Policy For Staff and Students
|
|
- Mildred Goodman
- 8 years ago
- Views:
Transcription
1 Policy For Staff and Students Document Version Date Policy Owner Approval Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management Committee May 2012 Update approval section
2 CONTENTS PAGE 1. INTRODUCTION PURPOSE.3 3. SCOPE AUTHORIZED USERS STANDARDS OF ACCEPTABLE USE RESPONSIBILITIES OF USERS OFFICIAL CORRESPONDENCES WITH STUDENTS QUOTA & LIMITS USEFUL PRACTICES AND HELPDESK SUPPORT ENFORCEMENT..8 ITS policy document Page 2
3 ITS policy document Page 3
4 1.0 INTRODUCTION This Policy is developed in response to the need for guidelines describing the acceptable use of services. It applies to IMU Education Sdn Bhd ( IMU ), which includes International Medical University ( the University ). The Policy will be reviewed on a periodic basis and if necessary, updates will be made to reflect changes to the services and technology standards. 2.0 PURPOSE The Policy provides guidance on acceptable use of , for the purpose of sending or receiving messages and attachments. It describes the standards that users are expected to observe when using these facilities for , and ensures that users are aware of the legal consequences attached to inappropriate use of the facilities. 3.0 SCOPE This policy applies to all members of the faculty, staff and authorized users entitled to facilities provided by IMU. It also applies to students using the Microsoft Outlook Office 365 registered under the University s domain name, and provided by Microsoft. 4.0 AUTHORISED USERS IMU owns the accounts and data transmitted or stored using IMU facilities, subject to underlying copyright and other intellectual property rights under applicable laws. Any use of IMU facilities in an unacceptable and inappropriate manner may be treated as a disciplinary offence or a matter of legal action depending on the seriousness of the offence. Faculty and Staff services are available for faculty and staff to conduct and communicate University business. Contract workers, part-timers and/or guest visitors may be provided with facilities, as approved by the Dean/ Corporate Head of Department. Incidental personal use of is allowed with the understanding that the primary use should be job-related, and that occasional use does not adversely impact work responsibilities or the performance of the network. When a faculty or staff member leaves IMU by retirement, resignation or termination, the account and contents of the mailbox will no longer be accessible to the person. The account holder is expected to clear all personal correspondence before leaving. If required, ITS policy document Page 4
5 the account holder s supervisor will be given access to the account, up to a period of 3 months, and will notify Information Technology Services as to when the account can be terminated. Students and alumni services are available for students and alumni members to support learning and for communication between IMU and themselves. During the orientation week, the Information Technology Services department will assign every student with a unique account on Microsoft Outlook Office 365, e.g. studentname@student.imu.edu.my. Students will access the system by logging in to via any popular web browsers for Windows, Mac or Linus operating system. 5.0 STANDARDS OF ACCEPTABLE USE The main purpose for the provision of facility is for the use in connection with teaching, learning, research and business activities of IMU. The use of IMU address, mailbox and facilities must be lawful and professional at all times. If users are in any doubt about what constitutes acceptable and appropriate use of facilities, they should seek the advice and guidance from the Information Technology Services department. 5.1 Unlawful use of facilities Unlawful use of IMU address, mailbox and systems may lead to criminal or civil legal action being taken against the individual users. Where there is evidence of a criminal offence, the issue will be reported to the police for them to take appropriate action. IMU will co-operate with the police and other appropriate external agencies in the investigation of alleged offences. Unacceptable uses of the facilities include, but are not limited to, the following: 1. transmission of materials that infringes on the copyright laws, including intellectual property rights 2. using the facilities for any purpose that violates federal or state laws 3. using the facilities for conducting personal business 4. sending / forwarding s that are libelous, abusive, defamatory, derogatory, threatening, offensive or contains obscene or indecent materials 5. unauthorized transmission of confidential material concerning the activities of IMU 6. creation or transmission of anonymous messages or using someone else s identity/password 7. creation or transmission of material which is designed or likely to cause annoyance, harassment, inconvenience or needless anxiety to the recipients ITS policy document Page 5
