Usage Policy Document Profile Box

Size: px
Start display at page:

Download "Email Usage Policy Document Profile Box"

Transcription

1 Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee / individual: Date issued: May 2012 Review date: Target audience: Document owner: Approved by : IT Systems Manager / Information Governance Manager Information Governance Working Group 2 years from issue date All staff Director of Finance and Development

2 Version Control Version Release Date Author Status Comments Dec 2009 Steven Pratt Draft No changes post initial review period Dec 2009 Steven Pratt Live Sept 2011 Rahima Hoque Draft Renamed and Internet Policy from Usage Policy Full content review under all sections Oct 2011 Rahima Hoque / Steven Pratt Draft After discussion, agreed should be separate from Internet Policy. Definitions section added Nov 2011 Rahima Hoque Draft Following review by the IGWG: Changes to Appendix A & B Nov 2011 Rahima Hoque Draft Following comments from Policy Review Group: Formatting changed from 1.5 line spacing to 1. Trust logo updated. 9 Updated. Appendix A only relevant to office based staff. Appendix B includes standard footer Jan 2012 Rahima Hoque Final Ratified by Governance and Risk Committee. Did you print this document yourself? Please be advised that the Trust discourages the retention of hard copies of policies and can only guarantee that the policy on the Trust website is the most up-to-date version. Document Location The source of the document will be found in the Trust Quality System. Freedom of Information Act 2000 Access This document will be available via the NEAS Publication Scheme. North East Ambulance Service NHS Trust

3 Contents Section Page 1. Introduction 1 2. Purpose 1 3. Scope 1 4. Definitions 1 5. Responsibility and Accountability 2 6. Legal and Professional Obligations Monitoring 5 9. Equality and Diversity Statement Consultation, Approval and Ratification Process Review and Revision Arrangements Dissemination and Implementation Document Control Including Archiving Arrangements Monitoring Compliance With and the Effectiveness of Procedural 6 Documents References 7 Appendix A: Out of Office Guidelines for Staff 8 Appendix B: Signature Guidelines for Staff 9 North East Ambulance Service NHS Trust

4 Page Introduction 1.1. The Electronic Mail ( ) system is provided by the North East Ambulance Service (NEAS) to support staff in undertaking their duties All Trust employees have been provided with access in accordance with NEAS 76 PC User Account Pack which governs access to the Trust s information technology infrastructure The system must not be used to exchange any information, data, software, which could bring the Trust into disrepute or result in exposure to litigation or prosecution, by regulatory bodies The North East Ambulance Service (NEAS) reserves the right to monitor and record all communications sent or received via the service s network or computer equipment for violations of this policy. 2. Purpose 2.1. The aim of this policy is to govern the expected and appropriate usage of within the Trust business operation, whilst ensuring that the Trust is not exposed to additional security risks or threats. This will be achieved by complying with appropriate law and detailing expected standards / key deliverables that must be observed To do this NEAS will: Ensure availability - ensure that the system is available for users. Preserve integrity - protect the system from unauthorised or accidental modification ensuring the accuracy and completeness of the Trust s assets. Preserve confidentiality - protect assets against unauthorised disclosure. 3. Scope 3.1. This policy covers all sites utilised by NEAS. The policy applies to any individual employed, in any capacity, by the Trust Any breach of the policy is considered to be an offence and in that event, NEAS disciplinary procedures will apply. As a matter of good practice, other agencies and individuals working with the Trust, and who have access to the service, will be expected to have read and comply with this policy. 4. Definitions 4.1. Anti-Virus is a software program which helps protect a computer against being infected by a virus Encryption is the process of converting information into a form unintelligible to anyone except holders of a specific key or password Malware is a form of computer program designed with malicious intent. The intent may be to cause annoying pop-up ads with the hope you click on one and generate revenue, or forms of spyware and viruses that can be used to steal your identity or track your activities NHS Mail is the and directory service specifically designed to meet the needs of NHS staff which allows to be sent in an encrypted form. It is the only Department of Health (DoH) approved NHS service for securely exchanging personal data between NHS approved organisations but needs to be used by both sender and recipient in order to be secure Personal data is data which relate to an individual who can be identified from those data or from those data and other information which is in the possession of, or likely to come into the possession of the data controller, and includes any expression of opinion about the individual and any indication of the intentions of the data controller or any person in respect of the individual. Personal information includes name, address, date of birth, or any other unique identifier such as NHS Number, hospital number, national insurance number etc. It also includes information which, when presented in combination, may identify an individual e.g. postcode etc.

