2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
|
|
|
- Shana Bryan
- 10 years ago
- Views:
Transcription
1 Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change to academy status Review Date Objectives ICT Network Security Policy Berwick Academy 1. The objective of this policy is to create and maintain a high level of awareness of the importance of ICT and data security in school. All staff has a responsibility to ensure proper use of equipment and data within the terms of this policy and any other that may be approved by the school governors. Appropriate training in relation to the policy will be given to all colleagues. 2. The policy is relevant to all ICT services and electronic communication methods irrespective of the equipment or facility in use and applies to all employees and others using school facilities either on or off school premises. 3. School staff members are reminded that there are elements of the Staff Code of Conduct which also apply to the proper use of school assets. Legislation 4. The school and its employees must comply with all UK legislation affecting IT. All school employees must comply with the following Acts, they may be held personally responsible for any breach of current legislation as listed below and any future legislation that may be enacted: Obscenity Acts, 1959 and 1964 Protection of Children Act, 1978 Indecent Displays Act, 1981 Criminal Justice Act, 1988 Copyright Designs and Patents Act, 1988 Computer Misuse Act, 1990
2 Data Protection Act, 1998 Human Rights Act, 1998 Violations 5. Violations of this policy will include, but are not limited to, any act that: Exposes the school to actual or potential loss through the compromise of ICT security Involves the inappropriate use of equipment, unauthorised disclosure or use of data, and/or the sending or receiving of defamatory or inappropriate material Involves the use of data or equipment for illicit purposes, which may include violation of any law, regulation, or any reporting requirement of any law enforcement agency or government body 6. Computer and data security is viewed seriously by the school and breaches of this policy may result in disciplinary action. 7. Any member of staff who has knowledge of any actual or potential violation of this policy must report it immediately to the ICT Manager or an appropriate member of the School Leadership Group (SLG). Breaches to this policy could ultimately result in disciplinary action, staff dismissal or exclusion of pupils. Passwords 8. The effective use of passwords will protect users from any allegations of misuse. Passwords should be used as a first line of defense against unauthorised use or access to computers and other IT equipment. 9. Screen saver passwords should be used wherever possible. This is particularly important for portable devices. 10. If a software package comes installed with a default password, that password must be changed immediately after installation. 11. Passwords should not be proper names, birth dates or the word password. They should be at least six characters long and at least two of those characters should be numeric or punctuation marks. Individual passwords should be used for different applications. 12. Passwords must not be written down or shared. If access to data or equipment is shared this must be done in the most secure way possible. The Technical Support Team should be contacted for advice or support.
3 13. Passwords should not be the same as a user name or be easily guessed by anyone attempting to log in, especially if they have knowledge of the usual user of the equipment. 14. Passwords must be changed regularly. Where possible, changes should be every 30 days, unless otherwise dictated by the ICT Manager. Password changes are enforced on the network and must be changed every 90 days. 15. Passwords must not be updated incrementally, e.g. changed by altering only one character of the password.
4 Unattended Equipment 16, Equipment should not be unattended while logged on unless a password protected screen saver has been activated. Access Levels 17. All individuals will have their access limited only to those systems or data, which they need during their normal use. If special access is needed for a limited period access rights will be removed after this period has expired. Approval for access to sensitive areas must be given by Technical Services or by an appropriate member of the SLG. Physical Security 18. All desktop devices (PC s, printers and scanners etc.) must have adequate precautions taken to protect them against theft or damage. 19. All portable devices, when not in use, must be retained in a secure environment. 20. All equipment should be security marked (etched, UV pen, etc.) as soon as it is acquired. 21. If portable devices are taken off site, staff must ensure that they take adequate precautions to protect the equipment against theft or damage at all times. Equipment must never be left in an unattended vehicle. Please refer to the school Mobile Device Policy. Security Breaches 22. Any member of staff that becomes aware of an actual or potential breach of security must report immediately to the ICT Manager or an appropriate member of the SLG. Breaches to this policy could ultimately result in disciplinary action, staff dismissal or exclusion for pupils. Software 23. Only software, for which the school holds a legitimate license, should be installed on any school computer (including mobile devices). Licensing arrangements must be followed when installing software. 24. The copying of proprietary software programs or associated copyrighted documentation is prohibited and is a criminal offence. Use of copied software or documentation may lead to personal criminal liability with the risk of a fine or imprisonment. Viruses 25. Software or files must not be loaded onto IT equipment unless its source has been verified as legitimate and the software checked for viruses. 26. If discs or USB drives are used to transfer files, programs or data, they must be
