Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
|
|
|
- Holly Armstrong
- 10 years ago
- Views:
Transcription
1 Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs the use of computer and telephone systems at Sheridan. It applies to all staff, students and any other users of the telephone or computer systems at Sheridan. All Sheridan staff, students and any other users are responsible for reading and understanding this Policy. Please note that any violation of this Policy by Sheridan staff may result in serious sanctions up to and including dismissal. Any violation by students may result in serious sanctions up to and including expulsion. If there are any questions concerning the Policy, please direct those inquiries to one of the following: -Human Resources -Student Affairs -a faculty member (for students) -Information Technology (I.T.) HelpDesk at extension 2150 or Property of Sheridan All telephone and computer systems at Sheridan (including hardware, software for which Sheridan is the licensee or owner, and storage space) are the property of Sheridan and have been acquired by Sheridan to enable and facilitate Sheridan s operations. Sheridan does permit limited use by employees and students of its systems, subject to the clear understanding that: i) any personal usage must be in compliance with Sheridan s rules and regulations, ii) no student or employee shall have any right of privacy or property rights* in connection with his/her usage of Sheridan s systems, and iii) at all times Sheridan has the right to monitor the usage of its systems, including checking any information or files stored, copied or recorded in any of Sheridan s systems. * Sheridan's property rights in its systems are distinct from any copyright rights which anindividual may have under Sheridan's Copyright Policy. Personal Accounts Generally, information stored in personal voice mail, or computer directories ("Personal Accounts"), is accessible only to the authorized owner of the account. However, users of these Personal Accounts should be advised that Sheridan reserves the right to monitor and/or access this data in order to conduct its business in a secure and reasonable manner and to ensure that its rules regarding usage of its systems are being followed. 1
2 Without limiting Sheridan's right to access Personal Accounts, please be advised that, in the following circumstances, Sheridan may access your Personal Accounts: 1. If the Personal Account holder is unavailable or absent and there is a pressing or urgent need to access information contained in the Personal Account. 2. If the Personal Account holder is suspected of any breach of this policy or other wrong doing involving Personal Accounts. 3. If compelled to do so by any law, including a request for information under the Freedom of Information & Protection of Privacy Act. 4. For the purpose of monitoring the usage by staff and students of Sheridan s systems in order to ensure compliance with the system, authorized Sheridan personnel may access Personal Accounts at any time. Access to Personal Accounts will only occur after signed authorization is received from a third level manager or more senior staff member. Passwords All Personal Accounts are protected by a password. The initial password is released to the person who requested the access to the Personal Account and should be changed by the Personal Account holder: i) the first time the account is accessed; ii) when there is any concern on the part of the Personal Account holder about the security of that password; or iii) when requested to do so by recognized Sheridan management, including Information Technology. The Personal Account holder is responsible for the proper use of the account, including password confidentiality, and has a resulting shared responsibility for the security of the entire system. The individual must take all reasonable precautions to prevent unauthorized access to the Account and the information stored therein. Further the account holder is fully accountable and responsible for any information stored in his/her accounts. Choosing a Password The following are recommended guidelines for creating an appropriate password: 1. Passwords must be at least 6 characters long. 2. Passwords should be composed of a combination of upper and lower case letters, numbers and special characters (e.g.!@#, etc.). 3. It is recommended that you change your password at least once a semester. 4. Never share your password with anyone (including I.T. staff). 5. Never write your password down, choose one that you can remember. 6. Do not use your userid or Sheridan ID number as your password. 7. Do not use a word found in a dictionary (even one for a foreign language). 8. Do not use a proper name or any variation of one (real or fictional). 9. Do not use a simple keyboard pattern (e.g. qwerty). 10. Do not reuse old passwords. 2
