Use of the Internet and Policy

Size: px
Start display at page:

Download "Use of the Internet and E-Mail Policy"

Transcription

1 Use of the Internet and Policy This procedural documentsupersedes : Use of the Internet and Policy CORP/EMP 16 v.4 Name and title of author/reviewer Samantha Francis HR Advisor Date revised January 2012 Date of approval (Committee/Group) Human Resources Policy Sub Group 2 February 2012 (Ratified by Joint Staff Consultative Committee - JSCC - 16 April 2012) Date Issued 25 April 2012 Next review date February 2013 Extended to April 2015 Target Audience Trust-Wide WARNING: Always ensure that you are using the most up to date policy or procedure document. If you are unsure, you can check that it is the most up to date version by looking on the Trust Website: under the headings -> Freedom of Information -> Information Classes -> Policies and Procedures Page 1 of 11

2 Use of the Internet and Policy Amendment Form Please record brief details of the changes made. If the procedural document has been reviewed without change, this information will still need to be recorded although the version number will remain the same. Version Date Reviewed Brief Summary of Changes Author Version 5 January 2012 Wholesale amendments to reflect changes in the usage of and Internet, new threats and risks and tightening of wording around investigations and monitoring of usage. EIA section added Monitoring and Compliance section added Purpose section added Duties and Responsibilities section added Mark Norwood/ Roy Underwood Samantha Francis Version 4 January 2009 Paragraph added information on personal use of the internet on work premises/during working hours. Added paragraph information added on the Trust s stance on accessing social networking sites both during working hours and outside of the workplace. Renumbered the following paragraphs in section 3 accordingly. Removal of Appendix A Samantha Francis Page 2 of 11

3 Use of the Internet and Policy CONTENTS Paragraph Page No. 1 Introduction 4 2 Equality Impact Assessment 4 3 Purpose 4 4 Duties and Responsibilities 5 5 Use of the Internet 5 6 Use of 7 7 Monitoring of Internet Access and 9 8 Monitoring and Compliance 10 9 Freedom of Information The Act 10 Page 3 of 11

4 Use of the Internet and Policy 1. INTRODUCTION Internet and is an important part of the Trust s and the wider NHS communications system. Use of the installed systems/connections is for legitimate work related purposes only and is encouraged to improve the quality of work and productivity in patient care, research, operational matters, education and development. However, we must ensure that the increasing use of information technology maintains patient confidentiality, is not misused, and at the same time is secure and accurate. This policy provides guidance on the Trust s expectations for the use of the internet and EQUALITY IMPACT ASSESSMENT An Equality Impact Assessment (EIA) has been conducted on this procedural document in line with the principles of the Equality Impact Assessment Policy and the Fair Treatment for All policy. The purpose of the EIA is to minimise and if possible remove any disproportionate impact on employees on the grounds of race, sex, disability, age, sexual orientation or religious belief. No detriment was identified. A copy of the EIA is available on request from the HR department. 3. PURPOSE 3.1 The Trust s NHS Internet/ usage policy is designed to help you understand the Trust's expectations for the use of the Internet and/or E- mail. All existing policies and procedures apply to your conduct on the Internet and whilst using the system, especially (but not exclusively) those that deal with intellectual property protection, privacy, misuse of Trust resources, harassment, information and data security, and confidentiality. 3.2 Failure to comply with the requirements of this policy, including noncompliance with the Computer Misuse Act 1990 and Data Protection Act 1998, or infringement of copyright, will be regarded as a serious breach of discipline which will result in disciplinary action being taken. Although each case will be judged on its own merits, misuse of the Internet/ (or any misuse of computer systems) may be considered Gross Misconduct and lead to dismissal. Examples of gross misconduct include: Accessing, downloading and/or distributing pornographic or other offensive material. This may include racial, sexual material or derogatory information about others. Page 4 of 11

