Use of the Internet and Policy
|
|
- Coral Watkins
- 8 years ago
- Views:
Transcription
1 Use of the Internet and Policy This procedural documentsupersedes : Use of the Internet and Policy CORP/EMP 16 v.4 Name and title of author/reviewer Samantha Francis HR Advisor Date revised January 2012 Date of approval (Committee/Group) Human Resources Policy Sub Group 2 February 2012 (Ratified by Joint Staff Consultative Committee - JSCC - 16 April 2012) Date Issued 25 April 2012 Next review date February 2013 Extended to April 2015 Target Audience Trust-Wide WARNING: Always ensure that you are using the most up to date policy or procedure document. If you are unsure, you can check that it is the most up to date version by looking on the Trust Website: under the headings -> Freedom of Information -> Information Classes -> Policies and Procedures Page 1 of 11
2 Use of the Internet and Policy Amendment Form Please record brief details of the changes made. If the procedural document has been reviewed without change, this information will still need to be recorded although the version number will remain the same. Version Date Reviewed Brief Summary of Changes Author Version 5 January 2012 Wholesale amendments to reflect changes in the usage of and Internet, new threats and risks and tightening of wording around investigations and monitoring of usage. EIA section added Monitoring and Compliance section added Purpose section added Duties and Responsibilities section added Mark Norwood/ Roy Underwood Samantha Francis Version 4 January 2009 Paragraph added information on personal use of the internet on work premises/during working hours. Added paragraph information added on the Trust s stance on accessing social networking sites both during working hours and outside of the workplace. Renumbered the following paragraphs in section 3 accordingly. Removal of Appendix A Samantha Francis Page 2 of 11
3 Use of the Internet and Policy CONTENTS Paragraph Page No. 1 Introduction 4 2 Equality Impact Assessment 4 3 Purpose 4 4 Duties and Responsibilities 5 5 Use of the Internet 5 6 Use of 7 7 Monitoring of Internet Access and 9 8 Monitoring and Compliance 10 9 Freedom of Information The Act 10 Page 3 of 11
4 Use of the Internet and Policy 1. INTRODUCTION Internet and is an important part of the Trust s and the wider NHS communications system. Use of the installed systems/connections is for legitimate work related purposes only and is encouraged to improve the quality of work and productivity in patient care, research, operational matters, education and development. However, we must ensure that the increasing use of information technology maintains patient confidentiality, is not misused, and at the same time is secure and accurate. This policy provides guidance on the Trust s expectations for the use of the internet and EQUALITY IMPACT ASSESSMENT An Equality Impact Assessment (EIA) has been conducted on this procedural document in line with the principles of the Equality Impact Assessment Policy and the Fair Treatment for All policy. The purpose of the EIA is to minimise and if possible remove any disproportionate impact on employees on the grounds of race, sex, disability, age, sexual orientation or religious belief. No detriment was identified. A copy of the EIA is available on request from the HR department. 3. PURPOSE 3.1 The Trust s NHS Internet/ usage policy is designed to help you understand the Trust's expectations for the use of the Internet and/or E- mail. All existing policies and procedures apply to your conduct on the Internet and whilst using the system, especially (but not exclusively) those that deal with intellectual property protection, privacy, misuse of Trust resources, harassment, information and data security, and confidentiality. 3.2 Failure to comply with the requirements of this policy, including noncompliance with the Computer Misuse Act 1990 and Data Protection Act 1998, or infringement of copyright, will be regarded as a serious breach of discipline which will result in disciplinary action being taken. Although each case will be judged on its own merits, misuse of the Internet/ (or any misuse of computer systems) may be considered Gross Misconduct and lead to dismissal. Examples of gross misconduct include: Accessing, downloading and/or distributing pornographic or other offensive material. This may include racial, sexual material or derogatory information about others. Page 4 of 11
5 Accessing, downloading and/or distributing information of a discriminatory nature including sexual or racist material or information which is discriminatory towards other groups such as the disabled. Deliberately or negligently downloading malware (such as viruses, spyware) which expose undermine the Trusts IT security measures and expose Trust computer systems to risk of damage. Deliberately breaching the Computer Misuse Act 1990 or the Data Protection Act 1998, for example, passing patient related data to inappropriate parties. Downloading, storing and or using copyrighted materials or software such as music and video files, images or computer software Administering, supporting or moderating a 3 rd party internet sight such as discussion groups, fansites or websites for a business. 4. DUTIES AND RESPONSIBILITIES 4.1 All employees are responsible for their own internet usage and also have responsibility for the s they send. Employees are asked to be vigilant and report any suspected breaches of this policy immediately to their line manager or to HR as appropriate. Although the Trust believes that its approach to implementing the policy is flexible, firm measures are in place to guard against computer misuse. Should a serious breach of this policy be made by a user, then disciplinary action may be taken. 