ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF
|
|
|
- Joella Gibson
- 9 years ago
- Views:
Transcription
1 ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box , Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: (20) Fax: +254 (20) Website:
2 Acceptable IT and Computer Use Policy Guide for Staff i
3 Table of Contents Contents Page ii 1. Purpose of the Policy Guide 1 2. Asset and Data Security 1 3. Software 2 4. Acceptable and Internet Usage 3 5. Confidentiality and Intellectual Property 4 6. Data Protection 5 7. Disciplinary Procedures 6 References 6 ii
4 1. Purpose of the Policy Guide As an employee of AAS, you are required to comply with AAS Data Protection Policy and IT Security Policy. These policies ensure best-practice in the management, storage and use of company IT systems, assets and electronic data. The Acceptable IT and Computer Use Policy Guide provides employees with strict instruction on the use of various IT services to ensure their employer AAS can continue to adhere to these policies. All employees and workers with AAS must agree to abide by the rules and procedures outlined in this document before they will be allowed access to AAS IT systems, databases, or issued an institutional address. Compliance with its principles is also mandatory for any authorised third-party users accessing any computer system owned or operated by the company. Any actual or suspected breaches of the rules and procedures contained in this document within, or affecting, the company's systems will be thoroughly investigated in accordance with AAS disciplinary procedures, and may lead to disciplinary action being taken. Serious breaches may amount to gross misconduct resulting in summary dismissal. Any action taken internally does not preclude prosecution through a court of law. We reserve the right to amend this Policy Guide when deemed appropriate by the organisation 2. Asset and Data Security The rules and guidelines described here apply to all computer users accessing/operating any IT services owned and/or operated by AAS. Their application extends to the use of all such equipment, or access to any AAS database/it system in the secretariat, at home and/or overseas. These guidelines have been written to help employees guard against the risk of theft of hardware and software, the unauthorised access of data, the maintenance of system security and protection of the academy s Intellectual Property. Asset Security Employees should not disclose information relating to the company's IT facilities to anyone outside the company, without the company's express permission. Any telephone or approaches canvassing for information should be passed directly to the IT officer of AAS under AAS IT Security Policy. Laptops computers or other portable data-storage devices should not be left unattended in any location, and never left in plain sight in cars, public transport or hotels. Laptops should 1
5 not be kept on desks overnight, and must be stored in locked cupboards, drawers or taken home. If left unattended in a car, these must be locked in the boot or glove compartment at all times. Only nominated IT personnel or contracted third-party personnel, at the direction of the Executive Director, are permitted to move any IT equipment; with the exception of portable equipment such as laptop computers. It is prohibited to deliberately attempt to access a system to which you have no authority. AAS regularly monitors all systems through its third party contractors, and all unauthorised attempts to access systems are investigated. Data Security All computer and IT system users are given a Username and Password; these are unique and must not be shared with any other employee. No user is permitted to log onto any other users account without good cause. Failure to comply with this will lead to disciplinary action being taken. Passwords to AAS IT systems or accounts should not be written down, or kept where others might find them. All passwords should be hard to guess and it is recommended they contain at least eight characters, including upper and lower case letters, numbers and special characters such as! # $ ( ) ^. Passwords should also ideally be changed at regular intervals. Computers logged onto AAS internal network or an AAS account, should never be left unattended and unlocked, especially when in-use outside the office. The user logged in at a computer will be considered to be the legal author and progenitor of any messages sent from that computer, and will be liable for any network activity logged through their user account. Data should always be saved on a shared network drive managed by AAS. The copying of AAS data on to personal computers, external hard drives or any other portable device is strictly prohibited. Any and all data held on AAS computers and servers is the property of the AAS and its clients, and must be returned or deleted on request. 3. Software Installation or copying of any software onto AAS computers is strictly prohibited without prior consent of the AAS IT officer as this may: (a) cause unforeseen software conflicts leading to data and/or system integrity loss; (b) reduce the efficiency, or otherwise compromise the operation of AAS IT systems/computers; or (c) unknowingly constitute a breach of copyright law. 2