5 Page Spam the use of mailing lists to blanket forum groups or private boxes with indiscriminate, unsolicited messages of a promotional nature. 5. Responsibility and Accountability 5.1. All staff, including temporary agency workers and students, are personally responsible for ensuring that they are aware of and compliant with this policy. By signing either the PC User Account pack or Network Authorisation Form, staff have agreed to this policy and its guidelines and should be aware that a breach of this policy may be regarded as serious misconduct which would lead to disciplinary action or dismissal in accordance with disciplinary procedures. Staff should also be aware that usage will be monitored and any unacceptable usage will be acted upon Line Managers have a responsibility to ensure all current, new and temporary staff are instructed in their responsibilities in relation to the use of and work in a manner consistent with this Policy The Information Governance Working Group (IGWG) is responsible for developing, maintaining and implementing this policy The Information Governance (IG) team have a responsibility to: Monitor usage in conjunction with IT and reports to managers where breaches in security are identified Work with line managers and risk management leads in the investigation of potential breaches of this policy Implement secure processes to protect personal information transferred electronically 6. Legal and Professional Obligations All users shall comply with the relevant legislation. This includes the following: 6.1. Data Protection Act 1998/Freedom of Information Act Any information which the Trust holds is potentially disclosable to a requester under one of these pieces of legislation. This includes s too Users need to be sure that they are not breaching any data protection when they write and send s. This could include but is not limited to: Passing on personal information about an individual or third party without their consent. Keeping personal information longer than necessary Sending personal information to a country outside the EEA The Trust will ensure that any transfers of personal information outside of the European Economic Area are only completed when sufficient security exists within the receiving country The Trust will undertake or commission regular audits to assess its compliance with legal requirements Computer Misuse Act 1990 This Act makes it an offence to try and access any computer system for which authorisation has not been given Defamation Act 1996 Under this Act it is an offence to publish untrue statements which adversely affect the reputation of a person or group of persons Terrorism Act 2006 This Act has makes it a criminal offence to encourage terrorism and/or disseminate terrorist publications Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations This allows for any organisation to monitor or record communications (telephone, internet, , and fax) for defined business related purposes.

