Software compliance policy

Size: px
Start display at page:

Download "Software compliance policy"

Transcription

1 Software compliance policy Name of policy, procedure or regulation Software compliance policy Purpose of policy, procedure or regulation To provide a coordinated approach to software asset management Who formally approved this policy, procedure or regulation? ITRSG Who has responsibility for its update? Information Services in consultation with Faculties and Services To whom does this policy, procedure or regulation apply? All University staff and students Dec a) Date of approval b) Proposed date of review Introduction Staffordshire University recognises the importance of the legal and ethical use of software assets. This document provides guidelines for employees to follow to ensure that we are both legal and ethical in the use of our software assets. All software installed on University owned machines is for business use only in the context of academic delivery or commercial activity and should not be used by employees for personal interests The software asset management system provides a control mechanism by monitoring all software used across the University by staff or students using our networked equipment. The policy facilitates: Purpose The legal and ethical use of software assets installed on any University device and accessing the University network The co-ordination of the use of software within Staffordshire University 1

2 The management of all university-owned software in use by University staff/students Rationalisation of the software licenses in use to gain best value Why we need the Policy It is the policy of Staffordshire University to respect all computer software copyright and adhere to the Terms and Conditions of any license to which Staffordshire University is a party. Staffordshire University does not condone the use of unlicensed software. Staffordshire University depends on its computer systems and supporting software to provide a high quality and efficient service to all of its customers. Individual employees have a responsibility to protect these systems and ensure that their activities do not breach legal or regulatory compliance requirements. The Policy is designed to achieve this by clearly defining and clarifying the responsibilities of all employees, or other designated company representatives. The Policy will facilitate the mitigation of potentially significant risk exposures by Staffordshire University including but not limited to: The risk to Staffordshire University of commercial/legal disputes if licensing terms are not properly observed Damage to corporate reputation Unexpected financial impact Breaches of security Operational interruptions Unsupportable operations How we apply and control the policy The use of software across Staffordshire University will be monitored on a regular basis and information provided to the Asset Champions. Any breach, or suspected breach, of the policy will be fully investigated. Where it is considered that an employee has deliberately or negligently failed to follow the requirements of the policy, disciplinary action will be taken by an appropriate senior manager. Any employee deliberately using unlicensed software or software not approved by the University will be subject to disciplinary procedures and/or civil or even criminal proceedings. 2

3 Policy on use of software General Policies Staffordshire University has purchased fully licensed copies of computer software from a variety of publishers and vendors. Licensed and registered copies of software programs are placed on computers within the university and appropriate backup copies made in accordance with the licensing agreements and company policies. No other copies of this software or its documentation can be made without the express written consent of the software publisher and/or Staffordshire University. Software from Other Sources Staffordshire University will provide copies of legally acquired software to meet all legitimate needs in a timely fashion and in sufficient quantities for all of our computers. The use of software obtained from any other source could present security and legal threats to the company, and such use is strictly prohibited. Additional Copies In some cases, the license agreement for a particular software program may permit an additional copy to be placed on a portable computer or home computer provided only one user uses both installations. Free student licenses are also provided by some vendors as part of the agreement. Unauthorised Copies The unauthorised duplication of copyrighted software or documentation is a violation of the law and is contrary to established standards of conduct for Staffordshire University employees. Internal Controls Staffordshire University reserves the right to protect its reputation and its investment in computer software by enforcing strong internal controls to prevent the making or use of unauthorised copies of software. These controls will include periodic assessments of software use, announced and unannounced audits of institutional computers to assure compliance, controlled installation rights, the removal of any software installed with or without permission found on Staffordshire University property for which a valid license or proof of license cannot be determined, and disciplinary actions, in the event of violation of this policy. 3

