BRIGHAM AND WOMEN S HOSPITAL

Size: px
Start display at page:

Download "BRIGHAM AND WOMEN S HOSPITAL"

Transcription

1 BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy sets forth guidelines for the proper use of Brigham and Women s Hospital (BWH) computer technology and communication systems including but not limited to hardware, software, , fax, Internet, social networking sites, text messaging and voice mail systems. These systems are business tools provided by the hospital for use of the hospital s business or work-related matters. As such, all aspects of the hospital s computer technology and communications systems are the property of the hospital. I. PRIVACY Employees should not have any expectation of privacy with respect to , voice mail, Internet, fax or other electronic communication vehicles. Although the hospital does not intend to routinely monitor such communications, it reserves the right to review or inspect, for legitimate business reasons, the product of any electronic communication vehicle with or without notice. II. PASSWORDS Passwords are intended to keep unauthorized individuals from accessing content inappropriately and should not be shared. III. CAUTIONS A. Employees should use common sense and good judgment when sending messages to each other. B. messages are electronic communications that do not disappear, and employees should be aware that the delete command doesn t mean that is irretrievably erased from the computer system. C. messages can be reproduced in written form and are discoverable in litigation. Revised January

2 IV. PERSONAL USE The hospital allows incidental and necessary personal use of its electronic communication vehicles and devices provided that such use is kept to a minimum and does not interfere with an employee s productivity or the productivity of other employees. V. PROHIBITED ACTIVITIES Prohibited activities may include but are not limited to: A. Transmitting and/or downloading any messages that contain discriminatory, derogatory, inflammatory, offensive or harassing remarks about a person s, or group s sex, race, religion, age, gender, gender identity, national origin, disability, sexual orientation, marital or veteran status. B. Transmitting and/or downloading of sexually explicit materials, including messages, videos, images and cartoons. C. Annoying or harassing other individuals. D. Solicitation on behalf of political, religious or other personal causes or personal business ventures. E. Distributing or storing chain letters. F. Because audio, video and picture files require significant storage space, downloading non-work related material is not permitted. G. Use of Internet access to visit Web sites that contain sexually explicit, racist or other material that management, in its sole judgment, considers offensive, or posting messages on such sites. H. Engaging in illegal, fraudulent or malicious activities. I. Use of personal accounts (i.e. Gmail, Yahoo, AOL, Hotmail, etc) for business related communications instead of using the BWH-provided accounts (i.e. partners.org) J. Auto-forwarding of any BWH-provided to an outside account. K. Use of peer to peer (or P2P ) software (examples include, but are not limited to BitTorrent, Limewire, Napster, and Gnutella). Revised January

3 L. Receipt of, possession of, transmitting and/or downloading, installing, publishing, distributing or copying any copyrighted or trademarked materials, such as software, music or movies without the written consent of the copyright owner. Copyright violations may lead to significant financial penalties in addition to corrective action. M. Attempting to disguise the employee s name or origin of transmission over e- mail, Internet, fax or voice mail. VI. DOWNLOADING FROM INTERNET A. Storage requirements must be met before attempting to download a file from the Internet or upload a file to the network. B. Any download should be considered virus infected until proven to be safe. Do not download material unless you are sure that you have virus protection on your device and that it has the most recent updates installed. C. Files downloaded from a foreign (?) site should be quarantined to the local hard drive and virus-scanning software should be used to disinfect the file. D. Non-work related files should not be downloaded or stored on a BWH system. VII. SOCIAL NETWORKING Due to the emerging nature of social networking (e.g., You Tube, Facebook, itunes, LinkedIn, Twitter etc.; Web feeds such as RSS; blogs and other forums, BWH employees who violate the guidelines relating to revealing patient information or making inappropriate comments will be subject to discipline up to and including discharge under the HR Corrective Action Policy. 1. Institutional representation on online social networking platforms can only be initiated or authorized through the combined efforts of the BWH Marketing and Public Affairs departments. To be clear, there can be no institutional sites or pages on You Tube, Facebook, Twitter, etc., that are presented as official pages of BWH, including use of name and logo, unless these are developed and/or approved by the Marketing and Public Affairs departments. Please see BWH Website Policies. 2. Content owners of pages that have been approved are responsible for posting and using content in accordance with BWH values, the BWH Code of Ethical Conduct, HIPAA, the PHS Conflict of Interest Policy and other relevant policies. Revised January

