Acceptable Use Policy

Size: px
Start display at page:

Download "Acceptable Use Policy"

Transcription

1 Acceptable Use Policy Recommending Committee: Approving Committee: Information Governance Steering Group Patient Safety & Experience Council Signature: Designation: Chief Executive Date: Version Number: 01 Date: January 2011 Review Date: July 2014 Responsible Officer: Information Governance Manager

2 Revision History Version Action Author/reviewed by Date 01 Original document Created Craig Walker Jan Circulated to IG Board for IG Steering Group comments approval Jan Circulated to Assistant Director of Assistant Director of Operation s for comments Operation s Feb Presented to IG Board for approval Craig Walker after comments Feb Document Approved IG Steering Group Feb Equality Impact Assessed Human Resource Department 01 Document Ratified Patient Safety and Experience Council Feb 11 March 11

3 Content Page 1. Introduction 2 2. Scope 2 3. Authorisation 2 4. Responsibilities 4 5. Privacy 5 6. Definitions of Unacceptable/Acceptable Usage 6 7. Internet Access Principles 6 8. Internet Access Monitoring Principles E- mail Monitoring Sensitive Information & Encryption Instant Messaging Software Social Networking Sites Removable Media Protection from Malicious Software Business Portable Devices Personal Portable Devices/Personal Information Software Access Controls Staff Access Controls Physical Access Controls Application Access Controls Acceptable Personal Use & Disciplinary Procedures Reporting of Incidents 15 Appendix A: Trust Related Policies 16 Appendix B: Relevant Legislation 16 1

4 1. Introduction St Helens & Knowsley Teaching Hospitals NHS Trust (referred to hereafter as the Trust) seeks to promote and facilitate the proper and extensive use of Information Technology and encourage the use of these facilities to develop the skills and knowledge of the workforce to benefit the organisations business objectives. The Acceptable Use Policy will provide a framework for such use of the Trusts IT resources. It applies to all computing, telecommunication, and networking facilities provided by the Trusts Health Informatics Service (H.I.S). It should be interpreted such that it has the widest application, in particular references to IT Services should, where appropriate, be taken to include departmental or other system managers responsible for the provision of an I.T. Service. This policy encompasses new and developing technologies, as well as those that are older and more established. It is the responsibility of all users of Trust IT services to read and understand this policy. 2. Scope The Trust`s I.T. resources are provided to facilitate a member of staff s essential work as an employee or other role within the Trust. Staff must not jeopardise the integrity, performance, confidentiality or reliability of computer equipment, software, data and other stored information. The integrity of the Trust`s computer systems is put at risk if users do not adhere to this policy. 3. Authorisation Access to the Trust network will only be authenticated by user name, password and some occasions Registration Authority (R.A) Card. Accessing the Trust network is conditional upon, compliance with the Acceptable Use Policy, for which a signature of acceptance is required on commencing work for the Trust and acceptance is deemed to have been renewed annually by completing mandatory training. The lack of a signature does not exempt an individual from any obligation under this policy. The registration process grants authorisation to use the core IT facilities of the Trust. Following registration, a username, password and address will be 2

5 allocated. Authorisation for other services may be requested by application to the Health Informatics Service Help Desk. All individually allocated usernames, passwords and addresses are for the exclusive use of the individual to whom they are allocated. The user is personally responsible and accountable for all activities carried out under their username. The password associated with a particular personal username must not be divulged to any other person. Attempts to access or use any username or address which is not authorised to the user, are prohibited. No one may use, or attempt to use, IT resources allocated to another person. All users must correctly identify themselves at all times. A user must not masquerade as another, withhold their identity or tamper with audit trails. A user must take all reasonable precautions to protect their resources. In particular, passwords used must adhere to current password standards and best practice. 4. Responsibilities The Chief Executive has ultimate responsibility for this policy. 4.1 Organisational Responsibilities To establish adverse incident and investigation procedures for the reporting of all breaches of this policy through the appropriate management channels To ensure that line managers understand their responsibilities for the implementation of this policy within their business or clinical area and that their managed staff adhere to the principles To provide appropriate training on the acceptable use of and the Internet To ensure that controls are in place within the physical environment to prevent unauthorised access to the computer systems To ensure compliance with section 46 of the Freedom of Information Act Code of Practice on Records Management with relation to disclosure of e- mails To define acceptable and unacceptable use of computer systems 4.2 Caldicott Guardian Responsibilities To ensure that the organisation is aware of key legislation relating to this policy To ensure that systems are in place to investigate breaches of this policy To guide the organisation on the transfer or disclosure of service user/employee person identifiable information by and the Internet 3