5 Accessing, downloading and/or distributing information of a discriminatory nature including sexual or racist material or information which is discriminatory towards other groups such as the disabled. Deliberately or negligently downloading malware (such as viruses, spyware) which expose undermine the Trusts IT security measures and expose Trust computer systems to risk of damage. Deliberately breaching the Computer Misuse Act 1990 or the Data Protection Act 1998, for example, passing patient related data to inappropriate parties. Downloading, storing and or using copyrighted materials or software such as music and video files, images or computer software Administering, supporting or moderating a 3 rd party internet sight such as discussion groups, fansites or websites for a business. 4. DUTIES AND RESPONSIBILITIES 4.1 All employees are responsible for their own internet usage and also have responsibility for the s they send. Employees are asked to be vigilant and report any suspected breaches of this policy immediately to their line manager or to HR as appropriate. Although the Trust believes that its approach to implementing the policy is flexible, firm measures are in place to guard against computer misuse. Should a serious breach of this policy be made by a user, then disciplinary action may be taken. 5. USE OF THE INTERNET 5.1 The Internet is a powerful information acquisition and dissemination tool that provides access to unique resources. The Trust reserves the right to restrict access to materials on the Internet where deemed appropriate, this will include access to pornographic and other sites considered offensive. Any restrictions to material by the Trust shall not be deemed to impose any duty on the Trust to regulate the content of material on the Internet. Furthermore, any lack of restriction does not mean that access to that material is authorised. 5.2 Use of the Internet is made available to employees for work duties, workrelated educational purposes and work-related research purposes. Personal use of the internet is limited to lunch breaks and work breaks only employees may not use the internet for personal use during otherwise working hours. While personal use is permitted during lunch and work breaks, this is only providing that the material accessed is appropriate and not potentially offensive to others. Employees should regard this facility for personal use as a privilege that is only exercised in their own time, without Page 5 of 11

6 detriment to their job, or the work of others, and not abused. Excessive or inappropriate use of the Internet, including violation of this policy, may result in disciplinary action being taken and/or removal of facilities. It may also lead to termination of employment, or notification to the proper authorities for criminal/civil proceedings depending on the level of violation. 5.3 Accessing of pornographic and abusive or offensive material, including sites that may constitute unlawful discrimination on the grounds of race, disability or gender, is not permitted. Such actions will be regarded as gross misconduct and will result in summary dismissal. 5.4 The Trust reserves the right to block access to any sites it feels are contrary to Trust policy or where the amount of data traffic generated adversely affects the Trust s business use of links to the Internet. This may include access to social networking sites and heavy bandwidth sites such as video hosting sites. Employees within the Trust are prohibited from accessing social networking sites using Trust equipment. The only exception to this is where access to such sites is required for business purposes. In these circumstances, appropriate prior approval to access such sites must be sought. The Nursing and Midwifery Council also issued clear guidance in July 2011 on their expectations regarding the usage of social networking sites. For further information visit: The Trust recognises that employees may wish to access the above type of internet sites outside of the workplace. It is expected however, that any employee who wishes to publish content on such sites must, at all times, conduct themselves appropriately, in a manner consistent with their contract of employment and with the policies and procedures of Doncaster and Bassetlaw Hospitals NHS Foundation Trust, and in a way that does not bring the Organisation into disrepute. Failure to adhere to this may result in disciplinary action being taken. 5.5 Information obtained through the Internet may not be accurate, and the user must check the accuracy, adequacy or completeness of any such information. Furthermore, it is the responsibility of the user when using information obtained from the Internet to be aware of copyrighted material in accordance with the permission granted by the publisher. 5.6 The threat from viruses and security breaches from the use of the Internet are very real. Users must be aware that information and programs downloaded from the Internet may contain hidden code capable of destroying data or interfering with the network. Therefore, users must take great care and be vigilant if they are required, as part of their employment, to download or install any executable or program files from the Internet. Any executable program files not connected with an employee s duties must not be downloaded. All PC s accessing the Internet must have virus-checking Page 6 of 11

