Management Policy

Size: px
Start display at page:

Download "E-Mail Management Policy"

Transcription

1 Information Management Standards & Procedures Management Policy Appendices: A. Decision Matrix For Records Management 1 st December 2009 Document Version: 1.0 Page 1 of 14

2 Contents 1.0 Document Control and Information Annual Version History Approval History Introduction Scope & Purpose Definitions Information Management Standard Managing Types of Corporate Standards and Guidelines Retention and deletion Message content, formatting and attachments Circulation and distribution lists Signatures Etiquette and professionalism Out of office, account activity and absence planning Mobile and home working Restrictions on the use of Corporate Personal and sensitive information Offensive Material Personal Use of Monitoring and audit Responsibilities Appendices Index Further Information and links Insite Pages: Useful training resources: Related Documents: Page 2 of 14

3 1.0 Document Control and Information IMPORTANT: Before reading this document please check the status and version number. Please check that this is a published version before undertaking any recommended actions. The current versions of Information Management Policies are available via Insite and the staff handbook. If you have received this document via another source please check Insite: Staff Handbook; Information Management and Security to ensure you have the latest version for release. Title Management Standard Status Updated Version Version N o. 1.1 Issue Date 01/12/2009 Primary Author Geoff Smith Position Corporate Records Manager Quality Reviewed By IM Programme Board Date of Review 12/02/2010 Revision Details Amended to incorporate Acceptable Use of s 1.1 Annual Version History Title Version # Date of release Records Standard Reason for change Owner /02/2009 First Version Corporate Records manager 1.2 Approval History Approved By Head Of Information Management Date Of Approval 16/02/09 Page 3 of 14

4 2.0 Introduction continues to provide a number of vital functions in the conduct of day to day business activities. Under current legislation can be requested as part of the Freedom Of Information Act and can be called upon as evidence in a Court of Law. Employees must, therefore, be able to retrieve records, demonstrate their authenticity and demonstrate effective Record keeping practices. This standard has been introduced to assist employees manage their records, to ensure that important s are not discarded and ensure the quality of information within the Council. 3.0 Scope & Purpose The purpose of this standard is to explain how good management contributes to better service delivery, and how records must be managed. This standard applies to the creation, management and disposal of s by Council employees. 4.0 Definitions An , within the context of this standard, refers to both the text message and the attachment that may be created or received by a member of staff. can be used to authorise business transactions, from approving new policies to authorizing expenditures. Individual messages and their content are therefore essential in the conduct of Council business. 5.0 Information Management Standard The Council allows all staff to create, manage, receive and dispose of . The Council has a legal duty to manage the information it produces, treat information as a valuable resource, comply with regulatory requirements and maintain quality information. This includes all s that record key transactions or Records. This document establishes a corporate standard for management, from the creation or , the quality of content, the acceptable use of systems and identification of records to their disposal. 6.0 Managing is subject to the same laws as paper and other electronic records and must be managed in a similar manner. There are benefits to improving the management of records including: can be made accessible to other employees within the Council in a controlled manner. Page 4 of 14

5 can be linked (or filed with) other records relating to the same transaction, placing the record in context. s will be managed as records and disposed of according to the Council s retention and disposal schedule 7.0 Types of created or received can be divided into three different types: Business Short-term Personal 7.1 Business business forms part of the department s records and documents important business activities. Examples of which form part of the department records include: A communication between staff in which a formal approval is recorded A direction for an important course of action A discussion between staff where the context results in a decision being formulated Records of conversations Business correspondence received from outside or inside the department These records must be retained to provide evidence of business activity and meet legal requirements. 7.2 Short Term Short term facilitates department business but is of a trivial nature or short term value. It does not need to be saved into a filing system. Examples of this type of include: Notices of meetings Copies of minutes Copies if reports or newsletters Internal work related received by carbon copy (CC) or blind copy (BCC). 7.3 Personal personal relates to a private or personal matter and has nothing to do with the business of the department. Examples of personal s include: Personal/family arrangements Unsolicited information or newsletters (i.e. not related to staff work responsibilities) 8.0 Corporate Standards and Guidelines 8.1 Retention and deletion The majority of should be regarded as ephemeral information. That is, information that is useful on a daily basis but does not have long-term value to the Page 5 of 14