4 3. Content owners are responsible for monitoring and maintaining web content: a. Content must be current and accurate. b. Content owners will not engage in any communications that would be unacceptable in the BWH workplace, including sharing information about patients, their families, employees, donors or anyone who has a connection with BWH, without permission from that person and Marketing or Public Affairs, or in the case of donors, the Development office. c. Content owners will respect copyrights and disclosures and will not reveal proprietary financial information, intellectual property or similar sensitive or private content about BWH. d. Content owners are responsible for constantly monitoring postings to social media sites and deleting postings that do not adhere to our policies. Social Computing Guidelines for BWH Employees: Online social media enable BWH employees to engage in professional and personal conversations. These guidelines apply to employees who identify themselves with BWH in social media venues such as professional society blogs, Linked In, Facebook, etc. Activities which do not identify employees with BWH, do not discuss BWH and are purely about personal matters would normally fall outside these guidelines. 1. BWH employees may not have personal blogs in their work-related capacity. 2. Employees must follow the same Code of Ethical Conduct, Conflict of Interest Policy, HIPAA and general civil behavior guidelines cited previously in these policies. 3. BWH employees may list BWH as their place of work on personal profiles such as those on Linked In. However, if an employee identifies him- or herself as a member of the BWH community in any online forum, it must be made clear that that person is not speaking for BWH. The following disclaimer should appear in the post: The comments I am expressing are my own and do not represent the views or opinions of Brigham and Women s Hospital or its administration. 4. BWH employees who participate in off-duty misconduct, communications or activities, and such conduct, communication, or activity have the potential of jeopardizing the reputation or standing of BWH in the community or place the organization in a bad light will be subject to discipline up to and including discharge. In addition, if BWH s name, brand, logo or the work with which an employee is associated is mentioned in an online forum; and the content is unflattering or raises concerns or questions, the employee should contact BWH Public Affairs before responding. The goal is to avoid a public airing of concerns or issues without consultation with and authorization from Public Affairs. Revised January

5 VIII. CONFIDENTIAL INFORMATION A. Employees are expected to use electronic communications in a way that respects the confidential information of BWH, its employees and its patients. Employees must use discretion in transmitting patient identifying information by electronic communication when necessary to perform one s job. Transmission must occur in a way that guarantees it will be seen only by a recipient who has a need to know the information. Please refer to the Breach of Confidentiality-Sanctions for Employees and Medical Staff Policy# HR- 501for additional information. B. When faxing confidential information, employees should use caution. Employees must use a fax cover sheet with that includes the name of the hospital, the correct fax number, the sender s phone number and must ensure that the receiving fax machine is in a secure location and/or the intended receiver is available to immediately receive the fax. C. If an employee is an unintended recipient of either an or fax, the employee should contact the originator of the message without reading the content. If the message contains patient information, the employee should take steps to destroy the information, i.e., shredding, and should contact the originator of the fax or to correct IX. TELEPHONE USAGE A. Unauthorized use of hospital telephones and inappropriate and excessive usage of personal telecommunication devices during work hours may result in corrective action. B. Employees may be required to reimburse the cost of unauthorized telephone calls. X. CORRECTIVE ACTION A. Managers in conjunction with the Human Resources Consultant will determine violations of this policy. B. An employee who has been found to be in violation of this policy will be subject to the hospital s corrective process as outlined in the Corrective Action, HR-303. Certain violations may subject the violators to civil and criminal penalties under federal and state law and additional liabilities of copyright holders for infringement. Revised January

6 APPROVED BY: Vice President Human Resources Chief Operating Officer This policy is intended as a guideline to assist in the consistent application of Brigham and Women s Hospital policies and programs for employees. The policy does not create a contract implied or expressed, with any hospital employees who are employees at will. The hospital reserves the right to modify this policy in whole or in part, at any time, at its sole discretion. Revised January

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy 1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited

More information

A. Froedtert Health (FH) and its affiliates include all entities within the health system. Also referred to as the system.

