An Organisation-Wide Policy for Internet/Intranet Usage and Security

Size: px
Start display at page:

Download "An Organisation-Wide Policy for Internet/Intranet Usage and Security"

Transcription

1 An Organisation-Wide Policy for Internet/Intranet Usage and Security Status: Ratified Date ratified: 05/11/2014 Version: 1.1 Ratifying Board: Executive Committee Approved Sponsor Group: Information Governance Steering Group Type of Procedural Document Policy Owner: Dipa Bhella Owner s job title: Information Governance & Security Manager Author: Dipa Bhella Author s job title: Information Governance & Security Manager Equality Analysis completion date: 22/09/2014 Date issue: November 2014 Review date: November 2017 Replaces: Version 1 Unique Document Number: 2012/055 An Organisation-wide policy for Internet/Intranet Usage and Security - 1 -

2 Equality statement This document demonstrates commitment to create a positive culture of respect for all individuals, including staff, patients, their families and carers as well as community partners. The intention is, as required by the Equality Act 2010, to identify, remove or minimise discriminatory practice in the nine named protected characteristics of age, disability, sex, gender reassignment, pregnancy and maternity, race, sexual orientation, religion or belief, and marriage and civil partnership. It is also intended to use the Human Rights Act 1998 to promote positive practice and value the diversity of all individuals and communities. This document is available in different languages and formats upon request to the Trust Procedural Documents Coordinator and the Equality and Diversity Lead. An Organisation-wide policy for Internet/Intranet Usage and Security - 2 -

3 Contents 1. RATIONALE SCOPE POLICY OVERVIEW MANAGEMENT OF INTERNET USE TECHNICAL SECURITY RESPONSIBILITIES COMPLIANCE MONITORING ARRANGEMENTS TRAINING TO ENSURE COMPLIANCE WITH THIS DOCUMENT REFERENCE AND ASSOCIATED DOCUMENTS GLOSSARY/ EXPLANATION OF TERMS USED IN THIS DOCUMENT DOCUMENT CONTROL APPENDICIES APPENDIX 1 EQUALITY ANALYSIS (EQA) An Organisation-wide policy for Internet/Intranet Usage and Security - 3 -

4 1. Rationale This document explains the policy and procedure that governs use of the Internet and World Wide Web within the trust. Compliance with this policy will ensure that access to the Internet will be available and responsive to the business needs of the trust. This policy also assists the trust to comply with NHS security regulations relating to controlled connections to national computer networks, for example, Health & Social Care Information Centre Statement of Compliance. 2. Scope Use of the Internet is encouraged in the execution of day-to-day business to the extent that it supports the trust s objectives. Users must not use the Internet within the trust in the same way they do at home all users must respect the trust s standards of business conduct whenever the Internet is used. This policy applies to all authorised users of the trust s computer network (including all permanent and temporary employees of the trust, agency workers, agents, subcontractors, consultants, and third party vendors). A valid user account is required to access the computer network. Access to the Internet via the trust s network is only possible using computers issued by the trust assembled using standardised hardware and software and connected to the trust s computer network. The web browser used by the trust is Microsoft Internet Explorer. 3. Policy Overview It is the intention of Trust to provide access to the resources of the Internet. The facilities to provide such access commit a considerable amount of organisational resources for telecommunications, networking, software, storage etc and this policy is designed to help you understand the Trust's expectations for the use of those resources in the particular conditions of the Internet, and to help you use those resources efficiently and effectively. Access to the Internet will be provided automatically to networked PCs. The Trust reserves the right to refuse or remove access subject to the terms of this policy. An Organisation-wide policy for Internet/Intranet Usage and Security - 4 -