5 virus checked particularly if from an external source. 27. Anti virus software must be used to protect school equipment and data. 28. If there are any doubts about the authenticity or content of an attachment or other electronic data these must be reported to Technical Services immediately. Any messages or communications, which are suspicious, must not be opened or loaded on to school equipment until an approved member of staff has properly checked them. End of Use of School ICT Facilities 29. When a member of staff, user or student leaves the school, arrangements will be made by the ICT Manager for the transfer or deletion of any files, programs or software used by that person. Access rights to school systems and data will be removed or reassigned as soon as possible. School equipment will be recovered/returned and where possible recycled to another staff member. Obsolete Equipment and Files 30. ICT equipment which has become obsolete or surplus to requirement must only be disposed of after any storage media has been cleared of data. Disposal of equipment must be in accordance with Schools Financial Regulations and in line with WEEE disposal regulations. Changes are also made to our Asset Management system to reflect the assets end of life and decommission. 31. Discs and other storage media must be disposed of sensitively bearing in mind the content and potential for disclosure. Telephone and Faxes 32. Telephone users must always be aware of their surroundings and take these into account when carrying out any conversation. This is especially important where confidentiality is an issue. 33. No confidential or sensitive documents or information must be sent by fax unless: The receiving fax machine is known to be secure. The recipient has been advised that the message is being sent and has confirmed that they are available to receive it. The fax message includes a contact name and telephone number should there be any problem during transmission 34 General disclaimers are not appropriate but should you need to include one on your fax the following should be considered: Contract this fax is not intended nor shall it be taken to create any legal relations, contractual or otherwise. Private Opinion - This fax represents the personal views of the author/sender. The author/sender has no authority or delegation to bind
6 the school by this fax and the school accepts no responsibility whatsoever for its contents. Confidence - This fax is communicated in confidence. It is intended for the recipient only and may not be disclosed further without the express consent of the sender. 35. All faxes must include the message If this is delivered to you in error would you please destroy all copies of it immediately and contact the person who sent it 36. If a fax is received by the school and it is not the intended recipient every effort will be made to inform the sender of this and the recipient must follow the senders instructions, if any, concerning receipt in error Users must take into account the sensitivity of any data, message or other communication before sending any users have a duty to manage this resource in the most efficient and effective way. Saved messages may accumulate which will lead to a degradation in service. When s are no longer required to be stored, they should be deleted from the computer network or PC. Use of Facilities 39. facilities are provided primarily for school business use however, it is acknowledged that in some exceptional circumstances it may be permissible to respond to a private . Regardless of this, school facilities must never be used in connection with any secondary business activities 40. User mail boxes and their contents may be examined by the school, the LEA, its auditors or any law enforcement agency. Due consideration of the provisions of the Human Rights Act and any other legislation will be made when undertaking such examinations. 41. Any improper use of internal or external , as defined in this policy, or otherwise, may be considered by the school to be a disciplinary matter. Disclaimers 42. s sent using school equipment are sent on behalf of the school and as such the school could be liable for any resulting action. 43. In s the following disclaimer should be considered and included if appropriate: All information in this message and attachments is confidential and may be legally privileged. Only intended recipients are authorized to use it. transmissions are not guaranteed to be secure or error free and sender does not accept liability for such errors or omissions. Berwick Academy will not accept any liability in respect of such communication that violates our Policy.
7 All communication may be subject to recording and/or monitoring in accordance with internal policy and relevant legislation. 44. All should include a signature : Name, Job Title School name Contact telephone number address 45. Staff are responsible for the security of their facility, s will be recorded as having been sent by the person who last logged into the system irrespective of who actually typed and sent the message. 46 The school prohibits the use of for purposes which may be illegal or the making or sending of messages which may considered to be offensive in any way must not be used : body. to make possibly defamatory statements about any person or corporate for sexual or racial or other harassment of any person. the generation or dissemination of obscene or blasphemous material. External 48. Users must ensure that they are authorised to send each with regard to it s content and the recipient s must not bind the school to any position, agree any terms or make any admission unless they have first been approved by an appropriate member of the SLG 50. Staff must not give advice to third parties via unless authorised to do so and after having fully considered their own and the school s potential liability. 51. Mail messages sent to other networks should contain the name and job title of the author, the full postal address of the school, the schools telephone and fax numbers and the relevant address. 52. The appropriate level of formality must be observed in s including the use of appropriate presentation, its use must not be trivialised and it must include the recognised signature Attachments 53. Where possible, attachments should be password protected, especially sensitive documents. Encryption should also be considered for the sending of sensitive documents. Technical Services must be contacted if there is uncertainty with regards to opening attachments.