6 8. provide unauthorized use of IMU facilities to 3 rd party 9. transmission of unsolicited commercial or advertising material, chain letters, spam mail or other junk-mail of any kind 10. activities that can corrupt other users information or cause network interruptions, such as unauthorized broadcasting or mass mailings 5.2 Preventing the Spread of Malicious Software (Viruses) Users of IMU IT facilities must take all reasonable steps to prevent the receipt and transmission by of malicious software e.g. computer viruses. In particular, users must not transmit any file attachments which they know to be infected with a virus must ensure that an effective anti-virus system is operating on any computer which they use to access University IT facilities must not open file attachments from unsolicited or untrusted sources 5.3 Spam mail A SpamTitan Anti- Spam software has been installed on IMU gateway server to protect the system from Spam mail. Spam can be defined as "the mass electronic distribution of unsolicited to individual accounts". All incoming s will be checked by the Spam Titan system and any suspected spam mail will be moved to the Spam Titan server and a notification sent to the recipient user. The user has the option to review/download the and must be responsible to blacklist the sender if it is a spam mail. 5.4 Mass mailings Mass electronic mailings are permitted only for official communication to IMU staff, faculty and students by the appropriate offices such as Chancellery, Corporate Communication, Faculty and corporate departments. Other than the above, users may not send mass s without prior approval from Provost (or designee) for distribution to staff and/or students. 6.0 RESPONSIBILITIES OF USERS All users must familiarize themselves with the contents of this Policy. Failure to comply with the policy may lead to serious consequences, which include IMU taking necessary disciplinary action and/or legal action depending on the seriousness of the matter. ITS policy document Page 6
7 Every faculty member, staff member and students will be provided with IMU official address. This will be the formal address for all communication between students and IMU and among the members of IMU. The format for this official address is as follows: For staff & faculty (IMU Exchange Outlook) For students (Microsoft Office 365) : <username>@imu.edu.my : <studentname>@student.imu.edu.my 6.1 Individual users are expected to assume full responsibility and accountability for their actions and mailbox when using IMU facilities. The use of facilities by individuals at IMU assumes and implies compliance with this policy, without exception, and every user of system has a duty to ensure they practice appropriate and proper use and must understand their responsibilities in this regard. 6.2 Senior management of IMU will be responsible for ensuring heads of Faculties, Departments and Business Units are aware of this policy; and they in turn will be responsible for informing their people of this policy. 6.3 The Information Technology Services department is responsible for providing and maintaining central systems. The server will be back-up as per standard backup and recovery procedures. Should there be any database corruption due to failure of the system, the Information Technology Services department will recover the data loss to the best of their ability. 7.0 OFFICIAL CORRESPONDENCE WITH STUDENTS All official communication between students and the University will be via the official address as stated in section 6.0. Students are expected to check on a frequent and regular basis in order to stay current with University-related communications, recognizing that certain communications may be time-critical. It is recommended for to be checked daily, but at a minimum, twice per week. Regular management will also minimize the risk that the inbox will be full, causing the to be returned to the sender with an error. Undeliverable messages returned because of either a full inbox or use of a "spam" filter will be considered delivered without further action required of the University. It is the responsibility of every student to keep the University informed of changes in his or her official address. Consequently, returned to the University with "User Unknown" is not an acceptable excuse for missed communication. 8.0 QUOTA & LIMITS ITS policy document Page 7
8 8.1 The mailbox storage capacity is determined by IMU. Users may apply for additional storage space with a written recommendation from the Executive Dean/ Head of Department, stating the purpose and reason to justify the additional storage space request. The standard allowable storage limits are set as follows: For staff & faculty For students (under Microsoft Office 365) : 1GB : 25GB Once the quota has been reached, no further can be delivered to an individual's inbox until he has have reduced his storage to below the limit. Users will receive an notification when they are approaching their quota limit. It is the responsibility of the users to clear/maintain their mailbox according to the limit provided. 8.2 The maximum size of an that can be transmitted or received via IMU account is <25MB. Any exceeding this limit will not be accepted by IMU s server. However, whether an sent to external party is received by them will depend on the file-size limit set by the external party s servers. 8.3 All messages on IMU Exchange Outlook system, which is more than 90-days old, will be auto-archived to the Archive folder and removed from the Active folders. This auto-archive function assists users in managing their allowable storage capacity. The Archive folder is still accessible via the Outlook system but the physical data file is moved to the user s computer on C:\Documents\Outlook Files\ <archive filename>. It is the responsibility of IMU staff to back-up the file to external drive. Please contact Information Technology Services should you have require further information on the archiving procedures. 9.0 USEFUL PRACTICES AND HELPDESK SUPPORT 9.1 IMU considers as an important means of communication among its community and as well as to external parties. Below are some useful practices on usage : Do not send large files attachments. If possible, send a link to the content page or compress attachments larger than 200K before sending them. Read all messages regularly and delete unwanted messages to maintain adequate storage in your mailbox. Download and save important messages and/or associated attachments into network drives or your computer. Activate the Auto-Reply function when you are away from office for a period of time. Do not send a REPLY ALL if you only need to respond to the sender and/or selected persons. Be responsible and courteous in your correspondence as the message can easily be forwarded beyond the initial circle of recipients. 9.2 Disclaimer ITS policy document Page 8