5 Employees may use their Internet facilities for non-work research or browsing during meal times or other breaks, or outside of work hours, provided that all other usage policies are adhered to. In order to restrict access to certain sites, the Trust subscribes to a service which maintains a database of forbidden sites. This is updated on a daily basis and exists to protect staff from visiting sites, which are deemed to be contrary to this policy. While explicit requirements for Internet usage are set out below, it is worth summarising the overall intent. First and foremost for the Trust, the Internet is a business tool, provided at significant cost and we expect Internet access to be used primarily for Healthcare business related purposes, e.g. to communicate with colleagues, customers and suppliers, to research relevant topics; and to obtain useful information pertinent to your work responsibilities. You are required to conduct yourself honestly and appropriately on the Internet, and respect the copyrights, software licensing rules, property rights, privacy and prerogatives of others, just as you would in any other business dealings. In this respect, as a communication medium, the Internet is not exceptional. All existing Trust policies apply to your conduct on the Internet, especially (but not exclusively) those that deal with intellectual property rights, privacy, misuse of organisation resources, sexual or racial harassment, information and data security, confidentiality and discipline. Unnecessary or unauthorised Internet usage can cause network and server congestion. It can delay other users, take away from work time, consume supplies, and tie up printers and other shared resources. Unlawful Internet usage may also result in negative publicity for the Trust and expose both it and the individual concerned to significant legal liabilities. Computer-mediated communication, which can be synchronous (such as instant messaging, online chat, web and video conferencing), asynchronous ( , blogs, wikis, newsgroups) or a mixture of both (social networking sites) is increasing in variety and scope. This offers unprecedented opportunity for the individual user to communicate widely and to promote the Trust. Because of this, we must take special care to maintain the clarity, consistency and integrity of the Trust's corporate image. Anything that one employee writes or says on the Internet can be taken as representing the Trust as a whole. For this reason we expect you to forgo a measure of your individual freedom when you participate in such communication for the organisation's business, as outlined below. While direct connection to the Internet offers a plethora of potential benefits, it can also open the door to some significant risks to our data and systems if we do not follow appropriate security discipline. This may mean preventing systems with sensitive data or applications from connecting to the Internet entirely, or it may mean that certain users must be prevented from using certain Internet An Organisation-wide policy for Internet/Intranet Usage and Security - 5 -

6 features like file transfers. The overriding principle is that security is to be everyone's first concern. An Internet user can be held accountable for any breaches of security or confidentiality. 3.1 Management of Internet Use The Trust reserves the right to inspect (or in the case of encrypted confidential data files, verify with the user of) any and all files stored on the network or on local hard drives in order to assure compliance with policy. The display of any kind of "offensive" material (including pornographic images or documents) on any Trust system is a disciplinary offence and will be dealt with in accordance with the relevant procedure. In addition, "offensive" material (including pornographic material) may not be archived, stored, distributed, edited or recorded using the Trust's network or computing resources. For the purposes of this Policy, "offensive" material is defined as that which would contravene the Trust's Equal Opportunities and Harassment Policies. Such examples will include hostile or derogatory material (including images) relating to gender, ethnicity, race, sex/sexual orientation, religious or political convictions and disability, although these categories are not exhaustive. If you find yourself accidentally connected to a site that contains sexually explicit or otherwise "offensive" material, you must disconnect from that site immediately, regardless of whether that site had been previously deemed acceptable by any screening or rating program and advise your line manager as a matter of priority. The Trust's Internet facilities and computing resources must not be used knowingly to violate the laws and regulations of the United Kingdom or any other nation, or the laws and regulations of any country, state, city, province or other local jurisdiction in any material way. Use of the Trust's resources for illegal activity is also deemed a disciplinary offence and will be dealt with under the Trust's procedure, and the trust will cooperate with any legitimate law enforcement activity. Any software or files downloaded via the Internet onto the Trust network or local hard drive become property of the Trust. Any such files or software may be used only in ways that are consistent with their licences or copyrights. Large files, such as.mpg files, music on demand or any other entertainment media files should not be downloaded. Media streaming is forbidden due to the negative impact it creates on the performance of the network. Should this access be a work related requirement, formal approval should be sought from the IT Support team. An Organisation-wide policy for Internet/Intranet Usage and Security - 6 -

7 No employee may use Trust facilities knowingly to download or distribute pirated software or data. No employee may use the Trust's Internet facilities to propagate deliberately any malicious code (e.g. virus, worm, Trojan Horse or trap-door program) that is designed to interfere with the normal running of other users' machines or applications. No employee may use the Trust's Internet facilities knowingly to disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of another user. Each member of staff using the Trust's Internet facilities shall identify himself or herself honestly, accurately and completely (including his/her organisation affiliation and function where requested) when participating in online discussion groups or similar fora, or when setting up accounts on outside computer systems. Only those employees who are duly authorised to speak to the media, or to analysts or in public meetings on behalf of the Trust may speak/write in the name of the Trust on online discussion fora. Other employees may participate in such fora in the course of work activities when relevant to their duties, but they may only as individuals speaking only for themselves and not for the Truts. Where an individual participant is identified as an employee or agent of the Trust, he/she must refrain from any unauthorised political advocacy or from the unauthorised endorsement or appearance of endorsement by the organisation of any (commercial) product or service not sold or provided by the Trust, its subsidiaries or its affiliates. The Trust retains as normal the copyright to any material posted to any online discussion site (or similar computer-mediated communication forum) or World Wide Web page by any employee in the course of his or her duties. Employees are reminded that online discussion fora are public areas where it is inappropriate to reveal confidential Trust information of any sort, including patient or employee data, professional secrets, financial data or any other material covered by existing Trust policies and procedures on confidentiality, or any other material that could identify these subject matters. Employees releasing any such protected information via such a forum - whether or not the release is inadvertent - will be subject to all penalties as identified in the Trust's ICT, Security, Confidentiality and Acceptable Use Policy. Use of the Trust's Internet access facilities to commit breaches of conduct or offences which contravene Trust policies and procedures will be dealt with in accordance with the relevant procedures. An Organisation-wide policy for Internet/Intranet Usage and Security - 7 -