6 4.3 Line Managers Responsibilities Line Managers must ensure that permanent/temporary staff, students, trainees and contractors working in their departments are aware of: this policy and related policies the acceptable personal use of Trust hardware and software how to access advice and guidance acceptable use the security of the physical environment within their department how to report breaches or potential breaches of this policy 4.4 HIS Responsibilities To review this Policy in line with changes in legislation/guidance/standards To provide, manage, and maintain Trust systems and access To monitor and audit access To support the investigation of reported incidents To comply with legitimate requests for access to mailboxes To train staff on the acceptable and unacceptable use of Trust systems To provide username and password management To provide virus control To report incidents and inappropriate use to the Trust Board through the information Governance Steering Group To reporting on issues raised To disseminate this policy in the organisation To act as a source of help, advice and guidance on the acceptable/unacceptable use of Trust systems and the content of this policy 4.5 Information Security Officer The Information Security Officer must perform all monitoring actions and act upon findings as and when required. Users must: 4.6 Users Responsibilities comply with this Policy at all times including any use of the service whilst off duty report any incidents such as inappropriate use or security breaches or virus infection to their line manager 4

7 Must ask for advice and guidance on the content of this Policy or the use Information Technology from line managers or the Health Informatics Service Helpdesk if unsure of the content. 5. Privacy It should be noted that systems staff, who have appropriate privileges, have the ability, which is occasionally required to access all files, including electronic mail files, stored on any computer which they manage. It is also occasionally necessary to intercept network traffic. In such circumstances appropriately privileged staff will take all reasonable steps to ensure the privacy of users. Staff with such privileges will only use this access in the course of their authorised work. The Trust fully reserves the right to monitor , telephone and any other electronically-mediated communications, whether stored or in transit, in line with its rights under the Regulation of Investigatory Powers Act (2000). Reasons for such monitoring may include the need to: ensure operational effectiveness of services, prevent a breach of the law, this policy, or other Trust policy, investigate a suspected breach of the law, this policy, or other Trust policy, monitor standards. Access to staff files, including electronic mail files, will not normally be given to another member of staff unless authorised by the Director of IT, or nominee, who will use their discretion, in consultation with a senior member of Trust staff. In such circumstances the Head of Department or Service, will be informed, and will normally be consulted prior to action being taken. Such access will normally only be granted in the following circumstances: where a breach of the law or a serious breach of this or another Trust policy is suspected, when a documented and lawful request from a law enforcement agency such as the police or security services has been received, on request from the relevant Head of Department or Section, where the managers or co-workers of the individual require access to messages or files, which are records of a Trust activity, and the individual is unable, e.g. through absence, to provide them. The Trust recognises staff privacy as desirable but not as an absolute right, staff should not expect to hold or pass on information, which they would not wish to be seen by members of staff responsible for their work. Once a member of staff leaves the Trust, files which are on any computer system owned by the Trust, including servers, and including electronic mail files, will remain the property of the Trust. When leaving the Trust, staff should make arrangements to transfer to colleagues any or other computer-based 5

