Internet Content Filter Exemption Request Form
|
|
|
- Betty Merritt
- 10 years ago
- Views:
Transcription
1 Internet Content Filter Exemption Request Form Version 2.0 This form maybe updated at anytime (without notice) to ensure changes to the HSE Internet Content Filter Standard and/or business practices are properly reflected in the form. Please ensure you check the HSE intranet for the most up to date version of this form
2 About this request form This request form must be completed in full (in block capitals) by HSE employee s who have a valid HSE work-related reason to access internet content that is otherwise filtered (blocked) by the HSE. The form must be completed on an individual basis, as group requests using a single request form will not be processed. The request must be approved and signed by the employee s line manager (at General Manager level (or equivalent) or above). Line managers have a responsibility to ensure they only approve and sign access requests on behalf of HSE employees, once they are satisfied the employee has a valid HSE worked related reason to access all categories and subcategories marked on the access request form. HSE employees are not permitted to approve their own access requests. In situations where the employee requesting the access holds the position of General Manager, the request must be approved by the employees Assistant National Director or above. In situations where the employee requesting the access holds the position of Assistant National Director, the request must be approved by the employees National Director or above. Employee should note, access to the technical user access groups (see section 2C of this form) is restricted to the relevant HSE ICT personnel only. The ICT Directorate reserves the right (without prior notification) to restrict or block access to certain categories or subcategories of internet content, which are identified as having a negative impact on the performance of HSE network, information systems and/or equipment. The completed request form must be posted or faxed back to the employee s local ICT Helpdesk / Call Centre. Incomplete and/or illegible request forms will not be processed and will be returned to the sender. Section 1.0: HSE Employee Details Name (Block Capitals):... Personnel Number:... User network ID (example psmyth1):... Directorate / Service Function: Location:.. Telephone number:.. HSE address:.. 2
3 Section 2.0: Internet Access Details Please tick each category and subcategory of blocked (filtered) internet content you require access to 2A. Custom User Access Groups Please tick each category/subcategory of blocked (filtered) internet content that you wish to have access to. Adult Material Sex Nudity Adult Content Bandwidth PG Internet Radio & TV Streaming Media Entertainment MP3 & Audio Download Miscellaneous Image Servers Dynamic Content Images (Media) Society & Lifestyles Social Networking Blogs & Personal Sites Personals & Dating Productivity PG Message Boards & Clubs Advertisements Online Brokerage & Trading Instant Messaging Gambling Games Weapons Military & Extremists Internet Communications Web Chat Illegal / Questionable Racism & Hate Tasteless Violence User Defined 2B. External Health & Governmental Servers Only complete this section, if you wish to request access to an external health or governmental server. Access to all other types of external servers (for example Hotmail, Gmail, eircom mail, etc) is strictly prohibited in accordance with the HSE Internet Content Filter Standard. Please enter the full internet address of the external health or governmental server you require access to (for example RCSI Mater Hospital 3
4 2C. Technical User Access Groups This section is for the use of the ICT Directorate only Access to these categories / subcategories is restricted to the relevant ICT personnel only. If this section of the form is ticked by non ICT personnel, the entire request form will be considered null and void. Bandwidth PG Peer-To-Peer File Sharing Personal Network Storage & Backup Miscellaneous Private IP Addresses File Download Servers Network Errors IT Technology Hacking Proxy Avoidance URL translation Web Hosting Web & Spam Productivity PG Freeware & Software Download Pay-To-Surf Security PG Bot Networks Spyware Malicious Software & Websites Malicious Embedded Link Malicious Embedded iframe Keyloggers Phishing & Other Frauds Potentially Unwanted Software Suspicious Embedded Link Section 3.0: Business Rationale This section must be completed in full, as failure to do so, may result in your request being denied Please give a detailed business reason (in block capitals) for each category and /or subcategory of blocked internet content you require access to. As a minimum the business case for each category / subcategory should include (1) why you need access to each category / subcategory, and (2) how access to each category / subcategory is relevant to your current HSE role: 4