4 Staffordshire University Employee Responsibilities The use of software provided for business purposes by the company, requires that a Staffordshire University employee or other designated company representative will: Agree to abide by the Policy Assume responsibility for use of the software in line with normal business purposes and Information Security policies in force. Staffordshire University Senior Management Responsibilities Senior managers will support the asset champions to enforce this policy ensuring that appropriate time and resource is provided to the champion. How to ensure compliance with the policy In order to help employees meet the responsibilities stated the following must be observed: All Staffordshire University software purchases must be agreed with the department s asset management champion and sourced through approved suppliers (wherever possible) to ensure that cost effective, efficient and stable systems and services are maintained to corporate standards (see software procurement policy) Software provided by Staffordshire University must only be used for business purposes Only approved and authorised software will be supported by Staffordshire University. Where any exceptions are requested, the request for administrative rights Proforma must be completed and sent to IS Admin for inclusion and discussion at the next IT Resources Steering Group meeting Software legally owned by employees for their own personal use, is not permitted to be installed on University owned machines. All software must be appropriately sourced from a University supplier Software can only be installed by authorised employees. Employees will not be given administration rights to load software. All software requirements above the standard image should be discussed with the faculty/service champion Software that is required for specific or specialised short-term activities will also need the prior permission of the department s asset management champion All purchases are subject to the Purchasing regulations managed by Finance 4

5 Definitions Employee For the purpose of the Policy, the term employee is used generically to include all employees, contractors, consultants, 3 rd party suppliers and service providers to Staffordshire University. Authorised Authorised means any employee or designated representative whose role requires that they may install or de-install software. Purchased or Licensed Software For the purposes of the Policy software should be interpreted to mean, any program or code that runs on a Staffordshire University computing device. The definitions should be interpreted to include plug-ins such as Adobe Acrobat Reader and Macromedia Flash Player. The definition should not be interpreted to include data files. If you are in doubt about the definition of software, clarification may be obtained from the Client Technology and Applications Manager, Information Services The Law COPYRIGHT, DESIGNS and PATENTS ACT 1988 and the Digital Economy Act 2010 This is the primary legislation governing intellectual property. It extends legal protection to software in the form of both civil and criminal penalties for the abuse of intellectual property rights. The legislation is applicable to both corporates and individuals. It should be noted that the duplication of software for commercial gain is a criminal offence under the Act and that the penalties for such an offence may include substantial fines and/or imprisonment. Authorisation to Install Installation of Software The installation of software will occur via authorised personnel within Staffordshire University or designated service provider. These parties have system administrator access to computer systems that will enable them to carry out the installation. The asset management champion is able to view all software license information and will investigate any areas of non compliance 5

6 De-installation, upgrade or decommissioning of software As with the installation of software the de-installation, upgrade or decommission of software by end users is not permitted. Accordingly, only authorised persons as outlined above may carry out the transfer of software from one computer to another. Users who require the de-installation, upgrade or decommission of software should action this via department s asset management champion. The asset management champion should liaise with Information Services Client Technology and Applications team for advice and guidance. Disposal of software The Asset management champion is responsible for ensuring that software media and activation keys are disposed of correctly. These should be defaced to ensure they cannot be re-used. Software asset management systems Staffordshire University uses a software asset management system (Snow) to manage its software and related licenses. All asset management champions have access to this system and are required to input license information for any software purchased which is not included in the University standard image. Asset champions will receive monthly reports of any non-compliant software held by individuals within their department for further investigation and appropriate action. Software procurement procedure Staffordshire University uses a standard procedure for software procurement. See separate procedure document 6

7 Employee Self Assessment Guideline for the Staffordshire University Software Compliance Policy All staff: Read and study the Staffordshire University Software Compliance Policy Read the guideline below to confirm to yourself that you are confident that you understand and appreciate the need to follow the company s policy on the use of software. I have read a copy of the Staffordshire University policy on the use of software and I understand and am fully aware that: The Company has legal and copyright obligations. Any software licenses provided by Staffordshire University for use by an employee remain the property of the Company. Only authorised employees may install/de-install software Employees logging on to University-owned devices are agreeing to the IT regulations of the University It is a legal requirement that employees are prohibited from personally purchasing software (media or internet downloads) for installation on any equipment owned by Staffordshire University. The use of software across Staffordshire University will be monitored on a continual and regular basis. Any breach, or suspected breach, of the policy will be fully investigated and where it is considered that an employee or other designated company representative (contractor or external consultant), has deliberately or negligently failed to follow the requirements of the policy, disciplinary action may be taken. Employees must make all reasonable efforts to protect all software and associated information (e.g. manuals, media) provided by Staffordshire University from theft, damage or corruption. Employees must not add, modify, change or upgrade any of the software provided by Staffordshire University for their use without the prior permission of the department asset management champion. Employees must not copy or duplicate any software provided by the company or allow any such software to be copied by anyone else. Employees leaving the employment of Staffordshire University must return and obtain a receipt prior to their departure, for all computer materials - including software and associated information provided by the company. 7

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

INFORMATION SECURITY MANAGEMENT POLICY

INFORMATION SECURITY MANAGEMENT POLICY INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

How To Manage A University Computer System

How To Manage A University Computer System PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

DRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions

DRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions DRAFT Change History: Anti-Bribery and Anti-Corruption Policy Control Risks Group Ltd Commercial in confidence Introduction This document defines Control Risks policy on the avoidance of bribery and corruption.