8 information held under their personal account, as this will be closed on their departure. 6. Definitions of Acceptable & Unacceptable Usage The following sections highlight what the Trust deems to be acceptable and unacceptable uses of its services. Staff should be aware that the Chief Executive has a legal right to monitor usage of and Internet access using the least intrusive method available. The IT Department will carry out audits on behalf of the Trust to monitor compliance with this policy. 7. Internet Access - Principles Access to the Internet or external web resources will be authenticated by user name and password. Users must not access the Internet using another employee s login. It is totally unacceptable to adopt a colleague s identity on any Internet site. Section 22 states the time frame that the Trust considers appropriate for personal use of the Internet. Employees must be informed and understand the extent of that use. The time of day that employees may use the Internet for reasonable personal access should be agreed with their line manager following the stipulation in section 22. Where an employee orders personal good from an Internet site they must not arrange for them to be delivered to any Trust premises Users must not download, upload, access or distribute any material whose subject matter is: unlawful, objectionable causes offence, - examples of which are material which is libelous or pornographic or that includes offensive material relating to gender, race, sexual orientation, religious or political convictions, disability. This includes incitement of hatred or violence or any activity that contravenes the Law or the Trust Policies (listed in Appendix A) Inappropriate sites have been blocked to prevent accidental access. If an employee accidentally accesses material of the type referred to in the previous paragraph or other material which may be considered offensive, they should note 6

9 the time and web site address, (exit from the site) and inform their line manager who will instigate the Trusts reporting procedures Users must not sell or provide substances or conduct unauthorised business via Trust provided Internet access If an employee is in doubt as to whether it is appropriate for them to access a site, they should speak to their line manager before doing so. Only those staff who are specifically authorised to give media statements on behalf of the organisation may write or present views, concerning the Trust and its business, on the Internet. Internet users must be aware that the Internet is inherently insecure and confidential information in relation to the business of the Trust and/or service user/another employee s identifiable information must never be disclosed or placed on Internet sites or chat rooms. Although the IT Department has put anti-virus defenses in place, staff must take great care when using the Internet. The Helpdesk should be informed where any suspicion of virus infection arises; the incident will be dealt with in accordance with information security procedures. Downloading or distribution of copyrighted material without permission of the copyright holder, or of software for which the user does not have a legitimate license is forbidden, this applies to any download for work or personal use. The installation of downloaded software onto Trust computers, including laptops, is not permitted. Information downloaded for personal use must not be stored on the Trust Network or personal computers. The use of peer-to-peer systems to download software is forbidden as is the installation of any such system on Trust computers. Peer to peer systems are computers that are not linked to the same network. 8. Internet Access Monitoring Access to the Internet is authenticated and logged on a user basis. Details such as the date and time of access, and the site visited, are recorded and the information is retained for one month and then archived. Further reports will be available for use when investigating an incident; these reports will only be disclosed upon receipt of a written request from the Service Director in question. The IT Department will only respond to a request for access to individual s internet records, when they have received in writing a request from the Service 7

10 Director of the Trust area in question, requests must be to the IT Service Desk and a response will be provided from the Assistant Director of ICT Principles The amount of time that an employee may use the system for reasonable personal use should be agreed with their line manager following the stipulation in section 22. Copyright in all documents created via is the property of the organisation and not the individual user. s sent by a Trust employee are the organisations property. Unless such e- mails are marked Personal in the Subject Field they may be opened by the Trust. (unless marked Personal in the subject field) is considered corporate correspondence and as such is accessible under the Freedom of Information Act It is therefore important to save s that have been used to formulate corporate decisions, policy, or procedure, as they may be subject to a request. These s should be referenced, saved and retained to appropriate record retention periods following advice from the organisations Information Governance Manager. Employees must not share their password and user name with any other person and should not leave their computers unattended whilst logged on, as they will be held responsible for any activity, which takes place using their account. Unauthorised use of someone else s identity to send or intercept is strictly forbidden and will result in disciplinary action. Employees must not distribute any material by which is: unlawful, objectionable causes offence, examples of which include but is not limited to offensive material relating to gender, race, sexual orientation, religious or political convictions, or disability contains material which is libelous or pornographic includes incitement to commit a crime, hatred and violence or any activity that contravenes any of the Trust s Policies including Equal Opportunities Policy. material that could be abusive, indecent, obscene, menacing; or in breach of confidence, copyright, privacy or any other rights. 8