6 Page Introduction is an important means of communicating quickly and easily to support the business needs of the organisation. However can be used inappropriately, either deliberately or otherwise. Remember that any , sent or received, may have to be disclosed in litigation or in an internal or external investigation or following an access to records request or a request under the Freedom of Information Act Within the Trust, is established for business purposes. It is recognised that s may be occasionally used for non-work purposes, however this should be limited and should only be carried out in your own time. Remember that the content of any may be disclosable Key Principles / Standards Always consider whether is the most appropriate means of communicating and whether other forms of communication e.g. a telephone call might be more appropriate. is one method of communication and does not replace other forms of communication Never hold or send by anything which may be illegal or offensive e.g. obscene or pornographic messages or comments which could discriminate on grounds of age, gender, race, ethnic origin, religion, belief or sexual orientation. should not be used to access or pass on unsuitable material such as pornography or offensive or inappropriate jokes. Regard with suspicion s from addresses you don t recognise. Do not open attachments unless you are confident the is genuine Any sent from a personal internet account, e.g. john.smith@yahoo.co.uk containing business information cannot be classed as official business communication from the Trust sent externally from the Trust must contain an appropriate legal disclaimer and statement of confidentiality. Mail containing personal views must be clearly labelled as being representative only of the views of the sender, not of the Trust, and is not authorised or sent on behalf of the Trust and is the personal responsibility of the sender. It is the sender s responsibility to ensure that confidential s are sent via the appropriate secure medium and you should not forward on any confidential s without the permission of the originating author Many employees of the Trust will have private external accounts that are provided by Internet Service Providers (ISP s), which may be accessible via the Web, e.g. Hotmail accounts etc. These accounts must under no circumstances be used to transfer / forward confidential Trust information or for the transfer of confidential patient information. No s containing such information are to be sent to or from these accounts. The Trust strictly prohibits the automatically forwarding of any work s to personal accounts or devices Retain originals of all s likely to have evidential value in current or future legal proceedings (see Archiving and Retention Policy to be developed) Be aware of the Data Protection Act particularly the section which states Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. (Principle Five) Do not use the facility to send out attachments to a large group of staff such as Headquarters, NEAS Everyone or even A&E Team Leaders. Where information needs to be communicated via an attachment/s to more than twenty members of staff please ensure that you contact the Communications Department by ing the details to PublicRelations@neas.nhs.uk or telephoning who will advise you on how to post the document on the Intranet and will set up a suitable link out to the intended audience on your behalf NHS Mail Organisations within and aligned to the Trust have signed a Code of Connection to NHSnet, and therefore have the ability to send messages and documents to other NHS / Public sector organisations that are also connected. Organisations must comply with the rules of connection to NHSnet at all times. s sent via the NHSnet do not pass outside of the NHS Network,

7 Page i.e. they do not pass across the open Internet. At the present time although sent between NHSnet accounts is reasonably secure, there are no guarantees of confidentiality. Care should be taken when transferring person / patient identifiable information using this network and further information can be found in QSSD 610 Transfer of Personal Information Policy Through connection to NHSnet via N3, the Trust has the ability to send messages and documents globally across the Internet. being transmitted across the Internet is completely insecure without encryption. No patient identifiable / confidential information should be sent over the Internet without the use of an approved encryption certificate. At present, the Trust does not have encryption in place Managing your Ensure you manage your s appropriately. Do not keep messages unnecessarily. s containing information that needs to be kept should be removed from the Inbox for ease of retrieval and stored in a separate folder or an appropriate location on the network When you are out of the office for more than 24 hours ensure you adhere to the corporate standard on use of out of office functionality (see Appendix A) Users may need to set up systems to allow line managers to access an individual s s e.g. when off sick or on leave, and the content may be needed for patient/service user care. If a user agrees that this is appropriate they should seek guidance from the Information Governance Department on the best way of doing this Only attach files if really necessary. All papers for meetings should be contained within a shared folder with appropriate security and access. The organiser or individual delegated with responsibility may then send out an to all members of the group advising them of when papers are available utilising the hyperlink facility, possibly via the meeting request. Group members will then be responsible for accessing and performing any other actions such as printing etc. This ensures all members do not have their own personal copies therefore reducing and duplication and assisting with retention / storage policy / governance Use the group distribution lists appropriately, ensuring the distribution list represents your target audience Before sending, check that the correct address has been typed or chosen correctly. Messages can be addressed to the wrong person by mistake e.g. recipient with a similar name, automatic completion of an address by the system Don t use the reply to all functionality unless it is necessary for all copy recipients to know your response. Only use the delivery and read receipts available in Outlook if you need to know that an has been received and opened If you are sending an which is time related (for example section currently closed or applications for training received by ) please use the expiry function which automatically strikes through the message and removes any attachment to save space Content and style of Careful consideration should be given to the content and style of s. Staff should consider the consequences of their s, and avoid sending messages that may reflect badly on them or the Trust e.g. angry, rude, abusive or unconstructive messages Do not use capital letters throughout s (some people regard this as "shouting") Do not enter into contractual commitments by unless authorised to do so. Ensure you follow relevant Trust contracting procedures Use the agreed standards for format of s. Utilise the standard Trust signature identifying the sender and other contact details (telephone number, address, fax number) in s (Appendix B) In line with the Caldicott principles, when sending s ensure that the recipient is only sent the information that they need Subject headings must always be used, clearly defining the subject matter of the . Make clear whether the is sent for action or information and what the recipient(s) are being asked to do and by when. The expectation is that s sent to people are for action but s cc to people are for information. Don t assume the message will have been read, understood, agreed with or acted upon just because you have sent it. With the sheer