9 An disclaimer is added to outgoing and forms a distinct section which is separate from the main message. For all outgoing from IMU server, the following disclaimer is as attached: "The information transmitted is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon this information by persons or entities other than the intended recipient is prohibited. If you have received this in error, please notify us immediately by return or telephone and destroy the original message without delay." 9.3 Helpdesk Services All queries on IMU facilities can be forwarded to helpdesk@imu.edu.my or call us at (+6) ENFORCEMENT IMU may, at its discretion, apply automatic message monitoring, filtering and deny transmission of messages with content that is unacceptable in the terms of this Policy. Violations of this policy will be handled consistent with IMU disciplinary procedures applicable to the relevant persons or departments. IMU may temporarily suspend, block or restrict access to information and network resources when it reasonably appears necessary to do so in order to protect the integrity and security of IMU resources or to protect IMU from liability. ITS policy document Page 9
ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)
ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved
More informationSTRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
More informationPulaski Technical College
Pulaski Technical College Internet and E-Mail Acceptable Use Policy 1. Introduction Pulaski Technical College provides faculty and staff with technology resources and a local area network with access to
More informationUNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
More informationTerms of Service. This online privacy policy applies only to information collected through our website and not to information collected offline.
Terms of Service Privacy Policy Mahavitaran (mahadiscom) respects and protects the privacy of the individuals that access the information and use the services brought through them. Individually identifiable
More informationComputer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
More informationAcceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
More information1.4 To overcome this biasness, this Policy is in place to ensure all Maxis customers have a good experience.
MAXIS FAIR USAGE POLICY 1. Introduction 1.1 This Fair Usage Policy ("Policy") sets out an acceptable level of conduct between Maxis Broadband Sdn Bhd or Maxis Mobile Services Sdn Bhd (both shall be referred
More informationNORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY
Student Email Use page 1 NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY SEC. VII E-MAIL 3.0 STUDENT EMAIL USE University Policy I. Scope The purpose of this policy is to ensure the proper use
More informationThe College ofBergen Online - Acceptable Use and Disposal
Acceptable Use of Information Technology Policy Bergen Community College reserves the right to monitor its information technology resources and telecommunications network to protect the integrity of its
More informationRevelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
More informationAPPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More informationCITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION
CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION AP 3723 ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION 1.0 Purpose Citrus Community College District electronic mail (email) services support the
More informationEmail Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
More informationInformation Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
More informationEmbedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
More informationPROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationRevised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
More informationInstruction. Neoga Community Unit School District #3 Page 1 of 5
Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each
More informationR3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
More informationSheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
More informationLegal Disclosure 2011
Hosted Exchange Terms of Service The following agreement is to cover Hosted Microsoft Exchange services provided by Kimit Networks, LLC., (KIMIT NETWORKS) its affiliates, successors and assigned ("Kimit
More informationIslington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014
A council-wide information technology policy Version 0.9 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document is distributed under the Creative Commons Attribution
More informationREGULATIONS FOR THE USE OF CORPORATE ELECTRONIC MAIL SYSTEM BY STAFF OF THE STATE UNIVERSITY HIGHER SCHOOL OF ECONOMICS. 1. General Provisions
T r a n s l a t e d i n H S E E x p e r t T r a n s l a t i o n C e n t r e 1 APPROVED by Directive No. 31.1-04/771 of the State University Higher School of Economics dated October 22, 2010 REGULATIONS
More informationCOMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
More informationSAS TRUSTEE CORPORATION ( STC )
SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...