A. Froedtert Health (FH) and its affiliates include all entities within the health system. Also referred to as the system. Title: Policy Type: Department: Policy Number: Public Display With Social Media Corporate Human Resources FH-HR.004 Origin Date: 01/01/2010 Date Revised: 4/01/13 Supercedes: Entities Impacted: Purpose:

More information

U.S. Chemical Safety and Hazard Investigation Board

U.S. Chemical Safety and Hazard Investigation Board BOARD ORDER 035 U.S. Chemical Safety and Hazard Investigation Board SUBJECT: Use of Government Office Equipment CONTENTS 1. Purpose...1 2. Effective Date...1 3. Scope...1 4. References...1 5. Definition...1

More information

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy

More information

section 15 Computers, Email, Internet, and Communications

section 15 Computers, Email, Internet, and Communications section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property

More information

INFORMATION SYSTEM GENERAL USAGE POLICY

INFORMATION SYSTEM GENERAL USAGE POLICY PURPOSE The Information System General Usage Policy ("Policy") establishes appropriate uses of Devon s Information Systems. Devon provides secure Information Systems in accordance with the Information

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT

Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT Department of Homeland Security Management Directives System MD Number: 4600.1 Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT I. Purpose This directive provides Department of Homeland

More information

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the

More information

COLLINS CONSULTING, Inc.

COLLINS CONSULTING, Inc. COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

Technology Standard. Electronic Communications Standard PURPOSE SCOPE APPLICABILITY

Technology Standard. Electronic Communications Standard PURPOSE SCOPE APPLICABILITY Technology Standard Electronic Communications Standard Version: 2.0 Status: Approved 06/17/09 Contact: Director, Technology Services PURPOSE The Virginia Community College System is committed to using

More information

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) 719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

TOLLAND PUBLIC SCHOOLS Tolland, Connecticut

TOLLAND PUBLIC SCHOOLS Tolland, Connecticut TOLLAND PUBLIC SCHOOLS Tolland, Connecticut ADMINISTRATIVE REGULATION REGARDING: Employee Use of the District s Computer Systems Number: 4110 Administrative Approved: 2/28/01 Revised: 4/26/06 Revised:

More information

Virginia Commonwealth University Police Department

Virginia Commonwealth University Police Department Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

III. RESPONSIBILITIES

III. RESPONSIBILITIES Issued by: Calvin O. Butts, III, President Effective Date: September 23, 2013 Page 1 of 5 I. POLICY & SCOPE This is the SUNY College at Old Westbury policy on College-provided access to electronic information

More information

Sample Policies for Internet Use, Email and Computer Screensavers

Sample Policies for Internet Use, Email and Computer Screensavers Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies

More information

GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE

GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE IF YOU HAVE A MEDICAL EMERGENCY, YOU ARE INSTRUCTED IMMEDIATELY TO CALL EMERGENCY PERSONNEL (911). DO NOT RELY ON THIS WEBSITE OR THE INFORMATION PROVIDED

More information

Commonwealth Office of Technology

Commonwealth Office of Technology Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

13.19 ETHICS REPORTING POLICY AND PROCEDURE

13.19 ETHICS REPORTING POLICY AND PROCEDURE 13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment

More information

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet

More information

Board Adopted Policy

Board Adopted Policy Board Adopted Policy Policy Title Information Technology Systems Usage Effective Date:03/14/2012 Board Approval Date: 6/19/2014 Review Cycle: three (3) years I. Application: Authority wide. II. Intent:

More information

Model Policy for a Law Enforcement Agency s use of Social Networking

Model Policy for a Law Enforcement Agency s use of Social Networking Model Policy for a Law Enforcement Agency s use of Social Networking Disclaimer: This is a model policy was designed to provide a guide to writing a policy related to social networking use. This model

More information

DIOCESE OF DALLAS. Computer Internet Policy

DIOCESE OF DALLAS. Computer Internet Policy DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used

More information

6141.9. Internet and Computers. Acceptable Use and Internet Safety

6141.9. Internet and Computers. Acceptable Use and Internet Safety 6141.9 Acceptable Use and Internet Safety The Board of Education provides computers, a computer network, including Internet access and an email system, as well as electronic devices such as cellular telephones

More information

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT

More information

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY - 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,

More information

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer

More information

Organizational Policy

Organizational Policy Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy

More information

Workplace Policies. Computer Software (Unauthorized Copying)

Workplace Policies. Computer Software (Unauthorized Copying) Workplace Policies Computer Software (Unauthorized Copying) Cornerstone Systems does not condone the illegal duplication of software. The copyright law is clear. The copyright holder is given certain exclusive

More information

This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).

