I.T. Facilities Acceptable Use Policy

Size: px
Start display at page:

Download "I.T. Facilities Acceptable Use Policy"

Transcription

1 I.T. Facilities Acceptable Use Policy Beacon College status confirms Nelson and Colne as one of the country s best Colleges Nelson and Colne College - Judged OUTSTANDING by Ofsted Nelson and Colne College Scotland Rd, Nelson, Lancashire, BB9 7YT Tel: Web:

2 1. Overview The College wishes to encourage the use of its I.T. facilities, subject to adherence to its policies, and is committed to protecting its staff, students, partners and the College from illegal or damaging actions by individuals, either knowingly or unknowingly. College I.T. facilities, including computer equipment, software, operating systems, storage media, networks, web browsing, and file transfer, are the property of the College. These facilities are to be used in the interests of the College, and of our staff and students, in the course of normal operations. Legislation exists that defines the limits and acceptable use of computer systems and information. Compliance with this policy should ensure that legal requirements are observed. Effective security requires the participation and support of all staff, students and others who deal with information and systems. It is the responsibility of every user to know this policy and guidelines, and to use College I.T. facilities accordingly. 2. Purpose The purpose of this policy is to outline the acceptable use of College I.T. facilities, to protect staff, students and the College. Inappropriate use exposes the College to risks including virus attacks, compromise of network systems and services, and legal issues. 3. Scope This Policy applies to staff, students, contractors, consultants, and others at the College and applies to all computer equipment, software and systems that are owned or leased by the College. 4. Policy Statement - Use of I.T. facilities is permitted for legitimate purposes and is subject to authorisation Legitimate purposes include legal use in connection with teaching, learning, research and approved business activities of Nelson and Colne College by its staff, students and other authorised persons. Unauthorised use of I.T. facilities may lead to proceedings under the College s disciplinary procedures and/or legal proceedings. The College reserves the right to: Limit or restrict any user s access. Inspect copy, remove or otherwise alter any data, file, software or system that may undermine the integrity or authorised use of that facility with or without notice to the user. To monitor and record transmissions made through its I.T. facilities to ensure compliance with this policy or for any other purpose authorised under the Telecommunications (Lawful Business Practice) (Interception of Telecommunications) 2000 Regulations. 2

3 Users should be aware that: By using the I.T. facilities they agree to such monitoring. The College disclaims responsibility for loss of data or interference with files resulting from its efforts to maintain the privacy and security of its IT facilities. Use, or attempted use, of I.T. facilities without authorisation may give rise to legal proceedings. The ability to access an I.T. facility does not imply a right to use that facility or access data. If you have any doubts about which facilities you are authorised to access you should seek clarification from an appropriate member of staff. 5. Guidelines 5.1. General 1. Whilst the College would like to provide a reasonable level of privacy, users should be aware that the data they create on the College s I.T. facilities remains the property of the College. Confidentiality of information stored on College IT facilities cannot be guaranteed. 2. Staff and students are responsible for exercising good judgement regarding the reasonableness of personal use. If there is any uncertainty, staff should consult their manager and students their lecturer. The ( ext ) can also provide advice. 3. For security and network maintenance purposes, authorised individuals within the College may monitor I.T. facilities at any time. 4. The College may audit I.T. facilities to ensure compliance with this policy. 5. I.T. equipment must be treated with care and in accordance with operating instructions. Equipment labelled as Out of Order must not be used. Staff should report any equipment with an apparent fault to the I.T. Services ext 239 as soon as possible. Other users should report the fault to a member of staff as soon as possible. Equipment that is thought to be unsafe must not be used and the fault should be reported immediately to the I.T. Services ext Users wishing to connect any personal equipment to College I.T. equipment must consult with and obtain the written permission of ( ext ). equipment authorised for connection must undergo portable appliance testing (PAT), if appropriate, prior to connection, at the expense of the user. 7. Personal equipment includes Servers, Personal Computers (PC s), notebook or laptop computers, Personal Digital Assistants (PDA s), modems, line drivers, routers, switches, hubs, sniffers and headphones. 8. If any personal equipment authorised for connection to the College s I.T. facilities is suspected of causing degradation to the performance of any College I.T. facility; the College reserves the right to remove it immediately without notification to the owner. The College disclaims any responsibility for any damage occurring to personal equipment connected to College I.T. facilities, whether authorised or unauthorised, during connection to or removal from the College s I.T. facilities. 3