6 Legitimate copies of software will be purchased and provided, if and when required. The following additional guidelines are designed to protect AAS and its employees from a reduction in, or critical loss of IT system services. At all times, employees:- must protect their computer against the threat of invasive viruses and other malicious intrusions by ensuring their anti-virus protection software is active and upto-date, and that all content controls are active and not purposefully circumvented; must not, under any circumstances, download software from the Internet other than with the express permission and guidance of AAS IT officer. This also applies to the downloading of copyrighted music files and non-work related video footage, thirdparty applications, games and screen-savers; and must not bring software from home and load it on to any AAS computer, or copy any AAS licenced software and load it onto home computers or any other personal device. All software, information and programmes developed for and/or on behalf of the AAS by employees or contracted third-parties during the course of their employment remain the property of AAS. Duplication, use or sale of such software without the prior consent of AAS will be an infringement of the organisation s copyright and will be dealt with as a disciplinary matter. This may become a prosecution under law if employment has already terminated when the copyright is infringed upon. 4. Acceptable and Internet Usage AAS provides its employees with access to the internet and its system to assist them in the performance of their duties. Their use should primarily be for official company business; however, minimal personal use of the internet and company is permitted, provided the user complies with the provisions contained in this Policy, as follows:- Personal use of the system or surfing of the internet should never impact the normal flow of business related and network traffic. AAS reserves the right to ask its mailbox hosts to purge identifiable personal to preserve the integrity of the systems, and to restrict the access of specific individuals to the internet should their use be judged excessive. The viewing, creation or transmission by any employee, consultant or contractor of any offensive, obscene or indecent images, data or other restricted material by or on the internet is prohibited. Examples of prohibited material include, but are not limited to: o Sexually explicit messages, images, cartoons, or jokes; o Unwelcome propositions, requests for dates, or love letters; 3
7 o Profanity, obscenity, slander, or libel; o Ethnic, religious, or racial slurs; o Political beliefs or commentary; o Terrorism, terrorist activities, inciting or condoning violence or vandalism; o Any other activity considered illegal in the country of origin/receipt. It is recognised that websites which display material of a pornographic or offensive nature, or which contain malware designed to infect and harm your computer, may be accidentally accessed from time to time. Should this happen and you become concerned for the integrity of your computer and/or network access, inform the IT officer immediately and discontinue use of your system, closing down all shared drives. Remedial action will be taken as necessary to protect your computer and AAS IT systems from further infection. The forwarding of chain-letters is strictly forbidden this includes those purporting to be for Charity or other good causes as well as those promising wealth or other personal gain. Likewise, no non-business related messages of any kind should be sent to multiple external destinations as this is considered spamming, an illegal activity in many countries. should not be used to send large attached files, and a strict limit of 25Mb has been applied by the mailbox host. In addition, many systems will not accept large files which may be returned and result in the overloading of the AAS system. The Academy has active security protocols to screen for malicious content; even so, employees are recommended to exercise caution when opening all attachments, particularly if the file extension is not recognised. The African Academy of Sciences reserves the right to monitor employees and internet usage, including intercepting s before they are read, and accessing personal internet browser history for the purpose of investigating unauthorised use of the AAS telecommunication system, preventing or detecting crime, or ascertaining compliance with this Policy. This will include personal s where appropriate. All monitoring will be authorised by the Executive Director of AAS. Any information obtained during the course of monitoring will be kept strictly confidential and will be used only for the purpose for which the monitoring has taken place. 5. Confidentiality and Intellectual Property AAS employees are strictly forbidden to make any copy, abstract, summary or précis of the whole or part of any document constituting the intellectual property of the company, subcontractor, partners, or its clients except where expressly authorised so to do or in the proper performance of their duties. 4
8 Employees are required to promptly disclose to the company, and keep confidential, all inventions, copyright work, designs or technical know-how conceived or made by them alone or with others in the course of their employment. They must hold all such intellectual property in trust for the Academy, sub-contractor, partners and clients as necessary, and will vest intellectual property fully in AAS and/or secure patent or other appropriate forms of protection of the same. Employees at all times both during their employment with AAS and after its termination must keep confidential, and shall not at any time turn to their own account, make personal use of, divulge, make known to anyone or enable anyone to become aware of (other than those who are employed by AAS and authorised to receive the same) any information relating in any way to:- suppliers, potential suppliers, customers and potential customers; techniques, engineering and procedural documentation of the company; the details of any business, financial or other arrangements transacted with persons, firms or statutory bodies by AAS on behalf of itself or any of its clients; policy documents or any other internal restricted document, including personal information relating to AAS employees or its partner/clients. 