8 Staff must not under any circumstances use the Internet to conduct personal commercial or business activities. Access to the Internet will not be allowed from PCs connected to medical equipment. 3.2 Technical User IDs and passwords help maintain individual accountability for Internet resource usage. Any employee who obtains a password or ID for an Internet resource must keep that password confidential. Trust policy prohibits the sharing of user IDs or passwords obtained for access to Internet sites. Employees should schedule communications-intensive operations such as large file transfers, mass ings and the like for off-peak times, which for the Trust are normally defined as outside the hours of 8 am to 6 pm Mondays to Fridays inclusive, excepting Bank Holidays. Whilst every effort will be made to maintain satisfactory availability and performance of the Internet connection, users should recognise that this facility will normally be subject to a lower support priority than the existing core network and its key applications. Any file that is downloaded must be scanned for viruses before it is run or accessed and the Trust has provided Anti-Malware (Antivirus) software to enable this to happen. 3.3 Security The Trust has installed a variety of network security mechanisms to assure the safety and security of the organisation's network. Any employee who attempts to disable, defeat or circumvent any Trust security system will be subject to the Trusts disciplinary procedure and should be aware than if proven could result in dismissal. Files containing sensitive Trust data that are transferred in any way across the Internet must be secure and encrypted. Computers that have data connections independent of the Trust network circumvent the Trust's network security mechanisms and contravene the Information Governance Statement of Compliance (IGSoC). The IGSoC is the agreement between HSCIC and the Trust that sets out the information governance policy and terms and conditions for use. It contains a number of obligations to enable use of HSCIC services, which aim to preserve the integrity of these services. A computer with a private connection to another outside computer or network can be used by an attacker to compromise any internal An Organisation-wide policy for Internet/Intranet Usage and Security - 8 -

9 network to which that computer is attached. Computers used for independent dial-up, broadband or leased-line connections to any outside computer or network must be physically isolated from the Trust's network. 4. Responsibilities The Caldicott Guardian is responsible for ensuring person identifiable clinical information is received, stored and used in line with the Trust obligations under the Data Protection Act The Senior Information Risk Owner (SIRO) is responsible for leading and fostering a corporate culture which values, protects and uses information for the success of the organisation and benefit of its customers. Service, Department and Line Managers are responsible for ensuring Trust procedures are known and followed in all areas. Administrative Staff are responsible for following Trust policy and contributing to good practice within the Trust. Clinical Staff are responsible for ensuring information is dealt with appropriately and professionally both in line with this policy and to their professional code of conduct. All staff in the organisation are responsible for ensuring the safe communication of information and that disclosure of person identifiable information is carried out strictly in line with this policy and that good practice is maintained throughout the organisation. Failure to comply with this policy may result in disciplinary action being taken up to and including dismissal. If there is reason to believe a criminal offence may have been committed, the matter will be referred to the Trust s Counter Fraud Specialist. An Organisation-wide policy for Internet/Intranet Usage and Security - 9 -

10 5. Compliance Monitoring Arrangements The Trust will monitor its Internet connection to ensure that usage complies with this policy. Monitoring will be done as described in the ICT, Acceptable Use Policy. Data from this monitoring process maybe used in any disciplinary proceedings. To support the need for network performance, and ensure any limitations imposed are reasonable limitations, the Trust will use this data to review and shape internet access. 6. Training to ensure compliance with this document Annual Information Governance Training for all NHS staff is mandated within the NHS Operating Framework Informatics Planning 2010/2011 and the IG toolkit requirement Reference and associated documents Organisation Author Date of publication SASH Information March Governance 2014 & Security Manager / IT Manager SASH SASH SASH SASH Information Governance & Security Manager Information Governance & Security Manager Information Governance & Security Manager Information Governance & Security Manager March 2014 July 2012 March 2014 September 2014 Title of document ICT, Security, Confidentiality & Acceptable Use Policy Information Governance Policy Memory Stick Policy Policy Data Protection and Confidentiality Policy An Organisation-wide policy for Internet/Intranet Usage and Security