7 software, which is installed by the Trust. The use of a 'firewall' will protect the Trust from 'attacks' from outside the organisation. 5.7 All users of the Trust Internet connection who supply their personal details, including credit card details, etc. whilst accessing web sites do so at their own risk. The Trust employs security measures to counteract some types of.malware or attempts to extract personal information but cannot guarantee protection against all threats and therefore the onus is on user vigilance. 5.8 All users of the Trust Internet connection are forbidden from downloading copyrighted material such as music or software as this is against the law. 6. USE OF is the electronic transfer of messages from one computer to another, whether this is within the Trust, NHS or with anyone throughout the world. The Trust system should be utilised as a formal communication system. 6.2 The NHS has created a secure infrastructure for the provision of Services (NHS.Net) for use throughout the NHS, which is deemed suitable for the transmission and receipt of patient and other confidential data. The use of personal accounts for the transmission or receiving of patient or other person identifiable data is strictly forbidden and any individuals found doing so will be subject to disciplinary action. 6.3 All NHS Net accounts end with the suffix nhs.net.. Sending and receiving information is allowed from and to other.nhs,net addresses only. e.g. joanne.bloggs@nhs.net. The Trust s sysem ends with dbh.nhs.uk and is not suitable for sending patient and other sensitive data to other organisations including other NHS addresses. Patient confidential data should never be sent to, from or between non-nhs addresses, except in very exceptional circumstances, and where a proper risk assessment and additional security measures have been put in place to protect the data, and the necessary authorisation has been given by the Caldicott Guardian or nominated Deputy. 6.4 The Trust system falls within the Data Protection Act 1998, and the Freedom of Information Act 2000 where the s stored identify living individuals, and as such may be subject to an access to personal data request. 6.5 All employees with access to will have responsibility for sending their own s. It is, therefore, imperative that the following guidance is read and understood. All employees are prohibited in making (or forwarding) any derogatory remarks about any person or company by . Page 7 of 11

8 All employees must report any potentially defamatory material to their line manager as soon as it is identified so that steps can be taken to remove it permanently. All employees are advised that even deleted items may not be eliminated permanently from the system and may be recovered if required. 6.6 Remarks sent by can unwittingly cause offence and constitute unlawful discrimination in the form of harassment, they can also found claims under the sex, race or disability discrimination legislation. 6.7 All employees: Are advised not to send s in anger or without thought. Are advised against the use of in confrontational situations or as a substitute for face to face management. Are prohibited in sending or forwarding any discriminatory messages, even if intended as a joke. Must ensure that /Internet usage must comply with the Trust s Fair Treatment for All policy. 6.8 Employees must be aware of the increased risk of confidential information being misdirected and thus the need to consider the use of a different medium in certain cases 6.9 Employees must accept the risk that inbound s may contain explicit or offensive material that is beyond the control of the employer and the distribution of chain letters, inappropriate humour, explicit language or offensive images is not allowed on Trust resources. Employees must not use either internally or externally to harass anyone in any manner as laid out in the Trust's Personal Harassment Policy. Employees should avoid flam , where content is abusive towards other individuals, even in response to abuse being directed at them All is automatically scanned for viruses and other malware when it comes into the Trust. However no measures can be 100% effective this there is still a small risk of such software arriving in a user s mailbox. If you are suspicious of the subject, source or authenticity of any received messages, you should not open the and contact IT Services at the earliest opportunity Employees have a responsibility to draft all s carefully, taking into account discrimination, harassment, company representation and defamation issues. Page 8 of 11