6 business. that is considered to have longer term value to the business must be treated as a formal record and filed outside of the system in the appropriate repository such as on the corporate EDRMS or a designated and secure network drive (i.e. fileshare). that does not have long-term value to the business must be deleted from the e- mail system (including the trash folder). should not be retained in the system for a period longer than 6 months 1 and files should be reviewed and deleted at least monthly. Staff should not keep all just in case it is required. containing information that has a legal or business requirement or must be retained for audit purposes must be filed in the appropriate repository, where it is either searchable (e.g. corporate EDRMS) or appropriately classified in a folder on the network and can be accessed quickly. Users should think carefully about the subject matter, which colleagues require access to the information and should not rely on an individual knowing its location in order to retrieve it. s are used for a number of different purposes therefore the retention period for an record must be determined by its contents. The decision matrix (Appendix A) provides a guide to determining which messages should be saved as records. 8.2 Message content, formatting and attachments The same care should be taken in writing as any other business correspondence. Appropriate professional language must be used. A subject heading must always be identified and the should be concise and reflect the subject matter. Use paragraphs to improve readability. Before sending your message always check spelling and re-read your message to ensure it is appropriate. A corporate standard font is not prescribed but the font used must be considered readable and staff should avoid using elaborate fonts. These may look unprofessional to the recipient or be difficult to read. Also, avoid using coloured fonts and use black on white text, unless there is a specific individual requirement for the recipient, for example a visual impairment or dyslexia. When replying to , always include the original to provide a context to the message. Refer in the text to an attachment if sending one and avoid attaching large files, as they will affect the performance of the network. For documents over 2MB always consider if there is a more appropriate way of sharing the information such as a link to a network fileshare or publishing the document on Insite if that is appropriate. A general guide to the size of attachments sent over Leicester City Council s network and the prescribed action is detailed in the table below: 1 See LCC Retention of Records Policy Staff Handbook: Information Management and Security Page 6 of 14

7 Size of attachment Frequency of circulation Action Up to 1MB Any This is acceptable use 1 to 2MB Occasional This is acceptable use 1 to 2MB Frequent Consider publication on Insite or another appropriate repository Over 2MB Any Consider publication on Insite or another appropriate repository Over 12 MB Any Unacceptable use, another information sharing medium must be used 8.3 Circulation and distribution lists Ensure that addresses are for the intended recipients to avoid embarrassment; or at worst; disclosure of sensitive information to unauthorised recipients. users must consider carefully whether it is necessary to copy individuals into messages to avoid any unnecessary network traffic. For example, it may not always be necessary to copy a manager into . Users should not automatically retain a copy of all sent messages and must decide on a message by message basis whether a copy of a sent message is to be retained and review their sent mail monthly and delete if no longer required. may be used as a medium to broadcast information across departments or even corporately subject to the following guidelines. 2 The subject of the should be relevant to the majority of recipients and should be urgent in nature. To promote a corporate sponsored event; e.g. Dissemination of urgent or very important information; e.g. the council achieving the 4 th Beacon Council award Notification of a business related incident that will impact the majority of staff; e.g. a major interruption to electricity supplies It would not be acceptable to use a corporate to: Canvas for personal sponsorship Marketing an internally traded service (these internal sales activities should be carried out on Insite). Selling personal items Diligent management of distributions lists is required. If distribution lists are not maintained correctly then messages will not go to the intended recipients which can have negative consequences ranging from embarrassment to improper disclosure of sensitive information. 2 Further detailed technical guidance and advice on GroupWise use for Corporately distributed s available via Staff Handbook: Information and Communications Technology Page 7 of 14

