workplace efficiency and compliance with Impero
|
|
|
- Franklin Conley
- 10 years ago
- Views:
Transcription
1 white paper: employee monitoring workplace efficiency and compliance with Impero task Keep employees on task whilst ensuring compliance with acceptable use policies solution Deploy a granular monitoring solution from impero to reduce risks and gain a return on investment Employers must address the reputational and financial risks of staff misconduct, keep their employees on task and adopt measures to counter misuse and increasingly sophisticated fraud In this white paper, we take a look into the legal, cultural and practical issues surrounding employee monitoring, and explore why its adoption is increasing in organisations of all shapes and sizes. Richard Smeeton BSc(Hons) CEng CITP MBCS: September 2012
2 the landscape Impero Monitoring is seamless and enables a granular policy to be implemented. These tools allow you to respect individuals privacy, comply with the law, and follow best practice guidelines. why is employee monitoring such a hot topic? The online conduct of employees is increasingly used in both hiring and firing decisions. Companies not only look to IT to investigate workplace misuse, but now commonly review job applicants social networking sites or personal blogs as part of the selection process and a personal profile may now result in being selected or rejected for a job on the basis of content posted. As new generations of employees grow up with Google, and surf their way into work, the distinction between work life and personal life has never been more blurred. Indeed many organisations encourage workers to be switched on; embracing social media to engage with customers and encouraging flexible practices such as working from home and bring your own device (BYOD). Yet these common practices whilst promoting creativity and efficient working also increase the risks of abuse and IT is being called in to proactively enforce acceptable use. To be effective, employee monitoring has to be part of a wider organisational policy that demonstrates an employer s commitment to fairness and doing things right. Some organizations rely on their employees to do the right thing. They feel that monitoring employees betrays trust and is an invasion of privacy, and in some countries it is an invasion of privacy. The approach may vary from company to company and from country to country (and different US states may have alternative laws), but it is always best practice that an acceptable use agreement is included in the employee s terms and conditions of contract, and that the employee understands their responsibilities and what is monitored and why. Under the Lawful Business Monitoring Regulations, this is a legal requirement in the UK. Accordingly, the chosen approach should reflect the local legal frameworks and union / works council agreements as well as IT policy best practice. employer reputation and legal liability It was back in 2000 but many still remember the case of a lewd sent to a Norton Rose lawyer from his girlfriend, which was forwarded to a few colleagues and ended up being circulated worldwide. Yet employees still use s inappropriately, and employers may not all have the clear policies needed to enforce acceptable use. In a more recent case, a London City banker hit the headlines after an he sent to colleagues about his private life quickly circulated and cost him his job. Just as employees are not expected to make costly business phone calls on their own phone bill, neither do corporations want to pay for your calls to your cousins in Australia or personal data roaming while on holiday. But the distinction between personal and business use of the Internet is often not as clear. Appropriate utilisation of the web is an area that cannot be ignored. However, as even leading companies have found to their cost, for the majority of cases the offensive material being viewed or forwarded on is pornographic. The employer who doesn t deal with this issue may be at risk of facing constructive dismissal, sex discrimination claims or even criminal prosecution. In the case of Morse v Future Reality E.T. Case No /95 it was held that the downloading and viewing of sexually explicit images in the workplace by male workers did constitute sexual harassment if it makes the working environment uncomfortable for a female co-worker. It s worth remembering that compensation for sex discrimination is not capped. All Internet content your employees read, send and receive carries a risk! Impero not only captures screen shots of actual use, but also provides a Web Filter and USB device management, providing the tools you need to implement and enforce your own Acceptable Use Policy. Impero gives you a completely consolidated solution for comprehensive protection against harmful and inappropriate Internet content risks.