5. USE OF THE INTERNET 5.1 The Internet is a powerful information acquisition and dissemination tool that provides access to unique resources. The Trust reserves the right to restrict access to materials on the Internet where deemed appropriate, this will include access to pornographic and other sites considered offensive. Any restrictions to material by the Trust shall not be deemed to impose any duty on the Trust to regulate the content of material on the Internet. Furthermore, any lack of restriction does not mean that access to that material is authorised. 5.2 Use of the Internet is made available to employees for work duties, workrelated educational purposes and work-related research purposes. Personal use of the internet is limited to lunch breaks and work breaks only employees may not use the internet for personal use during otherwise working hours. While personal use is permitted during lunch and work breaks, this is only providing that the material accessed is appropriate and not potentially offensive to others. Employees should regard this facility for personal use as a privilege that is only exercised in their own time, without Page 5 of 11
6 detriment to their job, or the work of others, and not abused. Excessive or inappropriate use of the Internet, including violation of this policy, may result in disciplinary action being taken and/or removal of facilities. It may also lead to termination of employment, or notification to the proper authorities for criminal/civil proceedings depending on the level of violation. 5.3 Accessing of pornographic and abusive or offensive material, including sites that may constitute unlawful discrimination on the grounds of race, disability or gender, is not permitted. Such actions will be regarded as gross misconduct and will result in summary dismissal. 5.4 The Trust reserves the right to block access to any sites it feels are contrary to Trust policy or where the amount of data traffic generated adversely affects the Trust s business use of links to the Internet. This may include access to social networking sites and heavy bandwidth sites such as video hosting sites. Employees within the Trust are prohibited from accessing social networking sites using Trust equipment. The only exception to this is where access to such sites is required for business purposes. In these circumstances, appropriate prior approval to access such sites must be sought. The Nursing and Midwifery Council also issued clear guidance in July 2011 on their expectations regarding the usage of social networking sites. For further information visit: The Trust recognises that employees may wish to access the above type of internet sites outside of the workplace. It is expected however, that any employee who wishes to publish content on such sites must, at all times, conduct themselves appropriately, in a manner consistent with their contract of employment and with the policies and procedures of Doncaster and Bassetlaw Hospitals NHS Foundation Trust, and in a way that does not bring the Organisation into disrepute. Failure to adhere to this may result in disciplinary action being taken. 5.5 Information obtained through the Internet may not be accurate, and the user must check the accuracy, adequacy or completeness of any such information. Furthermore, it is the responsibility of the user when using information obtained from the Internet to be aware of copyrighted material in accordance with the permission granted by the publisher. 5.6 The threat from viruses and security breaches from the use of the Internet are very real. Users must be aware that information and programs downloaded from the Internet may contain hidden code capable of destroying data or interfering with the network. Therefore, users must take great care and be vigilant if they are required, as part of their employment, to download or install any executable or program files from the Internet. Any executable program files not connected with an employee s duties must not be downloaded. All PC s accessing the Internet must have virus-checking Page 6 of 11
7 software, which is installed by the Trust. The use of a 'firewall' will protect the Trust from 'attacks' from outside the organisation. 5.7 All users of the Trust Internet connection who supply their personal details, including credit card details, etc. whilst accessing web sites do so at their own risk. The Trust employs security measures to counteract some types of.malware or attempts to extract personal information but cannot guarantee protection against all threats and therefore the onus is on user vigilance. 5.8 All users of the Trust Internet connection are forbidden from downloading copyrighted material such as music or software as this is against the law. 6. USE OF is the electronic transfer of messages from one computer to another, whether this is within the Trust, NHS or with anyone throughout the world. The Trust system should be utilised as a formal communication system. 6.2 The NHS has created a secure infrastructure for the provision of Services (NHS.Net) for use throughout the NHS, which is deemed suitable for the transmission and receipt of patient and other confidential data. The use of personal accounts for the transmission or receiving of patient or other person identifiable data is strictly forbidden and any individuals found doing so will be subject to disciplinary action. 