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

Corporate Information Security Policy

Corporate Information Security Policy Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives

More information

GROUP POLICY MANUAL CODE OF CONDUCT AND ETHICS POLICY

GROUP POLICY MANUAL CODE OF CONDUCT AND ETHICS POLICY POLICY NO: 8 (Group) Issued: November 2007 Revision No: 1 GROUP POLICY MANUAL CODE OF CONDUCT AND ETHICS POLICY Original Issued: 22 August, 2003 Effective: November 2007 Date Reviewed: February 2007 By:

More information

G3 Group Limited. Financial Products Trading Policy and Guidelines. Date adopted: 1 April 2015 Version: 1. 1 P a g e

G3 Group Limited. Financial Products Trading Policy and Guidelines. Date adopted: 1 April 2015 Version: 1. 1 P a g e G3 Group Limited Financial Products Trading Policy and Guidelines Date adopted: 1 April 2015 Version: 1 1 P a g e G3 Group Limited Securities Trading Policy and Guidelines Scope of Policy This G3 Group

More information

Customer-Facing Information Security Policy

Customer-Facing Information Security Policy Customer-Facing Information Security Policy Global Security Office (GSO) Version 2.6 Last Updated: 03/23/2015 Symantec Corporation Table of Contents Compliance Framework... 1 High-Level Information Security

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)

More information

Software Policy. Software Policy. Policy and Guidance. June 2013

Software Policy. Software Policy. Policy and Guidance. June 2013 Software Policy Policy and Guidance June 2013 Project Name Software Policy Product Title Policy and Guidance Version Number 1.2Final Page 1 of 8 Document Control Organisation Title Author Filename Owner

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION

CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION 1.0 Purpose and Scope of Policy It is the policy of the City of Waukesha (City) to respect all computer

More information

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Flight Centre Travel Group Limited attaches its updated share trading policy.

Flight Centre Travel Group Limited attaches its updated share trading policy. 27 August 2015 Flight Centre Travel Group Limited attaches its updated share trading policy. Flight Centre Travel Group Limited ABN 25 003 377 188 Level 2, 545 Queen Street, Brisbane QLD 4000 1. Overview

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

University of South Wales Software Policies

University of South Wales Software Policies University of South Wales Software Policies Updated 23 rd January 2015 Page 1 University of South Wales - Software Policies The University s software policies are applicable to all software and datasets

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

Corporate Code of Conduct

Corporate Code of Conduct 1. Background Corporate Code of Conduct 1.1. For over a century, the Swire group of companies has been recognised as acting responsibly in the course of achieving its commercial success. Our reputation

More information

SHARE TRADING POLICY

SHARE TRADING POLICY SHARE TRADING POLICY 1. PURPOSE AND SCOPE 1.1 Terramin Australia Limited (Terramin) is a public company, listed on the Australian Securities Exchange (ASX). Terramin is committed to upholding high standards

More information

By Directors, Officers and Employees of Hellaby Holdings Limited and its Subsidiaries ( The Company )

By Directors, Officers and Employees of Hellaby Holdings Limited and its Subsidiaries ( The Company ) Code of Conduct for Securities Trading ( Code ) By Directors, Officers and Employees of Hellaby Holdings Limited and its Subsidiaries ( The Company ) Approved by the Board: 10 May 2013 1. Introduction

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

Corporate Information Security Management Policy

Corporate Information Security Management Policy Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification

More information

Securities Trading Policy

Securities Trading Policy Securities Trading Policy Securities trading Page 1 of 9 Contents 1 Purpose... 3 2 Coverage / Scope... 3 3 Values & Commitments... 3 4 Policy... 3 5 Links / interaction with other policies... 9 6 Attachments...