11 8. Glossary/ explanation of terms used in this document Acronym/ Abbreviation/ Term Browser Extranet Firewall FTP HTML Internet Internet servers Intranet Meaning A PC software application that facilitates searching and accessing the World Wide Web. Electronic mail; a means of exchanging messages with other connected users across a network or the Internet. Similar to an intranet but used by organisations to provide communications for external groups such as suppliers and customers. A specialised network device that protects an organisation s LAN and/or intranet from unauthorised external access. File Transfer Protocol -a piece of software that enables the transfer of a file of information from one computer to another via a network connection. Short for Hypertext Mark-up Language is the predominant mark-up language for the creation of web pages. It provides a means to describe the structure of text-based information in a document by denoting certain text as headings, paragraphs, lists and so on and to supplement that text with interactive forms, embedded images or objects and links to other documents. Global network for exchanging information held on computers as Web sites and pages. Nobody owns or manages it; it has grown by adopting common standards. Hardware that runs the Internet. These are computers that store Web site information, route calls and handle and data traffic. A private version of the Internet, used increasingly by organisations as the basis of their own networks. They use the same technology as the Internet An Organisation-wide policy for Internet/Intranet Usage and Security

12 Java LAN Malware Pornography Server (servers, Web sites etc.) but are usually made secure from outsiders by use of firewall techniques. Software developed by Sun Microsystems that works on any platform. It can be downloaded from a network or Internet server in the form of applets (small packets of software that perform or execute when you click on them) whenever it is needed. Local Area Network, typically used to connect members of a workgroup, department or single-sited organisation. Short for Malicious Software, a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or programme code. It includes computer viruses, worms, Trojan horses, spyware, dishonest adware, crimeware, rootkits, and other malicious and unwanted software. Pornography can take many forms. For example, textual descriptions, still and moving images, cartoons and sound files. Some pornography is illegal in the UK and some is legal. Pornography considered legal in the UK maybe illegal elsewhere. Because of the global nature of the internet and , these issues must be taken into consideration. Therefore, the Trust defines pornography as the description or depiction of sexual acts or naked people that are designed to be sexually exciting. The Trust will not tolerate its facilities being used for this type of material and considers such behaviour to constitute a serious disciplinary offence. A computer connected centrally and accessible from terminals and other computing devices such as PCs. An Organisation-wide policy for Internet/Intranet Usage and Security

13 9. Document Control Consultation record Relevant Speciality, service Sponsor or User Group SIRO, Caldicott Guardian, Medical records, Human Resources, Finance, Information Management, and Data Quality. name Information Governance Steering Group members Individual s name IG Members Job title Date consulted 26/09/2014 Date feedback received Change History Version Date Author/ Lead Job title Details of Change 1.1 Sept 14 Dipa Bhella IGSM Minor changes to all sections, new policy template An Organisation-wide policy for Internet/Intranet Usage and Security

14 Appendix 1 Equality Analysis (EqA) By completing this document in full you will have gathered evidence to ensure, documentation, service design, delivery and organisational decisions have due regard for the Equality Act This will also provide evidence to support the Public Sector Equality Duty. Name of the policy / function / service development being assessed Date last reviewed or created & version number Briefly describe its aims and objectives: An organisation-wide Policy for the Internet/Intranet Usage and Security V1 November 2009 This document explains the policy and procedure that governs use of the Internet and World Wide Web within the trust. Directorate lead Target audience (including staff or patients affected) Screening completed by (please include everyone s name) Dipa Bhella, Information Governance & Security Manager Karen Anglim, Information Governance Administrator Ian Mackenzie, Director of Information & Facilities This policy applies to all authorised users of the trust s computer network (including all permanent and temporary employees of the trust, agency staff, agents, subcontractors, consultants, and third party vendors). Organisation Date Surrey & Sussex NHS Trust 22/09/2014 Surrey & Sussex NHS Trust 22/09/2014 An Organisation-wide policy for Internet/Intranet Usage and Security

15 Equality Group (Or protected characteristic): What evidence has been used for this assessment? What engagement and consultation has been used Identify positive and negative impacts How are you going to address issues identified? Lead and Timeframe Age Disability Gender reassignment Marriage & Civil partnership Pregnancy & maternity Race Religion & Belief Sex Sexual orientation Carers An Organisation-wide policy for Internet/Intranet Usage and Security