11 Any member of staff who receives containing material which is in breach of this policy should inform their line manager immediately, who will institute the organisations incident reporting procedures. Distribution of such material may result in legal action and/or disciplinary procedures. The Trust reserves the right to monitor usage. Where a member of staff receives s from unsolicited sources the sender should be added to their personal Blocked Sender List. (Contact the Helpdesk for information. Where there is any doubt about the origin of an or its attachments staff must contact the Help Desk for advice as viruses can be spread through and the opening of suspect attachments may result in loss of or damage to the Trust IT systems. Users should exercise caution when disclosing their work address to commercial organisations, as this information may be passed to other 3 rd party organisations generating junk mail. Employees must not use the organisations system to conduct any personal business enterprise It is inappropriate to forward or create chain letters to other users either within the organisation or externally. If a user receives a chain letter that has inappropriate content they must inform their line manager who will instigate the organisations reporting procedures. To avoid inappropriate content being circulated users should not set their to auto forward (Contact the helpdesk for information) Only those employees who are specifically authorised to give media statements on behalf of the Trust, i.e. the Communications Department, may write or present views, concerning the Trust and its business, via Monitoring The IT Department retains copy of all internal and external which is received or sent. The Department will not use this facility to monitor individual employees traffic without written permission or unless they have a justified need to monitor or investigate an employee s s. The IT Department will investigate inappropriate activity on behalf of the Trust under the following circumstances: 9

12 a report of or concern raised about the contents of a computer a report of inappropriate or unreasonable personal use of or the Internet routine monitoring identifies potential inappropriate use This list is not exhaustive. The IT Department reserves the right to carry out detailed inspection of any IT equipment without notice, where inappropriate activity is suspected. A more detailed investigation may involve further monitoring and examination of stored data including employee deleted data held on servers, disks, drives or other historical/archived material. Access to the content of an employee s mailbox in their absence, other than for the monitoring purposes already referred to, will only be granted on submission of a written request from the Service Director of the Trust area concerned to the IT Service Desk for approval by the Assistant Director of ICT. This request must identify the business need for the access requested and indicate the mail message(s) required. Where such a request is granted, access will be made by the Information Security Officer who will provide the required s to the Service Director. In most cases the Assistant Director of ICT or designated deputy will notify the Service Director about the access, at the earliest possible opportunity. In the event of a user being absent from work for an extended period of time, access to their inbox may be granted to their line manager. The IT Department has a structured level of governance regarding granting access to records. Ultimate responsibility for this lies with the Assistant Director of IT, when absent this responsibility is passed to the IT Development Manager. The IT Department will only initiate a request for access to an individual s mailbox when a request for this access has been made in writing from the Service Director via the IT Service Desk to the Assistant Director of ICT. 11. Sensitive Information & Encryption Sensitive personal information that identifies a service user or member of staff, or commercially sensitive information must not be sent by (.nhs.uk) unless it is encrypted to NHS standards. Users can encrypt any outgoing mail by typing the word ENCRYPT in squared brackets like so [ENCRYPT]. Guidance on this can be found on the Trusts Intranet site under Help section at 10