5 Section 3.0: Business Rationale (Cont.) Section 4.0: HSE Employee Declaration I have read and I understand the HSE Electronic Communications Policy and all other relevant IT related policies ( and I agree to be bound by the terms therein. I understand and agree that the internet access which I have requested must only be used by me for official HSE business purposes and must not be shared with others including my HSE work colleague s. I also understand that any abuse of this internet access by me may lead to the removal of my internet access and could depending on the nature of the abuse, lead to disciplinary action, including suspension and dismissal as provided for in the HSE disciplinary procedures. I further understand that this level of internet access will be the subject of additional monitoring and the results of this monitoring maybe passed onto my line manager. Signature: Print Name:. Date:. 5
6 Section 5.0: HSE Line Manager Authorisation This section must be completed (In block capitals) by a HSE employee holding the position of General Manager (or equivalent) or above. Name (Block Capitals): Grade / Job Title:... Location:... Contact Telephone Number:. HSE Address:. I have reviewed this access request submitted on behalf of the above (as outlined in section 1.0) named HSE employee and I am satisfied that all categories and subcategories of internet content requested by the employee are appropriate, necessary and relevant to the employees current role within the HSE. Signature: Print Name:. Date:. It is the responsibility of individuals to ensure that all sections of the request form are completed in full as incomplete or illegible request forms will not be processed and will be returned to the sender. The completed request form must be posted or faxed back to your local ICT Helpdesk / Call Centre. 6
Internet Content Filter Standard Version 2.0
Version 2.0 Please check the HSE intranet for the most up to date version of this standard http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/ 1.0 Purpose
DriveLock Websecurity
Whitepaper DriveLock Websecurity Cloud-based internet security CenterTools Software GmbH 2015 Contents 1 DRIVELOCK WEBSECURITY... 2 1.1 WEBSECURITY CLOUDBASIERTE INTERNETSICHERHEIT... 2 1.2 KONFIGURATION
Singtel Business Fibre Broadband Security Suite. Customer User Guide
Singtel Business Fibre Broadband Security Suite Customer User Guide Table of Contents 1. Introduction... 3 2. Customer Portal... 4 2.1 Email Notification... 4 2.2 Activate your account.... 5 2.3 Manage
Acceptable Use Policy - Staff
Acceptable Use Policy - Staff 'Acceptable and Responsible Use of ICT Resources' This version was last modified APRIL 2013 by European Electronique IT Support 1. The benefits of Internet access for education
INTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
Why Websense Enterprise Beats SurfControl Web Filter VS
Why Websense Enterprise Beats SurfControl Web Filter VS Websense A Proven Enterprise Solution Founded in 1994, Websense is the world s leading Web filtering provider and is the preferred vendor of the
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
Bucksgfl Internet Web Filtering Policy
Bucksgfl Internet Web Filtering Introduction The requirement to ensure that children and young people are able to use the internet and related communications technologies appropriately and safely is addressed
Websense Web Filter to Blue Coat WebFilter Migration Guide
Websense Web Filter to Blue Coat WebFilter Migration Guide October 2011 Websense Web Filter to Blue Coat WebFilter Migration Guide Table of Contents URL Category Map: Websense Web Filter to Blue Coat WebFilter...3
Configuring Web (HTTP) and File Transfer (FTP) Traffic
CHAPTER 4 Configuring Web (HTTP) and File Transfer (FTP) Traffic This chapter describes how to make HTTP and FTP traffic configuration updates, and includes the following sections: Default Web and FTP
BBB, EDC, EDC-RA, EGI-RA, EHC-RA, IGS, JFA, JFA-RA, JHF-RA, JOA-RA, KBA-RB, KBB Superintendent of Schools
REGULATION Related Entries: Responsible Office: MONTGOMERY COUNTY PUBLIC SCHOOLS IGT-RA BBB, EDC, EDC-RA, EGI-RA, EHC-RA, IGS, JFA, JFA-RA, JHF-RA, JOA-RA, KBA-RB, KBB Superintendent of Schools User Responsibilities
Web DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. TRITON - Web Security is automatically configured to
Tuckahoe Student Office 365 & OneDrive User Procedures and Agreement
Tuckahoe Student Office 365 & OneDrive User Procedures and Agreement Tuckahoe Common School District 468 Magee Street Southampton, New York 11968 631-283-3550 Table of Contents Office 365 Overview... 2
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
Web DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. The Web Security manager is automatically configured
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
Domains belonging to a domain name registration service or a holder of domain names of unused websites.