9 6.12 is an insecure system, and content can be easily copied, forwarded and archived. There is no guarantee that communications either internally or externally are private or that they will arrive at their destination at a particular time or at all. Internet should not be utilised under any circumstances for the transmission of personal or confidential information Deletion of old s is to be managed by each employee keeping in mind data storage levels, archival records, contractual evidence and legal discovery issues. 7. MONITORING OF INTERNET ACCESS AND All employees should be aware that to allow the business of the Trust to continue unhindered, or as part of an investigation, the Trust may require access to an individual s mailbox for example where an individual is away for a period and access is required to correspondence urgently. In such cases the Trust will, where possible, request access from the individual. Where this is not possible access will be granted by IT on receipt of a written request from a clinical director or general manager from the directorate/ CSU concerned. When access is given by IT to another an will be sent to the mailbox of the owner informing them that access has been granted and to whom. Access will be withdrawn as soon as the information required has been retrieved. The Trust automatically tracks all Internet usage and in addition has a system (Weblocker) which blocks access to websites it deems inappropriate, or where the use of sites will impact on the business needs of the Trust. This system protects members of staff from accidentally accessing unsuitable websites, and will keep a detailed log of every page visited. The web blocker will block access to millions of sites, it cannot block every site deemed inappropriate. The responsibility for accessing inappropriate sites lies ultimately with the user. In addition the system may block sites that are required for legitimate business use. If this happens, users will need to contact the Head of IT (or Head of Information Governance in his absence) requesting the unblocking the site in writing, citing the business need. If the Trust becomes aware that an employee (or group of employees) may be misusing their Internet access or facility in contravention of this policy, steps will be taken immediately to suspend access, and to then consider what the appropriate level of intervention is going to be, with consideration being given to the options below as follows: 1. Local action by IT Services in conjunction with Information Governance and HR staff, who will have the authority to seize any appropriate computer hardware and/or to review individual employee s Internet access and s if it is considered to be appropriate. Employees will generally be informed of the intended actions after their network Access has been suspended excepting on advice from Counter Fraud Services or The Police. 2. The Trust Counter Fraud Officer Page 9 of 11

10 3. The Police For Option 1, IT Services staff will report to the employee s Line Manager and the Director of Human Resources only on material found on the computer, which contravenes this and any other relevant Trust policy. If the Line Manager, in conjunction with Human Resources, considers that this policy has been breached, they will deal with the matter under the Trust s Disciplinary Procedure. Employees should note paragraph 2.3 of the policy for examples of gross misconduct, under the Trust s Disciplinary Procedure. Any information discovered during the Trust's monitoring of use and internet access will only be used to investigate a breach of this policy and to pursue any subsequent necessary action, and should not be used for any other purpose. The standard process which IT staff will follow when investigating these issues is documented within SoP 13 Taking Evidence (in event of inappropriate use of IT). 8 MONITORING AND COMPLIANCE OF THE POLICY This policy will be reviewed and amended in accordance with any employment law, good practice guides and case law on an as and when required basis. All s are automatically scanned for viruses and trojan code. All traffic (incoming and outgoing) is logged automatically, and Users deletion at the desktop level does not remove s from the system. These logs may be audited periodically and in some cases where agreed with HR and/or Senior Management, the message content itself might also be accessed for any proper business purpose including 'business as usual or questions over 'inappropriate use' etc. The content of s is not routinely monitored however the Trust reserves the right to monitor usage in accordance with, and subject to any changes of, legislation and/or Codes of Practice. This included the Regulation of Investigating Powers Act 2000 and the Data Protection Act 1984 and Internet access records are monitored electronically, and where site requests contradict electronic policy settings, then the User is notified and asked - on occasion - if they wish to proceed; IT Services are notified of every policy exception. If there is evidence that staff are not adhering to the guidelines set out in this policy, the Trust reserves the right to question the individual member of staff, and to potentially take disciplinary action when deemed necessary, which may lead to summary dismissal and/or legal action. 9. FREEDOM OF INFORMATION - THE ACT The Freedom of Information (FOI) Act was passed on 30 November It gives a general right of access to all types of recorded information held by public authorities, with full access granted in January The Act sets out exemptions to that right and places certain obligations on public authorities. FOI will replace the Open Government Code of Practice, which has been in operation since Page 10 of 11

11 Since the 1 st of January 2005, anyone, anywhere in the world, can ask the Trust (and it might be your department) for copy of any information which it publishes (some information may be exempt), and they don't have to give any reason. The Trust's Freedom of Information Publication Scheme defines the kind of information we hold. A full copy of the Publication Scheme is available from the Communications Manager. The Trust also reserves the right to monitor usage in accordance with, and subject to any changes of, legislation and/or Codes of Practice. This included the Regulation of Investigating Powers Act 2000 and the Data Protection Act 1984 and Page 11 of 11