4 9. Non-staff users are responsible for backing up their own data. Backups of all data are made on a regular basis and in the event of a system failure I.T. Services will attempt to restore data. The College cannot guarantee that data will be restored. At the present time, there is no means for users to request that files be restored because of accidental erasure. All users should be aware that any data saved anywhere other than their home area (F: drive) is unlikely to be backed up unless special arrangements have been made with Network Services. 10. The College s servers have limited capacity and old should not be held on this server indefinitely. accounts held on College servers will periodically be deleted, users should make their own arrangements for archiving. 11. Nelson and Colne College will at its discretion use automatic message monitoring, filtering and rejections systems on College hosted s based on specific and variable user quotas. 12. Users have a fixed amount of file store available for their use. Failure to free up file store may result in the User ID being disabled or failure to create/write any additional data to disk. Users should be considerate of other users of I.T. facilities and delete any unwanted or unnecessary files. 13. All College users must agree to abide by the Joint Academic Network (JANET) acceptable use policy. 5.2 Security and Proprietary Information 1. Keep passwords secure and do not share accounts. Authorised users are responsible for the security of their passwords and accounts. Users will be held responsible for all actions performed by use of their User ID and must ensure that their unattended workstations are secure. 2. The College may automatically append a disclaimer to s sent to external organisations from College systems. The contents of this disclaimer may vary from time to time. 3. Postings by employees from a College address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of the College, unless posting is in the course of business duties. 4. The College s servers have limited capacity and old should not be held on this server indefinitely. accounts held on College servers will periodically be deleted, users should make their own arrangements for archiving. 5. Nelson and Colne College will at its discretion use automatic message monitoring, filtering and rejections systems on College hosted s based on specific and variable user quotas. 6. Staff and students must use extreme caution when opening attachments received from unknown senders, which may contain viruses or other damaging content. 5.3 Unacceptable Use The following activities are generally prohibited. The may exempt designated 4

5 Under no circumstances are staff authorised to engage in any activity that is illegal while using College I.T. facilities. Incitement to commit a crime is itself a criminal offence whether or not the crime is subsequently committed. This includes the provision of information via computer systems to facilitate crimes. Materials lawful in their place of origin may but not be lawful in the UK and vice versa. The lists below are not exhaustive, but attempt to provide a framework for activities that fall into the category of unacceptable use System and Network - Prohibited Activities The following activities are strictly prohibited, with no exceptions: 1. Violation of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including the installation or distribution of pirated or other software products that are not appropriately licensed for use by the College. 2. Unauthorised copying of copyrighted material including digitisation and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music, and the installation of any copyrighted software for which the College or the end user does not have an active licence. 3. Exporting software, technical information, encryption software or technology, in violation of international or regional export control laws, is illegal. 4. Introduction of malicious programs into the network or server (e.g., viruses, worms, Trojan horses, bombs, etc.). 5. Revealing your account password to others or allowing use of your account by others. 6. Actively engaging in procuring or transmitting material that is in violation of sexual harassment or workplace laws. 7. Making fraudulent offers of products, items, or services. 8. Making statements about warranty, expressly or implied, unless it is a part of normal job duties. 9. Effecting security breaches or disruptions of any internal or external network communication. Security breaches include accessing data of which the user is not an intended recipient or logging into a server or account that the user is not authorised to access, unless these duties are within the scope of legitimate job responsibilities. 10. Unauthorised port scanning or security scanning. 11. Executing any form of network monitoring which will intercept data unless within the scope of authorised duties. 5

6 12. Circumventing, or attempting to circumvent, user authentication or security of any system, network or account. Users should not access or try to access any user ID or data of another user or attempt to masquerade as another user. 13. Attempt to circumvent data protection schemes or uncover security loopholes. Any user who finds a possible security weakness on any College system is obliged to report it to I.T. Services, their tutor or an I.T. facilitator. Users are also responsible for reporting any violation of this policy by another individual. 14. Interfering with or denying service to any user 15. Using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, a user s terminal session, via any means, locally or via the Internet/Intranet/Extranet and Communications - Prohibited Activities 1. Sending racist or sexist comments, any other material which may be considered offensive. 2. Using offensive or condescending terms in s or engage in flaming. 3. Sending anonymous s, or posting anonymous comments, which are prejudicial to the interests or reputation of others or of the College. 4. Sending any potentially actionable materials or comments, or anything likely to undermine the ethos and reputation of the College. 5. Sending or forwarding unsolicited bulk messages ( junk mail or spam ). 6. Any form of harassment via , telephone or paging, whether through language, frequency, or size of messages. 7. Unauthorised use, or forging, of header information. 8. Creating or forwarding chain letters, Ponzi or other pyramid schemes of any kind. 9. Engaging in Social Engineering or other activities that may bring the College into disrepute. 10. Overloading College hosted systems by overuse of the carbon copy ( cc: ) and forward facilities within the package, or by unauthorised mass mailing within College. (Network Manager authorisation must be obtained when sending to large groups such as everyone ). 11. Any form of business activity not directly related to the work of the College. 12. Sending confidential materials in an unencrypted form. 6.0 Enforcement 1. Violation of this policy may result in the immediate withdrawal of the user s ID(s) and access to College I.T. facilities. 2. Any employee or learner who has violated this policy may be subject to disciplinary action. 7.0 Related Documentation 1. UKERNA, JANET Acceptable Use Policy. 2. Staff Disciplinary Procedure 3. Staff Code of Conduct 4. Disciplinary Policy 6