3 right to privacy at work? The Human Rights Act 1998 came into force in October 2000 and implemented in the UK the European Convention on Human Rights (the Convention). The potential consequences for employers were clear from the decision of the European Court of Human Rights in the case of Halford v United Kingdom 1997 IRLR 471. Alison Halford, a senior police officer, alleged that her employer had tapped her private work telephone. She successfully claimed that this was a breach of her right to privacy under Article 8 of the Convention. It was held that as her employer had not given her any prior warning that her telephone calls were liable to interception, she would have had a reasonable expectation of privacy for calls made on the private facility her office provided. The fact that the calls were made from the workplace did not mean that her right to privacy did not apply. It follows that the same principles will apply to communications and Internet use as to telephone calls. digital native employers Just as we are now seeing the emergence of a new generation of employees; the digital native, employers are also embracing the best of the Web. Constantly looking for new ways to attract and retain the best people and increase overall productivity, successful businesses also thrive on improving customer engagement models and processes that give them a competitive advantage over the competition. Allowing employees who have grown up with virtual lifestyles to maintain a creative and flexible approach to work, whilst ensuring clear lines of acceptable use is key. Results include easier and faster recruitment of high quality new hires, higher efficiency and improved talent retention within the organisation. acceptable use policy The risks that an employer will face if they do not put into place such a policy can be seen from the decision in the case of Dunn v IBM United Kingdom Ltd E.T. Case Number /97. Here the employee was summarily dismissed for accessing pornography on the Internet. The tribunal upheld the claim for unfair dismissal as it was not a case where there was a clear breach of company policy such as to automatically warrant summary dismissal. The uncertainty that an employer faces with such an unfair dismissal claim can be avoided with a policy that complies with the following minimum requirements: Is in writing Is clearly communicated to all employees Sets out permissible uses of both and Internet Specifies the prohibited/inappropriate uses States what monitoring, if any, will take place Sets out acceptable on-line behaviour Stipulates unauthorised access areas Set privacy rules in relation to other users Sets out privacy rules in relation to employer s right to monitor Stipulates possible disciplinary consequences for breach of rules
4 best practice considerations Before you begin employee monitoring, keep the following in mind: Have a formal policy. This should be in writing that spells out what employees are and are not allowed to say or do via and on the Internet, including blogs and social networks that they use inside and outside work. Explain the rationale. Ensure this leaves staff in no doubt that what employees say electronically can expose the company to legal and reputational risk. State exactly what s being monitored. Be specific about what will be monitored give examples, and explain how monitoring will be undertaken. It is also important to clearly set out the consequences of breaching the policy. Educate and remind employees. As well as ensuring new staff read and understand the policy, have an ongoing training and awareness program to educate and remind all employees. Establish clear procedures to follow when violations occur. Procedures should identify who is responsible for reporting any breach and who will investigate. Include instructions how to document and preserve evidence, and who will confront the violator. Refer to your disciplinary policies and if these need review, liaise with HR. Guidance should also be provided to ensure investigators are protected both emotionally and legally when dealing with more serious cases. Consider BYOD and Remote Access. Allowing the business use of personal devices necessitates a review of your acceptable use policy. In many cases an AUP can explicitly prohibit use of employee-owned devices, and so these clauses will need careful review when allowing this. Keep employees on task Once an employee is aware that every website and application accessed is logged, this will deter the majority of inappropriate personal use. A package that can identify key words and alert in real time can achieve specific policy objectives, such as actively preventing staff from carrying out job searches using their current employer s time and resources. Home working and personal use. Employees have a duty to respect their employees privacy, and should not record personal use of the devices outside of work. With the Impero solution, this is simply addressed by off-line mode of the client which maintains the policies on the device with capturing and logging disabled. Typically used in conjunction with a VPN, the Impero client automatically provides logging and recording as soon as a work connection is established. Involve IT, Legal and HR teams in developing and enforcing the policy. Legal considerations, in particular, should guide on the handling of electronic evidence related to any potential criminal or civil charges. (If your company does not have an in-house legal team, appoint an outside employment lawyer to advise you).
5 good cop bad cop Organisations should ensure that IT teams are being monitored, too. Typically, IT staff have higher levels of access and any compromise carries a potentially higher level of impact. IT staff should therefore not be surprised to learn that someone is watching them too. Even police forces are not immune from staff misconduct, and a number are looking to Impero solutions to help maintain professional standards when it comes to the use of IT. Shocking figures recently came to light following a BBC Freedom of Information request about the misuse of police computers within Derbyshire, Nottinghamshire and Leicestershire forces. It emerged that in the past 3 years, there were 28 such cases in Derbyshire, 32 in Nottinghamshire whilst Leicestershire had 59. Across the three forces, 11 employees had been dismissed as a result of abuses and 19 staff had resigned either during or after being investigated. One case even involved an Inspector downloading pornography using his work computer. The Information Commissioner s Office said: We expect police forces to make substantial proactive efforts to check that any access to their records is for legitimate police purposes and to take action where they discover wrongdoing. securing evidence Best practice in securing digital forensics requires electronic evidence to be properly preserved. To be admissible in a UK court, information taken from a PC or laptop normally requires the hard drive to be removed and cloned, and then the clone examined leaving the original evidence untouched. IT staff may be tempted to skip the cloning step and examine the hard drive directly, and managers may take the view that it s highly unlikely that they would ever wish to bring a prosecution due to the adverse publicity this might generate. However, IT need to advise the business owner on the evidential requirements and consequence of a practice that could make their findings inadmissible. That s why Legal and HR advisors should be involved in formulation of the policy and process of monitoring activity. Impero software seamlessly creates a separate thumbnail audit trail, which works like a virtual video recorder and provides reliable evidence without the need to clone hard drives. Without such evidence, delinquents may never be caught and in serious cases fraud and crime may continue. Impero not only provides monitoring and alerting, but also delivers the irrefutable evidence needed to enable successful formal investigations.
