Mobile Communication Device
|
|
|
- Stephanie Richards
- 10 years ago
- Views:
Transcription
1 Policy Mobile Communication Device Please note this policy is mandatory and staff are required to adhere to the content Summary Access to mobile communication devices must be properly administered and controlled to provide a secure environment, effectively manage DECD resources, comply with legal and privacy requirements and conform to DECD conditions of connection Table 1 - Document details Publication date June 2011 Review date January 2014 Related legislation/applicable section of legislation Related policies, procedures, guidelines, standards, frameworks Replaces Policy officer (position) Manager, ICT Infrastructure & Asset Management Policy officer (phone) Policy sponsor (position) Executive director responsible (position and office) Assistant Director, ICT Technical Services Executive Director, Infrastructure Applies to Key words Status Approved by Mobile Communication Device Approved Executive Director, Infrastructure Approval date June 2011 Version Mobile Communication Device June 2011
2 Table 2 - Revision record Date Version Revision description 2 Mobile Communication Device June 2011
3 Table of Contents Policy... 1 Mobile Communication Device... Error! Bookmark not defined. 1. Title Purpose Scope Policy detail Roles and responsibilities Monitoring, evaluation and review Definitions and abbreviations Supporting documents References...6 Appendix Mobile Communication Device June 2011
4 1. Title Mobile Communication Device 2. Purpose Access to mobile communication devices must be properly administered and controlled to provide a secure environment, effectively manage DECD resources, comply with legal and privacy requirements and conform to DECD conditions of connection. Mobile communication devices are defined as devices that can store, send and receive communications (voice, data and video) while the device is not physically attached to a network. Mobile communication devices include: Mobile telephones Tablet devices using wireless/mobile telecommunication technology (e.g. ipad, Android, Windows devices etc.) Smart phone devices Laptops/Notebooks with wireless/mobile telecommunication connectivity. Use and content of mobile communication devices must be in accordance with the ethical standards expected from DECD staff as outlined in the Code of Ethics for the South Australian Public Sector. 3. Scope This policy applies to all DECD staff. 4. Policy detail Provision of Mobile Communication Devices Mobile communication devices are only provided to DECD officers who have a demonstrated requirement as outlined in the DECD Procedure - Provision of Mobile Communication Devices. Only DECD approved and owned Mobile Communication Devices can be used. The list of approved devices can be found on in.decd and SSONet, under ICT Support. Primary Usage Mobile communication devices provided by DECD must be primarily used for DECD related business purposes only e.g. communications related to DECD business, authorised personal development and activities related to a person s duties. Usage, if subjected to public scrutiny, must not cause embarrassment or concern to DECD. Personal Usage 4 Mobile Communication Device June 2011
5 Non-business use of mobile communication devices is permitted consistent with the Code of Ethics for the South Australian Public Sector regarding reasonable use. All personal usage of mobile phone services must be reimbursed to DECD in accordance with the instructions received with mobile phone bills. Unacceptable Usage Usage that causes interference or disruption to other mobile communication device users will not be tolerated. Unacceptable usage includes, but is not limited to: distribution of offensive material use for personal financial gain propagation of any form of malicious software (viruses, worms etc) capture and storage of information that contravenes the State Government Information Privacy Principles. Security This policy should be read in conjunction with the DECD Policy ICT Security and the DECD Standard Mobile Communication Devices Security. Commercial Electronic Messages Consistent with the Spam Act, commercial electronic messages must: only be sent with the addressee s consent clearly identify who is responsible for sending the message; and allow people to opt-out from receiving future messages. Asset Management Management of mobile communication devices must be consistent with the DECD Policy - Corporate ICT Asset Management and the DECD Standard Mobile Communication Devices Security. Devices must be configured according to ICT Services standards. Non-compliance Violations of this policy, depending on severity and nature, may result in reprimand, loss of access to DECD mobile communication devices or dismissal. 5 Mobile Communication Device June 2011
6 5. Roles and responsibilities Table 2 - Roles and responsibilities Role Authority/responsibility for 6. Monitoring, evaluation and review 7. Definitions and abbreviations Table 3 - Definitions and abbreviations Term Meaning 8. Supporting documents The following whole-of-government and DECD policies and guidelines are relevant and should be read in conjunction with this policy. 6 Mobile Communication Device June 2011
7 Whole of Government Policies and Guidelines The State Government Information Privacy Principles (Cabinet Administrative Instruction 1/89) (governing the collection, release and publishing of information) Government Information Security Management Framework The Code of Ethics for the South Australian Public Sector State and Commonwealth Acts The Commonwealth Spam Act 2003 (Governing the sending of commercial electronic messages) _ DECD Policies and Guidelines DECD Policy ICT Security DECD Standard Mobile Communication Devices Security DECD Policy Corporate ICT Asset Management DECD Policy Corporate Electronic Mail Access and Use DECD ICT Acceptable Use Agreement DECD Procedure Provision of Mobile Communication Devices DECD Mobile Communication Devices User Agreement 9. References N/A Appendix N/A 7 Mobile Communication Device June 2011
Corporate ICT Change Management
Policy Corporate ICT Change Management Please note this policy is mandatory and staff are required to adhere to the content Summary A formal change management system must be approved, implemented and enforced