6. Data Protection AAS will protect all data in its care and can only do this with the assistance of staff and partners. All staff and partners are required to keep AAS informed of all material changes in your circumstances. This policy makes available to you full details of your entitlements and responsibilities to make this happen. As an employee you must acknowledge and consent to the following: That AAS maintain and hold electronic records relating to you and all our employees principally to enable us to effectively record and administer our HR function and processes such as pay and benefits; That it may be necessary from time to time, to pass personal data to other organisations, partners and clients for the following purposes: o Sharing knowledge, information, products and ideas; o Marketing initiatives and Business Development activities; o Administrative purposes; and o If required to do so, by a government body You may make a written request to the Executive Director if you wish to see records held by AAS about you. Where we are able to provide such details to you, it will be given. 5
9 7. Disciplinary Procedures Failure to comply with the provisions outlined in the above sections will lead to appropriate reprimand. Any action judged to constitute gross misconduct may lead to summary dismissal at the discretion of the Executive Director. References: 1. IMC Worldwide, Acceptable IT and Computer Use P0licy Guide SANS InfoSec Acceptable Use Policy. SANS Institute ICT Privacy and Acceptable Use policy. World Agroforestry Centre Policy Series MG/C/4/2009. ILRI Policy Series University of Southampton ICT Acceptable Use Policy DFID IT Strategy (2012 Revision). Version: 2.0 (Revised November 2012). /dfid-it-strategy.pdf 6
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
ACCEPTABLE USE POLICY
ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 [email protected] 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
Acceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
Angard Acceptable Use Policy
Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
Acceptable use policy
Acceptable use policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSAIGM008 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review Acceptable Use
Information Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
Scottish Rowing Data Protection Policy
Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this
UTC Cambridge ICT Policy
UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
Information & Communications Technology Usage Policy Olive AP Academy - Thurrock
Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
Service Schedule for Business Email Lite powered by Microsoft Office 365
Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
Email, Internet & Telephone. Policy and Procedure
A Email, Internet & Telephone Policy and Procedure MAYLIM LTD Civil Engineering & Hard Landscaping Contractors 50 52 Wharf Road, G 04 The Wenlock, Islington, London N1 7EU Tel: +44(0)207 785 6996 Fax:
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
INTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
Information Security Code of Conduct
Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
Terms and conditions of use
Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES Version 3.0 17/05/2012 CONTENTS 1. Introduction and Scope... 3 2. Data Protection Act 1998... 4 3. Licence Registration and Prevention of Piracy...
How To Monitor The Internet In Idaho
Idaho Technology Authority (ITA) ENTERPRISE POLICY P1000 GENERAL POLICIES Category: P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING CONTENTS: I. Authority II. Abstract III. Definitions IV. Policy
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
POLICY ON USE OF INTERNET AND EMAIL
POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY CONDITIONS OF USE FOR ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY Between: the Commonwealth of Australia, acting
Access Control Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information
General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information The following rules of behavior apply to all Department of Homeland Security
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
ABERDARE COMMUNITY SCHOOL
ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
How To Use The Blog Safely And Responsibly
BLOG PROTOCOL DRI maintains this site (the "Site") for your personal entertainment, information, education, and communication. Please feel free to browse the Site. You may not download material displayed
E-Safety and Computer Security Rules
E-Safety and Computer Security Rules Process / Signatures Portfolio Team Portfolio Team Lead Principal Chair of Governors Behaviour Safety & Ethos Mrs K Mitford Dr J V Edwards Mrs K Mitford Presented 2
Information Technology Policy and Procedures
Information Technology Policy and Procedures Responsible Officer Author Ben Bennett, Business Planning & Resources Director Policy Development Group Date effective from April 2005 Date last amended February
Assistant Director of Facilities
Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment
Acceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365
1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service
NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction
NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