6.3 All NHS Net accounts end with the suffix nhs.net.. Sending and receiving information is allowed from and to other.nhs,net addresses only. e.g. joanne.bloggs@nhs.net. The Trust s sysem ends with dbh.nhs.uk and is not suitable for sending patient and other sensitive data to other organisations including other NHS addresses. Patient confidential data should never be sent to, from or between non-nhs addresses, except in very exceptional circumstances, and where a proper risk assessment and additional security measures have been put in place to protect the data, and the necessary authorisation has been given by the Caldicott Guardian or nominated Deputy. 6.4 The Trust system falls within the Data Protection Act 1998, and the Freedom of Information Act 2000 where the s stored identify living individuals, and as such may be subject to an access to personal data request. 6.5 All employees with access to will have responsibility for sending their own s. It is, therefore, imperative that the following guidance is read and understood. All employees are prohibited in making (or forwarding) any derogatory remarks about any person or company by . Page 7 of 11
8 All employees must report any potentially defamatory material to their line manager as soon as it is identified so that steps can be taken to remove it permanently. All employees are advised that even deleted items may not be eliminated permanently from the system and may be recovered if required. 6.6 Remarks sent by can unwittingly cause offence and constitute unlawful discrimination in the form of harassment, they can also found claims under the sex, race or disability discrimination legislation. 6.7 All employees: Are advised not to send s in anger or without thought. Are advised against the use of in confrontational situations or as a substitute for face to face management. Are prohibited in sending or forwarding any discriminatory messages, even if intended as a joke. Must ensure that /Internet usage must comply with the Trust s Fair Treatment for All policy. 6.8 Employees must be aware of the increased risk of confidential information being misdirected and thus the need to consider the use of a different medium in certain cases 6.9 Employees must accept the risk that inbound s may contain explicit or offensive material that is beyond the control of the employer and the distribution of chain letters, inappropriate humour, explicit language or offensive images is not allowed on Trust resources. Employees must not use either internally or externally to harass anyone in any manner as laid out in the Trust's Personal Harassment Policy. Employees should avoid flam , where content is abusive towards other individuals, even in response to abuse being directed at them All is automatically scanned for viruses and other malware when it comes into the Trust. However no measures can be 100% effective this there is still a small risk of such software arriving in a user s mailbox. If you are suspicious of the subject, source or authenticity of any received messages, you should not open the and contact IT Services at the earliest opportunity Employees have a responsibility to draft all s carefully, taking into account discrimination, harassment, company representation and defamation issues. Page 8 of 11
9 6.12 is an insecure system, and content can be easily copied, forwarded and archived. There is no guarantee that communications either internally or externally are private or that they will arrive at their destination at a particular time or at all. Internet should not be utilised under any circumstances for the transmission of personal or confidential information Deletion of old s is to be managed by each employee keeping in mind data storage levels, archival records, contractual evidence and legal discovery issues. 7. MONITORING OF INTERNET ACCESS AND All employees should be aware that to allow the business of the Trust to continue unhindered, or as part of an investigation, the Trust may require access to an individual s mailbox for example where an individual is away for a period and access is required to correspondence urgently. In such cases the Trust will, where possible, request access from the individual. Where this is not possible access will be granted by IT on receipt of a written request from a clinical director or general manager from the directorate/ CSU concerned. When access is given by IT to another an will be sent to the mailbox of the owner informing them that access has been granted and to whom. Access will be withdrawn as soon as the information required has been retrieved. The Trust automatically tracks all Internet usage and in addition has a system (Weblocker) which blocks access to websites it deems inappropriate, or where the use of sites will impact on the business needs of the Trust. This system protects members of staff from accidentally accessing unsuitable websites, and will keep a detailed log of every page visited. The web blocker will block access to millions of sites, it cannot block every site deemed inappropriate. The responsibility for accessing inappropriate sites lies ultimately with the user. In addition the system may block sites that are required for legitimate business use. If this happens, users will need to contact the Head of IT (or Head of Information Governance in his absence) requesting the unblocking the site in writing, citing the business need. If the Trust becomes aware that an employee (or group of employees) may be misusing their Internet access or facility in contravention of this policy, steps will be taken immediately to suspend access, and to then consider what the appropriate level of intervention is going to be, with consideration being given to the options below as follows: 1. Local action by IT Services in conjunction with Information Governance and HR staff, who will have the authority to seize any appropriate computer hardware and/or to review individual employee s Internet access and s if it is considered to be appropriate. Employees will generally be informed of the intended actions after their network Access has been suspended excepting on advice from Counter Fraud Services or The Police. 2. The Trust Counter Fraud Officer Page 9 of 11