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY Effective August 24, 2004 Overview: The Fresno County Employees Retirement Association (FCERA) provides access to the Internet

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance. 1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following

More information

How To Monitor The Internet In Idaho

How To Monitor The Internet In Idaho Idaho Technology Authority (ITA) ENTERPRISE POLICY P1000 GENERAL POLICIES Category: P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING CONTENTS: I. Authority II. Abstract III. Definitions IV. Policy

More information

Internet, Social Networking and Telephone Policy

Internet, Social Networking and Telephone Policy Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy .......... Information Technology Acceptable Use Policy (IT Resources, Email and Internet) Version 1.2 October, 2002 Contents OVERVIEW 4 IT RESOURCES USAGE POLICY 4 1. Trust Property 4 2. Inappropriate

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable

More information

Policies Concerning the use of Computers

Policies Concerning the use of Computers Policies Concerning the use of Computers Shrewsbury School s Policies Concerning the use of Computers The Director of IT is responsible for the formulation and review of policies affecting the use of computers

More information

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy 1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines

More information

How To Protect Your Privacy On The Emm Recipe Cards

How To Protect Your Privacy On The Emm Recipe Cards EHLANZENI DISTRICT MUNICIPALITY INTERNET AND EMAIL USAGE POLICY FOR 2012 OBJECT OF THE POLICY The internet and email have emerged as valuable and cost-effective tools for Ehlanzeni District Municipality

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

E-Mail and Internet Policy

E-Mail and Internet Policy E-Mail and Internet Policy Document reference Title: E-Mail and Internet Policy Product ID: Version Number: 8.0 Status: Live Distribution / Issue date: 12 November 2014 Author: K. Fairbrother Review Period:

More information

POLICY. Responsible Use of Social Media

POLICY. Responsible Use of Social Media POLICY Responsible Use of Social Media Contact Officer Director of Personnel Director of Communications & Participation Senior Project Manager: Corporate Policies (Policy author) Purpose The primary aims

More information

Sample Employee Network and Internet Usage and Monitoring Policy

Sample Employee Network and Internet Usage and Monitoring Policy CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members

More information

Use of the Internet and E-Mail Policy

Use of the Internet and E-Mail Policy Use of the Internet and E-Mail Policy This procedural documentsupersedes : Use of the Internet and E-Mail Policy CORP/EMP 16 v.4 Name and title of author/reviewer Samantha Francis HR Advisor Date revised

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing

More information

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

Notice: Page 1 of 11. Internet Acceptable Use Policy. v1.3

Notice: Page 1 of 11. Internet Acceptable Use Policy. v1.3 Notice: Plymouth Community Healthcare Community Interest Company adopted all Provider policies from NHS Plymouth when it became a new organisation on 1 October 2011. Please note that policies will be reviewed

More information

Acceptable Use Policy

Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

REGION 19 HEAD START. Acceptable Use Policy

REGION 19 HEAD START. Acceptable Use Policy REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience: E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Issued by: Senior Information Risk Owner Policy Classification: Policy No: POLIG001 Information Governance Issue No: 1 Date Issued: 18/11/2013 Page No: 1 of 16 Review Date:

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Information Governance Policy Issue Date: June 2014 Document Number: POL_1008 Prepared by: Information Governance Senior Manager Insert heading depending on Insert line heading

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

How To Use A College Computer System Safely

How To Use A College Computer System Safely 1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Odessa College Use of Computer Resources Policy Policy Date: November 2010 Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational

More information

How To Ensure Information Security In Nhs.Org.Uk

How To Ensure Information Security In Nhs.Org.Uk Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78 Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

SOCIAL MEDIA POLICY. Senior Governance Officer, NHS North of England Commissioning Support Unit Reference No

SOCIAL MEDIA POLICY. Senior Governance Officer, NHS North of England Commissioning Support Unit Reference No SOCIAL MEDIA POLICY Ratified Governance & Risk Committee 08/2015 Status Final Issued August 2015 Approved By Governance and Risk Committee Consultation Governance and Risk Committee Equality Impact Assessment

More information

All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.