6 strategic partner and solution Together with a comprehensive policy accompanied by an education programme for users, the right strategic partner and an efficient solution is needed to effortlessly implement a monitoring programme. The IT department must of course ensure that employees are not prevented from proper access to all business related content, so a solution that can provide white listing as well as filtering and logging is essential. Traditional tools available for misconduct investigations are retrospective and reactive these include logs, DHCP and web proxy servers, or subscription-based appliances that only filter and log web traffic. For a typical investigation, an IT administrator may have to trawl through gigabytes of log data on multiple different platforms. Few solutions do the job more effectively than Impero s integrated suite a comprehensive tool kit that can be deployed to pre-emptively support an acceptable use policy, and where necessary provide the evidence of inappropriate activity. Using Impero, IT staff can ensure the appropriate security profiles are in force. Consistent policies can be applied to both physical and virtual desktops, for example to prohibit saving data on local storage therefore extending security to employee-owned devices. Applications can be deployed automatically and transparently with remote assistance or, whilst an encryption policy for all corporate data created through IT delivered applications can be applied (without touching employees personal applications and data). Impero logs every website and application accessed by device users. Impero provides evidence such as a screenshot and/or a full frame recording of the user s desktop. Alerts and blocking can be based on a granular policy for different groups of workers. Even more powerful is that upon detection of access to a specific resource or key word, Impero can instantly alert via an . Where other point solutions typically only offer a single feature such as logging or internet restriction, Impero provides an integrated suite that proactively aids support. These allow IT to provide remote control, manage software licences and make more efficient use of print and power. Power management alone often provides a payback in under 12 months. So why not let Impero consolidate and simplify the job of managing your complex and distributed network, as well as providing the ability to monitor the efficient and productive use of your business assets? The Impero staff and management team have always shown a great passion to work with us and enhance their product to meet future requirements. Nick Bond, Services BSF Director, Capita IT Services, UK
Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268
Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 This guidance is suitable for Public Disclosure Owner of Doc:
Legal Risks Associated With Email and Internet Use and Abuse by Employees
February 2004 Legal Risks Associated With Email and Internet Use and Abuse by Employees The potential for abuse of email and Internet facilities provided at the workplace is virtually limitless and could
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Social Networking Protocol for Schools Managed Staff
Social Networking Protocol for Schools Managed Staff Created by HR Consultancy June 2010 1 Social Networking Protocol 2010 Contents 1. Purpose 2. Scope 3. School s Expectations 4. Safeguarding 5. Monitoring
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
Internet & Technology Usage in the Networked Workplace: Legal Implications
Internet & Technology Usage in the Networked Workplace: Legal Implications EDDY D. VENTOSE PROFESSOR OF LAW UNIVERSITY OF THE WEST INDIES, CAVE HILL CAMPUS The Employment Process 2 Recruitment Process
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Monitoring Employee Communications: Data Protection and Privacy Issues
Monitoring Employee Communications: Data Protection and Privacy Issues By Anthony Sakrouge, Kate Minett, Daniel Preiskel and Jose Saras Reprinted from Computer and Telecommunications Law Review Issue 8,
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
PS 172 Protective Monitoring Policy
PS 172 Protective Monitoring Policy January 2014 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010;
Information Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
SURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
ANTI-FRAUD POLICY Adopted August 13, 2015
ANTI-FRAUD POLICY Adopted August 13, 2015 Introduction The Board of Commissioners of the Housing Authority of the City of Muskogee (MHA) has established an anti-fraud policy to enforce controls and to
In some cases, whistleblowers may bring a case before an employment tribunal, which can award compensation.