8 Page volume of messages that staff have to cope with it may have been missed Before sending an it should be checked for spelling and grammar and to make sure that nothing which is being written is ambiguous or open to misinterpretation. 8. Monitoring 8.1. Monitoring use Whilst the Trust accepts that each employee has the right to privacy, it reserves the right to check if it believes that an employee has been abusing that privilege e.g. using for commercial purposes outside of the Trust s business s clearly marked as personal, will not be accessed by the Trust unless there are clear grounds for suspecting misuse or illegal activity on the behalf of the user. Personal s sent or received using Trust systems must be clearly marked as personal in the subject line. If not marked in this way, they will be considered to be business communications and may be accessible by the Trust The monitoring software also has an monitoring element included within it. The software is used to capture traffic to scan for any content contained within the that may cause offence to staff, and to protect the staff and organisation by blocking the receiving of inappropriate s The software blocks s that contain material considered by the software dictionary to be inappropriate or any that is classed as spam or that contains a virus. These are placed in a quarantine area in their own category Ad hoc reporting In addition to regular reports, specific issues in Internet or usage may be highlighted by other means for example, a user s line manager. These would be reported to the Information Governance Team. In such a case, no information would be provided to the line manager, unless a clear breach of policy had been identified and then in line with the investigation process The line manager would be informed if the reports indicated that no specific issue had been highlighted by the monitoring system. Requests for investigation can only by authorised by a Director. 9. Equality and Diversity Statement 9.1. The Trust is committed to providing equality of opportunity, not only in its employment practices but also in the services for which it is responsible. As such, this document has been screened, and if necessary an EIA has been carried out on this document, to identify any potential discriminatory impact If relevant, recommendations from the assessment have been incorporated into the document and have been considered by the approving committee. The Trust also values and respects the diversity of its employees and the communities it serves. In applying this policy, the Trust will have due regard for the need to: Eliminate unlawful discrimination. Promote equality of opportunity. Provide for good relations between people of diverse groups. For further information on this, please contact the Equality and Diversity Department. 10. Consultation, Approval and Ratification Process This document has been produced by the author on behalf of the IGWG. This group was consulted upon and their comments added to the document as appropriate The Trust Policy Review Group is the committee with the authority for the review of this document. The Governance and Risk Committee have responsibility for ratification of this document.

9 Page The IGWG has carried out a full and proper consultation and has considered the content of the document in terms of current best practice, guidelines, legislation and mandatory and statutory requirements, in considering the document for approval the committee also took into account the results of the recommendations of the EIA. 11. Review and Revision Arrangements The document will be reviewed annually or when appropriate after changes in or guidance. The document owner will be responsible for this review. legislation 12. Dissemination and Implementation Dissemination This policy is available for all staff to access via the Trust Quality System. Staff without computer network access should contact their line manager for information on how to access policies All staff will be notified of new or revised documents via internal communications systems This document will also be included in the Publication Scheme for NEAS in compliance with the FOI Act Implementation This policy will be implemented in the following ways: Regular communications to staff on new policies and procedures through Information Governance circulars. Regular audit of IG processes undertaken in line with policies and procedures in key areas i.e. records management, confidentiality, information security, FOI and data quality. Monitoring through the Information Governance Toolkit (IGT) Training Training will be regularly assessed and refreshed in order that staff may remain appropriately skilled / knowledgeable over time Broad IG training will be included in the Trust induction programme. Additional training can be requested at the discretion of a manager, or by an individual wanting personal development along with mandatory yearly update training Further guidance and information relating to data protection issues will be distributed periodically via various media including the intranet site, The Pulse (monthly service journal) and via Document Control Including Archiving Arrangements Register / library of procedural documents All documents shall be held within the Trust Quality System and will be managed in line with quality standards Archiving arrangement Archiving of documents will be in line with QSSD 1315 Records Management Policy. 14. Monitoring Compliance With and the Effectiveness of Procedural Documents All staff must adhere to this policy and comply with applicable UK legislation. Failure to follow this policy and related IG policy and procedures may lead to disciplinary, criminal or civil action being taken against the staff member Any monitoring of usage by the Trust will be undertaken within the constraints of the Regulation of Investigatory Powers Act 2000 and the Lawful Business Practice Regulations, The Data Protection Act 1998 and the Human Rights Act The lawful business practice