8 8.4 Signatures Always include a signature at least once in an message. Your signature must contain your full name, job title or role, department, division, team and contact information. s to external organisations must state that you are representing Leicester City Council. 8.5 Etiquette and professionalism These general guidelines provide advice on how to send an effective message in a professional environment. Length: The must be concise and to the point but must not be abrupt. Where must go into more detail consider whether an attached word document maybe more appropriate, particularly if your reads more like a report than a summary. Do not use abbreviations in e.g. plz for please. This may be appropriate for instant messaging or SMS (text) messages, but is not appropriate for business communication. Tone: The tone of is a difficult thing to explain, it is much more difficult to convey an appropriate tone in written language than in a meeting or a telephone call. In some circumstances, therefore particularly on a matter of sensitivity, then a phone call or meeting may be more appropriate. The best course of action in determining an appropriate tone is a diligent approach and good habits of reading and re-reading your before hitting the send button. The desired outcome is to come across as professional, approachable and respectful as opposed to curt, demanding and too informal. o Use of Emoticons: Experienced users often use emoticons to convey a certain tone. Emoticons are little faces made up by arranging parentheses, colons, and semi-colons for example :),to represent a happy face and :(,to represent a sad face. Use good judgement here; emoticons maybe useful when liaising regularly with a long-term colleague but it is too informal for the majority of business relationships. Do not use uppercase text for whole words, e.g. HELLO, it reads like you are shouting. If there are disputes or differences of opinion at work, is not an appropriate medium to use and copying in managers and colleagues to add weight to an argument is not considered good practice. A meeting or telephone call to discuss the issue is usually more appropriate. 8.6 Out of office, account activity and absence planning An account should be actively used and maintained at all times. If the account is a generic representing a service or unit then there must be a designated officer, either on a permanent or rota basis, responsible for its management and they must ensure messages are responded to. It is not acceptable for an account to be left unmanaged for prolonged periods of time. Page 8 of 14

9 For periods of absence longer than 3 weeks it may be appropriate to temporarily disable or redirect messages to a responsible colleague. Staff must discuss appropriate arrangements with their line management and log calls for any action required on the ICT support helpdesk. At least 10 working days notice for technical services to respond is required in advance of the proposed absence date. Where staff are on leave from duty arrangements, an alternative contact must be identified and must be explicitly stated in an appropriate automated out of office message. Also, details of the message should state when they are able to respond to messages and when they are likely to return to their duties. On returning to work, it may be appropriate to send a further automated reply explaining there is a large backlog of mail and therefore there may be a reasonable delay in responding to messages. If an individual leaves the organisation it is their responsibility to ensure that the appropriate application access form instructing the account to be deleted is processed and authorised by their line management. 8.7 Mobile and home working is becoming increasing associated with working on the move or out of the office environment. Although there are distinct benefits for the time this saves the business, users must ensure they spend the same amount of time and care sending form a mobile device such as a blackberry. The same diligent approach applies to sending business related from their home computer, for example via webmail, as if they were working from their desktop computer at the office. Make sure that mobile devices are switched off or silent during meetings. alert tones during a meeting are not considered polite business practice. As a rule staff should refrain from answering s whilst attending meetings and other business events. 9.0 Restrictions on the use of Corporate 9.1 Personal and sensitive information 3 No personal details of individuals must be included in as a general rule, unless you have agreement from the data subject, i.e. the person who the information is about. In some circumstances, such as relating to Child Protection and Youth Offending, use of a corporately identified secure system such as Criminal Justice Secure (CJSM) to transfer personal details between approved agencies can be authorised. This is the responsibility of the relevant agencies and services. Any requirements for such agreements must be progressed in accordance with the corporate Head of Information Security & corporate Head of Information Governance. 3 Refer to the Staff Handbook Information Governance for detailed advice on the Data Protection Act and processing personal information. Page 9 of 14