23 GB Internet Use and E-mail Policy

23 GB Internet Use and E-mail Policy 23 GB Internet Use and E-mail Policy Policy number Version 2.1 Approved by Name of author/originator 23 GB Governing Body Robert Champion/Toni Downer Owner (director) Elaine Newton, Director of Governance

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

Internet, Social Networking and Telephone Policy

Internet, Social Networking and Telephone Policy Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

Electronic Communications Monitoring Policy

Electronic Communications Monitoring Policy Electronic Communications Monitoring Policy Printed copies should not be considered the definitive version DOCUMENT CONTROL POLICY NO. 79 Policy Group Information Governance and Security Author Andrew

More information

Forbes Shire Council Internet Access Policy

Forbes Shire Council Internet Access Policy Forbes Shire Council Forbes Shire Council Internet Access Policy Policy No IT/001 Date approved 17 August 2006 Authority Information Technology Services Contact Officer Brian Clarke Revision History Version

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

Virginia Commonwealth University Police Department

Virginia Commonwealth University Police Department Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media

More information

Email Usage Policy Document Profile Box

Email Usage Policy Document Profile Box Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

POLICY. Responsible Use of Social Media

POLICY. Responsible Use of Social Media POLICY Responsible Use of Social Media Contact Officer Director of Personnel Director of Communications & Participation Senior Project Manager: Corporate Policies (Policy author) Purpose The primary aims

More information

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either: POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,

More information

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable

More information

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet

More information

INTERNET, EMAIL AND PHONE SYSTEMS

INTERNET, EMAIL AND PHONE SYSTEMS Upper Great Southern Family Support Association Inc Policy On INTERNET, EMAIL AND PHONE SYSTEMS Date Adopted: November 2010 Date Revised: March 2013 Review Date: March 2014 Upper Great Southern Family

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Trust Advantages and Disadvantages of Using Intranet

Trust Advantages and Disadvantages of Using Intranet Policy No: OP17 Version: 6.0 Name of Policy: Internet, Intranet and Email Acceptable Use Policy Effective From: 04/08/2015 Date Ratified 04/03/2015 Ratified Health Informatics Assurance Committee Review

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

Bulk Data Transfer Guidelines

Bulk Data Transfer Guidelines Bulk Data Transfer Guidelines This procedural document supersedes: CORP/ICT 20 v.1 Bulk Data Transfer. Did you print this document yourself? The Trust discourages the retention of hard copies of policies

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Internet, Social Media and Email Policy

Internet, Social Media and Email Policy West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body) ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014

Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014 Email, Internet & Social Networking Policy Lead executive Name / title of author: Chief Nurse Colin Owen, Information Governance and Data Security Lead Date reviewed: October 2014 Date ratified: 5 th December

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

John of Rolleston Primary School

John of Rolleston Primary School John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership

More information

Sample Employee Network and Internet Usage and Monitoring Policy

Sample Employee Network and Internet Usage and Monitoring Policy CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

Organizational Policy

Organizational Policy Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT

More information

Internet, E-mail and SMS Texting Usage Policy Group Policy

Internet, E-mail and SMS Texting Usage Policy Group Policy Internet, E-mail and SMS Texting Usage Policy Group Policy Scope: This Orbit Housing Group Limited ( Group ) policy provides a set of guidelines for all users within the Group on the proper usage of the

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience: E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:

More information

Social Networking Protocol for Schools Managed Staff

Social Networking Protocol for Schools Managed Staff Social Networking Protocol for Schools Managed Staff Created by HR Consultancy June 2010 1 Social Networking Protocol 2010 Contents 1. Purpose 2. Scope 3. School s Expectations 4. Safeguarding 5. Monitoring

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including

More information

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Executive Director (AK) [J50]

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - EMAIL POLICY Executive Director (AK) [J50] AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Committee: Policy and Resources Date: 23 rd June 2009 Author: Executive Director (AK) [J50] 1.0 ISSUE 1.1

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

COLLINS CONSULTING, Inc.