More informationOlympic Web Design, Inc. Web Hosting Agreement Terms and Conditions
Olympic Web Design, Inc. Web Site Hosting Agreement v1.4a Last Revised: Nov. 20, 2009 Olympic Web Design, Inc. Web Hosting Agreement Terms and Conditions The following agreement is by and between Olympic
More informationINTERNET AND EMAIL POLICY
Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy
More informationUniversity of Maryland Baltimore Information Technology Acceptable Use Policy
The UMB School of Nursing follows and adheres to the UMB Campus Information Technology Acceptable Use Policy. The UMSON further defines Authorized User to also include any person who receives a password
More informationMARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
More informationMedina County Policy Manual
Medina County Policy Manual Policy: Computer & Network Usage Section: Work Rules Number: 7.015 Issued: 09/17/07 Reviewed/Revised: Page #: 1 of 5 A. It is the intent of Medina County to provide local, network,
More informationTechnology Standard. Electronic Communications Standard PURPOSE SCOPE APPLICABILITY
Technology Standard Electronic Communications Standard Version: 2.0 Status: Approved 06/17/09 Contact: Director, Technology Services PURPOSE The Virginia Community College System is committed to using
More informationLINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3
LINCOLNSHIRE COUNTY COUNCIL Information Security Policy Framework Document No. 8 Email Policy V1.3 Document Control Reference V1.3 Email Policy Date 17 July 2015 Author Approved by Version History David
More informationAcceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
More informationClear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
More informationWORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
More informationConditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
More informationIntroduction. General Use
Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use
More informationTerms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website
Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating
More informationAcceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
More informationE-mail Usage Policy of GCRI
E-mail Usage Policy of GCRI AIM : Email Account Management and Best Practices for Effective E-mail Usage and to promote awareness of the benefits of a paperless communication system VER : Version 1.0 Date
More informationAGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Executive Director (AK) [J50]
AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Committee: Policy and Resources Date: 23 rd June 2009 Author: Executive Director (AK) [J50] 1.0 ISSUE 1.1
More informationResponsible Use of Technology and Information Resources
Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni
More informationSystem and Network Security Policy Internet User Guidelines and Policy. North Coast Council. 5700 West Canal Road Valley View, Ohio 44125
North Coast Council 5700 West Canal Road Valley View, Ohio 44125 Telephone: 216-520-6900 Fax: 216-520-6969 1885 Lake Avenue Elyria, Ohio 44035 Telephone: 440-324-3185 Fax: 440-324-7355 URL: www.nccohio.org
More informationLINCOLN COLLEGE INTERNET, E-MAIL, AND COMPUTER ACCEPTABLE USE POLICY
LINCOLN COLLEGE INTERNET, E-MAIL, AND COMPUTER ACCEPTABLE USE POLICY POLICY IT/PO/1 SPONSOR IT Manager Last formal review date: March 2012 Next formal review date: March 2013 Impact Assessed 17 April 2012
More informationPark Avenue motor cars
Park Avenue motor cars DEALERSHIP COMPUTING POLICIES Mercedes-Benz of West Chester and Fort Washington maintain a variety of policies governing the use of Dealership computing and communication resources.
More informationMedford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
More informationFLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION
FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION DATE: June 10, 2015 REGULATION CHAPTER NO.: Chapter 5 REGULATION CHAPTER TITLE: Miscellaneous REGULATION TITLE AND NUMBER:
More informationAdministrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
More informationNortheast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY
Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have
More information1.2: The name the shellies includes theshellies.co.uk.
Welcome to our web site and blog. If you continue to browse and use our blog and web site you are agreeing to comply with and be bound by the following terms. Together with our Privacy Policy these terms
More informationAcceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
More informationUTC Cambridge ICT Policy
UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions
More informationFAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
More informationR 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationPeopleMatrix Application Hosting Services Agreement
PeopleMatrix Application Hosting Services Agreement WolfeReiter, LLC CONTENTS 1. Services Agreement... 2 1.1. Description of Services... 2 1.2. Term... 2 1.3. Customer Responsibilities... 2 1.4. Payment
More informationACCEPTABLE USAGE PLOICY
ACCEPTABLE USAGE PLOICY Business Terms - February 2012 ACCEPTABLE USAGE POLICY Business Terms Version February 2012 Acceptable Usage Policy Feb12.Docx 1 Contents 1. INTRODUCTION... 3 2. PURPOSE... 3 3.