13 It is also acceptable to exchange person identifiable information between the Informatics Service managed accounts listed in the table below through the N3 connection as long as it is sent from and to an appropriate NHS sited computer in any of Local GP s who are linked to the COIN (ask the Helpdesk) NHSmail (nhs.net) can be used to send identifiable information as it encrypts data between accounts to standards approved by Connecting for Health. It is acceptable to exchange sensitive information via NHSmail (nhs.net) accounts as long as checks are made to ensure that the recipient also has an NHSmail account and it is sent from and to an appropriate NHS sited computer. Guidance on how to apply for an NHSmail account can be obtained from the Helpdesk. Guidance on sending person identifiable information should be sought from the Helpdesk 12. Instant Messaging software The use of unapproved non-corporate deployed Instant Messaging (IM) clients and connectivity is strictly prohibited as it may leave the IT infrastructure open to potentially harmful software or virus attack via file transfer. 13. Social Networking Sites Access to Personal Blogs and social networking sites, examples of which are Facebook, MySpace, Twitter, Linkedln, Digg and Bebo (this list is not exhaustive) is strictly prohibited from Trust owned/managed computer equipment unless approval has been given by the Trust Editorial Board to utilise social networking sites for the purpose of either communications or public information. Access to social networking sites will only be considered for approval once a request has been made in writing from the Service Director via the IT Service Desk to the Assistant Director of ICT. Staff must be aware that social networking sites make personal information publicly accessible, allowing people to upload to a profile with personal details, photos, videos and notes and to then link with their friends profiles. This raises immediate concerns about privacy. 11

14 Although individuals may believe they have restricted access of their profile to their friend list, the High Court ruled that all postings to social network sites are regarded as being in the public domain and as such potentially accessible to all. Personal use of social networking sites may: Bring the organisation into disrepute by the posting of damaging remarks whether about the Trust, service users, colleagues or other 3rd parties. Give rise to risks of legal claims against the organisation, which is generally vicariously liable for the actions of its staff. As a consequence of inappropriate use of social networking sites staff might find themselves: In breach of this Policy (Internet, Intranet and Acceptable Use Policy). Damaging the organisation s reputation in such a way as to constitute a breach of individual s employment contract, leading to disciplinary action and possible dismissal. Breaching confidentiality, data protection, employment contract or professional Code of Practice Staff who access or are members of social networking sites in a private capacity must not post images that have been taken inside of, in the grounds of, or of Trust premises, or place misleading, malicious, or derogatory comments or references that would damage the reputation of, or misrepresent the Trust, or cause distress to its service users or any other employee. 14. Removable Media/User Disks/USB Devices Removable media can be defined as any portable device that can be used to store and move information. Media devices can come in various formats, including: Universal Serial Bus (USB) memory sticks (also known as flash disks or flash drives) Floppy disks Compact disks (CD) Digital Versatile Disks (DVD) USB Hard Disk Drives Secure Digital Cards MP3 / MP4 players i.e. ipods or any other brands 12

15 PDA (Palm Top Computer) Some mobile phones and digital cameras Dictation Devices The Health Informatics Service Desk must be contacted to clarify the use of any other media devices not listed above Anything you can copy, save and/or write information to which can then be taken away and transferred or read on another computer, must NOT be used on Trust equipment. Unless prior authorisation from the Health Informatics Service Desk has been given. The above access and monitoring of such devices will be managed by the application of Trust Safend software 15. Protection from Malicious Software The HIS will use software countermeasures and management procedures to protect itself against the effects of malicious software. All Partner Organisations must co-operate fully with this requirement. Users must not install any software on the HIS managed equipment without permission from the HIS Head of IT. 16. Business Portable Devices Business Portable devices such as Laptops with connection to the organisations network, mobile phones, Blackberry phones, digital cameras, portable devices with internal/external memory, external hard drives PDA s etc for business will not be able to connect to the Trust Network unless explicit approval has been granted from the Head of IT. 17. Personal Portable Devices / Personal Information Personal portable electronic devices (laptops, mobile phones, digital cameras, MP3/MP4 players, USB sticks, portable devices with internal/external memory, external hard drives, ipods, PDAs etc) must not be connected to the Partner Organisations IT equipment or network. Desktop PCs; Laptop computers, USB s, are provided as business tools for the support of business processes, therefore personal Files and Folders (pictures, music files, personal documents etc) must not be stored on computers or servers. Any use made of a personal digital camera or personal portable device capable of taking a photograph to record information contained within any of the Partner 13