10 Page regulations identify a number of purposes for which Trusts may monitor or record communications on their systems without the consent of the individual these are: To establish the existence of facts relevant to the business, such as keeping records of communications where it is necessary or desirable to know the specific facts of the conversation. To ascertain compliance with regulatory or self-regulatory practices or procedures relevant to the business, such as monitoring to ensure that the Trust Internet policy is being complied with. To ascertain standards which ought to be achieved by persons using the system. Quality control or staff training. To prevent or detect crime. To investigate or detect the unauthorised use of the system. To ensure effective operation of the system. For the purpose of determining whether or not they are communications relevant to the business Where the Trust intends to intercept communications without consent, the regulations require that all reasonable efforts are made to inform every person who may use the system that communications may be intercepted. This policy advises users that use of these systems is monitored, and by accessing these systems users have consented to this monitoring taking place. 15. References Department of Health NHS IG Guidance on Legal and Professional Obligations NHS Connecting for Health IG Toolkit NHS North of Tyne Policy No: NoT IG&T04, and Internet Acceptable Use Policy

11 Page Appendix A: Out of Office Guidelines for Office Based Staff The out of office function has now been adopted as a corporate standard across the Trust. Whenever you are planning to be out of the office for ½ a day or more you will need to use the Microsoft Outlook out of office function - please see information below for guidance on how to use it. This function allows you to send an automatic response to the person who has ed you. For Microsoft Outlook 2010: 1. Click the File tab, and then click the Info tab in the menu. 2. Click Automatic Replies (out of office). 3. In the Out of Office Assistant dialog box, select the Send Automatic Replies check box. 4. If you want to specify a set time and date range, select the Only send during this time range check box, set the Start time, and then set the End time. 5. In the Inside my organization tab, type the message that you want to send within your organization, and in the Outside my organization tab, type the message that you want to send outside your organization. 6. Click Apply. For Microsoft Office Outlook 2007 and earlier versions: 1. On the Tools menu, click Out of Office Assistant. 2. In the Out of Office Assistant dialog box, click I am currently Out of the Office. 3. In the Auto Reply only once to each sender with the following text box, type the message that you want to send while you are out of the office. Your out of office message must provide information on When you will return to the office Who to contact if the enquiry is urgent A sample message is provided below: Example standard message Thank you for your . I am out of the office until [insert date]. If your enquiry is urgent please contact [insert appropriate contact including and telephone number], alternatively I will deal with your on my return. Thank you Name Title/ job designation Contact details including telephone, and work mobile telephone