3 Account Management Individual managers have the responsibility of requesting either account deletion or partial removal of privileges when their staff leave or change jobs. The changes will be activated the day following the date of termination/reassignment. For Accounts that are deleted from the system, data that is contained in personal directories, whether work related or personal, will be deleted from the system 30 days after the account access is suspended. Information Technology also inactivates accounts based on employee termination/leave dates and student withdrawal/graduation dates. Data in voice mailboxes will be cleared on the date of termination/reassignment. Accounts that belong to staff who are leaving Sheridan for more than 60 days, either permanently or temporarily, and who will not require access while they are absent from Sheridan, should be disabled immediately to discourage unauthorized access. I.T. should be contacted to discuss archiving or transferring data if required. Temporary access to someone else's account or voice mailbox cannot be granted. Generally, temporary access to someone else's Personal Account will not be granted by Information Technology. Use of Accounts Each Personal Account holder or other user of Sheridan telephone or computer systems must comply with the following: 1. The Personal Account and password should be kept secure. The owner must log out of the Account when the workstation is left unattended. 2. The access granted to Sheridan's telephone and computer services is to be used for Sheridan business only and is not to be used to the detriment of Sheridan or any of its students or employees. 3. Access is for use of the account owner only and is not to be extended to others. 4. Access is not to be used for any illegal purpose. 5. Sheridan operates in compliance with existing Freedom of Information legislation. The user of any system who is privy to Sheridan data is expected to comply and to maintain confidentiality. 6. Access must not be used to harass, threaten or annoy others or to store or send messages which are pornographic, obscene, abusive, threatening, libellous, defamatory or harassing contrary to the Human Rights Code. This would include sending unwanted s to another after being requested not to do so. The Account owner is responsible for ensuring the use of the Account conforms to Sheridan policy and guidelines relating to harassment, discrimination or interaction with others. 7. The owner will not attempt to hide or misrepresent the originator of any communication he or she might initiate or forward. 8. The Account owner will not attempt to circumvent any security or control measures 3
4 implemented on Sheridan systems. 9. Access will not be used to monitor, interfere with or destroy work being done by others. 10. Access will not be used to knowingly degrade system performance or to knowingly or carelessly provide, run or install any program intended to damage any system. This includes, but is not limited to, programs known as computer viruses, Trojan horses or worms. 11. The individual owner of each Account is responsible for managing the information kept on the system to make efficient use of storage. 12. Installation or storage of illegal or pirated software on Sheridan systems is not tolerated. Unauthorized copying of Sheridan software is also illegal. 13. Where provided, users of any workstation are required to run anti-virus software before installing or using any floppy disk, including newly purchased software. 14. Each Account owner must be aware of and respect all copyrights, trademarks and other intellectual property rights for materials on Sheridan systems or the Internet, including the use of the Sheridan logo. 15. Account owners will not initiate or propagate chain letters. 16. The Account owner will not represent themselves as acting on behalf of Sheridan unless properly authorized to do so. 17. Access will not be used to access pornography, or any material that can be considered to be obscene, abusive, threatening, or harassing as described by the Human Rights Code, nor shall any such materials be stored, transmitted or printed using any Sheridan system. 18. Access will not be used by an employee or student for the purpose of carrying out any commercial undertaking or activity excepting only a commercial undertaking or activity authorized by Sheridan. 19. Access will not be used by any person for the purpose of gaining illegitimate or unauthorized access to personal accounts, resources, files, systems, databases, or information within any of Sheridan s systems or for the purpose of breaking into any other system outside Sheridan. No person shall change, enter, add or alter in any way any information within Sheridan s systems, files and databases without proper authorization. 20. Use of external access to contravene any of the above will be considered violation of the above (e.g., use of the Sheridan logo on a web page on an external ISP). All guidelines and policies apply to all resources whether access is initiated on-site or through a remote location. 4
5 Consequences of a Failure to Comply with this Policy Failure to comply with the above policy may result in disciplinary action. The nature and severity of Sheridan s action in this regard will be at Sheridan's discretion and will depend on influencing factors such as, the severity of the offence, its impact on others and Sheridan, and whether it is a repeat offence. These actions can include, without limitation, any of the following: 1. Account privileges being restricted or revoked; 2. Disciplinary action up to and including dismissal or expulsion from a course, program, or Sheridan; 3. Sheridan electing to seek appropriate penalties under existing legislation or other Sheridan policies. (Note: Some violations of the Policy are also covered under existing legislation such as Criminal Code of Canada and the Copyright Act or under other Sheridan policies such as the Harassment and Discrimination policy). External resources, including law enforcement, may be involved. Important Note: It is a criminal offence to obtain or use any