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
DIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
Mobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
Commonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
POLICIES AND REGULATIONS Policy #78
Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
APHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information
Mobile Phone Device Policy
Version 2.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1
COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1 1. INTRODUCTION The purpose of this policy is to: I. Regulate access to Manukau Institute of Technology ( MIT ) Computer Systems ensuring they
Welcome to Dubai English Speaking School. DESS BYOD Information Pack
Welcome to Dubai English Speaking School DESS BYOD Information Pack 2015/2016 CONTENTS Bring Your Own Device (BYOD) Frequently Asked Questions 1-3 Responsible Use Policy and Agreement Form 2015/16 4-5
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and
[Example] Social Media Acceptable Use Policy
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
IT1. Acceptable Use of Information Technology Resources. Policies and Procedures
IT1 Policies and Procedures Acceptable Use of Information Technology Resources Originator: Information Technology Governance Committee Approver: President s Council Effective: October 16, 2007 Replaces:
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
The Cyprus mobile operators Code of Practice for the responsible and secure use of mobile services. Final version for publication
The Cyprus mobile operators Code of Practice for the responsible and secure use of mobile services. Final version for publication The Cyprus mobile operators code of practice for the responsible and secure
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
Please Note: This is the Eastern School District policy in its entirety. Not all regulations are relevant to a K-6 school. Policy Statement ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY All
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Abilene Independent School District. Bring Your Own Device Handbook
Abilene Independent School District Bring Your Own Device Handbook Abilene ISD BYOD Handbook Revised 2012 Definition Bring Your Own Device (BYOD) is a policy that allows students to bring and use their
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
MEDWAY PUBLIC SCHOOLS Medway, MA. Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12
MEDWAY PUBLIC SCHOOLS Medway, MA Policy #21-A Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12 The District s goal in providing computer network technology and Internet access
CITY OF SALINE CELL PHONE POLICY
CITY OF SALINE CELL PHONE POLICY Purpose The City of Saline acknowledges that to provide efficient services to its citizens some of its employees must be available either 24x7 or while they are away from
Standard of Direct Mail Fundraising Practice
Fundraising Practice The provides guidelines for best practice and ethical conduct of fundraising practice. This Standard must be read in context with FIA s Principles of, including the Code of Ethics
BRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +
Hyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
Electronic Communication
Electronic Communication Information Technology Policy Identifier: IT-002 Revision Date: 10/1/2015 Effective Date: 10/18/2012 Approved by: BOR Approved on date: 10/18/2012 Table of Contents 1. Introduction...
Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Internet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low
Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy
TERMS OF SERVICE TELEPORT REQUEST RECEIVERS
TERMS OF SERVICE These terms of service and the documents referred to in them ( Terms ) govern your access to and use of our services, including our website teleportapp.co ( our site ), applications, buttons,
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
Franciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D
Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D 1. PURPOSE SWC owns and operates a variety of computing systems which are provided for the use of the Sisseton Wahpeton
Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement
111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use
Information Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
USE OF PERSONAL MOBILE DEVICES POLICY
Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014
How To Use The Internet Safely
Administrative Procedure 140 DISTRICT-WIDE NETWORK AND INTERNET APPROPRIATE USE Background School District No.43 (Coquitlam)'s District-wide network provides data communication links among all District
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
Bring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Purpose is committed to supporting student learning experiences within a highly functioning environment. Our classrooms are reliant on a range of leading-edge technologies
ICT Acceptable Use Policy
ICT Acceptable Use Policy Document Management Document Disclaimer This document is issued only for the purpose for which it is supplied. Document Owner This document is produced and owned by Staffordshire
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
Information Management Advice 57 Sample Social Media Acceptable Use Policy
Information Management Advice 57 Sample Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
Angard Acceptable Use Policy
Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants
Bring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
DUUS Information Technology (IT) Acceptable Use Policy
DUUS Information Technology (IT) Acceptable Use Policy Issue Date: October 1, 2013 Effective Date: October 1, 2013 Revised Date: Number: DHHS-2013-002 1.0 Purpose and Objectives The purpose of this policy
Policies Middletown Public Schools Employee Telecommunications Equipment and Use Policy EMPLOYEES TELECOMMUNICATIONS EQUIPMENT AND USE POLICY
Policies Middletown Public Schools Employee Telecommunications Equipment and Use Policy No. EMPLOYEES TELECOMMUNICATIONS EQUIPMENT AND USE POLICY The Middletown Public Schools recognizes that the use of
Information Governance Policy
Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