WHISTLEBLOWING Introduction This factsheet has been produced to provide advice on how to negotiate agreements and procedures on whistleblowing for branch officers and stewards. UNISON recognises that employees
Acceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
INTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
Disciplinary and Performance Management Policy & Procedure October 2010
Disciplinary and Performance Management Policy & Procedure October 2010 Policy control Reference Disciplinary & Performance Management Policy & Procedure Date approved 18 October 2010 Approving Bodies
IT1. Acceptable Use of Information Technology Resources. Policies and Procedures
IT1 Policies and Procedures Acceptable Use of Information Technology Resources Originator: Information Technology Governance Committee Approver: President s Council Effective: October 16, 2007 Replaces:
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
Cisco Email Security Image Analysis: Protecting the Network from Explicit Images
Solution Overview Cisco Email Security Image Analysis: Protecting the Network from Explicit Images Challenge Eighty percent of the world s business communication takes place on email, making it the primary
SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS
These terms of use govern your use of our site. Please read the whole of these terms in full before you use this Website. If you do not accept these terms, please do not use this Website. Your continued
Social Media in the Workplace
Social Media in the Workplace A Guide for CWU Members CWU Youth Committee 2013 CONTENTS Introduction... 3 Social Networking in Ireland... 4 Guidelines for using Social Media Responsibly... 5 2 INTRODUCTION
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
Using Public Computer Services in Somerset Libraries
Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which
Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
Policy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
NEW STATUTORY DISMISSAL, DISCIPLINARY AND GRIEVANCE PROCEDURES
September 2004 NEW STATUTORY DISMISSAL, DISCIPLINARY AND GRIEVANCE PROCEDURES With effect from 1 October 2004, new statutory dismissal and disciplinary procedures ("DDP") and grievance procedures ("GP")
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
E- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
Information Governance Framework. June 2015
Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review
Social Media In the Workplace
Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee
Employment Law Guide
Employment Law Guide Settlement Agreements (Formally known as Compromise Agreements) See the separate guide. Unfair Dismissal Length of employment Employees can only bring a claim for ordinary unfair dismissal
SOCIAL MEDIA POLICY. Introduction
Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes
Social Networking Policy
Insert Academy Logo Here Social Networking Policy March 2014 Consultation Period: 7 th October 2013 16 th December 2013 Date Approved by NET: 18 th December 2013 Next Review Date: January 2015 1 Social
DISCIPLINARY PROCEDURE
DISCIPLINARY PROCEDURE 1. Purpose and Scope 1.1 The Company s procedure is designed to help and encourage all workers to achieve and maintain standards of conduct, attendance and job performance. The Company
Policies & Procedures. Moat Community College E-Safety Policy
Moat Community College E-Safety Policy Vision Statement Moat Community College embraces the positive impact and educational benefits that can be achieved through appropriate use of the Internet and associated
TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Status: Final. Version Date Author Reason
TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Reference Number HR 2012 046 Version: 1 Status: Final Author: Jane Thomas Job Title HR Manager Amendment
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
DIRECTORS & OFFICERS LIABILITY
DIRECTORS & OFFICERS LIABILITY PROTECT YOUR ASSETS AND YOUR HOME THE NEW AGE OF LIABILITY The dawning of a new millennium witnessed a new era for company directors and officers with regulatory controls
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation
EMPLOYER S DUTY TO MONITOR WEBSITE USE
EMPLOYER S DUTY TO MONITOR WEBSITE USE An employer must carefully administer the actions of his or her employees for several reasons. Under New York law, it is well settled that under the doctrine of respondeat
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
This policy applies equally to all full time and part time employees on a permanent or fixed-term contract.
Discipline Policy 1. Introduction This policy set outs how Monitor will deal with employee conduct which falls below the expected standard. It is Monitor s aim to use the policy as a means of encouraging
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
HUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
Quick guide to the employment practices code
Data protection Quick guide to the employment practices code Ideal for the small business Contents 3 Contents Section 1 About this guidance 4 Section 2 What is the Data Protection Act? 5 Section 3 Recruitment
Letter from the Chief Executive Officer and Chairman and the Group Medical Director
Letter from the Chief Executive Officer and Chairman and the Group Medical Director Every day, millions of people put their trust in International SOS to help them wherever they live or travel. We remain
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
WEST MIDLANDS POLICE Force Policy Document
WEST MIDLANDS POLICE Force Policy Document POLICY TITLE: POLICY REFERENCE NO: POLICE STAFF DISCIPLINARY PROCEDURE HR/06 Executive Summary The Force expects certain standards of conduct to be maintained
[Example] Social Media Acceptable Use Policy
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
How To Behave At The Britain Council
Our Code of Conduct Trust is not given. It s earned www.britishcouncil.org Contents Foreword from Chief Executive...01 Our values...02 Introduction...03 Our code of conduct...04 1. Legal compliance...
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013
Use of Social Networking Websites Policy START DATE: March, 2013 NEXT REVIEW: March 2015 COMMITTEE APPROVAL: Joint Management Trade Union Committee CHAIR S SIGNATURE: STAFF SIDE CHAIR S SIGNATURE: DATE:
Berwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
Group Policy 1. INTRODUCTION 2. BUSINESS INTEGRITY. 2.1. Honesty, Integrity & Fairness
Corporate Code of Conduct and Ethics Policy Approver: CEO Valid from: 26-11-13 1. INTRODUCTION CRI recognizes its responsibilities as a global services provider, and is committed to being a responsible
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
UNIVERSITY OF MALTA. Sexual Harassment Policy
UNIVERSITY OF MALTA Policy and Procedures for Dealing with Complaints of Sexual Harassment SCOPE The sexual harassment policy applies to all those who work and study at the University of Malta. Any reference
Fraud and Abuse Policy
Fraud and Abuse Policy 2015 FRAUD AND ABUSE POLICY 2015 1 Contents 4. Introduction 6. Policy Goal 7. Combatting Customer Fraud and Abuse 8. Reporting Breaches 9. How Alleged Breaches Will Be Investigated
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