16 Organisations systems will be considered gross misconduct by that Organisation and subject to their disciplinary procedures 18. Software Access Controls The Head of IT will authorise appropriately trained members of HIS staff to install or modify software as appropriate 19. Staff Access Controls Partner Organisations must restrict system access to staff that have an identified requirement to the information. Access controls must follow the guidance in the Caldicott principles until such times as the Role Based Access process under Connecting for Health are established in each of the Partner Organisations The management and issue of Smart Cards will be controlled by each Partner Organisation. 20. Physical Access Control Access to computer hardware must be restricted to employees that have an agreed requirement to use them which will be established by the Partner Organisation. 21. Application Access Control Access to data, system utilities and program source libraries will be controlled and restricted to authorised staff. Authorisation to use an application will depend on the availability or purchase of a licence from the supplier. 22. Acceptable Personal Use & Disciplinary Procedures The Trust allows limited personal use of the and Internet system. The Trust considers that employees may browse the Internet or use within the boundaries of this policy for their own personal use prior to or after their normal working hours or during their lunch break. Where there is a necessity to conduct such activities within working hours this should be agreed with your line manager. Staff who break this Acceptable Use Policy will find themselves subject to the Trust's disciplinary procedures. The Trust reserves its right to take legal action against individuals who cause it to be involved in legal proceedings as a result of their violation of licensing agreements and / or other contraventions of this policy. 14

17 23. Reporting of Incidents All suspected information security incidents concerning inappropriate access, damage to or use of network systems must be reported to the HIS Head of IT via the IT Security Engineer. These security incidents will be investigated to establish their cause, operational impact, and business outcome and will be reported back to through the appropriate channels. These may involve any risk to the integrity of computer systems or data risk to the availability of computer systems adverse impact, such as:- legal obligation or penalty financial loss disruption of activities Examples of possible breaches will include:- virus infections introduction of spy ware / Malware hacking copying and using unauthorised or unlicensed software inappropriate use of the Internet or storing personal data The responsible senior member will then take the appropriate action within the Trust's disciplinary framework, in conjunction with other relevant departments within the local health economy. IT Services staff will also take action when infringements are detected in the course of their normal duties. Actions will include, where relevant, immediate removal from online information systems of material that is believed to infringe the law. The Trust reserves the right to audit and / or suspend without notice any account pending any enquiry. Where necessary, this will include the interception of electronically mediated communications. This policy is not exhaustive and new social and technical developments will lead to further uses, which are not fully covered with this policy. In the first instance staff should address questions concerning what is acceptable to their line manager. Where there is any doubt, the matter should be raised with the Trust`s Information Governance Department via the confidential hotline number which is available on the intranet. 15

18 Appendix A: Trust Related Policies Information Security Policy Freedom of Information Policy Information Governance Policy Removable Media Policy Records Management Policy Disciplinary Procedures Policy Equality and Diversity Policy Harassment at Work Policy Safe Haven Policy Appendix B: Relevant Legislation Users will be obliged to comply with legislation as appropriate including: The Data Protection Act 1998 (including the relevant specific codes of practice e.g. Employment Practices) Freedom of Information Act 2000 (FOI) The Computer Misuse Act 1990 Human Rights Act 1998 Regulation of Investigatory Powers Act 2000 Health & Social Care Act 2000 Children Act 2004 Public Interest Disclosure Act 1998; Audit & Internal Control Act 1987; National Health Service Act 1977; Prevention of Terrorism (Temporary Provisions) Act 1989; Regulations under Health & Safety at Work Act Copyright, Designs and Patents Act, 1988 (as amended by the Copyright (Computer Programs) Regulations, 1992; Crime and Disorder Act, 1998; Much of the relevant legislation is available on the following Internet link 16

E-mail & Internet Policy

E-mail & Internet Policy E-mail & Internet Policy Recommending Committee: Approving Committee: Clinical Standards & Focus Council Trust Governance Board Signature: Designation: Chief Executive Date: Version Number: 02 Date: August

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Use of the Internet and E-Mail Policy