10 It is explicitly forbidden to send any payment card details, even if the details are encrypted. Payment Card details are defined as account numbers, card-holder details, issue numbers and any other information derived from a payment card. A payment card is any card that can be used for payment of goods and services such as a credit or debit card. must NEVER be used to send a card verification code or value (the threedigit or four-digit number printed on the front or back of a payment card used to verify cardholder-not-present transactions) or PIN verification data. 9.2 Offensive Material It is unacceptable to send containing offensive material and would be a breach of Leicester City Council s Terms and Conditions of work 4. This includes material that may be considered: Discriminatory in breach of Leicester City Council s Equalities Policy 5 Specifically; Considered offensive to others due to their colour, race or ethnic background Considered offensive to others due to their gender Considered offensive to others due to their sexual orientation Considered offensive to others due to their disability Considered offensive to others due to their religious or other beliefs Considered offensive to others due to their national origin Considered offensive to others due to their marital status Considered offensive to others due to their membership of a trade union. Pornographic; including images and text Any communication considered to be bullying or harassment Inappropriate language such as sexual swearwords Anything else that can reasonably be considered material with the intention to offend 9.3 Personal Use of This is strictly forbidden and is considered unacceptable use of Leicester City Council s resources. Use of for personal reasons (not relating to your work for Leicester City Council) is contrary to your conditions of employment. The two major risks relate to lost working time and the risk of breaching the council s ICT security 6. The use of for personal use significantly increase the risks of harmful such as SPAM (unsolicited that takes up network resources), Phishing attacks ( designed to extract personal information for illegal purposes) and computer viruses and malware (harmful programs designed to cause damage to the Council s network) 7 4 LCC Terms and Condtions: Appendix V Leicester City Council Employees Code Of Conduct And Behaviour At Work 5 See Insite Staff Handbook: Equalities 6 See Leicester City Council Staff Handbook: Information Management and Security: Acceptable Use Policy 7 Page 10 of 14

11 9.4 Monitoring and audit Records of every sent or received are recorded against each user account This means that if there is reasonable cause to investigate unacceptable use and breaches of this policy then specific records of transactions can be reported on if required, subject to Internal Audit procedures Responsibilities Leicester City Council is responsible for issuing best practice guidance in relation to all aspects of management. This includes providing guidance on the categories of s that should be retained and their retention periods. Individual staff are responsible for managing their own records by: Identifying and retaining records Avoiding inappropriate destruction of records Applying Council wide retention periods to their records. Page 11 of 14

12 Appendices Index. A. Decision Matrix For Records Management. Co 1 st December Further Information and links Insite Pages: Staff Handbook for Information Governance Staff Handbook for Information Management and Security Information Management Strategy and Programme Insite Page Useful training resources: Bob s Business; Information Security Learning tool. Available on your Council desktop computer Related Documents: Information Management Strategy Information Management Policy Information Security policy Retention & Disposal Policy Page 12 of 14

13 Appendix A Decision Matrix For Records Management This decision table will help employees decide which records to keep. Answer the questions in the left column and follow each decision step, until you fond the answer you require. Sending s Yes No 1. Does it relate to work? Go to 2 is personal and can be deleted. 2. Am I sending an to another staff member (or members) that requires action? Save as business record. Go to 3 3. Am I sending an to another staff member (of members) which authorizes a piece of work? 4. Am I sending an to a person external to department which is business correspondence? 5. Am I forwarding an I received in which I am requesting an action? 6. Am I forwarding an I received just for information? 7. Am I replying to an sent by a corporate department employee? 8. Am I replying to an sent by a person external to department? Save as business record. Save as business record. Save as business record. is for information only and is therefore short term. Delete when no longer required or after 6 months. is for information only and is therefore short term. Delete when no longer required or after 6 months. Save as business record. Go to 4 Go to 5 Go to 6 Go to 7 Go to 8 Receiving s Yes No 1. Does it relate to work? Go to 2 is personal and can be deleted 2. Was the sent or forwarded by a Departmental Employee? Go to 3 Go to 5 3. Was the sent for information purposes only i.e. as a BCC or CC? 4. Was the a reply to one I had sent and contains further information or action? 5. Was the from an external source or a service based employee? Page 13 of 14 No need to save. is a business record and should be saved by the originator. Save as business record. Save as business record Go to 4 Go to 5

14 Page 14 of 14

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience: E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3

LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3 LINCOLNSHIRE COUNTY COUNCIL Information Security Policy Framework Document No. 8 Email Policy V1.3 Document Control Reference V1.3 Email Policy Date 17 July 2015 Author Approved by Version History David