COLLINS CONSULTING, Inc. COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,

More information

Liverpool Hope University. Equality and Diversity Policy. Date approved: 14.04.2011 Revised (statutory. 18.02.2012 changes)

Liverpool Hope University. Equality and Diversity Policy. Date approved: 14.04.2011 Revised (statutory. 18.02.2012 changes) Liverpool Hope University Equality and Diversity Policy Approved by: University Council Date approved: 14.04.2011 Revised (statutory 18.02.2012 changes) Consistent with its Mission, Liverpool Hope strives

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

E-mail & Internet Policy

E-mail & Internet Policy E-mail & Internet Policy Recommending Committee: Approving Committee: Clinical Standards & Focus Council Trust Governance Board Signature: Designation: Chief Executive Date: Version Number: 02 Date: August

More information

Internet and Social Media Policy

Internet and Social Media Policy Internet and Social Media Policy Page 1 of 19 Review and Amendment Log / Control Sheet Responsible Officer: Chief Officer Clinical Lead: Author: Date Approved: Committee: Version: Review Date: Medical

More information

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

[Example] Social Media Acceptable Use Policy

[Example] Social Media Acceptable Use Policy [Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Social Media Policy. Policies and Procedures. Social Media Policy

Social Media Policy. Policies and Procedures. Social Media Policy Policies and Procedures Social Media Policy 1 1. Introduction...3 2. Privacy settings and personal information.....3 3. Use of Social Media at Work.....4 4. Account Administrators and Login Details......4

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Recommending Committee: Approving Committee: Information Governance Steering Group Patient Safety & Experience Council Signature: Designation: Chief Executive Date: Version Number:

More information

Policy for the Acceptable Use of Information Technology Resources

Policy for the Acceptable Use of Information Technology Resources Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...

More information

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy 1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

BRIGHAM AND WOMEN S HOSPITAL

BRIGHAM AND WOMEN S HOSPITAL BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy

More information

CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils

CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils Contents 1. Scope 2 2. Use of IT Facilities 2 3. Monitoring of IT Facilities 5 4. Maintenance & Repairs 6 5. Copyright and Licence Agreements

More information

Assistant Director of Facilities

Assistant Director of Facilities Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment

More information

IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&TPP No. 2 Email Policy Version 3.04

More information

Human Resources People and Organisational Development. Disciplinary Procedure for Senior Staff

Human Resources People and Organisational Development. Disciplinary Procedure for Senior Staff Human Resources People and Organisational Development Disciplinary Procedure for Senior Staff AUGUST 2015 1. Introduction 1.1 This procedure applies to Senior Staff. Senior Staff includes: 1.1.1 the Vice-Chancellor

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

With the increasing popularity of social media you need a Social Media Policy to protect your company.

With the increasing popularity of social media you need a Social Media Policy to protect your company. Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not

More information

Acceptable use policy DEECD Information, Communications and Technology (ICT) Resources. Effective March 2011

Acceptable use policy DEECD Information, Communications and Technology (ICT) Resources. Effective March 2011 Acceptable use policy DEECD Information, Communications and Technology (ICT) Resources Effective March 2011 Published by the Communications Division for Human Resources Division Department of Education

More information

Policy: Remote Working and Mobile Devices Policy

Policy: Remote Working and Mobile Devices Policy Policy: Remote Working and Mobile Devices Policy Exec Director lead Author/ lead Feedback on implementation to Clive Clarke SHSC Information Manager SHSC Information Manager Date of draft 16 February 2014

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

E-Mail and Internet Policy

E-Mail and Internet Policy E-Mail and Internet Policy Document reference Title: E-Mail and Internet Policy Product ID: Version Number: 8.0 Status: Live Distribution / Issue date: 12 November 2014 Author: K. Fairbrother Review Period:

More information

Social Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy

Social Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy Social Media Responsible officer: Director Community and Corporate Services Key Result Area: Governance and Decision Making Document type: Policy Reference: 10/01/0004 Approved by: Council Date approved:

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Electronic Mail Policy Version: 5 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

Electronic Communications and. Guidance note and template policy

Electronic Communications and. Guidance note and template policy Electronic Communications and Internet policy Guidance note and template policy When employing staff it is useful to create a policy which sets out your standards and requirements of your staff when they

More information