Use of the Internet and E-Mail Policy Use of the Internet and E-Mail Policy This procedural documentsupersedes : Use of the Internet and E-Mail Policy CORP/EMP 16 v.4 Name and title of author/reviewer Samantha Francis HR Advisor Date revised

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011 West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Electronic Mail Policy Version: 5 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

Policy Document Control Page. Updated to include new NHS mail encryption feature

Policy Document Control Page. Updated to include new NHS mail encryption feature Policy Document Control Page Title Title: Electronic Mail Policy Version: 6 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

School policies and Security Risks

School policies and Security Risks 1) Introduction a) The school expects its computer and telephone systems to be used in a professional manner at all times. The school provides these facilities at its expense for its own business purposes.

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment

More information

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +

More information

Informatics Policy. Information Governance. Email and Internet Use and Monitoring Policy

Informatics Policy. Information Governance. Email and Internet Use and Monitoring Policy Informatics Policy Information Governance Document Control Document Title Author/Contact Document Reference 3539 Version 6 Pauline Nordoff-Tate, Information Assurance Manager Status Approved Publication

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

Acceptable Use of Information. and Communication Systems Policy

Acceptable Use of Information. and Communication Systems Policy Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review:

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review: POLICY DOCUMENT Burton Hospitals NHS Foundation Trust INFORMATION SECURITY POLICY Approved by: Executive Management Team On: 16 January 2014 Review Date: December 2015 Corporate / Directorate Clinical

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

Email Usage Policy Document Profile Box

Email Usage Policy Document Profile Box Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee

More information

Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014

Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014 Email, Internet & Social Networking Policy Lead executive Name / title of author: Chief Nurse Colin Owen, Information Governance and Data Security Lead Date reviewed: October 2014 Date ratified: 5 th December

More information

Safe Haven Policy. Equality & Diversity Statement:

Safe Haven Policy. Equality & Diversity Statement: Title: Safe Haven Policy Reference No: 010/IT Owner: Deputy Chief Officer Author Information Governance Lead First Issued On: November 2012 Latest Issue Date: March 2015 Operational Date: March 2015 Review

More information

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either: POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

ICT Acceptable Use Policy. August 2015

ICT Acceptable Use Policy. August 2015 ICT Acceptable Use Policy August 2015 Document title ICT Acceptable Use Policy August 2015 Document author and department Responsible person and department Robbie Walker, Information Security Architect,

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

Using Public Computer Services in Somerset Libraries

Using Public Computer Services in Somerset Libraries Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils

CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils Contents 1. Scope 2 2. Use of IT Facilities 2 3. Monitoring of IT Facilities 5 4. Maintenance & Repairs 6 5. Copyright and Licence Agreements

More information

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy

More information

Email, Internet & Telephone. Policy and Procedure

Email, Internet & Telephone. Policy and Procedure A Email, Internet & Telephone Policy and Procedure MAYLIM LTD Civil Engineering & Hard Landscaping Contractors 50 52 Wharf Road, G 04 The Wenlock, Islington, London N1 7EU Tel: +44(0)207 785 6996 Fax:

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

Dulwich College ICT Acceptable Use Policy

Dulwich College ICT Acceptable Use Policy Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These

More information

OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy

OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy SECTION OFFICE OF THE POLICE & CRIME COMMISSIONER IT, Communications, Internet and Social Media Policy 1 Purpose 1 2 Principles 1 3 Telephone Use 2 4 Postal Mail 2 5 Email Use 3 6 Internet Use 3 7 Social

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

Notice: Page 1 of 11. Internet Acceptable Use Policy. v1.3

Notice: Page 1 of 11. Internet Acceptable Use Policy. v1.3 Notice: Plymouth Community Healthcare Community Interest Company adopted all Provider policies from NHS Plymouth when it became a new organisation on 1 October 2011. Please note that policies will be reviewed

More information

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience: E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:

More information

HAZELDENE LOWER SCHOOL

HAZELDENE LOWER SCHOOL HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016

More information

COMPUTER USE POLICY City of Proctor

COMPUTER USE POLICY City of Proctor COMPUTER USE POLICY City of Proctor Purpose This policy serves to protect the security and integrity of the city s electronic communication and information systems by educating employees about appropriate

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

Sample Employee Network and Internet Usage and Monitoring Policy

Sample Employee Network and Internet Usage and Monitoring Policy CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Acceptable Use of Information and Communication Systems Policy

Acceptable Use of Information and Communication Systems Policy Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures

More information

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common

More information

ICT Safe and Acceptable Use Policy for Students

ICT Safe and Acceptable Use Policy for Students ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...