More information

Information Management Advice 27 Managing Email

Information Management Advice 27 Managing Email Introduction Email is a critical communication mechanism for Tasmanian Government Agencies and a fundamental tool for conducting business. Emails, like State records in other formats, should be captured

More information

Management of Email Records

Management of Email Records Department of Culture and the Arts Government of Western Australia State Records Office of Western Australia SRO Guideline Management of Email Records A Recordkeeping Guideline for State Organizations

More information

You ve Got Email Etiquette

You ve Got Email Etiquette You ve Got Email Etiquette Email has become a way of life! We use it instead of snail mail and telephone calls. It has become a powerful tool, but can be a terrible thing if used incorrectly. Be concise

More information

DIGITAL TECHNOLOGY POLICY St Example s School

DIGITAL TECHNOLOGY POLICY St Example s School DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

COLLEGE POLICY MANUAL

COLLEGE POLICY MANUAL Policy No. & Title: C202: ACCEPTABLE USE OF COLLEGE TECHNOLOGY Effective: 2015-07-14 Next Review: 2020-07-14 Policy Sponsor: Chief Information Officer Ref Cttee: Senior Leadership Council Approvals: 2000-05-03/SA-99-09;

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

Email Acceptable Use Policy

Email Acceptable Use Policy Email Acceptable Use Policy Document Owner : SCC Chief Information Officer Version : 3.2 Date : May 2011 We will on request produce this policy/procedure, or particular parts of it, in other languages

More information

UNESCO-IHE Code of Conduct regarding Information Technology (IT)

UNESCO-IHE Code of Conduct regarding Information Technology (IT) UNESCO-IHE Code of Conduct regarding Information Technology (IT) Introduction The use of computers within all the domains of UNESCO-IHE (education, research, administration, projects and marketing & communications)

More information

TOWN OF COTTESLOE POLICY EMAIL MANAGEMENT

TOWN OF COTTESLOE POLICY EMAIL MANAGEMENT EMAIL MANAGEMENT POLICY STATEMENT Town of Cottesloe email accounts are intended for business transactions in support of the Town s strategic goals and objectives. Accordingly any email transmission residing

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

Assistant Director of Facilities

Assistant Director of Facilities Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

Using Public Computer Services in Somerset Libraries

Using Public Computer Services in Somerset Libraries Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

Evidence additional element appendix 47. Records Management Guidance for the management of emails

Evidence additional element appendix 47. Records Management Guidance for the management of emails Records Management Guidance for the management of emails 2010 1 Document Control Sheet Name of Document: Guidelines for the Management of Emails as Records 2010 Author: Consultees Description of Content:

More information

DATA PROTECTION AND DATA STORAGE POLICY

DATA PROTECTION AND DATA STORAGE POLICY DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

INTERNET AND EMAIL USE BY STATE SERVICE OFFICERS AND EMPLOYEES

INTERNET AND EMAIL USE BY STATE SERVICE OFFICERS AND EMPLOYEES Employment Direction No. 12 INTERNET AND EMAIL USE BY STATE SERVICE OFFICERS AND EMPLOYEES Operative Date: 4 February 20 13 Directive Pursuant to Section 17 of the State Serv/ce Act 2000, I hereby direct

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

POLICY AND PROCEDURES OFFICE OF COMMUNICATIONS. Email Best Practices. Table of Contents

POLICY AND PROCEDURES OFFICE OF COMMUNICATIONS. Email Best Practices. Table of Contents POLICY AND PROCEDURES OFFICE OF COMMUNICATIONS Email Best Practices Table of Contents PURPOSE...1 BACKGROUND...1 POLICY...1 RESPONSIBILITIES...2 PROCEDURES...2 REFERENCES...2 DEFINITIONS...3 EFFECTIVE

More information

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful

More information

Internet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014

Internet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014 Internet Acceptable Use Policy A council-wide information management policy Version 1.5 June 2014 Copyright Notification Copyright London Borough of Islington 20134This document is distributed under the

More information

John of Rolleston Primary School

John of Rolleston Primary School John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