More informationInformation Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
More informationHuman Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
More informationAUBnet (email) Accounts Policies
(email) s Policies Reference: CNS-P-Acct Revision: B Supersedes: Purpose: Source: CNS-P-EMAIL-A This policy and related policies provide the framework in which all accounts and email and intranet are provided
More informationEffective Date: Oct. 27, 2009... 1
Policy Title: Office of Information Technology Email Usage and Retention Policy Policy No.: 7010 Rev.: 0 Effective Date: Oct. 27, 2009 Last Revision: Oct. 27, 2009 Responsible Office: Responsible Official:
More informationAcceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
More informationACCEPTABLE USE OF TECHNOLOGY
IIBE Page 1 ACCEPTABLE USE OF TECHNOLOGY Internet and computer network and non-network access is available to authorized students, teachers, and other staff in the. Albemarle County Public Schools primary
More informationUNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
More information3. Electronic Mail (E-mail)
- Title of Agency - Internet Acceptable Use Policy The Following Internet Acceptable Use Policy Applies to the (AGENCY NAME) Staff 1. Introduction The (AGENCY NAME) provides its staff and (other entity(s)
More informationSURE E-Mail Services Terms and Conditions SURE MAIL
SURE E-Mail Services Terms and Conditions SURE MAIL Sure offers an E-mail service that allows access to a mailbox provided by a 3 rd party partner ( Service ). The Service is accessed via the internet.
More informationAcceptable Usage Policy
Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY
More informationDEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE
2 of 10 2.5 Failure to comply with this policy, in whole or in part, if grounds for disciplinary actions, up to and including discharge. ADMINISTRATIVE CONTROL 3.1 The CIO Bureau s Information Technology
More informationHyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
More informationAppendix I. The City University of New York Policy on Acceptable Use of Computer Resources
Appendix I The City University of New York Policy on Acceptable Use of Computer Resources Introduction CUNY s computer resources are dedicated to the support of the university s mission of education, research
More informationREGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
More informationCity of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
More informationWCCM XII & APCOM VI Secretariat is in Seoul. Your use of http://wccm2016.org will always be
Terms & Conditions Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms
More informationBUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
More informationCass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY CONTENTS I. Introduction II. Violation of this Acceptable Use Policy III. Prohibited Uses and Activities IV. Customer
More informationCommercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use
More informationEMPLOYEE COMPUTER USE POLICY
EMPLOYEE COMPUTER USE POLICY SECTION ONE PURPOSE A. To better serve our students and provide our teachers and other employees with the best tools to do their jobs, Navigator Pointe Academy makes available
More informationBOBCAT COMPUTING POLICY
BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,
More informationTERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )
TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide
More informationAcceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
More informationService Schedule for Business Email Lite powered by Microsoft Office 365
Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft
More informationICT Acceptable Use Policy. August 2015
ICT Acceptable Use Policy August 2015 Document title ICT Acceptable Use Policy August 2015 Document author and department Responsible person and department Robbie Walker, Information Security Architect,
More informationSmall Pond Web Hosting Terms and Conditions
Small Pond Web Hosting Terms and Conditions Small Pond Web Hosting (referred hereinafter as 'Small Pond Web Hosting ', 'SmallPond ', 'our', 'we' and 'us') is a web hosting business. All accounts on our
More informationInternet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
More informationCENTURIC.COM HOSTED MICROSOFT EXCHANGE ADDENDUM TO TERMS OF SERVICE
CENTURIC.COM HOSTED MICROSOFT EXCHANGE ADDENDUM TO TERMS OF SERVICE This Agreement, named the Hosted Microsoft Exchange addendum to Centuric s Terms of Service, ( Agreement ) is entered by and between
More informationAcceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
More informationIf you have any questions about any of our policies, please contact the Customer Services Team.
Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting
More informationService Protection Under The Provider's Acceptable Use Policy
Acceptable Use Policy As a provider of Internet access, Internet email, web site hosting, and other Internet related services, Pottawatomie Telephone Company and MBO.net herein after referred to as "the
More informationMinor, for the purposes of this policy, is an individual who has not attained the age of 17.
POLICY TITLE: Computer and Network Services: Acceptable Internet Use Policy POLICY NO: 698 PAGE 1 of 9 GENERAL Internet access is a service provided for students and staff members by this school district.
More informationEMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
More informationDRAFT - NMHU POLICIES CONCERNING COMPUTER, NETWORK, AND E-MAIL
The goal of the New Mexico Highlands University (NMHU) Computer & Networking Services (CNS) Group is to support the University in the pursuit of its Mission Statement 1. These policies, guidelines, and
More informationAcceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
More information6141.9. Internet and Computers. Acceptable Use and Internet Safety
6141.9 Acceptable Use and Internet Safety The Board of Education provides computers, a computer network, including Internet access and an email system, as well as electronic devices such as cellular telephones
More informationMEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
More informationVentura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
More informationSample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
More informationWest Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011
West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationInternet usage Policy
Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
More information