12 Page Appendix B: Signature Guidelines for Staff A standard footer will automatically be included in all outgoing s: NEAS accepts no responsibility or liability for the contents of this or any changes made after the original . Any views or opinions presented are solely those of the sender and do not necessarily represent those of NEAS NHS Trust unless otherwise specifically stated. If you are not the intended recipient (or responsible for delivery) of this and its attachments, please notify the sender and delete the and any copies made. The confidentiality of this cannot be guaranteed unless the contents are exempt from the FOI Act The signature function has now been adopted as a corporate standard across the Trust. Whenever you send an internally to a colleague or to an external recipient an signature with your contact details must be included. You will need to use the Microsoft Outlook signature function - please see information below for guidance on how to use it. This function allows you to send an automatic signature with your message. 1. Open a new message. On the Message tab, in the Include group, click Signature, and then click Signatures. 2. On the Signature tab, click New. 3. Type a name for the signature, and then click OK. 4. In the Edit signature box, type the text that you want to include in the signature. 5. To finish creating the signature, click OK. Example standard signature Name Job title The North East Ambulance Service NHS Foundation Trust Address 1 Address 2 Address 3 Town County Post code Phone Mobile phone Fax

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

Use of the Internet and E-Mail Policy

Use of the Internet and E-Mail Policy Use of the Internet and E-Mail Policy This procedural documentsupersedes : Use of the Internet and E-Mail Policy CORP/EMP 16 v.4 Name and title of author/reviewer Samantha Francis HR Advisor Date revised

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

Internet, E-mail and SMS Texting Usage Policy Group Policy

Internet, E-mail and SMS Texting Usage Policy Group Policy Internet, E-mail and SMS Texting Usage Policy Group Policy Scope: This Orbit Housing Group Limited ( Group ) policy provides a set of guidelines for all users within the Group on the proper usage of the

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.

All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid. Policy Type Information Governance Corporate Standing Operating Procedure Human Resources X Policy Name CCG IG03 Information Governance & Information Risk Policy Status Committee approved by Final Governance,

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience: E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:

More information

Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014

Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014 Email, Internet & Social Networking Policy Lead executive Name / title of author: Chief Nurse Colin Owen, Information Governance and Data Security Lead Date reviewed: October 2014 Date ratified: 5 th December

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire

More information

USE OF PERSONAL MOBILE DEVICES POLICY

USE OF PERSONAL MOBILE DEVICES POLICY Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Version Number Date Issued Review Date V1 25/01/2013 25/01/2013 25/01/2014. NHS North of Tyne Information Governance Manager Consultation

Version Number Date Issued Review Date V1 25/01/2013 25/01/2013 25/01/2014. NHS North of Tyne Information Governance Manager Consultation Northumberland, Newcastle North and East, Newcastle West, Gateshead, South Tyneside, Sunderland, North Durham, Durham Dales, Easington and Sedgefield, Darlington, Hartlepool and Stockton on Tees and South

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Trust Advantages and Disadvantages of Using Intranet

Trust Advantages and Disadvantages of Using Intranet Policy No: OP17 Version: 6.0 Name of Policy: Internet, Intranet and Email Acceptable Use Policy Effective From: 04/08/2015 Date Ratified 04/03/2015 Ratified Health Informatics Assurance Committee Review

More information

LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3

LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3 LINCOLNSHIRE COUNTY COUNCIL Information Security Policy Framework Document No. 8 Email Policy V1.3 Document Control Reference V1.3 Email Policy Date 17 July 2015 Author Approved by Version History David

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Electronic Mail Policy Version: 5 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

Policy Document Control Page. Updated to include new NHS mail encryption feature

Policy Document Control Page. Updated to include new NHS mail encryption feature Policy Document Control Page Title Title: Electronic Mail Policy Version: 6 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most

More information

Islington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014

Islington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014 A council-wide information technology policy Version 0.9 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document is distributed under the Creative Commons Attribution

More information

Internet and Social Media Policy

Internet and Social Media Policy Internet and Social Media Policy Page 1 of 19 Review and Amendment Log / Control Sheet Responsible Officer: Chief Officer Clinical Lead: Author: Date Approved: Committee: Version: Review Date: Medical

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

E-Mail and Internet Policy

E-Mail and Internet Policy E-Mail and Internet Policy Document reference Title: E-Mail and Internet Policy Product ID: Version Number: 8.0 Status: Live Distribution / Issue date: 12 November 2014 Author: K. Fairbrother Review Period:

More information

Information Governance Policy

Information Governance Policy Author: Susan Hall, Information Governance Manager Owner: Fiona Jamieson, Assistant Director of Healthcare Governance Publisher: Compliance Unit Date of first issue: February 2005 Version: 5 Date of version

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

Guidelines on developing a policy for managing email

Guidelines on developing a policy for managing email Guidelines on developing a policy for managing email Crown copyright 2004 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government

More information

How to Monitor Employee Web Browsing and Email Legally

How to Monitor Employee Web Browsing and Email Legally WHITEPAPER: HOW TO MONITOR EMPLOYEE WEB BROWSING AND EMAIL LEGALLY How to Monitor Employee Web Browsing and Email Legally ABSTRACT The Internet and email are indispensable resources in today s business

More information

Assistant Director of Facilities

Assistant Director of Facilities Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment

More information

POLICY ON USE OF INTERNET AND EMAIL

POLICY ON USE OF INTERNET AND EMAIL POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic

More information

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Reference: Information Governance Policy Date Approved: April 2013 Approving Body: Board of Trustees Implementation Date: April 2013 Version: 6 Supersedes: 5 Stakeholder groups

More information

INFORMATION GOVERNANCE STRATEGY

INFORMATION GOVERNANCE STRATEGY INFORMATION GOVERNANCE STRATEGY Page 1 of 10 Strategy Owner Valerie Penn, Head of Governance Strategy Author Caroline Law, Information Governance Project Manager Directorate Corporate Governance Ratifying

More information

Internet, Social Networking and Telephone Policy

Internet, Social Networking and Telephone Policy Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

Electronic Communications Monitoring Policy

Electronic Communications Monitoring Policy Electronic Communications Monitoring Policy Printed copies should not be considered the definitive version DOCUMENT CONTROL POLICY NO. 79 Policy Group Information Governance and Security Author Andrew

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Recommending Committee: Approving Committee: Information Governance Steering Group Patient Safety & Experience Council Signature: Designation: Chief Executive Date: Version Number:

More information

CCG: IG06: Records Management Policy and Strategy

CCG: IG06: Records Management Policy and Strategy Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Issued by: Senior Information Risk Owner Policy Classification: Policy No: POLIG001 Information Governance Issue No: 1 Date Issued: 18/11/2013 Page No: 1 of 16 Review Date:

More information

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013 Use of Social Networking Websites Policy START DATE: March, 2013 NEXT REVIEW: March 2015 COMMITTEE APPROVAL: Joint Management Trade Union Committee CHAIR S SIGNATURE: STAFF SIDE CHAIR S SIGNATURE: DATE:

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

Information Governance Performance Manager. Important Note: The Intranet version of this document is the only version that is maintained.

Information Governance Performance Manager. Important Note: The Intranet version of this document is the only version that is maintained. Document Summary DOCUMENT NUMBER DATE RATIFIED POL/002/004 14 October DATE IMPLEMENTED October 2013 NEXT REVIEW DATE October 2015 ACCOUNTABLE DIRECTOR POLICY AUTHOR Director of Business Development Information

More information

section 15 Computers, Email, Internet, and Communications

section 15 Computers, Email, Internet, and Communications section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property

More information

Information Governance

Information Governance Information Governance Information for Patients Information Governance (IG) Contents: Identifying the IG Lead for the Practice. This identifies the main people responsible for Information Governance Policy.

More information

Date of review: January 2016 Policy Category: Corporate Sponsor (Director): Chief Executive CONTENT SECTION DESCRIPTION PAGE.

Date of review: January 2016 Policy Category: Corporate Sponsor (Director): Chief Executive CONTENT SECTION DESCRIPTION PAGE. Title: Information Governance Policy Date Approved: Approved by: Date of review: Policy Ref: Issue: January 2015 Information Governance Group Division/Department: January 2016 Policy Category: ISP-04 5

More information

E-SAFETY POLICY 2014/15 Including:

E-SAFETY POLICY 2014/15 Including: E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable

More information

IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&TPP No. 2 Email Policy Version 3.04

More information

Advice leaflet Internet and e-mail policies

Advice leaflet Internet and e-mail policies Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.