Date of review: Information Governance Group January 2016. Policy Category: CONTENT SECTION DESCRIPTION PAGE

Date of review: Information Governance Group January 2016. Policy Category: CONTENT SECTION DESCRIPTION PAGE Title: Date Approved: January 2015 Division/Department: Corporate Services Corporate Records Policy Approved by: Date of review: Information Governance Group January 2016 Author (post-holder): Interim

More information

SOCIAL MEDIA and E-SAFETY POLICY

SOCIAL MEDIA and E-SAFETY POLICY SOCIAL MEDIA and E-SAFETY POLICY Background The internet and Social Networking revolution have created new and instantaneous channels for information sharing and communication which are freely available

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

Information Governance Policy

Information Governance Policy Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its

More information

1 Policy Statement. 2 Rationale

1 Policy Statement. 2 Rationale POLICY TITLE: ELECTRONIC DOCUMENT MANAGEMENT YEAR OF PUBLICATION: 2008 IDENTIFIER: LEGISLATION: ACSI 33 Australian Government Information &Communication Crimes (Offences Against the Government) Act 1989

More information

Code of Practice for E-mail Users

Code of Practice for E-mail Users Code of Practice for E-mail Users Page 1 of 7 May11/ver02 1. Be concise and to the point Do not make an e-mail longer than it needs to be. Remember that reading an e-mail is harder than reading printed

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

RECORD KEEPING IN HEALTHCARE RECORDS POLICY

RECORD KEEPING IN HEALTHCARE RECORDS POLICY RECORD KEEPING IN HEALTHCARE RECORDS POLICY Version 6.0 Key Points The Policy provides a framework for the quality of the clinical record facilitates high quality, safe patient care and that subsequently

More information

Student Advice and Support Service. Code of Practice

Student Advice and Support Service. Code of Practice Student Advice and Support Service Code of Practice 2014-2015 Page 1 Table of Contents Section Page 1. Aims and Principles of the Service 2 2. Terms of Reference 2 3. Confidentiality Policy 3 4. Equal

More information

Internet, Email and Computer Use Policy

Internet, Email and Computer Use Policy Policy Reference Number Internet, Email and Computer Use Policy 16 CP Responsible Department Related Policies Corporate & Community Services Code of Conduct for Elected Members, Records Management, Risk

More information

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology

More information

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY Version Author Date Approved by Board 2009-1 Gillian Kirkup 24 March 2010 Page 1 of 8 THE RICE MARKETING BOARD FOR

More information

POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES)

POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES) Policy Document POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES) For the definitions of terms used in this policy document refer to the Delegations of

More information

POLICY ON USE OF INTERNET AND EMAIL

POLICY ON USE OF INTERNET AND EMAIL POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Statewide Electronic Communications and Technology Ethics in Minnesota

Statewide Electronic Communications and Technology Ethics in Minnesota Pine Technical College Policy and Procedure Policy Number: 700 Date: 03/20/00 Revision Date: Division/Department: Information Systems Author: Ken Ries Subject: Statewide Electronic Communications and Technology

More information

Information Management Advice 4 Managing Electronic Communications as Records

Information Management Advice 4 Managing Electronic Communications as Records Information Management Advice 4 Managing Electronic Communications as Records Introduction Whether an electronic communication is a record does not depend on its format or means of communication, rather

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

State Records Office Guideline. Management of Digital Records

State Records Office Guideline. Management of Digital Records State Records Office Guideline Management of Digital Records An Information Management Guideline for State Organizations Version 2 January 2015 www.sro.wa.gov.au Contents GLOSSARY... 2 PURPOSE... 5 BACKGROUND...