More information

Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.

Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved. Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

INFORMATION SECURITY PROCEDURES

INFORMATION SECURITY PROCEDURES INFORMATION AN INFORMATION SECURITY PROCEURES Parent Policy Title Information Security Policy Associated ocuments Use of Computer Facilities Statute 2009 Risk Management Policy Risk Management Procedures

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

TELEFÓNICA UK LTD. Introduction to Security Policy

TELEFÓNICA UK LTD. Introduction to Security Policy TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15

More information

COMPUTER USE POLICY. 1.0 Purpose and Summary

COMPUTER USE POLICY. 1.0 Purpose and Summary COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive

More information

Securities Trading Policy and Guidelines for Employees and Dedicated Contractors

Securities Trading Policy and Guidelines for Employees and Dedicated Contractors (Approved by Board - April 2016) Securities Trading Policy and Guidelines for Employees and Dedicated Contractors This policy applies to all employees and dedicated contractors of New Zealand Oil & Gas

More information

information systems security policy...

information systems security policy... sales assessment.com information systems security policy... Approved: 2nd February 2010 Last updated: 2nd February 2010 sales assessment.com 2 index... 1. Policy Statement 2. IT Governance 3. IT Management

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

Standards of. Conduct. Important Phone Number for Reporting Violations

Standards of. Conduct. Important Phone Number for Reporting Violations Standards of Conduct It is the policy of Security Health Plan that all its business be conducted honestly, ethically, and with integrity. Security Health Plan s relationships with members, hospitals, clinics,

More information

University of Hartford. Software Management and Compliance Guidelines

University of Hartford. Software Management and Compliance Guidelines University of Hartford Software Management and Compliance Guidelines This policy is issued in an effort to remind the University community of the importance of complying with that policy and to reiterate

More information

Revised 05/22/14 P a g e 1

Revised 05/22/14 P a g e 1 Corporate Office 107 W. Franklin Street P.O. Box 638 Elkhart, IN 46515-0638 Phone (574) 294-7511 Fax (574) 522-5213 INTRODUCTION PATRICK INDUSTRIES, INC. CODE OF ETHICS AND BUSINESS CONDUCT As a leader

More information

CUBIC ENERGY, INC. Code of Business Conduct and Ethics

CUBIC ENERGY, INC. Code of Business Conduct and Ethics CUBIC ENERGY, INC. Code of Business Conduct and Ethics Introduction Our Company s reputation for honesty and integrity is the sum of the personal reputations of our directors, officers and employees. To

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

University of Liverpool

University of Liverpool University of Liverpool Card Payment Policy Reference Number Title Version Number 1.0 Document Status Document Classification FIN-001 Card Payment Policy Active Public Effective Date 03 June 2014 Review

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN TITLE: Compliance with the1976 United States Copyright Law Computer Software ROUTING All Employees All Locations NUMBER: BUL 716.2 ISSUER: Margaret A. Klee, Chief Information Officer Information Technology

More information

MICHAEL HILL INTERNATIONAL LIMITED SECURITIES TRADING POLICY AND GUIDELINES

MICHAEL HILL INTERNATIONAL LIMITED SECURITIES TRADING POLICY AND GUIDELINES MICHAEL HILL INTERNATIONAL LIMITED SECURITIES TRADING POLICY AND GUIDELINES This policy applies to all Directors, officers and employees of Michael Hill International Limited and its subsidiaries in New

More information

Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.

Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved. Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION

More information

IMPLEMENTATION DETAILS

IMPLEMENTATION DETAILS Policy: Title: Status: 1. Introduction ISP-I11 Software License Regulations Approved Information Security Policy Documentation IMPLEMENTATION DETAILS 1.1. The Software Management Policy (ISP-S13) makes

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

The potential legal consequences of a personal data breach

The potential legal consequences of a personal data breach The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.