10 3. The Police For Option 1, IT Services staff will report to the employee s Line Manager and the Director of Human Resources only on material found on the computer, which contravenes this and any other relevant Trust policy. If the Line Manager, in conjunction with Human Resources, considers that this policy has been breached, they will deal with the matter under the Trust s Disciplinary Procedure. Employees should note paragraph 2.3 of the policy for examples of gross misconduct, under the Trust s Disciplinary Procedure. Any information discovered during the Trust's monitoring of use and internet access will only be used to investigate a breach of this policy and to pursue any subsequent necessary action, and should not be used for any other purpose. The standard process which IT staff will follow when investigating these issues is documented within SoP 13 Taking Evidence (in event of inappropriate use of IT). 8 MONITORING AND COMPLIANCE OF THE POLICY This policy will be reviewed and amended in accordance with any employment law, good practice guides and case law on an as and when required basis. All s are automatically scanned for viruses and trojan code. All traffic (incoming and outgoing) is logged automatically, and Users deletion at the desktop level does not remove s from the system. These logs may be audited periodically and in some cases where agreed with HR and/or Senior Management, the message content itself might also be accessed for any proper business purpose including 'business as usual or questions over 'inappropriate use' etc. The content of s is not routinely monitored however the Trust reserves the right to monitor usage in accordance with, and subject to any changes of, legislation and/or Codes of Practice. This included the Regulation of Investigating Powers Act 2000 and the Data Protection Act 1984 and Internet access records are monitored electronically, and where site requests contradict electronic policy settings, then the User is notified and asked - on occasion - if they wish to proceed; IT Services are notified of every policy exception. If there is evidence that staff are not adhering to the guidelines set out in this policy, the Trust reserves the right to question the individual member of staff, and to potentially take disciplinary action when deemed necessary, which may lead to summary dismissal and/or legal action. 9. FREEDOM OF INFORMATION - THE ACT The Freedom of Information (FOI) Act was passed on 30 November It gives a general right of access to all types of recorded information held by public authorities, with full access granted in January The Act sets out exemptions to that right and places certain obligations on public authorities. FOI will replace the Open Government Code of Practice, which has been in operation since Page 10 of 11
11 Since the 1 st of January 2005, anyone, anywhere in the world, can ask the Trust (and it might be your department) for copy of any information which it publishes (some information may be exempt), and they don't have to give any reason. The Trust's Freedom of Information Publication Scheme defines the kind of information we hold. A full copy of the Publication Scheme is available from the Communications Manager. The Trust also reserves the right to monitor usage in accordance with, and subject to any changes of, legislation and/or Codes of Practice. This included the Regulation of Investigating Powers Act 2000 and the Data Protection Act 1984 and Page 11 of 11
23 GB Internet Use and E-mail Policy
23 GB Internet Use and E-mail Policy Policy number Version 2.1 Approved by Name of author/originator 23 GB Governing Body Robert Champion/Toni Downer Owner (director) Elaine Newton, Director of Governance
More informationInternet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
More informationInformation Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
More informationComputer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
More informationUNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
More informationRecommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
More informationAcceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
More informationTONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE
GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving
More informationCOMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
More informationEmail Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
More informationEmail Services Policy
Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages
More informationInternet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
More informationDundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
More informationINTERNET AND EMAIL POLICY
Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy
More informationICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
More informationITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
More informationElectronic Communications Monitoring Policy