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

Electronic Communications Monitoring Policy

Electronic Communications Monitoring Policy Electronic Communications Monitoring Policy Printed copies should not be considered the definitive version DOCUMENT CONTROL POLICY NO. 79 Policy Group Information Governance and Security Author Andrew

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title

More information

Terms and Conditions of Use - Connectivity to MAGNET

Terms and Conditions of Use - Connectivity to MAGNET I, as the Client, declare to have read and accepted the terms and conditions set out below for the use of the network connectivity to the Malta Government Network (MAGNET) provided by the Malta Information

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

CCG Social Media Policy

CCG Social Media Policy Corporate CCG Social Media Policy Version Number Date Issued Review Date 2 25/03/2015 25/03/2017 Prepared By: Consultation Process: Formally Approved: Governance Manager, North of England Commissioning

More information

Advice leaflet Internet and e-mail policies

Advice leaflet Internet and e-mail policies Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

Computer Basics 4 E-mail Basics

Computer Basics 4 E-mail Basics Computer Basics 4 E-mail Basics E-MAIL E-mail or electronic mail allows you to send and receive messages from anyone in the world with an e-mail address. To access e-mail you need an e-mail account, the

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Executive Director (AK) [J50]

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - EMAIL POLICY Executive Director (AK) [J50] AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Committee: Policy and Resources Date: 23 rd June 2009 Author: Executive Director (AK) [J50] 1.0 ISSUE 1.1

More information

CCG: IG06: Records Management Policy and Strategy

CCG: IG06: Records Management Policy and Strategy Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

ModusMail Software Instructions.

ModusMail Software Instructions. ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY

TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY Council Resolution No 313/03 adopted at the Ordinary Meeting of Council on 19 August 2003. PURPOSE

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

John Leggott College. Data Protection Policy. Introduction

John Leggott College. Data Protection Policy. Introduction John Leggott College Data Protection Policy Introduction The College needs to keep certain information about its employees, students and other users to allow it to monitor performance, achievements, and

More information

Islington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014

Islington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014 A council-wide information technology policy Version 0.9 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document is distributed under the Creative Commons Attribution

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the

More information

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including

More information

Berwick Academy Policy on E Safety

Berwick Academy Policy on E Safety Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident

More information

CORK INSTITUTE OF TECHNOLOGY

CORK INSTITUTE OF TECHNOLOGY CORK INSTITUTE OF TECHNOLOGY DATA PROTECTION POLICY APPROVED BY GOVERNING BODY ON 30 APRIL 2009 INTRODUCTION Cork Institute of Technology is committed to a policy of protecting the rights and privacy of

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY Title Author Approved By and Date Review Date Mike Pilling Latest Update- Corporation May 2008 1 Aug 2013 DATA PROTECTION ACT 1998 POLICY FOR ALL STAFF AND STUDENTS 1.0 Introduction 1.1 The Data Protection

More information

OLYMPIC COLLEGE POLICY

OLYMPIC COLLEGE POLICY TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,

More information

E-mail & Internet Policy

E-mail & Internet Policy E-mail & Internet Policy Recommending Committee: Approving Committee: Clinical Standards & Focus Council Trust Governance Board Signature: Designation: Chief Executive Date: Version Number: 02 Date: August

More information

USE OF PERSONAL MOBILE DEVICES POLICY

USE OF PERSONAL MOBILE DEVICES POLICY Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

SOCIAL MEDIA POLICY. Senior Governance Officer, NHS North of England Commissioning Support Unit Reference No

SOCIAL MEDIA POLICY. Senior Governance Officer, NHS North of England Commissioning Support Unit Reference No SOCIAL MEDIA POLICY Ratified Governance & Risk Committee 08/2015 Status Final Issued August 2015 Approved By Governance and Risk Committee Consultation Governance and Risk Committee Equality Impact Assessment

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

Medina County Policy Manual

Medina County Policy Manual Medina County Policy Manual Policy: Computer & Network Usage Section: Work Rules Number: 7.015 Issued: 09/17/07 Reviewed/Revised: Page #: 1 of 5 A. It is the intent of Medina County to provide local, network,

More information

Strathfield Girls High School Bring your Own Device User Charter

Strathfield Girls High School Bring your Own Device User Charter Strathfield Girls High School Bring your Own Device User Charter The Strathfield Girls High School Bring Your Own Device program aims to improve student learning experiences both in and beyond the classroom.

More information

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1 Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees

More information

Information Incident Management Policy

Information Incident Management Policy Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit

More information