More information

Marion County School District Computer Acceptable Use Policy

Marion County School District Computer Acceptable Use Policy Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through

More information

UTC Cambridge ICT Policy

UTC Cambridge ICT Policy UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013 Use of Social Networking Websites Policy START DATE: March, 2013 NEXT REVIEW: March 2015 COMMITTEE APPROVAL: Joint Management Trade Union Committee CHAIR S SIGNATURE: STAFF SIDE CHAIR S SIGNATURE: DATE:

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

Use of IT, Communications, Internet & Social Media Policy

Use of IT, Communications, Internet & Social Media Policy Office of the Police and Crime Commissioner Use of IT, Communications, Internet & Social Media Policy 1. The Office of the Police and Crime Commissioner (OPCC) is committed to the principles of equality

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

Policy: Remote Working and Mobile Devices Policy

Policy: Remote Working and Mobile Devices Policy Policy: Remote Working and Mobile Devices Policy Exec Director lead Author/ lead Feedback on implementation to Clive Clarke SHSC Information Manager SHSC Information Manager Date of draft 16 February 2014

More information

TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Status: Final. Version Date Author Reason

TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Status: Final. Version Date Author Reason TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Reference Number HR 2012 046 Version: 1 Status: Final Author: Jane Thomas Job Title HR Manager Amendment

More information

USE OF PERSONAL MOBILE DEVICES POLICY

USE OF PERSONAL MOBILE DEVICES POLICY Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

E-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy

E-Safety Policy. Reviewed and Adopted: July 2014. Reviewed by: HT/ LTS. Next Review: July 2015 Annual Policy E-Safety Policy Reviewed and Adopted: July 2014 Reviewed by: HT/ LTS Next Review: July 2015 Annual Policy 1 1. Introduction Internet is an essential element of life in 21st Century; it is also a part of

More information

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data

More information

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour

More information

Internet and Social Media Policy

Internet and Social Media Policy Internet and Social Media Policy Page 1 of 19 Review and Amendment Log / Control Sheet Responsible Officer: Chief Officer Clinical Lead: Author: Date Approved: Committee: Version: Review Date: Medical

More information

DIGITAL TECHNOLOGY POLICY St Example s School

DIGITAL TECHNOLOGY POLICY St Example s School DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

Email Policy For Staff and Students

Email Policy For Staff and Students Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title

More information

Internet, Social Media and Email Policy

Internet, Social Media and Email Policy West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

UNESCO-IHE Code of Conduct regarding Information Technology (IT)

UNESCO-IHE Code of Conduct regarding Information Technology (IT) UNESCO-IHE Code of Conduct regarding Information Technology (IT) Introduction The use of computers within all the domains of UNESCO-IHE (education, research, administration, projects and marketing & communications)

More information

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT

More information

Trust Advantages and Disadvantages of Using Intranet

Trust Advantages and Disadvantages of Using Intranet Policy No: OP17 Version: 6.0 Name of Policy: Internet, Intranet and Email Acceptable Use Policy Effective From: 04/08/2015 Date Ratified 04/03/2015 Ratified Health Informatics Assurance Committee Review

More information

Internet, E-mail and SMS Texting Usage Policy Group Policy

Internet, E-mail and SMS Texting Usage Policy Group Policy Internet, E-mail and SMS Texting Usage Policy Group Policy Scope: This Orbit Housing Group Limited ( Group ) policy provides a set of guidelines for all users within the Group on the proper usage of the

More information