More information

IT ACCESS CONTROL POLICY

IT ACCESS CONTROL POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Acceptable Use of Information and Communication Systems Policy

Acceptable Use of Information and Communication Systems Policy Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help

More information

BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS

BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS A. Scope. This Code of Business Conduct and Ethics applies to all Berkshire Hathaway directors, officers and employees, as well as to directors,

More information

Letter from the Chief Executive Officer and Chairman and the Group Medical Director

Letter from the Chief Executive Officer and Chairman and the Group Medical Director Letter from the Chief Executive Officer and Chairman and the Group Medical Director Every day, millions of people put their trust in International SOS to help them wherever they live or travel. We remain

More information

AS Merko Ehitus CODE OF BUSINESS ETHICS

AS Merko Ehitus CODE OF BUSINESS ETHICS AS Merko Ehitus CODE OF BUSINESS ETHICS AS Merko Ehitus 1 Introduction The purpose of the Code of Business Ethics, which is described in this document, is to provide guidance to employees, directors and

More information

Evergreen Solar, Inc. Code of Business Conduct and Ethics

Evergreen Solar, Inc. Code of Business Conduct and Ethics Evergreen Solar, Inc. Code of Business Conduct and Ethics A MESSAGE FROM THE BOARD At Evergreen Solar, Inc. (the Company or Evergreen Solar ), we believe that conducting business ethically is critical

More information

4.0 ISSUANCE OF REGULATIONS/STANDARD OPERATING PROCEDURES

4.0 ISSUANCE OF REGULATIONS/STANDARD OPERATING PROCEDURES Policy: 13.09 SUBJECT: SOFTWARE USAGE Supersedes: 2001-2002 DPS Policy Manual, No. 10.10 Computer Hardware/Software and Office Equipment Use, dated July 14, 2000 Effective: February 15, 2005 Page: 1 of

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

STATEMENT FROM THE CHAIRMAN

STATEMENT FROM THE CHAIRMAN STATEMENT FROM THE CHAIRMAN In an ever-changing global marketplace, it is important for all of us to have an understanding of the responsibilities each of have in carrying out day-to-day business decisions

More information

TRADING POLICY AND GUIDELINES

TRADING POLICY AND GUIDELINES TRADING POLICY AND GUIDELINES July 2015 1. Application of the Policy Introduction This Policy has been designed to prevent improper trading by employees, senior managers and directors of NZX Limited (

More information

Company Policy. This document details Auckland Airport's policy on, and rules for dealing in the following securities ("Restricted Securities"):

Company Policy. This document details Auckland Airport's policy on, and rules for dealing in the following securities (Restricted Securities): Insider Trading Policy and Guidelines Company Policy This policy applies to all Directors, officers and employees of Auckland International Airport Limited ("Auckland Airport") and its subsidiaries who

More information

Anchor Bay Schools Software Policy

Anchor Bay Schools Software Policy Anchor Bay Schools Software Policy Table of Contents 1. Statement of Ethics... Page 1 2. Purchasing and Acquisition... Page 1 3. Registration... Page 1 4. Installation of Software... Page 2 5. Individual

More information

Whistleblowing Policy

Whistleblowing Policy Whistleblowing Policy China Resources Power Holdings Company Limited Adopted By the Board: 19 March 2012 Room 2001-05, 20/F, China Resources Building 26 Harbour Road, Wanchai, Hong Kong www.cr-power.com

More information

MUSIC, VIDEO AND SOFTWARE PIRACY POLICY

MUSIC, VIDEO AND SOFTWARE PIRACY POLICY Information Technology Services MUSIC, VIDEO AND SOFTWARE PIRACY POLICY Date approved: 17 March 2005 Date Policy will take effect: 17 March 2005 Date of Next Review: December 2010 Approved by: Custodian

More information

Code of Business Conduct and Ethics. Strike Energy Limited ACN 078 012 745

Code of Business Conduct and Ethics. Strike Energy Limited ACN 078 012 745 Code of Business Conduct and Ethics Strike Energy Limited ACN 078 012 745 Approved: 2 December 2014 Contents 1. General... 1 2. Responsibilities to shareholders and the financial community generally...