7 8.0 Definitions Term Chain letter Flaming I.T. Facilities Pyramid scheme Ponzi scheme Social engineering Spam User User ID Definition A chain letter is a letter, an message, or some other communication, which asks the recipient to send copies of it to several other people. Use of to convey insults, criticisms or remarks meant to incite anger. All equipment and services used in information technology enabled learning or work. A scheme in which a hierarchy is created by people joining under others who joined previously, and in which those who join make payments to those above them in the hierarchy, with the exception of being able to collect payments from those who join below. A Ponzi scheme is an investment scheme in which returns are paid to earlier investors, entirely out of money paid into the scheme by newer investors. Ponzi schemes are similar to pyramid schemes, but differ in that Ponzi schemes are operated by a central company or person, who may or may not be making other false claims about how the money is being invested, and where the returns are coming from. Ponzi schemes don t necessarily involve a hierarchical structure, as in a pyramid scheme; there is merely one person or company that is collecting money from new participants and using this money to payoff promised returns to earlier participants. Social engineering can be regarded as people hacking. It is the act of soliciting unwitting participation or revelation of information from a person inside an organisation. Unauthorised and/or unsolicited electronic mass mailings. Anyone authorised to use College I.T. facilities. Includes staff, students and persons or organisations engaged in College activities. Username allocated by the College which [in conjunction with a password] provides access to authorised systems. Appendix - Legislation Relevant to Computer Use Data Protection Act The Data Protection Act is concerned with any information about living individuals and demands good practice in relation to such information. With some exceptions any organisation or individual holding personal data must be registered with the Information Commissioner. Nelson and Colne College is registered. The 7

8 use of any personal data not in this registration is illegal. The 1998 Act extends the protection given to computerised information to manually stored data. It also prohibits the transfer of personal data outside of the European Economic Area ( the EEA ) to countries that do not provide adequate protection of personal data, except in exceptional circumstances. Transfer within the EEA is permitted. Remember that personal data placed on the Internet can find its way outside of the EEA! You must only use personal data for College related purposes. You must ensure that the use of College related personal data is restricted to the minimum and within the College s registration. You should contact the College s Data Protection Officer before conducting any activity that involves the collection, storage, display and/or transfer of personal data both manual and computerised g.monkhouse@nelson.ac.uk Computer Misuse Act The Computer Misuse Act is designed to protect I.T. systems against unauthorised access and modification. There are three levels of offence: The unauthorised accessing of computer material, including illicit copying, is punishable by up to 6 months in prison or a fine of up to 5,000. The unauthorised accessing of computer systems with the intent to commit or commission further crimes is punishable by up to 5 years imprisonment or an unlimited fine. The unauthorised modification of computer material, including the deliberate destruction of data or software, the spreading of virus infected files and addition of passwords to files is punishable by up to 5 years imprisonment or an unlimited fine. Copyright, Design and Patents Act The Computer Copyright, Design and Patents Act provides protection to materials for the author(s). Copyright applies to text, pictures, video and sound including those sent by . The explicit or implicit authorisation of the author(s) of copyrighted material must be sought before making, transmitting, installing or storing an electronic copy (or substantial part thereof) of any such material. Students should be particularly mindful that any material downloaded from the Internet and held to be original work will be considered plagiarism and the student may be subject to disciplinary action. The normal exemptions covering single articles photocopied from journals do not apply to copyrighted materials held electronically. Official Secrets Act This covers any material relating to security, intelligence, defence or international relations that has been disclosed by any Crown servant or Government contractor. The Act covers disclosures of such material. The Act requires that any such material is kept confidential at all times. Obscene Publications Act, Criminal Justice Act, Protection of Children Act These cover materials that are deemed to be obscene. Materials are deemed to be obscene if the overall effect of the material would be to deprave and corrupt a significant proportion of the people who view or hear such material. Obscene material includes material of a pornographic nature and material that is excessively violent. The Protection of Children Act places particular emphasis, with increased penalties, on obscene and pornographic material involving children. Sex Discrimination Act, Race Relations Act These are designed to prevent unfair discrimination based on Sex or Race and in some cases based on Sexual orientation. Defamation Defamation is the publication of opinions and false statements about a person or group of people. Any such statements published in permanent form even within an may lead to prosecution of the author. Bear in mind that an sent to a single individual may be forwarded to many other recipients. Beacon College status confirms Nelson and Colne as one of the country s best Colleges Nelson and Colne College - Judged OUTSTANDING by Ofsted Nelson and Colne College Scotland Rd, Nelson, Lancashire, BB9 7YT Tel: Web:

REGION 19 HEAD START. Acceptable Use Policy

REGION 19 HEAD START. Acceptable Use Policy REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions

More information

Acceptable Use Policy

Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is

More information

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:

More information

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

How To Use A College Computer System Safely

How To Use A College Computer System Safely 1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture

More information

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by : GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation

More information

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Odessa College Use of Computer Resources Policy Policy Date: November 2010 Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing

More information

c. Require or Request Photos of Subscriber f. Allow Subscribers Access to Other Subscriber Information

c. Require or Request Photos of Subscriber f. Allow Subscribers Access to Other Subscriber Information Diocese of Orlando Network Acceptable Use Policy for All Parishes, Schools and Entities of the Diocese of Orlando Parent Addendum (Please note these are excerpts from the full document) 5.3 Unacceptable

More information

AASTMT Acceptable Use Policy

AASTMT Acceptable Use Policy AASTMT Acceptable Use Policy Classification Information Security Version 1.0 Status Not Active Prepared Department Computer Networks and Data Center Approved Authority AASTMT Presidency Release Date 19/4/2015

More information

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common

More information

Insert GNIS Logo Here. Acceptable Use Policy & Guidelines Information Technology Policies & Procedures. Guangzhou Nanhu International School

Insert GNIS Logo Here. Acceptable Use Policy & Guidelines Information Technology Policies & Procedures. Guangzhou Nanhu International School Insert GNIS Logo Here Acceptable Use Policy & Guidelines Information Technology Policies & Procedures Guangzhou Nanhu International School May, 2013 Table of Contents 1 Overview...1 2 Purpose...1 3 Scope...1

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

Terms in this document are defined in the SOA policy ISP-002 Information Security Glossary.

Terms in this document are defined in the SOA policy ISP-002 Information Security Glossary. Effective: 8/13/2010 Last Review: 11/1/2010 Next Review: Quarterly Version: 1.1 Approved by: CIO Pages 5 Distribution: SOA 1. Purpose To outline acceptable use and clarify the protection of State of Alaska

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

COUNSEL S CHAMBERS LIMITED

COUNSEL S CHAMBERS LIMITED COUNSEL S CHAMBERS LIMITED CCL s Acceptable Use Policy Policy for the use of CCL Network A. APPLICATION 1. This policy sets out terms and conditions on which Users may access and use CCL s Network. Please

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information

ICT Acceptable Use Policy. August 2015

ICT Acceptable Use Policy. August 2015 ICT Acceptable Use Policy August 2015 Document title ICT Acceptable Use Policy August 2015 Document author and department Responsible person and department Robbie Walker, Information Security Architect,

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011 West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

How To Monitor The Internet In Idaho

How To Monitor The Internet In Idaho Idaho Technology Authority (ITA) ENTERPRISE POLICY P1000 GENERAL POLICIES Category: P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING CONTENTS: I. Authority II. Abstract III. Definitions IV. Policy

More information

INFORMATION SYSTEM GENERAL USAGE POLICY

INFORMATION SYSTEM GENERAL USAGE POLICY PURPOSE The Information System General Usage Policy ("Policy") establishes appropriate uses of Devon s Information Systems. Devon provides secure Information Systems in accordance with the Information

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Acceptable Use Policy Revision date: 26/08/2013

Acceptable Use Policy Revision date: 26/08/2013 Acceptable Use Policy Revision date: 26/08/2013 Acceptable usage Policy for all Services As a provider of web site hosting and other Internet-related services, Corgi Tech Limited offers its customer (also

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)

ABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body) ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved

More information

Century Commons' Internet Use

Century Commons' Internet Use Century Commons' Internet Use Please Note: Even though you are unable to access the Internet, the sites below are always available. Open up Internet Explorer and type any of these in your address bar to