Electronic Communications Monitoring Policy Printed copies should not be considered the definitive version DOCUMENT CONTROL POLICY NO. 79 Policy Group Information Governance and Security Author Andrew
More informationForbes Shire Council Internet Access Policy
Forbes Shire Council Forbes Shire Council Internet Access Policy Policy No IT/001 Date approved 17 August 2006 Authority Information Technology Services Contact Officer Brian Clarke Revision History Version
More informationCity of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
More informationVirginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
More informationEmail Usage Policy Document Profile Box
Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee
More informationIM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version
More informationPOLICY. Responsible Use of Social Media
POLICY Responsible Use of Social Media Contact Officer Director of Personnel Director of Communications & Participation Senior Project Manager: Corporate Policies (Policy author) Purpose The primary aims
More information2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:
POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,
More informationHull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08
Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable
More informationPolicy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low
Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy
More informationHUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
More informationRules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
More informationEMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
More informationINTERNET, EMAIL AND PHONE SYSTEMS
Upper Great Southern Family Support Association Inc Policy On INTERNET, EMAIL AND PHONE SYSTEMS Date Adopted: November 2010 Date Revised: March 2013 Review Date: March 2014 Upper Great Southern Family
More informationINTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
More informationTrust Advantages and Disadvantages of Using Intranet
Policy No: OP17 Version: 6.0 Name of Policy: Internet, Intranet and Email Acceptable Use Policy Effective From: 04/08/2015 Date Ratified 04/03/2015 Ratified Health Informatics Assurance Committee Review
More informationInformation Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
More informationEmail Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:
Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury
More informationEmail & Internet Policy
Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible
More informationVentura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
More informationAPPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
More informationBulk Data Transfer Guidelines
Bulk Data Transfer Guidelines This procedural document supersedes: CORP/ICT 20 v.1 Bulk Data Transfer. Did you print this document yourself? The Trust discourages the retention of hard copies of policies
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationInternet, Social Media and Email Policy
West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...
More informationUSE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
More informationABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)
ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved
More informationPOLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
More informationInformation Systems Acceptable Use Policy for Learners
Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs
More informationDelaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
More informationEmail, Internet & Social Networking Policy Version 3.0. 5 th December 2014
Email, Internet & Social Networking Policy Lead executive Name / title of author: Chief Nurse Colin Owen, Information Governance and Data Security Lead Date reviewed: October 2014 Date ratified: 5 th December
More informationConditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
More informationJohn of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
More informationSample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
More informationINTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
More informationICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
More informationSt. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
More informationOrganizational Policy
Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
More informationInternet, E-mail and SMS Texting Usage Policy Group Policy
Internet, E-mail and SMS Texting Usage Policy Group Policy Scope: This Orbit Housing Group Limited ( Group ) policy provides a set of guidelines for all users within the Group on the proper usage of the
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More informationE-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:
E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:
More informationSocial Networking Protocol for Schools Managed Staff
Social Networking Protocol for Schools Managed Staff Created by HR Consultancy June 2010 1 Social Networking Protocol 2010 Contents 1. Purpose 2. Scope 3. School s Expectations 4. Safeguarding 5. Monitoring
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +
More informationPolicy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationAuthorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together
Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:
More informationDevelopment / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
More informationAGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Executive Director (AK) [J50]
AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Committee: Policy and Resources Date: 23 rd June 2009 Author: Executive Director (AK) [J50] 1.0 ISSUE 1.1
More informationDene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
More informationCOLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
More informationLiverpool Hope University. Equality and Diversity Policy. Date approved: 14.04.2011 Revised (statutory. 18.02.2012 changes)
Liverpool Hope University Equality and Diversity Policy Approved by: University Council Date approved: 14.04.2011 Revised (statutory 18.02.2012 changes) Consistent with its Mission, Liverpool Hope strives
More informationThe Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
More informationE-mail & Internet Policy
E-mail & Internet Policy Recommending Committee: Approving Committee: Clinical Standards & Focus Council Trust Governance Board Signature: Designation: Chief Executive Date: Version Number: 02 Date: August
More informationInternet and Social Media Policy
Internet and Social Media Policy Page 1 of 19 Review and Amendment Log / Control Sheet Responsible Officer: Chief Officer Clinical Lead: Author: Date Approved: Committee: Version: Review Date: Medical
More informationLINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
More informationPolicy No: 2-B8. Originally Released: 2001. Date for Review: 2016
Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for
More information[Example] Social Media Acceptable Use Policy
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationSocial Media Policy. Policies and Procedures. Social Media Policy
Policies and Procedures Social Media Policy 1 1. Introduction...3 2. Privacy settings and personal information.....3 3. Use of Social Media at Work.....4 4. Account Administrators and Login Details......4
More informationAcceptable Use Policy
Acceptable Use Policy Recommending Committee: Approving Committee: Information Governance Steering Group Patient Safety & Experience Council Signature: Designation: Chief Executive Date: Version Number:
More informationPolicy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
More information1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
More informationAcceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
More informationBRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
More informationCCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils
CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils Contents 1. Scope 2 2. Use of IT Facilities 2 3. Monitoring of IT Facilities 5 4. Maintenance & Repairs 6 5. Copyright and Licence Agreements
More informationAssistant Director of Facilities
Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment
More informationIM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy. Notification of Policy Release: Distribution by Communication Managers
IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&TPP No. 2 Email Policy Version 3.04
More informationHuman Resources People and Organisational Development. Disciplinary Procedure for Senior Staff
Human Resources People and Organisational Development Disciplinary Procedure for Senior Staff AUGUST 2015 1. Introduction 1.1 This procedure applies to Senior Staff. Senior Staff includes: 1.1.1 the Vice-Chancellor
More informationInformation Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
More informationEmbedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
More informationWith the increasing popularity of social media you need a Social Media Policy to protect your company.
Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not
More informationAcceptable use policy DEECD Information, Communications and Technology (ICT) Resources. Effective March 2011
Acceptable use policy DEECD Information, Communications and Technology (ICT) Resources Effective March 2011 Published by the Communications Division for Human Resources Division Department of Education
More informationPolicy: Remote Working and Mobile Devices Policy
Policy: Remote Working and Mobile Devices Policy Exec Director lead Author/ lead Feedback on implementation to Clive Clarke SHSC Information Manager SHSC Information Manager Date of draft 16 February 2014
More informationATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
More informationE-Mail and Internet Policy
E-Mail and Internet Policy Document reference Title: E-Mail and Internet Policy Product ID: Version Number: 8.0 Status: Live Distribution / Issue date: 12 November 2014 Author: K. Fairbrother Review Period:
More informationSocial Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy
Social Media Responsible officer: Director Community and Corporate Services Key Result Area: Governance and Decision Making Document type: Policy Reference: 10/01/0004 Approved by: Council Date approved:
More informationAcceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationHuman Resources Policies and Procedures
SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media
More informationPolicy Document Control Page
Policy Document Control Page Title Title: Electronic Mail Policy Version: 5 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version
More informationHuman Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
More informationData Protection Division Guidance Note Number 10/08
Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008
More informationElectronic Communications and. Guidance note and template policy
Electronic Communications and Internet policy Guidance note and template policy When employing staff it is useful to create a policy which sets out your standards and requirements of your staff when they
More information