More information

HORIZON OIL LIMITED (ABN: 51 009 799 455)

HORIZON OIL LIMITED (ABN: 51 009 799 455) HORIZON OIL LIMITED (ABN: 51 009 799 455) CORPORATE CODE OF CONDUCT Corporate code of conduct Page 1 of 7 1 Introduction This is the corporate code of conduct ( Code ) for Horizon Oil Limited ( Horizon

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

EAGLE PARENT, INC EPICOR SOFTWARE CORPORATION ACTIVANT SOLUTIONS, INC. UK ANTI-BRIBERY AND CORRUPTION POLICY. (As Adopted July 2011)

EAGLE PARENT, INC EPICOR SOFTWARE CORPORATION ACTIVANT SOLUTIONS, INC. UK ANTI-BRIBERY AND CORRUPTION POLICY. (As Adopted July 2011) EAGLE PARENT, INC EPICOR SOFTWARE CORPORATION ACTIVANT SOLUTIONS, INC. UK ANTI-BRIBERY AND CORRUPTION POLICY (As Adopted July 2011) Introduction This UK Anti-Bribery and Corruption Policy ( Policy ) is

More information

Information Security Incident Management Policy and Procedure

Information Security Incident Management Policy and Procedure Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure

More information

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5 Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose

More information

a. employees Company; or

a. employees Company; or Code of Busines ss Conduct and Ethics 1. Introduction a. This Code of Business Conduct and Ethics (the Code ) applies to all directors, officers, employees and third parties employed or directly engaged

More information

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY Version Author Date Approved by Board 2009-1 Gillian Kirkup 24 March 2010 Page 1 of 8 THE RICE MARKETING BOARD FOR

More information

Acceptable Use of Information. and Communication Systems Policy

Acceptable Use of Information. and Communication Systems Policy Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,

More information

Remote Access Policy

Remote Access Policy BASINGSTOKE AND NORTH HAMPSHIRE NHS FOUNDATION TRUST Remote Access Policy Summary This is a new document which sets out the policy for remote access to the Trust s network and systems. Remote access is

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

SMS SERVICE PROVISION

SMS SERVICE PROVISION SMS SERVICE PROVISION Terms and Conditions and Privacy Policy Version 2.01 Aug 2015 Page 1 Contents TERMS & CONDITIONS... 3 Registration... 3 Your Personal Information... 3 Our Obligations to SMS Service

More information

Information Security Policy. Chapter 13. Information Systems Acquisition Development and Maintenance Policy

Information Security Policy. Chapter 13. Information Systems Acquisition Development and Maintenance Policy Information Security Policy Chapter 13 Information Systems Acquisition Development and Maintenance Policy Author: Policy & Strategy Team Version: 0.3 Date: June 2008 Document Control Information Document

More information

CODE OF ETHICS AND BUSINESS CONDUCT

CODE OF ETHICS AND BUSINESS CONDUCT CODE OF ETHICS AND BUSINESS CONDUCT This Code of Ethics and Business Conduct ( Code ) has been approved by the Amalgamated Holdings Limited ( AHL ) Board of Directors for use within the AHL controlled

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Information Services. Protecting information. It s everyone s responsibility

Information Services. Protecting information. It s everyone s responsibility Information Services Protecting information It s everyone s responsibility Protecting information >> Contents >> Contents Introduction - we are all responsible for protecting information 03 The golden

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

Anti-Bribery and Corruption Policy

Anti-Bribery and Corruption Policy Newcrest strictly prohibits bribery and other unlawful or improper payments made to any individual or entity, as outlined in this Anti-Bribery & Corruption Policy. Newcrest's Anti- Bribery & Corruption

More information

Harper Adams University College. Information Security Policy

Harper Adams University College. Information Security Policy Harper Adams University College Information Security Policy Introduction The University College recognises that information and information systems are valuable assets which play a major role in supporting

More information

KINGS COUNTY OFFICE OF EDUCATION ACCEPTABLE USE POLICY

KINGS COUNTY OFFICE OF EDUCATION ACCEPTABLE USE POLICY KINGS COUNTY OFFICE OF EDUCATION ACCEPTABLE USE POLICY 1. Internet access is provided by Kings County Office of Education (KCOE). In order to utilize this service, users must agree and abide by this acceptable

More information

In accordance with Listing Rule 12.10, DuluxGroup Limited attaches its updated share trading policy.

In accordance with Listing Rule 12.10, DuluxGroup Limited attaches its updated share trading policy. ACN 133 404 065 1956 Dandenong Road Clayton Victoria 3168 Australia Tel: 61 3 9263 5678 16 October 2015 ASX Market Announcements Office 20 Bridge Street SYDNEY NSW 2000 SHARE TRADING POLICY In accordance

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies

More information

Cyber Threats: Exposures and Breach Costs

Cyber Threats: Exposures and Breach Costs Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information