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 (Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

INTERNET ACCEPTABLE USE POLICY

INTERNET ACCEPTABLE USE POLICY INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods

More information

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5 WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds

More information

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Riverside Community College District Policy No. 3720 General Institution

Riverside Community College District Policy No. 3720 General Institution Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Acceptable Use Policy

Acceptable Use Policy Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

Acceptable Use Policy - NBN Services

Acceptable Use Policy - NBN Services OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:

More information

Commonwealth Office of Technology

Commonwealth Office of Technology Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

DUVAL COUNTY PUBLIC SCHOOLS (DCPS) INFORMATION SECURITY PROGRAM SUBJECT: ACCEPTABLE USE POLICY (AUP) POLICY NUMBER: 8.71

DUVAL COUNTY PUBLIC SCHOOLS (DCPS) INFORMATION SECURITY PROGRAM SUBJECT: ACCEPTABLE USE POLICY (AUP) POLICY NUMBER: 8.71 ACCEPTABLE USE POLICY (AUP) POLICY NUMBER: 8.71 PURPOSE/SCOPE: This establishes the School Board Policy for Acceptable Use of Information Resources and applies to all users of DCPS information resources.

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Service Protection Under The Provider's Acceptable Use Policy

Service Protection Under The Provider's Acceptable Use Policy Acceptable Use Policy As a provider of Internet access, Internet email, web site hosting, and other Internet related services, Pottawatomie Telephone Company and MBO.net herein after referred to as "the

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

The College ofBergen Online - Acceptable Use and Disposal

The College ofBergen Online - Acceptable Use and Disposal Acceptable Use of Information Technology Policy Bergen Community College reserves the right to monitor its information technology resources and telecommunications network to protect the integrity of its

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

1. Name of Document: IT Acceptable Use Policy. 2. Originator: Deputy Principal

1. Name of Document: IT Acceptable Use Policy. 2. Originator: Deputy Principal STRATEGY & POLICY COVER SHEET 1. Name of Document: IT Acceptable Use Policy 2. Originator: Deputy Principal 3. Date of Origination: Version 1 8 th February 2005 4. Academic Board Ratification: 8 th February

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

COMMUNITY COLLEGE SYSTEM OF NEW HAMPSHIRE

COMMUNITY COLLEGE SYSTEM OF NEW HAMPSHIRE COMMUNITY COLLEGE SYSTEM OF NEW HAMPSHIRE Section: 300 Human Resources Subject: 320 Employment Policy: Information Technology Date Approved: June 16, 2009 Acceptable Use Policy #: 321.01 Date of Last Amendment:

More information

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet

More information

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students The Board of Education recognizes that the Technology, Assessment and Accountability (TAA) Department's resources (computers,

More information

University of Guyana.GY cctld Acceptable Use Policy Effective Date: December 1, 2011

University of Guyana.GY cctld Acceptable Use Policy Effective Date: December 1, 2011 Note: Substantive modifications and updates to the previous.gy Registrant Agreement are highlighted in yellow. This Acceptable Use Policy ("AUP") sets out the actions prohibited to users of the ICT University

More information

MNI Networks Limited Acceptable Use Policy

MNI Networks Limited Acceptable Use Policy This Acceptable Use Policy ("AUP") sets out the actions prohibited to users of the MNINET Network ( MNINET ). Users are defined as anyone who uses or accesses the.ms domain registry, who has responsibility

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

How To Behave At A School

How To Behave At A School THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

Policies Concerning the use of Computers

Policies Concerning the use of Computers Policies Concerning the use of Computers Shrewsbury School s Policies Concerning the use of Computers The Director of IT is responsible for the formulation and review of policies affecting the use of computers

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Tele-Media Cable Internet Acceptable Use Policy

Tele-Media Cable Internet Acceptable Use Policy Tele-Media Cable Internet Acceptable Use Policy Important Note: Tele-Media may revise this Acceptable Use Policy (the "Policy") from time to time without notice by posting a new version of this document

More information

ContentPros LLC Web Site and Email Hosting Service Agreement

ContentPros LLC Web Site and Email Hosting Service Agreement ContentPros LLC Web Site and Email Hosting Service Agreement This Web Site and Email Hosting Service Agreement ("Agreement") is by and between ContentPros, LLC ("ContentPros "), a/an Colorado Corporation,

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

FKCC AUP/LOCAL AUTHORITY

FKCC AUP/LOCAL AUTHORITY FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and

More information