Olfeo s list of categories International database Secure / Optimize / Analyze Internet usage Legal Risk Theme Category Description Security Risk Child/Teenage Pornography Counterfeiting and Copyright Infringement
POLICY ON USE OF INTERNET AND EMAIL
POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic
Stoke-on-Trent Grid for Learning Internet Web Filtering Policy
Stoke-on-Trent Grid for Learning Internet Web Filtering Policy Definitions Policy a policy is a collection of allowed categories of web site and groups of keywords that is applied to one or more workstations
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
INTERNET AND EMAIL POLICY
INTERNET AND EMAIL POLICY 1. Internet and Email General Policy 1.1. The school has software and systems in place, which can monitor and record all Internet and all email activities. You should be aware
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
Electronic Communications Policy
Electronic Communications Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected
CENTRAL CAMBRIA SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS CENTRAL CAMBRIA SCHOOL DISTRICT TITLE: NETWORK USAGE AND SAFETY ADOPTED: March 2, 2009 REVISED: 815. NETWORK USAGE AND SAFETY ENCOMPASSING LOCAL, INTRANET AND INTERNET NETWORKS
Configuring Web (HTTP) and File Transfer (FTP) Traffic
CHAPTER 4 Configuring Web (HTTP) and File Transfer (FTP) Traffic This chapter describes how to make HTTP and FTP traffic configuration updates, and includes the following sections: Default Web and FTP
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
F-Secure Mobile Security. Android
F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY
LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY 1. Introduction LETABA WIRELESS INTERNET CC is committed to complying with legislation and ensuring that all its customers have the ability to use its
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
Acceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
THE SCHOOL DISTRICT OF PHILADELPHIA
No. 815 SECTION: OPERATIONS THE SCHOOL DISTRICT OF PHILADELPHIA TITLE: ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES ADOPTED: March 15, 2012 REVISED: August 21, 2014 815. ACCEPTABLE USE OF
Chatham County Schools Network Acceptable Use Policy Agreement Policy and Forms 3225/7320
ACCEPTABLE USE OF VOICE, VIDEO AND DATA NETWORK Policy Code: 3225/7320 Chatham County Schools offers electronic network access for students, teachers, and staff within the school system. A component of
Olfeo's list of categories
Olfeo's list of categories Contents Legal Risk... 3 Security Risk... 5 Adult Content... 6 Risk of Unauthorized Disclosure... 7 Bandwidth... 8 Leisure and Social Activities...9 Education... 11 Consumer
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 5 08/25/2015 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective
Commonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
Burst Technology. bt-webfilter User Guide
Burst Technology presents bt-webfilter User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com
RIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
CyberPatrol SiteSURV Web Filtering User Manual
CyberPatrol SiteSURV Web Filtering User Manual Page 1 Table of Contents Table of Contents Overview... 3 Product Diagram... 3 How it Works... 3 Managing Internet Access... 4 Activating Your Account... 5
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
EMERSON PARK ACADEMY
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
WEBHOSTUK LIMITED General Terms & Conditions
WEBHOSTUK LIMITED Company No. 06804234 Registered in England and Wales. VAT Registration No. GB946132917 http://www.webhost.uk.net http://www.webhosting.uk.net WEBHOSTUK LIMITED General Terms & Conditions
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures
INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures Purpose The purpose of the ACH Network Acceptable Use Procedures is to provide the procedures, rules, guidelines,
Quincy Public Schools Information Technology. Acceptable Use Policy for Staff, Students, and Guests
Quincy Public Schools Information Technology Acceptable Use Policy for Staff, Students, and Guests Revised May 6, 2013 Introduction This Acceptable Use Policy is enacted as of May 2013 by the Quincy School
The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate.
Quick Start Guide 2 The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate. Going online for youngsters is fun, creative and exciting but it
Date: 2011/8/1. 1. N etwo r k Ne twork Config uration
WatchGuard XTMd oc XT M Configurat ion Document Date: 2011/8/1 Contents 1 Network 1-1 Network Configuration 1-2 Bridge 1-3 VLAN 1-4 WINS/DNS 1-5 Dynamic DNS 1-6 Multi-Wan 1-7 1-8 1-1 Nat 1-9 ARP Entries
Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Angard Acceptable Use Policy
Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants
Re: Request for information under the Freedom of Information Act 2000
Service Area - ICT Shared Service Name of service head Rob Miller Royal Borough of Kingston Ref: CAS-652682-V8S1S1 - FOI Request Enquiries to: ICT Shared Service 16 th June 2015 [email protected]
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
Please Note: This is the Eastern School District policy in its entirety. Not all regulations are relevant to a K-6 school. Policy Statement ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY All
Appropriate Use Policy Technology & Information
CLACKAMAS COUNTY EMPLOYMENT POLICY & PRACTICE (EPP) EPP # 59 Implemented: 05/20/10 Clerical Update: Appropriate Use Policy Technology & Information PURPOSE: To establish rules governing use of County information
Student Network Acceptable Use Policy Lone Jack C-6 School District
Student Network Acceptable Use Policy The, hereinafter known as LJC6, provides students and staff with a service called the Network. The Network is a computer service, which includes, but is not limited