This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ). Social Media Terms of Use Social media is an integral part of Historica Canada s communications efforts, offering an additional model to engage with participants, colleagues, other stakeholders and the

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Policy and Guidelines for Personal Use of Social Media*

Policy and Guidelines for Personal Use of Social Media* I. Scope: This policy applies to all employees, students, contractors and volunteers as it relates to their employment, academic, or business relationship with the University of Mississippi Medical Center

More information

Covered California. Terms and Conditions of Use

Covered California. Terms and Conditions of Use Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products

More information

c. Require or Request Photos of Subscriber f. Allow Subscribers Access to Other Subscriber Information

c. Require or Request Photos of Subscriber f. Allow Subscribers Access to Other Subscriber Information Diocese of Orlando Network Acceptable Use Policy for All Parishes, Schools and Entities of the Diocese of Orlando Parent Addendum (Please note these are excerpts from the full document) 5.3 Unacceptable

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

EMPLOYEE COMPUTER USE POLICY

EMPLOYEE COMPUTER USE POLICY EMPLOYEE COMPUTER USE POLICY SECTION ONE PURPOSE A. To better serve our students and provide our teachers and other employees with the best tools to do their jobs, Navigator Pointe Academy makes available

More information

POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS

POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS Computers, computer networks, electronic devices, Internet access, and e-mail are effective and important

More information

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems. VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0

More information

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

Communications 01: Social Media

Communications 01: Social Media Communications 01: Social Media Policy: To communicate the Network s mission publicly, to inform and engage the community regarding the Network s activities, and to establish appropriate and professional

More information

Acceptable Use of Information Technology

Acceptable Use of Information Technology Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:

More information

CROMWELL PUBLIC SCHOOLS. Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised:

CROMWELL PUBLIC SCHOOLS. Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised: CROMWELL PUBLIC SCHOOLS 4118.5 BOARD OF EDUCATION POLICY Personnel Certified and Non-Certified Rights, Responsibilities and Duties Acceptable Computer Network Use Adopted: 9/13/05 Revised: POLICY REGARDING

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

ANTRIM COUNTY COMPUTER, NETWORK SYSTEM AND INTERNET USE POLICY

ANTRIM COUNTY COMPUTER, NETWORK SYSTEM AND INTERNET USE POLICY ANTRIM COUNTY COMPUTER, NETWORK SYSTEM AND INTERNET USE POLICY Amended July 9, 2009 This policy describes Antrim County's guidelines and rules with regard to the use of cell phones, computers, network

More information

205.06 Social Media Policy

205.06 Social Media Policy 205.06 Social Media Policy A. POLICY/PURPOSE City of Arlington departments may utilize social media and social network sites to further enhance communications with various stakeholder organizations in

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

Pacific Northwest University of Health Sciences

Pacific Northwest University of Health Sciences Effective: 7/01/06 Exec. Lead: Chief Business Officer Revised: 1/11 Approved By: Board of Trustees Expired: n/a Applies To: University-wide Pacific Northwest University of Health Sciences Policy: Computer,

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

ALMS TERMS OF USE / TERMS OF SERVICE Last Updated: 19 July 2013

ALMS TERMS OF USE / TERMS OF SERVICE Last Updated: 19 July 2013 ALMS TERMS OF USE / TERMS OF SERVICE Last Updated: 19 July 2013 Welcome to the Army Learning Management Service (ALMS), which is provided by the United States Army. These Terms of Use / Terms of Service

More information

BOARD OF EDUCATION REGULATION EMPLOYEE COMPUTER, NETWORK, INTERNET, AND E-MAIL USE RULES

BOARD OF EDUCATION REGULATION EMPLOYEE COMPUTER, NETWORK, INTERNET, AND E-MAIL USE RULES 4529R BOARD OF EDUCATION REGULATION EMPLOYEE COMPUTER, NETWORK, INTERNET, AND E-MAIL USE RULES The Board of Education is committed to the goal of having electronic network facilities used in a responsible,

More information

Valdosta State University. Information Resources Acceptable Use Policy

Valdosta State University. Information Resources Acceptable Use Policy Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE

More information

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,

More information

Superintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS

Superintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS Page 1 of 7 ELECTRONIC COMMUNICATIONS 1.0 The District supports the use of the Internet and electronic communications by all employees to improve teaching and learning through interpersonal communication,

More information

Bates Technical College. Information Technology Acceptable Use Policy

Bates Technical College. Information Technology Acceptable Use Policy Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment

More information

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer

More information

EMPLOYEE ACCEPTABLE USE POLICY FOR DISTRICT COMPUTERS, ELECTRONIC DEVICES, NETWORK AND

EMPLOYEE ACCEPTABLE USE POLICY FOR DISTRICT COMPUTERS, ELECTRONIC DEVICES, NETWORK AND Tehachapi Unified School District EMPLOYEE ACCEPTABLE USE POLICY FOR DISTRICT COMPUTERS, ELECTRONIC DEVICES, NETWORK AND All OTHER ELECTRONIC INFORMATION RESOURCES. The Tehachapi Unified School District

More information

Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications

Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.

