant Director of Facilities Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable

More information

How to Manage Email. Guidance for staff

How to Manage Email. Guidance for staff How to Manage Email Guidance for staff 1 Executive Summary Aimed at Note Purpose Benefits staff Necessary skills to All staff who use email This guidance does NOT cover basic IT literacy skills. Staff

More information

Code of Practice for E-mail Users

Code of Practice for E-mail Users Code of Practice for E-mail Users Page 1 of 7 May11/ver02 1. Be concise and to the point Do not make an e-mail longer than it needs to be. Remember that reading an e-mail is harder than reading printed

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Electronic Mail Policy Version: 5 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

Data Protection and Privacy Policy

Data Protection and Privacy Policy Data Protection and Privacy Policy 1. General This policy outlines Conciliation Resources commitments to respect the privacy of people s personal information and observe the relevant data protection legislation.

More information

John Leggott College. Data Protection Policy. Introduction

John Leggott College. Data Protection Policy. Introduction John Leggott College Data Protection Policy Introduction The College needs to keep certain information about its employees, students and other users to allow it to monitor performance, achievements, and

More information

School policies and Security Risks

School policies and Security Risks 1) Introduction a) The school expects its computer and telephone systems to be used in a professional manner at all times. The school provides these facilities at its expense for its own business purposes.

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Service Schedule for Business Email Lite powered by Microsoft Office 365

Service Schedule for Business Email Lite powered by Microsoft Office 365 Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft

More information

Using Public Computer Services in Somerset Libraries

Using Public Computer Services in Somerset Libraries Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which

More information

E-Gap Terms and Conditions of Use

E-Gap Terms and Conditions of Use E-Gap Terms and Conditions of Use User Terms and Conditions The following paragraphs specify the basis on which you may use the e-gap System and provides information on how we will handle your data. This

More information

This policy applies equally to all full time and part time employees on a permanent or fixed-term contract.

This policy applies equally to all full time and part time employees on a permanent or fixed-term contract. Discipline Policy 1. Introduction This policy set outs how Monitor will deal with employee conduct which falls below the expected standard. It is Monitor s aim to use the policy as a means of encouraging

More information

Revelstoke Board of Education Policy Manual

Revelstoke Board of Education Policy Manual Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS

More information

Email policy and practice

Email policy and practice Email policy and practice This policy applies to all staff (including agency workers, casual and temporary staff), visitors, contractors, students, alumni and researchers of Anglia Ruskin University, and

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1

COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1 COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1 1. INTRODUCTION The purpose of this policy is to: I. Regulate access to Manukau Institute of Technology ( MIT ) Computer Systems ensuring they

More information

Executive Vice President of Finance and

Executive Vice President of Finance and Name of Policy: Policy Number: Electronic mail services policy. 3364-65-01 Approving Officer: Administration Executive Vice President of Finance and Responsible Agent: Vice President of Information Technology

More information

E-Mail and Internet Policy

E-Mail and Internet Policy E-Mail and Internet Policy Document reference Title: E-Mail and Internet Policy Product ID: Version Number: 8.0 Status: Live Distribution / Issue date: 12 November 2014 Author: K. Fairbrother Review Period:

More information

Information Governance Performance Manager. Important Note: The Intranet version of this document is the only version that is maintained.

Information Governance Performance Manager. Important Note: The Intranet version of this document is the only version that is maintained. Document Summary DOCUMENT NUMBER DATE RATIFIED POL/002/004 14 October DATE IMPLEMENTED October 2013 NEXT REVIEW DATE October 2015 ACCOUNTABLE DIRECTOR POLICY AUTHOR Director of Business Development Information

More information

Human Resources People and Organisational Development. Disciplinary Procedure for Senior Staff

Human Resources People and Organisational Development. Disciplinary Procedure for Senior Staff Human Resources People and Organisational Development Disciplinary Procedure for Senior Staff AUGUST 2015 1. Introduction 1.1 This procedure applies to Senior Staff. Senior Staff includes: 1.1.1 the Vice-Chancellor

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Policy Document Control Page. Updated to include new NHS mail encryption feature

Policy Document Control Page. Updated to include new NHS mail encryption feature Policy Document Control Page Title Title: Electronic Mail Policy Version: 6 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

Access Control Policy

Access Control Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely

GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely GCSx Email Guide for Internal Users How to send sensitive business and personal information securely Document control Description Version V.2 Created May 2013 GCSx Email Guide for Internal Users Status

More information

Electronic Communications Monitoring Policy

Electronic Communications Monitoring Policy Electronic Communications Monitoring Policy Printed copies should not be considered the definitive version DOCUMENT CONTROL POLICY NO. 79 Policy Group Information Governance and Security Author Andrew

More information

BRIGHAM AND WOMEN S HOSPITAL

BRIGHAM AND WOMEN S HOSPITAL BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages

More information

ICT Acceptable Use Policy

ICT Acceptable Use Policy ICT Acceptable Use Policy Document Management Document Disclaimer This document is issued only for the purpose for which it is supplied. Document Owner This document is produced and owned by Staffordshire

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

Information & ICT Security Policy Framework

Information & ICT Security Policy Framework Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January

More information

Somerset County Council - Data Protection Policy - Final

Somerset County Council - Data Protection Policy - Final Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council

More information

NHS North Somerset Clinical Commissioning Group. HR Policies Managing Discipline

NHS North Somerset Clinical Commissioning Group. HR Policies Managing Discipline NHS North Somerset Clinical Commissioning Group HR Policies Managing Discipline Approved by: Quality and Assurance Group Ratification date: May 2013 Review date: May 2016 1 Contents 1 Policy Statement...

More information

Advice leaflet Internet and e-mail policies

Advice leaflet Internet and e-mail policies Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.

More information

Summary Electronic Information Security Policy

Summary Electronic Information Security Policy University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture

More information

University of Liverpool

University of Liverpool University of Liverpool Card Payment Policy Reference Number Title Version Number 1.0 Document Status Document Classification FIN-001 Card Payment Policy Active Public Effective Date 03 June 2014 Review

More information

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011) Security Awareness A Supplier Guide/Employee Training Pack May 2011 (updated November 2011) Contents/Chapters 1. How do I identify a DWP asset 2. Delivering on behalf of DWP - Accessing DWP assets 3. How

More information

Acceptable Use of Information Technology

Acceptable Use of Information Technology Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:

More information

COLLEGE POLICY MANUAL

COLLEGE POLICY MANUAL Policy No. & Title: C202: ACCEPTABLE USE OF COLLEGE TECHNOLOGY Effective: 2015-07-14 Next Review: 2020-07-14 Policy Sponsor: Chief Information Officer Ref Cttee: Senior Leadership Council Approvals: 2000-05-03/SA-99-09;

More information

Sample Policies for Internet Use, Email and Computer Screensavers

Sample Policies for Internet Use, Email and Computer Screensavers Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY - 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,

More information

HERTSMERE BOROUGH COUNCIL

HERTSMERE BOROUGH COUNCIL HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act

More information

USE OF PERSONAL MOBILE DEVICES POLICY

USE OF PERSONAL MOBILE DEVICES POLICY Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014

More information

IT Operations User Access Management Policies

IT Operations User Access Management Policies 1. Approval and Authorisation Completion of the following signature blocks signifies the review and approval of this Process (signed copy held in safe) Name Job Title Signature Date Authored by:-

More information

Guidelines on developing a policy for managing email

Guidelines on developing a policy for managing email Guidelines on developing a policy for managing email Crown copyright 2004 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government

More information

Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015

Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015 Category Human Resources Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015 Related Documents Name Support

More information