8 The Internet 54. Access to the Internet is provided primarily for school business use. However, it is recognised that private access may be acceptable in some circumstances provided that it is reasonable, properly sanctioned and in the user s own time. Use of the Internet or any other school ICT facility in connection with secondary business activity is strictly prohibited. Use of the internet must adhere to the Internet Acceptable Use Policy. 55. This valuable school asset must be used in an efficient, effective, ethical and lawful manner. Contravention of this policy may expose the school to legal action or result in action being taken against the user. 56. The school holds no responsibility for any damage or distress caused to users accessing inappropriate or offensive material. Monitoring of Internet Usage 57. The school, the LEA, its auditors and any law enforcement agency may monitor the use of the internet and will report any irregularity to the school governors. Use of the Internet is considered to be an expression of consent by the user to such monitoring, recording and auditing. 58. Filtering mechanisms are in place to restrict access to potentially offensive material. However, neither the school nor the internet service provider (ISP) can guarantee complete safety from inappropriate materials. Systems are in place which will record and log any attempt to access unsuitable sites and material. These attempts will be investigated and may lead to disciplinary or legal action. 59. Misuse of the Internet may result in disciplinary action and could ultimately result staff dismissal or exclusion for pupils. In exceptional circumstances legal action may be taken, via referral to the Police, therefore no attempts should be made to access any unsuitable material (pornographic, indecent, illegal, abusive or otherwise offensive images, text or sound). Copyright 60. Unless there is specific evidence to the contrary, it must be assumed that any material obtained from the Internet is subject to copyright and users must ensure that they do not breach any copyright. Data backup and Disaster Plan 61. The school has a disaster recovery plan, which ensures continuity of service and security of data in the case of emergency or other unforeseen event. 62. Users and Technical Services are responsible for ensuring that all data is backed up in compliance with the Backup Policy.
Berwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Information Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
Information Security Policy
Information Security Policy The purpose of this Policy is to describe the procedures and processes in place to ensure the secure and safe use of the federation s network and its resources and to protect
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
Acceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Acceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy
Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
School Information Security Policy
School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES Version 3.0 17/05/2012 CONTENTS 1. Introduction and Scope... 3 2. Data Protection Act 1998... 4 3. Licence Registration and Prevention of Piracy...
Internet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
Summary Electronic Information Security Policy
University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture
Acceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )
TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide
UTC Cambridge ICT Policy
UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions
WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
Angard Acceptable Use Policy
Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants
E- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
POLICY ON USE OF INTERNET AND EMAIL
POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic
The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
INTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
Terms and Conditions of Use - Connectivity to MAGNET
I, as the Client, declare to have read and accepted the terms and conditions set out below for the use of the network connectivity to the Malta Government Network (MAGNET) provided by the Malta Information
John of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
Policies Concerning the use of Computers
Policies Concerning the use of Computers Shrewsbury School s Policies Concerning the use of Computers The Director of IT is responsible for the formulation and review of policies affecting the use of computers
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
Other Review Dates: 15 July 2010, 20 October 2011
POLICY:- Policy Title: Mobile Telephone Policy File reference: F10/618-04 Date Policy was adopted by Council initially: 18 December 2008 Resolution Number: 404/08 Other Review Dates: 15 July 2010, 20 October
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
SAS TRUSTEE CORPORATION ( STC )
SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Working Together Aiming High!
Poplar Street Primary School ICT Security and Acceptable Use Policy E-Safety policy 2013/14 Working Together Aiming High! 1 Contents 1. Introduction... 3 2. Policy Objectives... 3 3. Application... 3 4.
R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
DIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction
NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
Acceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
Email Services Policy
Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages
Email Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