All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid. Policy Type Information Governance Corporate Standing Operating Procedure Human Resources X Policy Name CCG IG03 Information Governance & Information Risk Policy Status Committee approved by Final Governance,

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

INTERNET ACCEPTABLE USE POLICY

INTERNET ACCEPTABLE USE POLICY INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods

More information

Acceptable use policy DEECD Information, Communications and Technology (ICT) Resources. Effective March 2011

Acceptable use policy DEECD Information, Communications and Technology (ICT) Resources. Effective March 2011 Acceptable use policy DEECD Information, Communications and Technology (ICT) Resources Effective March 2011 Published by the Communications Division for Human Resources Division Department of Education

More information

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy 1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Acceptable Use Policy

Acceptable Use Policy Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)

More information

c. Require or Request Photos of Subscriber f. Allow Subscribers Access to Other Subscriber Information

c. Require or Request Photos of Subscriber f. Allow Subscribers Access to Other Subscriber Information Diocese of Orlando Network Acceptable Use Policy for All Parishes, Schools and Entities of the Diocese of Orlando Parent Addendum (Please note these are excerpts from the full document) 5.3 Unacceptable

More information

CCG Social Media Policy

CCG Social Media Policy Corporate CCG Social Media Policy Version Number Date Issued Review Date 2 25/03/2015 25/03/2017 Prepared By: Consultation Process: Formally Approved: Governance Manager, North of England Commissioning

More information

City of Grand Rapids ADMINISTRATIVE POLICY

City of Grand Rapids ADMINISTRATIVE POLICY City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

NHS Commissioning Board: Information governance policy

NHS Commissioning Board: Information governance policy NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION

More information

section 15 Computers, Email, Internet, and Communications

section 15 Computers, Email, Internet, and Communications section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property

More information

SOCIAL MEDIA POLICY. Introduction

SOCIAL MEDIA POLICY. Introduction Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy

OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy SECTION OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy 1 Purpose 1 2 Principles 1 3 Telephone Use 2 4 Postal Mail 2 5 Email Use 3 6 Internet Use 3 7 Social

More information

AASTMT Acceptable Use Policy

AASTMT Acceptable Use Policy AASTMT Acceptable Use Policy Classification Information Security Version 1.0 Status Not Active Prepared Department Computer Networks and Data Center Approved Authority AASTMT Presidency Release Date 19/4/2015

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

Assistant Director of Facilities

Assistant Director of Facilities Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment

More information

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:

More information

With the increasing popularity of social media you need a Social Media Policy to protect your company.

With the increasing popularity of social media you need a Social Media Policy to protect your company. Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Insert GNIS Logo Here. Acceptable Use Policy & Guidelines Information Technology Policies & Procedures. Guangzhou Nanhu International School

Insert GNIS Logo Here. Acceptable Use Policy & Guidelines Information Technology Policies & Procedures. Guangzhou Nanhu International School Insert GNIS Logo Here Acceptable Use Policy & Guidelines Information Technology Policies & Procedures Guangzhou Nanhu International School May, 2013 Table of Contents 1 Overview...1 2 Purpose...1 3 Scope...1

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose

More information

Liverpool Hope University. Equality and Diversity Policy. Date approved: 14.04.2011 Revised (statutory. 18.02.2012 changes)

Liverpool Hope University. Equality and Diversity Policy. Date approved: 14.04.2011 Revised (statutory. 18.02.2012 changes) Liverpool Hope University Equality and Diversity Policy Approved by: University Council Date approved: 14.04.2011 Revised (statutory 18.02.2012 changes) Consistent with its Mission, Liverpool Hope strives

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)

719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) 719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY STATEMENT: Many of our employees have access to the internet as well as email capabilities. The County recognizes that these

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

Internet usage Policy

Internet usage Policy Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Internet and Social Media Policy

Internet and Social Media Policy Internet and Social Media Policy Page 1 of 19 Review and Amendment Log / Control Sheet Responsible Officer: Chief Officer Clinical Lead: Author: Date Approved: Committee: Version: Review Date: Medical

More information

Westwood Baptist Church Computer use Policy

Westwood Baptist Church Computer use Policy Westwood Baptist Church Computer use Policy I. Policy Statement The use of Westwood Baptist Church automation systems, including computers, fax machines, and all forms of Internet/Intranet access, is for

More information

Information Management Policy CCG Policy Reference: IG 2 v4.1

Information Management Policy CCG Policy Reference: IG 2 v4.1 Information Management Policy CCG Policy Reference: IG 2 v4.1 Document Title: Policy Information Management Document Status: Final Page 1 of 15 Issue date: Nov-2015 Review date: Nov-2016 Document control

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

Using Public Computer Services in Somerset Libraries

Using Public Computer Services in Somerset Libraries Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which

More information