More information

THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction

THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction In accordance with its broader strategic objectives, The University of the West Indies (the UWI) promotes the

More information

NewLead Holdings Ltd. Code of Ethics

NewLead Holdings Ltd. Code of Ethics NewLead Holdings Ltd. Code of Ethics The Board of Directors of NewLead Holdings Ltd., (the Company ) has adopted this Code of Ethics (the Code ) for all of the Company s employees, directors, officers

More information

4118.35 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS

4118.35 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS 4118.35 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS Computers, computer networks, electronic devices, Internet access, and e-mail are effective

More information

Department of Veterans Affairs VA DIRECTIVE 6001 LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY

Department of Veterans Affairs VA DIRECTIVE 6001 LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY Department of Veterans Affairs VA DIRECTIVE 6001 Washington, DC 20420 Transmittal Sheet July 28, 2000 LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY 1. REASON FOR

More information

Northeast Health System (NHS) Information Privacy and Security

Northeast Health System (NHS) Information Privacy and Security Northeast Health System (NHS) Information Privacy and Security Subject: Electronic Communication Non-employees Date Effective: 10.29.12 Date Revised: Date Reviewed: Applies to: A. All non-employed workforce

More information

RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET

RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET Administrative Procedure 140 Background RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET This Administrative Procedure is to guide users in the proper use of technology within the Division. The goal of the

More information

Administrative Procedure 3720 Computer and Network Use

Administrative Procedure 3720 Computer and Network Use Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District

More information

How To Use The Blog Safely And Responsibly

How To Use The Blog Safely And Responsibly BLOG PROTOCOL DRI maintains this site (the "Site") for your personal entertainment, information, education, and communication. Please feel free to browse the Site. You may not download material displayed

More information

Review Responsibility Human Resources

Review Responsibility Human Resources Subject Regions Hospital Social Media Use and Behavior Attachments Yes No Key words Social Networking, Facebook, YouTube, Internet e-mail, blog, online manners, netiquette, Twitter, web mail Number RH-HR-HR

More information

TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06. REFERENCE: Board Rule 2.16 PAGE 1 OF 6

TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06. REFERENCE: Board Rule 2.16 PAGE 1 OF 6 LAKE-SUMTER COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06 REFERENCE: Board Rule 2.16 PAGE 1 OF 6 1. General Information a. LSCC Information Systems (IS)

More information

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY STATEMENT: Many of our employees have access to the internet as well as email capabilities. The County recognizes that these

More information

Anchor Bay Schools Software Policy

Anchor Bay Schools Software Policy Anchor Bay Schools Software Policy Table of Contents 1. Statement of Ethics... Page 1 2. Purchasing and Acquisition... Page 1 3. Registration... Page 1 4. Installation of Software... Page 2 5. Individual

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance. 1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following

More information

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This

More information

Iowa County Government Social Media Use Policy

Iowa County Government Social Media Use Policy Iowa County Government Social Media Use Policy This policy outlines appropriate use of social media, as it relates to Iowa County, by employees and departments for official and personal use. This policy

More information

INTERNET ACCEPTABLE USE POLICY

INTERNET ACCEPTABLE USE POLICY INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods

More information

Policy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD. Employee use of the District s Computer Systems

Policy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD. Employee use of the District s Computer Systems Policy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD Employee use of the District s Computer Systems Computers, computer networks, electronic devices, Internet access, and e-mail are effective and important

More information

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common

More information

4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS

4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS 4750 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS Computers, computer networks, Internet access, and E-mail are effective and important technological resources in today's

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

CITY OF SALINE CELL PHONE POLICY

CITY OF SALINE CELL PHONE POLICY CITY OF SALINE CELL PHONE POLICY Purpose The City of Saline acknowledges that to provide efficient services to its citizens some of its employees must be available either 24x7 or while they are away from

More information

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing

More information

6.9 Social Media Policy

6.9 Social Media Policy Policy Statement It is the policy of the to encourage clear and effective communication with all Nova Scotians using a variety of accepted tools, including social media. Social media is helping government

More information