computer service or system to wilfully destroy or alter data, to render data meaningless or useless, to obstruct or interfere with the lawful use of data or to deny access to data to anyone who is entitled to have access to such data. Information Technology - Handling Problems Generally, Information Technology will not deal unilaterally or directly with concerns brought to its attention relating to obscene, threatening or harassing behaviour. I.T. staff will advise that any situation involving students be referred to the Director, Student Affairs; problems not involving students will be referred as appropriate. I.T. will assist as requested in gathering information relating to problems and will act as requested by Sheridan in resolving them. I.T. reserves the right to act immediately and unilaterally when it determines there is an immediate security risk. Such action will be immediately reported to the appropriate Sheridan authorities or other related agencies for guidance and further follow-up. Sheridan Resources to Call in the Event of a Breach of this Policy Security Sheridan Security at the appropriate campus should be contacted immediately when there is a concern about safety or violation of any laws. Security works closely with other Sheridan resources in resolving any difficulties. Student Affairs Student Affairs is the prime contact in dealing with problems relating to students including interpersonal conflict, misuse of rights and responsibilities, and misuse of network accounts. Student Affairs will also initiate any formal disciplinary actions involving students. Problems or questions in this regard should be referred to Rob Till, Director, Student Affairs, at extension
6 Human Resources Human Resources is the prime contact in dealing with problems relating to any Sheridan employee and the misuse of his/her rights and responsibilities and misuse of network accounts as described in this Policy. Human Resources will assist Sheridan managers initiate any formal disciplinary actions involving Sheridan employees. Managers of Process Sheridan's Managers of Process will accept any call relating to staff, students or anyone who does business with Sheridan who may be involved in harassing or discriminating behaviour. Please refer to Sheridan's Harassment and Discrimination Policy for more information. 6
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of San Diego computing and network resources. This policy
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION
FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION DATE: June 10, 2015 REGULATION CHAPTER NO.: Chapter 5 REGULATION CHAPTER TITLE: Miscellaneous REGULATION TITLE AND NUMBER:
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
Niagara County Community College
Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Email Policy For Staff and Students
Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management
------------------- COMPUTER NETWORK AGREEMENT FORM
COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.
2.1 It is an offence under UK law to transmit, receive or store certain types of files.
Website Hosting Acceptable Use Policy 1. Introduction 1.1 Jarrett & Lam Consulting s Acceptable Use Policy for hosting customers to protect our resources, the resources of our customers and to ensure that
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
ACCEPTABLE USE OF TECHNOLOGY
IIBE Page 1 ACCEPTABLE USE OF TECHNOLOGY Internet and computer network and non-network access is available to authorized students, teachers, and other staff in the. Albemarle County Public Schools primary
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
If you have any questions about any of our policies, please contact the Customer Services Team.
Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D
Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D 1. PURPOSE SWC owns and operates a variety of computing systems which are provided for the use of the Sisseton Wahpeton
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
SOUTH DAKOTA BOARD OF REGENTS. Policy Manual
SOUTH DAKOTA BOARD OF REGENTS Policy Manual SUBJECT: Acceptable Use of Information Technology Systems NUMBER: 7:1 1. Purpose The Board acquires, maintains and operates information technology systems to
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
COMPUTER, INTERNET, & EMAIL USE POLICY
COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
POLICY MANUAL. Purpose
POLICY MANUAL POLICY IT_101 Page 1 of 7 Last Revision Date: September 14, 2011 Effective Date: April 15, 2002 Section Subject Title Computer Network/Internet/Information Resources Usage Purpose Computing
USE OF TECHNOLOGY RESOURCES IN INSTRUCTION
I-6400 2012 Arizona School Boards Association IJNDB USE OF TECHNOLOGY RESOURCES IN INSTRUCTION Appropriate use of Electronic Information Services The District may provide electronic information services
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).
Key 2 Communications Inc. Acceptable Use Policy Please read carefully before accessing and/or using the Key 2 Communications Inc. Web site and/or before opening an account with Key 2 Communications Inc..
POLICIES AND REGULATIONS Policy #78
Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Student Computer Usage Policies and Procedures I. Campus Computer Usage Overview: The purpose of this document is to define the policies and procedures
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
Email Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