More information

Information Management Policy CCG Policy Reference: IG 2 v4.1

Information Management Policy CCG Policy Reference: IG 2 v4.1 Information Management Policy CCG Policy Reference: IG 2 v4.1 Document Title: Policy Information Management Document Status: Final Page 1 of 15 Issue date: Nov-2015 Review date: Nov-2016 Document control

More information

Informatics Policy. Information Governance. Email and Internet Use and Monitoring Policy

Informatics Policy. Information Governance. Email and Internet Use and Monitoring Policy Informatics Policy Information Governance Document Control Document Title Author/Contact Document Reference 3539 Version 6 Pauline Nordoff-Tate, Information Assurance Manager Status Approved Publication

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

NHS Commissioning Board: Information governance policy

NHS Commissioning Board: Information governance policy NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION

More information

SOCIAL MEDIA POLICY. Senior Governance Officer, NHS North of England Commissioning Support Unit Reference No

SOCIAL MEDIA POLICY. Senior Governance Officer, NHS North of England Commissioning Support Unit Reference No SOCIAL MEDIA POLICY Ratified Governance & Risk Committee 08/2015 Status Final Issued August 2015 Approved By Governance and Risk Committee Consultation Governance and Risk Committee Equality Impact Assessment

More information

Email policy and practice

Email policy and practice Email policy and practice This policy applies to all staff (including agency workers, casual and temporary staff), visitors, contractors, students, alumni and researchers of Anglia Ruskin University, and

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Policy Summary This policy outlines the organisation s approach to the management of Information Governance and information handling. It explains the accountability and reporting

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

Using Public Computer Services in Somerset Libraries

Using Public Computer Services in Somerset Libraries Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet

More information

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy

More information

TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY

TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY Council Resolution No 313/03 adopted at the Ordinary Meeting of Council on 19 August 2003. PURPOSE

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

SAS TRUSTEE CORPORATION ( STC )

SAS TRUSTEE CORPORATION ( STC ) SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...

More information

Corporate Information Security Policy

Corporate Information Security Policy Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives

More information

TOWN OF COTTESLOE POLICY EMAIL MANAGEMENT

TOWN OF COTTESLOE POLICY EMAIL MANAGEMENT EMAIL MANAGEMENT POLICY STATEMENT Town of Cottesloe email accounts are intended for business transactions in support of the Town s strategic goals and objectives. Accordingly any email transmission residing

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

Information Sharing Policy

Information Sharing Policy Information Sharing Policy REFERENCE NUMBER IG 010 / 0v3 February 2013 VERSION V1.0 APPROVING COMMITTEE & DATE Clinical Executive Committee 5.2.13 REVIEW DUE DATE February 2016 West Lancashire CCG is committed

More information

[Example] Social Media Acceptable Use Policy

[Example] Social Media Acceptable Use Policy [Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

Electronic Communications and. Guidance note and template policy

Electronic Communications and. Guidance note and template policy Electronic Communications and Internet policy Guidance note and template policy When employing staff it is useful to create a policy which sets out your standards and requirements of your staff when they

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Information Governance Policy Issue Date: June 2014 Document Number: POL_1008 Prepared by: Information Governance Senior Manager Insert heading depending on Insert line heading

More information

Information Governance Strategy

Information Governance Strategy Information Governance Strategy Document Status Draft Version: V2.1 DOCUMENT CHANGE HISTORY Initiated by Date Author Information Governance Requirements September 2007 Information Governance Group Version

More information

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by : GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation

More information

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy 1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited

More information

BRIGHAM AND WOMEN S HOSPITAL

BRIGHAM AND WOMEN S HOSPITAL BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy

More information

UTC Cambridge ICT Policy

UTC Cambridge ICT Policy UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information